


default search action
The Journal of Supercomputing, Volume 66
Volume 66, Number 1, October 2013
- Sang Oh Park, Bin Xiao

, Victor C. M. Leung
, Young-Sik Jeong:
Advanced technologies and applications for Highly-Reliable Cyber Physical System (HRCPS). 1-3 - Heiko Desruelle, Simon Isenberg, John Lyle, Frank Gielen:

Multi-device application middleware: leveraging the ubiquity of the Web with webinos. 4-20 - Wooseong Kim

, Joon-Sang Park
, Sanghyun Ahn:
Cross-layer optimization for wireless multihop multicast networks. 21-34 - Chen-Che Huang, Tsun-Tse Huang, Jiun-Long Huang, Lo-Yao Yeh:

Hierarchical role-based data dissemination in wireless sensor networks. 35-56 - Young-Sik Jeong, Hyun-Woo Kim, Haeng Jin Jang:

Adaptive resource management scheme for monitoring of CPS. 57-69 - Yong-hwan Kim, Chan-Myung Kim, Youn-Hee Han, Young-Sik Jeong, Doo-Soon Park:

An efficient strategy of nonuniform sensor deployment in cyber physical systems. 70-80 - Se Jin Kwon

, Hyung-Ju Cho, Sungsoo Kim, Tae-Sun Chung:
Random data-aware flash translation layer for NAND flash-based smart devices. 81-93
- Fan Zhang, Yan Zhang, Jason D. Bakos

:
Accelerating frequent itemset mining on graphics processing units. 94-117 - Jigang Wu, Pu Wang, Siew Kei Lam, Thambipillai Srikanthan

:
Efficient heuristic and tabu search for hardware/software partitioning. 118-134 - Siham Tabik

, Alejandro Villegas, Emilio L. Zapata, Luis F. Romero:
Optimal tilt and orientation maps: a multi-algorithm approach for heterogeneous multicore-GPU systems. 135-147 - Fan Wu, Kenli Li, Ahmed Sallam, Xu Zhou:

A molecular solution for minimum vertex cover problem in tile assembly model. 148-169 - Bhanu Sharma, Ruppa K. Thulasiram, Parimala Thulasiraman:

Normalized particle swarm optimization for complex chooser option pricing on graphics processing unit. 170-192 - Dawei Sun, Guiran Chang, Changsheng Miao, Xingwei Wang:

Analyzing, modeling and evaluating dynamic adaptive fault tolerance strategies in cloud computing environments. 193-228 - Wu-Chun Chung, Chin-Jung Hsu, Kuan-Chou Lai, Kuan-Ching Li

, Yeh-Ching Chung:
Direction-aware resource discovery in large-scale distributed computing environments. 229-248 - Fengkai Yuan, Zhenzhou Ji:

DP&TB: a coherence filtering protocol for many-core chip multiprocessors. 249-261 - Rajni Aron

, Inderveer Chana:
QoS based resource provisioning and scheduling in grids. 262-283 - Juan A. Villar, Pedro Javier García

, Francisco José Alfaro
, José L. Sánchez
, Francisco J. Quiles
:
An integrated solution for QoS provision and congestion management in high-performance interconnection networks using deterministic source-based routing. 284-304 - Tian Huang

, Yongxin Zhu, Meikang Qiu, Xiaojing Yin, Xu Wang:
Extending Amdahl's law and Gustafson's law by evaluating interconnections on multi-core processors. 305-319 - Yahui Wu, Su Deng, Hongbin Huang

:
Optimal management of dynamic information in Delay Tolerant Networks. 320-338 - Basel A. Mahafzah

:
Performance assessment of multithreaded quicksort algorithm on simultaneous multithreaded architecture. 339-363 - Jun Chai, Huayou Su, Mei Wen, Xing Cai

, Nan Wu, Chunyuan Zhang:
Resource-efficient utilization of CPU/GPU-based heterogeneous supercomputers for Bayesian phylogenetic inference. 364-380 - Hung-Fu Li, Tyng-Yeu Liang, Jun-Yao Chiu:

A compound OpenMP/MPI program development toolkit for hybrid CPU/GPU clusters. 381-405 - Manaschai Kunaseth

, David F. Richards, James N. Glosli, Rajiv K. Kalia, Aiichiro Nakano, Priya Vashishta:
Analysis of scalable data-privatization threading algorithms for hybrid MPI/OpenMP parallelization of molecular dynamics. 406-430 - Arslan Munir

, Farinaz Koushanfar
, Ann Gordon-Ross, Sanjay Ranka
:
High-performance optimizations on tiled many-core embedded systems: a matrix multiplication case study. 431-487 - Mohsen Soryani

, Morteza Analoui
, Ghobad Zarrinchian
:
Improving inter-node communications in multi-core clusters using a contention-free process mapping algorithm. 488-513 - Xinyu Wang, Dong Xiang, Zhigang Yu

:
TM: a new and simple topology for interconnection networks. 514-538 - Kenn Slagter, Ching-Hsien Hsu, Yeh-Ching Chung, Daqiang Zhang:

An improved partitioning mechanism for optimizing massive data analysis using MapReduce. 539-555 - Zhiyuan Shi, Fei Hao

:
A strategy of multi-criteria decision-making task ranking in social-networks. 556-571 - Sadoon Azizi

, Farshad Safaei, Naser Hashemi:
On the topological properties of HyperX. 572-593 - Jaeseok Myung, Sang-goo Lee:

Exploiting inter-operation parallelism for matrix chain multiplication using MapReduce. 594-609
Volume 66, Number 2, November 2013
- Jongsung Kim, Philip S. Yu, Nasrullah Memon:

Social network and high performance in smart communications. 611-613 - James Jong Hyuk Park, Hwa-Young Jeong

:
The QoS-based MCDM system for SaaS ERP applications with Social Network. 614-632 - Jong-Soo Sohn, In-Jeong Chung:

Dynamic FOAF management method for social networks in the social web environment. 633-648 - Yuexing Peng, Yonghui Li

, Lei Shu
, Wenbo Wang:
An energy-efficient clustered distributed coding for large-scale wireless sensor networks. 649-669 - Yen-Wen Chen, Shaoh Chen Ke:

A uplink radio resource allocation scheme for localized SC-FDMA transmission in LTE network. 670-685 - Xibin Wang, Xia Xie, Hai Jin, Xuanhua Shi, Wenzhi Cao, Xijiang Ke:

A disk bandwidth allocation mechanism with priority. 686-699 - Yong-Hyuk Moon, Jeong-Nyeo Kim, Chan-Hyun Youn:

Churn-aware optimal layer scheduling scheme for scalable video distribution in super-peer overlay networks. 700-720 - Ming-Chin Juang, Chen-Che Huang, Jiun-Long Huang:

Efficient algorithms for team formation with a leader in social networks. 721-737 - Iram Fatima, Muhammad Fahim

, Young-Koo Lee, Sungyoung Lee:
MODM: multi-objective diffusion model for dynamic social networks using evolutionary algorithm. 738-759 - Iram Fatima, Muhammad Fahim

, Young-Koo Lee, Sungyoung Lee:
Analysis and effects of smart home dataset characteristics for daily life activity recognition. 760-780
- Sang-Soo Yeo

, Shiuh-Jeng Wang:
Editorial of special section on hybrid information security technologies - part I. 781-782 - Wei-Jen Wang

, Yue-Shan Chang, Win-Tsung Lo, Yi-Kang Lee:
Adaptive scheduling for parallel tasks with QoS satisfaction for hybrid cloud environments. 783-811 - Fu-Hau Hsu, Min-Hao Wu, Shiuh-Jeng Wang, Chia-Ling Huang:

Reversibility of image with balanced fidelity and capacity upon pixels differencing expansion. 812-828 - Kitae Jeong:

Cryptanalysis of block cipher Piccolo suitable for cloud computing. 829-840 - Chun-I Fan, Shi-Yuan Huang, William Artan:

Design and implementation of privacy preserving billing protocol for smart grid. 841-862 - Raylin Tso

:
Security analysis and improvements of a communication-efficient three-party password authenticated key exchange protocol. 863-874 - Jewan Bang

, Changhoon Lee
, Sangjin Lee, Kyungho Lee:
Damaged backup data recovery method for Windows mobile. 875-887 - Ren-Junn Hwang, Yu-Kai Hsiao:

An anonymous distributed routing protocol in mobile ad-hoc networks. 888-906 - Tung-Shou Chen, Wei-Bin Lee, Jeanne Chen, Yuan-Hung Kao, Pei-Wen Hou:

Reversible privacy preserving data mining: a combination of difference expansion and privacy preserving. 907-917 - Jungmin Lim, Yongki Kim, Dongyoung Koo

, Soojin Lee, Seokjoo Doo, Hyunsoo Yoon:
A novel Adaptive Cluster Transformation (ACT)-based intrusion tolerant architecture for hybrid information technology. 918-935 - Tae Youn Han, Mun-Kyu Lee:

Reordering computation sequences for memory-efficient binary field multiplication. 936-949 - Hyo Hyun Choi, Su Hyun Nam, Taeshik Shon, Myungwhan Choi:

Information delivery scheme of micro UAVs having limited communication range during tracking the moving target. 950-972 - Chih-ho Chou, Kuo-Yu Tsai, Chung-Fu Lu:

Two ID-based authenticated schemes with key agreement for mobile environments. 973-988 - Chi Lin, Guowei Wu:

Enhancing the attacking efficiency of the node capture attack in WSN: a matrix approach. 989-1007 - Te-Yu Chen, Cheng-Chi Lee

, Min-Shiang Hwang, Jinn-Ke Jan:
Towards secure and efficient user authentication scheme using smart card for multi-server environments. 1008-1032 - Chi-Yao Weng, Yu Hong Zhang, Li Chun Lin, Shiuh-Jeng Wang:

Visible watermarking images in high quality of data hiding. 1033-1048 - Arash Nourian, Muthucumaru Maheswaran:

Privacy aware image template matching in clouds using ambient data. 1049-1070 - Binod Vaidya, Dimitrios Makrakis, Hussein T. Mouftah:

Secure and robust multipath routings for advanced metering infrastructure. 1071-1092 - Ya-Ting Chang, Cheng-Ta Huang

, Chin-Feng Lee, Shiuh-Jeng Wang:
Image interpolating based data hiding in conjunction with pixel-shifting of histogram. 1093-1110 - Hsing-Chung Chen, Marsha Anjanette Violetta, Cheng-Ying Yang:

Contract RBAC in cloud computing. 1111-1131
Volume 66, Number 3, December 2013
- Hai Jin, Guofu Xiang, Deqing Zou, Song Wu, Feng Zhao, Min Li, Weide Zheng:

A VMM-based intrusion prevention system in cloud computing environment. 1133-1151 - Xuanhua Shi, Hai Jin, Song Wu, Wei Zhu, Li Qi:

Adapting grid computing environments dependable with virtual machines: design, implementation, and evaluations. 1152-1166 - Ming Zhong, Yaoxue Zhang, Yuezhi Zhou, Laurence Tianruo Yang, Pengwei Tian, Linkai Weng:

A novel component retrieval method based on weighted facet tree. 1167-1177 - Lizhe Wang

, Tobias Kurze, Jie Tao, Marcel Kunze, Gregor von Laszewski
:
On-demand service hosting on production grid infrastructures. 1178-1193 - Joon-Min Gil, Jong Hyuk Park, Young-Sik Jeong:

Data center selection based on neuro-fuzzy inference systems in cloud computing environments. 1194-1214 - Haijun Cao, Hai Jin, Song Wu, Shadi Ibrahim:

Petri net based Grid workflow verification and optimization. 1215-1230 - David Allenotor, Ruppa K. Thulasiram:

A fuzzy Grid-QoS framework for obtaining higher grid resources availability. 1231-1242 - Zhiyong Tan, Duo Liu, Xuejun Zhuo, Yiqi Dai, Laurence T. Yang:

Implementation and performance analysis of multilevel security system in pervasive computing environment. 1243-1259 - Zhiming Ding, Jiajie Xu, Qi Yang:

SeaCloudDM: a database cluster framework for managing and querying massive heterogeneous sensor sampling data. 1260-1284 - Ming Yang, Junzhou Luo, Lu Zhang, Xiaogang Wang, Xinwen Fu

:
How to block Tor's hidden bridges: detecting methods and countermeasures. 1285-1305 - Jiang Liu

, Mianxiong Dong
, Laurence T. Yang, Shigeru Shimamoto:
A subcarrier modulation based optical wireless communication system employing transmission diversity. 1306-1319 - Weetit Wanalertlak, Ben Lee, Chansu Yu, Myungchul Kim, Seung-Min Park, Wontae Kim:

Scanless fast handoff technique based on global Path-Cache for WLANs. 1320-1349 - Sepideh Adabi

, Ali Movaghar
, Amir Masoud Rahmani
, Hamid Beigy
:
Negotiation strategies considering market, time and behavior functions for resource allocation in computational grid. 1350-1389 - Joon S. Park, Pratheep Chandramohan, Avinash T. Suresh, Joseph Giordano, Kevin A. Kwiat:

Component survivability at runtime for mission-critical distributed systems. 1390-1417 - Hu Guan, Huakang Li, Cheng-Zhong Xu

, Minyi Guo:
Semi-sparse algorithm based on multi-layer optimization for recommender system. 1418-1437
- Alberto Cano

, José María Luna
, Sebastián Ventura
:
High performance evaluation of evolutionary-mined association rules on GPUs. 1438-1461 - Fei Cao, Mengxia Michelle Zhu:

Distributed workflow mapping algorithm for maximized reliability under end-to-end delay constraint. 1462-1488 - Shin Gyu Kim, Hyeonsang Eom, Heon Y. Yeom:

Virtual machine consolidation based on interference modeling. 1489-1506 - Ben Akram Ahmed

, Abderazek Ben Abdallah
:
Architecture and design of high-throughput, low-latency, and fault-tolerant routing algorithm for 3D-network-on-chip (3D-NoC). 1507-1532 - Hosein Mohamadi, Abdul Samad Ismail, Shaharuddin Salleh

, Ali Nodhei:
Learning automata-based algorithms for finding cover sets in wireless sensor networks. 1533-1552 - Yunliang Chen, Dan Chen, Samee Ullah Khan

, Jianzhong Huang, Changsheng Xie:
Solving symbolic regression problems with uniform design-aided gene expression programming. 1553-1575 - David L. González-Álvarez, Miguel A. Vega-Rodríguez

:
A parallel cooperative team of multiobjective evolutionary algorithms for motif discovery. 1576-1612 - Dongwoo Lee, Inhyuk Kim, Jee-hong Kim, Hyung Kook Jun, Wontae Kim, Sang-Won Lee, Young Ik Eom:

Light-weight kernel instrumentation framework using dynamic binary translation. 1613-1628 - Jinkyu Jeong

, Sung-hun Kim, Hwanju Kim, Joonwon Lee, Euiseong Seo:
Analysis of virtual machine live-migration as a method for power-capping. 1629-1655 - Guoqiang Gao, Ruixuan Li, Weijun Xiao, Zhiyong Xu:

Measurement study on P2P streaming systems. 1656-1686 - Abdul Nasir Khan, Miss Laiha Mat Kiah

, Sajjad Ahmad Madani
, Atta ur Rehman Khan
, Mazhar Ali
:
Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing. 1687-1706 - Hossein Amir, Hadi Shahriar Shahhoseini

:
Improving CompactMatrix phase in gang scheduling by changing transference condition and utilizing exchange. 1707-1728 - Biao Song, Wei Tang, Tien-Dung Nguyen, Mohammad Mehedi Hassan, Eui-Nam Huh:

An optimized hybrid remote display protocol using GPU-assisted M-JPEG encoding and novel high-motion detection algorithm. 1729-1748 - Romil Barthwal, Sudip Misra, Mohammad S. Obaidat

:
Finding overlapping communities in a complex network of social linkages and Internet of things. 1749-1772 - Wenhong Tian, Qin Xiong, Jun Cao:

An online parallel scheduling method with application to energy-efficiency in cloud computing. 1773-1790

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














