


default search action
The Journal of Supercomputing, Volume 67
Volume 67, Number 1, January 2014
- Ehsan Mousavi Khaneghah
, Mohsen Sharifi
:
AMRC: an algebraic model for reconfiguration of high performance cluster computing systems at runtime. 1-30 - Hadi Shahriar Shahhoseini
, Ehsan Saleh Kandzi, Morteza Mollajafari
:
Nonflat surface level pyramid: a high connectivity multidimensional interconnection network. 31-46 - Dominic D. J. Chandar
, Jayanarayanan Sitaraman, Dimitri J. Mavriplis:
CU++: an object oriented framework for computational fluid dynamics applications using graphics processing units. 47-68 - Mohsen Ziaee:
A heuristic algorithm for the distributed and flexible job-shop scheduling problem. 69-83 - Muhammad Shiraz, Ejaz Ahmed, Abdullah Gani
, Qi Han:
Investigation on runtime partitioning of elastic mobile applications for mobile cloud computing. 84-103 - Ali Azarpeyvand
, Mostafa E. Salehi
, Sied Mehdi Fakhraie:
An analytical method for reliability aware instruction set extension. 104-130 - Daniel Gutiérrez-Reina, Sergio L. Toral Marín, Princy Johnson
, Federico Barrero
:
Improving discovery phase of reactive ad hoc routing protocols using Jaccard distance. 131-152 - Haifeng Wang
, Qingkui Chen:
Optimization power consumption model of reliability-aware GPU clusters. 153-174 - Sahar Adabi
, Ali Movaghar
, Amir Masoud Rahmani
:
Bi-level fuzzy based advanced reservation of Cloud workflow applications on distributed Grid resources. 175-218 - Daji Ergu, Yi Peng:
A framework for SaaS software packages evaluation and selection with virtual team and BOCR of analytic network process. 219-238 - Abderezak Touzene:
A new parallel algorithm for solving large-scale Markov chains. 239-253 - Chao Yu, Leihua Qin, Jingli Zhou:
A multicore periodical preemption virtual machine scheduling scheme to improve the performance of computational tasks. 254-276 - Youngjae Kim, Aayush Gupta, Bhuvan Urgaonkar, Piotr Berman, Anand Sivasubramaniam:
HybridPlan: a capacity planning technique for projecting storage requirements in hybrid storage systems. 277-303
Volume 67, Number 2, February 2014
- Kuei-Chung Chang, Chen-Yu Chen, Chin-Sheng Yu, Ching-Wen Chen:
Supporting faulty banks in NUCA by NoC assisted remapping mechanisms. 305-323 - Erhan Okuyan, Ugur Güdükbay:
Direct volume rendering of unstructured tetrahedral meshes using CUDA and OpenMP. 324-344 - Ali Rezaee
, Amir Masoud Rahmani
, Ali Movaghar
, Mohammad Teshnehlab:
Formal process algebraic modeling, verification, and analysis of an abstract Fuzzy Inference Cloud Service. 345-383 - Christos K. Filelis-Papadopoulos
, George A. Gravvanis:
Parallel multigrid algorithms based on generic approximate sparse inverses: an SMP approach. 384-407 - Hyebong Choi, Kyong-Ha Lee
, Yoon-Joon Lee:
Parallel labeling of massive XML data with MapReduce. 408-437 - G. G. Md. Nawaz Ali, Edward Chan, Wenzhong Li:
On scheduling data access with cooperative load balancing in vehicular ad hoc networks (VANETs). 438-468 - Sung-Hoon Park, Seon-Hyong Lee:
Quorum-based mutual exclusion in asynchronous distributed systems with unreliable failure detectors. 469-484 - Antoine Bossard, Keiichi Kaneko
:
k-pairwise disjoint paths routing in perfect hierarchical hypercubes. 485-495 - Somayeh Kianpisheh
, Nasrollah Moghaddam Charkari
:
A grid workflow Quality-of-Service estimation based on resource availability prediction. 496-527 - Kyle E. Niemeyer
, Chih-Jen Sung
:
Recent progress and challenges in exploiting graphics processors in computational fluid dynamics. 528-564 - Abdorreza Savadi
, Hossein Deldari:
Measurement of the latency parameters of the Multi-BSP model: a multicore benchmarking approach. 565-584 - Inderpreet Chopra, Maninder Singh
:
SHAPE - an approach for self-healing and self-protection in complex distributed networks. 585-613
Volume 67, Number 3, March 2014
- Jeong-Soo Park, KiSeok Bae, YongJe Choi, Dooho Choi
, Jae-Cheol Ha:
A fault-resistant implementation of AES using differential bytes between input and output. 615-634 - Yi-Li Huang, Fang-Yie Leu, Ilsun You, Yao-Kuo Sun, William Cheng-Chung Chu:
A secure wireless communication system integrating RSA, Diffie-Hellman PKDS, intelligent protection-key chains and a Data Connection Core in a 4G environment. 635-652 - Guangwei Xu, Cheng Shao
, Yu Han, Kangbin Yim:
New quasi-Newton iterative learning control scheme based on rank-one update for nonlinear systems. 653-670 - Haibo Tian, Xiaofeng Chen, Willy Susilo
:
Deniability and forward secrecy of one-round authenticated key exchange. 671-690 - Aniello Castiglione
, Luigi Catuogno
, Aniello Del Sorbo, Ugo Fiore
, Francesco Palmieri
:
A secure file sharing service for distributed computing environments. 691-710 - Chang Choi
, Junho Choi, Pankoo Kim:
Ontology-based access control model for security policy reasoning in cloud computing. 711-722 - Yuhua Liu, Jianzhi Jin, Yi Zhang, Cui Xu:
A new clustering algorithm based on data field in complex networks. 723-737 - Chanhee Lee, Jonghwa Kim, Seong-je Cho, Jongmoo Choi, Yeongung Park:
Unified security enhancement framework for the Android operating system. 738-756 - Jang Ho Lee:
Grid-based recording and replay architecture in hybrid remote experiment using distributed streaming network. 757-777 - Bin Liu, Yingliang Zhao, Yuxiang Li, Yanjun Sun, Boqin Feng:
A thread partitioning approach for speculative multithreading. 778-805 - Zhu-Qing Jiao, Ling Zou, Yin Cao, Nong Qian, Zhenghua Ma:
Effective connectivity analysis of fMRI data based on network motifs. 806-819 - Ho-Seok Kang, Sung-Ryul Kim:
sShield: small DDoS defense system using RIP-based traffic deflection in autonomous system. 820-836 - Cesar O. Diaz, Johnatan E. Pecero
, Pascal Bouvry
:
Scalable, low complexity, and fast greedy scheduling heuristics for highly heterogeneous distributed computing systems. 837-853 - Chenghua Li, Man Lin, Laurence T. Yang, Chen Ding:
Integrating the enriched feature with machine learning algorithms for human movement and fall detection. 854-865

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.