![](https://dblp.org/img/logo.ua.320x120.png)
![](https://dblp.org/img/dropdown.dark.16x16.png)
![](https://dblp.org/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.org/img/search.dark.16x16.png)
![search dblp](https://dblp.org/img/search.dark.16x16.png)
default search action
Future Generation Computer Systems, Volume 72
Volume 72, July 2017
- Yuzhu Wang, Jinrong Jiang, He Zhang, Xiao Dong
, Lizhe Wang
, Rajiv Ranjan
, Albert Y. Zomaya
:
A scalable parallel algorithm for atmospheric general circulation models on a multi-core cluster. 1-10 - Simon Scheider
, Frank O. Ostermann
, Benjamin Adams:
Why good data analysts need to be critical synthesists. Determining the role of semantics in data analysis. 11-22 - R. Vidhyalakshmi, Vikas Kumar
:
CORE framework for evaluating the reliability of SaaS products. 23-36 - John K. Tarus, Zhendong Niu
, Abdallah Yousif:
A hybrid knowledge-based recommender system for e-learning based on ontology and sequential pattern mining. 37-48 - Hyunwoo Joe, Jungseok Kim, Jemin Lee, Hyungshin Kim
:
Output-oriented power saving mode for mobile devices. 49-64 - Sarunya Pumma, Wu-chun Feng, Phond Phunchongharn, Sylvain Chapeland, Tiranee Achalakul:
A runtime estimation framework for ALICE. 65-77
- Daniel S. Katz
, Xiaobo Zhou:
Leading-edge research in cluster, cloud, and grid computing: Best papers from the IEEE/ACM CCGrid 2015 conference. 78-80 - Andrej Podzimek, Lubomír Bulej
, Lydia Y. Chen, Walter Binder
, Petr Tuma
:
Reprint of "Robust partial-load experiments with Showstopper". 81-104 - Zhe Zhang, Brian Bockelman
, Dale W. Carder
, Todd Tannenbaum:
Lark: An effective approach for software-defined networking in high throughput computing clusters. 105-117 - Umesh Deshpande
, Kate Keahey:
Traffic-sensitive Live Migration of Virtual Machines. 118-128 - Christine Bassem
, Azer Bestavros
:
Multi-Capacity Bin Packing with Dependent Items and its Application to the Packing of Brokered Workloads in Virtualized Environments. 129-144 - Feroz Zahid
, Ernst Gunnar Gran, Bartosz Bogdanski, Bjørn Dag Johnsen, Tor Skeie:
Efficient network isolation and load balancing in multi-tenant HPC clusters. 145-162
- Teodor-Florin Fortis
, Victor Ion Munteanu:
Topics in cloud incident management. 163-164 - Giovanni Toffetti, Sandro Brunner, Martin Blöchlinger, Josef Spillner
, Thomas Michael Bohnert:
Self-managing cloud-native applications: Design, implementation, and experience. 165-179 - Alexandru Sirbu, Cristian Pop, Cristina Serbanescu, Florin Pop
:
Predicting provisioning and booting times in a Metal-as-a-service system. 180-192 - Rubén Trapero, Jolanda Modic
, Miha Stopar, Ahmed Taha, Neeraj Suri
:
A novel approach to manage cloud security SLA incidents. 193-205
- Qin Liu, Avinash Srinivasan, Jiankun Hu
, Guojun Wang:
Preface: Security and privacy in big data clouds. 206-207 - Zuojie Deng, Kenli Li, Keqin Li, Jingli Zhou:
A multi-user searchable encryption scheme with keyword authorization in a cloud storage. 208-218 - Guangwu Hu, Wenlong Chen, Qi Li, Yong Jiang, Ke Xu:
TrueID: A practical solution to enhance Internet accountability by assigning packets with creditable user identity code. 219-226 - Shiwen Zhang, Qin Liu, Yaping Lin:
Anonymizing popularity in online social networks with full utility. 227-238 - Qinlong Huang, Yixian Yang, Mansuo Shen:
Secure and efficient data collaboration with hierarchical attribute-based encryption in cloud computing. 239-249 - Kalpana Singh
, Lynn Batten:
Aggregating privatized medical data for secure querying applications. 250-263 - Mei Wang, Meng Xiao, Sancheng Peng, Guohua Liu:
A hybrid index for temporal big data. 264-272 - Mehdi Sookhak
, F. Richard Yu
, Muhammad Khurram Khan
, Yang Xiang, Rajkumar Buyya:
Attribute-based data access control in mobile cloud computing: Taxonomy and open issues. 273-287 - Arezou Soltani Panah
, Ron G. van Schyndel, Timos Sellis
:
Towards an asynchronous aggregation-capable watermark for end-to-end protection of big data streams. 288-304 - Lifang Zhang, Zheng Yan
, Raimo Kantola:
Privacy-preserving trust management for unwanted traffic control. 305-318 - Chao Chen, Sheng Wen
, Jun Zhang
, Yang Xiang, Jonathan J. Oliver, Abdulhameed Alelaiwi, Mohammad Mehedi Hassan:
Investigating the deceptive information in Twitter spam. 319-326 - Vu Mai, Ibrahim Khalil
:
Design and implementation of a secure cloud-based billing model for smart meters as an Internet of things using homomorphic cryptography. 327-338 - Farzana Rahman, Md. Zakirul Alam Bhuiyan
, Sheikh Iqbal Ahamed:
A privacy preserving framework for RFID based healthcare systems. 339-352
![](https://dblp.org/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.