default search action
International Journal of Computational Science and Engineering, Volume 16
Volume 16, Number 1, 2018
- Tong Zhang, Hongjun Dai, Changsong Wu, Zhiping Jia:
Enhancing the performance of process level redundancy with coprocessors in symmetric multiprocessors. 1-8 - Christian Callegari, Lisa Donatini, Stefano Giordano, Michele Pagano:
Improving stability of PCA-based network anomaly detection by means of kernel-PCA. 9-16 - Antonio Prado, Sushmita Ruj, Milos Stojmenovic, Amiya Nayak:
Applying transmission-coverage algorithms for secure geocasting in VANETs. 17-26 - Anupam Biswas, Bhaskar Biswas, Anoj Kumar, K. K. Mishra:
Particle swarm optimisation with time varying cognitive avoidance component. 27-41 - Yanli Lv, Yuanlong Li, Shuang Xiang, Chunhe Xia:
Coordinated scan detection algorithm based on the global characteristics of time sequence. 42-52 - Hui Zeng, Liyan Xiong, Jianjun Chen:
The intensional semantic conceptual graph matching algorithm based on conceptual sub-graph weight self-adjustment. 53-62 - Xiao Wei, Daniel Dajun Zeng, Xiangfeng Luo, Wei Wu:
Building a large-scale testing dataset for conceptual semantic annotation of text. 63-72 - Jiongming Jiang, Yu Xue, Tinghuai Ma, Zhongyang Chen:
Improved artificial bee colony algorithm with differential evolution for the numerical optimisation problems. 73-84 - Hong Zhang, Quan-ju Zhang:
A study of cooperative advertising in a one-manufacturer two-retailer supply chain based on the multi-stage dynamic game theory. 85-97 - Yuhui Zheng, Kai Ma, Shunfeng Wang, Jing Sun, Jianwei Zhang:
Line integral convolution-based non-local structure tensor. 98-105
Volume 16, Number 2, 2018
- Guangping Xu, Qunfang Mao, Huan Li, Shengli Li:
Towards optimisation of replicated erasure codes for efficient cooperative repair in cloud storage systems. 108-116 - Lei Shi, Qiguo Duan, Ping Dong, Lei Xi, Xinming Ma:
Signal prediction based on boosting and decision stump. 117-122 - Junfeng Zhao, Jiantao Zhou, Hongji Yang:
A matching approach to business services and software services. 123-131 - Tingyi Zheng, Li Wang:
Using online dictionary learning to improve Bayer pattern image coding. 132-140 - Hongxia Deng, Han Li, Sha Chang, Jie Xu, Haifang Li:
Feature binding pulse-coupled neural network model using a double colour space. 141-152 - Yizhe Zhou, Depin Peng:
A new model of vehicular ad hoc networks based on artificial immune theory. 153-161 - Jonti Deuri, S. Siva Sathya:
Cricket chirping algorithm: an efficient meta-heuristic for numerical function optimisation. 162-172 - Juan Carlos Osorio, Miguel Cerrolaza, Maritza Perez:
Optimising the stiffness matrix integration of n-noded 3D finite elements. 173-180 - Hiroaki Yui, Satoshi Nishimura:
A cost effective graph-based partitioning algorithm for a system of linear equations. 181-190 - Wei Sun, Yang Yu, Jia Li:
A based-on-set-partitioning exact approach to multi-trip of picking up and delivering customers to airport. 191-201 - Liping Chen, Weitao Ha:
Reliability prediction and QoS selection for web service composition. 202-211
Volume 16, Number 3, 2018
- Weiwei Kong, Yang Lei, Jing Ma:
Data security and privacy information challenges in cloud computing. 215-218 - Angelo Chianese, Francesco Piccialli:
A perspective on applications of in-memory and associative approaches supporting cultural big data analytics. 219-233 - Dong-sheng Liu, Xiao-hong Xiao, Xiao-hui Zeng:
Load balancing algorithm based on multiple linear regression analysis in multi-agent systems. 234-241 - Liming Zheng, Xu An Wang, Xiaobo Tian, Xiaodong Li:
TERS: a traffic efficient repair scheme for repairing multiple losses in erasure-coded distributed storage systems. 242-254 - Yukun Dong:
A sound abstract memory model for static analysis of C programs. 255-264 - Angelo Chianese, Salvatore Cuomo, Pasquale De Michele, Francesco Piccialli:
Self and social network behaviours of users in cultural spaces. 265-281 - Minghui Zhang, Haiwei Pan, Niu Zhang, Xiaoqin Xie, Zhiqiang Zhang, Xiaoning Feng:
Cost-sensitive ensemble classification algorithm for medical image. 282-288 - Deng Chen, Yanduo Zhang, Wei Wei, Rongcun Wang, Huabing Zhou, Xun Li, Binbin Qu:
Mining balanced API protocols. 289-302 - Masoumeh Zareapoor, Pourya Shamsolmoali, Mohd. Afshar Alam:
Advance DDOS detection and mitigation technique for securing cloud. 303-310 - Wenjie Fan, Hong Zhang, Kuan-Ching Li, Shunxiang Zhang, Mario Donato Marino, Hai Jiang:
An efficient algorithm for modelling and dynamic prediction of network traffic. 311-320 - Wenjie Fan, Lifeng Li, Xiaowan Chen, Hai Jiang, Zhongwen Li, Kuan-Ching Li:
Deploying parallelised ciphertext-policy attributed-based encryption in clouds. 321-333
Volume 16, Number 4, 2018
- Weijie Zhao, Florin Rusu, Kesheng Wu, Peter Nugent:
Automatic identification and classification of Palomar Transient Factory astrophysical objects in GLADE. 337-349 - Punam Bedi, Sumit Kumar Agarwal, Richa:
Trust and reputation-based multi-agent recommender system. 350-362 - Shivani Batra, Shelly Sachdeva:
Anomaly free search using multi table entity attribute value data model. 363-377 - Asif Zaman, Mohammad Anisuzzaman Siddique, Annisa, Yasuhiko Morimoto:
Secure k-objects selection for a keyword query based on MapReduce skyline algorithm. 378-389 - Vinita Jindal, Punam Bedi:
High performance adaptive traffic control for efficient response in vehicular ad hoc networks. 390-400 - Wanming Chu:
Smart city workflow patterns for qualitative aggregate information retrieval from distributed public information resources. 401-410 - Lukas Pichl, Taisei Kaizoji:
Computational intelligence methods for data mining of causality extent in the time series. 411-418 - Miguel Ceriani, Paolo Bottoni:
A dataflow platform for applications based on Linked Data. 419-429 - Qing Wu, Chunjiang Zhang, Liang Gao:
A modified electromagnetism-like mechanism algorithm with pattern search for global optimisation. 430-440 - Xiaoyi Yang, Meijuan Huang:
Zero knowledge proof for secure two-party computation with malicious adversaries in distributed networks. 441-450
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.