default search action
International Journal of Grid and Utility Computing, Volume 10
Volume 10, Number 1, 2019
- Azmi Alazzam, Ban Al-Omar:
Educational data modelling using curve fitting and average uniform algorithm. 3-9 - Sheeraz Ahmed, Muhammad Ayub Khan, Atif Ishtiaq, Zahoor Ali Khan, Malik Taimur Ali:
Energy harvesting techniques for routing issues in wireless sensor networks. 10-21 - Belsam Attallah, Zakea Il-agure:
Evaluating the affordances of wearable technology in education. 22-28 - Andrews Samraj, Ramesh Kumarasamy, Kalvina Rajendran, Karthik Selvaraj:
High-speed gesture modelling through boundary analysis of active signals from wearable data glove. 29-35 - Zakea Il-agure, Belsam Attallah:
How mutual information interprets anomalies using different clustering. 36-41 - Maher Salem, Khalid Samara, Mohammed Saeed Aldhaheri:
A novel integrated framework for securing online instructor-student communication. 42-52 - Khaoula Tabet, Riad Mokadem, Mohamed Ridda Laouar:
A data replication strategy for document-oriented NoSQL systems. 53-62 - Stig Bosmans, Glenn Maricaux, Filip Van der Schueren, Peter Hellinckx:
Cost-aware hybrid cloud scheduling of parameter sweep calculations using predictive algorithms. 63-75 - Rodrigo da Rosa Righi, Vinicius Facco Rodrigues, Igor Fontana De Nardin, Cristiano André da Costa, Marco Antonio Zanata Alves, Maurício Aronne Pillon:
Towards providing middleware-level proactive resource reorganisation for elastic HPC applications in the cloud. 76-92
Volume 10, Number 2, 2019
- Manel Medhioub, Mohamed Hamdi:
An identity-based cryptographic scheme for cloud storage applications. 93-104 - Thomas Huybrechts, Yorick De Bock, Haoxuan Li, Peter Hellinckx:
COBRA-HPA: a block generating tool to perform hybrid program analysis. 105-118 - Xiurong Chen, Yixiang Tian:
The big data mining forecasting model based on combination of improved manifold learning and deep learning. 119-131 - Haoxuan Li, Paul De Meulenaere, Siegfried Mercelis, Peter Hellinckx:
Impact of software architecture on execution time: a power window TACLeBench case study. 132-140 - Fatma Masmoudi, Mohamed Sellami, Monia Loulou, Ahmed Hadj Kacem:
Accountability management for multi-tenant cloud services. 141-158 - Silvio Pardi, Guido Russo:
A Big Data approach for multi-experiment data management. 159-167 - Kosuke Ozera, Takaaki Inaba, Kevin Bylykbashi, Shinji Sakamoto, Makoto Ikeda, Leonard Barolli:
A WLAN triage testbed based on fuzzy logic and its performance evaluation for different number of clients and throughput parameter. 168-178 - Akash Punhani, Pardeep Kumar, Nitin:
E-XY: an entropy based XY routing algorithm. 179-186 - Felipe Volpato, Madalena Pereira da Silva, Mário Antônio Ribeiro Dantas:
OFQuality: a quality of service management module for software-defined networking. 187-198
Volume 10, Number 3, 2019
- Joao Vicente Ferreira Lima, Daniel Di Domenico:
HPSM: a programming framework to exploit multi-CPU and multi-GPU systems simultaneously. 201-211 - Alexandre Solon Nery, Alexandre da Costa Sena, Leandro Soares Guedes:
An efficient pathfinding system in FPGA for edge/fog computing. 212-223 - Bruno Marques, Igor Machado Coelho, Alexandre da Costa Sena, Maria Clicia Stelling de Castro:
A network coding protocol for wireless sensor fog computing. 224-234 - Caio B. G. Carvalho, Victor da Cruz Ferreira, Felipe M. G. França, Cristiana B. Bentes, Gabriele Mencagli, Tiago A. O. Alves, Alexandre da Costa Sena, Leandro A. J. Marzulo:
A dataflow runtime environment and static scheduler for edge, fog and in-situ computing. 235-247 - Marcos Paulo Rocha, Felipe M. G. França, Alexandre Solon Nery, Leandro Soares Guedes:
An optimised dataflow engine for GPGPU stream processing. 248-257 - Hiroki Sakaji, Masaki Kohana, Akio Kobayashi, Hiroyuki Sakai:
Enriching folksonomy for online videos. 258-264 - Masaki Kohana, Shusuke Okamoto:
A web platform for oral exam of programming class. 265-271 - David Guyon, Anne-Cécile Orgerie, Christine Morin, Deborah A. Agarwal:
Involving users in energy conservation: a case study in scientific clouds. 272-282 - Ilias K. Savvas, Dimitrios C. Tselios, Georgia Garani:
Distributed and multi-core version of k-means algorithm. 283-291
Volume 10, Number 4, 2019
- Chaitanya Pavan Tanay Kondapalli, Srikanth Khanna, Venkatachalam Chandrasekaran, Pallav Kumar Baruah, Diwakar Kartheek Pingali, Sai Hareesh Anamandra:
GPU accelerated video super resolution using transformed spatio-temporal exemplars. 295-307 - Anita Choudhary, Mahesh Chandra Govil, Girdhari Singh, Lalit Kumar Awasthi, Emmanuel S. Pilli:
Energy-efficient fuzzy-based approach for dynamic virtual machine consolidation. 308-325 - Xianghu Wu, Mingcheng Qu, Yongchao Tao, Guannan Wang, Ziyu Dong:
A novel test case generation method based on program structure diagram. 326-333 - Yubiao Wang, Junhao Wen, Quanwang Wu, Lei Guo, Bamei Tao:
A dynamic cloud service selection model based on trust and SLA in cloud computing. 334-343 - Roberta Calegari, Enrico Denti, Stefano Mariani, Andrea Omicini:
Logic programming as a service in multi-agent systems for the Internet of Things. 344-360 - Satyapal Singh, Mohan Kubendiran, Arun Kumar Sangaiah:
A review on intrusion detection approaches in cloud security systems. 361-374 - Philip Moore, Hai Van Pham:
A fog computing model for pervasive connected healthcare in smart environments. 375-391 - Nelson L. Santos, Salvatore Lentini, Enrico Grosso, Bogdan V. Ghita, Giovanni Luca Masala:
Performance analysis of data fragmentation techniques on a cloud server. 392-401 - Olga Datskova, Wedong Shi:
Large-scale data processing software and performance instabilities within HEP grid environments. 402-414 - Abeer E. W. Eldewahi, Alzubair Hassan, Khalid Elbadawi, Bazara I. A. Barry:
The analysis of man at the end attack behaviour in software defined network. 415-421 - Xuan Guo, Fei Xu, Zhiting Xiao, Hongguo Yuan, Xiaoyuan Yang:
Winning the war on terror: using social networking tools and GTD to analyse the regularity of terrorism activities. 422-437
Volume 10, Number 5, 2019
- Walaa Hassan Elashmawi, Ahmed Fouad Ali:
An enhanced Jaya algorithm for solving nurse scheduling problem. 439-447 - Hesham M. Elmasry, Ayman E. Khedr, Mona M. Nasr:
An adaptive technique for cost reduction in cloud data centre environment. 448-464 - Mahdieh Izadpanahkakhk, Seyyed Mohammad Razavi, Mehran Taghipour-Gorjikolaie, Seyyed Hamid Zahiri, Aurelio Uncini:
Novel mobile palmprint databases for biometric authentication. 465-474 - Lamia Nabil Omran, Kadry Ali Ezzat, Alaa Bayoumi, Ashraf Darwish, Aboul Ella Hassanien:
IoT-based intensive care secure framework for patient monitoring and tracking. 475-487 - Mayur Rahul, Narendra Kohli, Rashi Agarwal, Sanju Mishra:
Facial expression recognition using geometric features and modified hidden Markov model. 488-496 - Kamaleddin Yaghoobirafi, Eslam Nazemi:
An autonomic mechanism based on ant colony pattern for detecting the source of incidents in complex enterprise systems. 497-511 - Samaher Al-Janabi, Muhammed Abaid Mahdi:
Evaluation prediction techniques to achievement an optimal biomedical analysis. 512-527 - Mala Kalra, Sarbjeet Singh:
An intelligent water drops-based approach for workflow scheduling with balanced resource utilisation in cloud computing. 528-544 - Tomoya Enokido, Dilawaer Duolikun, Makoto Takizawa:
The energy consumption laxity-based algorithm to perform computation processes in virtual machine environments. 545-555 - Cunlin Li, Ming Li:
A new bi-matrix game model with fuzzy payoffs in credibility space. 556-563 - Toshinobu Hayashi, Shinji Sugawara:
An efficient content sharing scheme using file splitting and differences between versions in hybrid peer-to-peer networks. 564-573 - Tsukasa Kudo:
Fog computing with original data reference function. 574-582
Volume 10, Number 6, 2019
- Giovanni Morana, Rao Mikkilineni, Surendra Keshan:
Cognitive workload management on globally interoperable network of clouds. 586-592 - Benedikt Pittl, Irfan Ul Haq, Werner Mach, Erich Schikuta:
Towards autonomous creation of service chains on cloud markets. 593-606 - Erick Barros Nascimento, Edward David Moreno, Douglas Dyllon Jeronimo de Macedo:
Cache replication for information-centric networks through programmable networks. 607-617 - Paul Moggridge, Na Helian, Yi Sun, Mariana Lilley, Vito Veneziano, Martin Eaves:
Improving the MXFT scheduling algorithm for a cloud computing context. 618-638 - Valentina Casola, Alessandra De Benedictis, Massimiliano Rak, Umberto Villano, Erkuden Rios, Angel Rego, Giancarlo Capone:
Model-based deployment of secure multi-cloud applications. 639-653 - Mohamed Mehdi Kandi, Shaoyi Yin, Abdelkader Hameurlain:
Resource auto-scaling for SQL-like queries in the cloud based on parallel reinforcement learning. 654-671 - Chunfen Xu:
Data analysis of CSI 800 industry index by using factor analysis model. 672-680 - Demis Gomes, Glauco Estácio Gonçalves, Patricia Takako Endo, Moisés Rodrigues, Judith Kelner, Djamel Sadok, Calin Curescu:
Don't lose the point, check it: Is your cloud application using the right strategy? 681-693 - Antonella Longo, Marco Zappatore, Mario A. Bochicchio:
A cloud-based approach to dynamically manage service contracts for local public transportation. 694-707 - Anderson Schwede Raugust, Wilton Jaciel Loch, Felipe Rodrigo de Souza, Maurício Aronne Pillon, Charles Christian Miers, Guilherme Piêgas Koslovski:
Towards to virtual infrastructure allocation on multiple IaaS providers with survivability and reliability requirements. 708-723
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.