


default search action
Journal of Computational Science, Volume 22
Volume 22, September 2017
- David Chalupa, Christian Blum

:
Mining k-reachable sets in real-world networks using domination in shortcut graphs. 1-14 - Saad Alowayyed, Derek Groen, Peter V. Coveney, Alfons G. Hoekstra:

Multiscale computing in the exascale era. 15-25 - Pablo Rabanal

, Ismael Rodríguez
, Fernando Rubio
:
Applications of river formation dynamics. 26-35 - Faryad Darabi Sahneh, Aram Vajdi, Heman Shakeri, Futing Fan, Caterina M. Scoglio

:
GEMFsim: A stochastic simulator for the generalized epidemic modeling framework. 36-44 - Byron E. Moutafis, Christos K. Filelis-Papadopoulos

, George A. Gravvanis:
Parallel multi-projection preconditioned methods based on semi-aggregation techniques. 45-54 - Debashis De

, Jadav Chandra Das:
Design of novel carry save adder using quantum dot-cellular automata. 54-68 - Oluwole K. Oyebamiji

, Darren J. Wilkinson
, Pahala Gedara Jayathilake
, Thomas P. Curtis
, S. P. Rushton, Bowen Li, P. Gupta:
Gaussian process emulation of an individual-based model simulation of microbial communities. 69-84 - Mete Celik

, Ahmet Sakir Dokuz
:
Discovering socio-spatio-temporal important locations of social media users. 85-98 - Fabio Verbosio

, Arne De Coninck, Drosos Kourounis, Olaf Schenk
:
Enhancing the scalability of selected inversion factorization algorithms in genomic prediction. 99-108 - Bijil Prakash

, Amit Setia
, Deepak Alapatt:
Numerical solution of nonlinear fractional SEIR epidemic model by using Haar wavelets. 109-118 - Yi-Kuei Lin, Shin-Guang Chen:

A maximal flow method to search for d-MPs in stochastic-flow networks. 119-125
- Mauro Iacono, Marco Gribaudo

, Joanna Kolodziej, Florin Pop:
Modeling and evaluation of highly complex computer systems architectures. 126-130 - Dimitrios Tychalas, Helen D. Karatza

:
High performance system based on Cloud and beyond: Jungle Computing. 131-147 - Pang-Wei Tsai, Francesco Piccialli

, Chun-Wei Tsai, Mon-Yen Luo, Chu-Sing Yang:
Control frameworks in network emulation testbeds: A survey. 148-161 - Ugo Fiore

, Paolo Zanetti
, Francesco Palmieri, Francesca Perla
:
Traffic matrix estimation with software-defined NFV: Challenges and opportunities. 162-170 - Dae-Young Kim

, Seokhoon Kim
, Houcine Hassan, Jong Hyuk Park:
Adaptive data rate control in low power wide area networks for long range IoT services. 171-178 - Massimo Ficco

, Michal Choras, Rafal Kozik
:
Simulation platform for cyber-security and vulnerability analysis of critical infrastructures. 179-186 - Ewa Niewiadomska-Szynkiewicz, Adam Kozakiewicz:

Design and evaluation of a system for network threat signatures generation. 187-197 - Grazyna Suchacka

, Daria Wotzka
:
Modeling a non-stationary bots' arrival process at an e-commerce Web site. 198-208 - Jacek M. Czerniak

, Hubert Zarzycki
:
Artificial Acari Optimization as a new strategy for global optimization of multimodal functions. 209-227 - Salvatore Cuomo

, Pasquale De Michele
, Ardelio Galletti
, Livia Marcellino
:
A parallel PDE-based numerical algorithm for computing the Optical Flow in hybrid systems. 228-236
- Boucif Amar Bensaber, Luca Foschini

:
Performance evaluation of communications in distributed systems and web based service architectures. 237-239 - Robertas Damasevicius, Christian Napoli

, Tatjana Sidekerskiene
, Marcin Wozniak
:
IMF mode demixing in EMD for jitter analysis. 240-252 - Walid Serrai

, Abdelkrim Abdelli
, Lynda Mokdad, Youcef Hammal
:
Towards an efficient and a more accurate web service selection using MCDM methods. 253-267 - Carlos Ferreira

, Susana Sargento
, Arnaldo S. R. Oliveira
:
An architecture for a learning-based autonomic decision system. 268-282 - Hacène Fouchal

, Emilien Bourdy, Geoffrey Wilhelm, Marwane Ayaida:
A validation tool for cooperative intelligent transport systems. 283-288 - Hyunbum Kim, Jalel Ben-Othman

, Paolo Bellavista
:
Collision-free reinforced barriers in UAV networks. 289-300 - Yasuyuki Tanaka, Mitsuaki Akiyama, Atsuhiro Goto:

Analysis of malware download sites by focusing on time series variation of malware. 301-313

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














