callback( { "result":{ "query":":facetid:toc:\"db/journals/concurrency/concurrency26.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"74.54" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"179", "@dc":"179", "@oc":"179", "@id":"43443686", "text":":facetid:toc:db/journals/concurrency/concurrency26.bht" } }, "hits":{ "@total":"179", "@computed":"179", "@sent":"179", "@first":"0", "hit":[{ "@score":"1", "@id":"3717636", "info":{"authors":{"author":[{"@pid":"13/7435","text":"Lokman A. Abbas-Turki"},{"@pid":"39/4045","text":"Stéphane Vialle"},{"@pid":"37/7437","text":"Bernard Lapeyre"},{"@pid":"23/5937","text":"Patrick P. Mercier"}]},"title":"Pricing derivatives on graphics processing units using Monte Carlo simulation.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"9","pages":"1679-1697","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/Abbas-TurkiVLM14","doi":"10.1002/CPE.2862","ee":"https://doi.org/10.1002/cpe.2862","url":"https://dblp.org/rec/journals/concurrency/Abbas-TurkiVLM14"}, "url":"URL#3717636" }, { "@score":"1", "@id":"3717637", "info":{"authors":{"author":[{"@pid":"130/9717","text":"Kiki Maulana Adhinugraha"},{"@pid":"t/DavidTaniar","text":"David Taniar"},{"@pid":"26/431","text":"Maria Indrawan"}]},"title":"Finding reverse nearest neighbors by region.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"5","pages":"1142-1156","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/AdhinugrahaTI14","doi":"10.1002/CPE.3056","ee":"https://doi.org/10.1002/cpe.3056","url":"https://dblp.org/rec/journals/concurrency/AdhinugrahaTI14"}, "url":"URL#3717637" }, { "@score":"1", "@id":"3717638", "info":{"authors":{"author":[{"@pid":"31/6942","text":"Linda Akli"},{"@pid":"132/7516","text":"Samuel L. Moore"},{"@pid":"132/7511","text":"Lorna I. Rivera"},{"@pid":"03/1997","text":"Patricia J. Teller"}]},"title":"Training, education, and outreach - raising the bar.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"13","pages":"2336-2343","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/AkliMRT14","doi":"10.1002/CPE.3230","ee":"https://doi.org/10.1002/cpe.3230","url":"https://dblp.org/rec/journals/concurrency/AkliMRT14"}, "url":"URL#3717638" }, { "@score":"1", "@id":"3717639", "info":{"authors":{"author":[{"@pid":"05/408","text":"Hasan Metin Aktulga"},{"@pid":"00/5867-1","text":"Chao Yang 0001"},{"@pid":"35/6295","text":"Esmond G. Ng"},{"@pid":"64/2008","text":"Pieter Maris"},{"@pid":"99/2743","text":"James P. Vary"}]},"title":"Improving the scalability of a symmetric iterative eigensolver for multi-core platforms.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"16","pages":"2631-2651","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/AktulgaYNMV14","doi":"10.1002/CPE.3129","ee":"https://doi.org/10.1002/cpe.3129","url":"https://dblp.org/rec/journals/concurrency/AktulgaYNMV14"}, "url":"URL#3717639" }, { "@score":"1", "@id":"3717640", "info":{"authors":{"author":[{"@pid":"75/5249","text":"Marco Aldinucci"},{"@pid":"86/3031","text":"Salvatore Ruggieri"},{"@pid":"97/4161","text":"Massimo Torquati"}]},"title":"Decision tree building on multi-core using FastFlow.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"3","pages":"800-820","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/AldinucciRT14","doi":"10.1002/CPE.3063","ee":"https://doi.org/10.1002/cpe.3063","url":"https://dblp.org/rec/journals/concurrency/AldinucciRT14"}, "url":"URL#3717640" }, { "@score":"1", "@id":"3717641", "info":{"authors":{"author":[{"@pid":"89/8296","text":"Pedro Alonso 0002"},{"@pid":"88/7977","text":"Manuel F. Dolz"},{"@pid":"88/501","text":"Francisco D. Igual"},{"@pid":"272/5869","text":"Rafael Mayo 0002"},{"@pid":"27/786","text":"Enrique S. Quintana-Ortí"}]},"title":"Enhancing performance and energy consumption of runtime schedulers for dense linear algebra.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"15","pages":"2591-2611","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/AlonsoDIMQ14","doi":"10.1002/CPE.3317","ee":"https://doi.org/10.1002/cpe.3317","url":"https://dblp.org/rec/journals/concurrency/AlonsoDIMQ14"}, "url":"URL#3717641" }, { "@score":"1", "@id":"3717642", "info":{"authors":{"author":[{"@pid":"89/8296","text":"Pedro Alonso 0002"},{"@pid":"88/7977","text":"Manuel F. Dolz"},{"@pid":"272/5869","text":"Rafael Mayo 0002"},{"@pid":"27/786","text":"Enrique S. Quintana-Ortí"}]},"title":"Modeling power and energy consumption of dense matrix factorizations on multicore processors.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"17","pages":"2743-2757","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/AlonsoDMQ14","doi":"10.1002/CPE.3162","ee":"https://doi.org/10.1002/cpe.3162","url":"https://dblp.org/rec/journals/concurrency/AlonsoDMQ14"}, "url":"URL#3717642" }, { "@score":"1", "@id":"3717643", "info":{"authors":{"author":[{"@pid":"a/JoseNelsonAmaral","text":"José N. Amaral 0001"},{"@pid":"f/AJField","text":"A. J. Field"}]},"title":"A special issue from the international conference on performance engineering 2013.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"12","pages":"1947-1948","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/AmaralF14","doi":"10.1002/CPE.3225","ee":"https://doi.org/10.1002/cpe.3225","url":"https://dblp.org/rec/journals/concurrency/AmaralF14"}, "url":"URL#3717643" }, { "@score":"1", "@id":"3717644", "info":{"authors":{"author":[{"@pid":"56/4960","text":"Cristina Arellano"},{"@pid":"151/7857","text":"Sergei F. Mingaleev"},{"@pid":"151/7859","text":"Eugene S. Sokolov"},{"@pid":"76/3735","text":"André Richter"}]},"title":"The power of circuit simulations for designing photonic integrated circuits.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"15","pages":"2518-2529","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/ArellanoMSR14","doi":"10.1002/CPE.3335","ee":"https://doi.org/10.1002/cpe.3335","url":"https://dblp.org/rec/journals/concurrency/ArellanoMSR14"}, "url":"URL#3717644" }, { "@score":"1", "@id":"3717645", "info":{"authors":{"author":[{"@pid":"55/7665","text":"Jamshaid Ashraf"},{"@pid":"40/3795","text":"Omar Khadeer Hussain"},{"@pid":"69/4056","text":"Farookh Khadeer Hussain"}]},"title":"Empirical analysis of domain ontology usage on the Web: eCommerce domain in focus.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"5","pages":"1157-1184","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/AshrafHH14","doi":"10.1002/CPE.3089","ee":"https://doi.org/10.1002/cpe.3089","url":"https://dblp.org/rec/journals/concurrency/AshrafHH14"}, "url":"URL#3717645" }, { "@score":"1", "@id":"3717646", "info":{"authors":{"author":[{"@pid":"55/24","text":"Man Ho Au"},{"@pid":"78/2235","text":"Guomin Yang"},{"@pid":"12/3447","text":"Willy Susilo"},{"@pid":"117/9078","text":"Yunmei Zhang"}]},"title":"(Strong) multidesignated verifiers signatures secure against rogue key attack.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"8","pages":"1574-1592","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/AuYSZ14","doi":"10.1002/CPE.3094","ee":"https://doi.org/10.1002/cpe.3094","url":"https://dblp.org/rec/journals/concurrency/AuYSZ14"}, "url":"URL#3717646" }, { "@score":"1", "@id":"3717647", "info":{"authors":{"author":[{"@pid":"38/7011-1","text":"Narayanaswamy Balakrishnan 0001"},{"@pid":"54/7652","text":"Gopinatha Jakadeesan"},{"@pid":"g/DhrubajyotiGoswami","text":"Dhrubajyoti Goswami"},{"@pid":"12/2517","text":"Latha Shanker"}]},"title":"Parallel computing strategies in the analysis of the inhibiting effect of price limits on futures prices.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"9","pages":"1666-1678","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/BalakrishnanJGS14","doi":"10.1002/CPE.2907","ee":"https://doi.org/10.1002/cpe.2907","url":"https://dblp.org/rec/journals/concurrency/BalakrishnanJGS14"}, "url":"URL#3717647" }, { "@score":"1", "@id":"3717648", "info":{"authors":{"author":[{"@pid":"10/679","text":"Sandro Bartolini"},{"@pid":"99/1774-1","text":"José M. García 0001"}]},"title":"Exploiting silicon photonics for energy-efficient heterogeneous parallel architectures.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"15","pages":"2489-2491","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/BartoliniG14","doi":"10.1002/CPE.3331","ee":"https://doi.org/10.1002/cpe.3331","url":"https://dblp.org/rec/journals/concurrency/BartoliniG14"}, "url":"URL#3717648" }, { "@score":"1", "@id":"3717649", "info":{"authors":{"author":[{"@pid":"13/3150","text":"Jim Basney"},{"@pid":"67/6070","text":"Terry Fleury"},{"@pid":"12/214","text":"Jeff Gaynor"}]},"title":"CILogon: A federated X.509 certification authority for cyberinfrastructure logon.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"13","pages":"2225-2239","year":"2014","type":"Journal Articles","access":"open","key":"journals/concurrency/BasneyFG14","doi":"10.1002/CPE.3265","ee":"https://doi.org/10.1002/cpe.3265","url":"https://dblp.org/rec/journals/concurrency/BasneyFG14"}, "url":"URL#3717649" }, { "@score":"1", "@id":"3717650", "info":{"authors":{"author":[{"@pid":"132/7546","text":"Robin M. Betz"},{"@pid":"86/833","text":"Nathan DeBardeleben"},{"@pid":"74/5418","text":"Ross C. Walker"}]},"title":"An investigation of the effects of hard and soft errors on graphics processing unit-accelerated molecular dynamics simulations.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"13","pages":"2134-2140","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/BetzDW14","doi":"10.1002/CPE.3232","ee":"https://doi.org/10.1002/cpe.3232","url":"https://dblp.org/rec/journals/concurrency/BetzDW14"}, "url":"URL#3717650" }, { "@score":"1", "@id":"3717651", "info":{"authors":{"author":[{"@pid":"44/1238","text":"Sébastien Le Beux"},{"@pid":"66/3387-34","text":"Hui Li 0034"},{"@pid":"39/1586","text":"Gabriela Nicolescu"},{"@pid":"58/2088","text":"Jelena Trajkovic"},{"@pid":"04/1298","text":"Ian O'Connor"}]},"title":"Optical crossbars on chip, a comparative study based on worst-case losses.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"15","pages":"2492-2503","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/BeuxLNTO14","doi":"10.1002/CPE.3336","ee":"https://doi.org/10.1002/cpe.3336","url":"https://dblp.org/rec/journals/concurrency/BeuxLNTO14"}, "url":"URL#3717651" }, { "@score":"1", "@id":"3717652", "info":{"authors":{"author":[{"@pid":"84/189","text":"Ethan Blanton"},{"@pid":"30/10987","text":"Demian Lessa"},{"@pid":"13/8660","text":"Puneet Arora"},{"@pid":"54/645","text":"Lukasz Ziarek"},{"@pid":"89/1843","text":"Bharat Jayaraman"}]},"title":"JI.FI: Visual test and debug queries for hard real-time.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"14","pages":"2456-2487","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/BlantonLAZJ14","doi":"10.1002/CPE.3156","ee":"https://doi.org/10.1002/cpe.3156","url":"https://dblp.org/rec/journals/concurrency/BlantonLAZJ14"}, "url":"URL#3717652" }, { "@score":"1", "@id":"3717653", "info":{"authors":{"author":[{"@pid":"b/ShahidHBokhari","text":"Shahid H. Bokhari"},{"@pid":"c/UmitVCatalyurek","text":"Ümit V. Çatalyürek"},{"@pid":"46/4420","text":"Metin Nafi Gürcan"}]},"title":"Massively multithreaded maxflow for image segmentation on the Cray XMT-2.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"18","pages":"2836-2855","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/BokhariCG14","doi":"10.1002/CPE.3181","ee":"https://doi.org/10.1002/cpe.3181","url":"https://dblp.org/rec/journals/concurrency/BokhariCG14"}, "url":"URL#3717653" }, { "@score":"1", "@id":"3717654", "info":{"authors":{"author":[{"@pid":"33/5623","text":"George Bosilca"},{"@pid":"96/5549","text":"Aurélien Bouteiller"},{"@pid":"33/1325","text":"Elisabeth Brunet"},{"@pid":"c/FranckCappello","text":"Franck Cappello"},{"@pid":"d/JackDongarra","text":"Jack J. Dongarra"},{"@pid":"72/9776","text":"Amina Guermouche"},{"@pid":"78/3532","text":"Thomas Hérault"},{"@pid":"r/YvesRobert","text":"Yves Robert"},{"@pid":"14/3872","text":"Frédéric Vivien"},{"@pid":"117/3811","text":"Dounia Zaidouni"}]},"title":"Unified model for assessing checkpointing protocols at extreme-scale.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"17","pages":"2772-2791","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/BosilcaBBCDGHRVZ14","doi":"10.1002/CPE.3173","ee":"https://doi.org/10.1002/cpe.3173","url":"https://dblp.org/rec/journals/concurrency/BosilcaBBCDGHRVZ14"}, "url":"URL#3717654" }, { "@score":"1", "@id":"3717655", "info":{"authors":{"author":[{"@pid":"13/1022","text":"James C. Browne"},{"@pid":"128/5982","text":"Robert L. DeLeon"},{"@pid":"52/5122","text":"Abani K. Patra"},{"@pid":"08/1485","text":"William L. Barth"},{"@pid":"313/4698","text":"John L. Hammond"},{"@pid":"82/5856","text":"Matthew D. Jones"},{"@pid":"06/833","text":"Thomas R. Furlani"},{"@pid":"87/8065","text":"Barry I. Schneider"},{"@pid":"42/2303","text":"Steven M. Gallo"},{"@pid":"128/5979","text":"Amin Ghadersohi"},{"@pid":"128/5981","text":"Ryan J. Gentner"},{"@pid":"132/7567","text":"Jeffrey T. Palmer"},{"@pid":"132/7602","text":"Nikolay Simakov"},{"@pid":"46/10957","text":"Martins Innus"},{"@pid":"30/9528","text":"Andrew E. Bruno"},{"@pid":"148/1204","text":"Joseph P. White"},{"@pid":"38/10956","text":"Cynthia D. Cornelius"},{"@pid":"149/0338","text":"Thomas Yearke"},{"@pid":"149/0343","text":"Kyle Marcus"},{"@pid":"25/1180","text":"Gregor von Laszewski"},{"@pid":"12/7869","text":"Fugang Wang"}]},"title":"Comprehensive, open-source resource usage measurement and analysis for HPC systems.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"13","pages":"2191-2209","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/BrowneDPBHJFSGGGPSIBWCYMLW14","doi":"10.1002/CPE.3245","ee":"https://doi.org/10.1002/cpe.3245","url":"https://dblp.org/rec/journals/concurrency/BrowneDPBHJFSGGGPSIBWCYMLW14"}, "url":"URL#3717655" }, { "@score":"1", "@id":"3717656", "info":{"authors":{"author":[{"@pid":"130/4265","text":"Frank Brüseke"},{"@pid":"73/9281","text":"Henning Wachsmuth"},{"@pid":"e/GregorEngels","text":"Gregor Engels"},{"@pid":"78/3405","text":"Steffen Becker 0001"}]},"title":"PBlaman: performance blame analysis based on Palladio contracts.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"12","pages":"1975-2004","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/BrusekeWEB14","doi":"10.1002/CPE.3226","ee":"https://doi.org/10.1002/cpe.3226","url":"https://dblp.org/rec/journals/concurrency/BrusekeWEB14"}, "url":"URL#3717656" }, { "@score":"1", "@id":"3717657", "info":{"authors":{"author":[{"@pid":"b/HansJoachimBungartz","text":"Hans-Joachim Bungartz"},{"@pid":"84/6756","text":"Alexander Heinecke"},{"@pid":"96/5029","text":"Dirk Pflüger"},{"@pid":"66/9083","text":"Stefanie Schraufstetter"}]},"title":"Parallelizing a Black-Scholes solver based on finite elements and sparse grids.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"9","pages":"1640-1653","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/BungartzHPS14","doi":"10.1002/CPE.2837","ee":"https://doi.org/10.1002/cpe.2837","url":"https://dblp.org/rec/journals/concurrency/BungartzHPS14"}, "url":"URL#3717657" }, { "@score":"1", "@id":"3717658", "info":{"authors":{"author":[{"@pid":"32/5061","text":"Jean-Philippe Chancelier"},{"@pid":"37/7437","text":"Bernard Lapeyre"},{"@pid":"47/7434","text":"Jérôme Lelong"}]},"title":"Using Premia and Nsp for constructing a risk management benchmark for testing parallel architecture.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"9","pages":"1654-1665","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/ChancelierLL14","doi":"10.1002/CPE.2893","ee":"https://doi.org/10.1002/cpe.2893","url":"https://dblp.org/rec/journals/concurrency/ChancelierLL14"}, "url":"URL#3717658" }, { "@score":"1", "@id":"3717659", "info":{"authors":{"author":[{"@pid":"120/8359","text":"Zuling Chang"},{"@pid":"16/3614","text":"Dandan Li"}]},"title":"On the linear complexity of generalized cyclotomic binary sequences of length 2pq.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"8","pages":"1520-1530","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/ChangL14","doi":"10.1002/CPE.3052","ee":"https://doi.org/10.1002/cpe.3052","url":"https://dblp.org/rec/journals/concurrency/ChangL14"}, "url":"URL#3717659" }, { "@score":"1", "@id":"3717660", "info":{"authors":{"author":[{"@pid":"26/2684","text":"Zhide Chen"},{"@pid":"96/8985","text":"Cheng Qiao"},{"@pid":"85/2168-2","text":"Li Xu 0002"},{"@pid":"95/6985-1","text":"Wei Wu 0001"}]},"title":"Optimizing wireless unicast and multicast sensor networks on the basis of evolutionary game theory.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"5","pages":"1130-1141","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/ChenQXW14","doi":"10.1002/CPE.3060","ee":"https://doi.org/10.1002/cpe.3060","url":"https://dblp.org/rec/journals/concurrency/ChenQXW14"}, "url":"URL#3717660" }, { "@score":"1", "@id":"3717661", "info":{"authors":{"author":[{"@pid":"98/5833","text":"Manuela Chessa"},{"@pid":"144/4306","text":"Giulia Pasquale"}]},"title":"Graphics processing unit-accelerated techniques for bio-inspired computation in the primary visual cortex.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"10","pages":"1799-1818","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/ChessaP14","doi":"10.1002/CPE.3118","ee":"https://doi.org/10.1002/cpe.3118","url":"https://dblp.org/rec/journals/concurrency/ChessaP14"}, "url":"URL#3717661" }, { "@score":"1", "@id":"3717662", "info":{"authors":{"author":[{"@pid":"19/10518","text":"Ghislain Landry Tsafack Chetsa"},{"@pid":"03/4160","text":"Laurent Lefèvre"},{"@pid":"49/3338","text":"Patricia Stolf"}]},"title":"A three step blind approach for improving high performance computing systems' energy performance.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"15","pages":"2612-2629","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/ChetsaLS14","doi":"10.1002/CPE.3312","ee":"https://doi.org/10.1002/cpe.3312","url":"https://dblp.org/rec/journals/concurrency/ChetsaLS14"}, "url":"URL#3717662" }, { "@score":"1", "@id":"3717663", "info":{"authors":{"author":[{"@pid":"39/5175","text":"W. Paul Cockshott"},{"@pid":"142/2077","text":"Youssef Gdura"},{"@pid":"68/3300","text":"Paul Keir"}]},"title":"Array languages and the N-body problem.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"4","pages":"935-951","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/CockshottGK14","doi":"10.1002/CPE.3088","ee":"https://doi.org/10.1002/cpe.3088","url":"https://dblp.org/rec/journals/concurrency/CockshottGK14"}, "url":"URL#3717663" }, { "@score":"1", "@id":"3717664", "info":{"authors":{"author":[{"@pid":"132/7677","text":"M. Brian Couger"},{"@pid":"124/1176","text":"Lenore Pipes"},{"@pid":"149/0344","text":"Fabio Squina"},{"@pid":"149/0356","text":"Rolf Prade"},{"@pid":"s/AdamCSiepel","text":"Adam C. Siepel"},{"@pid":"17/1625","text":"Robert Palermo"},{"@pid":"98/10991","text":"Michael G. Katze"},{"@pid":"124/1053","text":"Christopher E. Mason"},{"@pid":"132/7545","text":"Philip D. Blood"}]},"title":"Enabling large-scale next-generation sequence assembly with Blacklight.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"13","pages":"2157-2166","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/CougerPSPSPKMB14","doi":"10.1002/CPE.3231","ee":"https://doi.org/10.1002/cpe.3231","url":"https://dblp.org/rec/journals/concurrency/CougerPSPSPKMB14"}, "url":"URL#3717664" }, { "@score":"1", "@id":"3717665", "info":{"authors":{"author":[{"@pid":"70/2104-2","text":"Yan Cui 0002"},{"@pid":"87/1254-4","text":"Yu Chen 0004"},{"@pid":"08/5313","text":"Yuanchun Shi"}]},"title":"Towards scalability collapse behavior on multicores.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"2","pages":"336-359","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/CuiCS14","doi":"10.1002/CPE.2983","ee":"https://doi.org/10.1002/cpe.2983","url":"https://dblp.org/rec/journals/concurrency/CuiCS14"}, "url":"URL#3717665" }, { "@score":"1", "@id":"3717666", "info":{"authors":{"author":[{"@pid":"57/9636","text":"Reginald Cushing"},{"@pid":"03/8770","text":"Spiros Koulouzis"},{"@pid":"22/6302","text":"Adam Belloum"},{"@pid":"88/363","text":"Marian Bubak"}]},"title":"Applying workflow as a service paradigm to application farming.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"6","pages":"1297-1312","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/CushingKBB14","doi":"10.1002/CPE.3073","ee":"https://doi.org/10.1002/cpe.3073","url":"https://dblp.org/rec/journals/concurrency/CushingKBB14"}, "url":"URL#3717666" }, { "@score":"1", "@id":"3717667", "info":{"authors":{"author":[{"@pid":"11/4958","text":"Daniele D'Agostino"},{"@pid":"07/4852","text":"Andrea Clematis"},{"@pid":"84/2830","text":"Sergio Decherchi"},{"@pid":"85/5611","text":"Walter Rocchia"},{"@pid":"55/5807","text":"Luciano Milanesi"},{"@pid":"61/2401","text":"Ivan Merelli"}]},"title":"CUDA accelerated molecular surface generation.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"10","pages":"1819-1831","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/DAgostinoCDRMM14","doi":"10.1002/CPE.3120","ee":"https://doi.org/10.1002/cpe.3120","url":"https://dblp.org/rec/journals/concurrency/DAgostinoCDRMM14"}, "url":"URL#3717667" }, { "@score":"1", "@id":"3717668", "info":{"authors":{"author":[{"@pid":"59/8770","text":"Duy Minh Dang"},{"@pid":"52/3201","text":"Christina C. Christara"},{"@pid":"36/4441","text":"Kenneth R. Jackson"}]},"title":"Graphics processing unit pricing of exotic cross-currency interest rate derivatives with a foreign exchange volatility skew model.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"9","pages":"1609-1625","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/DangCJ14","doi":"10.1002/CPE.2824","ee":"https://doi.org/10.1002/cpe.2824","url":"https://dblp.org/rec/journals/concurrency/DangCJ14"}, "url":"URL#3717668" }, { "@score":"1", "@id":"3717669", "info":{"authors":{"author":[{"@pid":"r/DJanakiRam","text":"Janakiram Dharanipragada"},{"@pid":"140/2067","text":"Geeta Iyer"},{"@pid":"63/9995","text":"Sriram Kailasam"}]},"title":"Generate-map-reduce: An extension to map-reduce to support shared data and recursive computations.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"2","pages":"561-585","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/DharanipragadaIK14","doi":"10.1002/CPE.3018","ee":"https://doi.org/10.1002/cpe.3018","url":"https://dblp.org/rec/journals/concurrency/DharanipragadaIK14"}, "url":"URL#3717669" }, { "@score":"1", "@id":"3717670", "info":{"authors":{"author":[{"@pid":"73/3023","text":"Dave Dice"},{"@pid":"71/1483","text":"Danny Hendler"},{"@pid":"130/3696","text":"Ilya Mirsky"}]},"title":"Software-based contention management for efficient compare-and-swap operations.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"14","pages":"2386-2404","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/DiceHM14","doi":"10.1002/CPE.3304","ee":"https://doi.org/10.1002/cpe.3304","url":"https://dblp.org/rec/journals/concurrency/DiceHM14"}, "url":"URL#3717670" }, { "@score":"1", "@id":"3717671", "info":{"authors":{"author":[{"@pid":"124/2138","text":"Liana Diesendruck"},{"@pid":"96/1791","text":"Rob Kooper"},{"@pid":"64/1802","text":"Luigi Marini"},{"@pid":"88/4303","text":"Kenton McHenry"}]},"title":"Using Lucene to index and search the digitized 1940 US Census.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"13","pages":"2167-2177","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/DiesendruckKMM14","doi":"10.1002/CPE.3250","ee":"https://doi.org/10.1002/cpe.3250","url":"https://dblp.org/rec/journals/concurrency/DiesendruckKMM14"}, "url":"URL#3717671" }, { "@score":"1", "@id":"3717672", "info":{"authors":{"author":[{"@pid":"04/5260","text":"Ramon Doallo"},{"@pid":"77/5831","text":"Oscar G. Plata"}]},"title":"Multicore cache hierarchies: design and programmability issues.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"6","pages":"1326-1327","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/DoalloP14","doi":"10.1002/CPE.3195","ee":"https://doi.org/10.1002/cpe.3195","url":"https://dblp.org/rec/journals/concurrency/DoalloP14"}, "url":"URL#3717672" }, { "@score":"1", "@id":"3717673", "info":{"authors":{"author":[{"@pid":"d/JackDongarra","text":"Jack J. Dongarra"},{"@pid":"18/9881","text":"Mathieu Faverge"},{"@pid":"92/397","text":"Hatem Ltaief"},{"@pid":"90/4175","text":"Piotr Luszczek"}]},"title":"Achieving numerical accuracy and high performance using recursive tile LU factorization with partial pivoting.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"7","pages":"1408-1431","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/DongarraFLL14","doi":"10.1002/CPE.3110","ee":"https://doi.org/10.1002/cpe.3110","url":"https://dblp.org/rec/journals/concurrency/DongarraFLL14"}, "url":"URL#3717673" }, { "@score":"1", "@id":"3717674", "info":{"authors":{"author":[{"@pid":"54/1947","text":"Frank Eichinger"},{"@pid":"10/1753","text":"Victor Pankratius"},{"@pid":"b/KBohm","text":"Klemens Böhm"}]},"title":"Data mining for defects in multicore applications: an entropy-based call-graph technique.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"1","pages":"1-20","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/EichingerPB14","doi":"10.1002/CPE.2918","ee":"https://doi.org/10.1002/cpe.2918","url":"https://dblp.org/rec/journals/concurrency/EichingerPB14"}, "url":"URL#3717674" }, { "@score":"1", "@id":"3717675", "info":{"authors":{"author":[{"@pid":"99/6710","text":"Ali El-Moursy"},{"@pid":"97/6912","text":"Hanan Elazhary"},{"@pid":"117/5115","text":"Akmal Younis"}]},"title":"High-accuracy hierarchical parallel technique for hidden Markov model-based 3D magnetic resonance image brain segmentation.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"1","pages":"194-216","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/El-MoursyEY14","doi":"10.1002/CPE.2959","ee":"https://doi.org/10.1002/cpe.2959","url":"https://dblp.org/rec/journals/concurrency/El-MoursyEY14"}, "url":"URL#3717675" }, { "@score":"1", "@id":"3717676", "info":{"authors":{"author":[{"@pid":"49/8837","text":"Sally R. Ellingson"},{"@pid":"91/558","text":"Jérôme Baudry"}]},"title":"High-throughput virtual molecular docking with AutoDockCloud.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"4","pages":"907-916","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/EllingsonB14","doi":"10.1002/CPE.2926","ee":"https://doi.org/10.1002/cpe.2926","url":"https://dblp.org/rec/journals/concurrency/EllingsonB14"}, "url":"URL#3717676" }, { "@score":"1", "@id":"3717677", "info":{"authors":{"author":[{"@pid":"49/8837","text":"Sally R. Ellingson"},{"@pid":"141/4555","text":"Dakshanamurthy Sivanesan"},{"@pid":"143/8810","text":"Milton Brown"},{"@pid":"84/5111","text":"Jeremy C. Smith"},{"@pid":"91/558","text":"Jérôme Baudry"}]},"title":"Accelerating virtual high-throughput ligand docking: current technology and case study on a petascale supercomputer.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"6","pages":"1268-1277","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/EllingsonSBSB14","doi":"10.1002/CPE.3070","ee":"https://doi.org/10.1002/cpe.3070","url":"https://dblp.org/rec/journals/concurrency/EllingsonSBSB14"}, "url":"URL#3717677" }, { "@score":"1", "@id":"3717678", "info":{"authors":{"author":[{"@pid":"51/4782","text":"Iria Estévez-Ayres"},{"@pid":"29/6581","text":"Pablo Basanta-Val"},{"@pid":"91/2218","text":"Marisol García-Valls"}]},"title":"Composing and scheduling service-oriented applications in time-triggered distributed real-time Java environments.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"1","pages":"152-193","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/Estevez-AyresBG14","doi":"10.1002/CPE.2958","ee":"https://doi.org/10.1002/cpe.2958","url":"https://dblp.org/rec/journals/concurrency/Estevez-AyresBG14"}, "url":"URL#3717678" }, { "@score":"1", "@id":"3717679", "info":{"authors":{"author":[{"@pid":"20/3825-1","text":"Kai Fan 0001"},{"@pid":"17/2703","text":"Jie Li"},{"@pid":"l/HuiLi6","text":"Hui Li 0006"},{"@pid":"92/3528","text":"Xiaohui Liang"},{"@pid":"s/XueminShen","text":"Xuemin (Sherman) Shen"},{"@pid":"50/5329","text":"Yintang Yang"}]},"title":"RSEL: revocable secure efficient lightweight RFID authentication scheme.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"5","pages":"1084-1096","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/FanLLLSY14","doi":"10.1002/CPE.3065","ee":"https://doi.org/10.1002/cpe.3065","url":"https://dblp.org/rec/journals/concurrency/FanLLLSY14"}, "url":"URL#3717679" }, { "@score":"1", "@id":"3717680", "info":{"authors":{"author":[{"@pid":"00/11210","text":"Xiaowen Feng"},{"@pid":"98/4156","text":"Hai Jin 0001"},{"@pid":"29/2149","text":"Ran Zheng"},{"@pid":"16/611","text":"Zhiyuan Shao"},{"@pid":"99/549-2","text":"Lei Zhu 0002"}]},"title":"A segment-based sparse matrix-vector multiplication on CUDA.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"1","pages":"271-286","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/FengJZSZ14","doi":"10.1002/CPE.2978","ee":"https://doi.org/10.1002/cpe.2978","url":"https://dblp.org/rec/journals/concurrency/FengJZSZ14"}, "url":"URL#3717680" }, { "@score":"1", "@id":"3717681", "info":{"authors":{"author":[{"@pid":"06/2795","text":"Jiading Gai"},{"@pid":"97/3325","text":"Dong Ju Choi"},{"@pid":"07/9697","text":"David O'Neal"},{"@pid":"36/2301","text":"Mao Ye"},{"@pid":"91/291","text":"Robert S. Sinkovits"}]},"title":"Fast construction of nanosecond level snapshots of financial markets.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"13","pages":"2149-2156","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/GaiCOYS14","doi":"10.1002/CPE.3220","ee":"https://doi.org/10.1002/cpe.3220","url":"https://dblp.org/rec/journals/concurrency/GaiCOYS14"}, "url":"URL#3717681" }, { "@score":"1", "@id":"3717682", "info":{"authors":{"author":[{"@pid":"69/8912","text":"Hao Gao"},{"@pid":"89/5901-5","text":"Jun Yan 0005"},{"@pid":"m/YiMu","text":"Yi Mu 0001"}]},"title":"Trust-oriented QoS-aware composite service selection based on genetic algorithms.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"2","pages":"500-515","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/GaoYM14","doi":"10.1002/CPE.3015","ee":"https://doi.org/10.1002/cpe.3015","url":"https://dblp.org/rec/journals/concurrency/GaoYM14"}, "url":"URL#3717682" }, { "@score":"1", "@id":"3717683", "info":{"authors":{"author":[{"@pid":"04/10332","text":"Antonio García-Guirado"},{"@pid":"73/6779","text":"Ricardo Fernández Pascual"},{"@pid":"99/1774-1","text":"José M. García 0001"},{"@pid":"10/679","text":"Sandro Bartolini"}]},"title":"Managing resources dynamically in hybrid photonic-electronic networks-on-chip.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"15","pages":"2530-2550","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/Garcia-GuiradoFGB14","doi":"10.1002/CPE.3332","ee":"https://doi.org/10.1002/cpe.3332","url":"https://dblp.org/rec/journals/concurrency/Garcia-GuiradoFGB14"}, "url":"URL#3717683" }, { "@score":"1", "@id":"3717684", "info":{"authors":{"author":[{"@pid":"121/4053","text":"Björn Gmeiner"},{"@pid":"41/5505","text":"Harald Köstler"},{"@pid":"74/8296","text":"Markus Stürmer"},{"@pid":"75/2928","text":"Ulrich Rüde"}]},"title":"Parallel multigrid on hierarchical hybrid grids: a performance study on current high performance computing clusters.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"1","pages":"217-240","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/GmeinerKSR14","doi":"10.1002/CPE.2968","ee":"https://doi.org/10.1002/cpe.2968","url":"https://dblp.org/rec/journals/concurrency/GmeinerKSR14"}, "url":"URL#3717684" }, { "@score":"1", "@id":"3717685", "info":{"authors":{"author":[{"@pid":"80/10721","text":"Mehdi Goli 0001"},{"@pid":"53/564","text":"Horacio González-Vélez"}]},"title":"N-body computations using skeletal frameworks on multicore CPU/graphics processing unit architectures: an empirical performance evaluation.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"4","pages":"972-986","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/GoliG14","doi":"10.1002/CPE.3076","ee":"https://doi.org/10.1002/cpe.3076","url":"https://dblp.org/rec/journals/concurrency/GoliG14"}, "url":"URL#3717685" }, { "@score":"1", "@id":"3717686", "info":{"authors":{"author":[{"@pid":"123/5138","text":"Richard Grunzke"},{"@pid":"23/7630","text":"Sebastian Breuers"},{"@pid":"75/8291","text":"Sandra Gesing"},{"@pid":"47/8291","text":"Sonja Herres-Pawlis"},{"@pid":"140/4988","text":"Martin Kruse"},{"@pid":"63/8291","text":"Dirk Blunk"},{"@pid":"133/8952","text":"Luis de la Garza"},{"@pid":"39/8291","text":"Lars Packschies"},{"@pid":"89/11002-1","text":"Patrick Schäfer 0001"},{"@pid":"133/8936","text":"Charlotta Schärfe"},{"@pid":"02/9207","text":"Tobias Schlemmer"},{"@pid":"73/4025-1","text":"Thomas Steinke 0001"},{"@pid":"83/4621","text":"Bernd Schuller"},{"@pid":"23/2250","text":"Ralph Müller-Pfefferkorn"},{"@pid":"81/10503","text":"René Jäkel"},{"@pid":"66/4013","text":"Wolfgang E. Nagel"},{"@pid":"a/MalcolmPAtkinson","text":"Malcolm P. Atkinson 0001"},{"@pid":"41/3476-2","text":"Jens Krüger 0002"}]},"title":"Standards-based metadata management for molecular simulations.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"10","pages":"1744-1759","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/GrunzkeBGHKBGPSSSSSMJNA014","doi":"10.1002/CPE.3116","ee":"https://doi.org/10.1002/cpe.3116","url":"https://dblp.org/rec/journals/concurrency/GrunzkeBGHKBGPSSSSSMJNA014"}, "url":"URL#3717686" }, { "@score":"1", "@id":"3717687", "info":{"authors":{"author":[{"@pid":"44/7795","text":"Ginés D. Guerrero"},{"@pid":"44/7979","text":"Juan M. Cebrian"},{"@pid":"71/7922","text":"Horacio Emilio Pérez Sánchez"},{"@pid":"99/1774-1","text":"José M. García 0001"},{"@pid":"58/2624","text":"Manuel Ujaldon"},{"@pid":"36/7795","text":"José M. Cecilia"}]},"title":"Toward energy efficiency in heterogeneous processors: findings on virtual screening methods.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"10","pages":"1832-1846","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/GuerreroCS0UC14","doi":"10.1002/CPE.3119","ee":"https://doi.org/10.1002/cpe.3119","url":"https://dblp.org/rec/journals/concurrency/GuerreroCS0UC14"}, "url":"URL#3717687" }, { "@score":"1", "@id":"3717688", "info":{"authors":{"author":[{"@pid":"44/7795","text":"Ginés D. Guerrero"},{"@pid":"146/9746","text":"Richard M. Wallace"},{"@pid":"v/JLVazquezPoletti","text":"José Luis Vázquez-Poletti"},{"@pid":"36/7795","text":"José M. Cecilia"},{"@pid":"99/1774-1","text":"José M. García 0001"},{"@pid":"67/3998","text":"Daniel Mozos"},{"@pid":"71/7922","text":"Horacio Emilio Pérez Sánchez"}]},"title":"A performance/cost model for a CUDA drug discovery application on physical and public cloud infrastructures.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"10","pages":"1787-1798","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/GuerreroWVC0MS14","doi":"10.1002/CPE.3117","ee":"https://doi.org/10.1002/cpe.3117","url":"https://dblp.org/rec/journals/concurrency/GuerreroWVC0MS14"}, "url":"URL#3717688" }, { "@score":"1", "@id":"3717689", "info":{"authors":{"author":[{"@pid":"27/2688","text":"Marjan Gusev"},{"@pid":"05/11268","text":"Sasko Ristov"}]},"title":"A superlinear speedup region for matrix multiplication.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"11","pages":"1847-1868","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/GusevR14","doi":"10.1002/CPE.3102","ee":"https://doi.org/10.1002/cpe.3102","url":"https://dblp.org/rec/journals/concurrency/GusevR14"}, "url":"URL#3717689" }, { "@score":"1", "@id":"3717690", "info":{"authors":{"author":[{"@pid":"84/8360","text":"Mateusz Guzek"},{"@pid":"84/4601","text":"Sébastien Varrette"},{"@pid":"135/0119","text":"Valentin Plugaru"},{"@pid":"85/979","text":"Johnatan E. Pecero"},{"@pid":"b/PascalBouvry","text":"Pascal Bouvry"}]},"title":"A holistic model of the performance and the energy efficiency of hypervisors in a high-performance computing environment.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"15","pages":"2569-2590","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/GuzekVPPB14","doi":"10.1002/CPE.3316","ee":"https://doi.org/10.1002/cpe.3316","url":"https://dblp.org/rec/journals/concurrency/GuzekVPPB14"}, "url":"URL#3717690" }, { "@score":"1", "@id":"3717691", "info":{"authors":{"author":[{"@pid":"76/5895","text":"Qi Han"},{"@pid":"31/3845-2","text":"Yinghui Zhang 0002"},{"@pid":"c/XiaofengChen1","text":"Xiaofeng Chen 0001"},{"@pid":"l/HuiLi6","text":"Hui Li 0006"},{"@pid":"121/5960","text":"Jiaxiang Quan"}]},"title":"Efficient and robust identity-based handoff authentication for EAP-based wireless networks.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"8","pages":"1561-1573","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/HanZ0LQ14","doi":"10.1002/CPE.3024","ee":"https://doi.org/10.1002/cpe.3024","url":"https://dblp.org/rec/journals/concurrency/HanZ0LQ14"}, "url":"URL#3717691" }, { "@score":"1", "@id":"3717692", "info":{"authors":{"author":[{"@pid":"133/8956","text":"Matthew R. Hanlon"},{"@pid":"11/5082","text":"Warren Smith"},{"@pid":"57/7684","text":"Stephen A. Mock"}]},"title":"Providing resource information to users of a national computing center.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"13","pages":"2292-2302","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/HanlonSM14","doi":"10.1002/CPE.3233","ee":"https://doi.org/10.1002/cpe.3233","url":"https://dblp.org/rec/journals/concurrency/HanlonSM14"}, "url":"URL#3717692" }, { "@score":"1", "@id":"3717693", "info":{"authors":{"author":[{"@pid":"18/7554","text":"David L. Hart"},{"@pid":"132/7539","text":"Pam Gillman"},{"@pid":"132/7586","text":"Erich Thanhardt"}]},"title":"National Center for Atmospheric Research storage accounting and analysis possibilities.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"13","pages":"2210-2224","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/HartGT14","doi":"10.1002/CPE.3228","ee":"https://doi.org/10.1002/cpe.3228","url":"https://dblp.org/rec/journals/concurrency/HartGT14"}, "url":"URL#3717693" }, { "@score":"1", "@id":"3717694", "info":{"authors":{"author":[{"@pid":"60/11196","text":"Raoufehsadat Hashemian"},{"@pid":"36/3062","text":"Diwakar Krishnamurthy"},{"@pid":"76/6339","text":"Martin F. Arlitt"},{"@pid":"41/5561","text":"Niklas Carlsson"}]},"title":"Characterizing the scalability of a Web application on a multi-core server.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"12","pages":"2027-2052","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/HashemianKAC14","doi":"10.1002/CPE.3239","ee":"https://doi.org/10.1002/cpe.3239","url":"https://dblp.org/rec/journals/concurrency/HashemianKAC14"}, "url":"URL#3717694" }, { "@score":"1", "@id":"3717695", "info":{"authors":{"author":[{"@pid":"130/4084","text":"Nikolas Roman Herbst"},{"@pid":"11/8164","text":"Nikolaus Huber"},{"@pid":"k/SamuelKounev","text":"Samuel Kounev"},{"@pid":"130/4121","text":"Erich Amrehn"}]},"title":"Self-adaptive workload classification and forecasting for proactive resource provisioning.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"12","pages":"2053-2078","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/HerbstHKA14","doi":"10.1002/CPE.3224","ee":"https://doi.org/10.1002/cpe.3224","url":"https://dblp.org/rec/journals/concurrency/HerbstHKA14"}, "url":"URL#3717695" }, { "@score":"1", "@id":"3717696", "info":{"authors":{"author":[{"@pid":"147/2248","text":"Alejandro Hidalgo-Paniagua"},{"@pid":"v/MiguelAVegaRodriguez","text":"Miguel A. Vega-Rodríguez"},{"@pid":"36/3367","text":"Nieves Pavón"},{"@pid":"70/4889","text":"Joaquín Ferruz Melero"}]},"title":"A comparative study of parallel software SURF implementations.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"17","pages":"2758-2771","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/Hidalgo-PaniaguaVPM14","doi":"10.1002/CPE.3163","ee":"https://doi.org/10.1002/cpe.3163","url":"https://dblp.org/rec/journals/concurrency/Hidalgo-PaniaguaVPM14"}, "url":"URL#3717696" }, { "@score":"1", "@id":"3717697", "info":{"authors":{"author":[{"@pid":"04/5715","text":"M. Teresa Higuera-Toledano"},{"@pid":"w/AndyJWellings","text":"Andy J. Wellings"}]},"title":"Introduction to the Special Issue on Java Technologies for Real-Time and Embedded Systems: JTRES 2012.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"14","pages":"2405-2406","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/Higuera-ToledanoW14","doi":"10.1002/CPE.3310","ee":"https://doi.org/10.1002/cpe.3310","url":"https://dblp.org/rec/journals/concurrency/Higuera-ToledanoW14"}, "url":"URL#3717697" }, { "@score":"1", "@id":"3717698", "info":{"authors":{"author":[{"@pid":"138/6906","text":"Ahmad M. Hosny"},{"@pid":"58/8841","text":"Howida A. Shedeed"},{"@pid":"93/7698","text":"Ashraf Saad Hussein"},{"@pid":"25/6592","text":"Mohamed F. Tolba 0001"}]},"title":"Cloud-based parallel solution for estimating statistical significance of megabyte-scale DNA sequences.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"1","pages":"118-133","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/HosnySHT14","doi":"10.1002/CPE.2953","ee":"https://doi.org/10.1002/cpe.2953","url":"https://dblp.org/rec/journals/concurrency/HosnySHT14"}, "url":"URL#3717698" }, { "@score":"1", "@id":"3717699", "info":{"authors":{"author":[{"@pid":"145/7811","text":"Philip W. Howard"},{"@pid":"50/3443","text":"Jonathan Walpole"}]},"title":"Relativistic red-black trees.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"16","pages":"2684-2712","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/HowardW14","doi":"10.1002/CPE.3157","ee":"https://doi.org/10.1002/cpe.3157","url":"https://dblp.org/rec/journals/concurrency/HowardW14"}, "url":"URL#3717699" }, { "@score":"1", "@id":"3717700", "info":{"authors":{"author":[{"@pid":"64/201","text":"Fumihiko Ino"},{"@pid":"140/2284","text":"Kentaro Shigeoka"},{"@pid":"58/3184","text":"Tomohiro Okuyama"},{"@pid":"40/9378","text":"Masaya Motokubota"},{"@pid":"61/4474","text":"Kenichi Hagihara"}]},"title":"A parallel scheme for accelerating parameter sweep applications on a GPU.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"2","pages":"516-531","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/InoSOMH14","doi":"10.1002/CPE.3016","ee":"https://doi.org/10.1002/cpe.3016","url":"https://dblp.org/rec/journals/concurrency/InoSOMH14"}, "url":"URL#3717700" }, { "@score":"1", "@id":"3717701", "info":{"authors":{"author":[{"@pid":"32/227","text":"Yunliang Jiang"},{"@pid":"29/4867-7","text":"Yong Liu 0007"},{"@pid":"42/7002","text":"Wenliang Huang"},{"@pid":"h/LicanHuang","text":"Lican Huang"}]},"title":"Performance analysis of a mobile agent prototype system based on VIRGO P2P protocols.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"2","pages":"447-467","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/JiangLHH14","doi":"10.1002/CPE.3006","ee":"https://doi.org/10.1002/cpe.3006","url":"https://dblp.org/rec/journals/concurrency/JiangLHH14"}, "url":"URL#3717701" }, { "@score":"1", "@id":"3717702", "info":{"authors":{"author":[{"@pid":"135/9386","text":"Chao Jing"},{"@pid":"02/6595","text":"Yanmin Zhu"},{"@pid":"l/MingluLi","text":"Minglu Li 0001"}]},"title":"SEED: solar energy-aware efficient scheduling for data centers.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"18","pages":"2811-2835","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/JingZL14","doi":"10.1002/CPE.3179","ee":"https://doi.org/10.1002/cpe.3179","url":"https://dblp.org/rec/journals/concurrency/JingZL14"}, "url":"URL#3717702" }, { "@score":"1", "@id":"3717703", "info":{"authors":{"author":{"@pid":"34/5428","text":"Bill Karakostas"}},"title":"A high performance engine for concurrent complex event processing.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"2","pages":"491-499","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/Karakostas14","doi":"10.1002/CPE.3014","ee":"https://doi.org/10.1002/cpe.3014","url":"https://dblp.org/rec/journals/concurrency/Karakostas14"}, "url":"URL#3717703" }, { "@score":"1", "@id":"3717704", "info":{"authors":{"author":{"@pid":"34/5428","text":"Bill Karakostas"}},"title":"A scalable architecture for concurrent online auctions.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"3","pages":"841-850","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/Karakostas14a","doi":"10.1002/CPE.3192","ee":"https://doi.org/10.1002/cpe.3192","url":"https://dblp.org/rec/journals/concurrency/Karakostas14a"}, "url":"URL#3717704" }, { "@score":"1", "@id":"3717705", "info":{"authors":{"author":[{"@pid":"89/9118","text":"Rody W. J. Kersten"},{"@pid":"10/7271","text":"Bernard van Gastel"},{"@pid":"71/5581","text":"Olha Shkaravska"},{"@pid":"44/6883","text":"Manuel Montenegro"},{"@pid":"83/2290","text":"Marko C. J. D. van Eekelen"}]},"title":"ResAna: a resource analysis toolset for (real-time) JAVA.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"14","pages":"2432-2455","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/KerstenGSME14","doi":"10.1002/CPE.3154","ee":"https://doi.org/10.1002/cpe.3154","url":"https://dblp.org/rec/journals/concurrency/KerstenGSME14"}, "url":"URL#3717705" }, { "@score":"1", "@id":"3717706", "info":{"authors":{"author":[{"@pid":"k/AttilaKertesz","text":"Attila Kertész"},{"@pid":"51/415","text":"Ferenc Ötvös"},{"@pid":"95/1656","text":"Péter Kacsuk"}]},"title":"A case study for biochemical application porting in european grids and clouds.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"10","pages":"1730-1743","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/KerteszOK14","doi":"10.1002/CPE.3115","ee":"https://doi.org/10.1002/cpe.3115","url":"https://dblp.org/rec/journals/concurrency/KerteszOK14"}, "url":"URL#3717706" }, { "@score":"1", "@id":"3717707", "info":{"authors":{"author":[{"@pid":"37/6802-1","text":"Joohyun Kim 0001"},{"@pid":"03/8318","text":"Sharath Maddineni"},{"@pid":"52/4407","text":"Shantenu Jha"}]},"title":"Advancing next-generation sequencing data analytics with scalable distributed infrastructure.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"4","pages":"894-906","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/KimMJ14","doi":"10.1002/CPE.3013","ee":"https://doi.org/10.1002/cpe.3013","url":"https://dblp.org/rec/journals/concurrency/KimMJ14"}, "url":"URL#3717707" }, { "@score":"1", "@id":"3717708", "info":{"authors":{"author":[{"@pid":"54/5297","text":"Tamás Kiss"},{"@pid":"146/9769","text":"Péter Borsody"},{"@pid":"47/1581","text":"Gábor Terstyánszky"},{"@pid":"40/3333","text":"Stephen C. Winter"},{"@pid":"58/8898","text":"Pamela Greenwell"},{"@pid":"146/9757","text":"Sharron McEldowney"},{"@pid":"59/8898","text":"Hans Heindl"}]},"title":"Large-scale virtual screening experiments on Windows Azure-based cloud resources.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"10","pages":"1760-1770","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/KissBTWGMH14","doi":"10.1002/CPE.3113","ee":"https://doi.org/10.1002/cpe.3113","url":"https://dblp.org/rec/journals/concurrency/KissBTWGMH14"}, "url":"URL#3717708" }, { "@score":"1", "@id":"3717709", "info":{"authors":{"author":[{"@pid":"75/9134","text":"Lars Koesterke"},{"@pid":"132/7564","text":"James E. Koltes"},{"@pid":"139/5280","text":"Nathan T. Weeks"},{"@pid":"246/0379","text":"Kent F. Milfeld"},{"@pid":"149/0350","text":"Matthew W. Vaughn"},{"@pid":"66/6268","text":"James M. Reecy"},{"@pid":"88/6902","text":"Daniel Stanzione"}]},"title":"Discovery of biological networks using an optimized partial correlation coefficient with information theory algorithm on Stampede's Xeon and Xeon Phi processors.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"13","pages":"2178-2190","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/KoesterkeKWMVRS14","doi":"10.1002/CPE.3252","ee":"https://doi.org/10.1002/cpe.3252","url":"https://dblp.org/rec/journals/concurrency/KoesterkeKWMVRS14"}, "url":"URL#3717709" }, { "@score":"1", "@id":"3717710", "info":{"authors":{"author":[{"@pid":"95/5159","text":"Stephan Korsholm"},{"@pid":"34/4021","text":"Hans Søndergaard"},{"@pid":"51/1502","text":"Anders P. Ravn"}]},"title":"A real-time Java tool chain for resource constrained platforms.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"14","pages":"2407-2431","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/KorsholmSR14","doi":"10.1002/CPE.3164","ee":"https://doi.org/10.1002/cpe.3164","url":"https://dblp.org/rec/journals/concurrency/KorsholmSR14"}, "url":"URL#3717710" }, { "@score":"1", "@id":"3717711", "info":{"authors":{"author":[{"@pid":"22/3272","text":"Pavel Krömer"},{"@pid":"64/2617","text":"Jan Platos"},{"@pid":"s/VaclavSnasel","text":"Václav Snásel"}]},"title":"Data Parallel density-based genetic clustering on CUDA Architecture.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"5","pages":"1097-1112","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/KromerPS14","doi":"10.1002/CPE.3054","ee":"https://doi.org/10.1002/cpe.3054","url":"https://dblp.org/rec/journals/concurrency/KromerPS14"}, "url":"URL#3717711" }, { "@score":"1", "@id":"3717712", "info":{"authors":{"author":{"@pid":"15/7424","text":"Konrad Kulakowski"}},"title":"A concurrent van Emde Boas array as a fast and simple concurrent dynamic set alternative.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"2","pages":"360-379","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/Kulakowski14","doi":"10.1002/CPE.2995","ee":"https://doi.org/10.1002/cpe.2995","url":"https://dblp.org/rec/journals/concurrency/Kulakowski14"}, "url":"URL#3717712" }, { "@score":"1", "@id":"3717713", "info":{"authors":{"author":[{"@pid":"119/8938","text":"Irena Lanc"},{"@pid":"92/3605","text":"Peter Bui"},{"@pid":"83/1871","text":"Douglas Thain"},{"@pid":"76/2937","text":"Scott J. Emrich"}]},"title":"Adapting bioinformatics applications for heterogeneous systems: a case study.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"4","pages":"866-877","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/LancBTE14","doi":"10.1002/CPE.2927","ee":"https://doi.org/10.1002/cpe.2927","url":"https://dblp.org/rec/journals/concurrency/LancBTE14"}, "url":"URL#3717713" }, { "@score":"1", "@id":"3717714", "info":{"authors":{"author":[{"@pid":"57/6561","text":"Rubin H. Landau"},{"@pid":"132/7599","text":"Greg Mulder"},{"@pid":"53/10530","text":"Raquell Holmes"},{"@pid":"132/7622","text":"Sofya Borinskaya"},{"@pid":"132/7560","text":"NamHwa Kang"},{"@pid":"81/9760","text":"Cristian Bordeianu"}]},"title":"INSTANCES: incorporating computational scientific thinking advances into education and science courses.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"13","pages":"2316-2328","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/LandauMHBKB14","doi":"10.1002/CPE.3288","ee":"https://doi.org/10.1002/cpe.3288","url":"https://dblp.org/rec/journals/concurrency/LandauMHBKB14"}, "url":"URL#3717714" }, { "@score":"1", "@id":"3717715", "info":{"authors":{"author":[{"@pid":"67/733","text":"Cheng-Yu Lee"},{"@pid":"134/2801","text":"Min-Chin Hung"},{"@pid":"53/5794","text":"Rong-Guey Chang"}]},"title":"Instruction scheduling and transformation for a VLIW unified reduced instruction set computer/digital signal processor processor with shared register architecture.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"1","pages":"134-151","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/LeeHC14","doi":"10.1002/CPE.2954","ee":"https://doi.org/10.1002/cpe.2954","url":"https://dblp.org/rec/journals/concurrency/LeeHC14"}, "url":"URL#3717715" }, { "@score":"1", "@id":"3717716", "info":{"authors":{"author":[{"@pid":"l/CLengauer","text":"Christian Lengauer"},{"@pid":"b/LucBouge","text":"Luc Bougé"},{"@pid":"w/FelixWolf","text":"Felix Wolf 0001"}]},"title":"Special issue: Euro-Par 2013.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"14","pages":"2345-2346","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/LengauerBW14","doi":"10.1002/CPE.3307","ee":"https://doi.org/10.1002/cpe.3307","url":"https://dblp.org/rec/journals/concurrency/LengauerBW14"}, "url":"URL#3717716" }, { "@score":"1", "@id":"3717717", "info":{"authors":{"author":[{"@pid":"64/6025-58","text":"Wei Li 0058"},{"@pid":"88/4289","text":"Flávia Coimbra Delicato"},{"@pid":"69/1904","text":"Paulo F. Pires"},{"@pid":"z/AlbertYZomaya","text":"Albert Y. Zomaya"}]},"title":"Energy-efficient task allocation with quality of service provisioning for concurrent applications in multi-functional wireless sensor network systems.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"11","pages":"1869-1888","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/LiDPZ14","doi":"10.1002/CPE.3107","ee":"https://doi.org/10.1002/cpe.3107","url":"https://dblp.org/rec/journals/concurrency/LiDPZ14"}, "url":"URL#3717717" }, { "@score":"1", "@id":"3717718", "info":{"authors":{"author":[{"@pid":"23/11277","text":"Rongchun Li"},{"@pid":"76/305","text":"Yong Dou"},{"@pid":"70/877","text":"Dan Zou"}]},"title":"Efficient parallel implementation of three-point viterbi decoding algorithm on CPU, GPU, and FPGA.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"3","pages":"821-840","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/LiDZ14","doi":"10.1002/CPE.3093","ee":"https://doi.org/10.1002/cpe.3093","url":"https://dblp.org/rec/journals/concurrency/LiDZ14"}, "url":"URL#3717718" }, { "@score":"1", "@id":"3717719", "info":{"authors":{"author":[{"@pid":"33/31-1","text":"Jiguo Li 0001"},{"@pid":"120/8334","text":"Haiting Du"},{"@pid":"36/1838-3","text":"Yichen Zhang 0003"},{"@pid":"75/4601","text":"Tao Li"},{"@pid":"120/8325","text":"Yuexin Zhang"}]},"title":"Provably secure certificate-based key-insulated signature scheme.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"8","pages":"1546-1560","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/LiDZLZ14","doi":"10.1002/CPE.3019","ee":"https://doi.org/10.1002/cpe.3019","url":"https://dblp.org/rec/journals/concurrency/LiDZLZ14"}, "url":"URL#3717719" }, { "@score":"1", "@id":"3717720", "info":{"authors":{"author":[{"@pid":"34/5656-1","text":"Cai Li 0001"},{"@pid":"99/5144","text":"Jiankun Hu"}]},"title":"Attacks via record multiplicity on cancelable biometrics templates.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"8","pages":"1593-1605","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/LiH14","doi":"10.1002/CPE.3042","ee":"https://doi.org/10.1002/cpe.3042","url":"https://dblp.org/rec/journals/concurrency/LiH14"}, "url":"URL#3717720" }, { "@score":"1", "@id":"3717721", "info":{"authors":{"author":[{"@pid":"92/7728-1","text":"Jingwei Li 0001"},{"@pid":"48/1097-2","text":"Jin Li 0002"},{"@pid":"22/8078","text":"Zheli Liu"},{"@pid":"08/6314","text":"Chunfu Jia"}]},"title":"Enabling efficient and secure data sharing in cloud computing.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"5","pages":"1052-1066","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/LiLLJ14","doi":"10.1002/CPE.3067","ee":"https://doi.org/10.1002/cpe.3067","url":"https://dblp.org/rec/journals/concurrency/LiLLJ14"}, "url":"URL#3717721" }, { "@score":"1", "@id":"3717722", "info":{"authors":{"author":[{"@pid":"91/1905","text":"Hongliang Li"},{"@pid":"25/4202","text":"Xiaohui Wei"},{"@pid":"142/2083","text":"Qingwu Fu"},{"@pid":"90/6959","text":"Yuan Luo"}]},"title":"MapReduce delay scheduling with deadline constraint.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"3","pages":"766-778","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/LiWFL14","doi":"10.1002/CPE.3050","ee":"https://doi.org/10.1002/cpe.3050","url":"https://dblp.org/rec/journals/concurrency/LiWFL14"}, "url":"URL#3717722" }, { "@score":"1", "@id":"3717723", "info":{"authors":{"author":[{"@pid":"53/4481-2","text":"Qing Liu 0002"},{"@pid":"55/6599","text":"Jeremy Logan"},{"@pid":"39/5423-4","text":"Yuan Tian 0004"},{"@pid":"79/4261","text":"Hasan Abbasi"},{"@pid":"28/270","text":"Norbert Podhorszki"},{"@pid":"54/4861","text":"Jong Youl Choi"},{"@pid":"43/1753","text":"Scott Klasky"},{"@pid":"10/1921","text":"Roselyne Tchoua"},{"@pid":"34/6823","text":"Jay F. Lofstead"},{"@pid":"144/2476","text":"Ron A. Oldfield"},{"@pid":"p/ManishParashar","text":"Manish Parashar"},{"@pid":"66/1466","text":"Nagiza F. Samatova"},{"@pid":"s/KarstenSchwan","text":"Karsten Schwan"},{"@pid":"s/ArieShoshani","text":"Arie Shoshani"},{"@pid":"15/434","text":"Matthew Wolf"},{"@pid":"30/4395","text":"Kesheng Wu"},{"@pid":"50/1859","text":"Weikuan Yu"}]},"title":"Hello ADIOS: the challenges and lessons of developing leadership class I/O frameworks.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"7","pages":"1453-1473","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/LiuLTAPCKTLOPSSSWWY14","doi":"10.1002/CPE.3125","ee":"https://doi.org/10.1002/cpe.3125","url":"https://dblp.org/rec/journals/concurrency/LiuLTAPCKTLOPSSSWWY14"}, "url":"URL#3717723" }, { "@score":"1", "@id":"3717724", "info":{"authors":{"author":[{"@pid":"13/5407","text":"Xuan Liu"},{"@pid":"48/6848","text":"Simon J. E. Taylor"},{"@pid":"04/3633","text":"Navonil Mustafee"},{"@pid":"125/8189","text":"Jun Wang"},{"@pid":"86/3163-1","text":"Qian Gao 0001"},{"@pid":"g/DavidRGilbert","text":"David R. Gilbert"}]},"title":"Speeding up systems biology simulations of biochemical pathways using condor.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"17","pages":"2727-2742","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/LiuTMWGG14","doi":"10.1002/CPE.3161","ee":"https://doi.org/10.1002/cpe.3161","url":"https://dblp.org/rec/journals/concurrency/LiuTMWGG14"}, "url":"URL#3717724" }, { "@score":"1", "@id":"3717725", "info":{"authors":{"author":[{"@pid":"22/2080-1","text":"Shengli Liu 0001"},{"@pid":"52/2421","text":"Fangguo Zhang"},{"@pid":"66/5496","text":"Kefei Chen"}]},"title":"Public-key encryption scheme with selective opening chosen-ciphertext security based on the Decisional Diffie-Hellman assumption.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"8","pages":"1506-1519","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/LiuZC14","doi":"10.1002/CPE.3021","ee":"https://doi.org/10.1002/cpe.3021","url":"https://dblp.org/rec/journals/concurrency/LiuZC14"}, "url":"URL#3717725" }, { "@score":"1", "@id":"3717726", "info":{"authors":{"author":[{"@pid":"l/HWLoidl","text":"Hans-Wolfgang Loidl"},{"@pid":"82/2176","text":"Jeremy Singer"}]},"title":"SICSA multicore challenge editorial preface.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"4","pages":"929-934","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/LoidlS14","doi":"10.1002/CPE.3077","ee":"https://doi.org/10.1002/cpe.3077","url":"https://dblp.org/rec/journals/concurrency/LoidlS14"}, "url":"URL#3717726" }, { "@score":"1", "@id":"3717727", "info":{"authors":{"author":[{"@pid":"119/4477","text":"Oscar G. Lorenzo"},{"@pid":"65/2366","text":"Tomás F. Pena"},{"@pid":"24/6490","text":"José Carlos Cabaleiro"},{"@pid":"77/5822","text":"Juan Carlos Pichel"},{"@pid":"142/7756","text":"Juan Angel Lorenzo 0001"},{"@pid":"68/5325","text":"Francisco F. Rivera"}]},"title":"A hardware counter-based toolkit for the analysis of memory accesses in SMPs.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"6","pages":"1328-1341","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/LorenzoPCPLR14","doi":"10.1002/CPE.3122","ee":"https://doi.org/10.1002/cpe.3122","url":"https://dblp.org/rec/journals/concurrency/LorenzoPCPLR14"}, "url":"URL#3717727" }, { "@score":"1", "@id":"3717728", "info":{"authors":{"author":[{"@pid":"92/397","text":"Hatem Ltaief"},{"@pid":"61/7413","text":"Rio Yokota"}]},"title":"Data-driven execution of fast multipole methods.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"11","pages":"1935-1946","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/LtaiefY14","doi":"10.1002/CPE.3132","ee":"https://doi.org/10.1002/cpe.3132","url":"https://dblp.org/rec/journals/concurrency/LtaiefY14"}, "url":"URL#3717728" }, { "@score":"1", "@id":"3717729", "info":{"authors":{"author":[{"@pid":"123/7188","text":"Minggang Luo"},{"@pid":"54/6850","text":"Liping Li"},{"@pid":"133/7131","text":"Guobing Qian"},{"@pid":"144/8490","text":"Jianqi Lu"}]},"title":"A blind modulation identification algorithm for STBC systems using multidimensional ICA.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"8","pages":"1490-1505","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/LuoLQL14","doi":"10.1002/CPE.3062","ee":"https://doi.org/10.1002/cpe.3062","url":"https://dblp.org/rec/journals/concurrency/LuoLQL14"}, "url":"URL#3717729" }, { "@score":"1", "@id":"3717730", "info":{"authors":{"author":[{"@pid":"90/6959","text":"Yuan Luo"},{"@pid":"54/6437","text":"Beth Plale"},{"@pid":"41/294-4","text":"Zhenhua Guo 0004"},{"@pid":"54/6316","text":"Wilfred W. Li"},{"@pid":"68/8357","text":"Judy Qiu"},{"@pid":"36/2423","text":"Yiming Sun"}]},"title":"Hierarchical MapReduce: towards simplified cross-domain data processing.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"4","pages":"878-893","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/LuoPGLQS14","doi":"10.1002/CPE.2929","ee":"https://doi.org/10.1002/cpe.2929","url":"https://dblp.org/rec/journals/concurrency/LuoPGLQS14"}, "url":"URL#3717730" }, { "@score":"1", "@id":"3717731", "info":{"authors":{"author":[{"@pid":"139/4070","text":"Muhammad Ridwan Madarbux"},{"@pid":"139/4049","text":"Anouk Van Laer"},{"@pid":"01/8857","text":"Philip M. Watts"},{"@pid":"62/1131","text":"Timothy M. Jones 0001"}]},"title":"Towards zero latency photonic switching in shared memory networks.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"15","pages":"2551-2566","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/MadarbuxLWJ14","doi":"10.1002/CPE.3334","ee":"https://doi.org/10.1002/cpe.3334","url":"https://dblp.org/rec/journals/concurrency/MadarbuxLWJ14"}, "url":"URL#3717731" }, { "@score":"1", "@id":"3717732", "info":{"authors":{"author":[{"@pid":"02/1272","text":"Ravi K. Madduri"},{"@pid":"46/3787","text":"Dinanath Sulakhe"},{"@pid":"93/6969","text":"Lukasz Lacinski"},{"@pid":"58/2670","text":"Bo Liu"},{"@pid":"41/2229","text":"Alex Rodriguez"},{"@pid":"10/6661","text":"Kyle Chard"},{"@pid":"146/9515","text":"Utpal J. Dave"},{"@pid":"f/IanTFoster","text":"Ian T. Foster"}]},"title":"Experiences building Globus Genomics: a next-generation sequencing analysis service using Galaxy, Globus, and Amazon Web Services.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"13","pages":"2266-2279","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/MadduriSLLRCDF14","doi":"10.1002/CPE.3274","ee":"https://doi.org/10.1002/cpe.3274","url":"https://dblp.org/rec/journals/concurrency/MadduriSLLRCDF14"}, "url":"URL#3717732" }, { "@score":"1", "@id":"3717733", "info":{"authors":{"author":[{"@pid":"122/8667","text":"Radu-Corneliu Marin"},{"@pid":"39/3222","text":"Ciprian Dobre"},{"@pid":"80/6437","text":"Fatos Xhafa"}]},"title":"A methodology for assessing the predictable behaviour of mobile users in wireless networks.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"5","pages":"1215-1230","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/MarinDX14","doi":"10.1002/CPE.3064","ee":"https://doi.org/10.1002/cpe.3064","url":"https://dblp.org/rec/journals/concurrency/MarinDX14"}, "url":"URL#3717733" }, { "@score":"1", "@id":"3717734", "info":{"authors":{"author":[{"@pid":"11/4360","text":"Diego Rodríguez Martínez"},{"@pid":"02/3794","text":"Vicente Blanco Pérez"},{"@pid":"24/6490","text":"José Carlos Cabaleiro"},{"@pid":"65/2366","text":"Tomás F. Pena"},{"@pid":"68/5325","text":"Francisco F. Rivera"}]},"title":"Modeling the performance of parallel applications using model selection techniques.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"2","pages":"586-599","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/MartinezBCPR14","doi":"10.1002/CPE.3020","ee":"https://doi.org/10.1002/cpe.3020","url":"https://dblp.org/rec/journals/concurrency/MartinezBCPR14"}, "url":"URL#3717734" }, { "@score":"1", "@id":"3717735", "info":{"authors":{"author":[{"@pid":"96/701","text":"Jan P. Meier-Kolthoff"},{"@pid":"60/1863","text":"Alexander F. Auch"},{"@pid":"126/7117","text":"Hans-Peter Klenk"},{"@pid":"64/5757","text":"Markus Göker"}]},"title":"Highly parallelized inference of large genome-based phylogenies.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"10","pages":"1715-1729","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/Meier-KolthoffAKG14","doi":"10.1002/CPE.3112","ee":"https://doi.org/10.1002/cpe.3112","url":"https://dblp.org/rec/journals/concurrency/Meier-KolthoffAKG14"}, "url":"URL#3717735" }, { "@score":"1", "@id":"3717736", "info":{"authors":{"author":[{"@pid":"m/NouredineMelab","text":"Nouredine Melab"},{"@pid":"116/2990","text":"Imen Chakroun"},{"@pid":"19/5439","text":"Ahcène Bendjoudi"}]},"title":"Graphics processing unit-accelerated bounding for branch-and-bound applied to a permutation problem using data access optimization.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"16","pages":"2667-2683","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/MelabCB14","doi":"10.1002/CPE.3155","ee":"https://doi.org/10.1002/cpe.3155","url":"https://dblp.org/rec/journals/concurrency/MelabCB14"}, "url":"URL#3717736" }, { "@score":"1", "@id":"3717737", "info":{"authors":{"author":[{"@pid":"88/1003","text":"M. Shahbaz Memon"},{"@pid":"80/6331","text":"Morris Riedel"},{"@pid":"29/2604","text":"Florian Janetzko"},{"@pid":"08/134","text":"Borries Demeler"},{"@pid":"132/7608","text":"Gary Gorbet"},{"@pid":"09/1760","text":"Suresh Marru"},{"@pid":"g/AndrewSGrimshaw","text":"Andrew S. Grimshaw"},{"@pid":"119/4450","text":"Lahiru Gunathilake"},{"@pid":"17/7554","text":"Raminder Singh"},{"@pid":"06/4736","text":"Norbert Attig"},{"@pid":"13/5159","text":"Thomas Lippert"}]},"title":"Advancements of the UltraScan scientific gateway for open standards-based cyberinfrastructures.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"13","pages":"2280-2291","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/MemonRJDGMGGSAL14","doi":"10.1002/CPE.3251","ee":"https://doi.org/10.1002/cpe.3251","url":"https://dblp.org/rec/journals/concurrency/MemonRJDGMGGSAL14"}, "url":"URL#3717737" }, { "@score":"1", "@id":"3717738", "info":{"authors":{"author":[{"@pid":"44/4915","text":"Daniel Sadoc Menasché"},{"@pid":"99/5728","text":"Alberto Avritzer"},{"@pid":"125/8011","text":"Sindhu Suresh"},{"@pid":"l/RosaMMLeao","text":"Rosa Maria Meri Leão"},{"@pid":"96/5137","text":"Edmundo de Souza e Silva"},{"@pid":"16/2798","text":"Morganna C. Diniz"},{"@pid":"t/KishorSTrivedi","text":"Kishor S. Trivedi"},{"@pid":"42/7630","text":"Lucia Happe"},{"@pid":"51/1757","text":"Anne Koziolek"}]},"title":"Assessing survivability of smart grid distribution network designs accounting for multiple failures.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"12","pages":"1949-1974","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/MenascheASLSDTHK14","doi":"10.1002/CPE.3241","ee":"https://doi.org/10.1002/cpe.3241","url":"https://dblp.org/rec/journals/concurrency/MenascheASLSDTHK14"}, "url":"URL#3717738" }, { "@score":"1", "@id":"3717739", "info":{"authors":{"author":[{"@pid":"14/11145","text":"Qingyu Meng"},{"@pid":"b/MartinBerzins","text":"Martin Berzins"}]},"title":"Scalable large-scale fluid-structure interaction solvers in the Uintah framework via hybrid task-based parallelism algorithms.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"7","pages":"1388-1407","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/MengB14","doi":"10.1002/CPE.3099","ee":"https://doi.org/10.1002/cpe.3099","url":"https://dblp.org/rec/journals/concurrency/MengB14"}, "url":"URL#3717739" }, { "@score":"1", "@id":"3717740", "info":{"authors":{"author":[{"@pid":"61/2401","text":"Ivan Merelli"},{"@pid":"71/7922","text":"Horacio Emilio Pérez Sánchez"},{"@pid":"75/8291","text":"Sandra Gesing"},{"@pid":"11/4958","text":"Daniele D'Agostino"}]},"title":"Latest advances in distributed, parallel, and graphic processing unit accelerated approaches to computational biology.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"10","pages":"1699-1704","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/MerelliSGD14","doi":"10.1002/CPE.3111","ee":"https://doi.org/10.1002/cpe.3111","url":"https://dblp.org/rec/journals/concurrency/MerelliSGD14"}, "url":"URL#3717740" }, { "@score":"1", "@id":"3717741", "info":{"authors":{"author":[{"@pid":"43/8524","text":"Scott Michael"},{"@pid":"81/8357","text":"Abhinav Thota"},{"@pid":"45/5245","text":"Robert Henschel"},{"@pid":"64/5267","text":"Richard Knepper"}]},"title":"Making campus bridging work for researchers: Can campus bridging experts accelerate discovery?","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"13","pages":"2141-2148","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/MichaelTHK14","doi":"10.1002/CPE.3266","ee":"https://doi.org/10.1002/cpe.3266","url":"https://dblp.org/rec/journals/concurrency/MichaelTHK14"}, "url":"URL#3717741" }, { "@score":"1", "@id":"3717742", "info":{"authors":{"author":[{"@pid":"96/1221","text":"Josh Milthorpe"},{"@pid":"54/3648","text":"Alistair P. Rendell"},{"@pid":"91/3860","text":"Thomas Huber"}]},"title":"PGAS-FMM: Implementing a distributed fast multipole method using the X10 programming language.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"3","pages":"712-727","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/MilthorpeRH14","doi":"10.1002/CPE.3039","ee":"https://doi.org/10.1002/cpe.3039","url":"https://dblp.org/rec/journals/concurrency/MilthorpeRH14"}, "url":"URL#3717742" }, { "@score":"1", "@id":"3717743", "info":{"authors":{"author":[{"@pid":"93/11467","text":"Lawrence Mitchell"},{"@pid":"88/6306","text":"Terence M. Sloan"},{"@pid":"28/4623","text":"Muriel Mewissen"},{"@pid":"27/4878","text":"Peter Ghazal"},{"@pid":"85/7106","text":"Thorsten Forster"},{"@pid":"21/1335","text":"Michal Piotrowski"},{"@pid":"80/3651","text":"Arthur S. Trew"}]},"title":"Parallel classification and feature selection in microarray data using SPRINT.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"4","pages":"854-865","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/MitchellSMGFPT14","doi":"10.1002/CPE.2928","ee":"https://doi.org/10.1002/cpe.2928","url":"https://dblp.org/rec/journals/concurrency/MitchellSMGFPT14"}, "url":"URL#3717743" }, { "@score":"1", "@id":"3717744", "info":{"authors":{"author":[{"@pid":"132/7526","text":"Anup Mohan"},{"@pid":"82/5321","text":"Thomas J. Hacker"},{"@pid":"87/1293","text":"Gregory P. Rodgers"},{"@pid":"10/7555","text":"Tanzima Z. Islam"}]},"title":"Batchsubmit: a high-volume batch submission system for earthquake engineering simulation.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"13","pages":"2240-2252","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/MohanHRI14","doi":"10.1002/CPE.3234","ee":"https://doi.org/10.1002/cpe.3234","url":"https://dblp.org/rec/journals/concurrency/MohanHRI14"}, "url":"URL#3717744" }, { "@score":"1", "@id":"3717745", "info":{"authors":{"author":[{"@pid":"22/1499","text":"Péter Molnár"},{"@pid":"149/0364","text":"David M. Toth"},{"@pid":"132/7570","text":"Rachel E. Vincent-Finley"}]},"title":"Development of undergraduate and graduate programs in computational science.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"13","pages":"2329-2335","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/MolnarTV14","doi":"10.1002/CPE.3227","ee":"https://doi.org/10.1002/cpe.3227","url":"https://dblp.org/rec/journals/concurrency/MolnarTV14"}, "url":"URL#3717745" }, { "@score":"1", "@id":"3717746", "info":{"authors":{"author":[{"@pid":"82/1425","text":"Silas De Munck"},{"@pid":"49/6770","text":"Kurt Vanmechelen"},{"@pid":"79/626","text":"Jan Broeckhove"}]},"title":"Revisiting conservative time synchronization protocols in parallel and distributed simulation.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"2","pages":"468-490","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/MunckVB14","doi":"10.1002/CPE.3007","ee":"https://doi.org/10.1002/cpe.3007","url":"https://dblp.org/rec/journals/concurrency/MunckVB14"}, "url":"URL#3717746" }, { "@score":"1", "@id":"3717747", "info":{"authors":{"author":[{"@pid":"61/2764-1","text":"Zoltán Nagy 0001"},{"@pid":"01/10351","text":"Csaba Nemes"},{"@pid":"121/1678","text":"Antal Hiba"},{"@pid":"26/7936","text":"Árpád Csík"},{"@pid":"05/7937","text":"András Kiss"},{"@pid":"74/538","text":"Miklós Ruszinkó"},{"@pid":"68/4099","text":"Péter Szolgay"}]},"title":"Accelerating unstructured finite volume computations on field-programmable gate arrays.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"3","pages":"615-643","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/NagyNHCKRS14","doi":"10.1002/CPE.3022","ee":"https://doi.org/10.1002/cpe.3022","url":"https://dblp.org/rec/journals/concurrency/NagyNHCKRS14"}, "url":"URL#3717747" }, { "@score":"1", "@id":"3717748", "info":{"authors":{"author":[{"@pid":"125/7863","text":"Marta Ortín-Obón"},{"@pid":"129/7560","text":"Luca Ramini"},{"@pid":"52/512","text":"Víctor Viñals"},{"@pid":"48/5390","text":"Davide Bertozzi"}]},"title":"Capturing the sensitivity of optical network quality metrics to its network interface parameters.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"15","pages":"2504-2517","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/Ortin-ObonRVB14","doi":"10.1002/CPE.3330","ee":"https://doi.org/10.1002/cpe.3330","url":"https://dblp.org/rec/journals/concurrency/Ortin-ObonRVB14"}, "url":"URL#3717748" }, { "@score":"1", "@id":"3717749", "info":{"authors":{"author":[{"@pid":"78/14","text":"Anand Padmanabhan"},{"@pid":"07/852","text":"Shaowen Wang"},{"@pid":"06/7551","text":"Guofeng Cao"},{"@pid":"27/7550","text":"Myunghwa Hwang"},{"@pid":"60/2293","text":"Zhenhua Zhang"},{"@pid":"132/7629","text":"Yizhao Gao"},{"@pid":"149/0369","text":"Kiumars Soltani"},{"@pid":"l/YanLiu9","text":"Yan Liu 0009"}]},"title":"FluMapper: a cyberGIS application for interactive analysis of massive location-based social media.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"13","pages":"2253-2265","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/PadmanabhanWCHZGSL14","doi":"10.1002/CPE.3287","ee":"https://doi.org/10.1002/cpe.3287","url":"https://dblp.org/rec/journals/concurrency/PadmanabhanWCHZGSL14"}, "url":"URL#3717749" }, { "@score":"1", "@id":"3717750", "info":{"authors":{"author":[{"@pid":"62/9082","text":"Vivek K. Pallipuram"},{"@pid":"89/3990","text":"Melissa C. Smith"},{"@pid":"140/2407","text":"Nimisha Raut"},{"@pid":"44/3051","text":"Xiaoyu Ren"}]},"title":"A regression-based performance prediction framework for synchronous iterative algorithms on general purpose graphical processing unit clusters.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"2","pages":"532-560","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/PallipuramSRR14","doi":"10.1002/CPE.3017","ee":"https://doi.org/10.1002/cpe.3017","url":"https://dblp.org/rec/journals/concurrency/PallipuramSRR14"}, "url":"URL#3717750" }, { "@score":"1", "@id":"3717751", "info":{"authors":{"author":[{"@pid":"86/2508-2","text":"Francesco Palmieri 0002"},{"@pid":"56/6378","text":"Ugo Fiore"},{"@pid":"46/295","text":"Aniello Castiglione"}]},"title":"A distributed approach to network anomaly detection based on independent component analysis.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"5","pages":"1113-1129","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/PalmieriFC14","doi":"10.1002/CPE.3061","ee":"https://doi.org/10.1002/cpe.3061","url":"https://dblp.org/rec/journals/concurrency/PalmieriFC14"}, "url":"URL#3717751" }, { "@score":"1", "@id":"3717752", "info":{"authors":{"author":[{"@pid":"77/6767","text":"Jose Antonio Pascual"},{"@pid":"53/6857","text":"José Miguel-Alonso"},{"@pid":"l/JoseAntonioLozano","text":"José Antonio Lozano 0001"}]},"title":"A fast implementation of the first fit contiguous partitioning strategy for cubic topologies.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"17","pages":"2792-2810","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/PascualML14","doi":"10.1002/CPE.3174","ee":"https://doi.org/10.1002/cpe.3174","url":"https://dblp.org/rec/journals/concurrency/PascualML14"}, "url":"URL#3717752" }, { "@score":"1", "@id":"3717753", "info":{"authors":{"author":[{"@pid":"82/8296","text":"Piotr Pawliczek"},{"@pid":"d/WitoldDzwinel","text":"Witold Dzwinel"},{"@pid":"46/5573","text":"David A. Yuen"}]},"title":"Visual exploration of data by using multidimensional scaling on multicore CPU, GPU, and MPI cluster.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"3","pages":"662-682","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/PawliczekDY14","doi":"10.1002/CPE.3027","ee":"https://doi.org/10.1002/cpe.3027","url":"https://dblp.org/rec/journals/concurrency/PawliczekDY14"}, "url":"URL#3717753" }, { "@score":"1", "@id":"3717754", "info":{"authors":{"author":[{"@pid":"13/11029","text":"Yali Peng"},{"@pid":"67/5807","text":"Fang Liu"},{"@pid":"88/2562","text":"Shigang Liu"}]},"title":"Active contours driven by normalized local image fitting energy.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"5","pages":"1200-1214","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/PengLL14","doi":"10.1002/CPE.3053","ee":"https://doi.org/10.1002/cpe.3053","url":"https://dblp.org/rec/journals/concurrency/PengLL14"}, "url":"URL#3717754" }, { "@score":"1", "@id":"3717755", "info":{"authors":{"author":[{"@pid":"89/6609-3","text":"Tao Peng 0003"},{"@pid":"31/2088-13","text":"Lu Liu 0013"},{"@pid":"64/1676","text":"Wanli Zuo"}]},"title":"PU text classification enhanced by term frequency-inverse document frequency-improved weighting.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"3","pages":"728-741","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/PengLZ14","doi":"10.1002/CPE.3040","ee":"https://doi.org/10.1002/cpe.3040","url":"https://dblp.org/rec/journals/concurrency/PengLZ14"}, "url":"URL#3717755" }, { "@score":"1", "@id":"3717756", "info":{"authors":{"author":[{"@pid":"77/757","text":"Satish Penmatsa"},{"@pid":"69/79","text":"Anthony T. Chronopoulos"}]},"title":"Cost minimization in utility computing systems.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"1","pages":"287-307","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/PenmatsaC14","doi":"10.1002/CPE.2984","ee":"https://doi.org/10.1002/cpe.2984","url":"https://dblp.org/rec/journals/concurrency/PenmatsaC14"}, "url":"URL#3717756" }, { "@score":"1", "@id":"3717757", "info":{"authors":{"author":[{"@pid":"24/9168-1","text":"Daniel Perry 0001"},{"@pid":"126/1834","text":"John J. Robinson"},{"@pid":"132/7552","text":"Stephanie Cruz"},{"@pid":"66/5226","text":"Cecilia R. Aragon"},{"@pid":"132/7646","text":"Jeanne Ting Chowning"},{"@pid":"132/7642","text":"Mette A. Peters"}]},"title":"Game design for bioinformatics and cyberinfrastructure learning: a parallel computing case study.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"13","pages":"2303-2315","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/PerryRCACP14","doi":"10.1002/CPE.3261","ee":"https://doi.org/10.1002/cpe.3261","url":"https://dblp.org/rec/journals/concurrency/PerryRCACP14"}, "url":"URL#3717757" }, { "@score":"1", "@id":"3717758", "info":{"authors":{"author":[{"@pid":"36/3217","text":"Achille Peternier"},{"@pid":"p/CesarePautasso","text":"Cesare Pautasso"},{"@pid":"05/3695","text":"Walter Binder"},{"@pid":"51/8686","text":"Daniele Bonetta"}]},"title":"High-performance execution of service compositions: a multicore-aware engine design.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"1","pages":"71-97","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/PeternierPBB14","doi":"10.1002/CPE.2948","ee":"https://doi.org/10.1002/cpe.2948","url":"https://dblp.org/rec/journals/concurrency/PeternierPBB14"}, "url":"URL#3717758" }, { "@score":"1", "@id":"3717759", "info":{"authors":{"author":[{"@pid":"77/5822","text":"Juan Carlos Pichel"},{"@pid":"142/7756","text":"Juan Angel Lorenzo 0001"},{"@pid":"68/5325","text":"Francisco F. Rivera"},{"@pid":"35/3570","text":"Dora Blanco Heras"},{"@pid":"65/2366","text":"Tomás F. Pena"}]},"title":"Using sampled information: is it enough for the sparse matrix-vector product locality optimization?","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"1","pages":"98-117","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/PichelLRHP14","doi":"10.1002/CPE.2949","ee":"https://doi.org/10.1002/cpe.2949","url":"https://dblp.org/rec/journals/concurrency/PichelLRHP14"}, "url":"URL#3717759" }, { "@score":"1", "@id":"3717760", "info":{"authors":{"author":[{"@pid":"08/2911","text":"Jean-Marc Pierson"},{"@pid":"93/2122","text":"Lars Dittmann"},{"@pid":"37/2282","text":"Georges Da Costa"}]},"title":"Introduction to special issue on selected papers from Energy Efficiency in Large-Scale Distributed Systems 2013 conference.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"15","pages":"2567-2568","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/PiersonDC14","doi":"10.1002/CPE.3339","ee":"https://doi.org/10.1002/cpe.3339","url":"https://dblp.org/rec/journals/concurrency/PiersonDC14"}, "url":"URL#3717760" }, { "@score":"1", "@id":"3717761", "info":{"authors":{"author":[{"@pid":"142/2063","text":"Xiaoting Pu"},{"@pid":"18/3664","text":"Zhenhong Jia"},{"@pid":"116/7864","text":"Liejun Wang"},{"@pid":"68/6607","text":"Yingjie Hu"},{"@pid":"12/1198-2","text":"Jie Yang 0002"}]},"title":"The remote sensing image enhancement based on nonsubsampled contourlet transform and unsharp masking.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"3","pages":"742-747","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/PuJWHY14","doi":"10.1002/CPE.3041","ee":"https://doi.org/10.1002/cpe.3041","url":"https://dblp.org/rec/journals/concurrency/PuJWHY14"}, "url":"URL#3717761" }, { "@score":"1", "@id":"3717762", "info":{"authors":{"author":[{"@pid":"139/3338","text":"Arthur Pyka"},{"@pid":"139/3240","text":"Mathias Rohde"},{"@pid":"20/5553","text":"Sascha Uhrig"}]},"title":"A real-time capable coherent data cache for multicores.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"6","pages":"1342-1354","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/PykaRU14","doi":"10.1002/CPE.3172","ee":"https://doi.org/10.1002/cpe.3172","url":"https://dblp.org/rec/journals/concurrency/PykaRU14"}, "url":"URL#3717762" }, { "@score":"1", "@id":"3717763", "info":{"authors":{"author":[{"@pid":"68/8357","text":"Judy Qiu"},{"@pid":"f/IanTFoster","text":"Ian T. Foster"},{"@pid":"g/CaroleAGoble","text":"Carole A. Goble"}]},"title":"Emerging Computational Methods for the Life Sciences Workshop 2012.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"6","pages":"1231-1233","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/QiuFG14","doi":"10.1002/CPE.3101","ee":"https://doi.org/10.1002/cpe.3101","url":"https://dblp.org/rec/journals/concurrency/QiuFG14"}, "url":"URL#3717763" }, { "@score":"1", "@id":"3717764", "info":{"authors":{"author":[{"@pid":"68/8357","text":"Judy Qiu"},{"@pid":"f/IanTFoster","text":"Ian T. Foster"},{"@pid":"36/5997","text":"Ronald C. Taylor"}]},"title":"Special Issue for Emerging Computational Methods for the Life Sciences Workshop.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"4","pages":"851-853","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/QiuFT14","doi":"10.1002/CPE.2998","ee":"https://doi.org/10.1002/cpe.2998","url":"https://dblp.org/rec/journals/concurrency/QiuFT14"}, "url":"URL#3717764" }, { "@score":"1", "@id":"3717765", "info":{"authors":{"author":[{"@pid":"02/7847","text":"Dyer Rolán"},{"@pid":"38/10","text":"Diego Andrade"},{"@pid":"f/BBFraguela","text":"Basilio B. Fraguela"},{"@pid":"04/5260","text":"Ramon Doallo"}]},"title":"A fine-grained thread-aware management policy for shared caches.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"6","pages":"1355-1374","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/RolanAFD14","doi":"10.1002/CPE.3123","ee":"https://doi.org/10.1002/cpe.3123","url":"https://dblp.org/rec/journals/concurrency/RolanAFD14"}, "url":"URL#3717765" }, { "@score":"1", "@id":"3717766", "info":{"authors":{"author":[{"@pid":"89/8571","text":"Álvaro Rubio-Largo"},{"@pid":"v/MiguelAVegaRodriguez","text":"Miguel A. Vega-Rodríguez"},{"@pid":"55/8571","text":"David L. González-Álvarez"}]},"title":"Designing a fine-grained parallel differential evolution with Pareto tournaments for solving an optical networking problem.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"11","pages":"1908-1934","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/Rubio-LargoVG14","doi":"10.1002/CPE.3126","ee":"https://doi.org/10.1002/cpe.3126","url":"https://dblp.org/rec/journals/concurrency/Rubio-LargoVG14"}, "url":"URL#3717766" }, { "@score":"1", "@id":"3717767", "info":{"authors":{"author":[{"@pid":"128/1447","text":"Ahmad Salah"},{"@pid":"l/KenliLi","text":"Kenli Li 0001"}]},"title":"PAR-3D-BLAST: A parallel tool for searching and aligning protein structures.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"10","pages":"1705-1714","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/SalahL14","doi":"10.1002/CPE.3114","ee":"https://doi.org/10.1002/cpe.3114","url":"https://dblp.org/rec/journals/concurrency/SalahL14"}, "url":"URL#3717767" }, { "@score":"1", "@id":"3717768", "info":{"authors":{"author":[{"@pid":"53/2578","text":"Mohsen Amini Salehi"},{"@pid":"79/5060","text":"Bahman Javadi"},{"@pid":"b/RajkumarBuyya","text":"Rajkumar Buyya"}]},"title":"Resource provisioning based on preempting virtual machines in distributed systems.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"2","pages":"412-433","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/SalehiJB14","doi":"10.1002/CPE.3004","ee":"https://doi.org/10.1002/cpe.3004","url":"https://dblp.org/rec/journals/concurrency/SalehiJB14"}, "url":"URL#3717768" }, { "@score":"1", "@id":"3717769", "info":{"authors":{"author":[{"@pid":"25/6185","text":"Jibonananda Sanyal"},{"@pid":"86/4793","text":"Joshua R. New"},{"@pid":"89/9799","text":"Richard E. Edwards"},{"@pid":"33/1556","text":"Lynne E. Parker"}]},"title":"Calibrating building energy models using supercomputer trained machine learning agents.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"13","pages":"2122-2133","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/SanyalNEP14","doi":"10.1002/CPE.3267","ee":"https://doi.org/10.1002/cpe.3267","url":"https://dblp.org/rec/journals/concurrency/SanyalNEP14"}, "url":"URL#3717769" }, { "@score":"1", "@id":"3717770", "info":{"authors":{"author":[{"@pid":"49/7871","text":"Kwang Sup Shin"},{"@pid":"99/5286","text":"Myoung-Ju Park"},{"@pid":"72/4892-1","text":"Jae-Yoon Jung 0001"}]},"title":"Dynamic task assignment and resource management in cloud services by using bargaining solution.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"7","pages":"1432-1452","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/ShinPJ14","doi":"10.1002/CPE.3124","ee":"https://doi.org/10.1002/cpe.3124","url":"https://dblp.org/rec/journals/concurrency/ShinPJ14"}, "url":"URL#3717770" }, { "@score":"1", "@id":"3717771", "info":{"authors":{"author":[{"@pid":"08/10040","text":"Rafael Ferreira da Silva"},{"@pid":"96/4513","text":"Tristan Glatard"},{"@pid":"d/FredericDesprez","text":"Frédéric Desprez"}]},"title":"Controlling fairness and task granularity in distributed, online, non-clairvoyant workflow executions.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"14","pages":"2347-2366","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/SilvaGD14","doi":"10.1002/CPE.3303","ee":"https://doi.org/10.1002/cpe.3303","url":"https://dblp.org/rec/journals/concurrency/SilvaGD14"}, "url":"URL#3717771" }, { "@score":"1", "@id":"3717772", "info":{"authors":{"author":[{"@pid":"136/5554","text":"Artjoms Sinkarovs"},{"@pid":"19/3841","text":"Sven-Bodo Scholz"},{"@pid":"25/2863","text":"Robert Bernecky"},{"@pid":"130/0716","text":"Roeland Douma"},{"@pid":"54/1303","text":"Clemens Grelck"}]},"title":"SaC/C formulations of the all-pairs N-body problem and their performance on SMPs and GPGPUs.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"4","pages":"952-971","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/SinkarovsSBDG14","doi":"10.1002/CPE.3078","ee":"https://doi.org/10.1002/cpe.3078","url":"https://dblp.org/rec/journals/concurrency/SinkarovsSBDG14"}, "url":"URL#3717772" }, { "@score":"1", "@id":"3717773", "info":{"authors":{"author":[{"@pid":"96/5652","text":"Paulo S. L. Souza"},{"@pid":"35/1622","text":"Simone do Rócio Senger de Souza"},{"@pid":"80/1006","text":"Ed Zaluska"}]},"title":"Structural testing for message-passing concurrent programs: an extended test model.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"1","pages":"21-50","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/SouzaSZ14","doi":"10.1002/CPE.2937","ee":"https://doi.org/10.1002/cpe.2937","url":"https://dblp.org/rec/journals/concurrency/SouzaSZ14"}, "url":"URL#3717773" }, { "@score":"1", "@id":"3717774", "info":{"authors":{"author":[{"@pid":"32/5543","text":"Concetto Spampinato"},{"@pid":"44/9809","text":"Isaak Kavasidis"},{"@pid":"75/5249","text":"Marco Aldinucci"},{"@pid":"92/10039","text":"Carmelo Pino"},{"@pid":"88/738","text":"Daniela Giordano"},{"@pid":"94/967","text":"Alberto Faro"}]},"title":"Discovering biological knowledge by integrating high-throughput data and scientific literature on the cloud.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"10","pages":"1771-1786","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/SpampinatoKAPGF14","doi":"10.1002/CPE.3130","ee":"https://doi.org/10.1002/cpe.3130","url":"https://dblp.org/rec/journals/concurrency/SpampinatoKAPGF14"}, "url":"URL#3717774" }, { "@score":"1", "@id":"3717775", "info":{"authors":{"author":[{"@pid":"25/11254","text":"Larissa Stanberry"},{"@pid":"96/836","text":"Roger Higdon"},{"@pid":"56/11253","text":"Winston Haynes"},{"@pid":"65/11249","text":"Natali Kolker"},{"@pid":"39/11254","text":"William Broomall"},{"@pid":"79/8357","text":"Saliya Ekanayake"},{"@pid":"76/9079","text":"Adam Hughes"},{"@pid":"84/9079","text":"Yang Ruan"},{"@pid":"68/8357","text":"Judy Qiu"},{"@pid":"79/3306","text":"Eugene Kolker"},{"@pid":"f/GeoffreyFox","text":"Geoffrey C. Fox"}]},"title":"Visualizing the Protein Sequence Universe.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"6","pages":"1313-1325","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/StanberryHHKBEHRQKF14","doi":"10.1002/CPE.3072","ee":"https://doi.org/10.1002/cpe.3072","url":"https://dblp.org/rec/journals/concurrency/StanberryHHKBEHRQKF14"}, "url":"URL#3717775" }, { "@score":"1", "@id":"3717776", "info":{"authors":{"author":[{"@pid":"25/11254","text":"Larissa Stanberry"},{"@pid":"132/7574","text":"Bhanu Rekepalli"},{"@pid":"87/2948","text":"Yuan Liu"},{"@pid":"132/7544","text":"Paul Giblock"},{"@pid":"96/836","text":"Roger Higdon"},{"@pid":"149/0365","text":"Elizabeth Montague"},{"@pid":"39/11254","text":"William Broomall"},{"@pid":"65/11249","text":"Natali Kolker"},{"@pid":"79/3306","text":"Eugene Kolker"}]},"title":"Optimizing high performance computing workflow for protein functional annotation.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"13","pages":"2112-2121","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/StanberryRLGHMBKK14","doi":"10.1002/CPE.3264","ee":"https://doi.org/10.1002/cpe.3264","url":"https://dblp.org/rec/journals/concurrency/StanberryRLGHMBKK14"}, "url":"URL#3717776" }, { "@score":"1", "@id":"3717777", "info":{"authors":{"author":[{"@pid":"133/2630","text":"Zhiquan Sui"},{"@pid":"55/1257","text":"Neil Harvey"},{"@pid":"p/ShrideepPallickara","text":"Shrideep Pallickara"}]},"title":"On the distributed orchestration of stochastic discrete event simulations.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"11","pages":"1889-1907","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/SuiHP14","doi":"10.1002/CPE.3121","ee":"https://doi.org/10.1002/cpe.3121","url":"https://dblp.org/rec/journals/concurrency/SuiHP14"}, "url":"URL#3717777" }, { "@score":"1", "@id":"3717778", "info":{"authors":{"author":[{"@pid":"98/9828","text":"Mikolaj Szydlarski"},{"@pid":"73/9828","text":"Pierre Estérie"},{"@pid":"92/5853","text":"Joel Falcou"},{"@pid":"84/778","text":"Laura Grigori"},{"@pid":"92/8658","text":"Radek Stompor"}]},"title":"Parallel spherical harmonic transforms on heterogeneous architectures (graphics processing units/multi-core CPUs).","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"3","pages":"683-711","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/SzydlarskiEFGS14","doi":"10.1002/CPE.3038","ee":"https://doi.org/10.1002/cpe.3038","url":"https://dblp.org/rec/journals/concurrency/SzydlarskiEFGS14"}, "url":"URL#3717778" }, { "@score":"1", "@id":"3717779", "info":{"authors":{"author":[{"@pid":"73/4373-2","text":"Ming Tang 0002"},{"@pid":"77/10309","text":"Zhenlong Qiu"},{"@pid":"59/10083","text":"Weijie Li"},{"@pid":"136/0925","text":"Weijin Sun"},{"@pid":"289/7253","text":"Xiaobo Hu"},{"@pid":"60/2163","text":"Huanguo Zhang"}]},"title":"Power analysis based reverse engineering on the secret round function of block ciphers.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"8","pages":"1531-1545","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/TangQLSHZ14","doi":"10.1002/CPE.3068","ee":"https://doi.org/10.1002/cpe.3068","url":"https://dblp.org/rec/journals/concurrency/TangQLSHZ14"}, "url":"URL#3717779" }, { "@score":"1", "@id":"3717780", "info":{"authors":{"author":[{"@pid":"44/7010","text":"Peter Thoman"},{"@pid":"58/4240","text":"Herbert Jordan"},{"@pid":"31/5444","text":"Thomas Fahringer"}]},"title":"Compiler multiversioning for automatic task granularity control.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"14","pages":"2367-2385","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/ThomanJF14","doi":"10.1002/CPE.3302","ee":"https://doi.org/10.1002/cpe.3302","url":"https://dblp.org/rec/journals/concurrency/ThomanJF14"}, "url":"URL#3717780" }, { "@score":"1", "@id":"3717781", "info":{"authors":{"author":[{"@pid":"34/4880","text":"Ruppa K. Thulasiram"},{"@pid":"p/ManishParashar","text":"Manish Parashar"}]},"title":"Special issue on computational finance.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"9","pages":"1607-1608","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/ThulasiramP14","doi":"10.1002/CPE.3249","ee":"https://doi.org/10.1002/cpe.3249","url":"https://dblp.org/rec/journals/concurrency/ThulasiramP14"}, "url":"URL#3717781" }, { "@score":"1", "@id":"3717782", "info":{"authors":{"author":[{"@pid":"37/4787","text":"Chunqi Tian"},{"@pid":"62/2168","text":"Xiaojian Liu"},{"@pid":"76/6001","text":"Lisheng Wang"},{"@pid":"16/4301","text":"Shihong Zou"}]},"title":"Spreading evidence models for trust propagation and aggregation in peer-to-peer networks.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"2","pages":"601-614","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/TianLWZ14","doi":"10.1002/CPE.3159","ee":"https://doi.org/10.1002/cpe.3159","url":"https://dblp.org/rec/journals/concurrency/TianLWZ14"}, "url":"URL#3717782" }, { "@score":"1", "@id":"3717783", "info":{"authors":{"author":[{"@pid":"142/2055","text":"Matthew A. Titmus"},{"@pid":"81/8709","text":"James Gurtowski"},{"@pid":"89/7065","text":"Michael C. Schatz"}]},"title":"Answering the demands of digital genomics.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"4","pages":"917-928","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/TitmusGS14","doi":"10.1002/CPE.2925","ee":"https://doi.org/10.1002/cpe.2925","url":"https://dblp.org/rec/journals/concurrency/TitmusGS14"}, "url":"URL#3717783" }, { "@score":"1", "@id":"3717784", "info":{"authors":{"author":[{"@pid":"118/6907","text":"Pawan Kumar Tiwari"},{"@pid":"21/1893","text":"Deo Prakash Vidyarthi"}]},"title":"Observing the effect of interprocess communication in auto controlled ant colony optimization-based scheduling on computational grid.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"1","pages":"241-270","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/TiwariV14","doi":"10.1002/CPE.2977","ee":"https://doi.org/10.1002/cpe.2977","url":"https://dblp.org/rec/journals/concurrency/TiwariV14"}, "url":"URL#3717784" }, { "@score":"1", "@id":"3717785", "info":{"authors":{"author":[{"@pid":"142/2084","text":"Prabhat Totoo"},{"@pid":"l/HWLoidl","text":"Hans-Wolfgang Loidl"}]},"title":"Parallel Haskell implementations of the N-body problem.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"4","pages":"987-1019","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/TotooL14","doi":"10.1002/CPE.3087","ee":"https://doi.org/10.1002/cpe.3087","url":"https://dblp.org/rec/journals/concurrency/TotooL14"}, "url":"URL#3717785" }, { "@score":"1", "@id":"3717786", "info":{"authors":{"author":[{"@pid":"116/5116","text":"Michael Waechter"},{"@pid":"143/8868","text":"Kathrin Jaeger"},{"@pid":"130/6210","text":"Daniel Thuerck"},{"@pid":"143/8833","text":"Stephanie Weissgraeber"},{"@pid":"116/5196","text":"Sven Widmer"},{"@pid":"94/104","text":"Michael Goesele"},{"@pid":"01/7922","text":"Kay Hamacher"}]},"title":"Using graphics processing units to investigate molecular coevolution.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"6","pages":"1278-1296","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/WaechterJTWWGH14","doi":"10.1002/CPE.3074","ee":"https://doi.org/10.1002/cpe.3074","url":"https://dblp.org/rec/journals/concurrency/WaechterJTWWGH14"}, "url":"URL#3717786" }, { "@score":"1", "@id":"3717787", "info":{"authors":{"author":[{"@pid":"37/8502","text":"Jiechen Wang"},{"@pid":"33/320-1","text":"Can Cui 0001"},{"@pid":"140/2318","text":"Yikang Rui"},{"@pid":"72/5666-3","text":"Liang Cheng 0003"},{"@pid":"24/8497","text":"Yingxia Pu"},{"@pid":"140/2259","text":"Wenzhou Wu"},{"@pid":"21/7419","text":"ZhenYu Yuan"}]},"title":"A parallel algorithm for constructing Voronoi diagrams based on point-set adaptive grouping.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"2","pages":"434-446","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/WangCRCPWY14","doi":"10.1002/CPE.3005","ee":"https://doi.org/10.1002/cpe.3005","url":"https://dblp.org/rec/journals/concurrency/WangCRCPWY14"}, "url":"URL#3717787" }, { "@score":"1", "@id":"3717788", "info":{"authors":{"author":[{"@pid":"142/2065","text":"Yueqing Wang"},{"@pid":"76/305","text":"Yong Dou"},{"@pid":"01/267-3","text":"Song Guo 0003"},{"@pid":"89/1147","text":"Yuanwu Lei"},{"@pid":"70/877","text":"Dan Zou"}]},"title":"CPU-GPU hybrid parallel strategy for cosmological simulations.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"3","pages":"748-765","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/WangDGLZ14","doi":"10.1002/CPE.3046","ee":"https://doi.org/10.1002/cpe.3046","url":"https://dblp.org/rec/journals/concurrency/WangDGLZ14"}, "url":"URL#3717788" }, { "@score":"1", "@id":"3717789", "info":{"authors":{"author":[{"@pid":"37/4826","text":"Yilei Wang"},{"@pid":"70/1220-1","text":"Zhe Liu 0001"},{"@pid":"w/HaoWang-7","text":"Hao Wang 0007"},{"@pid":"07/63","text":"Qiuliang Xu"}]},"title":"Social rational secure multi-party computation.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"5","pages":"1067-1083","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/WangLWX14","doi":"10.1002/CPE.3057","ee":"https://doi.org/10.1002/cpe.3057","url":"https://dblp.org/rec/journals/concurrency/WangLWX14"}, "url":"URL#3717789" }, { "@score":"1", "@id":"3717790", "info":{"authors":{"author":[{"@pid":"39/7546","text":"Rick Weber"},{"@pid":"28/10210","text":"David D. Jenkins"},{"@pid":"26/4323","text":"Gregory D. Peterson"}]},"title":"Specmaster: an OpenCL-based peptide search engine for tandem mass spectrometry.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"6","pages":"1234-1248","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/WeberJP14","doi":"10.1002/CPE.3069","ee":"https://doi.org/10.1002/cpe.3069","url":"https://dblp.org/rec/journals/concurrency/WeberJP14"}, "url":"URL#3717790" }, { "@score":"1", "@id":"3717791", "info":{"authors":{"author":[{"@pid":"139/5280","text":"Nathan T. Weeks"},{"@pid":"86/3005","text":"Marina Kraeva"},{"@pid":"58/2033","text":"Glenn R. Luecke"}]},"title":"ipcmd: a command-line interface to System V semaphores and message queues.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"2","pages":"396-411","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/WeeksKL14","doi":"10.1002/CPE.3001","ee":"https://doi.org/10.1002/cpe.3001","url":"https://dblp.org/rec/journals/concurrency/WeeksKL14"}, "url":"URL#3717791" }, { "@score":"1", "@id":"3717792", "info":{"authors":{"author":[{"@pid":"144/8504","text":"Jingbo Wei"},{"@pid":"75/5408","text":"Dingsheng Liu"},{"@pid":"w/LizheWang","text":"Lizhe Wang 0001"}]},"title":"A general metric and parallel framework for adaptive image fusion in clusters.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"7","pages":"1375-1387","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/WeiLW14","doi":"10.1002/CPE.3037","ee":"https://doi.org/10.1002/cpe.3037","url":"https://dblp.org/rec/journals/concurrency/WeiLW14"}, "url":"URL#3717792" }, { "@score":"1", "@id":"3717793", "info":{"authors":{"author":[{"@pid":"29/8243","text":"Yuechuan Wei"},{"@pid":"95/11478-2","text":"Xiaoyuan Yang 0002"},{"@pid":"66/190","text":"Chao Li"}]},"title":"Impossible differential cryptanalysis on cipher E2.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"8","pages":"1477-1489","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/WeiYL14","doi":"10.1002/CPE.3043","ee":"https://doi.org/10.1002/cpe.3043","url":"https://dblp.org/rec/journals/concurrency/WeiYL14"}, "url":"URL#3717793" }, { "@score":"1", "@id":"3717794", "info":{"authors":{"author":[{"@pid":"92/6614","text":"Nancy Wilkins-Diehr"},{"@pid":"30/10102","text":"Amit Majumdar"}]},"title":"XSEDE13 Special Issue Conference Publications.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"13","pages":"2107-2111","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/Wilkins-DiehrM14","doi":"10.1002/CPE.3308","ee":"https://doi.org/10.1002/cpe.3308","url":"https://dblp.org/rec/journals/concurrency/Wilkins-DiehrM14"}, "url":"URL#3717794" }, { "@score":"1", "@id":"3717795", "info":{"authors":{"author":[{"@pid":"98/1975","text":"Todd Williamson"},{"@pid":"90/1985","text":"Ronald A. Olsson"}]},"title":"PySy: a Python package for enhanced concurrent programming.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"2","pages":"309-335","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/WilliamsonO14","doi":"10.1002/CPE.2981","ee":"https://doi.org/10.1002/cpe.2981","url":"https://dblp.org/rec/journals/concurrency/WilliamsonO14"}, "url":"URL#3717795" }, { "@score":"1", "@id":"3717796", "info":{"authors":{"author":[{"@pid":"86/2891","text":"Chung-Ju Wu"},{"@pid":"31/1876","text":"Chia-Han Lu"},{"@pid":"42/3701","text":"Jenq Kuen Lee"}]},"title":"Register spilling via transformed interference equations for PAC DSP architecture.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"3","pages":"779-799","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/WuLL14","doi":"10.1002/CPE.3051","ee":"https://doi.org/10.1002/cpe.3051","url":"https://dblp.org/rec/journals/concurrency/WuLL14"}, "url":"URL#3717796" }, { "@score":"1", "@id":"3717797", "info":{"authors":{"author":[{"@pid":"80/6437","text":"Fatos Xhafa"},{"@pid":"c/XiaofengChen1","text":"Xiaofeng Chen 0001"},{"@pid":"82/4944-1","text":"Xinyi Huang 0001"},{"@pid":"37/6021","text":"Vladi Kolici"}]},"title":"Advances in secure and intelligent data processing.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"5","pages":"1021-1022","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/Xhafa0HK14","doi":"10.1002/CPE.3066","ee":"https://doi.org/10.1002/cpe.3066","url":"https://dblp.org/rec/journals/concurrency/Xhafa0HK14"}, "url":"URL#3717797" }, { "@score":"1", "@id":"3717798", "info":{"authors":{"author":[{"@pid":"45/2601","text":"Qi Xie"},{"@pid":"w/GuilinWang","text":"Guilin Wang"},{"@pid":"68/10310","text":"Fubiao Xia"},{"@pid":"51/4249","text":"Deren Chen"}]},"title":"Self-certified proxy convertible authenticated encryption: formal definitions and a provably secure scheme.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"5","pages":"1038-1051","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/XieWXC14","doi":"10.1002/CPE.3058","ee":"https://doi.org/10.1002/cpe.3058","url":"https://dblp.org/rec/journals/concurrency/XieWXC14"}, "url":"URL#3717798" }, { "@score":"1", "@id":"3717799", "info":{"authors":{"author":[{"@pid":"85/2168-2","text":"Li Xu 0002"},{"@pid":"b/ElisaBertino","text":"Elisa Bertino"},{"@pid":"m/YiMu","text":"Yi Mu 0001"}]},"title":"Security of new generation computing systems.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"8","pages":"1475-1476","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/XuBM14","doi":"10.1002/CPE.3128","ee":"https://doi.org/10.1002/cpe.3128","url":"https://dblp.org/rec/journals/concurrency/XuBM14"}, "url":"URL#3717799" }, { "@score":"1", "@id":"3717800", "info":{"authors":{"author":[{"@pid":"83/2535-1","text":"Zheng Xu 0001"},{"@pid":"63/4996","text":"Xiangfeng Luo"},{"@pid":"84/4478-1","text":"Lin Mei 0001"},{"@pid":"119/2965","text":"Chuanping Hu"}]},"title":"Measuring the semantic discrimination capability of association relations.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"2","pages":"380-395","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/XuLMH14","doi":"10.1002/CPE.2999","ee":"https://doi.org/10.1002/cpe.2999","url":"https://dblp.org/rec/journals/concurrency/XuLMH14"}, "url":"URL#3717800" }, { "@score":"1", "@id":"3717801", "info":{"authors":{"author":[{"@pid":"31/1927","text":"Ichitaro Yamazaki"},{"@pid":"36/10422","text":"Tingxing Dong"},{"@pid":"117/3544","text":"Raffaele Solcà"},{"@pid":"02/5604","text":"Stanimire Tomov"},{"@pid":"d/JackDongarra","text":"Jack J. Dongarra"},{"@pid":"98/2642","text":"Thomas C. Schulthess"}]},"title":"Tridiagonalization of a dense symmetric matrix on multiple GPUs and its application to symmetric eigenvalue problems.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"16","pages":"2652-2666","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/YamazakiDSTDS14","doi":"10.1002/CPE.3152","ee":"https://doi.org/10.1002/cpe.3152","url":"https://dblp.org/rec/journals/concurrency/YamazakiDSTDS14"}, "url":"URL#3717801" }, { "@score":"1", "@id":"3717802", "info":{"authors":{"author":[{"@pid":"25/10624-1","text":"Xian Yang 0001"},{"@pid":"g/YikeGuo","text":"Yike Guo"},{"@pid":"02/929-2","text":"Li Guo 0002"}]},"title":"An iterative parameter estimation method for biological systems and its parallel implementation.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"6","pages":"1249-1267","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/YangGG14","doi":"10.1002/CPE.3071","ee":"https://doi.org/10.1002/cpe.3071","url":"https://dblp.org/rec/journals/concurrency/YangGG14"}, "url":"URL#3717802" }, { "@score":"1", "@id":"3717803", "info":{"authors":{"author":[{"@pid":"60/8079","text":"Xin Yi"},{"@pid":"68/6607","text":"Yingjie Hu"},{"@pid":"18/3664","text":"Zhenhong Jia"},{"@pid":"116/7864","text":"Liejun Wang"},{"@pid":"12/1198-2","text":"Jie Yang 0002"},{"@pid":"k/NikolaKKasabov","text":"Nikola K. Kasabov"}]},"title":"An enhanced multiphase Chan-Vese model for the remote sensing image segmentation.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"18","pages":"2893-2906","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/YiHJW0K14","doi":"10.1002/CPE.3185","ee":"https://doi.org/10.1002/cpe.3185","url":"https://dblp.org/rec/journals/concurrency/YiHJW0K14"}, "url":"URL#3717803" }, { "@score":"1", "@id":"3717804", "info":{"authors":{"author":[{"@pid":"06/2526","text":"Choonhan Youn"},{"@pid":"155/6170","text":"Jinchi Lu"},{"@pid":"39/1861","text":"Ahmed Elgamal"},{"@pid":"b/ChaitanyaKBaru","text":"Chaitan Baru"}]},"title":"Development of web-based science portal for large-scale computing collaboration in earthquake engineering.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"18","pages":"2907-2916","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/YounLEB14","doi":"10.1002/CPE.3235","ee":"https://doi.org/10.1002/cpe.3235","url":"https://dblp.org/rec/journals/concurrency/YounLEB14"}, "url":"URL#3717804" }, { "@score":"1", "@id":"3717805", "info":{"authors":{"author":[{"@pid":"36/6789-4","text":"Chao Yu 0004"},{"@pid":"52/1742","text":"Minjie Zhang"},{"@pid":"83/670","text":"Fenghui Ren"}]},"title":"Coordinated learning by exploiting sparse interaction in multiagent systems.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"1","pages":"51-70","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/YuZR14","doi":"10.1002/CPE.2947","ee":"https://doi.org/10.1002/cpe.2947","url":"https://dblp.org/rec/journals/concurrency/YuZR14"}, "url":"URL#3717805" }, { "@score":"1", "@id":"3717806", "info":{"authors":{"author":[{"@pid":"125/6050","text":"Netanel Zakay"},{"@pid":"f/DGFeitelson","text":"Dror G. Feitelson"}]},"title":"Workload resampling for performance evaluation of parallel job schedulers.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"12","pages":"2079-2105","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/ZakayF14","doi":"10.1002/CPE.3240","ee":"https://doi.org/10.1002/cpe.3240","url":"https://dblp.org/rec/journals/concurrency/ZakayF14"}, "url":"URL#3717806" }, { "@score":"1", "@id":"3717807", "info":{"authors":{"author":[{"@pid":"10/709","text":"Zhuoyao Zhang"},{"@pid":"88/4130","text":"Ludmila Cherkasova"},{"@pid":"75/3108","text":"Boon Thau Loo"}]},"title":"Parameterizable benchmarking framework for designing a MapReduce performance model.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"12","pages":"2005-2026","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/ZhangCL14","doi":"10.1002/CPE.3229","ee":"https://doi.org/10.1002/cpe.3229","url":"https://dblp.org/rec/journals/concurrency/ZhangCL14"}, "url":"URL#3717807" }, { "@score":"1", "@id":"3717808", "info":{"authors":{"author":[{"@pid":"21/3626-4","text":"Fan Zhang 0004"},{"@pid":"26/4411","text":"Ciprian Docan"},{"@pid":"88/7583","text":"Hoang Bui"},{"@pid":"p/ManishParashar","text":"Manish Parashar"},{"@pid":"43/1753","text":"Scott Klasky"}]},"title":"XpressSpace: a programming framework for coupling partitioned global address space simulation codes.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"3","pages":"644-661","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/ZhangDBPK14","doi":"10.1002/CPE.3025","ee":"https://doi.org/10.1002/cpe.3025","url":"https://dblp.org/rec/journals/concurrency/ZhangDBPK14"}, "url":"URL#3717808" }, { "@score":"1", "@id":"3717809", "info":{"authors":{"author":[{"@pid":"85/7433-8","text":"Bowen Zhang 0008"},{"@pid":"o/CornelisWOosterlee","text":"Cornelis W. Oosterlee"}]},"title":"Acceleration of option pricing technique on graphics processing units.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"9","pages":"1626-1639","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/ZhangO14","doi":"10.1002/CPE.2825","ee":"https://doi.org/10.1002/cpe.2825","url":"https://dblp.org/rec/journals/concurrency/ZhangO14"}, "url":"URL#3717809" }, { "@score":"1", "@id":"3717810", "info":{"authors":{"author":[{"@pid":"50/671-95","text":"Yu Zhang 0095"},{"@pid":"69/4248","text":"Yue Sun"},{"@pid":"78/6091-3","text":"Jianzhong Zhang 0003"},{"@pid":"82/1193","text":"Jingdong Xu"},{"@pid":"64/5840-6","text":"Ying Wu 0006"}]},"title":"An efficient framework for parallel and continuous frequent item monitoring.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"18","pages":"2856-2879","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/ZhangSZXW14","doi":"10.1002/CPE.3182","ee":"https://doi.org/10.1002/cpe.3182","url":"https://dblp.org/rec/journals/concurrency/ZhangSZXW14"}, "url":"URL#3717810" }, { "@score":"1", "@id":"3717811", "info":{"authors":{"author":[{"@pid":"36/2259-72","text":"Bo Zhang 0072"},{"@pid":"52/2421","text":"Fangguo Zhang"}]},"title":"Secure similarity coefficients computation for binary data and its extensions.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"5","pages":"1023-1037","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/ZhangZ14","doi":"10.1002/CPE.3059","ee":"https://doi.org/10.1002/cpe.3059","url":"https://dblp.org/rec/journals/concurrency/ZhangZ14"}, "url":"URL#3717811" }, { "@score":"1", "@id":"3717812", "info":{"authors":{"author":[{"@pid":"98/11067","text":"Lugang Zhao"},{"@pid":"w/ChengkeWu","text":"Chengke Wu 0001"},{"@pid":"83/212","text":"Jifeng Ning"}]},"title":"A camera calibration method based on two orthogonal vanishing points.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"5","pages":"1185-1199","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/ZhaoWN14","doi":"10.1002/CPE.3055","ee":"https://doi.org/10.1002/cpe.3055","url":"https://dblp.org/rec/journals/concurrency/ZhaoWN14"}, "url":"URL#3717812" }, { "@score":"1", "@id":"3717813", "info":{"authors":{"author":[{"@pid":"22/5775","text":"Leqing Zhu"},{"@pid":"06/2186","text":"Dadong Wang"},{"@pid":"33/6100-2","text":"Huiyan Wang 0002"}]},"title":"An improved method for the removal of ring artifacts in synchrotron radiation images by using GPGPU computing with compute unified device architecture.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"18","pages":"2880-2892","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/ZhuWW14","doi":"10.1002/CPE.3183","ee":"https://doi.org/10.1002/cpe.3183","url":"https://dblp.org/rec/journals/concurrency/ZhuWW14"}, "url":"URL#3717813" }, { "@score":"1", "@id":"3717814", "info":{"authors":{"author":[{"@pid":"70/877","text":"Dan Zou"},{"@pid":"76/305","text":"Yong Dou"},{"@pid":"01/267-3","text":"Song Guo 0003"},{"@pid":"23/11277","text":"Rongchun Li"},{"@pid":"17/2104","text":"Lin Deng"}]},"title":"Supernodal sparse Cholesky factorization on graphics processing units.","venue":"Concurr. Comput. Pract. Exp.","volume":"26","number":"16","pages":"2713-2726","year":"2014","type":"Journal Articles","access":"closed","key":"journals/concurrency/ZouDGLD14","doi":"10.1002/CPE.3158","ee":"https://doi.org/10.1002/cpe.3158","url":"https://dblp.org/rec/journals/concurrency/ZouDGLD14"}, "url":"URL#3717814" } ] } } } )