Editorial Board
Contents
A scalable parallel algorithm for atmospheric general circulation models on a multi-core cluster
Why good data analysts need to be critical synthesists. Determining the role of semantics in data analysis
CORE framework for evaluating the reliability of SaaS products
A hybrid knowledge-based recommender system for e-learning based on ontology and sequential pattern mining
Output-oriented power saving mode for mobile devices
A runtime estimation framework for ALICE
Leading-edge research in cluster, cloud, and grid computing: Best papers from the IEEE/ACM CCGrid 2015 conference
Reprint of “Robust partial-load experiments with Showstopper”
Lark: An effective approach for software-defined networking in high throughput computing clusters
Traffic-sensitive Live Migration of Virtual Machines
Multi-Capacity Bin Packing with Dependent Items and its Application to the Packing of Brokered Workloads in Virtualized Environments
Efficient network isolation and load balancing in multi-tenant HPC clusters
Topics in cloud incident management
Self-managing cloud-native applications: Design, implementation, and experience
Predicting provisioning and booting times in a Metal-as-a-service system
A novel approach to manage cloud security SLA incidents
Preface: Security and privacy in big data clouds
A multi-user searchable encryption scheme with keyword authorization in a cloud storage
TrueID: A practical solution to enhance Internet accountability by assigning packets with creditable user identity code
Anonymizing popularity in online social networks with full utility
Secure and efficient data collaboration with hierarchical attribute-based encryption in cloud computing
Aggregating privatized medical data for secure querying applications
A hybrid index for temporal big data
Attribute-based data access control in mobile cloud computing: Taxonomy and open issues
Towards an asynchronous aggregation-capable watermark for end-to-end protection of big data streams
Privacy-preserving trust management for unwanted traffic control
Investigating the deceptive information in Twitter spam
Design and implementation of a secure cloud-based billing model for smart meters as an Internet of things using homomorphic cryptography
A privacy preserving framework for RFID based healthcare systems