Volume 74, Number 12, December 2018
CF-CloudOrch: container fog node-based cloud orchestration for IoT networks.

Nam Yong Kim Jung Hyun Ryu Byoung Wook Kwon Yi Pan Jong Hyuk Park

Power function-based signal recovery transition optimization model of emergency traffic.

Jiao Yao Kaimin Zhang Yaxuan Dai Jin Wang

Utilizing a lightweight PKI mechanism to guarantee a secure service in a cloud environment.

Sangho Park Hyunjin Kim JaeCheol Ryou

Privacy-aware task data management using TPR*-Tree for trajectory-based crowdsourcing.

Yan Li Byeong-Seok Shin

Job submission and monitoring management in integrated computing environment for finite element analysis.

Daeyong Jung Myungil Kim Jungha Lee Han-Yee Kim Dae-Won Lee

An efficient transmission method based on HEVC multi-view adaptive video streaming over P2P network in NFV.

Linh Van Ma Gwanghyun Yu Jin-Young Kim Yonggwan Won Jinsul Kim

An event-driven plan recognition algorithm based on intuitionistic fuzzy theory.

Xiaofan Wang Lei Wang Shengji Li Jin Wang

Accelerated bulk memory operations on heterogeneous multi-core systems.

Jong-Hyuk Lee Weidong Shi Joon-Min Gil

On construction of a virtual GPU cluster with InfiniBand and 10 Gb Ethernet virtualization.

Chao-Tung Yang Shuo-Tsung Chen Yu-Sheng Lo Endah Kristiani Yu-Wei Chan

IoT service classification and clustering for integration of IoT service platforms.

Dae-Won Lee Hwa-Min Lee

Fog-based energy-efficient routing protocol for wireless sensor networks.

Elham Mirzavand Borujeni Dadmehr Rahbari Mohsen Nickray

Multi-objective optimization design for multi-source multicasting MIMO AF relay systems.

Min Zhu Dengyin Zhang Jin Wang

A dynamic multiple-keys game-based industrial wireless sensor-cloud authentication scheme.

Dazhi Li Minglu Li Jianhua Liu

Semi-real-time removal of baseline fluctuations in electrocardiogram (ECG) signals by an infinite impulse response low-pass filter (IIR-LPF).

Jeong-Hwan Kim Kang-Hwi Lee Jeong-Whan Lee Kyeong-Seop Kim

An energy-saving strategy based on multi-server vacation queuing theory in cloud data center.

Chunxia Yin Shunfu Jin

Deep feature learning for person re-identification in a large-scale crowdsourced environment.

Seon Ho Oh Seung-Wan Han Bumsuk Choi Geon Woo Kim Kyung-Soo Lim

Logically isolated group network for virtual convergence environment over SD-WAN.

Dongkyun Kim Yong-Hwan Kim Ki-Hyun Kim Joo-Beom Kim Gi-Seong You Joon-Min Gil

Compact deep learned feature-based face recognition for Visual Internet of Things.

Seon Ho Oh Geon Woo Kim Kyung-Soo Lim

Detection of damaged files and measurement of similarity to originals using entropy graph characteristics.

Chaeho Cho Kwang-Sik Chung Yoojae Won

Information science techniques for investigating research areas: a case study in telecommunications policy.

Sung-Kil Kim Junseok Oh

Modified adaptive support weight and disparity search range estimation schemes for stereo matching processors.

Seung-Ho Ok Jae Hoon Shim Byungin Moon

Secure mobile device structure for trust IoT.

Yun-kyung Lee Jeong-Nyeo Kim Kyung-Soo Lim Hyunsoo Yoon

An improved ant colony optimization-based approach with mobile sink for wireless sensor networks.

Jin Wang Jiayi Cao R. Simon Sherratt Jong Hyuk Park

Mobile forensic reference set (MFReS) and mobile forensic investigation for android devices.

Dohyun Kim Yunho Lee Sangjin Lee

Enlargement of vulnerable web applications for testing.

Fernando Román Muñoz Iván Israel Sabido Cortes Luis Javier García-Villalba

Energy management strategy in cloud computing: a perspective study.

Taha Chaabouni Maher Khemakhem

Host load prediction with long short-term memory in cloud computing.

Binbin Song Yao Yu Yu Zhou Ziqiang Wang Sidan Du

Cloud workflow scheduling with hybrid resource provisioning.

Long Chen Xiaoping Li

A design and implementation of a framework for games in IoT.

Hye-Young Kim

An energy efficiency grading system for mobile applications based on usage patterns.

Dusan Baek Jae-Hyeon Park Jung-Won Lee

Resource provisioning for cloud applications: a 3-D, provident and flexible approach.

Mohammad Sadegh Aslanpour Seyed Ebrahim Dashti Mostafa Ghobaei-Arani Ali Asghar Rahmanian

Analyzing the traffic of penetration testing tools with an IDS.

Fernando Román Muñoz Esteban Alejandro Armas Vega Luis Javier García-Villalba

A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers.

Saru Kumari Marimuthu Karuppiah Ashok Kumar Das Xiong Li Fan Wu Neeraj Kumar

DCSACA: distributed constraint service-aware collaborative access algorithm based on large-scale access to the Internet of Things.

Yi Meng Qingkui Chen

Future computing with IoT and cloud computing.

D. S. Park


Volume 74, Number 11, November 2018
A comparison-free sorting algorithm on CPUs and GPUs.

Saleh Abdel-Hafeez Ann Gordon-Ross Samer Abubaker

Approximation of conformal mappings and novel applications to shape recognition of planar domains.

Sa'ar Hersonsky

Tree-based reliable and energy-aware multicast routing protocol for mobile ad hoc networks.

Amir Tavizi Ali Ghaffari

Cost-efficient reactive scheduling for real-time workflows in clouds.

Huangke Chen Jianghan Zhu Guohua Wu Lisu Huo

Detection of the maximum error of mathematical functions.

Hongyuan Qi Jinchen Xu Shaozhong Guo

Robust and efficient QCA cell-based nanostructures of elementary reversible logic gates.

M. M. Abutaleb

Zeroing memory deallocator to reduce checkpoint sizes in virtualized HPC environments.

Ramy Gad Simon Pickartz Tim Süß Lars Nagel Stefan Lankes Antonello Monti André Brinkmann

Implementation of secret disclosure attack against two IoT lightweight authentication protocols.

Masoumeh Safkhani Mahyar Shariat

The basic matrix library (BML) for quantum chemistry.

Nicolas Bock Christian F. A. Negre Susan M. Mniszewski Jamaludin Mohd-Yusof Bálint Aradi Jean-Luc Fattebert Daniel Osei-Kuffuor Timothy C. Germann Anders M. N. Niklasson

Distributed random cooperation for VBF-based routing in high-speed dense underwater acoustic sensor networks.

Mohammad Reza Khosravi Hamid Basri Habib Rostami Sadegh Samadi

Privacy-preserving auditing scheme for shared data in public clouds.

Libing Wu Jing Wang Sherali Zeadally Debiao He

An adaptive breadth-first search algorithm on integrated architectures.

Feng Zhang Heng Lin Jidong Zhai Jie Cheng Dingyi Xiang Jizhong Li Yunpeng Chai Xiaoyong Du

A virtual machine anomaly detection system for cloud computing infrastructure.

Yang Hui

Reliable congestion-aware path prediction mechanism in 2D NoCs based on EFuNN.

Maryam Rezaei-Ravari Vahid Sattari Naeini

Internet of Music Things: an edge computing paradigm for opportunistic crowdsensing.

Samarjit Roy Dhiman Sarkar Sourav Hati Debashis De

A joint feature selection framework for multivariate resource usage prediction in cloud servers using stability and prediction performance.

Shaifu Gupta Aroor Dinesh Dileep Timothy A. Gonsalves

A survey on optimal utilization of preemptible VM instances in cloud computing.

Ashish Kumar Mishra Brajesh Kumar Umrao Dharmendra Kumar Yadav

VMDFS: virtual machine dynamic frequency scaling framework in cloud computing.

Kiamars Shojaei Faramarz Safi Esfahani Saeed Ayat

Remote user authentication and key agreement for mobile client-server environments on elliptic curve cryptography.

Jiaqing Mo Zhongwang Hu Yuhua Lin

A framework with data-centric accountability and auditability for cloud storage.

Hao Jin Ke Zhou Yan Luo

A camera-based attention level assessment tool designed for classroom usage.

Chun-Hsiung Tseng Yung-Hui Chen

GPU-accelerated high-performance encoding and decoding of hierarchical RAID in virtual machines.

Tae-Geon Song Mehdi Pirahandeh Cheong-Jin Ahn Deok-Hwan Kim

Improving performance by network-aware virtual machine clustering and consolidation.

Gangyi Luo Zhuzhong Qian Mianxiong Dong Kaoru Ota Sanglu Lu

Attribute-based authentication on the cloud for thin clients.

Maged Hamada Ibrahim Saru Kumari Ashok Kumar Das Vanga Odelu

An efficient cascaded method for network intrusion detection based on extreme learning machines.

Yuanlong Yu Zhifan Ye Xianghan Zheng Chunming Rong

A security evaluation framework for cloud security auditing.

Syed Rizvi Jungwoo Ryoo John Kissell William Aiken Yuhong Liu

Design and implementation of an attestation protocol for measured dynamic behavior.

Toqeer Ali Syed Roslan Ismail Shahrulniza Musa Mohammad Nauman Sohail Khan

Early fault detection in IaaS cloud computing based on fuzzy logic and prediction technique.

Dinh-Mao Bui Thien Huynh-The Sungyoung Lee

An SDN-enhanced load-balancing technique in the cloud system.

Byung-Seok Kang Hyunseung Choo

A parallel pattern for iterative stencil + reduce.

Marco Aldinucci Marco Danelutto Maurizio Drocco Peter Kilpatrick Claudia Misale Guilherme Peretti Pezzi Massimo Torquati

Assessing and discovering parallelism in C++ code for heterogeneous platforms.

David del Rio Astorga Rafael Sotomayor Luis Miguel Sánchez Francisco Javier García Blas Alejandro Calderón Javier Fernández

Data stream processing via code annotations.

Marco Danelutto Tiziano De Matteis Gabriele Mencagli Massimo Torquati

MeterPU: a generic measurement abstraction API - Enabling energy-tuned skeleton backend selection.

Lu Li Christoph W. Kessler

Exploring the interoperability of remote GPGPU virtualization using rCUDA and directive-based programming models.

Adrián Castelló Antonio J. Peña Rafael Mayo Judit Planas Enrique S. Quintana-Ortí Pavan Balaji

Reengineering for parallelism in heterogeneous parallel platforms.

José Daniel García Kevin Hammond Lutz Schubert


Volume 74, Number 10, October 2018
Improving NMF-based community discovery using distributed robust nonnegative matrix factorization with SimRank similarity measure.

Chaobo He Xiang Fei Hanchao Li Yong Tang Hai Liu Shuangyin Liu

PL-DVFS: combining Power-aware List-based scheduling algorithm with DVFS technique for real-time tasks in Cloud Computing.

Monire Safari Reihaneh Khorsand

CWBound: boundary node detection algorithm for complex non-convex mobile ad hoc networks.

Se-Hang Cheong Yain-Whar Si

A stochastic link-fault-tolerant routing algorithm in folded hypercubes.

Bui Thi Thuan Lam Boi Ngoc Keiichi Kaneko

Continuous memory allocation model for cloud services.

Anwar Alyatama Asmaa Alsumait Maryam Alotaibi

Virtual sensor as a service: a new multicriteria QoS-aware cloud service composition for IoT applications.

Mina Emami Khansari Saeed Sharifian Seyed Ahmad Motamedi

Prediction of air travel demand using a hybrid artificial neural network (ANN) with Bat and Firefly algorithms: a case study.

Ali Mostafaeipour Alireza Goli Mojtaba Qolipour

Optimizing inter-nest data locality in imperfect stencils based on loop blocking.

Yousef Seyfari Shahriar Lotfi Jaber Karimpour

E-OSched: a load balancing scheduler for heterogeneous multicores.

Yasir Noman Khalid Muhammad Aleem Radu Prodan Muhammad Azhar Iqbal Muhammad Arshad Islam

Acknowledgment-based punishment and stimulation scheme for mobile ad hoc network.

Mahdi Bounouni Louiza Bouallouche-Medjkoune

A hybrid data replication strategy with fuzzy-based deletion for heterogeneous cloud data centers.

Najme Mansouri Mohammad Masoud Javidi

An optimization framework for the capacity allocation and admission control of MapReduce jobs in cloud systems.

Marzieh Malekimajd Danilo Ardagna Michele Ciavotta Eugenio Gianniti Mauro Passacantando Alessandro Maria Rizzi

Design of DRAM-NAND flash hybrid main memory and Q-learning-based prefetching method.

Su-Kyung Yoon Young-Sun Youn Jeong-Geun Kim Shin-Dug Kim

Multi-queue scheduling of heterogeneous jobs in hybrid geo-distributed cloud environment.

Li Chunlin Tang Jianhang Youlong Luo

Modeling SmallClient indexing framework for big data analytics.

Aisha Siddiqa Ahmad Karim Victor Chang

A low cost wearable wireless sensing system for paretic hand management after stroke.

Se Dong Min Chang-Won Wang Hwa-Min Lee Bong-Keun Jung

Multi-tenant intrusion detection system for public cloud (MTIDS).

Mohamed Hawedi Chamseddine Talhi Hanifa Boucheneb

Confidential smart-sensing framework in the IoT era.

Fadi Al-Turjman Sinem Alturjman

A security review of local government using NIST CSF: a case study.

Ahmed Ibrahim Craig Valli Ian McAteer Junaid Ahsenali Chaudhry

NBC-MAIDS: Naïve Bayesian classification technique in multi-agent system-enriched IDS for securing IoT against DDoS attacks.

Amjad Mehmood Mithun Mukherjee Syed Hassan Ahmed Houbing Song Khalid Mahmood Malik

An efficient approach for publishing microdata for multiple sensitive attributes.

Adeel Anjum Naveed Ahmad Saif Ur Rehman Malik Samiya Zubair Basit Shahzad

Next-generation cybersecurity through a blockchain-enabled federated cloud framework.

Olumide Malomo Danda B. Rawat Moses Garuba

CDCSS: cluster-based distributed cooperative spectrum sensing model against primary user emulation (PUE) cyber attacks.

Muhammad Ayzed Mirza Mudassar Ahmad Muhammad Asif Habib Nasir Mahmood Chaudhry Muhammad Nadeem Faisal Usman Ahmad

Forensic investigation to detect forgeries in ASF files of contemporary IP cameras.

Rashid Masood Khan Mian Muhammad Waseem Iqbal Muhammad Faisal Amjad Haider Abbas Hammad Afzal Abdul Rauf Maruf Pasha

Infrequent pattern mining in smart healthcare environment using data summarization.

Mohiuddin Ahmed Abu S. S. M. Barkat Ullah

SCOUT: a sink camouflage and concealed data delivery paradigm for circumvention of sink-targeted cyber threats in wireless sensor networks.

Saqib Ubaid Muhammad Farrukh Shafeeq Majid Hussain Ali Hammad Akbar Abdelrahman Abuarqoub M. Sultan Zia Beenish Abbas

Towards ontology-based multilingual URL filtering: a big data problem.

Mubashar Hussain Mansoor Ahmed Hasan Ali Khattak Muhammad Imran Abid Khan Sadia Din Awais Ahmad Gwanggil Jeon Goutham Reddy Alavalapati

Security threats to critical infrastructure: the human factor.

Ibrahim Ghafir Jibran Saleem Mohammad Hammoudeh Hanan Faour Vaclav Prenosil Sardar F. Jaf Sohail Jabbar Thar Baker

Identifying critical autonomous systems in the Internet.

Abdullah Yasin Nur Mehmet Engin Tozal

Chain-based big data access control infrastructure.

Emmanuel Boateng Sifah Qi Xia Kwame Opuni-Boachie Obour Agyekum Sandro Amofa Jianbin Gao Ruidong Chen Hu Xia James C. Gee Xiaojiang Du Mohsen Guizani

Cyber security methods for aerial vehicle networks: taxonomy, challenges and solution.

Hichem Sedjelmaci Sidi-Mohammed Senouci

Real-time identification of three Tor pluggable transports using machine learning techniques.

Mohammad Hassan Mojtahed Soleimani Muharram Mansoorizadeh Mohammad Nassiri

ECB4CI: an enhanced cancelable biometric system for securing critical infrastructures.

Wencheng Yang Song Wang Guanglou Zheng Junaid Ahsenali Chaudhry Craig Valli

A machine learning approach for feature selection traffic classification using security analysis.

Muhammad Shafiq Xiangzhan Yu Ali Kashif Bashir Hassan Nazeer Chaudhry Dawei Wang

Threats to critical infrastructure from AI and human intelligence.

Junaid Chaudhry Al-Sakib Khan Pathan Mubashir Husain Rehmani Ali Kashif Bashir


Volume 74, Number 9, September 2018
Energy-aware partitioning of fault-tolerant irregular topologies for 3D network-on-chips.

Suleyman Tosun Vahid Babaei Ajabshir

Models for availability and power consumption evaluation of a private cloud with VMM rejuvenation enabled by VM Live Migration.

Matheus Torquato I. M. Umesh Paulo R. M. Maciel

Novel designs of full adder in quantum-dot cellular automata technology.

Lei Wang Guangjun Xie

An efficient and secure design of multi-server authenticated key agreement protocol.

Azeem Irshad Husnain Naqvi Shehzad Ashraf Chaudhry Shouket Raheem Saru Kumari Ambrina Kanwal Muhammad Usman

Adaptive correlated prefetch with large-scale hybrid memory system for stream processing.

Sung Min Lee Su-Kyung Yoon Jeong-Geun Kim Shin-Dug Kim

Integer linear programming-based cost optimization for scheduling scientific workflows in multi-cloud environments.

Somayeh Mohammadi Hossein Pedram Latif Pourkarimi

A novel fault-tolerant multiplexer in quantum-dot cellular automata technology.

Seyed-Sajad Ahmadpour Mohammad Mosleh

SAFT-PHENIC: a thermal-aware microring fault-resilient photonic NoC.

Michael Conrad Meyer Yuichi Okuyama Abderazek Ben Abdallah

Application mapping in hybrid photonic networks-on-chip for reducing insertion loss.

Somayeh Khoroush Midia Reshadi Ahmad Khademzadeh

QoS-aware VM placement and migration for hybrid cloud infrastructure.

Kamran Babar Nazir

Schmitt trigger-based single-ended 7T SRAM cell for Internet of Things (IoT) applications.

Kishore Sanapala Ramachandran Sakthivel Sang-Soo Yeo

A model of FSM-based planner and dialogue supporting system for emergency call services.

Keonsoo Lee Yang Sun Lee Yunyoung Nam

A dimensionality reduction-based efficient software fault prediction using Fisher linear discriminant analysis (FLDA).

Anum Kalsoom Muazzam Maqsood Mustansar Ali Ghazanfar Farhan Aadil Seungmin Rho

Clustering algorithm for internet of vehicles (IoV) based on dragonfly optimizer (CAVDO).

Farhan Aadil Waleed Ahsan Zahoor-Ur Rehman Peer Azmat Shah Seungmin Rho Irfan Mehmood

Anonymous group key agreement protocol for multi-server and mobile environments based on Chebyshev chaotic maps.

Tzu-Wei Lin Chien-Lung Hsu

Design and implementation of cybersecurity testbed for industrial IoT systems.

Seokcheol Lee Seokjun Lee Hyunguk Yoo SungMoon Kwon Taeshik Shon

Enforcing high-level security policies for Internet of Things.

Chang Jin Koo JeongYeon Kim

Performance evaluation framework design for smart sensor business.

Hangbae Chang

AnyNoC: new network on a chip switching using the shared-memory and output-queue techniques for complex Internet of things systems.

Jia-Yang Lin Yi-Ting Hsieh Trong Nghia Le Wen-Long Chin

High-performance fieldbus application-specific integrated circuit design for industrial smart sensor networks.

Ching-Han Chen Ming-Yi Lin Xing-Chen Guo

Field classification-based novel fuzzing case generation for ICS protocols.

SungJin Kim Taeshik Shon

A REST-based industrial web of things' framework for smart warehousing.

Sohail Jabbar Murad Khan Bhagya Nathali Silva Kijun Han

WISE: web of object architecture on IoT environment for smart home and building energy management.

Jaehak Yu Namkyung Lee Cheol Sig Pyo Yang Sun Lee

FS-IIoTSim: a flexible and scalable simulation framework for performance evaluation of industrial Internet of things systems.

Hwi-Ho Lee Jung-Hyok Kwon Eui-Jik Kim

New parallel swarm algorithm for smart sensor systems redundancy allocation problems in the Internet of Things.

Wei-Chang Yeh Jsen-Shung Lin

Cloud-based smart manufacturing for personalized candy packing application.

Shiyong Wang Jiafu Wan Muhammad Imran Di Li Chunhua Zhang

Smart service relying on Internet of Things technology in parking systems.

Ming-Fong Tsai Ye Chin Kiong Ang Sinn

VQ-based data hiding in IoT networks using two-level encoding with adaptive pixel replacements.

Cheng-Ta Huang Min-Yi Tsai Li-Chiun Lin Wei-Jen Wang Shiuh-Jeng Wang

A secure ECC-based RFID mutual authentication protocol for internet of things.

Amjad Ali Alamr Firdous Kausar Jongsung Kim Changho Seo

Anti-reversible dynamic tamper detection scheme using distributed image steganography for IoT applications.

Sung Ryoung Kim Jeong-Nyeo Kim Sung Tae Kim Sunwoo Shin Jeong Hyun Yi

The intelligent IoT common service platform architecture and service implementation.

Jihyun Kim Yonghun Jeon Howon Kim

Validation of virtualization platforms for I-IoT purposes.

Jordi Mongay Batalla Konrad Sienkiewicz Waldemar Latoszek Piotr Krawiec Constandinos X. Mavromoustakis George Mastorakis

Semantic code clone detection for Internet of Things applications using reaching definition and liveness analysis.

Rajkumar Tekchandani Rajesh Kumar Bhatia Maninder Singh

RCB: leakage-resilient authenticated encryption via re-keying.

Megha Agrawal Tarun Kumar Bansal Donghoon Chang Amit Kumar Chauhan Seokhie Hong Jinkeon Kang Somitra Kumar Sanadhya

Editorial of special section on enabling technologies for industrial and smart sensor internet of things systems.

Jaeik Cho Naveen K. Chilamkurti S. J. Wang


Volume 74, Number 8, August 2018
Process execution in Cyber-Physical Systems using cloud and Cyber-Physical Internet services.

Borja Bordel Ramón Alcarria Diego Sánchez de Rivera Tomás Robles

Performance of preconditioned iterative solvers in MFiX-Trilinos for fluidized beds.

V. M. Krushnarao Kotteda Vinod Kumar William F. Spotz

Performance prediction for supporting mobile applications' offloading.

Thiago Felipe da Silva Pinheiro Francisco Airton Silva Iure Fe Sokol Kosta Paulo Romero Martins Maciel

QUICK: QoS-guaranteed efficient cloudlet placement in wireless metropolitan area networks.

Long Chen Jigang Wu Gangqiang Zhou Longjie Ma

Optimization of resources in parallel systems using a multiobjective artificial bee colony algorithm.

César Gómez-Martín Miguel A. Vega-Rodríguez

An efficient parallel algorithm for the coupling of global climate models and regional climate models on a large-scale multi-core cluster.

Yuzhu Wang Jinrong Jiang Junqiang Zhang Juanxiong He He Zhang Xuebin Chi Tianxiang Yue

CPU and GPU parallelized kernel K-means.

Mohammed Baydoun Hassan Ghaziri Mohammed Al-Husseini

Scaling-up versus scaling-out networking in data centers: a comparative robustness analysis.

Leila Shooshtarian Farshad Safaei Semnani Ali Tizghadam

Dimensionality reduction via the Johnson-Lindenstrauss Lemma: theoretical and empirical bounds on embedding dimension.

John Fedoruk Byron Schmuland Julia Ann Johnson Giseon Heo

Fair bandwidth allocating and strip-aware prefetching for concurrent read streams and striped RAIDs in distributed file systems.

Sangmin Lee Soon J. Hyun Hong-Yeon Kim Young-Kyun Kim

NVM Streaker: a fast and reconfigurable performance simulator for non-volatile memory-based memory architecture.

Danqi Hu Fang Lv Chenxi Wang Huimin Cui Lei Wang Ying Liu Xiaobing Feng

Representation and automatic generation of state-transition mapping tree.

Je-Ho Park Young Bom Park Soo-Kyung Choi

Photo collage-based photograph display system on mobile computing platform.

Dongwann Kang Sanghyun Seo

Redressing fork constraints in nanoscale quasi-delay-insensitive asynchronous pipelines.

Mohsen Raji Behnam Ghavami

Toward a fair indictment for sealed-bid auction with self-enforcing privacy.

Kok-Seng Wong Myung Ho Kim

Forecasting power consumption for higher educational institutions based on machine learning.

Jihoon Moon Jinwoong Park Eenjun Hwang Sanghoon Jun

Raw reversibility of information hiding on the basis of VQ systems.

Cheng-Ta Huang Cheng-Hsing Yang Wei-Jen Wang Shiau-Rung Tsui Shiuh-Jeng Wang

LBFT: a fault-tolerant routing algorithm for load-balancing network-on-chip based on odd-even turn model.

Ruilian Xie Jueping Cai Xin Xin Bo Yang

Digital forensic science approach by file recovery research.

Wooyeon Jo Hyun Soo Chang Taeshik Shon

An anonymous and provably secure biometric-based authentication scheme using chaotic maps for accessing medical drop box data.

Imran Khan Shehzad Ashraf Chaudhry Muhammad Sher Muhammad Khurram Khan

Fast depth estimation using semi-global matching and adaptive stripe-based optimization.

Maziar Loghman Joohee Kim Kyuwon Choi

Cognitive social network analysis for supporting the reliable decision-making process.

Mucheol Kim Sangyong Han

Erratum to: Development of a low-cost wearable sensing glove with multiple inertial sensors and a light and fast orientation estimation algorithm.

Younggeun Choi Kyounghwan Yoo Shin-Jin Kang Beomjoo Seo Soo Kyun Kim

Development of a low-cost wearable sensing glove with multiple inertial sensors and a light and fast orientation estimation algorithm.

Younggeun Choi Kyounghwan Yoo Shin-Jin Kang Beomjoo Seo Soo Kyun Kim

Design of additive homomorphic encryption with multiple message spaces for secure and practical storage services over encrypted data.

Taek-Young Youn Nam-Su Jho Ku-Young Chang

A study of the effect of social trust, trust in social networking services, and sharing attitude, on two dimensions of personal information sharing behavior.

Mohammad Salehan Dan J. Kim Chulmo Koo

Design and implementation of user-level dynamic binary instrumentation on ARM architecture.

Dongwoo Kim Sangwho Kim Jaecheol Ryou

Twitter news-in-education platform for social, collaborative, and flipped learning.

Yongsung Kim Eenjun Hwang Seungmin Rho

Uplink scheduling of MU-MIMO gateway for massive data acquisition in Internet of things.

Tae-Yoon Kim Eui-Jik Kim

Cost-effective monitoring algorithm for cyber-physical system platform using combined spatio-temporal model.

Kwanghoon Choi Sung-Hwa Lim Jai-Hoon Kim

Erratum to: Secure IoT framework and 2D architecture for End-To-End security.

Jongseok Choi Youngjin In Changjun Park Seonhee Seok Hwajeong Seo Howon Kim

Secure IoT framework and 2D architecture for End-To-End security.

Jongseok Choi Youngjin In Changjun Park Seonhee Seok Hwajeong Seo Howon Kim

An improved and robust biometrics-based three factor authentication scheme for multiserver environments.

Shehzad Ashraf Chaudhry Husnain Naqvi Mohammad Sabzinejad Farash Taeshik Shon Muhammad Sher

Automatic malware mutant detection and group classification based on the n-gram and clustering coefficient.

TaeJin Lee Bomin Choi Youngsang Shin Jin Kwak


Volume 74, Number 7, July 2018
Correction to: Dependability enhancing mechanisms for integrated clinical environments.

Wenbing Zhao Mary Qu Yang

Fast induced sorting suffixes on a multicore machine.

Bin Lao Ge Nong Wai Hong Chan Yi Pan

Physically based visual simulation of the Lattice Boltzmann method on the GPU: a survey.

Octavio Navarro-Hinojosa Sergio Ruiz-Loza Moises Alencastre-Miranda

Load balancing in reducers for skewed data in MapReduce systems by using scalable simple random sampling.

Elaheh Gavagsaz Ali Rezaee Hamid Haj Seyyed Javadi

SRAM- and STT-RAM-based hybrid, shared last-level cache for on-chip CPU-GPU heterogeneous architectures.

Lan Gao Rui Wang Yunlong Xu Hailong Yang Zhongzhi Luan Depei Qian Han Zhang Jihong Cai

Brokerage-based dependability integration in cloud computing services.

Wiem Abderrahim Zièd Choukair

Learning-based dynamic scalable load-balanced firewall as a service in network function-virtualized cloud computing environments.

Naghmeh Dezhabad Saeed Sharifian

Design and performance evaluation of mixed multicast architecture for internet of things environment.

Omar Said Amr Tolba

A heuristic search algorithm based on subspaces for PageRank computation.

Takafumi Miyata

Simulation of an inelastic dispersive phenomenon: stimulated Brillouin scattering in a single-mode fiber segment through parallelism.

R. Sanchez-Lara Joel Antonio Trejo-Sánchez José L. López-Martínez J. A. Alvarez-Chavez

A hybrid GPU cluster and volunteer computing platform for scalable deep learning.

Ekasit Kijsipongse Apivadee Piyatumrong Suriya U.-ruekolan

Balancing the learning ability and memory demand of a perceptron-based dynamically trainable neural network.

Edward Richter Spencer Valancius Josiah McClanahan John Mixter Ali Akoglu

Efficient implementation of space-time adaptive processing for adaptive weights calculation based on floating point FPGAs.

Narjes Hasanikhah Siavash Amin-Nejad Ghafar Darvish M. R. Moniri

System-wide trade-off modeling of performance, power, and resilience on petascale systems.

Li Yu Zhou Zhou Yuping Fan Michael E. Papka Zhiling Lan

An automatic RFID reader-to-reader delegation protocol for SCM in cloud computing environment.

S. Anandhi Anitha Ramalingam Venkatasamy Sureshkumar

Priority-based capacity and power allocation in co-located WBANs using Stackelberg and bargaining games.

Jingxian Wang Yongmei Sun Yuefeng Ji

Real-time tsunami inundation forecast system for tsunami disaster prevention and mitigation.

Akihiro Musa Osamu Watanabe Hiroshi Matsuoka Hiroaki Hokari Takuya Inoue Yoichi Murashima Yusaku Ohta Ryota Hino Shunichi Koshimura Hiroaki Kobayashi

Improving all-reduce collective operations for imbalanced process arrival patterns.

Jerzy Proficz

On benchmarking task scheduling algorithms for heterogeneous computing systems.

Ashish Kumar Maurya Anil Kumar Tripathi

Incentive-aware virtual machine scheduling in cloud computing.

Heyang Xu Yang Liu Wei Wei Wenqiang Zhang

A multi-objective decision support framework for virtual machine placement in cloud data centers: a real case study.

Montassar Riahi Saoussen Krichen

Resource optimization of container orchestration: a case study in multi-cloud microservices-based applications.

Carlos Guerrero Isaac Lera Carlos Juiz

Improving the energy efficiency and performance of data-intensive workflows in virtualized clouds.

Xilong Qu Peng Xiao Lirong Huang

A joint optimization method for NoC topology generation.

Yonghui Li Kun Wang Huaxi Gu Yintang Yang Nan Su Yawen Chen Haibo Zhang

A highly efficient dynamic router for application-oriented network on chip.

Nan Su Huaxi Gu Kun Wang Xiaoshan Yu Bowen Zhang


Volume 74, Number 6, June 2018
Correction to: A comprehensive evaluation of availability and operational cost for a virtualized server system using stochastic reward nets.

Tuan Anh Nguyen Dugki Min Eunmi Choi

APS: adaptable prefetching scheme to different running environments for concurrent read streams in distributed file systems.

Sangmin Lee Soon J. Hyun Hong-Yeon Kim Young-Kyun Kim

Parallel synchronous and asynchronous coupled simulated annealing.

Kayo Gonçalves-e-Silva Daniel Aloise Samuel Xavier de Souza

Improving performance of iterative solvers with the AXC format using the Intel Xeon Phi.

Edoardo Coronado-Barrientos Guillermo Indalecio Fernández Antonio J. García-Loureiro

Cost minimization for bag-of-tasks workflows in a federation of clouds.

Somayeh Abdi Latif Pourkarimi Mahmood Ahmadi Farzad Zargari

A fault-tolerant computing method for Xdraw parallel algorithm.

Wanfeng Dou Yanan Li

Evaluations of OpenCL-written tsunami simulation on FPGA and comparison with GPU implementation.

Fumiya Kono Naohito Nakasato Kensaku Hayashi Alexander Vazhenin Stanislav Sedukhin

Time-shift replacement algorithm for main memory performance optimization.

Hong-Bin Tsai Chin-Laung Lei

A vectorized k-means algorithm for compressed datasets: design and experimental analysis.

Abdullah Al Hasib Juan M. Cebrian Lasse Natvig

DigHR: precise dynamic detection of hidden races with weak causal relation analysis.

Peng Luo Deqing Zou Hai Jin Yajuan Du Long Zheng Jinan Shen

Framework for automated partitioning and execution of scientific workflows in the cloud.

Jaagup Viil Satish Narayana Srirama

The panpositionable panconnectedness of crossed cubes.

Hon-Chan Chen

Performance and energy effects on task-based parallelized applications - User-directed versus manual vectorization.

Helena Caminal Diego Caballero Juan M. Cebrian Roger Ferrer Marc Casas Miquel Moretó Xavier Martorell Mateo Valero

A dynamic task scheduling framework based on chicken swarm and improved raven roosting optimization methods in cloud computing.

Shadi Torabi Faramarz Safi Esfahani

speedTrust: a super peer-guaranteed trust model in hybrid P2P networks.

Xianfu Meng

A routing protocol for vehicular ad hoc networks using simulated annealing algorithm and neural networks.

Hosein Bagherlou Ali Ghaffari

A new rule-based power-aware job scheduler for supercomputers.

Jun Wang Dezhi Han Ruijun Wang

Design and energy-efficient resource management of virtualized networked Fog architectures for the real-time support of IoT applications.

Paola Gabriela Vinueza Naranjo Enzo Baccarelli Michele Scarpiniti

A thread-level parallelization of pairwise additive potential and force calculations suitable for current many-core architectures.

Yoshimichi Andoh Soichiro Suzuki Satoshi Ohshima Tatsuya Sakashita Masao Ogino Takahiro Katagiri Noriyuki Yoshii Susumu Okazaki

C2OF2N: a low power cooperative code offloading method for femtolet-based fog network.

Anwesha Mukherjee Priti Deb Debashis De Rajkumar Buyya

Self-adaptive risk-aware routing in opportunistic network.

Narges Arastouie Masoud Sabaei

Non-clairvoyant online scheduling of synchronized jobs on virtual clusters.

Sina Mahmoodi Khorandi Mohsen Sharifi

Distributed unequal clustering algorithm in large-scale wireless sensor networks using fuzzy logic.

Peyman Neamatollahi Mahmoud Naghibzadeh

Stream data prefetcher for the GPU memory interface.

Nuno Neves Pedro Tomás Nuno Roma

The influence of datacenter usage on symmetry in datacenter network design.

Iain A. Stewart Alejandro Erickson

Real-time parallel image processing applications on multicore CPUs with OpenMP and GPGPU with CUDA.

Semra Aydin Refik Samet Ömer Faruk Bay


Volume 74, Number 5, May 2018
Correction to: An efficient implementation of pairing-based cryptography on MSP430 processor.

Jihoon Kwon Seog Chung Seo Seokhie Hong

An election protocol based on group membership detection algorithm in mobile ad hoc distributed systems.

Sung-Hoon Park Su-Chang Yoo Bokyoung Kim

HYSTERY: a hybrid scheduling and mapping approach to optimize temperature, energy consumption and lifetime reliability of heterogeneous multiprocessor systems.

Athena Abdi Hamid R. Zarandi

Analysis of large deviations behavior of multi-GPU memory access in deep learning.

P. S. Tamizharasan N. Ramasubramanian

Energy performance of heuristics and meta-heuristics for real-time joint resource scaling and consolidation in virtualized networked data centers.

Michele Scarpiniti Enzo Baccarelli Paola Gabriela Vinueza Naranjo Aurelio Uncini

An LP-based hyperparameter optimization model for language modeling.

Amir Hossein Akhavan Rahnama Mehdi Toloo Nezer Jacob Zaidenberg

Preemptive cloud resource allocation modeling of processing jobs.

Shahin Vakilinia Mohamed Cheriet

A survey of graph processing on graphics processing units.

Ha Nguyen Tran Erik Cambria

Data deduplication techniques for efficient cloud storage management: a systematic review.

Ravneet Kaur Inderveer Chana Jhilik Bhattacharya

A graph-based cache for large-scale similarity search engines.

Veronica Gil-Costa Mauricio Marín Carolina Bonacic Roberto Solar

A full adder structure without cross-wiring in quantum-dot cellular automata with energy dissipation analysis.

Saeed Rasouli Heikalabad Mazaher Naji Asfestani Mehdi Hosseinzadeh

A key agreement authentication protocol using an improved parallel Pollard rho for electronic payment system.

Olufunke R. Vincent Olarewaju Mubashiru Lawal

Multiround Distributed Lifetime Coverage Optimization protocol in wireless sensor networks.

Ali Kadhum Idrees Karine Deschinkel Michel Salomon Raphaël Couturier

An improved low-cost yoking proof protocol based on Kazahaya's flaws.

Nasour Bagheri Masoumeh Safkhani Mojtaba Eslamnezhad Namin Samad Rostampour

REPLICA MBTAC: multithreaded dual-mode processor.

Martti Forsell Jussi Roivainen Ville Leppänen

Popularity-based covering sets for energy proportionality in shared-nothing clusters.

Minki Kim Haengrae Cho

Efficient sparse matrix-delayed vector multiplication for discretized neural field model.

Jan Fousek

Design of an accurate and high-speed binocular pupil tracking system based on GPGPUs.

Juan Mompean Juan L. Aragón Pedro Prieto Pablo Artal

Correction to: New algorithms for fixed-length approximate string matching and approximate circular string matching under the Hamming distance.

ThienLuan Ho Seungrohk Oh Hyunjin Kim

New algorithms for fixed-length approximate string matching and approximate circular string matching under the Hamming distance.

ThienLuan Ho Seungrohk Oh Hyunjin Kim

Exploiting multilevel parallelism on a many-core system for the application of hyperheuristics to a molecular docking problem.

José M. Cecilia José-Matías Cutillas-Lozano Domingo Giménez Baldomero Imbernón


Volume 74, Number 4, April 2018
A novel trust management scheme based on Dempster-Shafer evidence theory for malicious nodes detection in wireless sensor networks.

Wei Zhang Shiwei Zhu Jian Tang Naixue Xiong

Parallel implementations of the 3D fast wavelet transform on a Raspberry Pi 2 cluster.

Gregorio Bernabé Raúl Hernández Manuel E. Acacio

A mathematical model to calculate real cost/performance in software distributed shared memory on computing environments.

Ehsan Mousavi Khaneghah Nosratollah Shadnoush Amir Hossein Ghobakhlou

An efficient anonymous authentication protocol in multiple server communication networks (EAAM).

An Braeken Pardeep Kumar Madhusanka Liyanage Ta Thi Kim Hue

Privatizing transactions for Lee's algorithm in commercial hardware transactional memory.

Ricardo Quislant Eladio Gutiérrez Emilio L. Zapata Oscar G. Plata

K-DT: a formal system for the evaluation of linear data dependence testing techniques.

Jie Zhao Rongcai Zhao

The hierarchical Petersen network: a new interconnection network with fixed degree.

Jung-hyun Seo Jong-Seok Kim Hyung Jae Chang Hyeong-Ok Lee

Data-type specific cache compression in GPGPUs.

Ehsan Atoofian Sean Rea

A tuning approach for iterative multiple 3d stencil pipeline on GPUs: Anisotropic Nonlinear Diffusion algorithm as case study.

Siham Tabik Maurice Peemen Luis F. Romero

A hybrid MapReduce-based k-means clustering using genetic algorithm for distributed datasets.

Ankita Sinha Prasanta K. Jana

An energy-efficient 3D-stacked STT-RAM cache architecture for cloud processors: the effect on emerging scale-out workloads.

Adnan Nasri Mahmood Fathy Ali Broumandnia

Strategy for data-flow synchronizations in stencil parallel computations on multi-/manycore systems.

Lukasz Szustak

Function portability of molecular dynamics on heterogeneous parallel architectures with OpenCL.

Rene Halver Wilhelm Homberg Godehard Sutmann

Almost optimal column-wise prefix-sum computation on the GPU.

Hiroki Tokura Toru Fujita Koji Nakano Yasuaki Ito Jacir Luiz Bordim

Parallelization of stochastic bounds for Markov chains on multicore and manycore platforms.

Jaroslaw Bylina

Actor model of Anemone functional language.

Pawel Batko Marcin Kuta

Pardis: a process calculus for parallel and distributed programming in Haskell.

Christopher Blöcker Ulrich Hoffmann

Language-based vectorization and parallelization using intrinsics, OpenMP, TBB and Cilk Plus.

Przemyslaw Stpiczynski

Python accelerators for high-performance computing.

Ami Marowka

Hybrid work stealing of locality-flexible and cancelable tasks for the APGAS library.

Jonas Posner Claudia Fohry

A taxonomy of task-based parallel programming technologies for high-performance computing.

Peter Thoman Kiril Dichev Thomas Heller Roman Iakymchuk Xavier Aguilar Khalid Hasanov Philipp Gschwandtner Pierre Lemarinier Stefano Markidis Herbert Jordan Thomas Fahringer Kostas Katrinis Erwin Laure Dimitrios S. Nikolopoulos

Special section on parallel programming.

Ami Marowka Przemyslaw Stpiczynski


Volume 74, Number 3, March 2018
An efficient implementation of pairing-based cryptography on MSP430 processor.

Jihoon Kwon Seog Chung Seo Seokhie Hong

An analytical method for developing appropriate protection profiles of Instrumentation & Control System for nuclear power plants.

Manhyun Chung Woo-Geun Ahn Byung-gil Min Jungtaek Seo Jongsub Moon

Theoretical peak FLOPS per instruction set: a tutorial.

Romain Dolbeau

Hierarchical multicore thread mapping via estimation of remote communication.

Hamidreza Khaleghzadeh Hossein Deldari Ravi Reddy Alexey L. Lastovetsky

Efficient design and hardware implementation of the OpenFlow v1.3 Switch on the Virtex-6 FPGA ML605.

Abbas Yazdinejad Ali Bohlooli Kamal Jamshidi

Apriori-based text mining method for the advancement of the transportation management plan in expressway work zones.

Shin Hyoung Park Jienki Synn Oh Hoon Kwon Yunsick Sung

An effective data fusion-based routing algorithm with time synchronization support for vehicular wireless sensor networks.

Chang Tan Sai Ji Ziyuan Gui Jian Shen Desheng Fu Jin Wang

A method for enhancing end-to-end transfer efficiency via performance tuning factors on dedicated circuit networks with a public cloud platform.

Won-Hyuk Lee Jong-Seon Park Seung-Hae Kim Jin-Hyung Park Joon-Min Gil

Cross-layer design and performance analysis for maximizing the network utilization of wireless mesh networks in cloud computing.

Seokhong Min Young-Sik Jeong Jungho Kang

A load balancing scheme with Loadbot in IoT networks.

Hye-Young Kim

cSketch: a novel framework for capturing cliques from big graph.

Fei Hao Doo-Soon Park

Remote data integrity check for remotely acquired and stored stream data.

Keon-Myung Lee Kyung Mi Lee Sang Ho Lee

Non-intrusive transaction aware filtering during enterprise application modernization.

Ravikumar Ramadoss N. M. Elango Satheesh Abimannan Ching-Hsien Hsu

Analysis of performance measures in cloud-based ubiquitous SaaS CRM project systems.

You-Shyang Chen Chienwen Wu Heng-Hsing Chu Chien-Ku Lin Huan-Ming Chuang

Compressive sampling and data fusion-based structural damage monitoring in wireless sensor network.

Sai Ji Chang Tan Ping Yang Yajie Sun Desheng Fu Jin Wang

An efficient distributed mutual exclusion algorithm for intersection traffic control.

JongBeom Lim Young-Sik Jeong Doo-Soon Park HwaMin Lee

An algorithm to find relationships between web vulnerabilities.

Fernando Román Muñoz Luis Javier García-Villalba

E2FS: an elastic storage system for cloud computing.

Longbin Chen Meikang Qiu Jeungeun Song Zenggang Xiong Houcine Hassan

Secure vehicle traffic data dissemination and analysis protocol in vehicular cloud computing.

Lewis Nkenyereye Youngho Park Kyung-Hyune Rhee

A shareable keyword search over encrypted data in cloud computing.

Li Xu Chi-Yao Weng Lun-Pin Yuan Mu-En Wu Raylin Tso Hung-Min Sun

Fusion algorithms and high-performance applications for vehicular cloud computing.

James J. Park


Volume 74, Number 2, February 2018
Reducing the second-level cache conflict misses using a set folding technique.

Ali M. Shatnawi Mohammad Alsaedeen

A deadlock-free routing algorithm for irregular 3D network-on-chips with wireless links.

Zeynab Mohseni Midia Reshadi

Vectorized algorithm for multidimensional Monte Carlo integration on modern GPU, CPU and MIC architectures.

Przemyslaw Stpiczynski

An efficient parallel processing method for skyline queries in MapReduce.

Junsu Kim Myoung Ho Kim

Weather radar data processing on graphic cards.

Mónica Denham Enrico Lamperti Javier A. Areta

Dlog: diagnosing router events with syslogs for anomaly detection.

Teng Li Jianfeng Ma Cong Sun

Low-rank approximation of large-scale matrices via randomized methods.

Sarvenaz Hatamirad Mir Mohsen Pedram

RePro-Active: a reactive-proactive scheduling method based on simulation in cloud computing.

Noroddin Alaei Faramarz Safi Esfahani

Design and implementation of a Pedestrian recognition algorithm using trilinear interpolation based on HOG-UDP.

Jae-Sung Shim Yong-Wan Ju Seok-Cheon Park

Parallelization of large vector similarity computations in a hybrid CPU+GPU environment.

Pawel Czarnul

DSLM: a decentralized search for large and mobile networks.

Yung-Ting Chuang Chung-Yen Yu Qian-Wei Wu

A new clustering approach in wireless sensor networks using fuzzy system.

Mahnaz Toloueiashtian Homayun Motameni

Efficient routing for dense UWSNs with high-speed mobile nodes using spherical divisions.

Mohammad Reza Khosravi Hamid Basri Habib Rostami

A performance study of the time-varying cache behavior: a study on APEX, Mantevo, NAS, and PARSEC.

Nafiul Alam Siddique Patricia Grubel Abdel-Hameed A. Badawy Jeanine E. Cook

OLM: online LLC management for container-based cloud service.

Hanul Sung Myungsun Kim Jeesoo Min Hyeonsang Eom

Rethinking elastic online scheduling of big data streaming applications over high-velocity continuous data streams.

Dawei Sun Hongbin Yan Shang Gao Xunyun Liu Rajkumar Buyya

TDRM: tensor-based data representation and mining for healthcare data in cloud computing environments.

Rajinder Sandhu Navroop Kaur Sandeep K. Sood Rajkumar Buyya

Toward the design of a novel hybrid parallel N-body method in scope of modern cloud architectures.

Panagiotis E. Kyziropoulos C. K. Filelis-Papadopoulos George A. Gravvanis Christos Efthymiopoulos

Out-of-core implementation for accelerator kernels on heterogeneous clouds.

Hamidreza Khaleghzadeh Ziming Zhong Ravi Reddy Alexey L. Lastovetsky

Large-scale simulation of a self-organizing self-management cloud computing framework.

Christos K. Filelis-Papadopoulos Konstantinos M. Giannoutakis George A. Gravvanis Dimitrios Tzovaras

Special section: towards high performance computing in the cloud.

George A. Gravvanis John P. Morrison Dan C. Marinescu Christos K. Filelis-Papadopoulos


Volume 74, Number 1, January 2018
DoS, impersonation and de-synchronization attacks against an ultra-lightweight RFID mutual authentication protocol for IoT.

Seyed Farhad Aghili Maede Ashouri-Talouki Hamid Mala

Energy constrained scheduling of stochastic tasks.

Keqin Li

GPU-based real-time super-resolution system for high-quality UHD video up-conversion.

Dae-Yeol Lee Jooyoung Lee Ji-Hoon Choi Jong-Ok Kim Hui Yong Kim Jin Soo Choi

Dynamic performance isolation management for cloud computing services.

Nafiseh Fareghzadeh Mir Ali Seyyedi Mehran Mohsenzadeh

Energy-efficient load balancing scheme for two-tier communication in wireless sensor networks.

Sukhchandan Randhawa Sushma Jain

An adaptive task allocation technique for green cloud computing.

Sambit Kumar Mishra Deepak Puthal Bibhudatta Sahoo Sanjay Kumar Jena Mohammad S. Obaidat

On energy consumption of switch-centric data center networks.

Olusogo Popoola Bernardi Pranggono

A fast optimal parallel algorithm for a short addition chain.

Hazem M. Bahig

Survey on clustering in heterogeneous and homogeneous wireless sensor networks.

Ali Shokouhi Rostami Marzieh Badkoobe Farahnaz Mohanna Hengameh Keshavarz Ali Asghar Rahmani Hosseinabadi Arun Kumar Sangaiah

A comprehensive evaluation of availability and operational cost for a virtualized server system using stochastic reward nets.

Tuan Anh Nguyen Dugki Min Eunmi Choi

ECCN: an extended CCN architecture to improve data access in vehicular content-centric network.

Ali Kazemi Niari Reza Berangi Mahmood Fathy

A churn-aware durable data storage scheme in hybrid P2P networks.

Xianfu Meng

A high-performance and energy-efficient exhaustive key search approach via GPU on DES-like cryptosystems.

Armin Ahmadzadeh Omid Hajihassani Saeid Gorgin

A novel buffer management scheme based on particle swarm optimization for SSD.

Yili Wang Kyung Tae Kim Byung Jun Lee Hee Yong Youn

Resource-aware virtual machine placement algorithm for IaaS cloud.

Madnesh K. Gupta Tarachand Amgoth

Recommender system architecture based on Mahout and a main memory database.

Zhegao Piao Seong Joon Yoo Yeong Hyeon Gu Jaechun No Zhiyan Jiang Helin Yin

General queuing model for optimal seamless delivery of payload processing in multi-core processors.

Esther Salamí Cristina Barrado Antonia Gallardo Enric Pastor

A Scalable and Lightweight Grouping Proof Protocol for Internet of Things Applications.

Samad Rostampour Nasour Bagheri Mehdi Hosseinzadeh Ahmad Khademzadeh

On the security of a new ultra-lightweight authentication protocol in IoT environment for RFID tags.

King-Hang Wang Chien-Ming Chen Weicheng Fang Tsu-Yang Wu

Interactive 3D simulation for fluid-structure interactions using dual coupled GPUs.

Bob Zigon Luoding Zhu Fengguang Song

Solving traveling salesman problem using parallel repetitive nearest neighbor algorithm on OTIS-Hypercube and OTIS-Mesh optoelectronic architectures.

Aryaf Al-Adwan Basel A. Mahafzah Ahmad Abdel-Aziz Sharieh