


default search action
International Journal of Parallel, Emergent and Distributed Systems, Volume 30
Volume 30, Number 1, 2015
- Ivan Stojmenovic:

Editorial. 1-2 - Shui Yu

:
Special Issue on networking aspects in Big Data. 3-4
- Jemal H. Abawajy:

Comprehensive analysis of big data variety landscape. 5-14 - Krzysztof Walkowiak

, Michal Wozniak
, Miroslaw Klinkowski
, Wojciech Kmiecik
:
Optical networks for cost-efficient and scalable provisioning of big data traffic. 15-28 - Guobin Xu, Wei Yu

, Zhijiang Chen, Hanlin Zhang
, Paul Moulema, Xinwen Fu
, Chao Lu:
A cloud computing based system for cyber security management. 29-45 - Mauro Femminella, Emilia Nunzi, Gianluca Reali, Dario Valocchi:

Networking issues related to delivering and processing genomic big data. 46-64 - Tom Tofigh, Sasan Adibi, Amin Mobasher

, Masood Mortazavi:
Novel approach to big data collaboration with network operators network function virtualisation (NFV). 65-78
Volume 30, Number 2, 2015
- Pete Burnap

, Omer F. Rana
, Matthew L. Williams
, William Housley, Adam Edwards
, Jeffrey Morgan, Luke Sloan, Javier Conejero
:
COSMOS: Towards an integrated and scalable service for analysing social media on demand. 80-100 - Bidi Ying, Dimitrios Makrakis:

Protecting location privacy in vehicular networks against location-based attacks. 101-117 - M. Sridevi

, C. Mala, Siddhant Sanyam:
Optimised template matching techniques in parallel environment with exhaustive search and swarm intelligence. 118-134 - Ramesh Singh

, Sandip Chakraborty, Sushanta Karmakar:
Concurrent deterministic 1-2 skip list in distributed message passing systems. 135-174
Volume 30, Number 3, 2015
- Monalisa Mandal

, Anirban Mukhopadhyay
:
A novel PSO-based graph-theoretic approach for identifying most relevant and non-redundant gene markers from gene expression data. 175-192 - Aleksandr Khasymski, Dimitrios S. Nikolopoulos

:
Scalable black-box prediction models for multi-dimensional adaptation on NUMA multi-cores. 193-210 - Nana Yaw Asabere

, Feng Xia
, Qinxue Meng, Fengqi Li, Haifeng Liu:
Scholarly paper recommendation based on social awareness and folksonomy. 211-232 - Kinga Lipskoch, Oliver E. Theel:

Relaxing data consistency along different dimensions for increasing operation availabilities. 233-261
Volume 30, Number 4, 2015
- Mrinal Nandi

, Amiya Nayak
, Bimal K. Roy, Santanu Sarkar
:
Hypothesis testing and decision theoretic approach for fault detection in wireless sensor networks. 262-285 - Ali El-Moursy

, Walid El-Reedy, Hossam A. H. Fahmy:
Fair memory access scheduling algorithms for multicore processors. 286-308 - Mayez Al-Mouhamed, Ayaz ul Hassan Khan

:
Exploration of automatic optimisation for CUDA programming. 309-324 - Mohammad Rayati

, Aras Sheikhi, Ali Mohammad Ranjbar:
Optimising operational cost of a smart energy hub, the reinforcement learning approach. 325-341
Volume 30, Number 5, 2015
- Toktam Ghafarian-M.

, Bahman Javadi, Rajkumar Buyya:
Decentralised workflow scheduling in volunteer computing systems. 343-365 - Xiaonan Wang, Hongbin Cheng, Yufeng Yao:

Mobility support for IPv6-based VANET. 366-379 - Wei-Tee Lin, Chih-Ping Chu:

Determining the appropriate number of nodes for fast mining of frequent patterns in distributed computing environments. 380-392 - Kangkang Li, Huanyang Zheng, Jie Wu, Xiaojiang Du:

Virtual machine placement in cloud systems through migration process. 393-410 - Abdullah Alamri, Peter Bertók

, Adil Fahad:
Towards an architecture for managing semantic knowledge in semantic repositories. 411-425
Volume 30, Number 6, 2015
Guest Editorial
- Xavi Masip

, Abdelhamid Mellouk, Stefano Testa, Eva Marín-Tordera, Guang-Jie Ren, Said Hoceini:
Smart Communications in Network Technologies. 426-427
- Carolina Fernandez

, Carlos Bermudo, Gino Carrozzo
, Roberto Monno, Bartosz Belter, Kostas Pentikousis, Umar Toseef, Tomohiro Kudoh, Atsuko Takefusa, Jason Haga, Bart Puype, Jin Tanaka:
A recursive orchestration and control framework for large-scale, federated SDN experiments: the FELIX architecture and use cases. 428-446 - Mohammad Fal Sadikin, Marcel Kyas:

IMAKA-Tate: secure and efficient privacy preserving for indoor positioning applications. 447-463 - Antonio Cuadra Sánchez

, Javier Aracil, Javier Ramos de Santiago
:
Proposal of a new information theory-based technique based on traffic anomaly detection analysis. 464-477 - Roger Immich

, Pedro Borges, Eduardo Cerqueira, Marília Curado
:
QoE-driven video delivery improvement using packet loss prediction. 478-493 - Jing Wang, Miodrag Bolic:

Reducing the phase cancellation effect in augmented RFID system. 494-514 - Mohamed Oulmahdi, Christophe Chassot, Nicolas Van Wambeke:

Transport protocols: limitations, evolution obstacles and solutions for an actual deployment in the Internet. 515-535

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














