default search action
Computers & Electrical Engineering, Volume 47
Volume 47, October 2015
- Nassim Mirjazaee, Neda Moghim:
An opportunistic routing based on symmetrical traffic distribution in vehicular networks. 1-12 - Gustavo Gonzalez Granadillo, Joaquín García-Alfaro, Ender Alvarez, Mohammed El-Barbori, Hervé Debar:
Selecting optimal countermeasures for attacks against critical systems using the attack volume model and the RORI index. 13-34 - Astik Biswas, Prakash Kumar Sahu, Mahesh Chandra:
Multiple camera in car audio-visual speech recognition using phonetic and visemic information. 35-50 - M. Nishat Akhtar, Junita Mohamad-Saleh, Othman Sidek:
Design and simulation of a parallel adaptive arbiter for maximum CPU utilization using multi-core processors. 51-68 - Deborah Maria Vieira Magalhães, Rodrigo N. Calheiros, Rajkumar Buyya, Danielo Goncalves Gomes:
Workload modeling for resource usage analysis and simulation in cloud computing. 69-81 - Deepti Mittal, Kajal Kumari:
Automated detection and segmentation of drusen in retinal fundus images. 82-95 - M. Tarek Ibn Ziad, Mohamed Hossam, Mohamad A. Masoud, Mohamed Nagy, Hesham A. Adel, Yousra Alkabani, M. Watheq El-Kharashi, Khaled Salah, Mohamed Abdel Salam:
On kernel acceleration of electromagnetic solvers via hardware emulation. 96-113 - Xuehua Zhao, Daoliang Li, Bo Yang, Huiling Chen, Xinbin Yang, Chenglong Yu, Shuangyin Liu:
A two-stage feature selection method with its application. 114-125 - Faisal Nadeem Khan, Chiew Hoon Teow, Shiu Guong Kiu, Ming Chieng Tan, Yudi Zhou, Waled Hussein Al-Arashi, Alan Pak Tao Lau, Chao Lu:
Automatic modulation format/bit-rate classification and signal-to-noise ratio estimation using asynchronous delay-tap sampling. 126-133
- Danielo Goncalves Gomes, Luiz Fernando Bittencourt, Rafael Tolosana-Calasanz:
Introduction to the Special Section on "Cloud computing: Current advances and new research trends". 135-137 - Sukhpal Singh, Inderveer Chana:
Q-aware: Quality of service based cloud resource provisioning. 138-160 - Yunchang Liu, Chunlin Li, Zhiyong Yang:
Tradeoff between energy and user experience for multimedia cloud computing. 161-172 - Hadi Khani, Amin Latifi, Nasser Yazdani, Siamak Mohammadi:
Distributed consolidation of virtual machines for power efficiency in heterogeneous cloud data centers. 173-185 - Saad Mustafa, Babar Nazir, Amir Hayat, Atta ur Rehman Khan, Sajjad Ahmad Madani:
Resource management in cloud computing: Taxonomy, prospects, and challenges. 186-203 - Da-Ren Chen, Kai-Feng Chiang:
Cloud-based power estimation and power-aware scheduling for embedded systems. 204-221 - Ehsan Arianyan, Hassan Taheri, Saeed Sharifian:
Novel energy and SLA efficient resource management heuristics for consolidation of virtual machines in cloud data centers. 222-240 - Subhadra Bose Shaw, Anil Kumar Singh:
Use of proactive and reactive hotspot detection technique to reduce the number of virtual machine migration and energy consumption in cloud data center. 241-254
- Joaquín García-Alfaro, Francesco Longo, Gregorio Martínez Pérez:
Introduction to the special section on critical systems modelling and security. 255-257 - Gabriele Lenzini, Sjouke Mauw, Samir Ouchani:
Security analysis of socio-technical physical systems. 258-274 - Stefano Marrone, Ricardo J. Rodríguez, Roberto Nardone, Francesco Flammini, Valeria Vittorini:
On synergies of cyber and physical security modelling in vulnerability assessment of railway systems. 275-285 - Fabrizio Baiardi, Federico Tonelli, Luca Guidi, Daniela Pestonesi, V. Angeletti:
Assessing and managing the information and communication risk of power generation. 286-298 - Lorena Cazorla, Cristina Alcaraz, Javier López:
Awareness and reaction strategies for critical infrastructure protection. 299-317 - Gianluca Dini, Lanfranco Lopriore:
Password systems: Design and implementation. 318-326 - Harsha K. Kalutarage, Siraj Ahmed Shaikh, Indika P. Wickramasinghe, Qin Zhou, Anne E. James:
Detecting stealthy attacks: Efficient monitoring of suspicious activities on computer networks. 327-344
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.