default search action
International Journal of Computational Science and Engineering, Volume 20
Volume 20, Number 1, 2019
- Hongyu Yang, Yuguang Ning, Yue Wang:
Research on RSA and Hill hybrid encryption algorithm. 1-6 - Yonglong Zhang, Bin Li, Mingfen Li, Jin Wang:
An auction mechanism for cloud resource allocation with time-discounting values. 7-14 - Ru Jia, Ru Li, Meng Gao:
Study on data sparsity in social network-based recommender system. 15-20 - Peng Xiao, Changsong Liu:
A novel virtual disk bandwidth allocation framework for data-intensive applications in cloud environments. 21-30 - Weiwei Lin, Zilong Zhang, Shaoliang Peng:
Academic research trend analysis based on big data technology. 31-39 - Gang Xu, Jia-Yi Wang, Hai-He Jin, Peng-Fei Mu:
The discovery in uncertain-social-relationship communities of opportunistic network. 40-48 - Han Xue, Bing Qin, Ting Liu, Shen Liu:
Tag recommendation based on topic hierarchy of folksonomy. 49-58 - Lei Chen, Chong Wu:
Collective entity linking via greedy search and Monte Carlo calculation. 59-68 - Mario Casillo, Francesco Colace, Massimo De Santo, Saverio Lemma, Marco Lombardi:
CAT: a context aware teller for supporting tourist experiences. 69-87 - Mingdong Tang, Fenfang Xie, Wei Liang, Yanmin Xia, Kuan-Ching Li:
Predicting new composition relations between web services via link analysis. 88-101 - André Luiz Marasca, Dalcimar Casanova, Marcelo Teixeira:
Assessing classification complexity of datasets using fractals. 102-119 - Gaoming Yang, Tao Dong, Xianjin Fang, Shuzhi Su:
Association data release with the randomised response based on Bayesian networks. 120-129
Volume 20, Number 2, 2019
- Li Liu, Letian Yang, Qi Fan:
User preferences oriented cloud service selection in multi-cloud environment. 133-145 - Chien-Ping Liu, Ho-Ting Wu, Kai-Wei Ke, Chia-Chih Chien:
The loading-aware energy saving scheme for EPON networks. 146-156 - Yeh-Cheng Chen, Ruey-Shun Chen, Hung-Min Sun, S. Felix Wu:
Using RFID technology to develop an intelligent equipment lock management system. 157-165 - Ralph Duncan:
Managing changes to a packet-processing virtual machine's instruction set architecture over time. 166-178 - Khine Zar Thwe, Mie Mie Thaw:
Spectro-temporal features for environmental sound classification. 179-189 - Shih-Chien Chang, Ja-Ling Wu:
A privacy-preserving cloud-based data management system with efficient revocation scheme. 190-199 - Yumeng Guo, Wenke Wang, Sikun Li:
Out-of-core streamline visualisation based on adaptive partitioning and data prefetching. 200-208 - Xiaoqi Hu, Mengshen Zhao, Shuang Z. Tu, Byunghyun Jang:
Accelerating the discontinuous Galerkin cell-vertex scheme solver on GPU-powered systems. 209-224 - Younes Hajoui, Omar Bouattane, Mohamed Youssfi, El Hossein Illoussamen:
Q-learning and ACO hybridisation for real-time scheduling on heterogeneous distributed architectures. 225-239 - Ferdinando Di Martino, Salvatore Sessa:
Passive image autofocus by using direct fuzzy transform. 240-254 - Cairong Yan, Bin Zhu, Yanglan Gan, Guangwei Xu:
Incremental processing for string similarity join. 255-268 - Yuezhong Wu, Qin Liu, Changyun Li, Guojun Wang:
A hybrid filtering-based network document recommendation system in cloud storage. 269-279
Volume 20, Number 3, 2019
- Samar El Helou, Shinji Kobayashi, Goshiro Yamamoto, Naoto Kume, Eiji Kondoh, Shusuke Hiragi, Kazuya Okamoto, Hiroshi Tamura, Tomohiro Kuroda:
Graph databases for openEHR clinical repositories. 281-298 - Mahesh Lokhande, Mohammad Atique:
Assessment of nested-parallel task model under real-time scheduling on multi-core processors. 299-316 - Guilherme Bonfim De Sousa, Patrícia Helena Moraes Rêgo:
Convergence and numerical stability of action-dependent heuristic dynamic programming algorithms based on RLS learning for online DLQR optimal control. 317-334 - Jingzhao Li, Zihua Chen, Guangming Cao, Mei Zhang:
A decision system based on active perception and intelligent analysis for key location security information. 335-344 - Liming Chen, Zhaoqing Pan, Xiaokai Yi, Yajuan Zhang:
Fast CU size decision based on texture-depth relationship for depth map encoding in 3D-HEVC. 345-353 - Xinsheng Lai, Xiaoyun Xia:
Multi-objective evolutionary algorithm on simplified bi-objective minimum weight minimum label spanning tree problems. 354-361 - Weigang Zou, Wei Li, Zhaoquan Cai:
High-dimensional Arnold inverse transformation for multiple images scrambling. 362-375 - Dongbo Liu, Peng Xiao, Yongjian Li:
Saving energy consumption for mixed workloads in cloud platforms. 376-386 - Chundong Wang, Tong Zhao, Xiu-liang Mo:
The extraction of security situation in heterogeneous log based on Str-FSFDP density peak cluster. 387-396 - Fengfei Wang, Zhen Liu, Chundong Wang:
An improved kNN text classification method. 397-403 - Yongchang Gao, Haowen Guan, Bin Gong:
CODM: an outlier detection method for medical insurance claims fraud. 404-411 - Shuyang Tang, Shengli Liu, Xinyi Huang, Zhiqiang Liu:
Privacy-preserving location-based service protocols with flexible access. 412-423
Volume 20, Number 4, 2019
- Deyou Tang, Yazhuo Zhang, Qingmiao Zeng, Hu Chen:
Performance evaluation of main-memory hash joins on KNL. 425-438 - Rodrigo da Rosa Righi, Vinicius Facco Rodrigues, Luiz Felipe Da Silva Cunha, Cristiano André da Costa:
On providing on-the-fly resizing of the elasticity grain when executing HPC applications in the cloud. 439-456 - João Fabrício Filho, Luis Gustavo Araujo Rodriguez, Anderson Faustino da Silva:
Can the hybrid colouring algorithm take advantage of multi-core architectures? 457-479 - Po-Wen Chi, Ming-Hung Wang, Jing-Wei Guo, Chin-Laung Lei:
MigrateSDN: efficient approach to integrate OpenFlow networks with STP-enabled networks. 480-491 - Quang-Khai Tran, Sa-Kwang Song:
Learning pattern of hurricane damage levels using semantic web resources. 492-500 - Richard Haney, Ram Mohan:
CUDA GPU libraries and novel sparse matrix-vector multiplication - implementation and performance enhancement in unstructured finite element computations. 501-507 - Tao Li, Shaojing Li:
Rational e-voting based on network evolution in the cloud. 508-515 - Qiang Chen, Bin Fang, Yinong Chen, Yan Tang:
An adaptive feature combination method based on ranking order for 3D model retrieval. 516-525 - Qiang Wang, Fucai Zhou, Su Peng, Jian Xu:
Publicly verifiable function secret sharing. 526-535 - Richa, Punam Bedi:
Parallel context-aware multi-agent tourism recommender system. 536-549 - Biaohan Zhang:
Modelling of advanced persistent threat attack monitoring based on the artificial fish swarm algorithm. 550-557 - Punam Bedi, Veenu Bhasin:
Multilayer ensemble of ELMs for image steganalysis with multiple feature sets. 558-569
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.