Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 101, Issue 8August 2019
Publisher:
  • Springer-Verlag
  • Berlin, Heidelberg
ISSN:0010-485X
Reflects downloads up to 27 Jan 2025Bibliometrics
Skip Table Of Content Section
article
Using meta-heuristics and machine learning for software optimization of parallel computing systems: a systematic literature review

While modern parallel computing systems offer high performance, utilizing these powerful computing resources to the highest possible extent demands advanced knowledge of various hardware architectures and parallel programming models. Furthermore, ...

article
Virtual network mapping considering energy consumption and availability

Network virtualization is widely considered as a mainstay for overcoming the Internet's ossification problem, and virtual network embedding (VNE) is a critical issue. Over recent years, growing energy costs and increased ecological awareness have ...

article
A parallel bio-inspried shortest path algorithm

Physarum polycephalum is an amoeba-like organism and is able to find the shortest path in a labyrinth. Inspired by P. polycephalum, recently, a mathematical model and an algorithm (Physarum Solver) was developed. There are, however, only sequential ...

article
Instance launch-time analysis of OpenStack virtualization technologies with control plane network errors

We analyzed the performance of a multi-node OpenStack cloud amid different types of controlled and self-induced network errors between controller and compute-nodes on the control plane network. These errors included limited bandwidth, delays and packet ...

article
ECP: a novel clustering-based technique to schedule precedence constrained tasks on multiprocessor computing systems

Efficient scheduling is critical for achieving improved performance of distributed applications where an application is to be considered as a group of interrelated tasks and represented by a task graph. In this work, we present a clustering-based ...

article
An efficient and revocable storage CP-ABE scheme in the cloud computing

As a special kind of public-key encryption, attribute-based encryption (ABE) is able to achieve fine-grained access control mechanism by offering one-to-many encryption. Due to such unique characteristic, this primitive is widely employed in the cloud ...

article
A cross-layer learning automata based gateway selection method in multi-radio multi-channel wireless mesh networks

Wireless networks' applications are increasing gradually necessitating their performance to enhance. Evolution of these networks over time indicates the need for algorithms which can operate based on their dynamic nature. Wireless mesh networks provide ...

article
Implementation and comparison of binary thinning algorithms on GPU

Thinning algorithms have been widely applied in many applications such as computer graphics, computer vision and medical imaging. The performances of thinning algorithms are hampered by the increase of image's size and image's content. By employing ...

article
Monitoring services in the Internet of Things: an optimization approach

Devices in Internet of Things (IoT) often offer services that allow tenants to access data of different metrics collected from sensors. These sensors can be built-in or remotely connected to such devices. Given that such monitoring services are usually ...

article
Identifying influential spreaders based on edge ratio and neighborhood diversity measures in complex networks

In recent years, notable number of research studies have been conducted on the analysis of diffusion process in complex networks. One fundamental problem in this domain is to find the most influential spreader nodes. For achieving a successful spreading ...

article
Dynamic behaviour of competing memes' spread with alert influence in multiplex social-networks

This study elucidates the dynamic behaviour of the two competing mutually exclusive epidemic (meme) spreading model with the alert of memes over multiplex social networks. Each meme spreads over a distinct contact networks $$(CN_1,CN_2)$$(CN1,CN2) of an ...

article
Edge-based personal computing services: fall detection as a pilot study

Current developments in information and electronic technologies have pushed a tremendous amount of applications to meet the demands of personal computing services. Various kinds of smart devices have been launched and applied in our daily lives to ...

Comments