Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Bibliometrics
research-article
Model-based sensitivity analysis of IaaS cloud availability

The increasing shift of various critical services towards Infrastructure-as-a-Service (IaaS) cloud data centers (CDCs) creates a need for analyzing CDCs availability, which is affected by various factors including repair policy and system parameters. ...

research-article
A GSA based hybrid algorithm for bi-objective workflow scheduling in cloud computing

Workflow Scheduling in cloud computing has drawn enormous attention due to its wide application in both scientific and business areas. This is particularly an NP-complete problem. Therefore, many researchers have proposed a number of heuristics as well ...

research-article
Efficient hybrid multicast approach in wireless data center network

Large-scale data center suffers from overload of data traffic on some bottleneck links, due to the fact that cloud-based services are mostly accomplished by group communications with multicast traffic. This paper investigates techniques of wireless ...

research-article
LayerMover

Live Virtual Machine (VM) migration across data centers is an important technology to facilitate cloud management and deepen the cooperation between cloud providers. Without the support of a shared storage system between data centers, migrating the ...

research-article
A collaborative analysis method of user abnormal behavior based on reputation voting in cloud environment

It is the foundation of accessing and controlling cloud environment to establish the mutual trust relationship between users and clouds. How to identify the credible degree of the user identity and its behaviors have become the core problems. Combining ...

research-article
Timetable-aware opportunistic DTN routing for vehicular communications in battlefield environments

Delay tolerant network (namely DTN) is regarded as a promising technology for communications in challenging environments for its resilience and adaptability. However, efficient and reliable routing algorithm design is still one of many difficulties it ...

research-article
JobPruner

High Performance Computing (HPC) applications are essential for scientists and engineers to create and understand models and their properties. These professionals depend on the execution of large sets of computational jobs that explore combinations of ...

research-article
FAMOUS

With the emergence of Android as a leading operating system in mobile devices, it becomes mandatory to develop specialized, predictive and robust security measures to provide a dependable environment for users. Extant reactive and proactive security ...

research-article
Research on access control model of social network based on distributed logic

Highly decentralized, dynamic and fine-grained access control models of social networks need that the access control mechanisms of social networks own sufficient expressiveness and flexibility. Most of current authorizations are difficult to satisfy the ...

research-article
Dynamic metric embedding model for point-of-interest prediction

POI (Point-of-interest) prediction is a significant issue in recent years. It can not only enhance user experience in location-based service and apps but also promote the perceived ability of business to potential consumers. However, the accuracy of POI ...

research-article
In-memory big data analytics under space constraints using dynamic programming

The emergence of persistent memories has powered the data processing with the in-memory environment and in-memory data analytics have become an advance of high-performance data processing. Recent explorations of using in-memory technologies address the ...

research-article
AODV routing protocol for Cognitive radio access based Internet of Things (IoT)

Proactive based RPL is the network layer routing protocol designed for route-discovery to transmit the constrained application data from leaf nodes (LLN) to the LLN boarder router (LBR). From LLN boarder router (LBR) to the destination that is connected ...

research-article
An investigation into the impacts of task-level behavioural heterogeneity upon energy efficiency in Cloud datacentres

Cloud datacentre resources and the arriving jobs are addressed to be exhibiting increased level of heterogeneity. A single Cloud job may encompass one to several number of tasks, such tasks usually exhibit increased level of behavioural heterogeneity ...

research-article
HEPart

Minimizing the query cost among multi-hosts is important to data processing for big data applications. Hypergraph is good at modelingdata and data relationships of complex networks, the typical big data applications, by representing multi-way ...

research-article
Efficient and robust attribute-based encryption supporting access policy hiding in Internet of Things

The term of Internet of Things (IoT) remarkably increases the ubiquity of the internet by integrating smart object-based infrastructures. How to achieve efficient fine-grained data access control while preserving data privacy is a challenge task in the ...

research-article
Personalized location prediction for group travellers from spatialtemporal trajectories

In recent years, research on location predictions by mining trajectories of users has attracted a lot of attentions. Existing studies on this topic mostly focus on individual movements, considering the trajectories as solo movements. However, a user ...

research-article
DTRM

Cloud computing and the mobile Internet have been the two most influential information technology revolutions, which intersect in mobile cloud computing (MCC). The burgeoning MCC enables the large-scale collection and processing of big data, which ...

research-article
Multi-scale image fusion through rolling guidance filter

Image fusion is essential in enhancing visual quality by blending complementary images, which are derived from different captured conditions or different sensors in the same scene. The role of image fusion in the Internet of Things has become ...

research-article
SocioScope

Social data is one of important material for representing social activities. However, efficiently collecting social data from multiple sources is extremely hard due its big-data attributes. Moreover, discovering hidden patterns between social data to ...

research-article
Gait and tremor investigation using machine learning techniques for the diagnosis of Parkinson disease

Parkinsons disease (PD) is a chronic and progressive movement disorder affecting patients in large numbers throughout the world. As PD progresses, the affected person is unable to control movement normally. Individuals affected by Parkinsons disease ...

research-article
Correlation of cascade failures and centrality measures in complex networks

In complex networks, different nodes have distinct impact on overall functionality and resiliency against failures. Hence, identifying vital nodes is crucial to limit the size of the damage during a cascade failure process, enabling us to identify the ...

research-article
Centrality measures for evacuation

In this paper, we study the agility of evacuation routes in relation to dynamically changing unpredictable hazardous conditions in smart space networks. Infrastructure safety conditions may unpredictably change through time. Due to unpredictability, ...

research-article
QRE

Robustness estimation is critical for the design and maintenance of resilient networks. Existing studies on network robustness usually exploit a single network metric to generate attack strategies, which simulate intentional attacks on a network, and ...

research-article
An insertiondeletioncompensation model with Poisson process for scale-free networks

A novel insertiondeletioncompensation model with Poisson process for the scale-free complex network is explored. In the proposed model, a batch of newly added nodes are inserted into the network with the rate at under Poisson process and each new node ...

research-article
Analyzing the structure of Java software systems by weighted K-core decomposition

Statistical properties of un-weighted software networks have been extensively studied. However, software networks in their nature should be weighted. Understanding the properties enclosed in the weighted software networks can lead to better software ...

research-article
Spectrum bounds for the scattering number, integrity, tenacity of regular graphs

There are several measures or graph parameters of the vulnerability and reliability of a communication network, such as connectivity, toughness, scattering number, integrity, tenacity, rupture degree and edge-analogues of some of them. Among these ...

research-article
Symmetric graphs and interconnection networks

An interconnection network is usually modelled by an undirected graph in which vertices represent processors or memory modules, and edges represent communication links. It is known that the symmetric properties of a graph (such as the vertex regularity, ...

research-article
Model matching of input/output asynchronous sequential machines based on the semi-tensor product of matrices

This paper investigates the model matching problem of input/output asynchronous sequential machines (ASMs) based on the semi-tensor product (STP) of matrices. The controller of the model matching problem is separated to an observer B and a control unit ...

research-article
Rigorous or tolerant

In the collaborative network environment, the ubiquitous cooperation phenomenon among autonomous and selfish individuals has drawn extensive attentions during the last years. The evolution of spatial public goods game has provided an important ...

research-article
Information reliability in complex multitask networks

In this paper, we study the performance of multitask distributed networks where sharing genuine information is costly. We formulate an information credibility model which links the probability of sharing genuine information at each time instant to the ...

Comments