Abstract is missing.
- Model exploration using OpenMOLE a workflow engine for large scale distributed design of experiments and parameter tuningRomain Reuillon, Mathieu Leclaire, Jonathan Passerat-Palmbach. 1-8 [doi]
- The user support programme and the training infrastructure of the EGI Federated CloudEnol Fernández, Diego Scardaci, Gergely Sipos, David C. H. Wallom, Yin Chen. 9-18 [doi]
- Science gateways - leveraging modeling and simulations in HPC infrastructures via increased usabilitySandra Gesing, Rion Dooley, Marlon E. Pierce, Jens Krüger 0002, Richard Grunzke, Sonja Herres-Pawlis, Alexander Hoffmann. 19-26 [doi]
- A runtime/memory trade-off of the continous Ziggurat method on GPUsChristoph Riesinger, Tobias Neckel. 27-34 [doi]
- Cph CT Toolbox: A performance evaluationJonas Bardino, Martin Rehr, Brian Vinter. 35-46 [doi]
- Acceleration of dRMSD calculation and efficient usage of GPU cachesJiri Filipovic, Jan Plhak, David Strelak. 47-54 [doi]
- Optimizing communications in multi-GPU Lattice Boltzmann simulationsEnrico Calore, Davide Marchi, Sebastiano Fabio Schifano, Raffaele Tripiccione. 55-62 [doi]
- Towards energy-efficient linear algebra with an ATLAS library tuned for energy consumptionJens Lang, Gudula Rünger, Paul Stocker. 63-70 [doi]
- Power variation aware Configuration Adviser for scalable HPC schedulersHayk Shoukourian, Torsten Wilde, Axel Auweter, Arndt Bode. 71-79 [doi]
- Self-optimization of power parameters in WCDMA networksHarrison Mfula, Tero Isotalo, Jukka K. Nurminen. 80-87 [doi]
- MS3: A Mediterranean-stile job scheduler for supercomputers - do less when it's too hot!Andrea Borghesi, Christian Conficoni, Michele Lombardi, Andrea Bartolini. 88-95 [doi]
- On the threats to Cloud-based online service users (and what we can do about them)Gianluca Stringhini. 96-97 [doi]
- Using network data to improve digital investigation in cloud computing environmentsDaniel Spiekermann, Tobias Eggendorfer, Jörg Keller 0001. 98-105 [doi]
- A security framework for population-scale genomics analysisAli Gholami, Jim Dowling, Erwin Laure. 106-114 [doi]
- Analysis of asymmetric 3D DRAM architecture in combination with L2 cache size reductionAlex Schönberger, Klaus Hofmann. 123-128 [doi]
- Tracing long running applications: A case study using GromacsMichael Wagner 0003, Jens Doleschal, Andreas Knüpfer. 129-136 [doi]
- Efficient storage scheme for n-dimensional sparse array: GCRS/GCCSMd Abu Hanif Shaikh, K. M. Azharul Hasan. 137-142 [doi]
- Advanced commands and distributed data layout to enhance the SSD internal parallelismSoraya Zertal. 143-150 [doi]
- On the run-time cost of distributed-memory communications generated using the polyhedral modelAna Moreton-Fernandez, Arturo González-Escribano, Diego R. Llanos. 151-159 [doi]
- Speeding-up the fault-tolerance analysis of interconnection networksD. Bermúdez Garzón, Crispín Gómez Requena, Pedro López, María Engracia Gómez. 160-167 [doi]
- Analyzing available routing engines for InfiniBand-based clusters with Dragonfly topologyGerman Maglione Mathey, Pedro Yebenes, Pedro Javier García, Francisco J. Quiles, Jesús Escudero-Sahuquillo. 168-171 [doi]
- Straightforward modeling of fully-connected dragonfly topologies in HPC-system simulatorsPedro Yebenes, Pedro Javier García, Francisco J. Quiles, Jesús Escudero-Sahuquillo. 172-178 [doi]
- Accurately modeling the GPU memory subsystemFrancisco Candel, Salvador Petit, Julio Sahuquillo, José Duato. 179-186 [doi]
- A honeypot system with honeyword-driven fake interactive sessionsLuigi Catuogno, Aniello Castiglione, Francesco Palmieri. 187-194 [doi]
- A lexical approach for classifying malicious URLsMichael Darling, Greg Heileman, Gilad Gressel, Aravind Ashok, Prabaharan Poornachandran. 195-202 [doi]
- A Completely Automatic Public Physical test to tell Computers and Humans Apart: A way to enhance authentication schemes in mobile devicesMeriem Guerar, Mauro Migliardi, Alessio Merlo, Mohamed Benmohammed, Belhadri Messabih. 203-210 [doi]
- A survey on Information Flow Control mechanisms in web applicationsOscar Zibordi de Paiva, Wilson Vicente Ruggiero. 211-220 [doi]
- Trusted host-based card emulationAlessandro Armando, Alessio Merlo, Luca Verderame. 221-228 [doi]
- A performance analysis of precopy, postcopy and hybrid live VM migration algorithms in scientific cloud computing environmentSyed Asif Raza Shah, Amol Jaikar, Seo-Young Noh. 229-236 [doi]
- Scalable correlation-aware virtual machine consolidation using two-phase clusteringXi Li, Anthony Ventresque, Jesus Omana Iglesias, John Murphy. 237-245 [doi]
- Transient performance evaluation of cloud computing applications and dynamic resource control in large-scale distributed systemsEdwin L. C. Mamani, Lourenço Alves Pereira Jr., Marcos José Santana, Regina H. C. Santana, Pedro Northon Nobile, Francisco José Monaco. 246-253 [doi]
- Improved scheduling algorithm in VCL Cloud computing environment on CloudSimOmar Khedher, Mohamed Jarraya. 254-261 [doi]
- GPU accelerated ray launching for high-fidelity virtual test drives of VANET applicationsManuel Schiller, Alois Knoll, Marina Mocker, Thomas Eibert. 262-268 [doi]
- A collaboration middleware for service scalability in peer-to-peer systemsSung-Soo Kim, Chunglae Cho, Jongho Won. 269-276 [doi]
- Experiments in fair scheduling in 4G WiMAX and LTEJunaid Ahmed Zubairi, Erdem Erdogan, Shaun Reich. 277-282 [doi]
- A fuzzy logic controlled mobility model based on simulated traffics' characteristics in MANETChen Chen, Qingqi Pei. 283-289 [doi]
- Automated nanostructure microscopic image characterization and analysisVesna Zeljkovic, Claude Tameze, Darrin J. Pochan, Yingchao Chen, Ventzeslav Valev. 290-297 [doi]
- Quartiles and Mel Frequency Cepstral Coefficients vectors in Hidden Markov-Gaussian Mixture Models classification of merged heart sounds and lung sounds signalsPedro Mayorga, Daniela Ibarra, Vesna Zeljkovic, Christopher Druzgalski. 298-304 [doi]
- Wireless Power transfer system modelling based on neural Network with adaptive filteringKarim Gamal ElSayed, Nesrine Amin Elessawy, Ahmed Khamies El-Shenawy. 305-310 [doi]
- Active learning for support vector regression in radiation shielding designPaulina Duckic, Kresimir Trontl, Mario Matijevic. 311-317 [doi]
- Utilization of room-to-room transition time in Wi-Fi fingerprint-based indoor localizationIsil Karabey, Levent Bayindir. 318-322 [doi]
- ESub: Mining and exploring substructures in knowledge-intensive processesClaudia Diamantini, Laura Genga, Domenico Potena. 323-324 [doi]
- Gossip-based spectral clustering of distributed data streamsMatt Talistu, Teng-Sheng Moh, Melody Moh. 325-333 [doi]
- ® microarchitectureSatish Kumar Sadasivam, S. Thamarai Selvi. 334-341 [doi]
- Effective topic modeling for emailHiep Hong, Teng-Sheng Moh. 342-349 [doi]
- Multi-Agent modeling for match-making using BDI architectureMazhar Sajjad, Karandeep Singh, Chang-Won Ahn. 350-355 [doi]
- Performance evaluation of Optical Packet Switches on high performance applicationsHugo Meyer, José Carlos Sancho, Wang Miao, Harm J. S. Dorren, Nicola Calabretta, Montse Farreras. 356-363 [doi]
- Electromagnetic-based nanonetworks communication in SoC designO. Yalgashev, Mohamed Bakhouya, Abderrahim Chariete, Jaafar Gaber, M. Manier. 364-370 [doi]
- Comparison of hexagonal and rectangular processor arraysEdward Kresch. 371-376 [doi]
- Fast and scalable NUMA-based thread parallel breadth-first searchYuichiro Yasui, Katsuki Fujisawa. 377-385 [doi]
- WCET nested-loop minimization in terms of instruction-level-parallelismYaroub Elloumi, Mohamed Akil, Mohamed Hedi Bedoui. 386-393 [doi]
- Parallel Branch-and-Bound using private IVM-based work stealing on Xeon Phi MIC coprocessorNouredine Melab, Rudi Leroy, Mohand Mezmaz, Daniel Tuyttens. 394-399 [doi]
- A Reduced Complexity Instruction Set architecture for low cost embedded processorsHanni B. Lozano, Mabo Ito. 400-407 [doi]
- Deep learning with shallow architecture for image classificationAsma ElAdel, Ridha Ejbali, Mourad Zaied, Chokri Ben Amar. 408-412 [doi]
- Market-inspired dynamic resource allocation in many-core high performance computing systemsAmit Kumar Singh, Piotr Dziurzanski, Leandro Soares Indrusiak. 413-420 [doi]
- 234 scheduling of 3-2 and 2-1 eliminations for parallel image compositing using non-power-of-two number of processesJorji Nonaka, Kenji Ono, Masahiro Fujita. 421-428 [doi]
- In search of the best MPI-OpenMP distribution for optimum Intel-MIC cluster performanceGladys Utrera, Marisa Gil, Xavier Martorell. 429-435 [doi]
- Twinned buffering: A simple and highly effective scheme for parallelization of Successive Over-Relaxation on GPUs and other acceleratorsWim Vanderbauwhede, Tetsuya Takemi. 436-443 [doi]
- Performance analysis with a memory-bound Monte Carlo simulation on Xeon PhiPierre Schweitzer, Claude Mazel, David R. C. Hill, Cristina Carloganu. 444-452 [doi]
- Enabling a Quantum Monte Carlo application for the DEEP architectureAndrew Emerson, Fabio Affinito. 453-457 [doi]
- Designing HPC libraries in the modern C++ worldJoël Falcou. 458-459 [doi]
- Large Java arrays and their applicationsPiotr Wendykier, Bartosz Borucki, Krzysztof Nowinski. 460-467 [doi]
- On the fly reconfiguration of interactive scientific visualization applicationsAbderrahim Ait Wakrime, Sébastien Limet, Sophie Robert. 468-475 [doi]
- The Batched DOACROSS loop parallelization algorithmDivino Cesar S. Lucas, Guido Araujo. 476-483 [doi]
- Applying domain decomposition Schwarz method to accelerate wind field calculationGemma Sanjuan, Tomàs Margalef, Ana Cortés. 484-490 [doi]
- A four-decomposition strategies for hierarchically modeling combinatorial optimization problems: framework, conditions and relationsMarouene Chaieb, Jaber Jemai, Khaled Mellouli. 491-498 [doi]
- A fault-tolerant gyrokinetic plasma application using the sparse grid combination techniqueMd. Mohsin Ali, Peter E. Strazdins, Brendan Harding, Markus Hegland, Jay W. Larson. 499-507 [doi]
- Identifying patterns towards Algorithm Based Fault ToleranceUpama Kabir, Dhrubajyoti Goswami. 508-516 [doi]
- Many-core CPUs can deliver scalable performance to stochastic simulations of large-scale biochemical reaction networksElias Kouskoumvekakis, Dimitrios Soudris, Elias S. Manolakos. 517-524 [doi]
- Measuring cells in phytoplankton imagesMaria Mirto, L. Conte, Giovanni Aloisio, Cosimo Distante, Pietro Vecchio, Giovanni Aloisio. 525-530 [doi]
- DBSCAN on Resilient Distributed DatasetsIrving Cordova, Teng-Sheng Moh. 531-540 [doi]
- Big data exploration with faceted browsingGiovanni Simonini, Song Zhu. 541-544 [doi]
- A workflow-enabled big data analytics software stack for escienceCosimo Palazzo, A. Mariello, Sandro Fiore, Alessandro D'Anca, Donatello Elia, Dean N. Williams, Giovanni Aloisio. 545-552 [doi]
- Improving tourist experience by Big Data toolsNunziato Cassavia, Pietro Dicosta, Elio Masciari, Domenico Saccà. 553-556 [doi]
- Quantum computing: How far away is it?Koen Bertels. 557-558 [doi]
- Real-time mixed-criticality Network-on-Chip resource allocationLeandro Soares Indrusiak. 559-560 [doi]
- Immortalizing many-core systems early experiences of the horizon 2020 action IMMORTALJaan Raik. 561-562 [doi]
- Investigation of DVFS based dynamic reliability management for chip multiprocessorsMilad Ghorbani Moghaddam, Alexandre Yasuo Yamamoto, Cristinel Ababei. 563-568 [doi]
- On-demand reconfiguration for coprocessors in mixed criticality multicore systemsViet Vu Duy, Oliver Sander, Timo Sandmann, Jan Heidelberger, Steffen Baehr, Jürgen Becker. 569-576 [doi]
- GRT angle migration a 5D data mapping problemDirk Merten, Norman Ettrich. 577-580 [doi]
- Performance analysis of the COSMO-CLM modelSilvia Mocavero, Antonella Nigro, Arianna Resta, Cinzia Rosato, Giacomo Sciolti, Italo Epicoco, Giovanni Aloisio. 581-588 [doi]
- On the problem-decomposition of scalable 4D-Var Data Assimilation modelsRossella Arcucci, Luisa D'Amore, Luisa Carracciuolo. 589-594 [doi]
- Toward a fully parallel multigrid in time algorithm in PETSc environment: A case study in ocean modelsLuisa Carracciuolo, Luisa D'Amore, Valeria Mele. 595-598 [doi]
- Requirement checklist for infrastructure monitoring of swiftPragya Jain, Anita Goel, Suresh Chand Gupta. 599-604 [doi]
- An efficient implementation of fuzzy edge detection using GPU in MATLABFarnaz Hoseini, Asadollah Shahbahrami. 605-610 [doi]
- Real-time signal identification in big data streams Bragg-Spot localization in photon scienceDaniel Becker, Achim Streit. 611-616 [doi]
- A resilient routing approach for Mobile Ad Hoc NetworksMing-Yang Su, Chih-Wei Yang. 617-622 [doi]
- Efficient Asian option pricing with CUDAArtur Yuzhanin, Ivan Gankevich, Eduard Stepanov, Vladimir Korkhov. 623-628 [doi]
- GPGPU performance evaluation of some basic molecular dynamics algorithmsAlexander S. Minkin, Anton B. Teslyuk, Andrey A. Knizhnik, Boris V. Potapkin. 629-634 [doi]
- Cookery: A framework for developing cloud applicationsMikolaj Baranowski, Adam Belloum, Marian Bubak. 635-638 [doi]
- Subordination: Cluster management without distributed consensusIvan Gankevich, Yuri Tipikin, Vladimir Gaiduchok. 639-642 [doi]
- NoC-centric partitioning and reconfiguration technologies for the efficient sharing of multi-core programmable acceleratorsMarco Balboni, Davide Bertozzi. 643-645 [doi]
- Data and process abstractions for cloud computingMikolaj Baranowski, Marian Bubak, Adam Belloum. 646-649 [doi]
- Performance evaluation and improvement in cloud computing environmentOmar Khedher, Mohamed Jarraya. 650-652 [doi]
- Current challenges in simulations of HPC systemsSalvador Petit. 653-655 [doi]
- Car2x with software defined networks, network functions virtualization and supercomputers technical and scientific preparations for the Amsterdam Arena telecoms fieldlabRobert J. Meijer, Reginald Cushing, Cees de Laat, Perry Jackson, Sander Klous, Ralph Koning, Marc X. Makkes, Arthur Meerwijk. 656-657 [doi]
- Predictive analytics on evolving data streams anticipating and adapting to changes in known and unknown contextsMykola Pechenizkiy. 658-659 [doi]
- Techniques to improve the scalability of collective checkpointing at large scaleBogdan Nicolae. 660-661 [doi]
- Explaining disease using big data: How valid is your pathway?Bas Stringer, Maurits Dijkstra, K. Anton Feenstra, Sanne Abeln, Jaap Heringa. 662-664 [doi]
- A new reality requiers new ecosystemsSander Klous. 665-666 [doi]
- How advanced cloud technologies can impact and change HPC environments for simulationMarco Mancini, Giovanni Aloisio. 667-668 [doi]
- Revisiting co-scheduling for upcoming ExaScale systemsStefan Lankes. 669-670 [doi]
- Opportunistic vehicular networking: Large-scale bus movement traces as base for network analysisMichael Doering, Lars C. Wolf. 671-678 [doi]