Journal: Cluster Computing

Volume 21, Issue 4

1735 -- 1764Amjad Ullah, Jingpeng Li, Yindong Shen, Amir Hussain. A control theoretical view of cloud elasticity: taxonomy, survey and challenges
1765 -- 1783K. Munivara Prasad, A. Rama Mohan Reddy, K. Venugopal Rao. DEFAD: ensemble classifier for DDOS enabled flood attack defense in distributed network environment
1785 -- 1795Roktaek Lim, Yeongha Lee, Raehyun Kim, Jaeyoung Choi. An implementation of matrix-matrix multiplication on the Intel KNL processor with AVX-512
1797 -- 1820Hicham Ben Alla, Said Ben Alla, Abdellah Touhafi, Abdellah Ezzati. A novel task scheduling approach based on dynamic queues and hybrid meta-heuristic algorithms for cloud computing environment
1821 -- 1847Mehrdad Almasi, Mohammad Saniee Abadeh. A new MapReduce associative classifier based on a new storage format for large-scale imbalanced data
1849 -- 1863Huiying Hou, Jia Yu, Hanlin Zhang, Yan Xu, Rong Hao. Enabling secure auditing and deduplicating data without owner-relationship exposure in cloud storage
1865 -- 1879Nae Young Song, Hwajung Kim, Hyuck Han, Heon Young Yeom. Optimizing of metadata management in large-scale file systems
1881 -- 1897Mohammad Mahdi Tajiki, Behzad Akbari, Mohammad Shojafar, Seyed Hesomodding Ghasemi, Mahdi Latifi Barazandeh, Nader Mokari, Luca Chiaraviglio, Michael Zink. CECT: computationally efficient congestion-avoidance and traffic engineering in software-defined cloud data centers
1899 -- 1915Sergio Serrano-Iglesias, Eduardo Gómez-Sánchez, Miguel L. Bote-Lorenzo, Juan I. Asensio-Pérez, Manuel Rodríguez-Cayetano. A self-scalable distributed network simulation environment based on cloud computing
1917 -- 1931Taher Al-Shehari, Sami Zhioua. An empirical study of web browsers' resistance to traffic analysis and website fingerprinting attacks
1933 -- 1947Anmin Fu, Yiming Zhu, Guomin Yang, Shui Yu, Yan Yu. Secure outsourcing algorithms of modular exponentiations with optimal checkability based on a single untrusted cloud server
1949 -- 1965Dzmitry Makatun, Jérôme Lauret, Hana Rudová. Planning of distributed data production for High Energy and Nuclear Physics
1967 -- 1980Chamseddine Hamdeni, Tarek Hamrouni, Faouzi Ben Charrada. Evaluation of site availability exploitation towards performance optimization in data grids
1981 -- 1999Benay Kumar Ray, Avirup Saha, Sarbani Roy. Migration cost and profit oriented cloud federation formation: hedonic coalition game based approach
2001 -- 2011Hatem M. Bahig, Khaled A. AbdElbari. A fast GPU-based hybrid algorithm for addition chains
2013 -- 2029ChunLin Li, Tang Jianhang, Youlong Luo. Towards operational cost minimization for cloud bursting with deadline constraints in hybrid clouds

Volume 21, Issue 3

1457 -- 1477Achal Kaushik, Deo Prakash Vidyarthi. A model for resource management in computational grid using sequential auction and bargaining procurement
1479 -- 1492Uras Tos, Riad Mokadem, Abdelkader Hameurlain, Tolga Ayav, Sebnem Bora. Ensuring performance and provider profit through data replication in cloud systems
1493 -- 1506Izzat Alsmadi, Abdallah Khreishah, Dianxiang Xu. Network slicing to improve multicasting in HPC clusters
1507 -- 1520Kang-Wook Chon, Min-Soo Kim 0002. BIGMiner: a fast and scalable distributed frequent pattern miner for big data
1521 -- 1541Ching-Wen Chen, An Hsia, Yong-Wei Zhan, Tzong-Jye Liu. Energy-efficient hybrid coherence protocol for multicore processors
1543 -- 1560Guo Zhou, Rui Wang, Yongquan Zhou. Flower pollination algorithm with runway balance strategy for the aircraft landing scheduling problem
1561 -- 1579Zhengyu Yang, Yufeng Wang, Janki Bhamini, Chiu Chiang Tan, Ningfang Mi. EAD: elasticity aware deduplication manager for datacenters with multi-tier storage systems
1581 -- 1593Xiaoyong Tang, Xiaoyi Liao, Jie Zheng, Xiaopan Yang. Energy efficient job scheduling with workload prediction on cloud data center
1595 -- 1606Christopher Liao, Yonatan Klausner, David Starobinski, Eran Simhon, Azer Bestavros. A case study of a shared/buy-in computing ecosystem
1607 -- 1622Haiou Jiang, Haihong E, Meina Song. Multi-prediction based scheduling for hybrid workloads in the cloud data center
1623 -- 1638Kanniga Devi Rangaswamy, Murugaboopathi Gurusamy, M. Muthukannan. Load monitoring and system-traffic-aware live VM migration-based load balancing in cloud data center using graph theoretic solutions
1639 -- 1665Shimaa E. El-Sayyad, Ahmed I. Saleh, Hesham A. Ali. A new semantic web service classification (SWSC) strategy
1667 -- 1680Altaf Hussain, Muhammad Aleem, Abid Khan, Muhammad Azhar Iqbal, Muhammad Arshad Islam. RALBA: a computation-aware load balancing scheduler for cloud computing
1681 -- 1709Robayet Nasim, Enrica Zola, Andreas J. Kassler. Robust optimization for energy-efficient virtual machine consolidation in modern datacenters
1711 -- 1733Reza Mohammadi Bahram Abadi, Amir Masoud Rahmani, Sasan H. Alizadeh. Self-adaptive architecture for virtual machines consolidation based on probabilistic model evaluation of data centers in Cloud computing

Volume 21, Issue 2

1189 -- 1202Wai-Kong Lee, Raphael C.-W. Phan, Geong Sen Poh, Bok-Min Goi. SearchaStore: fast and secure searchable cloud services
1203 -- 1241Sukhpal Singh Gill, Inderveer Chana, Maninder Singh, Rajkumar Buyya. CHOPPER: an intelligent QoS-aware autonomic resource management approach for cloud computing
1243 -- 1260Vimalkumar Kumaresan, Ramachandran Baskaran, P. Dhavachelvan. AEGEUS++: an energy-aware online partition skew mitigation algorithm for mapreduce in cloud
1261 -- 1273Francisco Luna, Alejandro Cervantes, Pedro Isasi, Juan F. Valenzuela-Valdés. Grid-enabled evolution strategies for large-scale home care crew scheduling
1275 -- 1287Zhuo Liu, Bin Wang, Weikuan Yu. HALO: a fast and durable disk write cache using phase change memory
1289 -- 1300Marcos Dias de Assunção, Laurent Lefèvre. Bare-metal reservation for cloud: an analysis of the trade off between reactivity and energy efficiency
1301 -- 1309Shubo Chen, Kejing He, Lingcong You, Funan Lin. Parallel multilayer particle collision detection method based on performance estimation
1311 -- 1329Nidhi Jain Kansal, Inderveer Chana. An empirical evaluation of energy-aware load balancing technique for cloud data center
1331 -- 1348Li Chunlin, Tang Jianhang, Youlong Luo. Distributed QoS-aware scheduling optimization for resource-intensive mobile application in hybrid cloud
1349 -- 1363Lin Li, Chee Shin Yeo, Chia-Yu Hsu, Liang-Chih Yu, K. Robert Lai. Agent-based fuzzy constraint-directed negotiation for service level agreements in cloud computing
1365 -- 1380Sumalatha Saleti, R. B. V. Subramanyam. A novel Bit Vector Product algorithm for mining frequent itemsets from large datasets using MapReduce framework
1381 -- 1394Safiye Ghasemi, Mohammad Reza Meybodi, Mehdi Dehghan Takht Fooladi, Amir Masoud Rahmani. A cost-aware mechanism for optimized resource provisioning in cloud computing
1395 -- 1410Ying Li, Jing Zhang, Xiaojun Chen, Junhuai Li, JuLan Ding. An accurate resource scheduling system for virtual machines based on CPU load monitoring and assessment
1411 -- 1437M. Thangavel, P. Varalakshmi. Enhanced DNA and ElGamal cryptosystem for secure data storage and retrieval in cloud
1439 -- 1454Chao Shen, Weiqin Tong, Kim-Kwang Raymond Choo, Samina Kausar. Performance prediction of parallel computing models to analyze cloud-based big data applications
1455 -- 0Omar Batarfi, Radwa El Shawi, Ayman G. Fayoumi, Reza Nouri, Seyed Mehdi Reza Beheshti, Ahmed Barnawi, Sherif Sakr. Correction To: Large scale graph processing systems: survey and an experimental evaluation

Volume 21, Issue 1

1 -- 13Ao Zhou, Shangguang Wang, Qibo Sun, Jinglin Li, Qinglin Zhao, Fangchun Yang. Support for spot virtual machine purchasing simulation
15 -- 28Su-Kyung Yoon, Young-Sun Youn, Min-Ho Son, Shin-Dug Kim. Harmonized memory system for object-based cloud storage
29 -- 38L. Priya, Sheila Anand. Object recognition and 3D reconstruction of occluded objects using binocular stereo
39 -- 49R. Kishorekumar, P. Deepa. Automatic change detection using multiindex information map on high-resolution remote sensing images
51 -- 63Opinder Singh, Jatinder Singh, Ravinder Singh. Multi-level trust based intelligence intrusion detection system to detect the malicious nodes using elliptic curve cryptography in MANET
65 -- 77R. Rajamohamed, J. Manokaran. Improved credit card churn prediction based on rough clustering and supervised learning techniques
79 -- 90Ravi Subban, N. Susitha, Dattatreya P. Mankame. Efficient iris recognition using Haralick features based extraction and fuzzy particle swarm optimization
91 -- 103Mukil Alagirisamy, Chee Onn Chow. An energy based cluster head selection unequal clustering algorithm with dual sink (ECH-DUAL) for continuous monitoring applications in wireless sensor networks
105 -- 113S. Angeline Julia, Paul Rodrigues. A case study of HMS using CIPA
115 -- 124K. L. Neela, V. Kavitha. Enhancement of data confidentiality and secure data transaction in cloud storage environment
125 -- 134M. Sugadev, E. Logashanmugam. Corporate feed based metamaterial antenna for wireless applications
135 -- 147V. C. Maha Vishnu, M. Rajalakshmi, R. Nedunchezhian. Intelligent traffic video surveillance and accident detection system with dynamic traffic signal control
149 -- 161M. Veeresha, M. Sugumaran. Hybrid spatial air index for processing queries in road networks
163 -- 176Dinesh Komarasamy, Muthuswamy Vijayalakshmi. ScHeduling of jobs and Adaptive Resource Provisioning (SHARP) approach in cloud computing
177 -- 187A. Karthikeyan, P. Senthil Kumar. GALS implementation of randomly prioritized buffer-less routing architecture for 3D NoC
189 -- 204Gunasekaran Manogaran, Daphne Lopez. A Gaussian process based big data processing framework in cluster computing environment
205 -- 211I. Nelson, C. Annadurai, R. Kalidoss, B. Partibane. Mitigation of co-channel interferences in cognitive multi-carrier code division multiple access system by singular value decomposition techniques
213 -- 227Priyan Malarvizhi Kumar, Usha Devi Gandhi. Energy efficient node selection algorithm based on node performance index and random waypoint mobility model in internet of vehicles
229 -- 237A. Ravi, M. N. Giriprasad, P. V. Naganjaneyulu. SAR images denoising using a novel stochastic diffusion wavelet scheme
239 -- 250L. Javid Ali, G. S. Anandhamala. Actor-oriented approach for fault tolerance in e-commerce events
251 -- 263S. Gnanavel, S. Ramakrishnan. HD video transmission on UWB networks using H.265 encoder and anfis rate controller
265 -- 275Yubin Yang, Zongtao Wei, Yong Xu, Haiwu He, Wei Wang. DroidWard: An Effective Dynamic Analysis Method for Vetting Android Applications
277 -- 286Ping Li 0018, Jin Li 0002, Zhengan Huang, Chong-zhi Gao, Wenbin Chen 0003, Kai Chen 0012. Privacy-preserving outsourced classification in cloud computing
287 -- 297Yamin Wen, Zheng Gong, Zhengan Huang, Weidong Qiu. A new efficient authorized private set intersection protocol from Schnorr signature and its applications
299 -- 310Wenjuan Li, Weizhi Meng, Lam-for Kwok, Horace H. S. Ip. Developing advanced fingerprint attacks on challenge-based collaborative intrusion detection networks
311 -- 322Javid Ullah, Muhammad Arfan Jaffar. Object and motion cues based collaborative approach for human activity localization and recognition in unconstrained videos
323 -- 331Sadia Arshid, Ayyaz Hussain, Asim Munir, Anum Nawaz, Sanneya Aziz. Multi-stage binary patterns for facial expression recognition in real world
333 -- 346Shah Nazir, Sara Shahzad, Rodziah Binti Atan, Haleem Farman. Estimation of software features based birthmark
347 -- 362E. Vijay Sekar, J. Anuradha, Anshita Arya, Balamurugan Balusamy, Victor I. Chang. A framework for smart traffic management using hybrid clustering techniques
363 -- 375Babar Shah, Farkhund Iqbal, Omar Alfandi, Yoonsoo Kim, SeokYoon Kang, Ki-Il Kim. Fuzzy searching and routing in unstructured mobile peer-to-peer networks
377 -- 391Zahid Halim, Uzma. Optimizing the minimum spanning tree-based extracted clusters using evolution strategy
393 -- 407M. Arfan Jaffar, Abdul Basit Siddiqui, Mubashar Mushtaq. Ensemble classification of pulmonary nodules using gradient intensity feature descriptor and differential evolution
409 -- 421Toqeer Ali Syed, Mohammad Nauman, Salman Jan. Trust in IoT: dynamic remote attestation through efficient behavior capture
423 -- 441Adnan Amin, Babar Shah, Sajid Anwar, Feras Al-Obeidat, Asad Masood Khattak, Awais Adnan. A prudent based approach for compromised user credentials detection
443 -- 452Fozia Mehboob, Muhammad Abbas, Richard M. Jiang, Abdul Rauf, Shoab Ahmad Khan, Saad Rehman. Trajectory based vehicle counting and anomalous event visualization in smart cities
453 -- 467Zulfiqar Ali, Waseem Shahzad. EPACO: a novel ant colony optimization for emerging patterns based classification
469 -- 480Saleh M. Al-Saleem, Aftab Ali, Naveed Khan. Energy efficient key agreement scheme for ubiquitous and continuous remote healthcare systems using data mining technique
481 -- 492Abdul Shahid, Muhammad Tanvir Afzal. Section-wise indexing and retrieval of research articles
493 -- 502Khawaja Tehseen Ahmed, Muhammad Amjad Iqbal. Region and texture based effective image extraction
503 -- 514Naila Habib Khan, Awais Adnan, Sadia Basar. Urdu ligature recognition using multi-level agglomerative hierarchical clustering
515 -- 522Muhammad Abid, Asad Habib, Jawad Ashraf, Abdul Shahid. Urdu word sense disambiguation using machine learning approach
523 -- 537Haseeb Ahmad, Ali Daud, Licheng Wang, Ibrar Ahmad, Muhammad Hafeez, Yixian Yang. Quantifying team precedence in the game of cricket
539 -- 548Muhammad Nazir, Zahoor Jan, Muhammad Sajjad. Facial expression recognition using histogram of oriented gradients based transformed features
549 -- 567Muhammad Sajjad, Adnan Shah, Zahoor Jan, Syed Inayat Ali Shah, Sung Wook Baik, Irfan Mehmood. Facial appearance and texture feature-based robust facial expression recognition framework for sentiment knowledge discovery
569 -- 588Mohammad Nauman, Tamleek Ali Tanveer, Sohail Khan, Toqeer Ali Syed. Deep neural architectures for large scale android malware analysis
589 -- 603Bashir Hayat, Kyong Hoon Kim, Ki-Il Kim. A study on fuzzy logic based cloud computing
605 -- 622Afsheen Khalid, Fakhri Alam Khan, Imran Ahmed. Extracting reference text from citation contexts
623 -- 632Feras Al-Obeidat, Abdallah Tubaishat, Anna Dillon, Babar Shah. Analyzing students' performance using multi-criteria classification
633 -- 654Imran Ahmed, Awais Adnan. A robust algorithm for detecting people in overhead views
655 -- 666Saad Razzaq, Fahad Maqbool, Maham Khalid, Iram Tariq, Aqsa Zahoor, Muhammad Ilyas. Zombies Arena: fusion of reinforcement learning with augmented reality on NPC
667 -- 680Arif Jamal Malik, Farrukh Aslam Khan. A hybrid technique using binary particle swarm optimization and decision tree pruning for network intrusion detection
681 -- 690R. Varatharajan, Gunasekaran Manogaran, Priyan Malarvizhi Kumar, Revathi Sundarasekar. Wearable sensor devices for early detection of Alzheimer disease using dynamic time warping algorithm
691 -- 701Syed Hamad Shirazi, Arif Iqbal Umar, NuhmanUl Haq, Saeeda Naz, Muhammad Imran Razzak, Ahmad Zaib. Extreme learning machine based microscopic red blood cells classification
703 -- 714Ibrar Ahmad, Xiaojie Wang, Yuzhao Mao, Guang Liu, Haseeb Ahmad, Rahat Ullah. Ligature based Urdu Nastaleeq sentence recognition using gated bidirectional long short term memory
715 -- 728Janeth López-Martínez, Alan Ramírez-Noriega, Reyes Juárez-Ramírez, Guillermo Licea, Samantha Jiménez. User stories complexity estimation using Bayesian networks for inexperienced developers
729 -- 739Abdul Rauf, Muhammad Ramzan. Parallel testing and coverage analysis for context-free applications
741 -- 754Muhammad Amin, Tamleek Ali Tanveer, Shakirullah Shah, Muhammad Abdullah, Muhammad Shafi. DeepSIC: a deep model
755 -- 766R. Karthikeyan, P. Chitra. Novel power reduction framework for enhancing cloud computing by integrated GSNN scheduling method
767 -- 777D. Danalakshmi, S. Kannan, V. Thiruppathy Kesavan. Reactive power pricing using cloud service considering wind energy
779 -- 788Ning Wang, Jianping Zeng, Maozhi Ye, Mingming Chen. Text mining and sustainable clusters from unstructured data in cloud computing
789 -- 795Zhanyu Liu. Research on the Internet of Things and the development of smart city industry based on big data
797 -- 804Xiaoping Jiang, Chenghua Li, Jing Sun 0010. A modified K-means clustering for mining of multimedia databases based on dimensionality reduction and similarity measures
805 -- 811Shiqi Li, Mingming Wang, Shiping Liu, Yan Fu. A novel pattern recognition technique based on group clustering computing and convex optimization for dimensionality reduction
813 -- 825Jianqin Zhang, Zhihong Chen, Yaqiong Liu, Mingyi Du, Weijun Yang, Liang Guo. Space-time visualization analysis of bus passenger big data in Beijing
827 -- 835Zhengyan Cui, Taohua-Ouyang. Research from the perspective of resource orchestration on digital ecosystem
837 -- 844Zhexi Yang, Wei Liu, Duo Xu. Study of cloud service queuing model based on imbedding Markov chain perspective
845 -- 853Wei Xiong, Hejin Yuan, Lang You. Prediction method of icing thickness of transmission line based on MEAO
855 -- 868Lanyong Zhang, Zewei Liu, Christos Papavassiliou, Sheng Liu. Formation path control method for group coordination based on fuzzy logic control method
869 -- 877Yun Bai. Industrial Internet of things over tactile Internet in the context of intelligent manufacturing
879 -- 892Yao-Hsu Tsai. Simplified structural modeling of loyalty acquisition based on the conceptual clustering model
893 -- 905Xue Yang, Han-Qi Yu, Shi-Ming Sun, Wei Chen. Using correspondence analysis to select training set for multi-modal information data
907 -- 922Xing Li, Jianmin He, BingJie Hou, Peiyang Zhang. Exploring the innovation modes and evolution of the cloud-based service using the activity theory on the basis of big data
923 -- 931Qindong Sun, Yimin Qiao, Hongyi Zhou, Jiamin Wang, Nan Wang. A loss prevention methodology for catering industry based on operation data analysis
933 -- 943Hui Li, Shu Zhang, Yun Hu, Jun Shi, Zhaoman Zhong. Research of social recommendation based on social tag and trust relation
945 -- 953Hongtao Liu, Hongwei Guan, Jie Jian, Xueyan Liu, Ying Pei. Clustering based on words distances
955 -- 966Fengjun Shang, Yalin Li, Xiaolin Deng, Dexiang He. Android malware detection method based on naive Bayes and permission correlation algorithm
967 -- 975Xinyao Zou. A four-gram unified event model for web mining
977 -- 984Jian Yang. The artificial stock market model based on agent and scale-free network
985 -- 995Lirong Qiu, Jie Li. Sentiment analysis of short texts in microblog based on ependency parsing
997 -- 1007Min Xiao, Sheng Cui, Ruixing Ming, Tao Jiang. Large deviations for the stochastic present value of aggregate net claims with infinite variance in the renewal risk model and its application in risk management
1009 -- 1022Ming Qu, Yuchun Chang. A collaboration centric approach for building the semantic knowledge network for knowledge advantage machine
1023 -- 1031Yanqing Han, Yuyan Lei, Guanju Chen. Consumption experience model and identification based on IWOM and emotional computing
1033 -- 1044Akash Kumar Bhoi, Karma Sonam Sherpa, Bidita Khandelwal. Arrhythmia and ischemia classification and clustering using QRS-ST-T (QT) analysis of electrocardiogram
1045 -- 1058Hyesung Ji, Youdong Yun, Seolhwa Lee, Kuekyeng Kim, HeuiSeok Lim. An adaptable UI/UX considering user's cognitive and behavior information in distributed environment
1059 -- 1068Yoon-Su Jeong, Seung Soo Shin. An IoT healthcare service model of a vehicle using implantable devices
1069 -- 1078TaeGyu Kim, Jung-Hoon Cha, Jongchul Park. Association between in-game performance parameters recorded via global positioning system and sports injuries to the lower extremities in elite female field hockey players
1079 -- 1095Doohwan Kim, Jang-Eui Hong, Ilchul Yoon, Sang Ho Lee. Code refactoring techniques for reducing energy consumption in embedded computing environment
1097 -- 1107Seolhwa Lee, Danial Hooshyar, Hyesung Ji, Kichun Nam, HeuiSeok Lim. Mining biometric data to predict programmer expertise and task difficulty
1109 -- 1116Seon-Chil Kim, Sun-Youl Seo, Ji Hyun Yu, Sang Deok Lee, Kwang-Hwan Kim, Chang-Gyu Kim. Development of radiation shield providing medical support for radioactive disaster in computer awareness analysis convergence-based
1117 -- 1126Meijing Li, Xiuming Yu, Keun Ho Ryu, Sanghyuk Lee, Nipon Theera-Umpon. Face recognition technology development with Gabor, PCA and SVM methodology under illumination normalization condition
1127 -- 1138GuoZhong Li, Jae-Rim Jung, Seong-Taek Park. Factors enhancing mobile social networking friendship maintenance: a study of alumni community on Wechat
1139 -- 1149Hyun Yoo, Kyungyong Chung. Heart rate variability based stress index service model using bio-sensor
1151 -- 1160Sungho Sim, Hanyong Choi. A study on web services discovery system based on the internetof things user information
1161 -- 1173Hyung-Jin Mun, Sunghyuck Hong, Jungpil Shin. A novel secure and efficient hash function with extra padding against rainbow table attacks
1175 -- 1185Sang Hyun Lee, Sang Joon Lee. Development of remote automatic panorama VR imaging rig systems using smartphones
1187 -- 0Hyung-Jin Mun, Sunghyuck Hong, Jungpil Shin. Erratum to: A novel secure and efficient hash function with extra padding against rainbow table attacks