295 | -- | 307 | Chaitanya Pavan Tanay Kondapalli, Srikanth Khanna, Venkatachalam Chandrasekaran, Pallav Kumar Baruah, Diwakar Kartheek Pingali, Sai Hareesh Anamandra. GPU accelerated video super resolution using transformed spatio-temporal exemplars |
308 | -- | 325 | Anita Choudhary, Mahesh Chandra Govil, Girdhari Singh, Lalit K. Awasthi, Emmanuel S. Pilli. Energy-efficient fuzzy-based approach for dynamic virtual machine consolidation |
326 | -- | 333 | Xianghu Wu, Mingcheng Qu, Yongchao Tao, Guannan Wang, Ziyu Dong. A novel test case generation method based on program structure diagram |
334 | -- | 343 | Yubiao Wang, Junhao Wen, Quanwang Wu, Lei Guo, Bamei Tao. A dynamic cloud service selection model based on trust and SLA in cloud computing |
344 | -- | 360 | Roberta Calegari, Enrico Denti, Stefano Mariani 0001, Andrea Omicini. Logic programming as a service in multi-agent systems for the Internet of Things |
361 | -- | 374 | Satyapal Singh, Mohan Kubendiran, Arun Kumar Sangaiah. A review on intrusion detection approaches in cloud security systems |
375 | -- | 391 | Philip Moore, Hai Van Pham. A fog computing model for pervasive connected healthcare in smart environments |
392 | -- | 401 | Nelson Santos, Salvatore Lentini, Enrico Grosso, Bogdan Ghita, Giovanni Luca Masala. Performance analysis of data fragmentation techniques on a cloud server |
402 | -- | 414 | Olga Datskova, Wedong Shi. Large-scale data processing software and performance instabilities within HEP grid environments |
415 | -- | 421 | Abeer E. W. Eldewahi, Alzubair Hassan, Khalid Elbadawi, Bazara I. A. Barry. The analysis of man at the end attack behaviour in software defined network |
422 | -- | 437 | Xuan Guo, Fei Xu, Zhiting Xiao, Hongguo Yuan, Xiaoyuan Yang. Winning the war on terror: using social networking tools and GTD to analyse the regularity of terrorism activities |