Journal: IJGUC

Volume 10, Issue 6

586 -- 592Giovanni Morana, Rao Mikkilineni, Surendra Keshan. Cognitive workload management on globally interoperable network of clouds
593 -- 606Benedikt Pittl, Irfan Ul Haq, Werner Mach, Erich Schikuta. Towards autonomous creation of service chains on cloud markets
607 -- 617Erick Barros Nascimento, Edward David Moreno, Douglas Dyllon Jeronimo de Macedo. Cache replication for information-centric networks through programmable networks
618 -- 638Paul Moggridge, Na Helian, Yi Sun 0001, Mariana Lilley, Vito Veneziano, Martin Eaves. Improving the MXFT scheduling algorithm for a cloud computing context
639 -- 653Valentina Casola, Alessandra De Benedictis, Massimiliano Rak, Umberto Villano, Erkuden Rios, Angel Rego, Giancarlo Capone. Model-based deployment of secure multi-cloud applications
654 -- 671Mohamed Mehdi Kandi, Shaoyi Yin, Abdelkader Hameurlain. Resource auto-scaling for SQL-like queries in the cloud based on parallel reinforcement learning
672 -- 680Chunfen Xu. Data analysis of CSI 800 industry index by using factor analysis model
681 -- 693Demis Gomes, Glauco Estacio Gonçalves, Patricia Takako Endo, Moisés Rodrigues, Judith Kelner, Djamel Sadok, Calin Curescu. Don't lose the point, check it: Is your cloud application using the right strategy?
694 -- 707Antonella Longo, Marco Zappatore, Mario A. Bochicchio. A cloud-based approach to dynamically manage service contracts for local public transportation
708 -- 723Anderson Schwede Raugust, Wilton Jaciel Loch, Felipe Rodrigo de Souza, Maurício Aronne Pillon, Charles Christian Miers, Guilherme Piegas Koslovski. Towards to virtual infrastructure allocation on multiple IaaS providers with survivability and reliability requirements

Volume 10, Issue 5

439 -- 447Walaa Hassan Elashmawi, Ahmed F. Ali. An enhanced Jaya algorithm for solving nurse scheduling problem
448 -- 464Hesham M. Elmasry, Ayman E. Khedr, Mona M. Nasr. An adaptive technique for cost reduction in cloud data centre environment
465 -- 474Mahdieh Izadpanahkakhk, Seyyed Mohammad Razavi, Mehran Taghipour-Gorjikolaie, Seyyed Hamid Zahiri, Aurelio Uncini. Novel mobile palmprint databases for biometric authentication
475 -- 487Lamia Nabil Omran, Kadry Ali Ezzat, Alaa Bayoumi, Ashraf Darwich, Aboul Ella Hassanien. IoT-based intensive care secure framework for patient monitoring and tracking
488 -- 496Mayur Rahul, Narendra Kohli, Rashi Agarwal, Sanju Mishra. Facial expression recognition using geometric features and modified hidden Markov model
497 -- 511Kamaleddin Yaghoobirafi, Eslam Nazemi. An autonomic mechanism based on ant colony pattern for detecting the source of incidents in complex enterprise systems
512 -- 527Samaher Al-Janabi, Muhammed Abaid Mahdi. Evaluation prediction techniques to achievement an optimal biomedical analysis
528 -- 544Mala Kalra, Sarbjeet Singh. An intelligent water drops-based approach for workflow scheduling with balanced resource utilisation in cloud computing
545 -- 555Tomoya Enokido, Dilawaer Duolikun, Makoto Takizawa 0001. The energy consumption laxity-based algorithm to perform computation processes in virtual machine environments
556 -- 563Cunlin Li, Ming Li. A new bi-matrix game model with fuzzy payoffs in credibility space
564 -- 573Toshinobu Hayashi, Shinji Sugawara. An efficient content sharing scheme using file splitting and differences between versions in hybrid peer-to-peer networks
574 -- 582Tsukasa Kudo. Fog computing with original data reference function

Volume 10, Issue 4

295 -- 307Chaitanya Pavan Tanay Kondapalli, Srikanth Khanna, Venkatachalam Chandrasekaran, Pallav Kumar Baruah, Diwakar Kartheek Pingali, Sai Hareesh Anamandra. GPU accelerated video super resolution using transformed spatio-temporal exemplars
308 -- 325Anita Choudhary, Mahesh Chandra Govil, Girdhari Singh, Lalit K. Awasthi, Emmanuel S. Pilli. Energy-efficient fuzzy-based approach for dynamic virtual machine consolidation
326 -- 333Xianghu Wu, Mingcheng Qu, Yongchao Tao, Guannan Wang, Ziyu Dong. A novel test case generation method based on program structure diagram
334 -- 343Yubiao Wang, Junhao Wen, Quanwang Wu, Lei Guo, Bamei Tao. A dynamic cloud service selection model based on trust and SLA in cloud computing
344 -- 360Roberta Calegari, Enrico Denti, Stefano Mariani 0001, Andrea Omicini. Logic programming as a service in multi-agent systems for the Internet of Things
361 -- 374Satyapal Singh, Mohan Kubendiran, Arun Kumar Sangaiah. A review on intrusion detection approaches in cloud security systems
375 -- 391Philip Moore, Hai Van Pham. A fog computing model for pervasive connected healthcare in smart environments
392 -- 401Nelson Santos, Salvatore Lentini, Enrico Grosso, Bogdan Ghita, Giovanni Luca Masala. Performance analysis of data fragmentation techniques on a cloud server
402 -- 414Olga Datskova, Wedong Shi. Large-scale data processing software and performance instabilities within HEP grid environments
415 -- 421Abeer E. W. Eldewahi, Alzubair Hassan, Khalid Elbadawi, Bazara I. A. Barry. The analysis of man at the end attack behaviour in software defined network
422 -- 437Xuan Guo, Fei Xu, Zhiting Xiao, Hongguo Yuan, Xiaoyuan Yang. Winning the war on terror: using social networking tools and GTD to analyse the regularity of terrorism activities

Volume 10, Issue 3

201 -- 211Joao Vicente Ferreira Lima, Daniel Di Domenico. HPSM: a programming framework to exploit multi-CPU and multi-GPU systems simultaneously
212 -- 223Alexandre Solon Nery, Alexandre da Costa Sena, Leandro S. Guedes. An efficient pathfinding system in FPGA for edge/fog computing
224 -- 234Bruno Marques, Igor Machado Coelho, Alexandre da Costa Sena, Maria Clicia Stelling de Castro. A network coding protocol for wireless sensor fog computing
235 -- 247Caio B. G. Carvalho, Victor C. Ferreira, Felipe M. G. França, Cristiana B. Bentes, Gabriele Mencagli, Tiago A. O. Alves, Alexandre da Costa Sena, Leandro A. J. Marzulo. A dataflow runtime environment and static scheduler for edge, fog and in-situ computing
248 -- 257Marcos Paulo Rocha, Felipe M. G. França, Alexandre Solon Nery, Leandro S. Guedes. An optimised dataflow engine for GPGPU stream processing
258 -- 264Hiroki Sakaji, Masaki Kohana, Akio Kobayashi, Hiroyuki Sakai 0003. Enriching folksonomy for online videos
265 -- 271Masaki Kohana, Shusuke Okamoto. A web platform for oral exam of programming class
272 -- 282David Guyon, Anne-Cécile Orgerie, Christine Morin, Deborah A. Agarwal. Involving users in energy conservation: a case study in scientific clouds
283 -- 291Ilias K. Savvas, Dimitrios C. Tselios, Georgia Garani. Distributed and multi-core version of k-means algorithm

Volume 10, Issue 2

93 -- 104Manel Medhioub, Mohamed Hamdi. An identity-based cryptographic scheme for cloud storage applications
105 -- 118Thomas Huybrechts, Yorick De Bock, Haoxuan Li, Peter Hellinckx. COBRA-HPA: a block generating tool to perform hybrid program analysis
119 -- 131Xiurong Chen, Yixiang Tian. The big data mining forecasting model based on combination of improved manifold learning and deep learning
132 -- 140Haoxuan Li, Paul De Meulenaere, Siegfried Mercelis, Peter Hellinckx. Impact of software architecture on execution time: a power window TACLeBench case study
141 -- 158Fatma Masmoudi, Mohamed Sellami, Monia Loulou, Ahmed Hadj Kacem. Accountability management for multi-tenant cloud services
159 -- 167Silvio Pardi, Guido Russo. A Big Data approach for multi-experiment data management
168 -- 178Kosuke Ozera, Takaaki Inaba, Kevin Bylykbashi, Shinji Sakamoto, Makoto Ikeda, Leonard Barolli. A WLAN triage testbed based on fuzzy logic and its performance evaluation for different number of clients and throughput parameter
179 -- 186Akash Punhani, Pardeep Kumar, Nitin 0001. E-XY: an entropy based XY routing algorithm
187 -- 198Felipe Volpato, Madalena Pereira da Silva, Mario Antonio Ribeiro Dantas. OFQuality: a quality of service management module for software-defined networking

Volume 10, Issue 1

3 -- 9Azmi Alazzam, Ban Al-Omar. Educational data modelling using curve fitting and average uniform algorithm
10 -- 21Sheeraz Ahmed, Muhammad Ayub Khan, Atif Ishtiaq, Zahoor Ali Khan, Malik Taimur Ali. Energy harvesting techniques for routing issues in wireless sensor networks
22 -- 28Belsam Attallah, Zakea Il-agure. Evaluating the affordances of wearable technology in education
29 -- 35Andrews Samraj, Ramesh Kumarasamy, Kalvina Rajendran, Karthik Selvaraj. High-speed gesture modelling through boundary analysis of active signals from wearable data glove
36 -- 41Zakea Il-agure, Belsam Attallah. How mutual information interprets anomalies using different clustering
42 -- 52Maher Salem, Khalid Samara, Mohammed Saeed Aldhaheri. A novel integrated framework for securing online instructor-student communication
53 -- 62Khaoula Tabet, Riad Mokadem, Mohamed Ridda Laouar. A data replication strategy for document-oriented NoSQL systems
63 -- 75Stig Bosmans, Glenn Maricaux, Filip Van der Schueren, Peter Hellinckx. Cost-aware hybrid cloud scheduling of parameter sweep calculations using predictive algorithms
76 -- 92Rodrigo Da Rosa Righi, Vinicius Facco Rodrigues, Igor Fontana De Nardin, Cristiano André da Costa, Marco Antonio Zanata Alves, Maurício Aronne Pillon. Towards providing middleware-level proactive resource reorganisation for elastic HPC applications in the cloud