Journal: IJGUC

Volume 6, Issue 3/4

133 -- 142Balamurugan Balusamy, P. Venkata Krishna. Collective advancements on access control scheme for multi-authority cloud storage system
143 -- 149P. Mahesha, D. S. Vinod. Support vector machine-based stuttering dysfluency classification using GMM supervectors
150 -- 158Mohan Manoharan, Saraswathi Selvarajan. An efficient methodology to improve service negotiation in cloud environment
159 -- 169Trisiladevi C. Nagavi, Nagappa U. Bhajantri. Fast query by humming system based on complex multiscale music entropy and CMMEB Kd tree
170 -- 178Soumya Priyadarsini Panda, Ajit Kumar Nayak, Srikanta Patnaik. Text-to-speech synthesis with an Indian language perspective
179 -- 183Qingmei Cao, Zhili Zhou. The design of tractor CAN bus intelligent node based on dual-core processor
184 -- 191Saeed Senobary, Mahmoud Naghibzadeh. Semi-partitioned scheduling for fixed-priority real-time tasks based on intelligent rate monotonic algorithm
192 -- 199Shi-hai Zhu. Hardware implementation based on FPGA of semaphore management in μC/OS-II real-time operating system
200 -- 206Wei Wu, Wencai Du, GuoLong Ruan. Network congestion control methods and theory
207 -- 212Xiaohui Wang. The architecture design of the wearable health monitoring system based on internet of things technology
213 -- 220Wenhong Wei, Qingxia Li, Ming Tao. BSN-mesh and its basic parallel algorithms
221 -- 231Chengyu Hu, Bo Yang, Pengtao Liu. Multi-keyword ranked searchable public-key encryption
232 -- 248Achal Kaushik, Deo Prakash Vidyarthi. A model for resource management in computational grid for real-time jobs using game theory

Volume 6, Issue 2

67 -- 73Long-Jun Huang, Qing-Hua Liu, Jie Tang, Ping Li. Scratch line detection and restoration based on Sobel operator
74 -- 82Zhen Liu, Xiaoyuan Yang 0002, Feng Pan, Yuechuan Wei. CCA-secure publicly verifiable public key encryption scheme without pairings
83 -- 90Xiaoqing Li, Jicheng Liu, Xuejun Li, Hui Li. A reputation-based secure scheme in vehicular ad hoc networks
91 -- 97Shuaishuai Zhu, Xiaoyuan Yang. Protecting data in cloud environment with attribute-based encryption
98 -- 112Jess Farber, Trina S. Myers, Jarrod Trevathan, Ian M. Atkinson, Trevor Andersen. Riskr: a web 2.0 platform to monitor and share disaster information
113 -- 120Xilong Qu, Xiao Peng. An energy-efficient virtual machine scheduler based on CPU share-reclaiming policy
121 -- 129Ilir Shinko, Yoann Foquet, Dritan Nace. Elastic routing for survivable networks

Volume 6, Issue 1

1 -- 7Shu Guo, Haixia Xu. A secure delegation scheme of large polynomial computation in multi-party cloud
8 -- 20Ezugwu E. Absalom, Seyed M. Buhari, Sahalu B. Junaidu. Resource management system for scientific virtual laboratory applications
21 -- 29Kun Ma, Weijuan Zhang. Introducing browser-based high-frequency cloud monitoring system using WebSocket proxy
30 -- 46Riad Mokadem, Abdelkader Hameurlain. Data replication strategies with performance objective in data grid systems: a survey
47 -- 56A. J. Dinusha Rathnayaka, Vidyasagar M. Potdar, Tharam S. Dillon, Samitha Kuruppu. Formation of virtual community groups to manage prosumers in smart grids
57 -- 66Saeed Javanmardi, Mohammad Shojafar, Shahdad Shariatmadari, Sima S. Ahrabi. FR trust: a fuzzy reputation-based model for trust management in semantic P2P grids