97 | -- | 107 | Xiaomei Yu, Hong Wang, Xiangwei Zheng. Mining top-k approximate closed patterns in an imprecise database |
108 | -- | 119 | Manoranjan Parhi, Binod Kumar Pattanayak, Manas Ranjan Patra. An ontology-based cloud infrastructure service discovery and selection system |
120 | -- | 127 | Xuguang Wu, Minqing Zhang, Shuaishuai Zhu. Certificateless multi-signcryption scheme in standard model |
128 | -- | 138 | Valentina Casola, Alessandra De Benedictis, Jolanda Modic, Massimiliano Rak, Umberto Villano. Per-service security SLAs for cloud security management: model and implementation |
139 | -- | 156 | Salvatore Cuomo, Pasquale De Michele, Francesco Piccialli. A (multi) GPU iterative reconstruction algorithm based on Hessian penalty term for sparse MRI |
157 | -- | 169 | Manel Femmam, Okba Kazar, Laïd Kahloul, Mohamed El-Kabir Fareh. Labelled evolutionary Petri nets/genetic algorithm based approach for workflow scheduling in cloud computing |
170 | -- | 178 | He Xu, Jie Ding, Peng Li 0011, Daniele Sgandurra, Ruchuan Wang. An improved SMURF scheme for cleaning RFID data |
179 | -- | 192 | Jakub Nalepa, Miroslaw Blocho. Adaptive cooperation in parallel memetic algorithms for rich vehicle routing problems |
193 | -- | 204 | Mark Burgin, Rao Mikkilineni. Cloud computing based on agent technology, super-recursive algorithms and DNA |
205 | -- | 210 | Jun Iio. Attendance management system using selfies and signatures |