Journal: IJNC

Volume 9, Issue 2

130 -- 0Koji Nakano. Preface: Special issued on the Sixth International Symposium on Networking and Computing
131 -- 146Hiroki Nishikawa, Kana Shimada, Ittetsu Taniguchi, Hiroyuki Tomiyama. A Constraint Programming Approach to Scheduling of Malleable Tasks
147 -- 160Sayaka Kamei, Hirotsugu Kakugawa. Asynchronous message-passing distributed algorithm for the global critical section problem
161 -- 170Jubee Tada. A Cache Replacement Policy with Considering Global Fluctuations of Priority Values
171 -- 187Yuta Kodera, Minoru Kuribayashi, Takuya Kusaka, Yasuyuki Nogami. Advanced Searchable Encryption: An Adaptively Secure Keyword Search for Matrix-type Storages
188 -- 200Wai Kyi Kyi Oo, Hiroshi Koide, Kouichi Sakurai. Analyzing the Effect of Moving Target Defense for a Web System
201 -- 216Kouzou Ohara, Kazumi Saito, Masahiro Kimura, Hiroshi Motoda. Critical Node Identification based on Articulation Point Detection for Uncertain Network
217 -- 238Yuuki Okuda, Masaya Sato, Hideo Taniguchi. Implementation and Evaluation of Communication-Hiding Method by System Call Proxy
239 -- 256Hiroshi Michizu, Yuichi Sudo, Hirotsugu Kakugawa, Toshimitsu Masuzawa. Energy Balancing by Wireless Energy Transfer in Sensor Networks
257 -- 275Naoki Kamikawa, Hiroshi Umeo. Two Implementations of Real-Time Sequence Generator for {n^3 | n=1, 2, 3, ... } and Their Comparison
276 -- 300Joji Toshima, Takuo Suganuma, Akiko Takahashi. Design and Evaluation of an Incentive Decision Method for an Agricultural Information Sharing System
301 -- 317Tomoaki Ukezono. Evaluations of CMA with Error Corrector in Image Processing Circuit
318 -- 338Makoto Nagatomo, Kentaro Aburada, Naonobu Okazaki, Mirang Park. Evaluation of Ad-hoc Secure Device Pairing Method with Accelerometer and Camera Using Marker
339 -- 353Yasuhiro Nakamura, Hideyuki Kawashima, Osamu Tatebe. Integration of TicToc Concurrency Control Protocol with Parallel Write Ahead Logging Protocol
354 -- 369Akane Kawaharada, Takao Namiki. Relation between spatio-temporal patterns generated by two-dimensional cellular automata and a singular function
370 -- 389Thuong Nguyen Dat, Keisuke Iwai, Takashi Matsubara, Takakazu Kurokawa. Implementation of high speed hash function Keccak on GPU

Volume 9, Issue 1

1 -- 0Akihiro Fujiwara, Susumu Matsumae. Preface: Special Issue on Workshop on Advances in Parallel and Distributed Computational Models 2018
2 -- 27Anne Benoit, Aurélien Cavelan, Florina M. Ciorba, Valentin Le Fèvre, Yves Robert. Combining Checkpointing and Replication for Reliable Execution of Linear Workflows with Fail-Stop and Silent Errors
28 -- 52Thomas Hérault, Yves Robert, Aurelien Bouteiller, Dorian C. Arnold, Kurt B. Ferreira, George Bosilca, Jack J. Dongarra. Checkpointing Strategies for Shared High-Performance Computing Platforms
53 -- 69Wei Chen 0003, Liang Hong, Sudeep Bhattarai, Tony Sanchez, Ebholo Ijieh, Stacie Severyn, Leonard E. Lightfoot. Joint design of cooperative protocols and distributed beamforming for multi-hop cognitive radio networks
70 -- 96Anup Zope, Edward Luke. A Shared Memory Parallel Block Streaming Model for Irregular Applications
97 -- 110Hiroto Yasumi, Naoki Kitamura, Fukuhito Ooshita, Taisuke Izumi, Michiko Inoue. A Population Protocol for Uniform $k$-partition under Global Fairness
111 -- 129Saleh Ahmed, Annisa, Asif Zaman, Zhan Zhang, Kazi Md. Rokibul Alam, Yasuhiko Morimoto. Semi-Order Preserving Encryption Technique for Numeric Database