1 | -- | 15 | R. Dhilip Kumar, K. S. Vishvaksenan. Interference cancellation in cognitive radio-based MC-CDMA system using pre-coding technique |
16 | -- | 46 | Yung-Hui Chen, Wei-Chun Lee, Chun-Hsiung Tseng, Lawrence Y. Deng, Chuan-Yu Chang, Long-He Lee. Cognitive learning performance assessment and analysis with CSCL applied on the NetGuru platform and CSPL applied on the TAoD platform for the network experiment class |
47 | -- | 67 | Eunju Yang, Dong-Ki Kang, Chan-Hyun Youn. BOA: batch orchestration algorithm for straggler mitigation of distributed DL training in heterogeneous GPU cluster |
68 | -- | 86 | Mohammad Nassiri, Reza Mohammadi. A joint energy- and QoS-aware routing mechanism for WMNs using software-defined networking paradigm |
87 | -- | 121 | Masoud Kargar, Ayaz Isazadeh, Habib Izadkhah. Improving the modularization quality of heterogeneous multi-programming software systems by unifying structural and semantic concepts |
122 | -- | 149 | Mina Naghshnejad, Mukesh Singhal. A hybrid scheduling platform: a runtime prediction reliability aware scheduling platform to improve HPC scheduling performance |
150 | -- | 173 | S. Moloud Amini, A. Karimi, Mehdi Esnaashari. Energy-efficient data dissemination algorithm based on virtual hexagonal cell-based infrastructure and multi-mobile sink for wireless sensor networks |
174 | -- | 203 | Mohammad Maghsoudloo, Navid Khoshavi. Elastic HDFS: interconnected distributed architecture for availability-scalability enhancement of large-scale cloud storages |
204 | -- | 225 | Juan Ruiz de Miras. Fast differential box-counting algorithm on GPU |
226 | -- | 254 | Amhmed Bhih, Princy Johnson, Martin Randles. An optimisation tool for robust community detection algorithms using content and topology information |
255 | -- | 274 | Sergio Iserte, Krzysztof Rojek. An study of the effect of process malleability in the energy efficiency on GPU-based clusters |
275 | -- | 291 | Gulshan Kumar. An improved ensemble approach for effective intrusion detection |
292 | -- | 323 | Misun Yu, Yu-Seung Ma, Doo-Hwan Bae. Efficient noise injection for exposing hidden data races |
324 | -- | 361 | Belén Bermejo, Carlos Juiz. Virtual machine consolidation: a systematic review of its overhead influencing factors |
362 | -- | 387 | Somayeh Rahmani, Vahid Khajehvand, Mohsen Torabian. Burstiness-aware virtual machine placement in cloud computing systems |
388 | -- | 410 | Peter Farhat, Hani Sami, Azzam Mourad. Reinforcement R-learning model for time scheduling of on-demand fog placement |
411 | -- | 426 | Yan Li, Chun-zi Wang, Ying-chao Li. Multi-view analysis method for robust suppression of attack diffusion |
427 | -- | 454 | Khaoula Braiki, Habib Youssef. Fuzzy-logic-based multi-objective best-fit-decreasing virtual machine reallocation |
455 | -- | 480 | Yao Qin, Hua Wang, Shanwen Yi, Xiaole Li, Linbo Zhai. An energy-aware scheduling algorithm for budget-constrained scientific workflows based on multi-objective reinforcement learning |
481 | -- | 498 | Hongjian Li, Yuyan Zhao, Shuyong Fang. CSL-driven and energy-efficient resource scheduling in cloud data center |
499 | -- | 535 | Mohammad Masdari, Mehran Zangakani. Efficient task and workflow scheduling in inter-cloud environments: challenges and opportunities |
536 | -- | 548 | Vladimir O. Rybintsev. Optimizing the parameters of the Lustre-file-system-based HPC system for reverse time migration |
549 | -- | 579 | Jianqiang Huang, Wei Qin, Xiaoying Wang, Wenguang Chen. Survey of external memory large-scale graph processing on a multi-core system |
580 | -- | 601 | Jitae Yun, Su-Kyung Yoon, Jeong Geun Kim, Shin-Dug Kim. Effective data prediction method for in-memory database applications |
602 | -- | 635 | Mohammad Mahdi NezhadShokouhi, Mohammad Ali Majidi, Abbas Rasoolzadegan. Software defect prediction using over-sampling and feature extraction based on Mahalanobis distance |
636 | -- | 665 | Jiagao Wu, Lu Shen, Linfeng Liu. LSH-based distributed similarity indexing with load balancing in high-dimensional space |
666 | -- | 687 | Minhaj Ahmad Khan. Optimized hybrid service brokering for multi-cloud architectures |
688 | -- | 707 | Hamid Fadishei, Azadeh Soltani. The curse of indecomposable aggregates for big data exploratory analysis with a case for frequent pattern cubes |
708 | -- | 725 | Saima Gulzar Ahmad, Hikmat Ullah Khan, Samia Ijaz, Ehsan Ullah Munir. Use case-based evaluation of workflow optimization strategy in real-time computation system |
726 | -- | 754 | Seyed Mehdi Mohtavipour, Hadi Shahriar Shahhoseini. A link-elimination partitioning approach for application graph mapping in reconfigurable computing systems |