Journal: The Journal of Supercomputing

Volume 55, Issue 3

321 -- 366Samee Ullah Khan. Mosaic-Net: a game theoretical method for selection and allocation of replicas in ad hoc networks
367 -- 399ChunLin Li, Layuan Li. Tradeoffs between energy consumption and QoS in mobile grid
400 -- 431Nitin, Shruti Garhwal, Neha Srivastava. Designing a Fault-tolerant Fully-Chained Combining Switches Multi-stage Interconnection Network with Disjoint Paths
432 -- 447Jae-Hyun Park. The deflection self-routing Delta network: a dynamically fault-tolerant high-radix multistage interconnection network

Volume 55, Issue 2

123 -- 125Tai-Hoon Kim, Omer F. Rana, Juan Touriño, Isaac Woungang. Special issue on Theory and practice of high-performance computing, communications, and security
126 -- 154Guillermo L. Taboada, Sabela Ramos, Juan Touriño, Ramon Doallo. Design of efficient Java message-passing collectives on multi-core clusters
155 -- 172Jong Sik Moon, Jong Hyuk Park, Im-Yeong Lee. Admissible bilinear map-based key management protocol for HPCCS in heterogeneous network
173 -- 191Raylin Tso, Xun Yi, Xinyi Huang. Efficient and short certificateless signatures secure against realistic adversaries
192 -- 206Yang-Sun Lee, Sang-Soo Yeo. A novel design of variable-rate RS encoder for ubiquitous high performance multimedia service in Gbps transmission system
207 -- 227Ronald Toegl, Michael Hutter. An approach to introducing locality in remote attestation using near field communications
228 -- 245Hangbae Chang. The study on end-to-end security for ubiquitous commerce
246 -- 268Minh-Triet Tran, Thanh Trung Nguyen, Anh Duc Duong, Isao Echizen. Pool-based anonymous communication framework for high-performance computing
269 -- 283Chin-Feng Lai, Sung-Yen Chang, Yueh-Min Huang, Jong Hyuk Park, Han-Chieh Chao. A portable UPnP-based high performance content sharing system for supporting multimedia devices
284 -- 306Matthew Smith, Christian Schridde, Björn Agel, Bernd Freisleben. Secure mobile communication via identity-based cryptography and server-aided computations
307 -- 319Cheol-Ho Jeong, Kwang Seon Ahn. Efficient RNTS system for privacy of banking off-line customer

Volume 55, Issue 1

1 -- 3Keqiu Li, Hai Jin, Yingwei Jin. Guest editorial: high performance trusted computing
4 -- 27Carmelo Militello, Vincenzo Conti, Salvatore Vitabile, Filippo Sorbello. Embedded access points for trusted data and resources access in HPC systems
28 -- 50Juan M. Cebrian, Juan L. Aragón, José M. García, Stefanos Kaxiras. Leakage-efficient design of value predictors through state and non-state preserving techniques
51 -- 68Yongwei Wu, Chen Gang, Jia Liu, Rui Fang, Xiaomeng Huang, Guangwen Yang, Weimin Zheng. Automatically constructing trusted cluster computing environment
69 -- 85Deqing Zou, Shangxin Du, Weide Zheng, Hai Jin. Building Automated Trust Negotiation architecture in virtual computing environment
86 -- 102Kuei-Chung Chang. Reliable network-on-chip design for multi-core system-on-chip
103 -- 122Nong Xiao, Tao Chen, Fang Liu. RSEDP: an effective hybrid data placement algorithm for large-scale storage systems