Abstract is missing.
- Evaluating Multi-core and Many-Core Architectures through Accelerating an Alternating Direction Implicit CFD SolverLiang Deng, Jianbin Fang, Fang Wang, Hanli Bai. 1-10 [doi]
- Reliability and Performance Evaluation of Joint Redundancy and Inspection-Based Maintenance Strategy in Virtualized SystemPan He, Yue Yuan, Xiaoguang Lin, Xueliang Zhao. 11-18 [doi]
- Neural Network Based Virtual Machine Network Bandwidth PredictionYurui Lin, Riqing Chen, Changcai Yang. 19-23 [doi]
- Applying Victim Cache in High Performance GPGPU ComputingFengfeng Fan, Jianfei Wang, Li Jiang, Xiaoyao Liang, Naifeng Jing. 24-29 [doi]
- Massive Parallel Fluid Flow Simulations Using Hierarchical Data Format Version 5 (HDF5)Christoph Ertl, Jérôme Frisch, Ralf-Peter Mundani. 30-37 [doi]
- Scalability Challenges in Current MPI One-Sided ImplementationsXin Zhao, Pavan Balaji, William Gropp. 38-47 [doi]
- Finding SCCs in Real-World Graphs on External Memory: A Task-Based ApproachHuiming Lv, Zhiyuan Shao, Xuanhua Shi, Hai Jin. 48-55 [doi]
- A Hybrid CPU+GPU Working-Set DictionaryZiaul Choudhury, Suresh Purini, Shiva Rama Krishna. 56-63 [doi]
- Large Scale Parallel Computing for Fluid Dynamics on Unstructured GridJing Tang, Bin Li, Jiangtao Chen, Xiaoquan Gong. 64-69 [doi]
- Research on Three-Dimensional Parallel Modeling Algorithm with Movable Point Cloud DataLiuyang Fang, Jie Chen. 70-75 [doi]
- Parallel Implementation of the Range-Doppler Radar Processing on a GPU ArchitectureGuanghui Zhao, Yongfei Liu, Shuping Zhang, Fangfang Shen, Yaohai Lin, Guangming Shi. 76-79 [doi]
- SWIFT-A Performance Accelerated Optimized String Matching Algorithm for Nvidia GPUsSourabh S. Shenoy, U. Supriya Nayak, Bayyapu Neelima. 80-87 [doi]
- The 3-POCs Structure Based GPU Acceleration in Computational Spectral ImagingXuewen Geng, Yufei Guo, Lin Liu, Yi Niu, Guangming Shi. 88-91 [doi]
- Using Social Media and the Mobile Cloud to Enhance Emergency and Risk ManagementHazzaa Naif Alshareef, Dan Grigoras. 92-99 [doi]
- Adaptive Anomaly Detection in Cloud Using Robust and Scalable Principal Component AnalysisBikash Agrawal, Tomasz Wiktorski, Chunming Rong. 100-106 [doi]
- Distributed and Parallel Delaunay Triangulation Construction with Balanced Binary-tree Model in CloudJiaxiang Lin, Riqing Chen, Changcai Yang, Zhaogang Shu, Changying Wang, Yaohai Lin, Liping Wu. 107-113 [doi]
- Distributed Safety Verification Using Vertex Centric Programming ModelAdhish Singla, Krishnaji Desai, Suresh Purini, Venkatesh Choppella. 114-120 [doi]
- A Novel Performance Evaluation and Optimization Model for Big Data SystemJungang Xu, Guolu Wang, Shengyuan Liu, Renfeng Liu. 121-130 [doi]
- The Research on User Experience Design of Android System's Control KeyMinghui Hu, Zhiru Xu, Lili Feng. 131-134 [doi]
- An Android/OSGi-Based Mobile Gateway for Body Sensor NetworkZhi Wang, Rui-Chun Hou, Zhi-Ming Zhou. 135-140 [doi]
- HybridScaler: Handling Bursting Workload for Multi-tier Web Applications in CloudSong Wu, Binji Li, Xinhou Wang, Hai Jin. 141-148 [doi]
- StackAct: Performance Evaluation in an IaaS Cloud MultilayerGustavo C. Bruschi, Roberta Spolon Ulson, Leandro L. Pauro, Renata Spolon Lobato, Aleardo Manacero, Marcos Antonio Cavenaghi. 149-156 [doi]
- Elasticity Evaluation of IaaS Cloud Based on Mixed WorkloadsYazhou Hu, Bo Deng, Yu Yang, Dongxia Wang. 157-164 [doi]
- Cloud-Based Clusters: Multivariate Optimization Techniques for Resource Performance PredictionJean Steve Hirwa, Ulysse Rugwiro, Mark Stammers, Chunhua Gu. 165-171 [doi]
- Framework for Context-Aware Computation Offloading in Mobile Cloud ComputingZhanghui Liu, Xue'e Zeng, Wensi Huang, Junxin Lin, Xing Chen, Wenzhong Guo. 172-177 [doi]
- Forensics as a Service: Three-Tier Architecture for Cloud Based Forensic AnalysisSaurav Nanda, Raymond A. Hansen. 178-183 [doi]
- MapReduce Based Framework for Searchable EncryptionVijayaraghavan Varadharajan, Sivakumar Kuppusamy, Krishnan Krishnamoorthy. 184-189 [doi]
- Authorization Management in Multi-cloud Collaboration Using Attribute-Based Access ControlJohn C. John, Shamik Sural, Arobinda Gupta. 190-195 [doi]
- Service Broker Based on Cloud Service Description LanguageAbdul-Razaq, Huaglory Tianfield, Peter Barrie, Hong Yue. 196-201 [doi]
- On Boosting Cloud Service Dependability through Optimized CheckpointingSubrota K. Mondal, Abadhan S. Sabyasachi, Jogesh K. Muppala. 202-207 [doi]
- Literature Review of Trust Models for Cloud ComputingZafeiroula Georgiopoulou, Costas Lambrinoudakis. 208-213 [doi]
- Metaheuristic Approaches to Virtual Machine Placement in Cloud Computing: A ReviewDabiah Ahmed Alboaneen, Huaglory Tianfield, Yan Zhang. 214-221 [doi]
- A Cluster Based Approach for Task Scheduling across Multiple Programming SystemsHongliang Lu, Jiannong Cao, Shailey Chawla, Yuqi Wang, Shaohe Lv, Xiaodong Wang. 222-229 [doi]
- Comparison of Text Sentiment Analysis Based on Machine LearningXueying Zhang, Xianghan Zheng. 230-233 [doi]
- The Implementation of Sensor Data Access Cloud Service on HBase for Intelligent Indoor Environmental MonitoringYun-Ting Wang, Yuan-Pin Chiang, Chien-Heng Wu, Chao-Tung Yang, Shuo-Tsung Chen, Pei-Lun Sun. 234-239 [doi]
- Queries over Large-Scale Log Data of Hybrid GranularitiesGansen Zhao, Xutian Zhuang, Xinming Wang, Ruihua Nie, Zhirui Liao, Chengchuang Lin, Zhenyu Li. 240-246 [doi]
- Smart Home Security Monitor SystemXin Hong, Chenhui Yang, Chunming Rong. 247-251 [doi]
- Correctness Verification of Outsourced Inner Product of Vectors with Error LocalizationGang Sheng, Chunming Tang, Hongyan Han, Ying Yin. 252-256 [doi]
- Auditing Covert Communication between Applications on AndroidWeizhong Qiang, Shifan Xin, Hai Jin, Xinqiao Lv, Qin Zhang 0004. 257-260 [doi]
- Highly Efficient Proxy Re-encryption Schemes for User-End Encrypted Cloud Data SharingXing Hu, Chunming Tang, Duncan S. Wong. 261-268 [doi]
- Securely Outsourced Face Recognition under Federated Cloud EnvironmentYunlu Cai, Chunming Tang. 269-276 [doi]
- Ranking Node Influence in Social NetworksZheyi Chen, Yuli Liu, Weiping Zhu. 277-284 [doi]
- A Privacy-Preserving Approach Based on Graph Partition for Uncertain Trajectory PublishingJianchuan Xiao, Li Xu, Limei Lin, Xiaoding Wang. 285-290 [doi]
- Optimizing Protein Folding Simulation on Intel Xeon PhiKun Huang, Yifeng Chen. 291-297 [doi]
- An Optimized DHT for Linux Package DistributionQi Zhang, Jie Yu, Lei Luo, Jun Ma, Qingbo Wu, Shasha Li. 298-305 [doi]
- A New Approach to Modeling and Analyzing Timed Compatibility of Service Composition under Temporal ConstraintsYanxue Xing, Sujian Li, Yanhua Du, Helan Liang. 306-313 [doi]
- A Continuous Self-Checking Validation Framework on Processor ExceptionsJian Tan, Daifeng Li. 314-318 [doi]
- Race Condition and Deadlock Detection for Large-Scale ApplicationsAnh-Tu Do-Mai, Thanh-Dang Diep, Nam Thoai. 319-326 [doi]
- Protein Function Detection Based on Machine Learning: Survey and Possible SolutionsKun Li, Xianghan Zheng, Chunming Rong, Yuanlong Yu, Riqing Chen. 327-333 [doi]
- Adaptive Fuzzy Control of Leader-Follower High-Order Nonlinear Multi-agent Systems with Actuator FaultsNing Zhou, Riqing Chen, Yuanqing Xia, Jie Huang. 334-339 [doi]
- Multi-agent Network and Cellular Automata Based Resources Assignment for City Educational SystemJie Huang, Ning Zhou, Riqing Chen. 340-343 [doi]
- Hardware-Efficient Architecture of Photo Core Transform in JPEG XR for Low-Cost ApplicationsShuiping Zhang, Huabing Zhou, Haihui Wang, Xia Hua. 344-348 [doi]
- Research on Monocular Visual Odometry Based on 3D-2D Motion EstimationYao Zhang, Yanduo Zhang. 349-353 [doi]
- Human Action Recognition of Hidden Markov Model Based on Depth InformationTongwei Lu, Ling Peng, Shaojun Miao. 354-357 [doi]
- A 3D Map Reconstruction Algorithm in Indoor Environment Based on RGB-D InformationBo Yuan, Yanduo Zhang. 358-363 [doi]
- Character Recognition Based on PCANetRenjun Liu, Tongwei Lu. 364-367 [doi]
- Face Recognition Based on LBP and LNMF AlgorithmMenglu Wu, Tongwei Lu. 368-371 [doi]
- Animation Generating Based on MRLS Image DeformationShiqiang Ren, Huabing Zhou, Zhengjun Li, Tao Wang. 372-375 [doi]
- An Image-Based Approach to Automatic Crop Organ Extraction via Low-Rank Matrix RecoveryZhenghong Yu, Haichang Yin, Haijie Feng, Minfang Chen, Huabing Zhou, Tongwei Lu, Feng Min. 376-381 [doi]
- Non-rigid Point Set Registration via Coherent Spatial Mapping and Local Structures PreservingMeifang Zhang, Changcai Yang, Lifang Wei, Zejun Zhang, Riqing Chen, Huabing Zhou. 382-385 [doi]
- Convolutional Neural Network Based Transient Earth Voltage DetectionYuan Lu, Ruifeng Wei, Jingrui Chen, Jun Yuan. 386-389 [doi]
- Spatiotemporal Data Model for Geographical Process Analysis with Case StudyXiang Que, Chonglong Wu, Riqing Chen, Jinfu Liu, Chunyan Lu. 390-394 [doi]
- Trajectory Tracking for Mars Atmospheric Entry Based on High-Order Sliding Mode ControlJuan Dai, Yuanqing Xia. 395-400 [doi]
- Patent Subject Words Extraction Based on Integrated Strategy MethodLiya Zhu, Xueqiang Lv, Liping Xu. 401-405 [doi]
- Stability of Dynamic Quantized UAV Airborne System with Packet Losses and Time-Varying DelayMu Li, Zhiang Hu, Feng Xie, Dianliang Fan. 406-411 [doi]
- Key Characteristic Variable Based Learning Model for Exemplar LearningYan Hu, Riqing Chen, Xiang Que. 412-415 [doi]
- Reliability Evaluation of Star Graphs in Terms of Extra Edge ConnectivityMing-Chien Yang. 416-419 [doi]
- Interpretation of Chinese Address Information Based on Multi-factor InferenceXiaolin Li, Yanhui Duan, Huabing Zhou, Yi Zhang. 420-424 [doi]
- An Accurate Approach for Traffic Matrix Estimation in Large-Scale Backbone NetworksJingli Yang, Xue Huang, Shouda Jiang. 425-431 [doi]
- Web Resource Cacheable Edge Device in Fog ComputingChih-Tien Fan, Zong-You Wu, Che-Pin Chang, Shyan-Ming Yuan. 432-439 [doi]
- Evaluation of Virtual Machine Performance on Large PagesBei Wang, Qinming He, Yuxia Cheng. 440-442 [doi]