


default search action
International Journal of Grid and Utility Computing, Volume 6
Volume 6, Number 1, 2015
- Shu Guo, Haixia Xu:

A secure delegation scheme of large polynomial computation in multi-party cloud. 1-7 - Absalom E. Ezugwu

, Seyed M. Buhari
, Sahalu B. Junaidu:
Resource management system for scientific virtual laboratory applications. 8-20 - Kun Ma

, Weijuan Zhang:
Introducing browser-based high-frequency cloud monitoring system using WebSocket proxy. 21-29 - Riad Mokadem

, Abdelkader Hameurlain:
Data replication strategies with performance objective in data grid systems: a survey. 30-46 - A. J. Dinusha Rathnayaka, Vidyasagar M. Potdar, Tharam S. Dillon, Samitha Kuruppu:

Formation of virtual community groups to manage prosumers in smart grids. 47-56 - Saeed Javanmardi

, Mohammad Shojafar
, Shahdad Shariatmadari, Sima S. Ahrabi
:
FR trust: a fuzzy reputation-based model for trust management in semantic P2P grids. 57-66
Volume 6, Number 2, 2015
- Long-Jun Huang, Qing-Hua Liu, Jie Tang, Ping Li:

Scratch line detection and restoration based on Sobel operator. 67-73 - Zhen Liu, Xiaoyuan Yang, Feng Pan, Yuechuan Wei:

CCA-secure publicly verifiable public key encryption scheme without pairings. 74-82 - Xiaoqing Li, Jicheng Liu, Xuejun Li, Hui Li:

A reputation-based secure scheme in vehicular ad hoc networks. 83-90 - Shuaishuai Zhu, Xiaoyuan Yang:

Protecting data in cloud environment with attribute-based encryption. 91-97 - Jess Farber, Trina S. Myers

, Jarrod Trevathan
, Ian Atkinson
, Trevor Andersen:
Riskr: a web 2.0 platform to monitor and share disaster information. 98-112 - Xilong Qu, Xiao Peng:

An energy-efficient virtual machine scheduler based on CPU share-reclaiming policy. 113-120 - Ilir Shinko

, Yoann Foquet, Dritan Nace:
Elastic routing for survivable networks. 121-129
Volume 6, Numbers 3/4, 2015
- Balamurugan Balusamy

, P. Venkata Krishna
:
Collective advancements on access control scheme for multi-authority cloud storage system. 133-142 - P. Mahesha

, D. S. Vinod
:
Support vector machine-based stuttering dysfluency classification using GMM supervectors. 143-149 - Mohan Manoharan

, Saraswathi Selvarajan:
An efficient methodology to improve service negotiation in cloud environment. 150-158 - Trisiladevi C. Nagavi

, Nagappa U. Bhajantri:
Fast query by humming system based on complex multiscale music entropy and CMMEB Kd tree. 159-169 - Soumya Priyadarsini Panda

, Ajit Kumar Nayak
, Srikanta Patnaik
:
Text-to-speech synthesis with an Indian language perspective. 170-178 - Qingmei Cao, Zhili Zhou:

The design of tractor CAN bus intelligent node based on dual-core processor. 179-183 - Saeed Senobary, Mahmoud Naghibzadeh

:
Semi-partitioned scheduling for fixed-priority real-time tasks based on intelligent rate monotonic algorithm. 184-191 - Shi-hai Zhu:

Hardware implementation based on FPGA of semaphore management in μC/OS-II real-time operating system. 192-199 - Wei Wu, Wencai Du, GuoLong Ruan:

Network congestion control methods and theory. 200-206 - Xiaohui Wang:

The architecture design of the wearable health monitoring system based on internet of things technology. 207-212 - Wenhong Wei, Qingxia Li, Ming Tao:

BSN-mesh and its basic parallel algorithms. 213-220 - Chengyu Hu, Bo Yang, Pengtao Liu:

Multi-keyword ranked searchable public-key encryption. 221-231 - Achal Kaushik

, Deo Prakash Vidyarthi:
A model for resource management in computational grid for real-time jobs using game theory. 232-248

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














