default search action
International Journal of Networked and Distributed Computing, Volume 2
Volume 2, Number 1, January 2014
- Naohiro Ishii, Ippei Torii, Toyoshiro Nakashima, Hidekazu Tanaka:
Generation and Mapping of Multi-Reducts Based on Nearest Neighbor Relation. 1-10 - Bo Zhao, Rui Ding, Lin Han, Jinlong Xu:
Code generation for accurate array redistribution on automatic distributed-memory parallelization. 11-25 - Hamid R. Abachi, Roger Y. Lee:
Total System Cost Analysis and Comparison of DX-Tree and Star Ring Architectures in conjunction with Master-Slave Multi-Super-Hypercube topology. 26-34 - Djelloul Bouchiha, Mimoun Malki, Djihad Djaa, Abdullah Alghamdi, Khalid Alnafjan:
Empirical Study for Semantic Annotation of Web Services. 35-44 - Satoshi Kimura, Hiroyuki Inaba:
An IDS Visualization System for Anomalous Warning Events. 45-53 - Yucong Duan, Keman Huang, Dan Chen, Yongzhi Wang, Ajay Kattepur, Wencai Du:
Service Value Broker Patterns: An Empirical Collection and Analysis. 54-69
Volume 2, Number 2, April 2014
- Ahmad Alomari:
Fully distributed certificate authority based on polynomial over elliptic curve for MANET. 70-77 - Shailendra Singh, Sanjay Silakari:
An Ensemble Approach for Cyber Attack Detection System: A Generic Framework. 78-90 - Shin-Ya Katayama, Takushi Goda, Shun Shiramatsu, Tadachika Ozono, Toramatsu Shintani:
On a Drawing-Frequency based Layered Canvas Mechanism for Collaborative Paper Editing Support Systems. 91-99 - Seryvuth Tan, Phearin Sok, Keecheon Kim:
Using Cryptographic Technique for Securing Route Discovery and Data Transmission from BlackHole Attack on AODV-based MANET. 100-107 - Li-Bao An, Peiqing Yang, Hong Zhang, Mingyuan Chen:
Multi-Objective Optimization for Milling Operations using Genetic Algorithms under Various Constraints. 108-114 - Amir Maddah, Manolya Kavakli:
System Architecture & Feature Design for Engineering a Web-based Travel Advisor System. 115-121
Volume 2, Number 3, July 2014
- Ju-Yeon Jo:
Issues in Efficiency for Distributed and Networking Systems. 122-123 - Ayaz ul Hassan Khan, Mayez Al-Mouhamed, Allam Fatayer, Anas Almousa, Abdulrahman Baqais, Mohammed Assayony:
Padding Free Bank Conflict Resolution for CUDA-Based Matrix Transpose Algorithm. 124-134 - Tahir Jameel, Mengxiang Lin:
Test Image Generation using Segmental Symbolic Evaluation. 135-147 - Lifford McLauchlan, Soumya Saha, Rajab Challoo:
Comparative Study of SWST (Simple Weighted Spanning Tree) and EAST (Energy Aware Spanning Tree). 148-155 - Mohammad Fal Sadikin, Marcel Kyas:
Efficient Security and Privacy Protection for Emerging Smart RFID Communications. 156-165 - Takashi Kuremoto, Takuhiro Otani, Shingo Mabu, Masanao Obayashi, Kunikazu Kobayashi:
One-D-R-A-G-SOM and its Application to a Hand Shape Instruction Learning System. 166-174 - Nermin Kajtazovic, Christopher Preschern, Andrea Höller, Christian Kreiner:
On Design-time Modelling and Verification of Safety-critical Component-based Systems. 175-188 - Lifford McLauchlan, Soumya Saha, Claudio M. Montiel, Rajab Challoo:
Comparative Study of Various Wireless Sensor Network (WSN) Topology Construction Protocols. 189-197
Volume 2, Number 4, November 2014
- Che-Lun Hung, Shih-Wei Guo:
Fast Parallel Network Packet Filter System based on CUDA. 198-210 - Jie Zhu, Hai Jiang, Juanjuan Li, Erikson Hardesty, Kuan-Ching Li, Zhongwen Li:
Embedding GPU Computations in Hadoop. 211-220 - Muhammad Arshad Awan, Guangbin Zheng, Cheong-Ghil Kim, Shin-Dug Kim:
Human Activity Recognition in WSN: A Comparative Study. 221-230 - Yuping Dong, Chorng Hwa Chang, Zengxu Yang:
An Improved Autonomous Cross-Layer Optimization Framework for Wireless Multimedia Communication in Heterogeneous Networks. 231-240 - Jun Hong, Tao Wen, Quan Guo, Gang Sheng:
Query Integrity Verification based-on MAC Chain in Cloud Storage. 241-249 - Tianyu Bai, Spencer Davis, Juanjuan Li, Ying Gu, Hai Jiang:
Accelerating NTRU Encryption with Graphics Processing Units. 250-258 - Yoshiharu Ikutani, Hidetake Uwano:
Brain Activity Measurement during Program Comprehension with NIRS. 259-268
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.