E-Books durchsuchen

Grid and Pervasive Computing [2013]

1
Transparency in Cloud Business: Cluster Analysis of Software as a Service Characteristics
11
Distributed Accounting in Scope of Privacy Preserving
23
Distributed Virtual Machine Monitor for Distributed Cloud Computing Nodes Integration
32
Differentiated Policy Based Job Scheduling with Queue Model and Advanced Reservation Technique in a Private Cloud Environment
40
Scaling Out Recommender System for Digital Libraries with MapReduce
48
Layering of the Provenance Data for Cloud Computing
59
JCL: An OpenCL Programming Toolkit for Heterogeneous Computing
73
Network-Aware Multiway Join for MapReduce
81
Automatic Resource Scaling for Web Applications in the Cloud
91
Implementation of Cloud-RAID: A Secure and Reliable Storage above the Clouds
103
An Improved Min-Min Task Scheduling Algorithm in Grid Computing
114
Heterogeneous Diskless Remote Booting System on Cloud Operating System
124
RTRM: A Response Time-Based Replica Management Strategy for Cloud Storage System
134
Secure Hadoop with Encrypted HDFS
142
VM Migration for Fault Tolerance in Spot Instance Based Cloud Computing
152
A Cloud Based Natural Disaster Management System
162
A Hybrid Grid/Cloud Distributed Platform: A Case Study
170
Comparison of Two Yield Management Strategies for Cloud Service Providers
181
Comparing Java Virtual Machines for Sensor Nodes
189
Research on Opinion Formation of Microblog in the View of Multi-agent Simulation
199
Implementation of Cloud IaaS for Virtualization with Live Migration
208
Security Considerations in Cloud Computing Virtualization Environment
216
Medicine Rating Prediction and Recommendation in Mobile Social Networks
224
Cloud Browser: Enhancing the Web Browser with Cloud Sessions and Downloadable User Interface
234
Visual Novels: An Methodology Guideline for Pervasive Educational Games that Favors Discernment
244
An Optimal Radio Access Network Selection Method for Heterogeneous Wireless Networks
253
Desktop Grid Computing at the Age of the Web
262
A Novel Model for Greenhouse Control Architecture
270
Enhanced Search in Unstructured Peer-to-Peer Overlay Networks
280
CE-SeMMS: Cost-Effective and Secure Mobility Management Scheme Based on SIP in NEMO Environments
288
A System-Level Approach for Designing Context-Aware Distributed Pervasive Applications
299
Architecture of a Context Aware Framework for Automated Mobile Device Configuration
309
AMM-PF: Additional Mobility Management Scheme Based on Pointer Forwarding in PMIPv6 Networks
317
The Evaluation and Optimization of 3-D Jacobi Iteration on a Stream Processor
326
DDASTM: Ensuring Conflict Serializability Efficiently in Distributed STM
336
Research on Log Pre-processing for Exascale System Using Sparse Representation
348
Using Event-Based Style for Developing M2M Applications
367
Weighted Mining Association Rules Based Quantity Item with RFM Score for Personalized u-Commerce Recommendation System
376
Priority-Based Live Migration of Virtual Machine
386
Improvement of the MCMA Blind Equalization Performance Using the Coordinate Change Method in 16-APSK
393
Postural Transition Detection Using a Wireless Sensor Activity Monitoring System
403
A Dedicated Serialization Scheme in Homogeneous Cluster RPC Communication
413
Friends Based Keyword Search over Online Social Networks
423
GPU Virtualization Support in Cloud System
433
MGMR: Multi-GPU Based MapReduce
443
DDoS Analysis Using Correlation Coefficient Based on Kolmogorov Complexity
453
An Efficient Attribute-Based Encryption and Access Control Scheme for Cloud Storage Environment
464
Active One-Time Password Mechanism for User Authentication
472
Hardware Acceleration for Cryptography Algorithms by Hotspot Detection
482
Chaotic Wireless Communication System Using Retrodirective Array Antenna for Advanced High Security
491
Policy-Based Customized Privacy Preserving Mechanism for SaaS Applications
501
QoC-Aware Access Control Based on Fuzzy Inference for Pervasive Computing Environments
509
Per-File Secure Deletion Combining with Enhanced Reliability for SSDs
517
An Energy-Aware Secured Routing Protocol for Mobile Ad Hoc Networks Using Trust-Based Multipath
526
A Grid-Based Approximate K-NN Query Processing Algorithm for Privacy Protection in Location-Based Services
536
Density-Based K-Anonymization Scheme for Preserving Users’ Privacy in Location-Based Services
546
A Routing Mechanism Using Virtual Coordination Anchor Node Apply to Wireless Sensor Networks
556
Effect of Genetic Parameters in Tour Scheduling and Recommender Services for Electric Vehicles
563
Enabling Massive Machine-to-Machine Communications in LTE-Advanced
570
Enhancements for Local Repair in AODV-Based Ad-Hoc Networks
577
Smart Watch and Monitoring System for Dementia Patients
585
A Lesson from the Development of Surveillance and Reconnaissance Sensor Networks Systems
594
A Classifier Algorithm Exploiting User’s Environmental Context and Bio-signal for U-Home Services
602
DNA-S: Dynamic Cellular Network Architecture for Smart Communications
612
Predicting of Abnormal Behavior Using Hierarchical Markov Model Based on User Profile in Ubiquitous Environment
623
Advanced Facial Skin Rendering with Actual Fresnel Refractive Index Reflecting Facial Tissue Features
631
Emotion Recognition Technique Using Complex Biomedical Signal Analysis
641
RWA : Reduced Whole Ack Mechanism for Underwater Acoustic Sensor Network
649
Data Hiding Based on Palette Images Using Weak Bases of Z<Subscript>2</Subscript>-Modules
659
Adaptive Smart Vehicle Middleware Platform for Aspect Oriented Software Engineering
665
Parallel Generation of Optimal Mortgage Refinancing Threshold Rates
676
Pricing American Options on Dividend-Paying Stocks and Estimating the Greek Letters Using Leisen-Reimer Binomial Trees
686
A Resource-Centric Architecture for Service-Oriented Cyber Physical System
694
Implied Volatilities of S&P 100 Index with Applications to Financial Market
700
RF Characteristics of Wireless Capsule Endoscopy in Human Body
707
Building a Laboratory Surveillance System via a Wireless Sensor Network
715
S-Theory: A Unified Theory of Multi-paradigm Software Development
723
Design of J-VTS Middleware Based on IVEF Protocol
730
On the Use of a Hash Function in a 3-Party Password-Based Authenticated Key Exchange Protocol
737
A Sequence Classification Model Based on Pattern Coverage Rate
746
Development of STEAM Program and Teaching Method for Using LEGO Line Tracer Robot in Elementary School
752
Improved Authentication Scheme with Anonymity for Roaming Service in Global Mobility Networks
761
Cryptanalysis of an Authenticated Group Key Transfer Protocol Based on Secret Sharing
767
Development of the STEAM-Based Media Education Materials for Prevention of Media Dysfunction in Elementary School
773
Access Control Technique of Illegal Harmful Contents for Elementary Schoolchild Online Protection
781
The Concept of Delegation of Authorization and Its Expansion for Multi Domain Smart Grid System
788
Security Requirement of End Point Security Software
796
Collecting and Filtering Out Phishing Suspicious URLs Using SpamTrap System
803
Improvement of a Chaotic Map Based Key Agreement Protocol That Preserves Anonymity
811
Solving Router Nodes Placement Problem with Priority Service Constraint in WMNs Using Simulated Annealing
819
Topology Information Based Spare Capacity Provisioning in WDM Networks
826
A Contents Service Profit Model Based on the Quality of Experience and User Group Characteristics
832
Toward Hybrid Model for Architecture-Oriented Semantic Schema of Self-adaptive System
838
Optimal Channel Sensing in Cognitive Radio Network with Multiple Secondary Users
846
H.264 Video Delivery over Wireless Mesh Networks Based on Joint Adaptive Cross-Layer Mapping and MDCA MAC
854
Automatic Tracking Angle of Arrival of Bandpass Sampling OFDM Signal by MUSIC Algorithm
860
A White-List Based Security Architecture (WLSA) for the Safe Mobile Office in the BYOD Era
866
A Study of Vessel Deviation Prevention Scheme Using a Triangulation in a Seaway
873
Analysis of Energy Consumption in Edge Router with Sleep Mode for Green OBS Networks
880
VLC Based Multi-hop Audio Data Transmission System
Feedback