


default search action
Cluster Computing, Volume 19
Volume 19, Number 1, March 2016
Special Issue: ICITCS 2015;
Special Issue: Convergence Systems for Human Computing
- Antonio Llanes

, José M. Cecilia
, Antonia M. Sánchez
, José M. García, Martyn Amos
, Manuel Ujaldon:
Dynamic load balancing on heterogeneous clusters for parallel ant colony optimization. 1-11 - Mohammed Rebbah

, Yahya Slimani, Abdelkader Benyettou
, Lionel Brunie:
A decentralized fault tolerance model based on level of performance for grid environment. 13-27 - Chen Yang, Peng Chi, Xiao Song, Tingyu Lin, Bo Hu Li, Xudong Chai:

An efficient approach to collaborative simulation of variable structure systems on multi-core machines. 29-46 - Jianhong Zhang, Xubing Zhao:

Efficient chameleon hashing-based privacy-preserving auditing in cloud storage. 47-56 - Carlos M. Toledo, Ricardo J. Barrientos

, Andrés I. Ávila
:
Similarity (range and kNN) queries processing on an Intel Xeon Phi coprocessor. 57-71 - Tian Zhuo:

Face recognition from a single image per person using deep architecture neural networks. 73-77 - Erwin Adi

, Zubair A. Baig
, Philip Hingston, Chiou Peng Lam:
Distributed denial-of-service attacks against HTTP/2 services. 79-86 - S. Raja Ratna

, R. Ravi:
Scrutiny of unruly and abuse in wireless networks to mitigate physical layer threats using discriminate based misbehavior prevention. 87-97 - Musaed A. Alhussein

:
Automatic facial emotion recognition using weber local descriptor for e-Healthcare system. 99-108 - Mahmoud Alewiwi, Cengiz Örencik, Erkay Savas:

Efficient top-k similarity document search utilizing distributed file systems and cosine similarity. 109-126 - Jianhong Zhang, Pengyan Li, Jian Mao:

IPad: ID-based public auditing for the outsourced data in the standard model. 127-138 - Lingjun Zhao, Lajiao Chen, Rajiv Ranjan

, Kim-Kwang Raymond Choo
, Jijun He:
Geographical information system parallelization for spatial big data processing: a review. 139-152 - Yan Hu, Jun Yan, Kim-Kwang Raymond Choo

:
PEDAL: a dynamic analysis tool for efficient concurrency bug reproduction in big data environment. 153-166 - Jiyuan Shi, Junzhou Luo, Fang Dong, Jinghui Zhang, Junxue Zhang

:
Elastic resource provisioning for scientific workflow scheduling in cloud under budget and deadline constraints. 167-182 - Chao Yang, Bin Jiang, Isao Ono, Setsuya Kurahashi

, Takao Terano:
A grid based simulation environment for agent-based models with vast parameter spaces. 183-195 - Jia Wang, Xiaoping Li

:
Task scheduling for MapReduce in heterogeneous networks. 197-210 - Zhiang Wu, Guangliang Gao, Zhan Bu

, Jie Cao
:
SIMPLE: a simplifying-ensembling framework for parallel community detection from large networks. 211-221 - Hwa Gyoo Park, Weiming Shen

:
A methodology for developing clinical collaborative communication systems. 223-235 - Yuan Cheng, Fazhi He, Yiqi Wu

, Dejun Zhang:
Meta-operation conflict resolution for human-human interaction in collaborative feature-based CAD systems. 237-253 - Liping Gao, Fangyu Yu, Qingkui Chen, Naixue Xiong:

Consistency maintenance of Do and Undo/Redo operations in real-time collaborative bitmap editing systems. 255-267 - S. P. Malarvizhi, B. Sathiyabhama:

Frequent pagesets from web log by enhanced weighted association rule mining. 269-277 - Hye-Young Kim:

An energy-efficient load balancing scheme to extend lifetime in wireless sensor networks. 279-283 - Changhee Cho, Jisu Kim, Jinsul Kim, Sangjoon Lee, Kuinam J. Kim:

Detecting for high speed flying object using image processing on target place. 285-292 - Sanghyun Park, Jisu Kim, Gemoh Maliva Tihfon, HoYong Ryu, Jinsul Kim:

Dynamic multimedia transmission control virtual machine using weighted Round-Robin. 293-300 - Dae-Won Park, Suhyun Park:

Multiple-domain marine data utilization structure for e-navigation. 301-308 - Hoyoung Cheong, Jonwon Eun, Hyuncheol Kim, Kuinam J. Kim:

Belief propagation decoding assisted on-the-fly Gaussian elimination for short LT codes. 309-314 - Hyoung-Gook Kim, Hye-Seung Cho, Jin Young Kim:

Robust audio fingerprinting using peak-pair-based hash of non-repeating foreground audio in a real environment. 315-323 - Seung-Ho Kang, Kuinam J. Kim:

A feature selection approach to find optimal feature subsets for the network intrusion detection system. 325-333 - Wai-Kong Lee

, Hon-Sang Cheong, Raphael C.-W. Phan
, Bok-Min Goi
:
Fast implementation of block ciphers and PRNGs in Maxwell GPU architecture. 335-347 - Munwar Ali Zardari, Low Tang Jung:

Data security rules/regulations based classification of file data using TsF-kNN algorithm. 349-368 - Kyung-shick Choi

, Kyungseok Choo, Yong-eun Sung
:
Demographic variables and risk factors in computer-crime: an empirical assessment. 369-377 - Kuinam J. Kim, Cheong Ghil Kim, Taeg Keun Whangbo, Kyoungro Yoon

:
A continuous playing scheme on RESTful web service. 379-387 - Hamzeh Alabool

, Ahmad Kamil Bin Mahmood:
A novel evaluation framework for improving trust level of Infrastructure as a Service. 389-410 - Sufian Sudeng, Naruemon Wattanapongsakorn:

A knee-based multi-objective evolutionary algorithm: an extension to network system optimization design problem. 411-425 - Taher Ahmed Ghaleb

:
Techniques and countermeasures of website/wireless traffic analysis and fingerprinting. 427-438 - Saad Alqahtany

, Nathan L. Clarke
, Steven Furnell
, Christoph Reich
:
A forensic acquisition and analysis system for IaaS. 439-453 - Abdulwahid Al Abdulwahid

, Nathan L. Clarke
, Ingo Stengel, Steven Furnell
, Christoph Reich
:
Continuous and transparent multimodal authentication: reviewing the state of the art. 455-474 - Yoon-Su Jeong

, Seung-Soo Shin, Kun-Hee Han:
High-dimentional data authentication protocol based on hash chain for Hadoop systems. 475-484 - Seong-Taek Park, Eun-Mi Park, Joung-Hae Seo, GuoZhong Li:

Factors affecting the continuous use of cloud service: focused on security risks. 485-495 - Kun-Hee Han, Woo-Sik Bae:

Proposing and verifying a security protocol for hash function-based IoT communication system. 497-504 - Kyungyong Chung, Roy C. Park:

PHR open platform based smart health service using distributed object group framework. 505-517 - Jong-Hak Oh

, Jung-Wan Hong, Yen-Yoo You, Gwan-Sik Na:
Effects of patent indicators on national technological level: concentrated on mobile communication, network, and convergence technologies. 519-528 - IlKyu Yoon, JaMee Kim, WonGyu Lee:

The analysis and application of an educational programming language (RUR-PLE) for a pre-introductory computer science course. 529-546 - Yunsick Sung, Young-Sik Jeong, Jong Hyuk Park:

Beacon-based active media control interface in indoor ubiquitous computing environment. 547-556 - Emmanuel N. Millán, Silvana B. Goirán

, María Fabiana Piccoli, Carlos García Garino, Julieta N. Aranibar
, Eduardo M. Bringa
:
Monte Carlo simulations of settlement dynamics in GPUs. 557-566
Volume 19, Number 2, June 2016
- Esmail Asyabi, Azadeh Azhdari, Mostafa Dehsangi, Michel Gokan Khan

, Mohsen Sharifi
, Sayed Vahid Azhari:
Kani: a QoS-aware hypervisor-level scheduler for cloud computing environments. 567-583 - Heithem Abbes

, Thouraya Louati:
PGTrust: a decentralized free-riding prevention model for DG systems. 585-599 - Zeng Zeng, Tram Truong Huu

, Bharadwaj Veeravalli, Chen-Khong Tham
:
Operational cost-aware resource provisioning for continuous write applications in cloud-of-clouds. 601-614 - George Terzopoulos

, Helen D. Karatza
:
Power-aware Bag-of-Tasks scheduling on heterogeneous platforms. 615-631 - Prasanthi Sreekumari, Jae-Il Jung, Meejeong Lee:

A simple and efficient approach for reducing TCP timeouts due to lack of duplicate acknowledgments in data center networks. 633-645 - Yichuan Wang, Santosh Chandrasekhar, Mukesh Singhal, Jianfeng Ma:

A limited-trust capacity model for mitigating threats of internal malicious services in cloud computing. 647-662 - Fawaz AL-Hazemi

, Dong-Ki Kang, Seong-Hwan Kim, Yuyang Peng, S. H. Shah Newaz, Chan-Hyun Youn:
LPC \(_\mathrm{FreqSchd}\) : A local power controller using the frequency scheduling approach for virtualized servers. 663-678 - Tarandeep Kaur, Inderveer Chana:

Energy aware scheduling of deadline-constrained tasks in cloud computing. 679-698 - (Withdrawn) The model for improving big data sub-image retrieval performance using scalable vocabulary tree based on predictive clustering. 699-708

- Jiaxuan Wu, Bin Zhang, Lei Yang, Peng Wang, Changsheng Zhang:

A replicas placement approach of component services for service-based cloud application. 709-721 - Darren Quick, Kim-Kwang Raymond Choo

:
Big forensic data reduction: digital forensic images and electronic evidence. 723-740 - Jie Wan, Guorui Ren

, Jinfu Liu, Qinghua Hu, Daren Yu:
Ultra-short-term wind speed prediction based on multi-scale predictability analysis. 741-755 - Xinhui Xu, Fei Xie, Xingyu Zhou:

Research on spatial and temporal characteristics of drought based on GIS using Remote Sensing Big Data. 757-767 - Bing Zhao, Yanhong Gu, Yuan Ruan, Quanle Chen:

Two game-based solution concepts for a two-agent scheduling problem. 769-781 - Jie Zheng:

Research on a cluster system for binary data frames of wireless sensor network. 783-791 - Lizhe Wang, Weijing Song, Peng Liu

:
Link the remote sensing big data to the image features via wavelet transformation. 793-810 - Jun Ye, Zheng Xu, Yong Ding

:
Secure outsourcing of modular exponentiations in cloud and cluster computing. 811-820 - Jiemin Chen, Feiyi Tang, Jing Xiao, Jianguo Li, Jing He

, Yong Tang:
CogTime_RMF: regularized matrix factorization with drifting cognition degree for collaborative filtering. 821-835 - Swaraj K. P

, D. Manjula:
A fast approach to identify trending articles in hot topics from XML based big bibliographic datasets. 837-848 - Ji Xue, Feng Yan, Alma Riska, Evgenia Smirni:

Scheduling data analytics work with performance guarantees: queuing and machine learning models in synergy. 849-864 - Alina Sîrbu

, Özalp Babaoglu
:
Towards operator-less data centers through data-driven, predictive, proactive autonomics. 865-878 - Rajath Subramanyam, Indranil Gupta, Luke M. Leslie, Wenting Wang:

Idempotent distributed counters using a forgetful bloom filter. 879-892 - Daniel J. Dubois

, Giuliano Casale
:
OptiSpot: minimizing application deployment cost using spot cloud resources. 893-909 - Hyun Mi Jung, Yong Hwan Jung, Jang Won Choi:

The integrated management method of heterogeneous WIPS sensors. 911-919 - Hanjo Jeong, Yong-Ki Kim

, Jaesoo Kim:
An evaluation-committee recommendation system for national R&D projects using social network analysis. 921-930 - Min-Cheol Jeon, Man-Seok Han, Jae-Uk Jang, Yong-Kyun Kim, Sun-Youl Seo, Gab-Jung Kim, Chang-Gyu Kim:

Evaluation of image reconstruction according to changing physical parameter. 931-938 - Kyuman Jeong, Han-Jin Cho:

Photo quality enhancement by relocating subjects. 939-948 - Seung-Mi Moon, Sook-Youn Kwon, Jae-Hyun Lim:

Implementation of smartphone-based color temperature and wavelength control LED lighting system. 949-966 - Hoill Jung, Kyung-Yong Chung:

Life style improvement mobile service for high risk chronic disease based on PHR platform. 967-977 - Jung-Soo Han, Gui-Jung Kim:

A method of unsupervised machine learning based on self-organizing map for BCI. 979-985 - Ill-Woo Park, Jeonghye Han:

Teachers' views on the use of robots and cloud services in education for sustainable development. 987-999 - DongBum Seo, You-Boo Jeon, Song-Hee Lee, Keun-Ho Lee:

Cloud computing for ubiquitous computing on M2M and IoT environment mobile application. 1001-1013 - Seong-Taek Park, Eun-Mi Park, Joung-Hae Seo, GuoZhong Li:

Erratum to: Factors affecting the continuous use of cloud service: focused on security risks. 1015
Volume 19, Number 3, September 2016
- Mostafa Ghobaei-Arani

, Sam Jabbehdari
, Mohammad Ali Pourmina
:
An autonomic approach for resource provisioning of cloud services. 1017-1036 - Sandra Catalán

, Francisco D. Igual
, Rafael Mayo
, Rafael Rodríguez-Sánchez
, Enrique S. Quintana-Ortí
:
Architecture-aware configuration and scheduling of matrix multiplication on asymmetric multicore processors. 1037-1051 - Somayeh Kianpisheh

, Nasrollah Moghaddam Charkari
, Mehdi Kargahi:
Ant colony based constrained workflow scheduling for heterogeneous computing systems. 1053-1070 - Najme Mansouri:

QDR: a QoS-aware data replication algorithm for Data Grids considering security factors. 1071-1087 - Hang Zhou

, Qing Li, Weiqin Tong, Samina Kausar
, Hai Zhu:
P-Aware: a proportional multi-resource scheduling strategy in cloud data center. 1089-1103 - Anna Sikora

, Tomàs Margalef
, Josep Jorba
:
Automated and dynamic abstraction of MPI application performance. 1105-1137 - Mohsin Fayyaz

, Khurram Aziz, Ghulam Mujtaba:
Performance analysis of optical interconnects' architectures for data center networks. 1139-1161 - Nasrin Akhter

, Mohamed Othman:
Energy aware resource allocation of cloud data center: review and open issues. 1163-1182 - Dmitry A. Zaitsev

, Tatiana R. Shmeleva
, Werner Retschitzegger
, Birgit Pröll:
Security of grid structures under disguised traffic attacks. 1183-1200 - Lei Wang

, Lingyu Xu, Yunlan Xue, Gaowei Zhang:
Group behavior time series anomaly detection in specific network space based on separation degree. 1201-1210 - Jianhong Zhang, Jian Mao:

Efficient public key encryption with revocable keyword search in cloud computing. 1211-1217 - Gonzalo Hernández, Roberto León

, Alejandra Urtubia
:
Detection of abnormal processes of wine fermentation by support vector machines. 1219-1225 - Raed Karim, Chen Ding, Ali Miri, Md Shahinur Rahman:

Incorporating service and user information and latent features to predict QoS for selecting and recommending cloud service compositions. 1227-1242 - Jie Zhang, Jining Yan

, Yan Ma, Dong Xu, Pengfei Li, Wei Jie
:
Infrastructures and services for remote sensing data production management across multiple satellite data centers. 1243-1260 - Jeongmin Kim, Hyun-Sook Chung, MyounJae Lee, Yunseok Chang, Jongjin Jung, Pan-Seop Shin:

Design of user-centric semantic rights model for validation of user-generated content. 1261-1273 - Qingyuan Zhou:

Research on heterogeneous data integration model of group enterprise based on cluster computing. 1275-1282 - Zheng Xu, Lin Mei, Chuanping Hu, Yunhuai Liu:

The big data analytics and applications of the surveillance system using video structured description technology. 1283-1292 - Bao Zhu, Le-An Yu, Zhiqiang Geng:

Cost estimation method based on parallel Monte Carlo simulation and market investigation for engineering construction project. 1293-1308 - Jia Zhu

, Chuanhua Xu, Zhixu Li, Gabriel Pui Cheong Fung, Xueqin Lin, Jin Huang, Changqin Huang
:
An examination of on-line machine learning approaches for pseudo-random generated data. 1309-1321 - Yushan Zhang, Han Huang, Zhifeng Hao, Guiwu Hu:

First hitting time analysis of continuous evolutionary algorithms based on average gain. 1323-1332 - Lin Li, Jingjing Ye, Fang Deng, Shengwu Xiong

, Luo Zhong:
A comparison study of clustering algorithms for microblog posts. 1333-1345 - R. Suganya Devi

, D. Manjula, Vijayan Sugumaran
:
Efficient indexing structure to handle durable queries through web crawling. 1347-1358 - Shanliang Yang, Mei Yang, Song Wang, Kedi Huang:

Adaptive immune genetic algorithm for weapon system portfolio optimization in military big data environment. 1359-1372 - Chuanliang Xia:

Property preservation of refinement for Petri net based representation for embedded systems. 1373-1384 - Qingsheng Zhu, Ji Feng

, Jinlong Huang:
Weighted natural neighborhood graph: an adaptive structure for clustering and outlier detection with no neighborhood parameter. 1385-1397 - Shunxiang Zhang, Yin Wang, Shiyao Zhang, Guangli Zhu:

Building associated semantic representation model for the ultra-short microblog text jumping in big data. 1399-1410 - Chunchun Hu, Nianxue Luo, Qiansheng Zhao:

Fast fuzzy trajectory clustering strategy based on data summarization and rough approximation. 1411-1420 - Lei Wang

, Lingyu Xu, Jie Yu, Yunlan Xue, Gaowei Zhang:
Context-aware edge similarity segmentation algorithm of time series. 1421-1436 - Penghao Xu, Bing Yan, Shouwei Hu:

DOA estimation of multiple sources in sparse space with an extended array technique. 1437-1447 - Fanqi Meng

, Xiaohong Su, Zhaoyang Qu:
Nonlinear approach for estimating WCET during programming phase. 1449-1459 - Zhige Jia, Zhengsong Chen, Dijin Wang, Pengfei Yu:

Time series analysis of carrier phase differences for dual-frequency GPS high-accuracy positioning. 1461-1474 - Xiao Wei

, Jun Zhang, Daniel Dajun Zeng, Qing Li
:
A multi-level text representation model within background knowledge based on human cognitive process for big data analysis. 1475-1487 - Jie-Yu Wang, Hai-Cheng Xu:

Transportation route optimization with cost object in China. 1489-1501 - Junping Xiang, Zonghai Chen:

An adaptive traffic signal coordination optimization method based on vehicle-to-infrastructure communication. 1503-1514 - Seoyoung Kim, Jieun Choi, Yoonhee Kim

:
Adaptive application-aware job scheduling optimization strategy in heterogeneous infrastructures. 1515-1526 - Md. Azam Hossain

, Cao Ngoc Nguyen, Jik-Soo Kim, Soonwook Hwang:
Exploiting resource profiling mechanism for large-scale scientific computing on grids. 1527-1539 - Yongseok Son, Hara Kang, Hyuck Han, Heon Young Yeom:

An empirical evaluation and analysis of the performance of NVM express solid state drive. 1541-1553 - Yoonsung Nam, Minkyu Kang, Hanul Sung, Jincheol Kim, Hyeonsang Eom:

Workload-aware resource management for software-defined compute. 1555-1570 - Jaehun Lee, Kihan Choi, Youngjin Kim, Hyuck Han, Sooyong Kang

:
Exploiting remote GPGPU in mobile devices. 1571-1583 - Gemoh Maliva Tihfon, Sanghyun Park, Jinsul Kim, Yongmin Kim:

An efficient multi-task PaaS cloud infrastructure based on docker and AWS ECS for application deployment. 1585-1597 - Jaehyung Park, Younho Jung, Yongmin Kim

:
Cost-effective multicast routings in wireless mesh networks with multiple gateways. 1599-1605 - Jeong-ile Jeong:

A study on smart door lock control system. 1607-1617 - V. Saravanan

, V. Mohanraj:
Maximizing QoS by cooperative vertical and horizontal handoff for tightly coupled WiMAX/WLAN overlay networks. 1619-1633 - Youngki Kim, Tae-Ung Kim, Seong-Taek Park, Jae-Rim Jung:

Establishing the importance weight of appropriability mechanism by using AHP: the case of the China's electronic industry. 1635-1646 - Eun-Mi Park, Joung-Hae Seo, Mi-Hyun Ko:

The effects of leadership by types of soccer instruction on big data analysis. 1647-1658 - Kyoo-Sung Noh:

A study on the position of CDO for improving competitiveness based big data in cluster computing environment. 1659-1669 - Won Il Seo, Jae-Hyun Lim:

Implementation of context prediction system based on event recurrence time. 1671-1682 - Sang Yeob Oh, Kyungyong Chung:

Vocabulary optimization process using similar phoneme recognition and feature extraction. 1683-1690
Volume 19, Number 4, December 2016
- Xiao Zhang, Yanjun Wu, Chen Zhao:

MrHeter: improving MapReduce performance in heterogeneous environments. 1691-1701 - Weiwei Zheng, Zhili Wang, Haoqiu Huang, Luoming Meng, Xuesong Qiu:

SPSRG: a prediction approach for correlated failures in distributed computing systems. 1703-1721 - Narendra Kumar Kamila

, Lambodar Jena
, Hemanta Kumar Bhuyan:
Pareto-based multi-objective optimization for classification in data mining. 1723-1745 - Binh Minh Nguyen

, Dang Tran, Giang Nguyen
:
Enhancing service capability with multiple finite capacity server queues in cloud data centers. 1747-1767 - Wanfeng Dou, Shoushuai Miao:

A fast parallel re-computation with redundancy mechanism for parallel digital terrain analysis. 1769-1785 - Sukhpal Singh

, Inderveer Chana, Maninder Singh
, Rajkumar Buyya:
SOCCER: Self-Optimization of Energy-efficient Cloud Resources. 1787-1800 - Chamseddine Hamdeni, Tarek Hamrouni, Faouzi Ben Charrada:

Adaptive measurement method for data popularity in distributed systems. 1801-1818 - Sanem Arslan

, Haluk Rahmi Topcuoglu
, Mahmut Taylan Kandemir, Oguz Tosun:
Asymmetrically reliable caches for multicore architectures under performance and energy constraints. 1819-1833 - Hyuncheol Kim

, Seunghyun Yoon, Hongseok Jeon, Wonhyuk Lee, Seungae Kang:
Service platform and monitoring architecture for network function virtualization (NFV). 1835-1841 - Jinhong Yang, Hyojin Park, Kyuyeong Jeon, Jeong-ile Jeong, Jun Kyun Choi:

Serving a video into an image carousel: system design and implementation. 1843-1851 - Tomás Cerný

, Michael J. Donahoo:
On energy impact of web user interface approaches. 1853-1863 - ByungRae Cha

, Sun Park, JongWon Kim:
Availability analysis and case study of mobile-OTP key generation using skip sampling of voice. 1865-1878 - Jonghyuk Park, Nakhoon Baek

, Sung-Ho Kim:
A text-based user interface scheme for low-tier embedded systems: an object-oriented approach. 1879-1884 - Jinlou Xie, Jianjian Luo, Qingyuan Zhou:

Data mining based quality analysis on informants involved applied research. 1885-1893 - Shunxiang Zhang, Xiaobo Yin, Congna He:

The automatic estimating method of the in-degree of nodes in associated semantic network oriented to big data. 1895-1905 - Yun-chuan Yang, Li-ping Liao, Liubin Yan, Xiao-chuan Hu, Hong-bao Huang, Shuai Xiao:

The big data analysis of land use evolution and its ecological security responses in Silver Beach of China by the clustering of spatial patterns. 1907-1924 - Ziyuan Sun, Yunhai Zhu, Ying Li, Mengdi Xie, Gang Li, Jianhua Song:

Machine learning based control rights analysis of critical resources and the optimal ownership for management integration. 1925-1935 - Meng Fansheng, Li Bin, Donghui Yang, Yue Zenglei, Liu Zhi:

Energy efficiency evaluation method based on multi-model fusion strategy. 1937-1949 - Youyuan Wang, Hang Liu, Jiangang Bi, Feng Wang, Chunyu Yan, Taiyun Zhu:

An approach for Condition Based Maintenance strategy optimization oriented to multi-source data. 1951-1962 - Di Shen, Lei Wang, Chengfan Li:

Event energy clustering and evaluation based on shock wave model. 1963-1974 - Kunfang Song, Hongwei Lu:

High-performance XML modeling of parallel queries based on MapReduce framework. 1975-1986 - Ming Huang, Xinhan Huang, Xikai Tu, Zefang Li, Yue Wen

:
An online gain tuning proxy-based sliding mode control using neural network for a gait training robotic orthosis. 1987-2000 - Juan Du, Renzhi He, Vijayan Sugumaran

:
Clustering and ontology-based information integration framework for surface subsidence risk mitigation in underground tunnels. 2001-2014 - Guodong Li

, Wenxia Xu, Bing Yang, Awudong Buhailiqiemu
, Xiaojuan Chang:
A method analysis for hail cloudy prediction based on CNN. 2015-2026 - Ming Huang, Yanzhu Du, Jianguang Zhang, Yong Zhang:

A topological enabled three-dimensional model based on constructive solid geometry and boundary representation. 2027-2037 - Long Zhao, LinFeng Jiang, Xiangjun Dong:

Supervised feature selection method via potential value estimation. 2039-2049 - Shao Aijun, Liya Zhao, Wang Shiwen:

Analysis of the dynamic impact of Three-Gorge Project on regime of soil water and salt in Yangtze River Delta. 2051-2060 - Wei Duan

, Changqing Li, Pei Zhang, Qing Chang:
Game modeling and policy research on the system dynamics-based tripartite evolution for government environmental regulation. 2061-2074 - Qinghua Wu, Hanmin Liu, Xuesong Yan:

Multi-label classification algorithm research based on swarm intelligence. 2075-2085 - Xiao Liang

, Guanglei Meng, Haitao Luo, Xia Chen:
Dynamic path planning based on improved boundary value problem for unmanned aerial vehicle. 2087-2096 - Shuwei Jing, Zhanwen Niu, Chun-Bin Tung, Zih-Ping Ho:

The application of terms mining technique to clustering participant's character patterns in the enterprise management. 2097-2107 - Qingyuan Zhou, Ranran Liu:

Strategy optimization of resource scheduling based on cluster rendering. 2109-2117 - Yu Wang, Yao Chen:

Multi-CODP adjustment model and algorithm driven by customer requirements in dynamic environments. 2119-2131 - Chao Lu, Jia-lu Chang:

Beijing Cultural and Creative Industry policy effect evaluation based on fuzzy comprehensive evaluation. 2133-2143 - Zhen You, Jinyun Xue, Zhengkang Zuo:

Unified formal derivation and automatic verification of three binary-tree traversal non-recursive algorithms. 2145-2156 - Xiaoqing Zuo, Hongchu Yu

, Chenbo Zi, Xiaokun Xu:
The atmospheric disturbance correction model in slope deformation monitoring using IBIS-L system. 2157-2167 - Chuanhe Shen, Zhe Xu, Yanchun Yang:

A reduced pricing model for mezzanine financing based on options and support vector machines. 2169-2177 - Bin Hu, Huanyan Qian, Yi Shen, Jia-xing Yan:

An optimal path finding strategy in networks based on random walk. 2179-2188 - Hui Zhang, Jinzhao Wu, Jianguang Lu, Juan Tang:

Safety verification of finite real-time nonlinear hybrid systems using enhanced group preserving scheme. 2189-2199 - Wei Gao, Yun Guo, Kaiyun Wang:

Ontology algorithm using singular value decomposition and applied in multidisciplinary. 2201-2210 - Xiaoxi Fu, Zhanwen Niu, Ming-Kuei Yeh:

Research trends in sustainable operation: a bibliographic coupling clustering analysis from 1988 to 2016. 2211-2223 - Eunji Hwang, Seontae Kim, Jik-Soo Kim, Soonwook Hwang, Young-ri Choi:

On the role of application and resource characterizations in heterogeneous distributed computing systems. 2225-2240 - Baoyu Xu

, Wu Zhang, Xian-He Sun, Yang Wang:
A memory-driven scheduling scheme and optimization for concurrent execution in GPU. 2241-2250 - Atif Alamri:

Nature-inspired multimedia service composition in a media cloud-based healthcare environment. 2251-2260 - Hoill Jung, Hyun Yoo, Kyungyong Chung:

Associative context mining for ontology-driven hidden knowledge discovery. 2261-2271 - Ji-won Han, Jaechoon Jo

, Hyesung Ji, Heuiseok Lim:
A collaborative recommender system for learning courses considering the relevance of a learner's learning skills. 2273-2284 - Seok-Woo Jang

, Myunghee Jung
:
Robust detection of mosaic regions in visual image data. 2285-2293 - Hyun Mi Jung, Ki-Bong Kim, Han-Jin Cho:

A study of android malware detection techniques in virtual environment. 2295-2304 - Young-Seok Choi, Kwangmin Hyun, Jae Yeon Choi:

Assessing multiscale permutation entropy for short electroencephalogram recordings. 2305-2314 - Jungsun Jang, Yeonsoo Lee, Seolhwa Lee, Dongwon Shin, Dongjun Kim, Hae-Chang Rim:

A novel density-based clustering method using word embedding features for dialogue intention recognition. 2315-2326 - Seoung-hyun Koh

, Yen-Yoo You, Do-sung Na:
Object-based dynamic influence measurement model (DIMM) using social data (on facebook). 2327-2334 - Kun-Hee Han, Woo-Sik Bae:

Proposing and verifying a security-enhanced protocol for IoT-based communication for medical devices. 2335-2341

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














