


default search action
International Journal of High Performance Computing and Networking, Volume 13
Volume 13, Number 1, 2019
- Takuma Yamaguchi, Kohei Fujita, Tsuyoshi Ichimura, Muneo Hori, Lalith Maddegedara:

Acceleration of unstructured implicit low-order finite-element earthquake simulation using OpenACC on Pascal GPUs. 3-18 - Nobuhiro Miki, Fumihiko Ino, Kenichi Hagihara:

PACC: a directive-based programming framework for out-of-core stencil computation on accelerators. 19-34 - Ahmad Lashgar, Amirali Baniasadi:

Efficient implementation of OpenACC cache directive on NVIDIA GPUs. 35-53 - Akihiro Hayashi, Jun Shirako, Ettore Tiotto, Robert Ho, Vivek Sarkar:

Performance evaluation of OpenMP's target construct on GPUs - exploring compiler optimisations. 54-69 - Jason Sewall, S. John Pennycook

, Alejandro Duran, Christian Terboven
, Xinmin Tian, Ravi Narayanaswamy:
Developments in memory management in OpenMP. 70-85 - Ian J. Bertolacci, Michelle Mills Strout, Jordan Riley, Stephen M. Guzik, Eddie C. Davis, Catherine Olschanowsky:

Using the loop chain abstraction to schedule across loops in existing code. 86-104 - Robert Searles, Stephen Herbein, Travis Johnston, Michela Taufer

, Sunita Chandrasekaran:
Creating a portable, high-level graph analytics paradigm for compute and data-intensive applications. 105-118 - Shengwen Tian, Hongyong Yang:

Load-balanced overlay recovery scheme with delay minimisation. 119-128
Volume 13, Number 2, 2019
- Hongyu Wang, Haihua Han, Xiaoguang Wang, Ruochen Fang, Wenbo Mei:

A high efficient map-matching algorithm for the GPS data processing intended for the highways. 132-140 - Xinwei Gao, Jintai Ding, R. V. Saraswathy, Lin Li, Jiqiang Liu:

Comparison analysis and efficient implementation of reconciliation-based RLWE key exchange protocol. 141-152 - Xiaolin Zhang, Xiaoyu He, Fang-Ming Yu, Lixin Liu, Huanxiang Zhang, Zhuolin Li:

Distributed and personalised social network privacy protection. 153-163 - Lu Yan, Xiao Chen, Haojiang Deng, Xiaozhou Ye:

A delegation token-based method to authenticate the third party in TLS. 164-174 - Ge Gao, Lei Wu, Yunxue Yan:

A secure storage scheme with key-updating in hybrid cloud. 175-183 - Pinki Sharma, Jyotsna Sengupta, P. K. Suri:

Survey of intrusion detection techniques and architectures in cloud computing. 184-198 - Nour El-Houda Golea, Kamal Eddine Melkemi:

ROI-based fragile watermarking for medical image tamper detection. 199-210 - Lydia Lazib, Yanyan Zhao, Bing Qin, Ting Liu:

Negation scope detection with recurrent neural networks models in review texts. 211-221 - Weipeng Jing, Tao Jiang, Xingge Zhang, Liangkuan Zhu:

The optimisation of speech recognition based on convolutional neural network. 222-231 - Muhammad Hilmi Kamarudin, Carsten Maple, Tim Watson:

Hybrid feature selection technique for intrusion detection system. 232-240 - Yifei Wei, Qiao Li, Xia Gong, Da Guo, Yong Zhang:

Spectrum prediction and aggregation strategy in multi-user cooperative relay networks. 241-250
Volume 13, Number 3, 2019
- Hanan A. Hassan

, Mona S. Kashkoush, Mohamed Azab, Walaa M. Sheta:
Impact of using multi-levels of parallelism on HPC applications performance hosted on Azure cloud computing. 251-260 - Amril Nazir:

A dynamic and QoS-effective resource management system. 261-282 - You-Shyang Chen:

Performance identification in large-scale class data from advanced facets of computational intelligence and soft computing techniques. 283-293 - Jan Sliwa:

Assessing complex evolving cyber-physical systems (case study: smart medical devices). 294-303 - Yanping Ma, Qiming Liu, Cuifeng Li, Yi Tang, Hongtao Xie:

Distributed data-dependent locality sensitive hashing. 304-311 - Jiang Li, Xiaojuan Ban, Guang Yang, Yitong Li, Yu Wang:

Real-time human action recognition using depth motion maps and convolutional neural networks. 312-320 - Junqi Zhang, Haiying Gao:

A compact construction for non-monotonic key-policy attribute-based encryption. 321-330 - Qiong Gu, Zhao Wu, Bing Ning, Xianming Wang, Chunsheng Xin:

Research on link blocks recognition of web pages. 331-339 - Junying Chen, Jinhui Chen, Huaqing Min:

A united framework with multi-operator evolutionary algorithms and interior point method for efficient single objective optimisation problem solving. 340-353
Volume 13, Number 4, 2019
- Yingjie Zhang, Jianxing Xu, Heng-Da Cheng:

AdaBoost-based conformal prediction with high efficiency. 355-365 - Chirihane Gherbi

, Zibouda Aliouat, Mohamed Benmohammed:
Comparative analysis of hierarchical cluster protocols for wireless sensor networks. 366-377 - Cairong Yan, Guangwei Xu:

Virtual cluster optimisation for MapReduce-like applications. 378-388 - Mydhili Palagummi, Ricardo Lent:

Harnessing betweenness centrality for virtual network embedding in tree topologies. 389-407 - Jun Zhao, Hong Wang:

Detecting fake reviews via dynamic multimode network. 408-416 - Guangsheng Chen, Yiqun Cheng, Weipeng Jing:

DBSCAN-PSM: an improvement method of DBSCAN algorithm on Spark. 417-426 - Feng Tian, Fuhua Shang, Ning Sun:

Multimedia auto-annotation via label correlation mining. 427-435 - Gang Wang, Jaehong Park, Ravi S. Sandhu, Jun Wang, Xiaolin Gui:

Dynamic trust evaluation model based on bidding and multi-attributes for social networks. 436-454 - Tian Wang, Jiyuan Zhou, Wenhua Wang, Guangxue Zhang, Ming Huang, Yongxuan Lai:

A personal local area information interaction system based on NFC and Bluetooth technology. 455-463 - Hongfa Ding

, Changgen Peng, Youliang Tian, Shuwen Xiang:
A risk adaptive access control model based on Markov for big data in the cloud. 464-475

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














