Found: 28
Select item for more details and to access through your institution.
Research challenges and perspectives on Wisdom Web of Things (W2T).
- Published in:
- Journal of Supercomputing, 2013, v. 64, n. 3, p. 862, doi. 10.1007/s11227-010-0518-8
- By:
- Publication type:
- Article
Cloud service: automatic construction and evolution of software process problem-solving resource space.
- Published in:
- Journal of Supercomputing, 2013, v. 64, n. 3, p. 1108, doi. 10.1007/s11227-010-0489-9
- By:
- Publication type:
- Article
Enabling workflows in GridSolve: request sequencing and service trading.
- Published in:
- Journal of Supercomputing, 2013, v. 64, n. 3, p. 1133, doi. 10.1007/s11227-010-0549-1
- By:
- Publication type:
- Article
Linear combination of multiple case-based reasoning with optimized weight for software effort estimation.
- Published in:
- Journal of Supercomputing, 2013, v. 64, n. 3, p. 898, doi. 10.1007/s11227-010-0525-9
- By:
- Publication type:
- Article
A scalable encryption scheme for multi-privileged group communications.
- Published in:
- Journal of Supercomputing, 2013, v. 64, n. 3, p. 1075, doi. 10.1007/s11227-011-0683-4
- By:
- Publication type:
- Article
Communication-resource-aware adaptive watermarking for multimedia authentication in wireless multimedia sensor networks.
- Published in:
- Journal of Supercomputing, 2013, v. 64, n. 3, p. 883, doi. 10.1007/s11227-010-0500-5
- By:
- Publication type:
- Article
A suitable server placement for peer-to-peer live streaming.
- Published in:
- Journal of Supercomputing, 2013, v. 64, n. 3, p. 1092, doi. 10.1007/s11227-011-0685-2
- By:
- Publication type:
- Article
The analytic hierarchy process: task scheduling and resource allocation in cloud computing environment.
- Published in:
- Journal of Supercomputing, 2013, v. 64, n. 3, p. 835, doi. 10.1007/s11227-011-0625-1
- By:
- Publication type:
- Article
Parallel data mining techniques on Graphics Processing Unit with Compute Unified Device Architecture (CUDA).
- Published in:
- Journal of Supercomputing, 2013, v. 64, n. 3, p. 942, doi. 10.1007/s11227-011-0672-7
- By:
- Publication type:
- Article
High performance networked computing in media, services and information management.
- Published in:
- 2013
- By:
- Publication type:
- Editorial
An energy-aware online task mapping algorithm in NoC-based system.
- Published in:
- Journal of Supercomputing, 2013, v. 64, n. 3, p. 1021, doi. 10.1007/s11227-011-0678-1
- By:
- Publication type:
- Article
Trust, security and privacy for pervasive applications.
- Published in:
- 2013
- By:
- Publication type:
- Editorial
Mandi: a market exchange for trading utility and cloud computing services.
- Published in:
- Journal of Supercomputing, 2013, v. 64, n. 3, p. 1153, doi. 10.1007/s11227-011-0568-6
- By:
- Publication type:
- Article
Secure localization and location verification in wireless sensor networks: a survey.
- Published in:
- Journal of Supercomputing, 2013, v. 64, n. 3, p. 685, doi. 10.1007/s11227-010-0501-4
- By:
- Publication type:
- Article
QoS-aware placement of stream processing service.
- Published in:
- Journal of Supercomputing, 2013, v. 64, n. 3, p. 919, doi. 10.1007/s11227-010-0548-2
- By:
- Publication type:
- Article
ADVS: a reputation-based model on filtering SPIT over P2P-VoIP networks.
- Published in:
- Journal of Supercomputing, 2013, v. 64, n. 3, p. 744, doi. 10.1007/s11227-010-0545-5
- By:
- Publication type:
- Article
An intelligent scheduling system using fuzzy logic controller for management of services in WiMAX networks.
- Published in:
- Journal of Supercomputing, 2013, v. 64, n. 3, p. 849, doi. 10.1007/s11227-010-0523-y
- By:
- Publication type:
- Article
Dynamic camouflage event based malicious node detection architecture.
- Published in:
- Journal of Supercomputing, 2013, v. 64, n. 3, p. 717, doi. 10.1007/s11227-010-0508-x
- By:
- Publication type:
- Article
A holistic approach examining RFID design for security and privacy.
- Published in:
- Journal of Supercomputing, 2013, v. 64, n. 3, p. 664, doi. 10.1007/s11227-010-0497-9
- By:
- Publication type:
- Article
VectorTrust: trust vector aggregation scheme for trust management in peer-to-peer networks.
- Published in:
- Journal of Supercomputing, 2013, v. 64, n. 3, p. 805, doi. 10.1007/s11227-011-0576-6
- By:
- Publication type:
- Article
Scalable SIMD-parallel memory allocation for many-core machines.
- Published in:
- Journal of Supercomputing, 2013, v. 64, n. 3, p. 1008, doi. 10.1007/s11227-011-0680-7
- By:
- Publication type:
- Article
User requirements-aware security ranking in SSL protocol.
- Published in:
- Journal of Supercomputing, 2013, v. 64, n. 3, p. 762, doi. 10.1007/s11227-010-0546-4
- By:
- Publication type:
- Article
Requirements and design for neutral trust management framework in unstructured networks.
- Published in:
- Journal of Supercomputing, 2013, v. 64, n. 3, p. 702, doi. 10.1007/s11227-010-0502-3
- By:
- Publication type:
- Article
Efficient implementation of a multi-dimensional index structure over flash memory storage systems.
- Published in:
- Journal of Supercomputing, 2013, v. 64, n. 3, p. 1055, doi. 10.1007/s11227-011-0679-0
- By:
- Publication type:
- Article
ROIN: reputation-oriented inverted indexing for the P2P network.
- Published in:
- Journal of Supercomputing, 2013, v. 64, n. 3, p. 968, doi. 10.1007/s11227-013-0878-y
- By:
- Publication type:
- Article
HAT: history-based auto-tuning MapReduce in heterogeneous environments.
- Published in:
- Journal of Supercomputing, 2013, v. 64, n. 3, p. 1038, doi. 10.1007/s11227-011-0682-5
- By:
- Publication type:
- Article
Detection of blackhole attack in a Wireless Mesh Network using intelligent honeypot agents.
- Published in:
- Journal of Supercomputing, 2013, v. 64, n. 3, p. 777, doi. 10.1007/s11227-010-0547-3
- By:
- Publication type:
- Article
Three-dimensional Petersen-torus network: a fixed-degree network for massively parallel computers.
- Published in:
- Journal of Supercomputing, 2013, v. 64, n. 3, p. 987, doi. 10.1007/s11227-011-0716-z
- By:
- Publication type:
- Article