Found: 18
Select item for more details and to access through your institution.
Issue Information.
- Published in:
- Concurrency & Computation: Practice & Experience, 2017, v. 29, n. 7, p. n/a, doi. 10.1002/cpe.3995
- Publication type:
- Article
Privacy-preserving data search and sharing protocol for social networks through wireless applications.
- Published in:
- Concurrency & Computation: Practice & Experience, 2017, v. 29, n. 7, p. n/a, doi. 10.1002/cpe.3870
- By:
- Publication type:
- Article
Methods to model and simulate super carbon nanotubes of higher order.
- Published in:
- Concurrency & Computation: Practice & Experience, 2017, v. 29, n. 7, p. n/a, doi. 10.1002/cpe.3872
- By:
- Publication type:
- Article
Reputation-based credibility analysis of Twitter social network users.
- Published in:
- Concurrency & Computation: Practice & Experience, 2017, v. 29, n. 7, p. n/a, doi. 10.1002/cpe.3873
- By:
- Publication type:
- Article
Robust resource allocations through performance modeling with stochastic process algebra.
- Published in:
- Concurrency & Computation: Practice & Experience, 2017, v. 29, n. 7, p. n/a, doi. 10.1002/cpe.3894
- By:
- Publication type:
- Article
Can Android VoIP voice conversations be decoded? I can eavesdrop on your Android VoIP communication.
- Published in:
- Concurrency & Computation: Practice & Experience, 2017, v. 29, n. 7, p. n/a, doi. 10.1002/cpe.3845
- By:
- Publication type:
- Article
Heterogeneous CPU+GPU approaches for mesh refinement over Lattice-Boltzmann simulations.
- Published in:
- Concurrency & Computation: Practice & Experience, 2017, v. 29, n. 7, p. n/a, doi. 10.1002/cpe.3919
- By:
- Publication type:
- Article
Offline/online attribute-based encryption with verifiable outsourced decryption.
- Published in:
- Concurrency & Computation: Practice & Experience, 2017, v. 29, n. 7, p. n/a, doi. 10.1002/cpe.3915
- By:
- Publication type:
- Article
Security and privacy in social networks.
- Published in:
- 2017
- By:
- Publication type:
- Editorial
Using adaptive runtime filtering to support an event-based performance analysis.
- Published in:
- Concurrency & Computation: Practice & Experience, 2017, v. 29, n. 7, p. n/a, doi. 10.1002/cpe.4094
- By:
- Publication type:
- Article
Automatic source-to-source error compensation of floating-point programs: code synthesis to optimize accuracy and time.
- Published in:
- Concurrency & Computation: Practice & Experience, 2017, v. 29, n. 7, p. n/a, doi. 10.1002/cpe.3953
- By:
- Publication type:
- Article
Variable message encryption through blockcipher compression function.
- Published in:
- Concurrency & Computation: Practice & Experience, 2017, v. 29, n. 7, p. n/a, doi. 10.1002/cpe.3956
- By:
- Publication type:
- Article
Multi-dimensional fuzzy trust evaluation for mobile social networks based on dynamic community structures.
- Published in:
- Concurrency & Computation: Practice & Experience, 2017, v. 29, n. 7, p. n/a, doi. 10.1002/cpe.3901
- By:
- Publication type:
- Article
Combinatorial optimization of DNA sequence analysis on heterogeneous systems.
- Published in:
- Concurrency & Computation: Practice & Experience, 2017, v. 29, n. 7, p. n/a, doi. 10.1002/cpe.4037
- By:
- Publication type:
- Article
Foreword to the special issue of the 18th IEEE international conference on computational science and engineering (CSE2015).
- Published in:
- 2017
- By:
- Publication type:
- Editorial
QoS-aware indiscriminate volume storage cloud.
- Published in:
- Concurrency & Computation: Practice & Experience, 2017, v. 29, n. 7, p. n/a, doi. 10.1002/cpe.3852
- By:
- Publication type:
- Article
An improved anonymity model for big data security based on clustering algorithm.
- Published in:
- Concurrency & Computation: Practice & Experience, 2017, v. 29, n. 7, p. n/a, doi. 10.1002/cpe.3902
- By:
- Publication type:
- Article
Secure cyber incident analytics framework using Monte Carlo simulations for financial cybersecurity insurance in cloud computing.
- Published in:
- Concurrency & Computation: Practice & Experience, 2017, v. 29, n. 7, p. n/a, doi. 10.1002/cpe.3856
- By:
- Publication type:
- Article