nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Accelerating incremental checkpointing for extreme-scale computing
|
Ferreira, Kurt B. |
|
2014 |
30 |
C |
p. 66-77 12 p. |
artikel |
2 |
Achieving Accountable MapReduce in cloud computing
|
Xiao, Zhifeng |
|
2014 |
30 |
C |
p. 1-13 13 p. |
artikel |
3 |
A fast and resource-conscious MPI message queue mechanism for large-scale jobs
|
Zounmevo, Judicael A. |
|
2014 |
30 |
C |
p. 265-290 26 p. |
artikel |
4 |
A general transformation from KP-ABE to searchable encryption
|
Han, Fei |
|
2014 |
30 |
C |
p. 107-115 9 p. |
artikel |
5 |
A memory access model for highly-threaded many-core architectures
|
Ma, Lin |
|
2014 |
30 |
C |
p. 202-215 14 p. |
artikel |
6 |
A performance comparison of current HPC systems: Blue Gene/Q, Cray XE6 and InfiniBand systems
|
Kerbyson, Darren J. |
|
2014 |
30 |
C |
p. 291-304 14 p. |
artikel |
7 |
A reconfigurable, regular-topology cluster/datacenter network using commodity optical switches
|
Lugones, Diego |
|
2014 |
30 |
C |
p. 78-89 12 p. |
artikel |
8 |
A sequential cooperative game theoretic approach to scheduling multiple large-scale applications in grids
|
Duan, Rubing |
|
2014 |
30 |
C |
p. 27-43 17 p. |
artikel |
9 |
A topology-aware load balancing algorithm for clustered hierarchical multi-core machines
|
Pilla, LaƩrcio L. |
|
2014 |
30 |
C |
p. 191-201 11 p. |
artikel |
10 |
Communication and migration energy aware task mapping for reliable multiprocessor systems
|
Das, Anup |
|
2014 |
30 |
C |
p. 216-228 13 p. |
artikel |
11 |
Contents
|
|
|
2014 |
30 |
C |
p. iii-iv nvt p. |
artikel |
12 |
CRFID: An RFID system with a cloud database as a back-end server
|
Chen, Shuai-Min |
|
2014 |
30 |
C |
p. 155-161 7 p. |
artikel |
13 |
Cryptography in Cloud Computing
|
Deng, Robert H. |
|
2014 |
30 |
C |
p. 90- 1 p. |
artikel |
14 |
Editorial Board
|
|
|
2014 |
30 |
C |
p. IFC- 1 p. |
artikel |
15 |
Editorial: Special Issue on Extreme Scale Parallel Architectures and Systems
|
Theodoropoulos, Georgios |
|
2014 |
30 |
C |
p. 44-45 2 p. |
artikel |
16 |
Efficient execution of speculative threads and transactions with hardware transactional memory
|
Li, Gongming |
|
2014 |
30 |
C |
p. 242-253 12 p. |
artikel |
17 |
Efficient multi-keyword ranked query over encrypted data in cloud computing
|
Li, Ruixuan |
|
2014 |
30 |
C |
p. 179-190 12 p. |
artikel |
18 |
Exascale design space exploration and co-design
|
Dosanjh, S.S. |
|
2014 |
30 |
C |
p. 46-58 13 p. |
artikel |
19 |
Improving cloud network security using the Tree-Rule firewall
|
He, Xiangjian |
|
2014 |
30 |
C |
p. 116-126 11 p. |
artikel |
20 |
Improving execution unit occupancy on SMT-based processors through hardware-aware thread scheduling
|
Peternier, Achille |
|
2014 |
30 |
C |
p. 229-241 13 p. |
artikel |
21 |
Matrix-based pairwise key establishment for wireless mesh networks
|
Xu, Li |
|
2014 |
30 |
C |
p. 140-145 6 p. |
artikel |
22 |
On the improvement of Fermat factorization using a continued fraction technique
|
Wu, Mu-En |
|
2014 |
30 |
C |
p. 162-168 7 p. |
artikel |
23 |
On the security of auditing mechanisms for secure cloud storage
|
Yu, Yong |
|
2014 |
30 |
C |
p. 127-132 6 p. |
artikel |
24 |
Optimizing convolution operations on GPUs using adaptive tiling
|
van Werkhoven, Ben |
|
2014 |
30 |
C |
p. 14-26 13 p. |
artikel |
25 |
Optimizing LZSS compression on GPGPUs
|
Ozsoy, Adnan |
|
2014 |
30 |
C |
p. 170-178 9 p. |
artikel |
26 |
Privacy-preserving data utilization in hybrid clouds
|
Li, Jingwei |
|
2014 |
30 |
C |
p. 98-106 9 p. |
artikel |
27 |
SA3: Self-adaptive anonymous authentication for dynamic authentication policies
|
Lian, Yanling |
|
2014 |
30 |
C |
p. 133-139 7 p. |
artikel |
28 |
Scaling to a million cores and beyond: Using light-weight simulation to understand the challenges ahead on the road to exascale
|
Engelmann, Christian |
|
2014 |
30 |
C |
p. 59-65 7 p. |
artikel |
29 |
Special Issue: Recent Advances in Parallel and Distributed Systems, ICPADS 2012 Selected Papers
|
Tang, Xueyan |
|
2014 |
30 |
C |
p. 169- 1 p. |
artikel |
30 |
Towards provably secure proxy signature scheme based on Isomorphisms of Polynomials
|
Tang, Shaohua |
|
2014 |
30 |
C |
p. 91-97 7 p. |
artikel |
31 |
WASAM: A dynamic wide-area situational awareness model for critical domains in Smart Grids
|
Alcaraz, Cristina |
|
2014 |
30 |
C |
p. 146-154 9 p. |
artikel |
32 |
Web search results caching service for structured P2P networks
|
Rosas, Erika |
|
2014 |
30 |
C |
p. 254-264 11 p. |
artikel |