default search action
Scalable Computing: Practice and Experience, Volume 20
Volume 20, Number 1, 2019
- Rosilah Hassan, Khairol Amali Bin Ahmad, Khaleel Ahmad:
Introduction to the Special Issue on Opportunistic Network and its Security Challenges. iii-v
- Ritu Nigam, Deepak Kumar Sharma, Satbir Jain, Sarthak Gupta, Shilpa Ghosh:
Bonding Based Technique for message forwarding in Social Opportunistic Network. 1-15 - Sharif Hossen, Muhammad Sajjadur Rahim:
Analysis of Delay-Tolerant Routing Protocols using the Impact of Mobility Models. 17-26 - Deepak Kumar Sharma, Deepika Kukreja:
Establishing Reliability for Efficient Routing in Opportunistic Networks. 27-40 - Pawan Singh Mehra, Mohammad Najmud Doja, Bashir Alam:
Enhanced Clustering Algorithm based on Fuzzy Logic (E-CAFL) for WSN E-CAFL for Homogeneous WSN. 41-54 - Rajan Sharma, Balwinder Singh Sohi, Nitin Mittal:
Zone-based Energy Efficient Routing Protocols for Wireless Sensor Networks. 55-70 - Arvinda Kushwaha, Mohd Amjad:
A Particle Swarm Optimization Based Load Scheduling Algorithm in Cloud Platform for Wireless Sensor Networks. 71-82 - Musaeed Abouaroek, Khaleel Ahmad:
Node Authentication Using NTRU Algorithm in Opportunistic Network. 83-92 - Suman Bala, Gaurav Sharma, Himani Bansal, Tarunpreet Bhatia:
On the Security of Authenticated Group Key Agreement Protocols. 93-99 - Pankhuri, Akash Sinha, Gulshan Shrivastava, Prabhat Kumar:
A Pattern-Based Multi-Factor Authentication System. 101-112 - Asif Iqbal Hajamydeen, Nur Izura Udzir:
A Detailed Description on Unsupervised Heterogeneous Anomaly Based Intrusion Detection Framework. 113-160 - Chanchal Kumar, Mohammad Najmud Doja:
A Secure Structure for Hiding Information in a Cryptosystem based on Machine-learning Techniques and Content-based Optimization using Portfolio Selection Data. 161-180 - Hamza Mutaher Alshameri, Pradeep Kumar:
An Efficient Zero-Knowledge Proof Based Identification Scheme for Securing Software Defined Network. 181-189
Volume 20, Number 2, 2019
- Anand Nayyar, Rudra Rameshwar, Pijush Kanti Dutta Pramanik:
Special Issue on Recent Trends and Future of Fog and Edge Computing, Services and Enabling Technologies Editorial File. iii-vi
- Sujata Dash, Sitanath Biswas, Debajit Banerjee, Atta-ur-Rahman:
Edge and Fog Computing in Healthcare - A Review. 191-206 - Parminder Singh, Pooja Gupta, Kiran Jyoti:
Triangulation Resource Provisioning for Web Applications in Cloud Computing: A Profit-Aware Approach. 207-222 - Akshi Kumar, Abhilasha Sharma:
Ontology Driven Social Big Data Analytics for Fog enabled Sentic-Social Governance. 223-236 - Avinash Kaur, Pooja Gupta, Manpreet Singh:
Hybrid Balanced Task Clustering Algorithm for Scientific Workflows in Cloud Computing. 237-258 - Pijush Kanti Dutta Pramanik, Saurabh Pal, Prasenjit Choudhury:
Green and Sustainable High-Performance Computing with Smartphone Crowd Computing. 259-284 - A. Dhanapal, P. Nithyanandam:
The Slow HTTP Distributed Denial of Service Attack Detection in Cloud. 285-298 - Mandeep Kaur, Rajni Mohana:
Static Load Balancing Technique for Geographically Partitioned Public Cloud. 299-316 - Mukta, Neeraj Gupta:
Analytical Available Bandwidth Estimation in Wireless Ad-hoc Networks Considering Mobility in 3-Dimensional Space. 317-334 - R. Sridharan, S. Domnic:
Placement Strategy for Intercommunicating Tasks of an Elastic Request in Fog-Cloud Environment. 335-348 - S. Velliangiri, R. Rajagopal, P. Karthikeyan:
Trust Factor Based Key Distribution Protocol in Hybrid Cloud Environment. 349-364 - Vivek Kumar Prasad, Madhuri D. Bhavsar, Sudeep Tanwar:
Influence of Montoring: Fog and Edge Computing. 365-376 - Avinash Kaur, Pooja Gupta, Manpreet Singh, Anand Nayyar:
Data Placement in Era of Cloud Computing: a Survey, Taxonomy and Open Research Issues. 377-398 - Parminder Singh, Pooja Gupta, Kiran Jyoti, Anand Nayyar:
Research on Auto-Scaling of Web Applications in Cloud: Survey, Trends and Future Directions. 399-432 - Simar Preet Singh, Anand Nayyar, Harpreet Kaur, Ashu Singla:
Dynamic Task Scheduling using Balanced VM Allocation Policy for Fog Computing Platforms. 433-456
Volume 20, Number 3, 2019
- Shajulin Benedict, Michael Gerndt:
Introduction to the Special Issue on IoT Cloud Solutions for Societal Applications. iii
- Syed Rameem Zahra, Mohammad Ahsan Chishti:
Assesing the Services, Security Threaths, Challenges and Solutions in the Internet of Things. 457-484
- Amine Meghabber, Lakhdar Loukil, Richard Olejnik, Abou El Hassan Benyamina, Abdelkader Aroui:
Virtual Channel aware Scheduling for Real Time Data-Flows on Network on-Chip. 495-510 - Nikita Singh, Manu Vardhan:
Blockchain based e-Cheque Clearing Framework. 511-526 - Walid Kadri, Belabbas Yagoubi:
Optimized Scheduling Approach for Scientific Applications Based on Clustering in Cloud Computing Environment. 527-540 - Rihab Derouiche, Zaki Brahmi, Mohamed Mohsen Gammoudi, Sebastián García Galán:
E-DPSIW-FCA: Energy aware FCA-based Data Placement Strategy for Intensive Workflow. 541-562 - Lazhar Ourlis, Djamel Bellala:
SIMD Implementation of the Aho-Corasick Algorithm using Intel AVX2. 563-576 - Jyotsna Verma, Nishtha Kesswani:
AMIGM: Animal Migration Inspired Group Mobility Model for Mobile Ad hoc Networks. 577-590
Volume 20, Number 4, 2019
- Ashish Kumar Luhach, Dharm Singh Jat, Kamarul Hawari bin Ghazali:
Introduction to the Special Issue on Smart Sensors for Scalable Computing. iii - Ashish Kumar Luhach, Aditya Khamparia, Ravindra Sihag, Raj Kumar:
Honey Bee Optimization based Sink Mobility Aware Heterogeneous Protocol for Wireless Sensor Network. 591-598 - Kinnera Bharath Kumar Sai, Somula Rama Subbareddy, Ashish Kumar Luhach:
IOT based Air Quality Monitoring System Using MQ135 and MQ7 with Machine Learning Analysis. 599-606 - Tausifa Jan Saleem, Mohammad Ahsan Chishti:
Data Analytics in the Internet of Things: A Survey. 607-630 - Suresh Kumar, Kiran Dhull, Payal Arora, Ashish Kumar Luhach:
Performance of Energy Conservation Models, Generic, Micaz and Micamotes, using AODV Routing Protocol on a Wireless Sensor Network. 631-639 - Salem Sati, Ahmed Sohoud, Tareg Abulifa:
Energy Efficient Routing Protocol for Mobile Social Sensing Networks. 641-651 - Suresh Kumar, Kiran Dhull, Deepak Sharma, Payal Arora, Sandeep Dahiya:
Evaluation of AODV and DYMO Routing Protocol using Generic, Micaz and Micamotes Energy Conservation Models in AWSN with Static and Mobile Scenario. 653-662 - Kausha I. Masani, Parita Rajiv Oza, Smita Agrawal:
Predictive Maintenance and Monitoring of Industrial Machine using Machine Learning. 663-668 - A. Dhanapal, P. Nithyanandam:
The Slow HTTP DDOS Attacks: Detection, Mitigation and Prevention in the Cloud Environment. 669-685 - Mostafa Abdulghafoor Mohammed, Aya Ahkam Kamil, Raed Abdulkareem Hasan, Nicolae Tapus:
An Effective Context Sensitive Offloading System for Mobile Cloud Environments using Support Value-based Classification. 687-698 - Andrei Zamfira, Raluca Fat, Calin Cenan:
Applying Semantic Web Technologies to Discover an Ontology of Computer Attacks. 699-707
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.