default search action
International Journal of Networked and Distributed Computing, Volume 3
Volume 3, Number 1, January 2015
- Dongsong Zhang, Anil Jangam, Lina Zhou, Isil Yakut:
Context-Aware Multimedia Content Adaptation for Mobile Web. 1-10 - Shengbo Chen, Dashen Sun, Huaikou Miao:
The Influence of Alias and References Escape on Java Program Analysis. 11-20 - Naoshi Sakamoto:
An Efficient Structure for LKH Key Tree on Secure Multicast Communications. 21-30 - Huitao Zheng, Yadong Mei, Kai Duan, Yuru Lin:
Parallel dynamic programming based on stage reconstruction and its application in reservoir operation. 31-41 - Atsushi Nunome, Hiroaki Hirata, Kiyoshi Shibayama:
A Distributed Storage System with Dynamic Tiering for iSCSI Environment. 42-50 - Chao Lu, Xinkai Li:
An Introduction of Multiple P-adic Data Type and Its Parallel Implementation. 51-59 - Dapeng Liu, Shaochun Xu:
Comparison of Hash Table Performance with Open Addressing and Closed Addressing: An Empirical Study. 60-68
Volume 3, Number 2, April 2015
- Dongxu Jin, JooSeok Song:
A Traffic Flow Theory Aided Physical Measurement-Based Sybil Nodes Detection Mechanism in Vehicular Ad-hoc Networks. 69-78 - Toshiichiro Iwashita, Teruhisa Hochin, Hiroki Nomiya:
Optimal Number of Clusters for Fast Similarity Search Considering Transformations of Time Varying Data. 79-88 - Kenta Funaki, Teruhisa Hochin, Hiroki Nomiya, Hideya Nakanishi:
Parallel Indexing Scheme for Data Intensive Applications. 89-98 - Norshazrul Azman Bin Sulaiman, Hideo Masuda:
Evaluation of A Secure Live Migration of Virtual Machines Using IPsec Implementation. 99-108 - Ayano Terakawa, Teruhisa Hochin, Hiroki Nomiya:
Integrated Usage of Heterogeneous Databases for Novice Users. 109-118 - Naoyuki Miyamoto, Ken Higuchi, Tatsuo Tsuji:
Incremental Data Migration for Multi-Database Systems Based on MySQL with SPIDER Storage Engines. 119-127 - Gaith K. D. Al., Biplob Rakshit Ray, Morshed U. Chowdhury:
Scenarios for An RFID Tag Ownership Transfer Protocol for A Closed Loop System. 128-136
Volume 3, Number 3, August 2015
- Mohammed Alodib:
Towards a Monitoring Framework for the Automatic Integration of the Access Control Policies for Web Services. 137-149 - Hao Qian, Daniel Andresen:
Jade: Reducing Energy Consumption of Android App. 150-158 - Masaya Yoshikawa, Kyota Sugioka, Yusuke Nozaki, Kensaku Asahi:
Secure in-vehicle Systems using Authentication. 159-166 - Na Young Park, Byung Jun Lee, Kyung Tae Kim, Hee Yong Youn:
Effective Management of ReRAM-based Hybrid SSD for Multiple Node HDFS. 167-176 - Satoshi Fujita:
Load Balancing of Peer-to-Peer MMORPG Systems with Hierarchical Area-of-Interest Management. 177-184 - Takahiro Hayashi, Tatsuya Ooi, Motoki Sasaki:
Contour Completion of Partly Occluded Objects Based on Figural Goodness. 185-192 - Reo Kishi, Takahiro Hayashi:
Development of an Effective Gaze Writing System with an Interface for Text Copy and Paste. 193-201
Volume 3, Number 4, November 2015
- Antoine Bossard, Keiichi Kaneko:
A Routing Algorithm Solving the Container Problem in a Hypercube with Bit Constraint. 202-213 - Kyung Tae Kim, Man Youn Kim, Jihyeon Choi, Hee Yong Youn:
An Energy Efficient Clustering Algorithm for Maximizing the Lifetime of Wireless Sensor Network. 214-223 - Hee Jung Park, Kyung Tae Kim, Manyun Kim, Hee Yong Youn:
Enhanced Hypervisor-based SSD Cache with Dynamic Cache Scanning and Allocation for Virtualized Cloud System. 224-233 - Ryosuke Yamanishi, Ryoya Fujimoto, Yuji Iwahori, Robert J. Woodham:
Hybrid Approach of Ontology and Image Clustering for Automatic Generation of Hierarchic Image Database. 234-242 - Georgios Kalantzis, Theodora Leventouri, Hidenobu Tachibana, Charles Shang:
A GPU-based Pencil Beam Algorithm for Dose Calculations in Proton Radiation Therapy. 243-249 - Xianda Chen, Youngho Suh, Seung Wan Kim, Hee Yong Youn:
Handover Management based on Asymmetric Nature of LTE-A HetNet using MCDM Algorithm. 250-260 - Rizwan Qamar, Muhammad Attique, Tae-Sun Chung:
A Pruning Algorithm for Reverse Nearest Neighbors in Directed Road Networks. 261-272
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.