default search action
International Journal of Distributed Systems and Technologies, Volume 3
Volume 3, Number 1, 2012
- Nicolas Nobelis, Karima Boudaoud, Christian Delettre, Michel Riveill:
Designing Security Properties-Centric Communication Protocols using a Component-Based Approach. 1-16 - Alexandra Carpen-Amarie, Alexandru Costan, Catalin Adrian Leordeanu, Cristina Basescu, Gabriel Antoniu:
Towards a Generic Security Framework for Cloud Data Management Environments. 17-34 - Tim French, Nik Bessis, Carsten Maple, Eleana Asimakopoulou:
Trust Issues on Crowd-Sourcing Methods for Urban Environmental Monitoring. 35-47 - Jie Zhang:
Trust Management for VANETs: Challenges, Desired Properties and Future Directions. 48-62
Volume 3, Number 2, 2012
- Carlos Eduardo S. Pires, Rocir Marcos Leite Santiago, Ana Carolina Salgado, Zoubida Kedad, Mokrane Bouzeghoub:
Ontology-Based Clustering in a Peer Data Management System. 1-21 - Naveen Chauhan, Lalit Kumar Awasthi, Narottam Chand:
Cache Replacement in Mobile Adhoc Networks. 22-38 - Ioan Sorin Comsa, Mehmet Aydin, Sijing Zhang, Pierre Kuonen, Jean-Frédéric Wagen:
Multi Objective Resource Scheduling in LTE Networks Using Reinforcement Learning. 39-57 - Muhammad Imran, Khursheed Khursheed, Abdul Waheed Malik, Naeem Ahmad, Mattias O'Nils, Najeem Lawal, Benny Thörnberg:
Architecture Exploration Based on Tasks Partitioning Between Hardware, Software and Locality for a Wireless Vision Sensor Node. 58-71 - Jean-Charles Tournier, Vaibhav Donde, Zhao Li, Martin Naef:
Potential of General Purpose Graphic Processing Unit for Energy Management System. 72-82 - Andrzej Jordan, Carsten Maple, Ryszard Szczebiot:
Optimal Placement of the Wind Generators in the Medium Voltage Power Grid. 83-92
Volume 3, Number 3, 2012
- Admir Barolli, Makoto Takizawa, Tetsuya Oda, Evjola Spaho, Leonard Barolli, Kazunori Uchida, Fatos Xhafa:
Performance Evaluation of WMN-GA Simulation System for Different Settings of Genetic Operators Considering Giant Component and Number of Covered Users. 1-14 - Noriyasu Yamamoto, Toshihiko Wakahara:
Evaluation of Encryption Procedure for User Attestation System Using a Cellular Phone. 15-26 - Minoru Uehara:
Metabolic Computing: Towards Truly Renewable Systems. 27-39 - Markus Graube, Johannes Pfeffer, Jens Ziegler, Leon Urbas:
Linked Data as Integrating Technology for Industrial Data. 40-52 - Ying-Hong Wang, Kuo-Feng Huang, Shaing-Ting Lin:
A Grid-Based Hole Detection Scheme in WSNs. 53-71 - Stelios Sotiriadis, Nik Bessis, Nick Antonopoulos:
Exploring Inter-Cloud Load Balancing by Utilizing Historical Service Submission Records. 72-81
Volume 3, Number 4, 2012
- Asta Zelenkauskaite, Paolo Massa:
Contributing to Wikipedia: Through Content or Social Interaction? 1-13 - Iris Kaiser:
Collaborative Trend Analysis Using Web 2.0 Technologies: A Case Study. 14-23 - Alexiei Dingli, Dylan Seychell:
Taking Social Networks to the Next Level. 24-33 - Carsten Maple, Emma Short, Antony Brown, Chris Bryden, Michael Salter:
Cyberstalking in the UK: Analysis and Recommendations. 34-51 - Risto Honkanen, Ville Leppänen:
Routing in Coloured Sparse Optical Tori by Using Balanced WDM and Network Sparseness. 52-62 - G. M. Siddesh, K. G. Srinisas:
An Adaptive Scheduler Framework for Complex Workflow Jobs on Grid Systems. 63-79
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.