default search action
Multiagent and Grid Systems, Volume 12
Volume 12, Number 1, 2016
- Takahiro Majima, Keiki Takadama, Daisuke Watanabe, Mitujiro Katuhara:
Characteristic and application of network evolution model for public transport network. 1-11 - Ezugwu E. Absalom, Marc E. Frîncu, Sahalu B. Junaidu:
Characterization of grid computing resources using measurement-based evaluation. 13-34 - Chairi Kiourt, Dimitris Kalles:
A platform for large-scale game-playing multi-agent systems on a high performance computing infrastructure. 35-54 - Esma Insaf Djebbar, Ghalem Belalem, Merien Benadda:
Task scheduling strategy based on data replication in scientific Cloud workflows. 55-67
Volume 12, Number 2, 2016
- Suyel Namasudra, Pinki Roy:
Secure and efficient data access control in cloud computing environment: A survey. 69-90 - Meiyu Shi, Wei Zhu, Hongji Yang, Chen Li:
Using agent-based model to simulate stakeholder balance model of tourism intangible cultural heritage. 91-103 - Ahmed Taki Eddine Dib, Kamel Barkaoui, Zaïdi Sahnoun:
Specification and verification of reconfigurable multi-agent system architectures. 105-124 - Wei Meng, Shaobo Li, Jinglei Qu:
An iterative and fair protocol for bilateral multi-issue negotiation with complex utility space. 125-138 - Fabien Delecroix, Maxime Morge, Thomas Nachtergaelle, Jean-Christophe Routier:
Multi-party negotiation with preferences rather than utilities. 139-165
Volume 12, Number 3, 2016
- Esha Barlaskar, Yumnam Jayanta Singh, Biju Issac:
Energy-efficient virtual machine placement using enhanced firefly algorithm. 167-198 - Meftah Mohammed Charaf Eddine, Okba Kazar:
An agent based approach for modeling a groupware. 199-215 - Said Limam, Ghalem Belalem:
A self-adaptive conflict resolution with flexible consistency guarantee in the cloud computing. 217-238 - Nirmal Kaur, Savina Bansal, Rakesh Kumar Bansal:
Energy efficient duplication-based scheduling for precedence constrained tasks on heterogeneous computing cluster. 239-252
Volume 12, Number 4, 2016
- Shaik Naseera:
A survey on data replication strategies in a Data Grid environment. 253-269 - Sanjay Chakraborty, Lopamudra Dey:
A rule based probabilistic technique for malware code detection. 271-286 - Fatima Kalfadj, Belabbes Yagoubi:
Dynamic fault tolerant scheduling policy for workflows in Grid computing. 287-302 - Ellie Lovellette, Henry Hexmoor:
Voronoi diagrams for automated argumentations among Internet of Things. 303-318 - Robin Cohen, John Finnson, Thomas T. Tran, Jie Zhang:
An ontological representation for trust-based decision making in transportation environments. 319-342
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.