Search Results

There are 17599 results for: content related to: A study on using uncertain time series matching algorithms for MapReduce applications

  1. Modeling decoupled mobile cloud computing using Mobile UNITY

    Concurrency and Computation: Practice and Experience

    Volume 28, Issue 10, July 2016, Pages: 2811–2855, Suddhasil De and Sohini De

    Version of Record online : 4 JUL 2014, DOI: 10.1002/cpe.3300

  2. A ciphertext-policy attribute-based proxy re-encryption scheme for data sharing in public clouds

    Concurrency and Computation: Practice and Experience

    Volume 27, Issue 8, 10 June 2015, Pages: 2004–2027, Kaitai Liang, Liming Fang, Duncan S. Wong and Willy Susilo

    Version of Record online : 13 OCT 2014, DOI: 10.1002/cpe.3397

  3. On the design of a secure user authentication and key agreement scheme for wireless sensor networks

    Concurrency and Computation: Practice and Experience

    Saru Kumari, Ashok Kumar Das, Mohammad Wazid, Xiong Li, Fan Wu, Kim-Kwang Raymond Choo and Muhammad Khurram Khan

    Version of Record online : 2 AUG 2016, DOI: 10.1002/cpe.3930

  4. Homomorphic authentication codes for network coding

    Concurrency and Computation: Practice and Experience

    Volume 27, Issue 15, October 2015, Pages: 3892–3911, Zhaohui Tang

    Version of Record online : 4 JUL 2013, DOI: 10.1002/cpe.3079

  5. A provably secure and efficient two-party password-based explicit authenticated key exchange protocol resistance to password guessing attacks

    Concurrency and Computation: Practice and Experience

    Volume 27, Issue 17, 10 December 2015, Pages: 4897–4913, Mohammad Sabzinejad Farash, SK Hafizul Islam and Mohammad S. Obaidat

    Version of Record online : 17 MAR 2015, DOI: 10.1002/cpe.3477

  6. Efficient multiple sources network coding signature in the standard model

    Concurrency and Computation: Practice and Experience

    Volume 27, Issue 10, July 2015, Pages: 2616–2636, Jinlin Zhang, Jun Shao, Yun Ling, Min Ji, Guiyi Wei and Bishan Ying

    Version of Record online : 25 JUL 2014, DOI: 10.1002/cpe.3322

  7. (Strong) multidesignated verifiers signatures secure against rogue key attack

    Concurrency and Computation: Practice and Experience

    Volume 26, Issue 8, 10 June 2014, Pages: 1574–1592, Man Ho Au, Guomin Yang, Willy Susilo and Yunmei Zhang

    Version of Record online : 5 JUL 2013, DOI: 10.1002/cpe.3094

  8. Correct metric semantics for a language inspired by DNA computing

    Concurrency and Computation: Practice and Experience

    Volume 28, Issue 11, 10 August 2016, Pages: 3042–3060, Gabriel Ciobanu and Eneia Nicolae Todoran

    Version of Record online : 24 JUL 2015, DOI: 10.1002/cpe.3585

  9. Privacy-preserving data search and sharing protocol for social networks through wireless applications

    Concurrency and Computation: Practice and Experience

    Volume 29, Issue 7, 10 April 2017, Xiaofen Wang, Yi Mu and Rongmao Chen

    Version of Record online : 27 MAY 2016, DOI: 10.1002/cpe.3870

  10. Offline/online attribute-based encryption with verifiable outsourced decryption

    Concurrency and Computation: Practice and Experience

    Volume 29, Issue 7, 10 April 2017, Zechao Liu, Zoe L. Jiang, Xuan Wang, Xinyi Huang, S.M. Yiu and Kunihiko Sadakane

    Version of Record online : 10 AUG 2016, DOI: 10.1002/cpe.3915

  11. Pre-image sample algorithm with irregular Gaussian distribution and construction of identity-based signature

    Concurrency and Computation: Practice and Experience

    Jianhua Yan, Licheng Wang, Jing Li, Muzi Li, Yixan Yang and Wenbin Yao

    Version of Record online : 27 AUG 2016, DOI: 10.1002/cpe.3925

  12. Performance analysis and optimization of the parallel one-sided block Jacobi SVD algorithm with dynamic ordering and variable blocking

    Concurrency and Computation: Practice and Experience

    Volume 29, Issue 9, 10 May 2017, Shuhei Kudo, Yusaku Yamamoto, Martin Bečka and Marian Vajtersic

    Version of Record online : 23 DEC 2016, DOI: 10.1002/cpe.4059

  13. BSP cost and scalability analysis for MapReduce operations

    Concurrency and Computation: Practice and Experience

    Volume 28, Issue 8, 10 June 2016, Pages: 2503–2527, Hermes Senger, Veronica Gil-Costa, Luciana Arantes, Cesar A. C. Marcondes, Mauricio Marín, Liria M. Sato and Fabrício A.B. da Silva

    Version of Record online : 7 OCT 2015, DOI: 10.1002/cpe.3628

  14. Efficient signcryption in the standard model

    Concurrency and Computation: Practice and Experience

    Volume 24, Issue 17, 10 December 2012, Pages: 1977–1989, Fagen Li, Mingwu Zhang and Tsuyoshi Takagi

    Version of Record online : 22 SEP 2011, DOI: 10.1002/cpe.1823

  15. Composing and scheduling service-oriented applications in time-triggered distributed real-time Java environments

    Concurrency and Computation: Practice and Experience

    Volume 26, Issue 1, January 2014, Pages: 152–193, Iria Estévez-Ayres, Pablo Basanta-Val and Marisol García-Valls

    Version of Record online : 11 DEC 2012, DOI: 10.1002/cpe.2958

  16. A blind modulation identification algorithm for STBC systems using multidimensional ICA

    Concurrency and Computation: Practice and Experience

    Volume 26, Issue 8, 10 June 2014, Pages: 1490–1505, Minggang Luo, Liping Li, Guobing Qian and Jianqi Lu

    Version of Record online : 20 JUN 2013, DOI: 10.1002/cpe.3062

  17. A practical construction for large universe hierarchical attribute-based encryption

    Concurrency and Computation: Practice and Experience

    Cong Li, Yuejian Fang, Xing Zhang, Cancan Jin, Qingni Shen and Zhonghai Wu

    Version of Record online : 25 OCT 2016, DOI: 10.1002/cpe.3957

  18. A simple authentication encryption scheme

    Concurrency and Computation: Practice and Experience

    Rashed Mazumder, Atsuko Miyaji and Chunhua Su

    Version of Record online : 2 FEB 2017, DOI: 10.1002/cpe.4058

  19. On constructing DAG-schedules with large areas

    Concurrency and Computation: Practice and Experience

    Volume 27, Issue 16, November 2015, Pages: 4107–4121, Scott T. Roche, Arnold L. Rosenberg and Rajmohan Rajaraman

    Version of Record online : 25 JUN 2015, DOI: 10.1002/cpe.3560

  20. Secure and efficient data-sharing in clouds

    Concurrency and Computation: Practice and Experience

    Volume 27, Issue 8, 10 June 2015, Pages: 2125–2143, Jiang Zhang and Zhenfeng Zhang

    Version of Record online : 14 OCT 2014, DOI: 10.1002/cpe.3395