Search Results

There are 4347 results for: content related to: Parallel multigrid on hierarchical hybrid grids: a performance study on current high performance computing clusters

  1. FCMS: A fuzzy controller for CPU and memory consolidation under SLA constraints

    Concurrency and Computation: Practice and Experience

    Cosimo Anglano, Massimo Canonico and Marco Guazzone

    Version of Record online : 2 DEC 2016, DOI: 10.1002/cpe.3968

  2. Modeling decoupled mobile cloud computing using Mobile UNITY

    Concurrency and Computation: Practice and Experience

    Volume 28, Issue 10, July 2016, Pages: 2811–2855, Suddhasil De and Sohini De

    Version of Record online : 4 JUL 2014, DOI: 10.1002/cpe.3300

  3. Optimization of multigrid based elliptic solver for large scale simulations in the FLASH code

    Concurrency and Computation: Practice and Experience

    Volume 24, Issue 18, 25 December 2012, Pages: 2346–2361, Christopher Daley, Marcos Vanella, Anshu Dubey, Klaus Weide and Elias Balaras

    Version of Record online : 13 FEB 2012, DOI: 10.1002/cpe.2821

  4. A ciphertext-policy attribute-based proxy re-encryption scheme for data sharing in public clouds

    Concurrency and Computation: Practice and Experience

    Volume 27, Issue 8, 10 June 2015, Pages: 2004–2027, Kaitai Liang, Liming Fang, Duncan S. Wong and Willy Susilo

    Version of Record online : 13 OCT 2014, DOI: 10.1002/cpe.3397

  5. Efficient multiple sources network coding signature in the standard model

    Concurrency and Computation: Practice and Experience

    Volume 27, Issue 10, July 2015, Pages: 2616–2636, Jinlin Zhang, Jun Shao, Yun Ling, Min Ji, Guiyi Wei and Bishan Ying

    Version of Record online : 25 JUL 2014, DOI: 10.1002/cpe.3322

  6. On the design of a secure user authentication and key agreement scheme for wireless sensor networks

    Concurrency and Computation: Practice and Experience

    Saru Kumari, Ashok Kumar Das, Mohammad Wazid, Xiong Li, Fan Wu, Kim-Kwang Raymond Choo and Muhammad Khurram Khan

    Version of Record online : 2 AUG 2016, DOI: 10.1002/cpe.3930

  7. (Strong) multidesignated verifiers signatures secure against rogue key attack

    Concurrency and Computation: Practice and Experience

    Volume 26, Issue 8, 10 June 2014, Pages: 1574–1592, Man Ho Au, Guomin Yang, Willy Susilo and Yunmei Zhang

    Version of Record online : 5 JUL 2013, DOI: 10.1002/cpe.3094

  8. Correct metric semantics for a language inspired by DNA computing

    Concurrency and Computation: Practice and Experience

    Volume 28, Issue 11, 10 August 2016, Pages: 3042–3060, Gabriel Ciobanu and Eneia Nicolae Todoran

    Version of Record online : 24 JUL 2015, DOI: 10.1002/cpe.3585

  9. Privacy-preserving data search and sharing protocol for social networks through wireless applications

    Concurrency and Computation: Practice and Experience

    Xiaofen Wang, Yi Mu and Rongmao Chen

    Version of Record online : 27 MAY 2016, DOI: 10.1002/cpe.3870

  10. Offline/online attribute-based encryption with verifiable outsourced decryption

    Concurrency and Computation: Practice and Experience

    Zechao Liu, Zoe L. Jiang, Xuan Wang, Xinyi Huang, S.M. Yiu and Kunihiko Sadakane

    Version of Record online : 10 AUG 2016, DOI: 10.1002/cpe.3915

  11. Homomorphic authentication codes for network coding

    Concurrency and Computation: Practice and Experience

    Volume 27, Issue 15, October 2015, Pages: 3892–3911, Zhaohui Tang

    Version of Record online : 4 JUL 2013, DOI: 10.1002/cpe.3079

  12. On the linear complexity of generalized cyclotomic binary sequences of length 2pq

    Concurrency and Computation: Practice and Experience

    Volume 26, Issue 8, 10 June 2014, Pages: 1520–1530, Zu-Ling Chang and Dandan Li

    Version of Record online : 31 MAY 2013, DOI: 10.1002/cpe.3052

  13. Pre-image sample algorithm with irregular Gaussian distribution and construction of identity-based signature

    Concurrency and Computation: Practice and Experience

    Jianhua Yan, Licheng Wang, Jing Li, Muzi Li, Yixan Yang and Wenbin Yao

    Version of Record online : 27 AUG 2016, DOI: 10.1002/cpe.3925

  14. Performance analysis and optimization of the parallel one-sided block Jacobi SVD algorithm with dynamic ordering and variable blocking

    Concurrency and Computation: Practice and Experience

    Shuhei Kudo, Yusaku Yamamoto, Martin Bečka and Marian Vajtersic

    Version of Record online : 23 DEC 2016, DOI: 10.1002/cpe.4059

  15. A provably secure and efficient two-party password-based explicit authenticated key exchange protocol resistance to password guessing attacks

    Concurrency and Computation: Practice and Experience

    Volume 27, Issue 17, 10 December 2015, Pages: 4897–4913, Mohammad Sabzinejad Farash, SK Hafizul Islam and Mohammad S. Obaidat

    Version of Record online : 17 MAR 2015, DOI: 10.1002/cpe.3477

  16. An event view specification approach for Supporting Service process collaboration

    Concurrency and Computation: Practice and Experience

    Volume 25, Issue 13, 10 September 2013, Pages: 1943–1966, Jian Cao, Jie Wang, Haiyan Zhao and Minglu Li

    Version of Record online : 12 FEB 2013, DOI: 10.1002/cpe.2990

  17. Efficient signcryption in the standard model

    Concurrency and Computation: Practice and Experience

    Volume 24, Issue 17, 10 December 2012, Pages: 1977–1989, Fagen Li, Mingwu Zhang and Tsuyoshi Takagi

    Version of Record online : 22 SEP 2011, DOI: 10.1002/cpe.1823

  18. Practical attacks and improvements to an efficient radio frequency identification authentication protocol

    Concurrency and Computation: Practice and Experience

    Volume 24, Issue 17, 10 December 2012, Pages: 2069–2080, Imran Erguler and Emin Anarim

    Version of Record online : 2 OCT 2011, DOI: 10.1002/cpe.1838

  19. Composing and scheduling service-oriented applications in time-triggered distributed real-time Java environments

    Concurrency and Computation: Practice and Experience

    Volume 26, Issue 1, January 2014, Pages: 152–193, Iria Estévez-Ayres, Pablo Basanta-Val and Marisol García-Valls

    Version of Record online : 11 DEC 2012, DOI: 10.1002/cpe.2958

  20. A blind modulation identification algorithm for STBC systems using multidimensional ICA

    Concurrency and Computation: Practice and Experience

    Volume 26, Issue 8, 10 June 2014, Pages: 1490–1505, Minggang Luo, Liping Li, Guobing Qian and Jianqi Lu

    Version of Record online : 20 JUN 2013, DOI: 10.1002/cpe.3062