


default search action
Journal of Computational Science, Volume 22
Volume 22, September 2017
- David Chalupa, Christian Blum
:
Mining k-reachable sets in real-world networks using domination in shortcut graphs. 1-14 - Saad Alowayyed, Derek Groen, Peter V. Coveney, Alfons G. Hoekstra:
Multiscale computing in the exascale era. 15-25 - Pablo Rabanal
, Ismael Rodríguez
, Fernando Rubio
:
Applications of river formation dynamics. 26-35 - Faryad Darabi Sahneh, Aram Vajdi, Heman Shakeri, Futing Fan, Caterina M. Scoglio
:
GEMFsim: A stochastic simulator for the generalized epidemic modeling framework. 36-44 - Byron E. Moutafis, Christos K. Filelis-Papadopoulos
, George A. Gravvanis:
Parallel multi-projection preconditioned methods based on semi-aggregation techniques. 45-54 - Debashis De
, Jadav Chandra Das:
Design of novel carry save adder using quantum dot-cellular automata. 54-68 - Oluwole K. Oyebamiji
, Darren J. Wilkinson
, Pahala Gedara Jayathilake
, Thomas P. Curtis
, S. P. Rushton, Bowen Li, P. Gupta:
Gaussian process emulation of an individual-based model simulation of microbial communities. 69-84 - Mete Celik
, Ahmet Sakir Dokuz
:
Discovering socio-spatio-temporal important locations of social media users. 85-98 - Fabio Verbosio
, Arne De Coninck, Drosos Kourounis, Olaf Schenk
:
Enhancing the scalability of selected inversion factorization algorithms in genomic prediction. 99-108 - Bijil Prakash
, Amit Setia
, Deepak Alapatt:
Numerical solution of nonlinear fractional SEIR epidemic model by using Haar wavelets. 109-118 - Yi-Kuei Lin, Shin-Guang Chen:
A maximal flow method to search for d-MPs in stochastic-flow networks. 119-125
- Mauro Iacono, Marco Gribaudo
, Joanna Kolodziej, Florin Pop:
Modeling and evaluation of highly complex computer systems architectures. 126-130 - Dimitrios Tychalas, Helen D. Karatza
:
High performance system based on Cloud and beyond: Jungle Computing. 131-147 - Pang-Wei Tsai, Francesco Piccialli
, Chun-Wei Tsai, Mon-Yen Luo, Chu-Sing Yang:
Control frameworks in network emulation testbeds: A survey. 148-161 - Ugo Fiore
, Paolo Zanetti
, Francesco Palmieri, Francesca Perla
:
Traffic matrix estimation with software-defined NFV: Challenges and opportunities. 162-170 - Dae-Young Kim
, Seokhoon Kim
, Houcine Hassan, Jong Hyuk Park:
Adaptive data rate control in low power wide area networks for long range IoT services. 171-178 - Massimo Ficco
, Michal Choras, Rafal Kozik
:
Simulation platform for cyber-security and vulnerability analysis of critical infrastructures. 179-186 - Ewa Niewiadomska-Szynkiewicz, Adam Kozakiewicz:
Design and evaluation of a system for network threat signatures generation. 187-197 - Grazyna Suchacka
, Daria Wotzka
:
Modeling a non-stationary bots' arrival process at an e-commerce Web site. 198-208 - Jacek M. Czerniak
, Hubert Zarzycki
:
Artificial Acari Optimization as a new strategy for global optimization of multimodal functions. 209-227 - Salvatore Cuomo
, Pasquale De Michele
, Ardelio Galletti
, Livia Marcellino
:
A parallel PDE-based numerical algorithm for computing the Optical Flow in hybrid systems. 228-236
- Boucif Amar Bensaber, Luca Foschini
:
Performance evaluation of communications in distributed systems and web based service architectures. 237-239 - Robertas Damasevicius, Christian Napoli
, Tatjana Sidekerskiene
, Marcin Wozniak
:
IMF mode demixing in EMD for jitter analysis. 240-252 - Walid Serrai
, Abdelkrim Abdelli
, Lynda Mokdad, Youcef Hammal
:
Towards an efficient and a more accurate web service selection using MCDM methods. 253-267 - Carlos Ferreira
, Susana Sargento
, Arnaldo S. R. Oliveira
:
An architecture for a learning-based autonomic decision system. 268-282 - Hacène Fouchal
, Emilien Bourdy, Geoffrey Wilhelm, Marwane Ayaida:
A validation tool for cooperative intelligent transport systems. 283-288 - Hyunbum Kim, Jalel Ben-Othman, Paolo Bellavista
:
Collision-free reinforced barriers in UAV networks. 289-300 - Yasuyuki Tanaka, Mitsuaki Akiyama, Atsuhiro Goto:
Analysis of malware download sites by focusing on time series variation of malware. 301-313

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.