Journal cover image

Browse issues


Vol. 10
Vol. 9
Vol. 8
Vol. 7
Vol. 6
Vol. 5
Vol. 4
Vol. 3
Vol. 2
Vol. 1

International Journal of High Performance Computing and Networking

2017 Vol. 10 No. 1/2

Special Issue on Big Data and Cloud Computing Challenges

Guest Editors: Professor V. Vijayakumar, Professor Gabriele Anderst-Kotsis, Dr. Zhipeng Cai and Professor Jemal H. Abawajy

 

Preface
PagesTitle and authors
3-12Virtual networks dependability assessment framework
Baker Al-Rubaiey; Jemal H. Abawajy
DOI: 10.1504/IJHPCN.2017.10003758

13-22HB-PPAC: hierarchy-based privacy preserving access control technique in public cloud
Sudha Senthilkumar; V. Madhu Viswanatham
DOI: 10.1504/IJHPCN.2017.10003759

23-33Enhanced low latency queuing algorithm with active queue management for multimedia applications in wireless networks
Rukmani Panjanathan; Ganesan Ramachandran
DOI: 10.1504/IJHPCN.2017.10003760

34-43On the field design bug tolerance on a multi-core processor using FPGA
Harini Sriraman; Pattabiraman Venkatasubbu
DOI: 10.1504/IJHPCN.2017.10003761

44-53An optimised background modelling for efficient foreground extraction
M. Sivagami; T. Revathi; L. Jeganathan
DOI: 10.1504/IJHPCN.2017.10003763

54-63A personalised movie recommendation system based on collaborative filtering
V. Subramaniyaswamy; R. Logesh; M. Chandrashekhar; Anirudh Challa; V. Vijayakumar
DOI: 10.1504/IJHPCN.2017.10003762

64-77Fuzzy logic for decision-enablement: a novel context-awareness framework for smarter environments
S. Rajaraajeswari; R. Selvarani; Pethuru Raj; P. Mohanavadivu
DOI: 10.1504/IJHPCN.2017.10003764

78-90An analysis on the performance of hash table-based dictionary implementations with different data usage models
M. Thenmozhi; H. Srimathi
DOI: 10.1504/IJHPCN.2017.10003765

91-99Privacy preserving framework for brute force attacks in cloud environment
Ambika Vishal Pawar; Ajay R. Dani
DOI: 10.1504/IJHPCN.2017.10003766

100-108Fuzzy cost probability-based suppressed flooding multi-constrained QoS multicast routing for MANETs
H. Santhi; N. Jaisankar
DOI: 10.1504/IJHPCN.2017.10003767

109-117Achieving fine-grained access control and mitigating role explosion by utilising ABE with RBAC
Balamurugan Balusamy; Siddharth Ramachandran; Nalini Priya
DOI: 10.1504/IJHPCN.2017.10003768

118-126Customer experience and associated customer behaviour in end user devices and technologies (smartphones, mobile internet, mobile financial services)
Sujata Joshi; Sanjay Bhatia; Kiran Raikar; Harmanpreet Pall
DOI: 10.1504/IJHPCN.2017.10003769

127-133DCRMRP: distributed cooperative relay-based multihop routing protocol for WiMedia networks
K.S. Umadevi; Arunkumar Thangavelu
DOI: 10.1504/IJHPCN.2017.10003770

134-147Live migration of virtual machines with their local persistent storage in a data intensive cloud
Abhinit Modi; Raghavendra Achar; P. Santhi Thilagam
DOI: 10.1504/IJHPCN.2017.10003771

148-155Bloom filter-based framework for cache management in large cloud metadata databases
R. Anitha; Saswati Mukherjee
DOI: 10.1504/IJHPCN.2017.10003774