2014
2014
Volume 7, Number 3, 2014 June
-
- Role-based Access Control Using Ontology in Cloud Storage, Hong Sun, Xueqin Zhang and Chunhua Gu (pp. 1-12).
- Research on Multi-tenant Replication Consistency Based on Quorum NRW System, Kong Lanju, Li Qingzhong, Li Lin and Sang Chengliang (pp. 13-22).
- Security Vulnerability and Robust Security Requirements using Key Management in Sensor Network, Jaykumar Shantilal Patel and Vijaykumar M. Chavda (pp. 23-30).
- On the Scheduling Algorithm for Adapting to Dynamic Changes of User Task in Cloud Computing Environment, Taoshen Li and Xixiang Zhang (pp. 31-40).
- A New Clustering Model Based on Word2vec Mining on Sina Weibo Users’ Tags, Bai Xue, Chen Fu and Zhan Shaobin (pp. 41-48).
- Control Strategies for DFIG Based Grid Connected Wind Energy Conversion System, Aggarwal Archna, Saini Lalit Mohan and Singh Bhim (pp. 49-60).
- SH-Sim: A Flexible Simulation Platform for Hybrid Storage Systems, Puyuan Yang, Peiquan Jin and Lihua Yue (pp. 61-70).
- Three Levels Load Balancing on Cloudsim, Yongsheng Hao, Guanfeng Liu and Junwen Lu (pp. 71-88).
- Design and Implementation of Metadata Cache Management Strategy for the Distributed File System, Jingning Liu, Junjian Chen, Wei Tong, Lei Tian and Cong Chen (pp. 89-102).
- Detecting Denial of Service Attacks by Analysing Network Traffic in Wireless Networks, R. Ragupathy and Rajendra Sharma (pp. 103-112).
- A Cloud-computing-based Resource Allocation Model for University Resource Optimization, Cong Liu (pp. 113-122).
- An Energy-efficient Task Scheduler in Virtualized Cloud Platforms, Dongbo Liu and Ning Han (pp. 123-134).
- Comparative Study Between PI and Resonant Controllers for PV Grid-Connected Inverter, S. Makhloufi (pp. 135-142).
- Predictive Routing For Mobile Sink Routing Algorithm, Yang xianhui, Ren honge and Jing Weipeng (pp. 143-154).
- Power Balance Protection Using Long-distance Discretization Equation for EHV Transmission Lines, Zhanjun Qiao and Feng Li (pp. 155-162).
- Defending of Trusted Access Control in Cloud Computing, Venkata Naresh Mandhala, Siva Koteswara Rao Chinnam and Tai-hoon Kim (pp. 163-166).
- Coordination Mechanism and Negotiation Model to Resolve Conflict of Communication Virtual Service in Information Network Corporation, Zhang Tao and Zhang Zhenji (pp. 167-176).
- A Two-Phase Gaming Model for Resource Pricing in Elastic Cloud Environments, Xilong Qu, Hong He and Peng Xiao (pp. 177-188).
- Multiple Selective Regions Image Cryptography on Modified RC4 Stream Cipher, Mahfuzulhoq Chowdhury, Md. Moniruzzaman and Parijat Prashun Purohit (pp. 189-198).
- A Study on Strength of Sina Weibo, Chen Fu, Zhan Shaobin and Shi Guangjun (pp. 199-204).
- Method of Fault Detection in Cloud Computing Systems, Ying Jiang, Jie Huang, Jiaman Ding and Yingli Liu (pp. 205-212).
- A New Innovation on User’s level Security for Storage Data in Cloud Computing, Md Asif Mushtaque (pp. 213-220).
- Research of Remote Attestation Model and Protocol of Interactive Terminals of Smart Grid, Kehe Wu, Fei Chen and Yi Li (pp. 221-232).
- Recommending Optimal API Orchestration with Mining Frequent Mashup Patterns, Dunlu Peng, Lei Xie, Duan Kai and Feitian Li (pp. 233-250).
- Optimal Control Model for Attack of Worms in Wireless Sensor Network, Neha Keshri and Bimal Kumar Mishra (pp. 251-272).
- Study on Very Fast Transient Overvoltage of Closing No-load China UHV Transmission Demonstration Project, Jindongnan-Nanyang-Jingmen 1000 kV Transmission Lines, Bo Ye, Ming Li, Biao Bai and Gefei Qiu (pp. 273-286).
- Parallelization of Point Operations on Conic Curves over Finite Field GF(2n), Yongnan Li and Limin Xiao (pp. 287-298).