Digital Library
Search: "[ keyword: Computing ]" (58)
-
Wenzheng Zhu, Changhoon Lee
Vol. 12, No. 3, pp. 538-547, Sep. 2016
10.3745/JIPS.03.0053
Keywords: Cloud computing, Collusive Worker, Malicious Worker, MapReduce, Non-collusive Worker -
Ning Yu, Zeng Yu, Bing Li, Feng Gu, Yi Pan
Vol. 12, No. 1, pp. 1-34, Mar. 2016
10.3745/JIPS.04.0023
Keywords: Cloud computing, Comparative Methods, Deep Learning, Fourier Transform, Gene Identification, Gene Prediction, Hidden Markov Model, Machine Learning, Protein-Coding Region, Support Vector Machine -
Majdi Dammak, Ali Wali, Adel M. Alimi
Vol. 11, No. 1, pp. 76-94, Mar. 2015
10.3745/JIPS.01.0006
Keywords: Affective Computing, Emotion, FABO, k-NN, Motion Recognition, PCA, Video Summarization -
Vladi Kolici, Albert Herrero, Fatos Xhafa
Vol. 10, No. 4, pp. 491-502, Dec. 2014
10.3745/JIPS.01.0004
Keywords: Benchmarking, Cloud Computing, Computing Intensive Applications, Genetic Algorithms, Grid Computing, Oracle Grid Engine, Scheduling, Simulation -
Hayat Bendoukha, Yahya Slimani, Abdelkader Benyettou
Vol. 10, No. 3, pp. 365-383, Sep. 2014
10.3745/JIPS.02.0003
Keywords: service composition, Service-Oriented Computing, Service-Oriented Workflow, UML2BPEL, Workflow -
Youjin Song, Yasheng Pang
Vol. 10, No. 1, pp. 132-144, Mar. 2014
10.3745/JIPS.2014.10.1.132
Keywords: Cloud Risk, Risk Control, Cloud Computing, BMIS, CSFs -
Rasheed Hussain, Heekuck Oh
Vol. 10, No. 1, pp. 103-118, Mar. 2014
10.3745/JIPS.2014.10.1.103
Keywords: VANET Clouds, Security, Privacy, Traffic Information, Data Dissemination, Cloud Computing -
Sun-Ho Lee, Im-Yeong Lee
Vol. 9, No. 2, pp. 287-300, Jun. 2013
10.3745/JIPS.2013.9.2.287
Keywords: Searchable encryption, Proxy Re-Encryption, Index Management, Cloud Computing, Cloud Storage -
Ankit Chaudhary, Kapil Vatwani, Tushar Agrawal, J.L. Raheja
Vol. 8, No. 3, pp. 399-408, Sep. 2012
10.3745/JIPS.2012.8.3.399
Keywords: Hand Shape Parameters, Fingertips Detection, Skin Filter, Natural Computing, Corner detection -
Eun-Sun Cho, Sumi Helal
Vol. 8, No. 2, pp. 279-300, Jun. 2012
10.3745/JIPS.2012.8.2.279
Keywords: Exceptions, Safety, Programming models for Pervasive Systems, Pervasive Computing, Contexts, Situations