default search action
Cluster Computing, Volume 25
Volume 25, Number 1, February 2022
- N. Suganthi, S. Meenakshi:
An efficient scheduling algorithm using queuing system to minimize starvation of non-real-time secondary users in Cognitive Radio Network. 1-11 - Pan Jun Sun:
The optimal privacy strategy of cloud service based on evolutionary game. 13-31 - Enrique Tomás Martínez Beltrán, Mario Quiles Pérez, Sergio López Bernal, Alberto Huertas Celdrán, Gregorio Martínez Pérez:
Noise-based cyberattacks generating fake P300 waves in brain-computer interfaces. 33-48 - Aya M. Kishk, Mahmoud Mohammed Badawy, Hesham A. Ali, Ahmed I. Saleh:
A new traffic congestion prediction strategy (TCPS) based on edge computing. 49-75 - Wenkai Ma, Jinchang Hu, Yanyan Wang, Yaohua Wu:
Simulation-based regression analysis for the replenishment strategy of the crane & shuttle-based storage and retrieval system. 77-89 - Masoumeh Hajvali, Sahar Adabi, Ali Rezaee, Mehdi Hosseinzadeh:
Software architecture for IoT-based health-care systems with cloud/fog service model. 91-118 - Ali Asghari, Mohammad Karim Sohrabi:
Combined use of coral reefs optimization and multi-agent deep Q-network for energy-aware resource provisioning in cloud data centers using DVFS technique. 119-140 - Abbas Najafizadeh, Afshin Salajegheh, Amir Masoud Rahmani, Amir Sahafi:
Multi-objective Task Scheduling in cloud-fog computing using goal programming approach. 141-165 - Ahmed Saidi, Omar Nouali, Abdelouahab Amira:
SHARE-ABE: an efficient and secure data sharing framework based on ciphertext-policy attribute-based encryption and Fog computing. 167-185 - Jaiprakash Nagar, Sanjay Kumar Chaturvedi, Sieteng Soh:
An analytical framework with border effects to estimate the connectivity performance of finite multihop networks in shadowing environments. 187-202 - Hancui Zhang, Weida Zhou:
A two-stage virtual machine abnormal behavior-based anomaly detection mechanism. 203-214 - Ali Asghar Safaei:
Hybrid fragmentation of medical images' attributes for multidimensional indexing. 215-230 - Yousef O. Sharrab, Izzat Alsmadi, Nabil J. Sarhan:
Towards the availability of video communication in artificial intelligence-based computer vision systems utilizing a multi-objective function. 231-247 - Gaofeng Zhang, Benzhu Xu, Ensheng Liu, Liqiang Xu, Liping Zheng:
Task placement for crowd recognition in edge-cloud based urban intelligent video systems. 249-262 - Saleh Darzi, Bahareh Akhbari, Hassan Khodaiemehr:
LPM2DA: a lattice-based privacy-preserving multi-functional and multi-dimensional data aggregation scheme for smart grid. 263-278 - Fernando Loor, Manuel Manriquez, Veronica Gil-Costa, Mauricio Marín:
Feasibility of P2P-STB based crowdsourcing to speed-up photo classification for natural disasters. 279-302 - Farhad Tavousi, Sadoon Azizi, Abdulbaghi Ghaderzadeh:
A fuzzy approach for optimal placement of IoT applications in fog-cloud computing. 303-320 - Ahmed Fathalla, Kenli Li, Ahmad Salah:
Best-KFF: a multi-objective preemptive resource allocation policy for cloud computing systems. 321-336 - Yanyan Ji, Bilin Shao, Jinyong Chang, Genqing Bian:
Flexible identity-based remote data integrity checking for cloud storage with privacy preserving property. 337-349 - Mahyar Sadrishojaei, Nima Jafari Navimipour, Midia Reshadi, Mehdi Hosseinzadeh:
A new clustering-based routing method in the mobile internet of things using a krill herd algorithm. 351-361 - Yuejing Yan, Yanyan Xu, Yiran Zhang, Zhiheng Wang, Zheheng Rao:
Privacy-preserving content-based image retrieval in edge environment. 363-381 - Jianhu Gong, Nima Jafari Navimipour:
An in-depth and systematic literature review on the blockchain-based approaches for cloud computing. 383-400 - Ali Majed, Fatemeh Raji, Ali Miri:
Replication management in peer-to-peer cloud storage systems. 401-416 - Sumit Kumar, Rajeev Tiwari, Sergei A. Kozlov, Joel J. P. C. Rodrigues:
Minimizing delay in content-centric networks using heuristics-based in-network caching. 417-431 - KyungHyun Han, Wai-Kong Lee, Seong Oun Hwang:
cuGimli: optimized implementation of the Gimli authenticated encryption and hash function on GPU for IoT applications. 433-450 - Ashish Tomar, Sachin Tripathi:
Blockchain-assisted authentication and key agreement scheme for fog-based smart grid. 451-468 - Mouna Afif, Riadh Ayachi, Mohamed Atri:
Indoor objects detection system implementation using multi-graphic processing units. 469-483 - Mohammad Hossein Nejat, Homayun Motameni, Hamed Vahdat-Nejad, Behnam Barzegar:
Efficient cloud service ranking based on uncertain user requirements. 485-502 - S. Asha, P. Vinod:
Evaluation of adversarial machine learning tools for securing AI systems. 503-522 - Sami Alshmrany:
Adaptive learning style prediction in e-learning environment using levy flight distribution based CNN model. 523-536 - Kashif Mehboob Khan, Junaid Arshad, Waheed Iqbal, Sidrah Abdullah, Hassan Zaib:
Blockchain-enabled real-time SLA monitoring for cloud-hosted services. 537-559 - Wu Wang, Fouzi Harrou, Benamar Bouyeddou, Sidi-Mohammed Senouci, Ying Sun:
A stacked deep learning approach to cyber-attacks detection in industrial systems: application to power system and gas pipeline systems. 561-578 - Ali Belgacem, Kadda Beghdad Bey:
Multi-objective workflow scheduling in cloud computing: trade-off between makespan and cost. 579-595 - Sejin Kim, Yoonhee Kim:
K-Scheduler: dynamic intra-SM multitasking management with execution profiles on GPUs. 597-617 - Feng Cheng, Yifeng Huang, Bhavana Tanpure, Pawan Sawalani, Long Cheng, Cong Liu:
Cost-aware job scheduling for cloud instances using deep reinforcement learning. 619-631 - Seongbong Choi, Hyung Tae Lee:
Attack and improvement of the recent identity-based encryption with authorized equivalence test in cluster computing. 633-646 - Shahid Md. Asif Iqbal, Asaduzzaman, Mohammed Moshiul Hoque:
A source-driven reinforcement learning-based Data reply strategy to reduce communication overhead in Named Data Networks (NDN). 647-673 - Avita Katal, Susheela Dahiya, Tanupriya Choudhury:
Energy efficiency in cloud computing data center: a survey on hardware technologies. 675-705 - Hang Gao, Tiegang Gao:
A secure lossless recovery for medical images based on image encoding and data self-embedding. 707-725 - Juan Dan, Yanjun Zheng, Jianping Hu:
Research on sports training model based on intelligent data aggregation processing in internet of things. 727-734
Volume 25, Number 2, April 2022
- Hamza Aldabbas, Khalaf Khatatneh:
Intelligent transmission control layer for efficient node management in SDN. 735-750 - Huifang Li, Jianghang Huang, Binyang Wang, Yushun Fan:
Weighted double deep Q-network based reinforcement learning for bi-objective multi-workflow scheduling in the cloud. 751-768 - Lin-Tao Duan, Zhi-Guo Wang, Hai-Ying Wang:
Energy-efficient speed tuning for real-time applications. 769-779 - Hongjian Li, Hai Fang, Hongxi Dai, Tao Zhou, Wenhu Shi, Jingjing Wang, Chen Xu:
A cost-efficient scheduling algorithm for streaming processing applications on cloud. 781-803 - Sumalatha Saleti:
Incremental mining of high utility sequential patterns using MapReduce paradigm. 805-825 - Himanshu Purohit, Pawan K. Ajmera:
Multi-modal biometric fusion based continuous user authentication for E-proctoring using hybrid LCNN-Salp swarm optimization. 827-846 - Peini Liu, Jordi Guitart:
Performance characterization of containerization for HPC workloads on InfiniBand clusters: an empirical study. 847-868 - Kamal Berahmand, Mehrnoush Mohammadi, Azadeh Faroughi, Rojiar Pir Mohammadiani:
A novel method of spectral clustering in attributed networks by constructing parameter-free affinity matrix. 869-888 - Krishan Kumar Sethi, Dharavath Ramesh, Munesh Chandra Trivedi:
A Spark-based high utility itemset mining with multiple external utilities. 889-909 - Aryan Rahimikhanghah, Melika Tajkey, Bahareh Rezazadeh, Amir Masoud Rahmani:
Resource scheduling methods in cloud and fog computing environments: a systematic literature review. 911-945 - Guilherme R. Pretto, Bruno Lopes Dalmazo, Jonatas Adilson Marques, Zhongke Wu, Xingce Wang, Vladimir Korkhov, Philippe O. A. Navaux, Luciano Paschoal Gaspary:
Janus: a framework to boost HPC applications in the cloud based on SDN path provisioning. 947-964 - Theofanis Xifilidis, Kostas E. Psannis:
Correlation-based wireless sensor networks performance: the compressed sensing paradigm. 965-981 - Ashish Mohan Yadav, Kuldeep Narayan Tripathi, S. C. Sharma:
An enhanced multi-objective fireworks algorithm for task scheduling in fog computing environment. 983-998 - Mahmoud Ahmad Al-Khasawneh, Irfan Uddin, Syed Atif Ali Shah, Ahmad M. Khasawneh, Laith Mohammad Abualigah, Marwan Mahmoud:
An improved chaotic image encryption algorithm using Hadoop-based MapReduce framework for massive remote sensed images in parallel IoT applications. 999-1013 - Ali Aghasi, Kamal Jamshidi, Ali Bohlooli:
A thermal-aware energy-efficient virtual machine placement algorithm based on fuzzy controlled binary gravitational search algorithm (FC-BGSA). 1015-1033 - Reyhane Ghafari, F. Hassani Kabutarkhani, Najme Mansouri:
Task scheduling algorithms for energy optimization in cloud environment: a comprehensive review. 1035-1093 - Xi Liu, Jun Liu:
A truthful online mechanism for virtual machine provisioning and allocation in clouds. 1095-1109 - Siddhant Jain, Shashank Gupta, K. K. Sreelakshmi, Joel J. P. C. Rodrigues:
Fog computing in enabling 5G-driven emerging technologies for development of sustainable smart city infrastructures. 1111-1154 - Naina Handa, Anil Sharma, Amardeep Gupta:
Framework for prediction and classification of non functional requirements: a novel vision. 1155-1173 - Degan Zhang, Lixiang Cao, Haoli Zhu, Ting Zhang, Jinyu Du, Kaiwen Jiang:
Task offloading method of edge computing in internet of vehicles based on deep reinforcement learning. 1175-1187 - K. Kalyana Chakravarthi, P. Neelakantan, L. Shyamala, Vaidehi V.:
Reliable budget aware workflow scheduling strategy on multi-cloud environment. 1189-1205 - Zhenxing Xu, Jinzhao Wu:
Computing flow pipe of embedded hybrid systems using deep group preserving scheme. 1207-1220 - Xuewang Zhang, Caijin Ye:
A novel privacy protection of permissioned blockchains with conditionally anonymous ring signature. 1221-1235 - Marjan Mahmoudi, Avid Avokh, Behrang Barekatain:
SDN-DVFS: an enhanced QoS-aware load-balancing method in software defined networks. 1237-1262 - Amrita Mangaonkar, Rohit Pawar, Nahida Sultana Chowdhury, Rajeev R. Raje:
Enhancing collaborative detection of cyberbullying behavior in Twitter data. 1263-1277 - Marco Lattuada, Eugenio Gianniti, Danilo Ardagna, Li Zhang:
Performance prediction of deep learning applications training in GPU as a service systems. 1279-1302 - Rashmi Sahay, G. Geethakumari, Barsha Mitra:
Mitigating the worst parent attack in RPL based internet of things. 1303-1320 - Jingzhao Xie, Run Zhou, Gang Sun, Jian Sun, Hongfang Yu:
Fast recovery for online service function chaining interruption using adaptive migration. 1321-1339 - Nitin Goyal, Ashok Kumar, Renu Popli, Lalit Kumar Awasthi, Nonita Sharma, Gaurav Sharma:
Priority based data gathering using multiple mobile sinks in cluster based UWSNs for oil pipeline leakage detection. 1341-1354 - Nilesh Vishwasrao Patil, C. Rama Krishna, Krishan Kumar:
SSK-DDoS: distributed stream processing framework based classification system for DDoS attacks. 1355-1372 - Dan Tang, Yudong Yan, Rui Dai, Zheng Qin, Jingwen Chen, Dongshuo Zhang:
A novel LDoS attack detection method based on reconstruction anomaly. 1373-1392 - Mohammad Hassan Khoobkar, Mehdi Dehghan Takht Fooladi, Mohammad Hossein Rezvani, Mohammad Mehdi Gilanian Sadeghi:
Partial offloading with stable equilibrium in fog-cloud environments using replicator dynamics of evolutionary game theory. 1393-1420 - Chunlin Li, Qianqian Cai, Youlong Luo:
Dynamic data replacement and adaptive scheduling policies in spark. 1421-1439 - Sivadi Balakrishna:
Multi objective-based incremental clustering by fast search technique for dynamically creating and updating clusters in large data. 1441-1457 - Marc Jordà, Pedro Valero-Lara, Antonio J. Peña:
cuConv: CUDA implementation of convolution for CNN inference. 1459-1473 - Amrendra Singh Yadav, Nikita Singh, Dharmender Singh Kushwaha:
Sidechain: storage land registry data using blockchain improve performance of search records. 1475-1495 - Xingyu Wang, Junzhao Du, Hui Liu:
Performance and isolation analysis of RunC, gVisor and Kata Containers runtimes. 1497-1513 - Nasim Naseri Seyedi Noudoust, Sahar Adabi, Ali Rezaee:
A quorum-based data consistency approach for non-relational database. 1515-1540 - Neha Goyal, Kapil Gupta:
A hierarchical laplacian TWSVM using similarity clustering for leaf classification. 1541-1560 - Retraction Note to: A fuzzy multi-objective immune genetic algorithm for the strategic location planning problem. 1561
Volume 25, Number 3, June 2022
- Izzat Alsmadi, Zyad Dwekat, Ricardo Cantu, Bilal Al-Ahmad:
Vulnerability assessment of industrial systems using Shodan. 1563-1573 - Simge Nur Aslan, Recep Ozalp, Aysegül Uçar, Cüneyt Güzelis:
New CNN and hybrid CNN-LSTM models for learning object manipulation of humanoid robots from demonstration. 1575-1590 - Faris A. Almalki, Marios C. Angelides:
An enhanced design of a 5G MIMO antenna for fixed wireless aerial access. 1591-1606 - Ala Abdulsalam Alarood, Nedal K. Al-Ababneh, Mahmoud Ahmad Al-Khasawneh, Majdi Rawashdeh, Mohammad Al-Omari:
IoTSteg: ensuring privacy and authenticity in internet of things networks using weighted pixels classification based image steganography. 1607-1618 - Mohammad Al Ja'afreh, Hikmat Adhami, Alaa Eddin Alchalabi, Mohamad Hoda, Abdulmotaleb El-Saddik:
Toward integrating software defined networks with the Internet of Things: a review. 1619-1636 - Simona Nedelcheva, Sofiya Ivanovska, Mariya K. Durchova, Petia D. Koprinkova-Hristova:
HPC parallel implementation combining NEST Simulator and Python modules. 1637-1644 - Andrii Salnikov, Balázs Kónya:
DNS-embedded service endpoint registry for distributed e-Infrastructures. 1645-1664 - Hasan Kivrak, Furkan Cakmak, Hatice Kose, Sirma Yavuz:
Waypoint based path planner for socially aware robot navigation. 1665-1675 - Lazar Mrkela, Zorica Stanimirovic:
A Multi-objective variable neighborhood search for the maximal covering location problem with customer preferences. 1677-1693 - Vahideh Hayyolalam, Safa Otoum, Öznur Özkasap:
Dynamic QoS/QoE-aware reliable service composition framework for edge intelligence. 1695-1713 - Dinesh Kumar Sah, Tu N. Nguyen, Korhan Cengiz, Braulio Dumba, Vikas Kumar:
Load-balance scheduling for intelligent sensors deployment in industrial internet of things. 1715-1727 - Kübra Seyhan, Tu N. Nguyen, Sedat Akleylek, Korhan Cengiz:
Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a survey. 1729-1748 - Saddam Hussain, Syed Sajid Ullah, Ihsan Ali:
An efficient content source verification scheme for multi-receiver in NDN-based Internet of Things. 1749-1764 - Mamoun Alazab, Gunasekaran Manogaran, Carlos Enrique Montenegro-Marín:
Trust management for internet of things using cloud computing and security in smart cities. 1765-1777 - Sowmya Gali, Venkatram Nidumolu:
An intelligent trust sensing scheme with metaheuristic based secure routing protocol for Internet of Things. 1779-1789 - Xianhao Shen, Yufang Lu, Yi Zhang, Xiaoyong Liu, Lieping Zhang:
An Innovative Data Integrity Verification Scheme in the Internet of Things assisted information exchange in transportation systems. 1791-1803 - Roobaea Alroobaea, Rajakumar Arul, Saeed Rubaiee, Fahd S. Alharithi, Usman Tariq, Xincan Fan:
AI-assisted bio-inspired algorithm for secure IoT communication networks. 1805-1816 - Mark C. Ballandies, Marcus M. Dapp, Evangelos Pournaras:
Decrypting distributed ledger design - taxonomy, classification and blockchain community evaluation. 1817-1838 - Muhammad Umar Javed, Nadeem Javaid, Muhammad Waseem Malik, Mariam Akbar, Omaji Samuel, Adamu Sani Yahaya, Jalel Ben-Othman:
Blockchain based secure, efficient and coordinated energy trading and data sharing between electric vehicles. 1839-1867 - Abel O. Gomez Rivera, Deepak K. Tosh, Uttam Ghosh:
Resilient sensor authentication in SCADA by integrating physical unclonable function and blockchain. 1869-1883 - Baran Kiliç, Can C. Özturan, Alper Sen:
Parallel analysis of Ethereum blockchain transaction data using cluster computing. 1885-1898 - Debashis Das, Sourav Banerjee, Pushpita Chatterjee, Manju Biswas, Utpal Biswas, Waleed S. Alnumay:
Design and development of an intelligent transportation management system using blockchain and smart contracts. 1899-1913 - Gökay Saldamli, Charit Upadhyay, Devika Jadhav, Rohit Shrishrimal, Bapugouda Patil, Lo'ai Tawalbeh:
Improved gossip protocol for blockchain applications. 1915-1926 - Krushali Shah, Swapnil Chadotra, Sudeep Tanwar, Rajesh Gupta, Neeraj Kumar:
Blockchain for IoV in 6G environment: review solutions and challenges. 1927-1955 - Suayb S. Arslan, Turguy Goker:
Compress-store on blockchain: a decentralized data processing and immutable storage for multimedia streaming. 1957-1968 - Xiangyu Wang, Wenyong Wang, Youlu Zeng, Ting Yang, Chengyu Zheng:
A state sharding model on the blockchain. 1969-1979 - Farhad Soleimanian Gharehchopogh, Benyamin Abdollahzadeh:
An efficient harris hawk optimization algorithm for solving the travelling salesman problem. 1981-2005 - Darah Aqel, Shadi AlZu'bi, Ala Mughaid, Yaser Jararweh:
Extreme learning machine for plant diseases classification: a sustainable approach for smart agriculture. 2007-2020 - Elham Azhir, Nima Jafari Navimipour, Mehdi Hosseinzadeh, Arash Sharifi, Mehmet Unal, Aso Mohammad Darwesh:
Join queries optimization in the distributed databases using a hybrid multi-objective algorithm. 2021-2036 - Chouaib Ben Djaballah, Wahid Nouibat:
A new multi-population artificial bee algorithm based on global and local optima for numerical optimization. 2037-2059 - Abdullah Lakhan, Muhammad Suleman Memon, Qurat-Ul-Ain Mastoi, Mohamed Elhoseny, Mazin Abed Mohammed, Mumtaz Qabulio, Mohamed Abdel-Basset:
Cost-efficient mobility offloading and task scheduling for microservices IoVT applications in container-based fog cloud network. 2061-2083 - Albert Rego, Pedro Luis Gonzalez Ramirez, José Miguel Jiménez, Jaime Lloret Mauri:
Artificial intelligent system for multimedia services in smart home environments. 2085-2105 - Xiaoming Cheng, Lei Wang, Pengchao Zhang, Xinkuan Wang, Qunmin Yan:
Short-term fast forecasting based on family behavior pattern recognition for small-scale users load. 2107-2123