


default search action
Cluster Computing, Volume 25
Volume 25, Number 1, February 2022
- N. Suganthi

, S. Meenakshi:
An efficient scheduling algorithm using queuing system to minimize starvation of non-real-time secondary users in Cognitive Radio Network. 1-11 - Pan Jun Sun

:
The optimal privacy strategy of cloud service based on evolutionary game. 13-31 - Enrique Tomás Martínez Beltrán

, Mario Quiles Pérez, Sergio López Bernal, Alberto Huertas Celdrán
, Gregorio Martínez Pérez:
Noise-based cyberattacks generating fake P300 waves in brain-computer interfaces. 33-48 - Aya M. Kishk

, Mahmoud Mohammed Badawy, Hesham A. Ali, Ahmed I. Saleh:
A new traffic congestion prediction strategy (TCPS) based on edge computing. 49-75 - Wenkai Ma, Jinchang Hu, Yanyan Wang, Yaohua Wu:

Simulation-based regression analysis for the replenishment strategy of the crane & shuttle-based storage and retrieval system. 77-89 - Masoumeh Hajvali, Sahar Adabi

, Ali Rezaee
, Mehdi Hosseinzadeh
:
Software architecture for IoT-based health-care systems with cloud/fog service model. 91-118 - Ali Asghari

, Mohammad Karim Sohrabi
:
Combined use of coral reefs optimization and multi-agent deep Q-network for energy-aware resource provisioning in cloud data centers using DVFS technique. 119-140 - Abbas Najafizadeh, Afshin Salajegheh

, Amir Masoud Rahmani, Amir Sahafi
:
Multi-objective Task Scheduling in cloud-fog computing using goal programming approach. 141-165 - Ahmed Saidi

, Omar Nouali, Abdelouahab Amira
:
SHARE-ABE: an efficient and secure data sharing framework based on ciphertext-policy attribute-based encryption and Fog computing. 167-185 - Jaiprakash Nagar

, Sanjay Kumar Chaturvedi, Sieteng Soh
:
An analytical framework with border effects to estimate the connectivity performance of finite multihop networks in shadowing environments. 187-202 - Hancui Zhang

, Weida Zhou:
A two-stage virtual machine abnormal behavior-based anomaly detection mechanism. 203-214 - Ali Asghar Safaei

:
Hybrid fragmentation of medical images' attributes for multidimensional indexing. 215-230 - Yousef O. Sharrab, Izzat Alsmadi

, Nabil J. Sarhan
:
Towards the availability of video communication in artificial intelligence-based computer vision systems utilizing a multi-objective function. 231-247 - Gaofeng Zhang

, Benzhu Xu, Ensheng Liu, Liqiang Xu
, Liping Zheng
:
Task placement for crowd recognition in edge-cloud based urban intelligent video systems. 249-262 - Saleh Darzi, Bahareh Akhbari

, Hassan Khodaiemehr
:
LPM2DA: a lattice-based privacy-preserving multi-functional and multi-dimensional data aggregation scheme for smart grid. 263-278 - Fernando Loor

, Manuel Manriquez, Veronica Gil-Costa, Mauricio Marín
:
Feasibility of P2P-STB based crowdsourcing to speed-up photo classification for natural disasters. 279-302 - Farhad Tavousi, Sadoon Azizi, Abdulbaghi Ghaderzadeh

:
A fuzzy approach for optimal placement of IoT applications in fog-cloud computing. 303-320 - Ahmed Fathalla

, Kenli Li, Ahmad Salah
:
Best-KFF: a multi-objective preemptive resource allocation policy for cloud computing systems. 321-336 - Yanyan Ji

, Bilin Shao
, Jinyong Chang, Genqing Bian:
Flexible identity-based remote data integrity checking for cloud storage with privacy preserving property. 337-349 - Mahyar Sadrishojaei

, Nima Jafari Navimipour, Midia Reshadi, Mehdi Hosseinzadeh
:
A new clustering-based routing method in the mobile internet of things using a krill herd algorithm. 351-361 - Yuejing Yan, Yanyan Xu

, Yiran Zhang
, Zhiheng Wang, Zheheng Rao:
Privacy-preserving content-based image retrieval in edge environment. 363-381 - Jianhu Gong, Nima Jafari Navimipour

:
An in-depth and systematic literature review on the blockchain-based approaches for cloud computing. 383-400 - Ali Majed, Fatemeh Raji

, Ali Miri:
Replication management in peer-to-peer cloud storage systems. 401-416 - Sumit Kumar

, Rajeev Tiwari
, Sergei A. Kozlov, Joel J. P. C. Rodrigues:
Minimizing delay in content-centric networks using heuristics-based in-network caching. 417-431 - KyungHyun Han, Wai-Kong Lee, Seong Oun Hwang

:
cuGimli: optimized implementation of the Gimli authenticated encryption and hash function on GPU for IoT applications. 433-450 - Ashish Tomar

, Sachin Tripathi:
Blockchain-assisted authentication and key agreement scheme for fog-based smart grid. 451-468 - Mouna Afif

, Riadh Ayachi, Mohamed Atri
:
Indoor objects detection system implementation using multi-graphic processing units. 469-483 - Mohammad Hossein Nejat, Homayun Motameni, Hamed Vahdat-Nejad, Behnam Barzegar:

Efficient cloud service ranking based on uncertain user requirements. 485-502 - S. Asha

, P. Vinod:
Evaluation of adversarial machine learning tools for securing AI systems. 503-522 - Sami Alshmrany:

Adaptive learning style prediction in e-learning environment using levy flight distribution based CNN model. 523-536 - Kashif Mehboob Khan, Junaid Arshad

, Waheed Iqbal, Sidrah Abdullah, Hassan Zaib:
Blockchain-enabled real-time SLA monitoring for cloud-hosted services. 537-559 - Wu Wang, Fouzi Harrou

, Benamar Bouyeddou, Sidi-Mohammed Senouci
, Ying Sun
:
A stacked deep learning approach to cyber-attacks detection in industrial systems: application to power system and gas pipeline systems. 561-578 - Ali Belgacem

, Kadda Beghdad Bey:
Multi-objective workflow scheduling in cloud computing: trade-off between makespan and cost. 579-595 - Sejin Kim, Yoonhee Kim

:
K-Scheduler: dynamic intra-SM multitasking management with execution profiles on GPUs. 597-617 - Feng Cheng, Yifeng Huang, Bhavana Tanpure, Pawan Sawalani, Long Cheng

, Cong Liu:
Cost-aware job scheduling for cloud instances using deep reinforcement learning. 619-631 - Seongbong Choi

, Hyung Tae Lee
:
Attack and improvement of the recent identity-based encryption with authorized equivalence test in cluster computing. 633-646 - Shahid Md. Asif Iqbal

, Asaduzzaman
, Mohammed Moshiul Hoque:
A source-driven reinforcement learning-based Data reply strategy to reduce communication overhead in Named Data Networks (NDN). 647-673 - Avita Katal

, Susheela Dahiya
, Tanupriya Choudhury
:
Energy efficiency in cloud computing data center: a survey on hardware technologies. 675-705 - Hang Gao, Tiegang Gao:

A secure lossless recovery for medical images based on image encoding and data self-embedding. 707-725 - Juan Dan, Yanjun Zheng, Jianping Hu:

Research on sports training model based on intelligent data aggregation processing in internet of things. 727-734
Volume 25, Number 2, April 2022
- Hamza Aldabbas

, Khalaf Khatatneh
:
Intelligent transmission control layer for efficient node management in SDN. 735-750 - Huifang Li

, Jianghang Huang, Binyang Wang, Yushun Fan:
Weighted double deep Q-network based reinforcement learning for bi-objective multi-workflow scheduling in the cloud. 751-768 - Lin-Tao Duan

, Zhi-Guo Wang, Hai-Ying Wang:
Energy-efficient speed tuning for real-time applications. 769-779 - Hongjian Li

, Hai Fang, Hongxi Dai, Tao Zhou, Wenhu Shi, Jingjing Wang, Chen Xu:
A cost-efficient scheduling algorithm for streaming processing applications on cloud. 781-803 - Sumalatha Saleti

:
Incremental mining of high utility sequential patterns using MapReduce paradigm. 805-825 - Himanshu Purohit, Pawan K. Ajmera:

Multi-modal biometric fusion based continuous user authentication for E-proctoring using hybrid LCNN-Salp swarm optimization. 827-846 - Peini Liu

, Jordi Guitart
:
Performance characterization of containerization for HPC workloads on InfiniBand clusters: an empirical study. 847-868 - Kamal Berahmand, Mehrnoush Mohammadi, Azadeh Faroughi, Rojiar Pir Mohammadiani

:
A novel method of spectral clustering in attributed networks by constructing parameter-free affinity matrix. 869-888 - Krishan Kumar Sethi, Dharavath Ramesh

, Munesh Chandra Trivedi:
A Spark-based high utility itemset mining with multiple external utilities. 889-909 - Aryan Rahimikhanghah, Melika Tajkey, Bahareh Rezazadeh

, Amir Masoud Rahmani
:
Resource scheduling methods in cloud and fog computing environments: a systematic literature review. 911-945 - Guilherme R. Pretto, Bruno Lopes Dalmazo

, Jonatas Adilson Marques
, Zhongke Wu, Xingce Wang, Vladimir Korkhov, Philippe O. A. Navaux, Luciano Paschoal Gaspary:
Janus: a framework to boost HPC applications in the cloud based on SDN path provisioning. 947-964 - Theofanis Xifilidis, Kostas E. Psannis

:
Correlation-based wireless sensor networks performance: the compressed sensing paradigm. 965-981 - Ashish Mohan Yadav

, Kuldeep Narayan Tripathi
, S. C. Sharma:
An enhanced multi-objective fireworks algorithm for task scheduling in fog computing environment. 983-998 - Mahmoud Ahmad Al-Khasawneh, Irfan Uddin

, Syed Atif Ali Shah, Ahmad M. Khasawneh
, Laith Mohammad Abualigah
, Marwan Mahmoud
:
An improved chaotic image encryption algorithm using Hadoop-based MapReduce framework for massive remote sensed images in parallel IoT applications. 999-1013 - Ali Aghasi, Kamal Jamshidi, Ali Bohlooli

:
A thermal-aware energy-efficient virtual machine placement algorithm based on fuzzy controlled binary gravitational search algorithm (FC-BGSA). 1015-1033 - Reyhane Ghafari, F. Hassani Kabutarkhani, Najme Mansouri:

Task scheduling algorithms for energy optimization in cloud environment: a comprehensive review. 1035-1093 - Xi Liu

, Jun Liu:
A truthful online mechanism for virtual machine provisioning and allocation in clouds. 1095-1109 - Siddhant Jain

, Shashank Gupta
, K. K. Sreelakshmi, Joel J. P. C. Rodrigues:
Fog computing in enabling 5G-driven emerging technologies for development of sustainable smart city infrastructures. 1111-1154 - Naina Handa

, Anil Sharma, Amardeep Gupta:
Framework for prediction and classification of non functional requirements: a novel vision. 1155-1173 - Degan Zhang, Lixiang Cao, Haoli Zhu, Ting Zhang, Jinyu Du, Kaiwen Jiang

:
Task offloading method of edge computing in internet of vehicles based on deep reinforcement learning. 1175-1187 - K. Kalyana Chakravarthi

, P. Neelakantan, L. Shyamala, Vaidehi V.:
Reliable budget aware workflow scheduling strategy on multi-cloud environment. 1189-1205 - Zhenxing Xu

, Jinzhao Wu:
Computing flow pipe of embedded hybrid systems using deep group preserving scheme. 1207-1220 - Xuewang Zhang

, Caijin Ye:
A novel privacy protection of permissioned blockchains with conditionally anonymous ring signature. 1221-1235 - Marjan Mahmoudi

, Avid Avokh, Behrang Barekatain
:
SDN-DVFS: an enhanced QoS-aware load-balancing method in software defined networks. 1237-1262 - Amrita Mangaonkar

, Rohit Pawar, Nahida Sultana Chowdhury, Rajeev R. Raje:
Enhancing collaborative detection of cyberbullying behavior in Twitter data. 1263-1277 - Marco Lattuada, Eugenio Gianniti, Danilo Ardagna

, Li Zhang:
Performance prediction of deep learning applications training in GPU as a service systems. 1279-1302 - Rashmi Sahay

, G. Geethakumari, Barsha Mitra:
Mitigating the worst parent attack in RPL based internet of things. 1303-1320 - Jingzhao Xie

, Run Zhou, Gang Sun
, Jian Sun, Hongfang Yu:
Fast recovery for online service function chaining interruption using adaptive migration. 1321-1339 - Nitin Goyal

, Ashok Kumar, Renu Popli, Lalit Kumar Awasthi
, Nonita Sharma, Gaurav Sharma:
Priority based data gathering using multiple mobile sinks in cluster based UWSNs for oil pipeline leakage detection. 1341-1354 - Nilesh Vishwasrao Patil

, C. Rama Krishna, Krishan Kumar:
SSK-DDoS: distributed stream processing framework based classification system for DDoS attacks. 1355-1372 - Dan Tang, Yudong Yan

, Rui Dai, Zheng Qin, Jingwen Chen, Dongshuo Zhang:
A novel LDoS attack detection method based on reconstruction anomaly. 1373-1392 - Mohammad Hassan Khoobkar, Mehdi Dehghan Takht Fooladi, Mohammad Hossein Rezvani

, Mohammad Mehdi Gilanian Sadeghi:
Partial offloading with stable equilibrium in fog-cloud environments using replicator dynamics of evolutionary game theory. 1393-1420 - Chunlin Li, Qianqian Cai, Youlong Luo:

Dynamic data replacement and adaptive scheduling policies in spark. 1421-1439 - Sivadi Balakrishna:

Multi objective-based incremental clustering by fast search technique for dynamically creating and updating clusters in large data. 1441-1457 - Marc Jordà

, Pedro Valero-Lara, Antonio J. Peña
:
cuConv: CUDA implementation of convolution for CNN inference. 1459-1473 - Amrendra Singh Yadav

, Nikita Singh, Dharmender Singh Kushwaha:
Sidechain: storage land registry data using blockchain improve performance of search records. 1475-1495 - Xingyu Wang

, Junzhao Du, Hui Liu:
Performance and isolation analysis of RunC, gVisor and Kata Containers runtimes. 1497-1513 - Nasim Naseri Seyedi Noudoust, Sahar Adabi

, Ali Rezaee
:
A quorum-based data consistency approach for non-relational database. 1515-1540 - Neha Goyal

, Kapil Gupta
:
A hierarchical laplacian TWSVM using similarity clustering for leaf classification. 1541-1560 - Retraction Note to: A fuzzy multi-objective immune genetic algorithm for the strategic location planning problem. 1561

Volume 25, Number 3, June 2022
- Izzat Alsmadi

, Zyad Dwekat, Ricardo Cantu, Bilal Al-Ahmad
:
Vulnerability assessment of industrial systems using Shodan. 1563-1573 - Simge Nur Aslan

, Recep Ozalp
, Aysegül Uçar
, Cüneyt Güzelis
:
New CNN and hybrid CNN-LSTM models for learning object manipulation of humanoid robots from demonstration. 1575-1590 - Faris A. Almalki

, Marios C. Angelides
:
An enhanced design of a 5G MIMO antenna for fixed wireless aerial access. 1591-1606 - Ala Abdulsalam Alarood

, Nedal K. Al-Ababneh
, Mahmoud Ahmad Al-Khasawneh, Majdi Rawashdeh, Mohammad Al-Omari
:
IoTSteg: ensuring privacy and authenticity in internet of things networks using weighted pixels classification based image steganography. 1607-1618 - Mohammad Al Ja'afreh

, Hikmat Adhami, Alaa Eddin Alchalabi, Mohamad Hoda, Abdulmotaleb El-Saddik:
Toward integrating software defined networks with the Internet of Things: a review. 1619-1636 - Simona Nedelcheva, Sofiya Ivanovska

, Mariya K. Durchova
, Petia D. Koprinkova-Hristova
:
HPC parallel implementation combining NEST Simulator and Python modules. 1637-1644 - Andrii Salnikov

, Balázs Kónya:
DNS-embedded service endpoint registry for distributed e-Infrastructures. 1645-1664 - Hasan Kivrak

, Furkan Cakmak
, Hatice Kose
, Sirma Yavuz:
Waypoint based path planner for socially aware robot navigation. 1665-1675 - Lazar Mrkela

, Zorica Stanimirovic
:
A Multi-objective variable neighborhood search for the maximal covering location problem with customer preferences. 1677-1693 - Vahideh Hayyolalam, Safa Otoum

, Öznur Özkasap:
Dynamic QoS/QoE-aware reliable service composition framework for edge intelligence. 1695-1713 - Dinesh Kumar Sah, Tu N. Nguyen, Korhan Cengiz

, Braulio Dumba
, Vikas Kumar:
Load-balance scheduling for intelligent sensors deployment in industrial internet of things. 1715-1727 - Kübra Seyhan

, Tu N. Nguyen, Sedat Akleylek
, Korhan Cengiz
:
Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a survey. 1729-1748 - Saddam Hussain, Syed Sajid Ullah

, Ihsan Ali
:
An efficient content source verification scheme for multi-receiver in NDN-based Internet of Things. 1749-1764 - Mamoun Alazab, Gunasekaran Manogaran, Carlos Enrique Montenegro-Marín

:
Trust management for internet of things using cloud computing and security in smart cities. 1765-1777 - Sowmya Gali

, Venkatram Nidumolu
:
An intelligent trust sensing scheme with metaheuristic based secure routing protocol for Internet of Things. 1779-1789 - Xianhao Shen, Yufang Lu, Yi Zhang, Xiaoyong Liu, Lieping Zhang:

An Innovative Data Integrity Verification Scheme in the Internet of Things assisted information exchange in transportation systems. 1791-1803 - Roobaea Alroobaea

, Rajakumar Arul, Saeed Rubaiee, Fahd S. Alharithi, Usman Tariq
, Xincan Fan:
AI-assisted bio-inspired algorithm for secure IoT communication networks. 1805-1816 - Mark C. Ballandies

, Marcus M. Dapp, Evangelos Pournaras:
Decrypting distributed ledger design - taxonomy, classification and blockchain community evaluation. 1817-1838 - Muhammad Umar Javed, Nadeem Javaid

, Muhammad Waseem Malik, Mariam Akbar
, Omaji Samuel
, Adamu Sani Yahaya
, Jalel Ben-Othman
:
Blockchain based secure, efficient and coordinated energy trading and data sharing between electric vehicles. 1839-1867 - Abel O. Gomez Rivera, Deepak K. Tosh

, Uttam Ghosh
:
Resilient sensor authentication in SCADA by integrating physical unclonable function and blockchain. 1869-1883 - Baran Kiliç

, Can C. Özturan
, Alper Sen:
Parallel analysis of Ethereum blockchain transaction data using cluster computing. 1885-1898 - Debashis Das

, Sourav Banerjee
, Pushpita Chatterjee
, Manju Biswas
, Utpal Biswas, Waleed S. Alnumay
:
Design and development of an intelligent transportation management system using blockchain and smart contracts. 1899-1913 - Gökay Saldamli, Charit Upadhyay, Devika Jadhav, Rohit Shrishrimal, Bapugouda Patil, Lo'ai Tawalbeh

:
Improved gossip protocol for blockchain applications. 1915-1926 - Krushali Shah, Swapnil Chadotra, Sudeep Tanwar

, Rajesh Gupta
, Neeraj Kumar
:
Blockchain for IoV in 6G environment: review solutions and challenges. 1927-1955 - Suayb S. Arslan

, Turguy Goker:
Compress-store on blockchain: a decentralized data processing and immutable storage for multimedia streaming. 1957-1968 - Xiangyu Wang

, Wenyong Wang, Youlu Zeng, Ting Yang, Chengyu Zheng:
A state sharding model on the blockchain. 1969-1979 - Farhad Soleimanian Gharehchopogh

, Benyamin Abdollahzadeh
:
An efficient harris hawk optimization algorithm for solving the travelling salesman problem. 1981-2005 - Darah Aqel, Shadi AlZu'bi

, Ala Mughaid
, Yaser Jararweh:
Extreme learning machine for plant diseases classification: a sustainable approach for smart agriculture. 2007-2020 - Elham Azhir, Nima Jafari Navimipour

, Mehdi Hosseinzadeh
, Arash Sharifi, Mehmet Unal, Aso Mohammad Darwesh:
Join queries optimization in the distributed databases using a hybrid multi-objective algorithm. 2021-2036 - Chouaib Ben Djaballah

, Wahid Nouibat:
A new multi-population artificial bee algorithm based on global and local optima for numerical optimization. 2037-2059 - Abdullah Lakhan

, Muhammad Suleman Memon
, Qurat-Ul-Ain Mastoi, Mohamed Elhoseny
, Mazin Abed Mohammed
, Mumtaz Qabulio, Mohamed Abdel-Basset
:
Cost-efficient mobility offloading and task scheduling for microservices IoVT applications in container-based fog cloud network. 2061-2083 - Albert Rego

, Pedro Luis Gonzalez Ramirez, José Miguel Jiménez
, Jaime Lloret Mauri
:
Artificial intelligent system for multimedia services in smart home environments. 2085-2105 - Xiaoming Cheng, Lei Wang

, Pengchao Zhang, Xinkuan Wang, Qunmin Yan:
Short-term fast forecasting based on family behavior pattern recognition for small-scale users load. 2107-2123 - Rasheed Ahmad

, Izzat Alsmadi, Wasim Alhamdani, Lo'ai Tawalbeh:
Towards building data analytics benchmarks for IoT intrusion detection. 2125-2141 - Hafiz Munsub Ali

, Jun Liu, Syed Ahmad Chan Bukhari, Hafiz Tayyab Rauf
:
Planning a secure and reliable IoT-enabled FOG-assisted computing infrastructure for healthcare. 2143-2161 - Ángel Luis Perales Gómez

, Pedro E. López-de-Teruel
, Alberto Ruiz, Ginés García-Mateos
, Gregorio Bernabé García
, Félix J. García Clemente
:
FARMIT: continuous assessment of crop quality using machine learning and deep learning techniques for IoT-based smart farming. 2163-2178 - Cristhian Martinez-Rendon

, Diego Camarmas-Alonso
, Jesús Carretero, José Luis González Compeán
:
On the continuous contract verification using blockchain and real-time data. 2179-2201 - Wenbing Liang, Nan Ji

:
Privacy challenges of IoT-based blockchain: a systematic review. 2203-2221 - Mohit Mohit

, Sanmeet Kaur
, Maninder Singh
:
Design and implementation of transaction privacy by virtue of ownership and traceability in blockchain based supply chain. 2223-2240 - Rafal Skowronski

, Jerzy Brzezinski
:
SPIDE: sybil-proof, incentivized data exchange. 2241-2270 - Yishu Liu, Jiangbo Zheng:

Intelligent management of supply chain logistics based on 5g LoT. 2271-2280 - Maninderpal Singh, Gagangeet Singh Aujla, Rasmeet Singh Bali:

Derived blockchain architecture for security-conscious data dissemination in edge-envisioned Internet of Drones ecosystem. 2281-2302 - Darah Aqel, Shadi AlZu'bi

, Ala Mughaid
, Yaser Jararweh:
Correction to: Extreme learning machine for plant diseases classification: a sustainable approach for smart agriculture. 2303
Volume 25, Number 4, August 2022
- Yongli Tang, Yanpeng Ba, Lixiang Li, Xiaojun Wang, Xixi Yan

:
Lattice-based public-key encryption with conjunctive keyword search in multi-user setting for IIoT. 2305-2316 - Aruna Guruvaya Mogarala, Mohammad Kamrul Hasan

, Shayla Islam, Mohan Govindsa Kabadi, Preeta Sharan
, Rosilah Hassan:
Cloud to cloud data migration using self sovereign identity for 5G and beyond. 2317-2331 - Rohit Sharma

, Rajeev Arya:
A secure authentication technique for connecting different IoT devices in the smart city infrastructure. 2333-2349 - Anichur Rahman

, Chinmay Chakraborty
, Adnan Anwar
, Md. Razaul Karim
, Md. Jahidul Islam, Dipanjali Kundu, Ziaur Rahman
, Shahab S. Band:
SDN-IoT empowered intelligent framework for industry 4.0 applications during COVID-19 pandemic. 2351-2368 - Omar A. Alzubi

, Jafar Ahmad Abed Alzubi, Ala' M. Al-Zoubi, Mohammad A. Hassonah, Utku Kose
:
An efficient malware detection approach with feature weighting based on Harris Hawks optimization. 2369-2387 - Wenqi Zhou

, Lunyuan Chen, Shunpu Tang
, Lijia Lai, Junjuan Xia, Fasheng Zhou, Liseng Fan:
Offloading strategy with PSO for mobile edge computing based on cache mechanism. 2389-2401 - Tahir Ahmad, Sher Ali

, Syed Bilal Hussian Shah
, Inam Ullah Khan, Muhammad Abul Hassan
, Syed Irfan Ullah:
Joint mode selection and user association in D2D enabled multitier C-RAN. 2403-2415 - Lunyuan Chen, Rui Zhao, Ke He, Zichao Zhao, Liseng Fan:

Intelligent ubiquitous computing for future UAV-enabled MEC network systems. 2417-2427 - Ehzaz Mustafa, Junaid Shuja

, Sardar Khaliq uz Zaman
, Ali Imran Jehangiri, Sadia Din
, Faisal Rehman
, Saad Mustafa
, Tahir Maqsood, Abdul Nasir Khan
:
Joint wireless power transfer and task offloading in mobile edge computing: a survey. 2429-2448 - Mazin Mohammed Mogadem, Yan Li

, Daniel Limenew Meheretie
:
A survey on internet of energy security: related fields, challenges, threats and emerging technologies. 2449-2485 - Gianni D'Angelo, Francesco Palmieri, Antonio Robustelli

:
A federated approach to Android malware classification through Perm-Maps. 2487-2500 - Sharief Abdel-Razeq

, Haitham Moffaqq Al-Obiedollah, Haythem Bany Salameh
:
Efficient user-channel pairing with power-domain sum-rate maximization in opportunistic hybrid OFDMA-NOMA IoT systems. 2501-2514 - Jianlong Xu, Jian Lin, Wei Liang

, Kuan-Ching Li
:
Privacy preserving personalized blockchain reliability prediction via federated learning in IoT environments. 2515-2526 - Yishu Liu, Wenjie Zhang, Qi Zhang, Monire Norouzi

:
An optimized human resource management model for cloud-edge computing in the internet of things. 2527-2539 - Rania A. Mokhtar

, Rashid A. Saeed
, Hesham Alhumyani, Mashael Khayyat, Sayed Abdel-Khalek:
Cluster mechanism for sensing data report using robust collaborative distributed spectrum sensing. 2541-2556 - Subramani Jegadeesan, Mohammad S. Obaidat, Pandi Vijayakumar, Maria Azees

, Marimuthu Karuppiah
:
Efficient privacy-preserving anonymous authentication scheme for human predictive online education system. 2557-2571 - Jingbin Liu, Bing Jia, Lei Guo, Baoqi Huang, Lei Wang, Thar Baker

:
CTSLoc: an indoor localization method based on CNN by using time-series RSSI. 2573-2584 - Dong Li, Zai Luo, Bo Cao:

Blockchain-based federated learning methodologies in smart environments. 2585-2599 - Fei Yin

, Feng Shi:
Cluster optimization algorithm based on CPU and GPU hybrid architecture. 2601-2611 - Amir Javadpour

, Ali Majed Hossein Abadi, Samira Rezaei, Mozhdeh Zomorodian, Ali Shokouhi Rostami:
Improving load balancing for data-duplication in big data cloud computing networks. 2613-2631 - Jiaqin Lin, Anghong Xiao, Shoubin Dong

, Jing Zhou:
Spark-ITGO: a parallel invasive tumor growth optimization algorithm on spark. 2633-2660 - Abdul Jabbar Saeed Tipu, Padraig Ó Conbhuí, Enda Howley

:
Applying neural networks to predict HPC-I/O bandwidth over seismic data on lustre file system for ExSeisDat. 2661-2682 - Alexey V. Medvedev

:
IMB-ASYNC: a revised method and benchmark to estimate MPI-3 asynchronous progress efficiency. 2683-2697 - Qirui Li

, Zhiping Peng, Delong Cui
, Jianpeng Lin
, Jieguang He:
Two-stage selection of distributed data centers based on deep reinforcement learning. 2699-2714 - Chongke Wu

, Sicong Shao
, Cihan Tunc
, Pratik Satam, Salim Hariri:
An explainable and efficient deep learning framework for video anomaly detection. 2715-2737 - Junichi Sakamoto

, Shungo Hayashi, Daisuke Fujimoto, Tsutomu Matsumoto:
Constructing software countermeasures against instruction manipulation attacks: an approach based on vulnerability evaluation using fault simulator. 2739-2753 - Hamza Ouarnoughi

, Emmanuelle Grislin-Le Strugeon
, Smaïl Niar:
Simulating multi-agent-based computation offloading for autonomous cars. 2755-2766 - Shalaka Satam, Pratik Satam, Jesus Pacheco

, Salim Hariri:
Security framework for smart cyber infrastructure. 2767-2778 - Zaineb Sakhrawi

, Asma Sellami
, Nadia Bouassida
:
Software enhancement effort estimation using correlation-based feature selection and stacking ensemble method. 2779-2792 - Chiara Bachechi

, Federica Rollo
, Laura Po
:
Detection and classification of sensor anomalies for simulating urban traffic scenarios. 2793-2817 - Dimitri Saingre

, Thomas Ledoux
, Jean-Marc Menaud:
Measuring performances and footprint of blockchains with BCTMark: a case study on Ethereum smart contracts energy consumption. 2819-2837 - Jiahui Chen

, Joe Breen, Jeff M. Phillips, Jacobus E. van der Merwe:
Practical and configurable network traffic classification using probabilistic machine learning. 2839-2853 - Joseph White-Swift

, Andrea Fumagalli:
DDD: Distributed Dataset DNS. 2855-2872 - George Papadimitriou

, Eric Lyons, Cong Wang, Komal Thareja, Ryan Tanaka, Paul Ruth, Ivan Rodero, Ewa Deelman, Michael Zink
, Anirban Mandal
:
Fair sharing of network resources among workflow ensembles. 2873-2891 - Janet Vorobyeva, Daniel R. Delayo

, Michael A. Bender, Martin Farach-Colton, Prashant Pandey, Cynthia A. Phillips, Shikha Singh, Eric D. Thomas, Thomas M. Kroeger
:
Using advanced data structures to enable responsive security monitoring. 2893-2914 - Sugeerth Murugesan

, Mariam Kiran, Bernd Hamann, Gunther H. Weber
:
Netostat: analyzing dynamic flow patterns in high-speed networks. 2915-2930 - Yuanlong Tan

, Malathi Veeraraghavan, Hwajung Lee, Steven Emmerson
, Jack W. Davidson:
High-performance reliable network-multicast over a trial deployment. 2931-2952 - Sara Shakeri

, Lourens E. Veen, Paola Grosso
:
Multi-domain network infrastructure based on P4 programmable devices for Digital Data Marketplaces. 2953-2966 - Jennifer M. Schopf

, Katrina Turner, Daniel Doyle, Andrew Lake, Jason Leigh, Brian L. Tierney:
The NetSage measurement and analysis framework in practice. 2967-2990 - Se-Young Yu

, Jim Hao Chen, Fei Yeh, Joe Mambretti, Xiao Wang, Anna Giannakou, Eric Pouyoul, Marc Lyonnais:
Analysis of NVMe over fabrics with SCinet DTN-as-a-Service. 2991-3003 - Luyao Chang, Fan Li, Xinzheng Niu, Jiahui Zhu:

On an improved clustering algorithm based on node density for WSN routing protocol. 3005-3017 - Aiqin Hou, Chase Q. Wu

, Qiang Duan, Dawei Quan, Liudong Zuo
, Yangyang Li, Michelle M. Zhu, Dingyi Fang:
SDN-based bandwidth scheduling for prioritized data transfer between data centers. 3019-3034 - Rohit Sharma

, Rajeev Arya:
Correction to: A secure authentication technique for connecting different IoT devices in the smart city infrastructure. 3035
Volume 25, Number 5, October 2022
- Rabeeha Fazal, Munam Ali Shah, Hasan Ali Khattak

, Hafiz Tayyab Rauf
, Fadi M. Al-Turjman
:
Achieving data privacy for decision support systems in times of massive data sharing. 3037-3049 - Chengfeng Jian

, Lukun Bao, Meiyu Zhang:
A high-efficiency learning model for virtual machine placement in mobile edge computing. 3051-3066 - Yixin Chen

, Jinyong Chang
:
Identity-based proof of retrievability meets with identity-based network coding. 3067-3083 - M. R. Rajeshwari, K. S. Kavitha:

Arrhythmia ventricular fibrillation classification on ECG signal using ensemble feature selection and deep neural network. 3085-3102 - Rahul Mishra

, Dharavath Ramesh
, Damodar Reddy Edla
, Munesh Chandra Trivedi
:
Blockchain assisted privacy-preserving public auditable model for cloud environment with efficient user revocation. 3103-3127 - Gavini Sreelatha

, A. Vinaya Babu, Divya Midhunchakkaravarthy:
Improved security in cloud using sandpiper and extended equilibrium deep transfer learning based intrusion detection. 3129-3144 - Ajitha K. M, N. Chenthalir Indra:

Fisher linear discriminant and discrete global swarm based task scheduling in cloud environment. 3145-3160 - Donghong Xu

, Zhongbin Sun:
An adaptive function placement in serverless computing. 3161-3174 - Vijay Kumar Yadav

, Shekhar Verma, S. Venkatesan:
Efficient and privacy-preserving location-based services over the cloud. 3175-3192 - Kamalakant Laxman Bawankule

, Rupesh Kumar Dewang
, Anil Kumar Singh:
Historical data based approach to mitigate stragglers from the Reduce phase of MapReduce in a heterogeneous Hadoop cluster. 3193-3211 - Babak Narimanjahan

, Midia Reshadi, Ahmad Khademzadeh
, Akram Reza:
MCPS: a mapping method for MAERI accelerator base on Cartesian Product based Convolution for DNN layers with sparse input feature map. 3213-3230 - Anuradha Dhull

, Akansha Singh
, Krishna Kant Singh
:
An intelligent technique for pattern-based clustering of continuous-valued datasets. 3231-3248 - Elaheh Gavagsaz

:
Weighted spatial skyline queries with distributed dominance tests. 3249-3264 - Xiaojian He, Junmin Shen

, Fagui Liu, Bin Wang, Guoxiang Zhong, Jun Jiang
:
A two-stage scheduling method for deadline-constrained task in cloud computing. 3265-3281 - Ankit Verma

, Gaurav Agarwal
, Amit Kumar Gupta
:
A novel generalized fuzzy intelligence-based ant lion optimization for internet of things based disease prediction and diagnosis. 3283-3298 - Mahdi Ajdani

, Hamid Reza Ghaffary:
Improving network intrusion detection by identifying effective features based on probabilistic dependency trees and evolutionary algorithm. 3299-3311 - Yanni Wang

, Xiang Liu, Rongchun Guo:
An object detection algorithm based on the feature pyramid network and single shot multibox detector. 3313-3324 - Simar Preet Singh

, Rajesh Kumar, Anju Sharma, Jemal H. Abawajy, Ravneet Kaur
:
Energy efficient load balancing hybrid priority assigned laxity algorithm in fog computing. 3325-3342 - Anayo Chukwu Ikegwu, Henry Friday Nweke

, Chioma Virginia Anikwe, Uzoma Rita Alo, Obikwelu Raphael Okonkwo:
Big data analytics for data-driven industry: a review of data sources, tools, challenges, solutions, and research directions. 3343-3387 - Xuejie Zhang, Jie Li

, Guibing Li, Weidong Li
:
Generalized asset fairness mechanism for multi-resource fair allocation mechanism with two different types of resources. 3389-3403 - Sana Aurangzeb, Haris Anwar, Muhammad Asif Naeem, Muhammad Aleem:

BigRC-EML: big-data based ransomware classification using ensemble machine learning. 3405-3422 - Masomeh Azimzadeh, Ali Rezaee

, Somayyeh Jafarali Jassbi, Mehdi Esnaashari:
Placement of IoT services in fog environment based on complex network features: a genetic-based approach. 3423-3445 - N. G. Bhuvaneswari Amma

:
A vector convolutional deep autonomous learning classifier for detection of cyber attacks. 3447-3458 - Md. Nayer, Subhash Chandra Pandey:

Chromosomes identification based differential evolution (CIDE): a new bio-inspired variant for network intrusion detection. 3459-3480 - Xingwang Huang, Yangbin Lin, Zongliang Zhang

, Xiaoxi Guo, Shubin Su
:
A gradient-based optimization approach for task scheduling problem in cloud computing. 3481-3497 - Muhammad Khan, Ali Imran Jehangiri, Zulfiqar Ahmad

, Mohammed Ala'Anzy
, Asif Umer:
An exploration to graphics processing unit spot price prediction. 3499-3515 - Prabhakara Rao Kapula

, P. V. Sridevi:
Channel estimation in 5G multi input multi output wireless communication using optimized deep neural framework. 3517-3530 - Narges Akhound, Sahar Adabi

, Ali Rezaee, Amir Masoud Rahmani:
Clustering of mobile IoT nodes with support for scheduling of time-sensitive applications in fog and cloud layers. 3531-3559 - Esmaeil Torabi, Mostafa Ghobaei-Arani

, Ali Shahidinejad
:
Data replica placement approaches in fog computing: a review. 3561-3589 - Hui Yu, Junqing Li

, Xiao-long Chen
, Wei Niu, Hong-yan Sang:
An improved multi-objective imperialist competitive algorithm for surgical case scheduling problem with switching and preparation times. 3591-3616 - Shadi AlZu'bi

, Darah Aqel, Mohammad Lafi
:
An intelligent system for blood donation process optimization - smart techniques for minimizing blood wastages. 3617-3627 - Meryem Ammi

, Oluwasegun A. Adedugbe, Fahad M. Al-Harby, Elhadj Benkhelifa:
Leveraging a cloud-native architecture to enable semantic interconnectedness of data for cyber threat intelligence. 3629-3640 - Shumin Han

, Derong Shen, Tiezheng Nie, Yue Kou, Ge Yu:
An enhanced privacy-preserving record linkage approach for multiple databases. 3641-3652 - Simarjit Kaur

, Anju Bala, Anshu Parashar:
Intelligent energy aware approaches for residential buildings: state-of-the-art review and future directions. 3653-3670 - Nourchène Ouerhani, Ahmed Maalel, Henda Ben Ghézala:

SMAD: SMart assistant during and after a medical emergency case based on deep learning sentiment analysis. 3671-3681 - Amal Kouicem, Mohamed Essaid Khanouche

, Abdelkamel Tari:
Novel bat algorithm for QoS-aware services composition in large scale internet of things. 3683-3697 - Nitish Andola, Sourabh Prakash, Raghav Gahlot, S. Venkatesan, Shekhar Verma:

An enhanced smart card and dynamic ID based remote multi-server user authentication scheme. 3699-3717 - Yun Liu, Xiao Zhang

, Binbin Liu, Xiaonan Zhao:
The research and analysis of efficiency of hardware usage base on HDFS. 3719-3732 - Shahnawaz Ahmad

, Shabana Mehfuz
, Fateh Mebarek-oudina
, Javed Beg:
RSM analysis based cloud access security broker: a systematic literature review. 3733-3763 - Rashmi Sahay

, G. Geethakumari, Barsha Mitra:
Correction: Mitigating the worst parent attack in RPL based internet of things. 3765
Volume 25, Number 6, December 2022
- Ahmad Taghinezhad-Niar

, Saeid Pashazadeh
, Javid Taheri:
QoS-aware online scheduling of multiple workflows under task execution time uncertainty in clouds. 3767-3784 - Xiaobing Guo, Zhili Du, Shunfu Jin

:
Nash equilibrium and social optimization of a task offloading strategy with real-time virtual machine repair in an edge computing system. 3785-3797 - Tajinder Singh

, Madhu Kumari, Daya Sagar Gupta
:
Real-time event detection and classification in social text steam using embedding. 3799-3817 - Ala Mughaid

, Shadi AlZu'bi, Adnan Hnaif, Salah Taamneh
, Asma Alnajjar, Esraa Abu Elsoud
:
An intelligent cyber security phishing detection system using deep learning techniques. 3819-3828 - Gordhan Jethava

, Udai Pratap Rao
:
A novel trust prediction approach for online social networks based on multifaceted feature similarity. 3829-3843 - Anita Choudhary

, Mahesh Chandra Govil, Girdhari Singh, Lalit Kumar Awasthi
, Emmanuel S. Pilli
:
Energy-aware scientific workflow scheduling in cloud environment. 3845-3874 - Meriem Amel Guessoum, Rahma Djiroun, Kamel Boukhalfa, Elhadj Benkhelifa:

Natural language why-question in Business Intelligence applications: model and recommendation approach. 3875-3898 - Zhiwei Wu, Runhua Shi

, Kunchang Li, Yifan Yang:
Attribute-based data access control scheme with secure revocation in fog computing for smart grid. 3899-3913 - Shanmukha Makani, Rachitha Pittala, Eitaa Alsayed, Moayad Aloqaily

, Yaser Jararweh:
A survey of blockchain applications in sustainable and smart cities. 3915-3936 - Rajni Jindal

, Indu Singh
:
Detecting malicious transactions in database using hybrid metaheuristic clustering and frequent sequential pattern mining. 3937-3959 - Linh Manh Pham

, Nguyen-Tuan-Thanh Le
, Xuan-Truong Nguyen:
Multi-level just-enough elasticity for MQTT brokers of Internet of Things applications. 3961-3976 - Xin Yang

, Hengrui Li, Xiaochuan Li:
Lightweight image super-resolution with feature cheap convolution and attention mechanism. 3977-3992 - Fadi Wedyan

, Reema Freihat, Maen Hammad:
Visualization of aspect-oriented programs using city transportation metaphor. 3993-4008 - V. S. Prakash, V. Vinothina, K. Kalaiselvi

, K. Velusamy:
An improved bacterial colony optimization using opposition-based learning for data clustering. 4009-4025 - Ridhima Rani, Meenu Khurana

, Ajay Kumar
, Neeraj Kumar
:
Big data dimensionality reduction techniques in IoT: review, applications and open research challenges. 4027-4049 - Linda Ouchaou

, Hassina Nacer
, Chahrazed Labba:
Towards a distributed SaaS management system in a multi-cloud environment. 4051-4071 - Linda Ouchaou

, Hassina Nacer
, Chahrazed Labba:
Correction: Towards a distributed SaaS management system in a multi-cloud environment. 4073 - Zareen Alamgir

, Farwa K. Khan, Saira Karim
:
Federated recommenders: methods, challenges and future. 4075-4096 - Mehdi Hosseinzadeh

, Atefeh Hemmati
, Amir Masoud Rahmani
:
Clustering for smart cities in the internet of things: a review. 4097-4127 - Sujith Samuel Mathew, Kadhim Hayawi

, Nahom Aron Dawit, Ikbal Taleb, Zouheir Trabelsi:
Integration of blockchain and collaborative intrusion detection for secure data transactions in industrial IoT: a survey. 4129-4149 - Syed Zaffar Qasim, Muhammad Ali Ismail:

DOCEA/D: Dual-Operator-based Constrained many-objective Evolutionary Algorithm based on Decomposition. 4151-4169 - K. Siddesha

, G. V. Jayaramaiah, Chandrapal Singh:
A novel deep reinforcement learning scheme for task scheduling in cloud computing. 4171-4188 - Monika

, Rajesh Bhatia, Arnav Jain, Baljeet Singh:
Hash time locked contract based asset exchange solution for probabilistic public blockchains. 4189-4201 - Jie Zhang, Mingjie Piao

, Degan Zhang, Ting Zhang, Wen-miao Dong:
An approach of multi-objective computing task offloading scheduling based NSGS for IOV in 5G. 4203-4219 - Mohammed Otair, Areej Alhmoud, Heming Jia

, Maryam Altalhi, Ahmad MohdAziz Hussein, Laith Abualigah
:
Optimized task scheduling in cloud computing using improved multi-verse optimizer. 4221-4232 - Madhu Sudan Kumar

, Anubhav Choudhary, Indrajeet Gupta, Prasanta K. Jana:
An efficient resource provisioning algorithm for workflow execution in cloud platform. 4233-4255 - Navjeet Kaur

, Ashok Kumar, Rajesh Kumar:
TRAP: task-resource adaptive pairing for efficient scheduling in fog computing. 4257-4273 - Hemanta Kumar Bhuyan, Vinayakumar Ravi

, M. Srikanth Yadav:
Multi-objective optimization-based privacy in data mining. 4275-4287 - Isabel Herrera Montano

, José Javier García-Aranda, Juan Ramos-Díaz, Sergio Molina-Cardín, Isabel de la Torre Díez
, Joel J. P. C. Rodrigues:
Survey of Techniques on Data Leakage Protection and Methods to address the Insider threat. 4289-4302 - Niveditta Thakur, Nafis Uddin Khan

, Sunil Datt Sharma
:
An efficient fuzzy inference system based approximated anisotropic diffusion for image de-noising. 4303-4323 - Zhanyou Ma, Qiannan Si

, Yilin Liu, Shunzhi Wang:
Performance analysis of P2P networks with malicious nodes. 4325-4337 - Asal Ramezani, Maryam Rajabzadeh Asaar:

An identity-based public auditing protocol in cloud-assisted IoT. 4339-4354 - Sharif Naser Makhadmeh

, Ammar Kamal Abasi, Mohammed Azmi Al-Betar
, Mohammed A. Awadallah, Iyad Abu Doush, Zaid Abdi Alkareem Alyasseri, Osama Ahmad Alomari
:
A novel link-based Multi-objective Grey Wolf Optimizer for Appliances Energy Scheduling Problem. 4355-4382 - Monika

, Om Prakash Sangwan
:
A framework for evaluating cloud computing services using AHP and TOPSIS approaches with interval valued spherical fuzzy sets. 4383-4396 - Jing Chen, Hongbo Yang

, Nana Wei, Mingxin Liu:
User behavior analysis based on edge evolutionary game model in social network. 4397-4412 - Qi Wang

, Yinsheng Luo:
Research on a new power distribution control strategy of hybrid energy storage system for hybrid electric vehicles based on the subtractive clustering and adaptive fuzzy neural network. 4413-4422 - Sunggon Kim

, Alex Sim
, Kesheng Wu
, Suren Byna
, Yongseok Son
:
Design and implementation of dynamic I/O control scheme for large scale distributed file systems. 4423-4438 - Guilherme Galante, Rodrigo da Rosa Righi

:
Adaptive parallel applications: from shared memory architectures to fog computing (2002-2022). 4439-4461 - Shashi Raj, Dharavath Ramesh

:
PartEclat: an improved Eclat-based frequent itemset mining algorithm on spark clusters using partition technique. 4463-4480 - Supriya Agrahari, Anil Kumar Singh:

Adaptive PCA-based feature drift detection using statistical measure. 4481-4494 - Abdul Razzaq

:
Blockchain-based secure data transmission for internet of underwater things. 4495-4514 - Mirko Zichichi, Stefano Ferretti

, Gabriele D'Angelo, Víctor Rodríguez-Doncel
:
Data governance through a multi-DLT architecture in view of the GDPR. 4515-4542 - Rakesh Salam

, Ansuman Bhattacharya:
Efficient greedy heuristic approach for fault-tolerant distributed controller placement in scalable SDN architecture. 4543-4572 - Sushmita Sharma, Apu Kumar Saha

, Susmita Roy
, Seyedali Mirjalili
, Sukanta Nama:
A mixed sine cosine butterfly optimization algorithm for global optimization and its application. 4573-4600 - V. Anandhi

, P. Vinod, Varun G. Menon
, Korankotte Manoj Aditya:
Performance evaluation of deep neural network on malware detection: visual feature approach. 4601-4615 - Yungui Chen

, Li Feng
, Hong Liang, Shumin Yao, Liwei Tian, Xiaochen Yuan:
RS-chain: a decentralized reputation-sharing framework for group-buying industry via hybrid blockchain. 4617-4632 - Wenbing Zhang

, Li Xu, Zhenzhong Shen, Baotai Ma:
A new approach for mechanical parameter inversion analysis of roller compacted concrete dams using modified PSO and RBFNN. 4633-4652 - Mohammad Reza Alizadeh, Vahid Khajehvand

, Amir Masoud Rahmani, Ebrahim Akbari
:
TPEL: Task possible execution level for effective scheduling in fog-cloud environment. 4653-4672

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














