


default search action
Computing, Volume 104
Volume 104, Number 1, January 2022
- Daoqu Geng

, HanWen He, XingChuan Lan, Chang Liu:
Bearing fault diagnosis based on improved federated learning algorithm. 1-19 - Saeid Aghaalizadeh, Saeid Taghavi Afshord

, Asgarali Bouyer
, Babak Anari:
Improving the stability of label propagation algorithm by propagating from low-significance nodes for community detection in social networks. 21-42 - M. Marimuthu

, J. Akilandeswari, P. R. Chelliah:
Identification of trustworthy cloud services: solution approaches and research directions to build an automated cloud broker. 43-72 - Kjell Jørgen Hole

:
Tutorial on systems with antifragility to downtime. 73-93 - Manjari Gupta, Lava Bhargava

, S. Indu
:
Deep neural network learning for power limited heterogeneous system with workload classification. 95-122 - Zheng Li

, Pedro Pinacho Davidson, Monserrat Martínez-Marin
, Guillermo Cabrera-Vives
, Yiqun Chen, María Andrea Rodríguez
, Albert Y. Zomaya
, Rajiv Ranjan:
Bonus computing: towards free-of-charge metacomputing in the public cloud. 123-147 - Selvaraj Srinivasan

:
An incremental approach for detecting distributed deadlocks in the generalized model. 149-168 - Fatemeh Davami, Sahar Adabi

, Ali Rezaee
, Amir Masoud Rahmani:
Fog-based architecture for scheduling multiple workflows with high availability requirement. 169-208 - Paraskevas Koukaras

, Christos Tjortjis
, Paschalis Gkaidatzis
, Napoleon A. Bezas
, Dimosthenis Ioannidis
, Dimitrios Tzovaras
:
An interdisciplinary approach on efficient virtual microgrid to virtual microgrid energy balancing incorporating data preprocessing techniques. 209-250 
Volume 104, Number 2, February 2022
- S. S. Vinod Chandra

, Hareendran S. Anand:
Nature inspired meta heuristic algorithms for optimization problems. 251-269 - Praveen Lalwani

, Manas Kumar Mishra, Jasroop Singh Chadha
, Pratyush Sethi:
Customer churn prediction system: a machine learning approach. 271-294 - Khawla Asmi

, Dounia Lotfi
, Abdallah Abarda
:
The greedy coupled-seeds expansion method for the overlapping community detection in social networks. 295-313 - Carlos Melo

, Jean Araujo
, Jamilson Dantas, Paulo Pereira, Paulo Maciel:
A model-based approach for planning blockchain service provisioning. 315-337 - Jia Hou Chin

, Kuru Ratnavelu:
Community detection using constrained label propagation algorithm with nodes exemption. 339-358 - Sanjay Kumar

, Dipti Lohia, Darsh Pratap, Ashutosh Krishna, B. S. Panda:
MDER: modified degree with exclusion ratio algorithm for influence maximisation in social networks. 359-382 - Jixian Zhang

, Laixin Chi, Ning Xie, Xutao Yang, Xuejie Zhang, Weidong Li
:
Strategy-proof mechanism for online resource allocation in cloud and edge collaboration. 383-412 - Hongjian Li

, Hongxi Dai, Zengyan Liu, Hao Fu, Yang Zou:
Dynamic energy-efficient scheduling for streaming applications in storm. 413-432 - Israr Ullah, Muhammad Fayaz, Muhammad Aman, DoHyeun Kim:

An optimization scheme for IoT based smart greenhouse climate control with efficient energy consumption. 433-457 
Volume 104, Number 3, March 2022
- Ozcan Ozturk, Sabri Pllana, Smaïl Niar, Kaoutar El Maghraoui

:
Special issue on recent advances in autonomous vehicle solutions in the digital continuum. 459-460 - Augusto Vega

, Alper Buyuktosunoglu, Davide Callegaro, Marco Levorato, Pradip Bose:
Cloud-backed mobile cognition. 461-479 - Hamid Tabani

, Roger Pujol
, Miguel Alcon
, Joan Moya, Jaume Abella
, Francisco J. Cazorla
:
ADBench: benchmarking autonomous driving systems. 481-502 - Hind Bangui

, Mouzhi Ge, Barbora Buhnova
:
A hybrid machine learning model for intrusion detection in VANET. 503-531 - Djamila Zamouche, Mohamed Mohammedi

, Sofiane Aissani
, Mawloud Omar:
Ultra-safe and reliable enhanced train-centric communication-based train control system. 533-552 
- Partha Ghosh

, Zaid Alam, Ritu Raj Sharma, Santanu Phadikar:
An efficient SGM based IDS in cloud environment. 553-576 - Lalatendu Behera:

A fault-tolerant time-triggered scheduling algorithm of mixed-criticality systems. 577-599 - Ahmad Taghinezhad-Niar

, Saeid Pashazadeh
, Javid Taheri:
Energy-efficient workflow scheduling with budget-deadline constraints for cloud. 601-625 - Hong Yu

, Zhao Fu, Guoyin Wang, Yongfang Xie, Jie Li:
A Multi-objective optimization algorithm based on dynamic user-preference information. 627-656 - Suman Banerjee, Mamata Jenamani, Dilip Kumar Pratihar:

An approximate marginal spread computation approach for the budgeted influence maximization with delay. 657-680 - Ali Belgacem

:
Dynamic resource allocation in cloud computing: analysis and taxonomies. 681-710 
Volume 104, Number 4, April 2022
- Ladjel Bellatreche, A Min Tjoa:

Special issue on advances in data, information and knowledge engineering in data science era. 711-715 - Orestis Lampridis, Dimitra Karanatsiou

, Athena Vakali:
MANIFESTO: a huMAN-centric explaInable approach for FakE news spreaders deTectiOn. 717-739 - Mohamed Ali Ben Hassine

, Safa Abdellatif, Sadok Ben Yahia
:
A novel imbalanced data classification approach for suicidal ideation detection on social media. 741-765 - Carlos Sáenz-Adán

, Francisco J. García Izquierdo, Beatriz Pérez
, Trung Dong Huynh
, Luc Moreau
:
Automated and non-intrusive provenance capture with UML2PROV. 767-788 - Nayera Tarek, Mariam Abo Mandour, Nada El-Madah, Reem Ali, Sara Yahia, Bassant Mohamed, Dina Mostafa, Sara El-Metwally

:
Morse glasses: an IoT communication system based on Morse code for users with speech impairments. 789-808 - Antonio Brogi

, Jose Carrasco, Francisco Durán, Ernesto Pimentel
, Jacopo Soldani
:
Self-healing trans-cloud applications. 809-833 - Roberto Reda

, Filippo Piccinini
, Giovanni Martinelli
, Antonella Carbonaro
:
Heterogeneous self-tracked health and fitness data integration and sharing according to a linked open data approach. 835-857 - Soraya Touloum

, Louiza Bouallouche-Medjkoune
, Mohand Yazid, Mohand Moktefi
, Djamil Aïssani:
Performance modeling of the IEEE 802.15.4e TSCH enabling both shared and dedicated links in industrial WSNs. 859-891 - Diwakar Tripathi

, B. Ramachandra Reddy
, Alok Kumar Shukla:
CFR: collaborative feature ranking for improving the performance of credit scoring data classification. 893-923 - Chinmaya Kumar Swain

, Aryabartta Sahu:
Interference Aware Workload Scheduling for Latency Sensitive Tasks in Cloud Environment. 925-950 - Somayeh Bahramnejad

, Naser Movahhedinia
:
A fuzzy arithmetic-based analytical reliability assessment framework (FAARAF): case study, cognitive radio vehicular networks with drivers. 951-979 
Volume 104, Number 5, May 2022
- Lei Chen, Yu Tian, Yunpeng Ma:

An improved grasshopper optimization algorithm based on dynamic dual elite learning and sinusoidal mutation. 981-1015 - Xiulei Liu

, Ruoyu Chen
, Qiang Tong
, Zhihui Qin, Qinfu Shi, Li Duan:
An ontology-based deep belief network model. 1017-1032 - Faris A. Almalki

, Abdullah Alhumaidi Alotaibi
, Marios C. Angelides
:
Coupling multifunction drones with AI in the fight against the coronavirus pandemic. 1033-1059 - Muhammad U. Ilyas

, Soltan Abed Alharbi
:
Machine learning approaches to network intrusion detection for contemporary internet traffic. 1061-1076 - Anisha Kumari, Ranjan Kumar Behera

, Bibudatta Sahoo, Satya Prakash Sahoo
:
Prediction of link evolution using community detection in social network. 1077-1098 - Elmira Pourabbasi, Vahid Majidnezhad

, Saeid Taghavi Afshord, Yasser Jafari:
A novel memorizing single chromosome evolutionary algorithm for detecting communities in complex networks. 1099-1122 - Sahar Samsam Shariat, Behrang Barekatain

:
HATMOG: an enhanced hybrid task assignment algorithm based on AHP-TOPSIS and multi-objective genetic in cloud computing. 1123-1154 - Na Bai, Fanrong Meng, Xiaobin Rui

, Zhixiao Wang:
Rumor detection based on a Source-Replies conversation Tree Convolutional Neural Net. 1155-1171 - Shivangi Shukla

, Sankita J. Patel:
A novel ECC-based provably secure and privacy-preserving multi-factor authentication protocol for cloud computing. 1173-1202 - Hameed Khan

, Kamal K. Kushwah, Muni Raj Maurya
, Saurabh Singh
, Prashant Jha, Sujeet K. Mahobia, Sanjay Soni, Subham Sahu
, Kishor Kumar Sadasivuni
:
Machine learning driven intelligent and self adaptive system for traffic management in smart cities. 1203-1217 - Luis Antonio Leite Francisco da Costa

, Rafael Kunst
, Edison Pignaton de Freitas
:
Intelligent resource sharing to enable quality of service for network clients: the trade-off between accuracy and complexity. 1219-1231 
Volume 104, Number 6, June 2022
- Hrudaya Kumar Tripathy

, Sushruta Mishra
, Shubham Suman, Anand Nayyar
, Kshira Sagar Sahoo
:
Smart COVID-shield: an IoT driven reliable and automated prototype model for COVID-19 symptoms tracking. 1233-1254 - Behrouz Samieiyan

, Poorya MohammadiNasab
, Mostafa Abbas Mollaei
, Fahimeh Hajizadeh
, Mohammadreza Kangavari:
Solving dimension reduction problems for classification using Promoted Crow Search Algorithm (PCSA). 1255-1284 - Hung Cong Tran, Khiet Thanh Bui

, Tran Vu Pham:
Virtual machine migration policy for multi-tier application in cloud computing based on Q-learning algorithm. 1285-1306 - Mohammad Reza Akbari

, Hamid Barati
, Ali Barati
:
An efficient gray system theory-based routing protocol for energy consumption management in the Internet of Things using fog and cloud computing. 1307-1335 - Adnan Mahmood

, Sarah Ali Siddiqui, Quan Z. Sheng
, Wei Emma Zhang
, Hajime Suzuki
, Wei Ni
:
Trust on wheels: Towards secure and resource efficient IoV networks. 1337-1358 - Uddalak Chatterjee, Sangram Ray

, Muhammad Khurram Khan
, Mou Dasgupta, Chien-Ming Chen
:
An ECC-based lightweight remote user authentication and key management scheme for IoT communication in context of fog computing. 1359-1395 - Sven Smolka

, Zoltán Ádám Mann
:
Evaluation of fog application placement algorithms: a survey. 1397-1423 - Yuegang Li, Dongyang Ou, Xin Zhou, Congfeng Jiang, Christophe Cérin:

Scalability and performance analysis of BDPS in clouds. 1425-1460 - Wei Du, Gang Li, Xiaochen He

:
Network structure optimization for social networks by minimizing the average path length. 1461-1480 - Abdulqader M. Almars

, El-Sayed Atlam
, Talal H. Noor
, Elmarhomy Ghada, Rasha M. Al-Makhlasawy, Ibrahim Gad
:
Users opinion and emotion understanding in social media regarding COVID-19 vaccine. 1481-1496 - Xing Fan, Baoning Niu

, Zhenliang Liu:
Scalable blockchain storage systems: research progress and models. 1497-1524 
Volume 104, Number 7, July 2022
- Ahmed Mostefaoui:

QoS and QoE in large Scale Wireless IoT Networks. 1525 - Mandan Naresh, Vikramjeet Das

, Paresh Saxena
, Manik Gupta
:
Deep reinforcement learning based QoE-aware actor-learner architectures for video streaming in IoT environments. 1527-1550 - Noura Aljeri

, Azzedine Boukerche:
Mobility management in space-ground-integrated networks. 1551-1564 - Elio Mansour

, Faisal Shahzad, Joe Tekli, Richard Chbeir:
Data redundancy management for leaf-edges in connected environments. 1565-1588 - Maninderpal Singh, Gagangeet Singh Aujla

, Rasmeet Singh Bali, Ranbir Singh Batth
, Amritpal Singh, Sahil Vashisht, Anish Jindal
:
CovaDel: a blockchain-enabled secure and QoS-aware drone delivery framework for COVID-like pandemics. 1589-1613 - Moustafa Fayad

, Ahmed Mostefaoui, Samir Chouali, Salima Benbernou:
Toward a design model-oriented methodology to ensure QoS of a cyber-physical healthcare system. 1615-1641 - Mahboubeh Afzali, Hamid Pourmohammadi, Amin Mohammad Vali Samani:

An efficient framework for trust evaluation of secure service selection in fog computing based on QoS, reputation, and social criteria. 1643-1675 - Souhila Kettouche, Moufida Maimour

, Lakhdar Derdouri:
Disjoint multipath RPL for QoE/QoS provision in the Internet of Multimedia Things. 1677-1699 - Heqi Cui, Peng Sun

, Azzedine Boukerche:
A novel cloud-based traffic aware data routing protocol for smart connected vehicles. 1701-1720 
Volume 104, Number 8, August 2022
- Yongfeng Kong, Zhenhui Huang, Wanjie Xiong

:
Parallelism of the finite-time dynamics method based on GPU. 1721-1738 - Jianghui Liu, Shengxiang Wang

:
All-dummy k-anonymous privacy protection algorithm based on location offset. 1739-1751 - Taha Shojarazavi, Hamid Barati

, Ali Barati
:
A wrapper method based on a modified two-step league championship algorithm for detecting botnets in IoT environments. 1753-1774 - Salim El Khediri

:
Wireless sensor networks: a survey, categorization, main issues, and future orientations for clustering protocols. 1775-1837 - Mohamed A. El-Zawawy

, Parvez Faruki, Mauro Conti
:
Formal model for inter-component communication and its security in android. 1839-1865 - Laércio Pioli

, Carina F. Dorneles, Douglas D. J. de Macedo, Mario A. R. Dantas:
An overview of data reduction solutions at the edge of IoT systems: a systematic mapping of the literature. 1867-1889 - Lynda Alkama

, Louiza Bouallouche-Medjkoune, Mouloud Atmani, Lina Bachiri:
Performance analysis of the unslotted IEEE 802.15.4k MAC protocols under saturated traffic and fading channel conditions. 1891-1922 - Somayeh Bahramnejad

, Naser Movahhedinia
:
A reliability estimation framework for cognitive radio V2V communications and an ANN-based model for automating estimations. 1923-1947 
Volume 104, Number 9, September 2022
- Hao Dai, Yang Wang, Chengzhong Xu

:
Osprey: a heterogeneous search framework for spatial-temporal similarity. 1949-1975 - Tianhua Li, Yongcheng Yin

, Bo Yang, Jialin Hou, Kai Zhou:
A self-learning bee colony and genetic algorithm hybrid for cloud manufacturing services. 1977-2003 - Pranitha Sanda

, Digambar Pawar
, V. Radha:
An insight into cloud forensic readiness by leading cloud service providers: a survey. 2005-2030 - Jun Li, Hao Ren, Chenyang Li, Huiling Chen:

A novel and efficient salp swarm algorithm for large-scale QoS-aware service composition selection. 2031-2051 - José M. del Álamo, Danny S. Guamán, Boni García, Ana Diez:

A systematic mapping study on automated analysis of privacy policies. 2053-2076 - S. Subaselvi

, K. Gunaseelan:
Energy efficient UAV enabled harvesting with beamforming for clustered SDWSN. 2077-2100 - Somayeh Kalantari, Eslam Nazemi

, Behrooz Masoumi
:
Guided self-organization through an entropy-based self-advising approach. 2101-2136 - Somaye Pirzadi

, Mohammad Ali Pourmina, Seyed Mostafa Safavi Hemami:
A novel routing method in hybrid DTN-MANET networks in the critical situations. 2137-2156 
Volume 104, Number 10, October 2022
- Mohamed Faouzi Atig:

The Computing Journal gratefully acknowledges the editorial work of the scientists listed below on the special issue entitled "S.I. : NETYS 2019". 2157 - Ved Prakash Chaudhary, Chirag Juyal, Sandeep S. Kulkarni, Sweta Kumari

, Sathya Peri:
Achieving starvation-freedom in multi-version transactional memory systems. 2159-2179 - Rachid Zennou

, Ranadeep Biswas, Ahmed Bouajjani, Constantin Enea, Mohammed Erradi:
Checking causal consistency of distributed databases. 2181-2201 - Peter Chini, Roland Meyer, Prakash Saivasan:

Liveness in broadcast networks. 2203-2223 - Prasad Jayanti, Anup Joshi

:
Recoverable mutual exclusion with abortability. 2225-2252 
- Bin Yu

, Xiaofeng Li, He Zhao
, Tong Zhou:
A scalable blockchain network model with transmission paths and neighbor node subareas. 2253-2277 - Miguel Areias

, Ricardo Rocha
:
On the correctness of a lock-free compression-based elastic mechanism for a hash trie design. 2279-2305 - Anass Sedrati

, Aafaf Ouaddah
, Abdellatif Mezrioui, Badr Bellaj:
IoT-Gov: an IoT governance framework using the blockchain. 2307-2345 
Volume 104, Number 11, November 2022
- Tian Bai

, Zhijie Li, Bo Fan, Jun Liao:
Maintaining temporal validity of real-time data in component-based systems. 2347-2374 - Ricardo Pérez-Castillo

, Mario Piattini:
Design of classical-quantum systems with UML. 2375-2403 - Sven Ihde

, Luise Pufahl, Maximilian Völker
, Asvin Goel
, Mathias Weske:
A framework for modeling and executing task-Specific resource allocations in business processes. 2405-2429 - Danyang Xiao

, Chengang Yang, Weigang Wu:
Efficient DNN training based on backpropagation parallelization. 2431-2451 - Ali Walid Daher

, Enrico Ferrari
, Marco Muselli, Hussein Chible, Daniele D. Caviglia:
VAMPIRE: vectorized automated ML pre-processing and post-processing framework for edge applications. 2453-2487 - Hong Jin, Cheng Jiang, Shengping Lv, Haiping He, Xinting Liao:

A hybrid teaching-learning-based optimization algorithm for QoS-aware manufacturing cloud service composition. 2489-2509 - Yasir Afaq, Ankush Manocha

:
Dew computing-assisted cognitive Intelligence-inspired smart environment for diarrhea prediction. 2511-2540 
Volume 104, Number 12, December 2022
- Haichi Huang, Xuan Tian, Sisi Luo, Yanli Shi:

Item enhanced graph collaborative network for collaborative filtering recommendation. 2541-2556 - Reza Shojaee

, Nasser Yazdani:
Stochastic model-driven capacity planning framework for multi-access edge computing. 2557-2579 - Nazeef Ul Haq, M. M. Fraz

, Tufail Sajjad Shah Hashmi, Muhammad Shahzad:
Orientation aware weapons detection in visual data: a benchmark dataset. 2581-2604 - Thirumoorthy Karpagalingam

, J. Jerold John Britto:
A clustering approach for software defect prediction using hybrid social mimic optimization algorithm. 2605-2633 - Chintoo Kumar

, C. Ravindranath Chowdary
:
OPHAencoder: An unsupervised approach to identify groups in group recommendations. 2635-2657 - Theodoros Toliopoulos

, Anastasios Gounaris:
Adaptivity in continuous massively parallel distance-based outlier detection. 2659-2684 - Mohamed Salah Kettouch

, Cristina Luca
:
LinkD: element-based data interlinking of RDF datasets in linked data. 2685-2709 - Jorge Pérez, Jessica Díaz

, Javier Berrocal, Ramón López-Viana, Ángel González-Prieto:
Edge computing. 2711-2747 - Leila Helali, Mohamed Nazih Omri:

Intelligent and compliant dynamic software license consolidation in cloud environment. 2749-2783 

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














