


default search action
Computing, Volume 106
Volume 106, Number 1, January 2024
- K. Dinesh Kumar
, E. Umamaheswari:
An efficient proactive VM consolidation technique with improved LSTM network in a cloud environment. 1-28 - Zhen-Fei Wang, Pei-Yao Yuan, Zhong-Ya Cao, Li-Ying Zhang
:
Feature reduction of unbalanced data classification based on density clustering. 29-55 - Zhenqian Wang
, Huigui Rong:
An energy-efficient multi-stage alternating optimization scheme for UAV-mounted mobile edge computing networks. 57-80 - Gholam Hossein Abdi, Amir Hossein Refahi Sheikhani
, Sohrab Kordrostami
, Armin Ghane, Shahram Babaie:
A novel selfish node detection based on reputation and game theory in Internet of Things. 81-107 - Navid Khaledian
, Keyhan Khamforoosh, Reza Akraminejad
, Laith Abualigah
, Danial Javaheri
:
An energy-efficient and deadline-aware workflow scheduling algorithm in the fog and cloud environment. 109-137 - Kushal Kanwar
, Sakshi Kaushal, Harish Kumar, Gaurav Gupta
, Manju Khari:
An efficient method for node ranking in complex networks by hybrid neighbourhood coreness. 139-161 - David Rodríguez Torrado
, José M. del Álamo, Miguel Cozar
, Boni García
:
ROI: a method for identifying organizations receiving personal data. 163-184 - Fatih Saglam
, Mehmet Ali Cengiz:
Local resampling for locally weighted Naïve Bayes in imbalanced data. 185-200 - Zari Shamsa, Ali Rezaee
, Sahar Adabi, Amir Masoud Rahmani:
A decentralized prediction-based workflow load balancing architecture for cloud/fog/IoT environments. 201-239 - Nikos Tsalikidis, Aristeidis Mystakidis
, Christos Tjortjis
, Paraskevas Koukaras
, Dimosthenis Ioannidis:
Energy load forecasting: one-step ahead hybrid model utilizing ensembling. 241-273 - W. M. K. S. Ilmini, T. G. I. Fernando:
Detection and explanation of apparent personality using deep learning: a short review of current approaches and future directions. 275-294
Volume 106, Number 2, February 2024
- Xin Xu, Tao Ye, Jieying Gao, Dongxiao Chu
:
Generalized hurdle count data models based on interpretable machine learning with an application to health care demand. 295-325 - Chencheng Fan, Zhixiao Wang, Jian Zhang, Jiayu Zhao, Xiaobin Rui:
Influence maximization in social networks based on discrete harris hawks optimization algorithm. 327-351 - Kalaichelvi Nallusamy
, K. S. Easwarakumar:
PERMDEC: community deception in weighted networks using permanence. 353-370 - Seyed Danial Alizadeh Javaheri, Reza Ghaemi
, Hossein Monshizadeh Naeen
:
An autonomous architecture based on reinforcement deep neural network for resource allocation in cloud computing. 371-403 - Prity Rani
, Rohit Kumar Sachan, Sonal Kukreja:
A systematic study on blockchain technology in education: initiatives, products, applications, benefits, challenges and research direction. 405-447 - Asma Bellili, Nadjia Kara:
A graphical deep learning technique-based VNF dependencies for multi resource requirements prediction in virtualized environments. 449-473 - Quintino Francesco Lotito
, Federico Musciotto, Federico Battiston, Alberto Montresor:
Exact and sampling methods for mining higher-order motifs in large hypergraphs. 475-494 - Iman Morovatian, Alireza Basiri, Samira Rezaei:
RUCIB: a novel rule-based classifier based on BRADO algorithm. 495-519 - Min Li, Shuming Zhou
, Dajin Wang, Gaolin Chen:
Missing link prediction using path and community information. 521-555 - Subhash Sagar
, Adnan Mahmood, Quan Z. Sheng
, Munazza Zaib, Farhan Sufyan
:
Can we quantify trust? Towards a trust-based resilient SIoT network. 557-577 - Haoyu Wang, Jianwei An
:
Dynamic game based task offloading and resource pricing in LEO-multi-access edge computing. 579-606 - Abdulqader M. Almars
, Khalid M. Alharbi
:
Corporate social responsibility disclosure prediction using LSTM neural network. 607-625 - Weidong Li, Chunbo Shi, Yongbo Yu, Zhe Wang:
A novel optimization approach to topology checking of pipeline vector data in browser side. 627-649
Volume 106, Number 3, March 2024
- Faten Mrabet, Walid Karamti
, Adel Mahfoudhi:
Scheduling analysis and correction for dependent real-time tasks upon heterogeneous multiprocessor architectures. 651-712 - Chuandong Qin, Yu Cao
:
1-D CNNs with lock-free asynchronous adaptive stochastic gradient descent algorithm for classification of astronomical spectra. 713-739 - Mingxue Liao
, Pin Lv:
On the average time complexity of computation with random partition. 741-758 - Gopinathan Rajeswari
, R. Arthi, Krishnan Murugan:
Nature-inspired donkey and smuggler algorithm for optimal data gathering in partitioned wireless sensor networks for restoring network connectivity. 759-787 - Ting Lyu, Jianwei An, Meng Li, Feifei Liu, Haitao Xu:
UAV-assisted wireless charging and data processing of power IoT devices. 789-819 - Edwin Montes-Orozco
, Román Anselmo Mora Gutiérrez
, Sergio Gerardo de-los-Cobos-Silva, Eric Alfredo Rincón García, Miguel Angel Gutiérrez-Ándrade, Pedro Lara-Velázquez:
Quantifying influential nodes in complex networks using optimization and particle dynamics: a comparative study. 821-864 - Hui Du, Cuntao Ma, Depeng Lu, Jingrui Liu:
HHSE: heterogeneous graph neural network via higher-order semantic enhancement. 865-887 - Alejandro Pérez-Vereda
, Carlos Canal
, Ramón Hervás
:
Distributed mobile CEP for collaborative social computing. 889-913 - Xiaochuan Sun, Qi Chen, Mingxiang Hao
, Yingqi Li, Bo Sun:
Mconvkgc: a novel multi-channel convolutional model for knowledge graph completion. 915-937 - Hui Xie, Jun Zheng, Zhengyuan Zhang, Shengjun Wei, Changzhen Hu:
TEDA: a trusted execution environment-and-blockchain-based data protection architecture for Internet of Things. 939-960 - Ahmadi Hasan
, Ahmad Kamal
:
Community detection of weighted complex networks via transitive closure. 961-979 - Guruprasad Kapilesh, Sridhar Dhanush, Venkatesan Poovazhaki Gokula Kannan, Viswasam Mary Anita Rajam
:
A priority aware local mutual exclusion algorithm for flying ad hoc networks. 981-1012 - Ehsan Heidari
:
A novel energy-aware method for clustering and routing in IoT based on whale optimization algorithm & Harris Hawks optimization. 1013-1045
Volume 106, Number 4, April 2024
- Rajiv Ranjan, Dan Chen, Prem Prakash Jayaraman:
Adaptive machine learning in the IoT-edge-cloud continuum. 1047 - Rajiv Ranjan, Dan Chen, Prem Prakash Jayaraman:
Correction to: Adaptive machine learning in the IoT-edge-cloud continuum. 1049 - Milad Anoushee
, Mehdi Fartash
, Javad Akbari Torkestani:
An intelligent resource management method in SDN based fog computing using reinforcement learning. 1051-1080 - Yuanzhang Li, Tianchi Sha, Thar Baker
, Xiao Yu, Zhiwei Shi, Sikang Hu:
Adaptive vertical federated learning via feature map transferring in mobile edge computing. 1081-1097 - Hamidreza Ghaffari
, Farzaneh Rafeie:
Reconstructing the training data set based on reducing boundary complexity. 1099-1119 - Ruyi Xu, Jiaxu Han, Jingying Chen:
Ordinal information based facial expression intensity estimation for emotional interaction: a novel semi-supervised deep learning approach. 1121-1138 - Ming Cheng
, Yunbing Yan, Yang Han, Hongjun Lei, Chao Deng
:
Adaptive machine learning algorithm for human target detection in IoT environment. 1139-1150 - Shilpi Mittal
, Rajan Kumar Dudeja, Rasmeet Singh Bali, Gagangeet Singh Aujla
:
A distributed task orchestration scheme in collaborative vehicular cloud edge networks. 1151-1175 - Prateek Chhikara
, Rajkumar Tekchandani, Neeraj Kumar
:
Adaptive federated learning scheme for recognition of malicious attacks in an IoT network. 1177-1192 - Sahil, Sandeep Kumar Sood, Victor I. Chang:
Fog-Cloud-IoT centric collaborative framework for machine learning-based situation-aware traffic management in urban spaces. 1193-1225 - Armin Shoughi, Mohammad Bagher Dowlatshahi, Arefeh Amiri, Marjan Kuchaki Rafsanjani
, Ranbir Singh Batth
:
Automatic ECG classification using discrete wavelet transform and one-dimensional convolutional neural network. 1227-1248
- Boualem Benatallah, Hakim Hacid, Eleanna Kafeza, Fabio Martinelli, Athman Bouguettaya:
ICSOC 2020 special issue on service-oriented computing. 1249-1250 - Andreas Metzger, Clément Quinton, Zoltán Ádám Mann
, Luciano Baresi
, Klaus Pohl:
Realizing self-adaptive systems via online reinforcement learning and feature-model-guided exploration. 1251-1272 - Gaith Rjoub
, Omar Abdel Wahab, Jamal Bentahar
, Ahmed Saleh Bataineh:
Trust-driven reinforcement selection strategy for federated learning on IoT devices. 1273-1295
Volume 106, Number 5, May 2024
- Malek Yousefi, Seyed Morteza Babamir:
A hybrid energy-aware algorithm for virtual machine placement in cloud computing. 1297-1320 - Péter Battyányi
:
Solving the SAT problem with the string multiset rewriting calculus. 1321-1334 - Tianchi Tong
, Qian Dong, Wenying Yuan, Jinsheng Sun
:
Identifying vital spreaders in complex networks based on the interpretative structure model and improved Kshell. 1335-1358 - Yuan-Ko Huang, Chien-Pang Lee
:
Efficient processing of all neighboring object group queries with budget range constraint in road networks. 1359-1393 - Weida Song, Shanxin Zhang
, Wenlong Ge, Wei Wang:
An improved indicator-based two-archive algorithm for many-objective optimization problems. 1395-1429 - Jian Wan
, Luc Jaulin:
Reducing the wrapping effect of set computation via Delaunay triangulation for guaranteed state estimation of nonlinear discrete-time systems. 1431-1449 - Suguna Paramasivam
, R. Leela Velusamy, J. V. Nishaanth:
Categorical learning for automated network traffic categorization for future generation networks in SDN. 1451-1473 - Lei Chen
, Linyun Ma, Lvjie Li:
Enhancing sine cosine algorithm based on social learning and elite opposition-based learning. 1475-1517 - Ali Riahi, Abdorreza Savadi, Mahmoud Naghibzadeh:
Many-BSP: an analytical performance model for CUDA kernels. 1519-1555 - Xiu Susie Fang
, Xianzhi Wang, Quan Z. Sheng
, Lina Yao:
Generalizing truth discovery by incorporating multi-truth features. 1557-1583 - Chinmaya Kumar Swain
, Ravi Shankar, Aryabartta Sahu:
Edge data distribution as a network Steiner tree estimation in edge computing. 1585-1609 - Ekin Ekinci:
A comparative study of LSTM-ED architectures in forecasting day-ahead solar photovoltaic energy using Weather Data. 1611-1632 - Shaifali P. Malukani, C. K. Bhensdadia:
Preference based multi-issue negotiation algorithm (PMINA) for fog resource allocation. 1633-1657 - Jiuyun Xu
, Yinyue Jiang, Hanfei Fan, Qiqi Wang:
SVFLDetector: a decentralized client detection method for Byzantine problem in vertical federated learning. 1659-1679 - Kangning Yin, Zhen Ding, Zhihua Dong, Xinhui Ji, Zhipei Wang, Dongsheng Chen, Ye Li, Guangqiang Yin, Zhiguo Wang:
Person re-identification method based on fine-grained feature fusion and self-attention mechanism. 1681-1705
Volume 106, Number 6, June 2024
- Mandar Subhash Karyakarte
, Aarti Amod Agarkar
, Lalit Kulkarni
, Milind Patil
, Gajanan H. Chavhan
, Bipin Sule
:
Dynamic opportunistic routing protocol for ad-hoc Internet of Vehicles (IoV). 1707-1728 - Chengcheng Sun
, Fanrong Meng, Chenhao Li, Xiaobin Rui, Zhixiao Wang
:
LGAT: a light graph attention network focusing on message passing for semi-supervised node classification. 1729-1747 - Shuang Wang, Yibing Duan, Yamin Lei, Peng Du, Yamin Wang:
Electricity-cost-aware multi-workflow scheduling in heterogeneous cloud. 1749-1775 - Reza Akraminejad
, Navid Khaledian
, Amin Nazari
, Marcus Völp
:
A multi-objective crow search algorithm for optimizing makespan and costs in scientific cloud workflows (CSAMOMC). 1777-1793 - Mohammad Ali Monshizadeh Naeen, Hamidreza Ghaffari, Hossein Monshizadeh Naeen:
Cloud data center cost management using virtual machine consolidation with an improved artificial feeding birds algorithm. 1795-1823 - Salman Mokhtarzadeh, Behzad Zamani Dehkordi, Mohammad Mosleh, Ali Barati:
Time-sensitive propagation values discount centrality measure. 1825-1843 - Zahoor Ali Khan, Muhammad Awais, Turki Ali Alghamdi, Nadeem Javaid
:
Employing topology modification strategies in scale-free IoT networks for robustness optimization. 1845-1872 - Tamer E. Fahim
, Sherif I. Rabia, Ahmed H. Abd El-Malek, Waheed K. Zahra:
Enhancing information freshness in multi-class mobile edge computing systems using a hybrid discipline. 1873-1911 - Zhenyu Xu, Xinxin Zhang, Mingzhi Chen, Li Xu:
Influence maximization in mobile social networks based on RWP-CELF. 1913-1931 - Rajesh Kumar Dhanaraj
, Anamika Singh, Anand Nayyar:
Matyas-Meyer Oseas based device profiling for anomaly detection via deep reinforcement learning (MMODPAD-DRL) in zero trust security network. 1933-1962 - Xin Jiang, Hongbo Liu, Liping Yang, Bo Zhang, Tomas E. Ward, Václav Snásel:
Unraveling human social behavior motivations via inverse reinforcement learning-based link prediction. 1963-1986 - Yonghui Lin, Li Xu
, Wei Lin, Jiayin Li:
Community anomaly detection in attribute networks based on refining context. 1987-2006 - Cen Li, Liping Chen:
Optimization for energy-aware design of task scheduling in heterogeneous distributed systems: a meta-heuristic based approach. 2007-2031 - Ezdehar Jawabreh, Adel Taweel:
Qos-based web service selection using time-aware collaborative filtering: a literature review. 2033-2058 - Bráulio Henrique O. U. V. Pinto, Horacio A. B. F. de Oliveira:
Online RSSI selection strategy for indoor positioning in low-effort training scenarios. 2059-2077
Volume 106, Number 7, July 2024
- Michael Sheng
, Taotao Cai
, Adnan Mahmood:
Special issue on link prediction in complex networks. 2079 - Linlin Ding, Sisi Li, Ji Ma, Mo Li
:
Multi-example query over ontology-label knowledge graphs. 2081-2106 - Fatimah Faraji, Amir Javadpour, Arun Kumar Sangaiah
, Hadi Zavieh:
A solution for resource allocation through complex systems in fog computing for the internet of things. 2107-2131 - Andrea Morales-Garzón
, Karel Gutiérrez-Batista
, María J. Martín-Bautista:
Link prediction in food heterogeneous graphs for personalised recipe recommendation based on user interactions and dietary restrictions. 2133-2155 - T. Jaya Lakshmi
, S. Durga Bhavani
:
Link prediction approach to recommender systems. 2157-2183 - Vishnu Kumar
, P. Radha Krishna:
An effective representation learning model for link prediction in heterogeneous information networks. 2185-2210 - Zhuo Zeng
, Chengliang Wang
, Fei Ma, Xusheng Li, Xinrun Chen:
Incorporating self-attentions into robust spatial-temporal graph representation learning against dynamic graph perturbations. 2211-2237 - Monachary Kammari
, S. Durga Bhavani
:
Citation recommendation using modified HITS algorithm. 2239-2259 - Qiang Hu, Haoquan Qi, Yanzhe Jia, Lianen Qu
:
A two-phase method to optimize service composition in cloud manufacturing. 2261-2291 - Chen Ding, GuangYu Zhu
:
Improved optimal foraging algorithm for global optimization. 2293-2319 - Hussam N. Fakhouri, Feras M. Awaysheh, Sadi Alawadi, Mohannad Alkhalaileh, Faten Hamad:
Four vector intelligent metaheuristic for data optimization. 2321-2359 - Haijun Gu, Yingyu Ma
, Siqi Wang, Xincheng Chen, Weihua Su:
Semantically realizing discovery and composition for RESTful web services. 2361-2387 - Amro Al-Said Ahmad
, Lamis F. Al-Qora'n, Ahmad Zayed:
Exploring the impact of chaos engineering with various user loads on cloud native applications: an exploratory empirical study. 2389-2425 - Sriramulu Bojjagani
, D. R. Denslin Brabin
, Kalai Kumar, Neeraj Kumar Sharma
, Umamaheswararao Batta
:
Secure privacy-enhanced fast authentication and key management for IoMT-enabled smart healthcare systems. 2427-2458 - Shuyan Cheng
, Peng Li
, Ruchuan Wang, He Xu:
Differentially private federated learning with non-IID data. 2459-2488 - Jiaxing Chen, Xiaoqian Liu, Chao Wu, Jiahui Ma, Zhiyuan Cui, Zhihua Liu:
An ant colony path planning optimization based on opposition-based learning for AUV in irregular regions. 2489-2520
Volume 106, Number 8, August 2024
- Lu Cai, Yongcai Yan, Zhongming Tang, Aijun Liu:
Collaborative distribution optimization model and algorithm for an intelligent supply chain based on green computing energy management. 2521-2539 - Yuvaraja Teekaraman
, Ramya Kuppusamy
, V. Indragandhi:
Investigations on the effect of micro-grid using improved NFIS-PID with hybrid algorithms. 2541-2559 - Dimitrios Papathanasiou, Kostas Kolomvatsos:
Data management and selectivity in collaborative pervasive edge computing. 2561-2584 - Mouna Hadj-Kacem, Nadia Bouassida:
Multi-label learning for identifying co-occurring class code smells. 2585-2612 - G. Sri vidhya
, R. Nagarajan
:
A novel bidirectional LSTM model for network intrusion detection in SDN-IoT network. 2613-2642 - Habib Un Nisa
, Saif Ur Rehman Khan
, Shahid Hussain
, Wen-Li Wang
:
An association rule mining-oriented approach for prioritizing functional requirements. 2643-2674 - Francisco Plana
, Andrés Abeliuk, Jorge Pérez:
Quickcent: a fast and frugal heuristic for harmonic centrality estimation on scale-free networks. 2675-2705 - Xiaofei Zhao
, Kam-Yiu Lam, Tei-Wei Kuo
:
Indexing spatiotemporal trajectory data streams on key-value storage. 2707-2735 - Iure Fé, Tuan Anh Nguyen
, Mario Di Mauro
, Fabio Postiglione, Alex Ramos, André Soares, Eunmi Choi, Dugki Min, Jae-Woo Lee, Francisco Airton Silva:
Energy-aware dynamic response and efficient consolidation strategies for disaster survivability of cloud microservices architecture. 2737-2783 - Jorge F. Herculano, Willians de P. Pereira, Marcelo Guimarães, Reinaldo Cotrim, Alirio Santos de Sá, Flávio Assis, Raimundo A. Macêdo, Sérgio Gorender:
MAC approaches to communication efficiency and reliability under dynamic network traffic in wireless body area networks: a review. 2785-2809 - Selcuk Aslan:
Back-and-Forth (BaF): a new greedy algorithm for geometric path planning of unmanned aerial vehicles. 2811-2849 - Fahim Niaz
, Jian Zhang, Muhammad Khalid, Kashif Naseer Qureshi, Yang Zheng, Muhammad Younas, Naveed Imran
:
AI enabled: a novel IoT-based fake currency detection using millimeter wave (mmWave) sensor. 2851-2873 - Jiangang Hou, Xin Li, Hongji Xu, Chun Wang, Lizhen Cui, Zhi Liu, Changzhen Hu:
Packet header-based reweight-long short term memory (Rew-LSTM) method for encrypted network traffic classification. 2875-2896
Volume 106, Number 9, September 2024
- Arezoo Ghasemi
, Abolfazl Toroghi Haghighat, Amin Keshavarzi:
Enhancing virtual machine placement efficiency in cloud data centers: a hybrid approach using multi-objective reinforcement learning and clustering strategies. 2897-2922 - Yevhenii Shudrenko
, Andreas Timm-Giel:
Modeling end-to-end delays in TSCH wireless sensor networks using queuing theory and combinatorics. 2923-2947 - Atiyeh Javaheri, Ali Bohlooli, Kamal Jamshidi:
Enhancing computation reuse efficiency in ICN-based edge computing by modifying content store table structure. 2949-2969 - Samia El Haddouti
, Mohammed Khaldoune, Meryeme Ayache, Mohamed Dâfir Ech-Cherif El Kettani:
Smart contracts auditing and multi-classification using machine learning algorithms: an efficient vulnerability detection in ethereum blockchain. 2971-3003 - Seyyed Javad Bozorg Zadeh Razavi, Haleh Amintoosi, Mohammad Allahbakhsh:
A clarity and fairness aware framework for selecting workers in competitive crowdsourcing tasks. 3005-3030 - Raseena M. Haris, Mahmoud Barhamgi, Armstrong Nhlabatsi, Khaled M. Khan:
Optimizing pre-copy live virtual machine migration in cloud computing using machine learning-based prediction model. 3031-3062 - Yifu Zhang, Qian Sun, Ji Chen, Huini Zhou:
Deep learning-based classification and application test of multiple crop leaf diseases using transfer learning and the attention mechanism. 3063-3084 - Efrén Rama-Maneiro, Juan Carlos Vidal
, Manuel Lama, Pablo Monteagudo-Lago:
Exploiting recurrent graph neural networks for suffix prediction in predictive monitoring. 3085-3111 - D. N. Sachin, B. Annappa, Sateesh Ambesange:
Federated learning for digital healthcare: concepts, applications, frameworks, and challenges. 3113-3150
Volume 106, Number 10, October 2024
- Agyemang Paul, Yuxuan Wan, Zhefu Wu, Boyu Chen, Shufeng Gong:
Deep recommendation with iteration directional adversarial training. 3151-3174 - Anumukonda Naga Seshu Kumar, Rajesh Kumar Yadav, Nallanthighal Srinivasa Raghava:
Efficient hashing technique for malicious profile detection at hypervisor environment. 3175-3193 - Nermin Kartli
, Erkan Bostanci, Mehmet Serdar Güzel:
Heuristic algorithm for an optimal solution of fully fuzzy transportation problem. 3195-3227 - Yishan Chen, Xiansong Luo, Peng Liang, Junxiao Han, Zhonghui Xu:
Priority-based DAG task offloading and secondary resource allocation in IoT edge computing environments. 3229-3254 - Chunguang Yue, Jinbao Li, Qichen Wang, Donghuan Zhang:
Dynamic attention guider network. 3255-3277 - Gyan Singh
, Amit K. Chaturvedi:
A cost, time, energy-aware workflow scheduling using adaptive PSO algorithm in a cloud-fog environment. 3279-3308 - Riyanka Jena, Priyanka Singh
, Manoranjan Mohanty, Manik Lal Das:
PP-PRNU: PRNU-based source camera attribution with privacy-preserving applications. 3309-3333 - Jiahao Li
, Tianhan Gao, Qingwei Mi
:
Phasic parallel-network policy: a deep reinforcement learning framework based on action correlation. 3335-3352 - Vijay Kumar Damera
, G. Vanitha
, B. Indira, G. Sirisha, Ramesh Vatambeti:
Improved snake optimization-based task scheduling in cloud computing. 3353-3385
Volume 106, Number 11, November 2024
- Jacopo Soldani, George A. Papadopoulos, Florian Rademacher:
Service-oriented and cloud computing. 3387 - Akif Quddus Khan, Mihhail Matskin, Radu Prodan, Christoph Bussler, Dumitru Roman, Ahmet Soylu:
Cloud storage tier optimization through storage object classification. 3389-3418 - Luís Cruz-Filipe, Sofia Kostopoulou, Fabrizio Montesi
, Jonas Vistrup
:
μXL: explainable lead generation with microservices and hypothetical answers. 3419-3445 - Brototi Mondal, Avishek Choudhury:
Multi-objective cuckoo optimizer for task scheduling to balance workload in cloud computing. 3447-3478 - Antonios Makris, Evangelos Psomakelis, Ioannis Korontanis, Theodoros Theodoropoulos, Ioannis Kontopoulos, Maria Pateraki, Christos Diou, Konstantinos Tserpes:
Edge-driven Docker registry: facilitating XR application deployment. 3479-3501 - Lei Zhang, Ke Pang, Jiangtao Xu:
High-performance microservice differentiated domain communication technology. 3503-3535 - Sayed Mohsen Hashemi, Amir Sahafi, Amir Masoud Rahmani, Mahdi Bohlouli:
A new approach for service activation management in fog computing using Cat Swarm Optimization algorithm. 3537-3572 - Ole Delzer, Richard Hobeck, Ingo Weber, Dominik Kaaser, Michael Sober, Stefan Schulte:
Analysis of strategies for scalable transaction creation in blockchains. 3573-3602 - Hector A. de la Fuente-Anaya, Heidy Marisol Marín-Castro, Miguel Morales-Sandoval, Jose Juan Garcia-Hernandez:
Business process discovery as a service with event log privacy and access control over discovered models. 3603-3625 - Asma A. Alhussayen, Kamal Mansur Jambi, Fathy Eassa, Maher Khemakhem
:
Performance evaluation of an oracle-based interoperability for permissioned blockchain. 3627-3655 - Yi Yue
, Shiding Sun, Xuebei Zhang, Ruihua Li, Wencong Yang, Chang Cao, Xiongyan Tang:
VNF placement in NFV-enabled networks: considering time-varying workloads and multi-tenancy with a throughput optimization heuristic. 3657-3690 - Kavitha Nagarathinam, K. Ruba Soundar, R. Karthick
, J. Kohila:
Automatic video captioning using tree hierarchical deep convolutional neural network and ASRNN-bi-directional LSTM. 3691-3709 - Abir El Haj
:
Community detection in multiplex continous weighted nodes networks using an extension of the stochastic block model. 3711-3725 - Thanasis Moustakas
, Athanasios Tziouvaras, Kostas Kolomvatsos:
Data and resource aware incremental ML training in support of pervasive applications. 3727-3753 - Mohsen Ghorbian
, Mostafa Ghobaei-Arani
:
A survey on the cold start latency approaches in serverless computing: an optimization-based perspective. 3755-3809 - C. Venkata Subbaiah, Govinda Kannayaram:
Energy-aware and trust-based cluster head selection in healthcare WBANs with enhanced GWO optimization. 3811-3836
Volume 106, Number 12, December 2024
- Ragi Krishnan, Selvam Durairaj:
Reliability and performance of resource efficiency in dynamic optimization scheduling using multi-agent microservice cloud-fog on IoT applications. 3837-3878 - David Rodríguez Torrado, Ian Yang, José M. del Álamo, Norman Sadeh:
Large language models: a new approach for privacy policy analysis at scale. 3879-3903 - Tassawar Ali, Hikmat Ullah Khan, Fawaz Khaled Alarfaj, Mohammed Alreshoodi:
Hybrid deep learning and evolutionary algorithms for accurate cloud workload prediction. 3905-3944 - Santiago Mejía-Dugand, José Aguilar:
A demand forecasting system of product categories defined by their time series using a hybrid approach of ensemble learning with feature engineering. 3945-3965 - Hyejin Cha, In Kee Kim, Taeseok Kim:
Using a random forest to predict quantized reuse distance in an SSD write buffer. 3967-3986 - Mandeep Kumar
, Gagandeep Kaur
, Prashant Singh Rana:
Robust evaluation of GPU compute instances for HPC and AI in the cloud: a TOPSIS approach with sensitivity, bootstrapping, and non-parametric analysis. 3987-4014 - Yingze Liu, Yuanbo Guo, Rajiv Ranjan, Dan Chen:
Optimization of mitigation deployment using deep reinforcement learning over an enhanced ATT &CK. 4015-4038 - Shalini Sharma, Bhupendra Kumar Pathak
, Rajiv Kumar:
Multi-objective service composition optimization problem in IoT for agriculture 4.0. 4039-4056 - J. Angela Jennifa Sujana, R. Venitta Raj, V. K. Raja Priya
:
Fog intelligence for energy efficient management in smart street lamps. 4057-4082 - Divyans Mahansaria, Uttam Kumar Roy
:
Contextual authentication of users and devices using machine learning. 4083-4107 - Syed Ali Haider, Junaid Ahmed Zubairi, Sahar Idwan:
Mapping and just-in-time traffic congestion mitigation for emergency vehicles in smart cities. 4109-4130 - M. Prithi, K. Tamizharasi:
Facial recognition and classification for customer information systems: a feature fusion deep learning approach with FFDMLC algorithm. 4131-4165 - Faris A. Almalki, Marios C. Angelides:
A synthesis of machine learning and internet of things in developing autonomous fleets of heterogeneous unmanned aerial vehicles for enhancing the regenerative farming cycle. 4167-4192 - Ashutosh Kumar, Garima Verma
:
Securing cloud access with enhanced attribute-based cryptography. 4193-4207 - Feng Wu, Hongwei Lv, Tongrang Fan, Wenbin Zhao, Jiaqi Wang:
A data reuse strategy based on deep learning for high dimensional data's pattern and instance similarity. 4209-4229 - Xiaofeng Weng, Jinghua Zhao, Chenxi Jiang, Yiying Ji:
Research on sentiment classification of futures predictive texts based on BERT. 4231-4248 - Raseena M. Haris, Mahmoud Barhamgi, Armstrong Nhlabatsi, Khaled M. Khan:
Correction to: Optimizing pre‑copy live virtual machine migration in cloud computing using machine learning‑based prediction model. 4249

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.