Stop the war!
Остановите войну!
for scientists:
default search action
Computing, Volume 106
Volume 106, Number 1, January 2024
- K. Dinesh Kumar, E. Umamaheswari:
An efficient proactive VM consolidation technique with improved LSTM network in a cloud environment. 1-28 - Zhen-Fei Wang, Pei-Yao Yuan, Zhong-Ya Cao, Li-Ying Zhang:
Feature reduction of unbalanced data classification based on density clustering. 29-55 - Zhenqian Wang, Huigui Rong:
An energy-efficient multi-stage alternating optimization scheme for UAV-mounted mobile edge computing networks. 57-80 - Gholam Hossein Abdi, Amir Hossein Refahi Sheikhani, Sohrab Kordrostami, Armin Ghane, Shahram Babaie:
A novel selfish node detection based on reputation and game theory in Internet of Things. 81-107 - Navid Khaledian, Keyhan Khamforoosh, Reza Akraminejad, Laith Abualigah, Danial Javaheri:
An energy-efficient and deadline-aware workflow scheduling algorithm in the fog and cloud environment. 109-137 - Kushal Kanwar, Sakshi Kaushal, Harish Kumar, Gaurav Gupta, Manju Khari:
An efficient method for node ranking in complex networks by hybrid neighbourhood coreness. 139-161 - David Rodriguez, José M. del Álamo, Miguel Cozar, Boni García:
ROI: a method for identifying organizations receiving personal data. 163-184 - Fatih Saglam, Mehmet Ali Cengiz:
Local resampling for locally weighted Naïve Bayes in imbalanced data. 185-200 - Zari Shamsa, Ali Rezaee, Sahar Adabi, Amir Masoud Rahmani:
A decentralized prediction-based workflow load balancing architecture for cloud/fog/IoT environments. 201-239 - Nikos Tsalikidis, Aristeidis Mystakidis, Christos Tjortjis, Paraskevas Koukaras, Dimosthenis Ioannidis:
Energy load forecasting: one-step ahead hybrid model utilizing ensembling. 241-273 - W. M. K. S. Ilmini, T. G. I. Fernando:
Detection and explanation of apparent personality using deep learning: a short review of current approaches and future directions. 275-294
Volume 106, Number 2, February 2024
- Xin Xu, Tao Ye, Jieying Gao, Dongxiao Chu:
Generalized hurdle count data models based on interpretable machine learning with an application to health care demand. 295-325 - Chencheng Fan, Zhixiao Wang, Jian Zhang, Jiayu Zhao, Xiaobin Rui:
Influence maximization in social networks based on discrete harris hawks optimization algorithm. 327-351 - Kalaichelvi Nallusamy, K. S. Easwarakumar:
PERMDEC: community deception in weighted networks using permanence. 353-370 - Seyed Danial Alizadeh Javaheri, Reza Ghaemi, Hossein Monshizadeh Naeen:
An autonomous architecture based on reinforcement deep neural network for resource allocation in cloud computing. 371-403 - Prity Rani, Rohit Kumar Sachan, Sonal Kukreja:
A systematic study on blockchain technology in education: initiatives, products, applications, benefits, challenges and research direction. 405-447 - Asma Bellili, Nadjia Kara:
A graphical deep learning technique-based VNF dependencies for multi resource requirements prediction in virtualized environments. 449-473 - Quintino Francesco Lotito, Federico Musciotto, Federico Battiston, Alberto Montresor:
Exact and sampling methods for mining higher-order motifs in large hypergraphs. 475-494 - Iman Morovatian, Alireza Basiri, Samira Rezaei:
RUCIB: a novel rule-based classifier based on BRADO algorithm. 495-519 - Min Li, Shuming Zhou, Dajin Wang, Gaolin Chen:
Missing link prediction using path and community information. 521-555 - Subhash Sagar, Adnan Mahmood, Quan Z. Sheng, Munazza Zaib, Farhan Sufyan:
Can we quantify trust? Towards a trust-based resilient SIoT network. 557-577 - Haoyu Wang, Jianwei An:
Dynamic game based task offloading and resource pricing in LEO-multi-access edge computing. 579-606 - Abdulqader M. Almars, Khalid M. Alharbi:
Corporate social responsibility disclosure prediction using LSTM neural network. 607-625 - Weidong Li, Chunbo Shi, Yongbo Yu, Zhe Wang:
A novel optimization approach to topology checking of pipeline vector data in browser side. 627-649
Volume 106, Number 3, March 2024
- Faten Mrabet, Walid Karamti, Adel Mahfoudhi:
Scheduling analysis and correction for dependent real-time tasks upon heterogeneous multiprocessor architectures. 651-712 - Chuandong Qin, Yu Cao:
1-D CNNs with lock-free asynchronous adaptive stochastic gradient descent algorithm for classification of astronomical spectra. 713-739 - Mingxue Liao, Pin Lv:
On the average time complexity of computation with random partition. 741-758 - Gopinathan Rajeswari, R. Arthi, Krishnan Murugan:
Nature-inspired donkey and smuggler algorithm for optimal data gathering in partitioned wireless sensor networks for restoring network connectivity. 759-787 - Ting Lyu, Jianwei An, Meng Li, Feifei Liu, Haitao Xu:
UAV-assisted wireless charging and data processing of power IoT devices. 789-819 - Edwin Montes-Orozco, Román Anselmo Mora Gutiérrez, Sergio Gerardo de-los-Cobos-Silva, Eric Alfredo Rincón García, Miguel Angel Gutiérrez-Ándrade, Pedro Lara-Velázquez:
Quantifying influential nodes in complex networks using optimization and particle dynamics: a comparative study. 821-864 - Hui Du, Cuntao Ma, Depeng Lu, Jingrui Liu:
HHSE: heterogeneous graph neural network via higher-order semantic enhancement. 865-887 - Alejandro Pérez-Vereda, Carlos Canal, Ramón Hervás:
Distributed mobile CEP for collaborative social computing. 889-913 - Xiaochuan Sun, Qi Chen, Mingxiang Hao, Yingqi Li, Bo Sun:
Mconvkgc: a novel multi-channel convolutional model for knowledge graph completion. 915-937 - Hui Xie, Jun Zheng, Zhengyuan Zhang, Shengjun Wei, Changzhen Hu:
TEDA: a trusted execution environment-and-blockchain-based data protection architecture for Internet of Things. 939-960 - Ahmadi Hasan, Ahmad Kamal:
Community detection of weighted complex networks via transitive closure. 961-979 - Guruprasad Kapilesh, Sridhar Dhanush, Venkatesan Poovazhaki Gokula Kannan, Viswasam Mary Anita Rajam:
A priority aware local mutual exclusion algorithm for flying ad hoc networks. 981-1012 - Ehsan Heidari:
A novel energy-aware method for clustering and routing in IoT based on whale optimization algorithm & Harris Hawks optimization. 1013-1045
Volume 106, Number 4, April 2024
- Rajiv Ranjan, Dan Chen, Prem Prakash Jayaraman:
Adaptive machine learning in the IoT-edge-cloud continuum. 1047 - Rajiv Ranjan, Dan Chen, Prem Prakash Jayaraman:
Correction to: Adaptive machine learning in the IoT-edge-cloud continuum. 1049 - Milad Anoushee, Mehdi Fartash, Javad Akbari Torkestani:
An intelligent resource management method in SDN based fog computing using reinforcement learning. 1051-1080 - Yuanzhang Li, Tianchi Sha, Thar Baker, Xiao Yu, Zhiwei Shi, Sikang Hu:
Adaptive vertical federated learning via feature map transferring in mobile edge computing. 1081-1097 - Hamid Reza Ghaffari, Farzaneh Rafeie:
Reconstructing the training data set based on reducing boundary complexity. 1099-1119 - Ruyi Xu, Jiaxu Han, Jingying Chen:
Ordinal information based facial expression intensity estimation for emotional interaction: a novel semi-supervised deep learning approach. 1121-1138 - Ming Cheng, Yunbing Yan, Yang Han, Hongjun Lei, Chao Deng:
Adaptive machine learning algorithm for human target detection in IoT environment. 1139-1150 - Shilpi Mittal, Rajan Kumar Dudeja, Rasmeet Singh Bali, Gagangeet Singh Aujla:
A distributed task orchestration scheme in collaborative vehicular cloud edge networks. 1151-1175 - Prateek Chhikara, Rajkumar Tekchandani, Neeraj Kumar:
Adaptive federated learning scheme for recognition of malicious attacks in an IoT network. 1177-1192 - Sahil, Sandeep Kumar Sood, Victor I. Chang:
Fog-Cloud-IoT centric collaborative framework for machine learning-based situation-aware traffic management in urban spaces. 1193-1225 - Armin Shoughi, Mohammad Bagher Dowlatshahi, Arefeh Amiri, Marjan Kuchaki Rafsanjani, Ranbir Singh Batth:
Automatic ECG classification using discrete wavelet transform and one-dimensional convolutional neural network. 1227-1248
- Boualem Benatallah, Hakim Hacid, Eleanna Kafeza, Fabio Martinelli, Athman Bouguettaya:
ICSOC 2020 special issue on service-oriented computing. 1249-1250 - Andreas Metzger, Clément Quinton, Zoltán Ádám Mann, Luciano Baresi, Klaus Pohl:
Realizing self-adaptive systems via online reinforcement learning and feature-model-guided exploration. 1251-1272 - Gaith Rjoub, Omar Abdel Wahab, Jamal Bentahar, Ahmed Saleh Bataineh:
Trust-driven reinforcement selection strategy for federated learning on IoT devices. 1273-1295
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.