


default search action
Concurrency and Computation: Practice and Experience, Volume 37
Volume 37, Number 1, January 2025
Research Article
- Qiqi Zhang, Bohui Li, Shaojin Geng

, Xingjuan Cai
:
A Multi-Workflow Scheduling Approach With Explicit Evolutionary Multi-Objective Multi-Task Optimization Algorithm in Cloud Environment.
Special Issue Paper
- W. Pepper Marts

, Matthew G. F. Dosanjh
, Whit Schonbein
, Scott Levy
, Patrick G. Bridges
:
Measuring Thread Timing to Assess the Feasibility of Early-Bird Message Delivery Across Systems and Scales. - Jiezhou He

, Zhiming Luo, Wei Peng
, Songzhi Su, Xue Zhao, Guojun Zhang, Shaozi Li:
HRCUNet: Hierarchical Region Contrastive Learning for Segmentation of Breast Tumors in DCE-MRI. - Dongfeng Xing

, Mingxing Tian:
Analysis and Fuzzy Neural Networks-Based Inertia Coefficient Adjustment Strategy of Power Converters. - Mete Celik, Ahmet Sakir Dokuz, Alper Ecemis

, Emre Erdogmus:
Discovering and Ranking Urban Social Clusters Out of Streaming Social Media Datasets. - Jie Wang

, Huiqun Yu
, Guisheng Fan
, Jiayin Zhang
:
Request Deadline Split and Interference-Aware Request Migration in Edge Cloud. - Barry Linnert

, César Augusto Fonticielha De Rose, Hans-Ulrich Heiß:
Toward a Dynamic Allocation Strategy for Deadline-Oriented Resource and Job Management in HPC Systems. - Pujasuman Tripathy

, Pabitra Mohan Khilar:
Weighted Centroid Amorphous Algorithm for Position Error Minimization in WSN. - Mrinal Ashish Khadse

, Dhananjay Manohar Dakhane:
A Review on Network Covert Channel Construction and Attack Detection. - Mohammad Alaei

, Fahimeh Yazdanpanah:
A Survey on Heterogeneous CPU-GPU Architectures and Simulators. - Giuseppe Bilotta

:
From GPU to CPU (and Beyond): Extending Hardware Support in GPUSPH Through a SYCL-Inspired Interface. - Yuzhen Pi, Quande Yuan, Zhenming Zhang, Jingya Wen, Lei Kou

:
An Ultra-Short-Term Wind Power Prediction Method Based on Spatiotemporal Characteristics Fusion. - Haoyang He

, Yan Gu, Qingzhi Liu
, Hao Wu, Long Cheng
:
Job Scheduling in Hybrid Clouds With Privacy Constraints: A Deep Reinforcement Learning Approach. - Xingfu Wu

, Prasanna Balaprakash, Michael Kruse, Jaehoon Koo, Brice Videau, Paul D. Hovland, Valerie Taylor, Brad Geltz, Siddhartha Jana, Mary W. Hall:
ytopt: Autotuning Scientific Applications for Energy Efficiency at Large Scales. - Vahini Siruvoru

, Shivampeta Aparna
:
Harmonic Migration Algorithm for Virtual Machine Migration and Switching Strategy in Cloud Computing. - Xiaoyun Lu

, Chunjie Zhou, Shengjie Liu, Jialong Li:
3D LVCN: A Lightweight Volumetric ConvNet. - Yiming Mou, Lunzhi Deng

, Yu Ruan:
A Revocable Certificateless Encryption Scheme for Multi-User.
Volume 37, Number 2, January 2025
Special Issue Paper
- Yonghwan Kim

, Yoshiaki Katayama, Koichi Wada:
Complete Visibility Algorithms of Luminous Robots With Two-Color Lights on Grid. - Xuanzhengbo Ren

, Masatoshi Kawai, Tetsuya Hoshino, Takahiro Katagiri, Toru Nagai:
Auto-Tuning Mixed-Precision Computation by Specifying Multiple Regions.
Research Article
- Sweta Gupta

, Kamlesh Kumar Gupta, Piyush Kumar Shukla
:
Improving the End-to-End Protection in E-Voting Using BVM - Blockchain-Based E-Voting Mechanism. - Mohamed Hedi Fourati

, Soumaya Marzouk, Mohamed Jmaiel:
Cloud Elasticity of Microservices-Based Applications: A Survey.
Special Issue Paper
- Satoki Tsuji

, Yasuaki Ito
, Koji Nakano
, Akihiko Kasagi:
GPU Acceleration of the Boys Function Evaluation in Computational Quantum Chemistry.
Research Article
- T. R. Chenthil

, G. Balachandran
, S. Ranjith
, E. Sakthivel
:
A Quantum-Inspired Source-Distributed Opportunistic Routing Protocol for Reliable Routing in Underwater Wireless Sensor Networks. - Monika Dubey, Ashutosh Kumar Singh

, Richa Mishra
:
AI Based Resource Management for 5G Network Slicing: History, Use Cases, and Research Directions. - Xuanli Liu, Weibei Fan

, Jing He
, Zhijie Han
, Chi-Hung Chi:
Reliability Assessment of Multiprocessor System Based on Exchanged Crossed Cube Networks. - Subhajit Sahu

, Kishore Kothapalli
:
A Fast Parallel Approach for Neighborhood-Based Link Prediction by Disregarding Large Hubs. - Ameni Chetouane

, Kamel Karoui:
New Continual Federated Learning System for Intrusion Detection in SDN-Based Edge Computing.
Special Issue Paper
- Niclas Jansson

, Martin Karp, Jacob Wahlgren, Stefano Markidis, Philipp Schlatter:
Design of Neko - A Scalable High-Fidelity Simulation Framework With Extensive Accelerator Support.
Research Article
- Mingxiu Tuo, Chenglei Jia, Siyu Jin, Shunli Zhang

:
FPM-SSD: Fast Parallel Multi-Scale Smooth Signed Distance Surface Reconstruction. - Bin Zhang

, Yuejuan Wei, Shuqui Zang, Qing Li, Yan Qiang:
An Echo Pressure Model Based on Mutil-Gaussian Beam Theory for Measuring the Liquid Level in Special Field.
Correction
- Correction to "A DSEL for High Throughput and Low Latency Software-Defined Radio on Multicore CPUs".

Volume 37, Number 3, February 2025
Research Article
- Bhanu Pratap, Ayush Singh

, Pawan Singh Mehra
:
REHAS: Robust and Efficient Hyperelliptic Curve-Based Authentication Scheme for Internet of Drones. - Heda Wang

, Shuyan Zhang:
Research on the Application of Improved BERT-DPCNN Model in Chinese News Text Classification. - Xiaowen Chen, Jian Lv, Qingsheng Xie

:
Fatigue Detection Based on Blood Volume Pulse Signal and Multi-Physical Features. - Zexin Zhang

:
Enhancing Invariant Feature Learning via Cross-Composition and Self-Enrichment Normalization for Visible-Infrared Person Re-Identification.
Special Issue Paper
- Pedro Moritz de Carvalho Neto, Márcio Castro

, Frank Siqueira:
Dynamic Load Balancing in Kubernetes Environments With Kubernetes Scheduling Extension (KSE).
Review Article
- Omar Ben Maaouia

, Hazem Fkaier, Christophe Cérin, Mohamed Jemni
:
An Efficient Services Placement for Optimizing the Energy Consumption in Volunteer Cloud Computing.
Research Article
- Qiang Li, Feng Zhao, Linlin Zhao, Maokai Liu, Yubo Wang, Shuo Zhang, Yuanyuan Guo, Shunlu Wang, Weigang Wang:

A System of Multimodal Image-Text Retrieval Based on Pre-Trained Models Fusion. - Qiang Qian, Ping Ma

, Nini Wang, Hongli Zhang, Cong Wang, Xinkai Li:
Research on Industrial Process Fault Diagnosis Based on Deep Spatiotemporal Fusion Graph Convolutional Network. - Jie Wen, Qian Wang, Haozhe Dong, Zhihua Cui

:
Personalized Indicator Based Evolutionary Algorithm for Uncertain Constrained Many-Objective Optimization Problem With Interval Functions.
Special Issue Paper
- Hüseyin Can Önel

, Ali Ata Adam
, Nilay Sezer-Uzol
:
Comparative Aerodynamic Analysis and Parallel Performance of 2D CFD Simulations of a VAWT Using Sliding Mesh Interface Method.
Research Article
- P. Vinayasree

, A. Mallikarjuna Reddy
:
A Reliable and Secure Permissioned Blockchain-Assisted Data Transfer Mechanism in Healthcare-Based Cyber-Physical Systems. - Jintao Jiao

, Lei Guo, Wensen Yu, Sheng Yang, Shaozi Li:
An Efficient Lattice-Based Heterogeneous Signcryption Scheme for VANETs.
Special Issue Paper
Research Article
- Qingpeng Li, Xinyue Hu, Jia Zhao

, Hao Cao:
Density Peak Clustering Algorithm Based on Shared Neighbors and Natural Neighbors and Analysis of Electricity Consumption Patterns.
Special Issue Paper
- Le Mai Weakley

, Scott Michael
, Laura Huber, Abhinav Thota
, Ben Fulton, Matthew Kusz:
Monitoring and Characterizing GPU Usage.
Research Article
- Jia Zhao

, Ming Chen, Jeng-Shyang Pan, Longzhe Han, Shenyu Qiu, Zhaoxiu Nie:
Contextual Information Aggregation and Multi-Scale Feature Fusion for Single Image De-Raining in Generative Adversarial Networks.
Special Issue Paper
- Tolga Büyüktanir, Mehmet S. Aktas:

On the Use of Embedding Techniques for Modeling User Navigational Behavior in Intelligent Prefetching Strategies.
Research Article
- Rupali Sachin Vairagade

, Priya Parkhi, Yogita Hande, Bhagyashree Hambarde:
Blockchain-Powered Framework for Trust Enhancement in FinTech: A Comprehensive Trust Evaluation Approach.
Special Issue Paper
- Shunsuke Tsukiyama, Koji Nakano

, Yasuaki Ito
, Takumi Kato, Yuya Kawamata:
Ising Models for Solving the N-Queens Puzzle Based on the Domain-Wall Vectors.
Research Article
- Boykuziev Ilkhom

, Angshuman Khan
, Rupayan Das
, Abdurakhimov Bakhtiyor
:
A Novel Approach to Integer Factorization: A Paradigm in Cryptography.
Special Issue Paper
- Tandac F. Guclu

, Busra Tayhan
, Ebru Çetin
, Ali Rana Atilgan
, Canan Atilgan
:
High Throughput Mutational Scanning of a Protein via Alchemistry on a High-Performance Computing Resource.
Research Article
- Abhinav Tomar

, Geetanjali Rathee:
Optimized Framework for Composite Cloud Service Selection: A Computational Intelligence-Driven Approach.
Special Issue Paper
- Mateus S. de Melo, Roberto Pinto Souto

, Lúcia M. A. Drummond
:
Optimized Execution of a Numerical Weather Forecast Model in a Cloud Cluster.
Research Article
- Raushan Kumar Singh

, Mukesh Kumar:
Optimization of Path for Road Network With Modified Ant Colony Optimization (MACO). - Pragya

, Bijendra Kumar:
Enhanced IPv6 Addressing Scheme: Irreversible Elegant Pairing for Reconnaissance Attack Prevention. - Yangyang Shen

, Jing Wu, Minfu Ma, Xiaofeng Du, Datian Niu:
Application of an Improved Differential Evolution Algorithm in Practical Engineering. - Xiaohan Wang

, Xuehui Du, Hengyi Lv, Siyuan Shang
, Aodi Liu
:
Unstructured Text Data Security Attribute Mining Method Based on Multi-Model Collaboration. - Xue Li, Yang Xiang, Lan Ma, Hong Li

, Huawei Wang, Lili Cai, Shuai Lu, Chao Tang, Xilian Wei:
Probabilistic Risk Analysis for Catenary System of Heavy-Haul Railway Based on Casual Inference. - Sunil Kumar, Gaurav Mittal, Arvind Yadav

:
Three Party Post Quantum Secure Lattice Based Construction of Authenticated Key Establishment Protocol for Mobile Communication.
Special Issue Paper
- Qingquan Tong, Rongju Yao

:
Integrating Embedding and LSHiForest in English Text Anomaly Detection.
Research Article
- Changcheng Wei, Juanyan Fang

, Zhu Xu, Jinbao Meng, Zenglu Ye, Yipeng Wang, Tumennast Erdenebold
:
YOLOv8-ESW: An Improved Oncomelania hupensis Detection Model. - Hong Chen

, Jianxun Liu
, Zhifeng Zhu
:
A Dynamic Energy-Efficient Scheduling Method for Periodic Workflows Based on Collaboration of Edge-Cloud Computing Resources. - Arash Heidari

, Mohammad Ali Jabraeil Jamali
, Nima Jafari Navimipour:
An Innovative Performance Assessment Method for Increasing the Efficiency of AODV Routing Protocol in VANETs Through Colored Timed Petri Nets.
Volume 37, Numbers 4-5, February 2025
Special Issue Paper
- Maxime Dresler, Sanaï Mansour, Safaâ Talhaoui, Yukiko Yamauchi

, Sébastien Tixeuil:
On Dynamics of Basic Network Creation Games With Non-Uniform Communication Interest.
Research Article
- Tao Ye, Zhihua Cui

:
Dynamic Multi-Objective Workflow Scheduling Model in Cloud Environment Based on Adaptive Mutation Strategy. - Neda Matin

, Mina Zolfy Lighvan, Najibeh Farzi Veijouyeh
:
Convolutional Neural Networks for Imbalanced Advanced Security Network Metrics and Non-Payload-Based Obfuscations Dataset to Detect Intrusion. - Remya Kommadath

, Debasis Maharana
, Prakash Kotecha:
Multiobjective Phase-Wise Teaching Learning-Based Optimization With No-Wait Time Heuristic for Job Shop Scheduling Problem.
Special Issue Paper
- Luis C. R. Alvarenga, Yuri Frota, Daniel de Oliveira

, Rafaelli Coutinho:
Optimizing Resource Estimation for Scientific Workflows in HPC Environments: A Layered-Bucket Heuristic Approach.
Research Article
- Zhixiang Zhao

, Yanxia Wu, Guoyin Zhang, Yiqing Yang, Ruize Hong:
Recursive Hybrid Compression for Sparse Matrix-Vector Multiplication on GPU. - Wenping Chen, Huibin Wang

, Zhe Chen, Lili Zhang:
Research on Multi-Scale Parallel Joint Optimization CNN for Arrhythmia Diagnosis. - Zixia Chen

, Tingquan Gu, Zelin Chen, Bingda Zhang:
Task Allocation Algorithm and Simulation Analysis for Multiple AMRs in Digital-Intelligent Warehouses. - Suhail Muhammad Kamal, Yidong Chen, Shaozi Li:

Advancing Continuous Sign Language Recognition Through Denoising Diffusion Transformer-Based Spatial-Temporal Enhancement. - Yanyan Wu, Yajun Xie, Yintao Hong:

The DeepLabV3+ Algorithm Combined With the ResNeXt Network for Medical Image Segmentation. - Hussein Younis, Mohammad M. N. Hamarsheh

:
ONOS Flood Defender: A Real-Time Flood Attacks Detection and Mitigation System in SDN Networks.
Special Issue Paper
- Guoquan Yuan, Xinjian Zhao, Shuaiqi Zhang

, Shi Chen, Shanming Wei:
A Robust Watermarking for Camera-Captured Images Using Few-Shot Learning and Simulated Noise Layer. - Ensar Atasoy

, Burhan Çuhadaroglu
:
Numerical Analysis of the Effetcs of Blended Split Winglets on Aerodynamic Performance of Aircraft.
Research Article
- Zhiwen Wang, Jiexia Huang, Junlin Huang, Yuhang Wang, Canlong Zhang

:
PM2.5 Concentration Prediction Using CNN-LSTM Model Based on Multi-Feature Fusion. - Ruoxi Wang, Yujia Zhu, Daoxun Xia

:
Cascade Ownership Verification Framework Based on Invisible Watermark for Model Copyright Protection. - Shweta Kushwaha

, Ravi Shankar Singh, Kanika Prajapati:
Multi-Objective Workflow Scheduling in Cloud Using Archimedes Optimization Algorithm. - Yashuang Mu

, Tian Liu, Wenqiang Zhang, Hongyue Guo, Lidong Wang
, Xiaodong Liu
:
A Distributed Information Granulation Method for Time Series Clustering. - Wenjian Feng, Zhiwen Wang, Chunmiao Wei, Xinhui Jiang, Yuhang Wang, Jiexia Huang:

Low-Light Image Enhancement Algorithm Based on Improved MSRCP With Chromaticity Preservation. - Mohamed Amine Laamari

, Nadjet Kamel:
A New Multi-Objective Binary Bat Algorithm for Feature Selection in Intrusion Detection Systems. - Morteza Jouyban, Soodeh Hosseini

:
Dynamic Model of Malware Propagation Based on Community Structure in Heterogeneous Networks. - Zilin Xia, Zedong Huang, Jinan Gu, Wenbo Wang:

Surface Defect Detector Based on Deformable Convolution and Lightweight Multi-Scale Attention. - Rangu Manjula

, Naveen Chauhan:
ProACT: Probabilistic Analysis and Countermeasures Tool for Blockchain Supply Chains With Smart Contracts Composition.
Special Issue Paper
- Seyma Cihan

, Adnan Ozsoy
, Oya Deniz Beyan:
Managing Clinical Research on Blockchain Using FAIR Principles. - Lucas Roges, Tiago Ferreto

:
Multi-Objective Dynamic Registry Provisioning in Edge Computing Infrastructures. - Xingyuan Kang

, Keichi Takahashi, Chawanat Nakasan, Kohei Ichikawa
, Hajimu Iida:
Load-Aware Multi-Objective Optimization of Controller and Datastore Placement in Distributed Sdns.
Research Article
- Man Zhang, Zheng Kou

:
Difference and Influencing Factors of the City Logistics Development Level in China. - N. Saravana Kumar

, S. Selvakumara Samy:
Cold Start Prediction and Provisioning Optimization in Serverless Computing Using Deep Learning.
Retraction
- RETRACTION: Brain Tumor Segmentation and Overall Survival Period Prediction in Glioblastoma Multiforme Using Radiomic Features.

- RETRACTION: An Integrated Framework for COVID-19 Classification Based on Classical and Quantum Transfer Learning from a Chest Radiograph.

- RETRACTION: An Efficient Medical Image Super Resolution Based on Piecewise Linear Regression Strategy Using Domain Transform Filtering.

- RETRACTION: A Multi-modality Paradigm for CT and MRI Fusion with Applications of Quantum Image Processing.

Research Article
- Chuqi Yan

, Jianqiang Huang
:
An Efficient Parallel Ordered Depth-First Search Strategy for Directed Acyclic Graphs. - Tasnim Assali

, Zayneb Trabelsi Ayoub
, Sofiane Ouni
:
Synergistic Distributed CNN Model for Protein Classification With a Collaborative BSP Synchronization Based on LSTM Prediction. - Yuchen Hou

, Buqing Cao
, Jianxun Liu
, Changyun Li, Min Shi:
TPST: A Traffic Flow Prediction Model Based on Spatial-Temporal Identity. - Xing Lu, Fengshan Lai, Zhixiang Cao, Daoxun Xia

:
ARTransformer: An Architecture of Resolution Representation Learning for Cross-Resolution Person Re-Identification. - Yuting Zhang, Yangfeng Wu, Huang Xu, Yajun Xie, Yan Zhang:

Improved Co-DETR With Dropkey and Its Application to Hot Work Detection. - Shu-Rong Yan, Mohadeseh Nadershahi, Wei Guo, Ebrahim Ghaderpour

, Ardashir Mohammadzadeh:
A Multi-Objective Decision-Making Neural Network: Effective Structure and Learning Method. - Nengfu Cai

, Yi Jiang, Haitao Zhang, Zhiwen Yang, Laicheng Zhong, Qi Chen:
HCRP-OSD: Fine-Grained Open-Set Intrusion Detection Based on Hybrid Convolution and Adversarial Reciprocal Points Learning. - Huipeng Chen

, Xinglei Yu
, Shaopeng Zhu
, Zhijun Wu, Chou Jay Tsai Chien, Junjie Zhu, Rougang Zhou:
Adaptive Slip Control of Distributed Electric Drive Vehicles Based on Improved PSO-BPNN-PID. - S. Kanthimathi

, R. Sivakami, B. Indira:
Modified Cryptosystem-Based Authentication Protocol for Internet of Things in Fog Networks.
Special Issue Paper
- Ismail H. Toroslu

, Gadir Suleymanli:
Efficient Parallel Algorithm for Approximating Betweenness Centrality Values of Top k Nodes in Large Graphs.
Research Article
- Vinu Josephraj

, S. Wilfred Franklin
:
A Comprehensive Reinforcement Learning Framework for Priority-Aware Data Center Scheduling Optimization and QOS-Defined Buffer Management. - Soumyaranjan Panda

, Vikas Pareek, Sanjay Saxena:
Fv-SFL: A Contrastive Learning-Based Feature Sharing Method for Reducing the Effect of Label Skewed Data Heterogeneity in Federated Medical Imaging.
Special Issue Paper
- Tung Nguyen

, Hideyuki Kawashima:
Fairly Decentralizing a Hybrid Concurrency Control Protocol for Real-Time Database Systems.
Research Article
- J. C. Miraclin Joyce Pamila

, Ramar Senthamil Selvi
:
Improved SVM-Recursive Feature Elimination (ISVM-RFE) Based Feature Selection for Bigdata Classification Under Map Reduce Framework.
Volume 37, Numbers 6-8, April 2025
Research Article
- Wen Zeng, Wenjing Yan, Emily Simpson, Carlos Molina-Jiménez

:
Quantitative Risk Assessment for Cloud-Based Software Migration Processes.
Special Issue Paper
- Xue Li

, Mingxing Liu, Lanshun Nie, Wenxiao Cheng, Xiaohe Wu, Dechen Zhan:
S2C-HAR: A Semi-Supervised Human Activity Recognition Framework Based on Contrastive Learning. - Zhaokun Chen, Qin Xie, Wei Jiang

:
Hybrid Deep Learning Models for Tennis Action Recognition: Enhancing Professional Training Through CNN-BiLSTM Integration. - Baoqing Tai, Xianxian Yang, Ju Chong, Lei Chen

:
Personalized Self-Directed Learning Recommendation System Based on Social Knowledge in Distributed Web.
Research Article
- Zhaolu Zuo

, Jie Wang, Jing Wang:
Stereo Calibration of Non-Overlapping FOV Cameras With Phase-Shifting Wedge Grating. - Tianbao Liu

, Yang Li, Xiwen Qin:
Enhanced Gradient-Based Optimizer Algorithm With Multi-Strategy for Feature Selection. - Akanksha Singh, Harish Chandra

, Saurabh Rana:
A Robust Lattice-Based Post-Quantum Three-Party Key Exchange Scheme for Mobile Devices. - Girish Talmale

, Urmila Shrawankar
:
Analysis and Performance Measure of Dynamic Cluster Based Hierarchical Real Time Scheduling for Distributed Systems.
Special Issue Paper
- Hemraj Raikwar

, Harshil Sadharakiya, Sushanta Karmakar:
Dynamic Algorithms for Approximate Steiner Trees.
Research Article
- Yuan Zeng

, Hengzhou Ye, Gaoxing Li:
Adaptive Dynamic Service Placement Approach for Edge-Enabled Vehicular Networks Based on SAC and RF. - Qingqing Wu, Tinghong Gao

:
Machine Learning-Based Modeling of Clinical Diagnosis and Treatment of Patients With Hemorrhagic Stroke. - Sinchan Sengupta

, Sathya Peri:
On Reducing Stretch in Spanning Trees. - Lei Tan

, Xinmin Song:
Quadratic Estimation for Discrete Time System With State Equality Constraints and Composite Disturbances.
Special Issue Paper
- Ryuji Ukai

, Chihiro Yoshimura, Hiroyuki Mizuno:
Quantum Computer Architecture for Quantum Error Correction With Distributing Process to Multiple Temperature Layers. - Bruno Silva, Luiz Guerreiro Lopes

:
GPU Acceleration of the GWO Optimization Algorithm: Application to the Solution of Large Nonlinear Equation Systems.
Research Article
- Manvitha Gali

, Aditya Mahamkali:
Deep Learning Based Attack Detection and QoS Aware Secure Routing Protocol for SDN-IoT Network.
Special Issue Paper
- Kemal Ebcioglu, Batuhan Bulut, Atakan Dogan

, Gürhan Küçük, Ismail San
:
1,024-FPGA DES Supercomputer on the AWS Cloud. - Qiang Ren, Chengmingchan Yan, Fumin Zou, Yue Xing, Haolin Wang

, Ying Zhang
:
Real-Time Monitoring of On-Board Unit Status in Highway Electronic Toll Collection Systems Using Graphsage-Based Heterogeneous Graph Learning. - Baoqing Tai, Xianxian Yang, Ju Chong, Lei Chen

:
An Efficient Hybrid Recommender System for e-Learning Based on Cloud Content in Educational Web Services. - Wangyong Guo

, Siyang Shao, Kexin Zhang, Rongqiang Feng, Xueqiong Wu, Zhihao Zhang:
Privacy-Preserving Real-Time Smart Grid Topology Analysis: A Graph Neural Networks Approach.
Volume 37, Numbers 9-11, May 2025
Research Article
- Wenbin Yao, Longcan Hu

, Yingying Hou:
A Distributed Parallel Network Intrusion Detection System Based on Ray Framework With GPU Acceleration. - G. Arul Dalton

, Augusteen Bamila Virgin Louis
, A. Ramachandran
, J. Savija
:
Modified Deep Learning Model in Proactive Decision-Making for Handover Management in 5G. - Sanfeng Zhang

, Hongzhen Xu, Xiaojun Yu:
CGKDFL: A Federated Learning Approach Based on Client Clustering and Generator-Based Knowledge Distillation for Heterogeneous Data. - Tarek Ramadan

, Nathan Pinnow, Chase Phelps, Jayaraman J. Thiagarajan, Tanzima Z. Islam
:
Structure-Aware Representation Learning for Effective Performance Prediction. - Rhauani Weber Aita Fazul

, Odorico Machado Mendizabal
, Patrícia Pitthan Barcelos
:
DARB: A Dynamic Architecture for Data Replica Balancing. - Le Xu

, Yong Xu:
A Multi-Scenario Multi-Period Facility Location-Allocation Model and Algorithm for Pre-Disaster Planning. - Nupur Jangu

, Zahid Raza
:
A Modified Jellyfish Search Algorithm for Task Scheduling in Fog-Cloud Systems.
Special Issue Paper
- Caio Von Rondow Morais, Jeronimo Penha, José Augusto Miranda Nacif

, Ricardo S. Ferreira
:
Unblocking Placement and Routing in Rearrangeable Multi-Stage Networks.
Research Article
- Anita Thakur

, Virender Ranga
, Ritu Agarwal:
Revocable and Privacy-Preserving CP-ABE Scheme for Secure mHealth Data Access in Blockchain. - Nadia Dahmani, Hatem Aziza

, Hajer Ben-Romdhane
, Saoussen Krichen:
Multi-Criteria Optimization of Scientific Workflow Schedules for Improved Energy Efficiency in Cloud Infrastructures. - K. Aruna:

Secure Attestation and Dynamic Load Balancing (SALB) for Optimized Container Management: Ensuring Integrity and Enhancing Resource Efficiency.
Special Issue Paper
- Meirong Zheng, Ruchun Jia

, Jing Zhu, Shaorong Zhang, Wenlong Yao, Yuanbin Li:
Intelligent Network Security Optimization Algorithm Based on Cnns. - Shugui Lin, Wei Zhang, Ruchun Jia

, Haitao Deng, Linyuan Li, Jianjun Zhou, Ze Li:
Optimization of Anti-Tampering Method for Financial Data in Edge Intelligent Systems Based on Support Vector Machine.
Research Article
- Yujia Zhu, Jia Luo, Ruoxi Wang, Xiaojie Du, Daoxun Xia

:
Multiuser Hierarchical Authorization Using Sparsity Polarization Pruning for Model Active Protection. - Zewei Zhang

, Taoshen Li, Linfeng Yang:
Adaptive Hierarchical Offloading for Mobile Edge Computing in High-Mobility SWIPT-Enabled Networks. - Yaru Zhao

, Jianbiao Zhang, Yihao Cao
, Xianqun Han:
MOFDRNet: A Model for Data Leakage Attacks in Federated Learning. - Seyed Ebrahim Dashti

, Wassan Sajit Nasser Al-Jabri, Ali Farzanehmehr
:
Detecting Network Security Bypass Threats Using Machine Learning Methods: Detecting Intruders on the Network. - Yu Mao

, Chunyu Shi, Zhiyi Cai, Hui Chen, Lei Guo
:
Hierarchical Feature Selection Based on Instance Correlation and Label Semantic Structure. - Tiantian Zhang

, Ying Wang, Bo Gong, Jianbo Xu, Junjie Wu, Changxu Wan:
Privacy Protection During the Issuance and Revocation of Verifiable Credentials in Self-Sovereign Identity. - Anuradha Banerjee

, Sachin Kumar Gupta
, Vinod Kumar
:
A Genetic Algorithm-Based Approach for Collision Avoidance in a Multi-UAV Disaster Mitigation Deployment. - Yujia Xie

, Dongmei Li, Xiaomei Zhang, Wenjing Lv:
A Traceable and Anonymous Mutual Authentication Scheme for Smart Healthcare on Elliptic Curves. - Nouf A. AlSowaygh

, Mohammed J. F. Alenazi
, Maazen Alsabaan:
SCGG: Smart City Network Topology Graph Generator. - Bin Deng, Hao Guo, Weidong Li

:
An Alternative Mechanism for Multiresource Fair Allocation in Heterogeneous Cloud Computing Systems. - Fulong Li

, Fanlong Zhang, Yuhang Wu, Zhuowei Wang
, Quan Chen
, Yuan Chai, Yongchao Tao:
Toward Latency-Efficient Multicast Coflow Scheduling for Reconfigurable Data Center Networks. - Han Wang

, Balaji Muthurathinam Panneer Chelvan, Muhammed Golec
, Sukhpal Singh Gill
, Steve Uhlig
:
HealthEdgeAI: GAI and XAI Based Healthcare System for Sustainable Edge AI and Cloud Computing Environments. - Jiawei Chen, Jiayi Zhong, Guosheng Kang

, Jianxun Liu
, Yiping Wen
:
Variantrank: Business Process Event Log Sampling Based on Importance of Trace Variants.
Special Issue Paper
- Yonghao Yu

, Dawei Zhao, Yongwei Tang, WengTak Kuok, Wei Ding:
High-Precision Indoor Visible Light Positioning Method for Line-Of-Sight Scenes Based on a Spatiotemporal Sequence Attention Mechanism.
Research Article
- Anupam Yadav, Ashish Sharma

:
A New Approach to Cloud Resource Scheduling Using Genetic Reinforcement Kernel Optimization and Machine Learning Model. - Siyi Chen, Haiyang Kuang

, Jiaxin Zhou, Jin Liu:
Customer-Satisfaction and Risk-Aware Pricing Policy for Profit Maximization in Cloud Computing. - K. P. Uvarajan

, Kishore Balasubramanian
, C. Gowri Shankar:
Unveiling the Invisible: Powering Security Threat Detection in WSN With AI. - Junhu Peng

, Tao Peng
, Can Tang, Xingxing Xie:
A Multi-Strategy Fusion for Mobile Robot Path Planning via Dung Beetle Optimization. - Rahul Singh, Laxminarayan Das, Dharminder Chaudhary

:
Building Scalable and Quantum Attack Resistant Authenticated Message Delivery System for Internet of Vehicles With Blockchain Consensus Mechanism.
Special Issue Paper
- Xin Zhao, Haotian Zheng, Qiyun Zhang

:
Modern Advances in Artificial Intelligence Across the Athletic Domain.
Research Article
- Gezi Shi

, Jing Li, Tangbao Zou, Haiyan Yu, Feng Zhao:
Density Viewpoint Clustering Outlier Detection Algorithm With Feature Weight and Entropy. - Yuling Luo, Bingxiong Jiang, Sheng Qin

, Qiang Fu, Shunsheng Zhang:
EEG-Based Epilepsy Recognition via Federated Learning With Differential Privacy. - Mohamed Lehsaini

, Anas Nawfel Saidi, Tawfiq Nebbou, Pascal Lorenz:
Efficient Routing Protocol Using Fresh Vehicular Traffic Information for VANETs. - Qiang Peng

, Renjun Zhan, Husheng Wu
, Aiai Wang, Yuanda Lai:
A Multi-Strategy Enhanced Wolf Pack Algorithm for Three-Dimensional Path Planning of Unmanned Aerial Vehicles. - Shuilin Chen

, Jianguo Zheng:
Discrete Gray Wolf Optimizer for Solving Distributed Permutation Flowshop Scheduling Problem. - K. Viswanathan Iyer

, Karthick Seshadri
, K. Srinivasulu
:
An Advancement in Huffman Coding With a Potential for Parallel Decoding. - Gubao Mao

, Xianwen Fang
, Ke Lu
:
Business Process Anomaly Behavior Detection Method Based on Multiperspective Association Rules. - Shuqi Niu, Zhao Zhang

, Hongyan Zhou
, Xue-Bo Chen
:
Short-Term Power Load Prediction Based on Cluster Analysis and Temporal Convolutional Networks of Attention Mechanism. - Minni Jain

, Aditya Gupta, Aaryan Arora, Aayush Patel:
Ranking Influential Nodes in Social Networks Based on the Game of Thieves Algorithm.
Volume 37, Numbers 12-14, 2025
- Jiatang Cheng

, Kaike Tu, Yan Xiong:
Cuckoo Search Algorithm With Ensemble Strategy for Continuous Optimization Problems. - Mahesh P. Wankhade

, Dharmendra G. Ganage
, Megha M. Wankhade
, Yugendra Chincholkar
:
Effective Cluster Head and Routing Scheme Estimation Using Mixed Attention-Based Drift Enabled Federated Deep Reinforcement Learning in Wireless Sensor Networks. - Ruirui Gao, Shuai Shang, Wenqi Zhang, Xiaofen Wang, Ke Huang, Xiong Li

:
Vupsi: Verifiable Unbalanced Private Set Intersection Based on Homomorphic Encryption. - Gongli Li, Weichen Liu

, Lu Li:
Verifiable Cloud-Assisted Multi-Party Private Set Intersection Cardinality. - Tinggui Chen

, Jiawen Ye, Yanping Zhou, Qing Yu, Shanshan Wang, Gongfa Li:
Prediction of Carbon Emission Rights Trading Prices Based on the CNN-LSTM Model in the Context of Carbon Peak: Taking Guangdong Province as an Example. - Paraskevi Kritopoulou

, Georgios Loupas, Eleftheria Lagiokapa, Nefeli Georgakopoulou, Sotiris Diplaris, Stefanos Vrochidis:
Design of a Configurable Acoustic Sensor Network for Privacy-Compliant Urban Soundscape Recordings. - Biraja Prasad Nayak

, Lopamudra Hota, Ashok Kumar Turuk
, Arun Kumar:
Enhancing VANET Safety Communications With AHP-Based Resource Allocation. - Ajay Nain

, Sophiya Sheikh
, Mohammad Shahid:
An Efficient Load Distribution Approach for Optimizing Resources in SDN-Based Edge Computing Environment. - Huifang Liu, Huilin Ye, Yunfeng Ye

:
Construction and Application of a Digital Platform for Charitable Cultural Resources Integrating VR Technology and BiGRU. - Deepak Kumar Mishra, Pawan Singh Mehra

:
Exploring Blockchain-Based Patient-Centric Healthcare: A Comprehensive Review. - Henrique Correia Torres Santos

, Luciano S. de Souza, Jonathan H. A. de Carvalho, Tiago A. E. Ferreira:
PESC - Parallel Experience for Sequential Code. - Xinyan Zhang, Jing Fang

:
Prediction of Network Public Opinion Evolution Trends in Emergent Hot Events. - Johannes Pekkilä

, Oskar Lappi
, Fredrik Robertsen, Maarit J. Korpi-Lagg
:
Stencil Computations on AMD and Nvidia Graphics Processors: Performance and Tuning Strategies. - Priyadarshni Gupta

, Praveen Kumar, Shivani Tripathi, Rajiv Misra:
BRL-Net: A Blockchain-Based Task Offloading Framework Using Smart Contracts for Metaverse. - Insaf Achour

, Hanen Idoudi, Samiha Ayed:
Access Control Modeling and Validation for Ethereum Smart Contracts. - Hongjiao Li, Ming Jin

, Jiayi Xu, Zhenya Shi, Anyang Yin:
SS-LDP: A Framework for Sparse Streaming Data Collection Based on Local Differential Privacy. - Jaishree Mayank

, Arijit Mondal
:
A Unified Job Scheduler for Optimization of Different System Performance Metrics. - Juan José Moreno, Savíns Puertas-Martín, Juana López Redondo, Pilar M. Ortigosa

, Ester M. Garzón:
Where High-Performance Computing Meets Radiotherapy for Enhanced Intensity-Modulated Radiation Therapy Planning. - Guosheng Kang

, Zhen Wang
, Hangyu Cheng, JianXun Liu
, Yiping Wen
, Jun Peng:
Modeling Multilevel Business Process Monitoring via BPMN Extension. - Archana Archana

, Narander Kumar
:
A S-Threshold Method to Perform Horizontal Auto-Scaling in a Cloud Computing Environment. - Afaf Benaouda Chaht

, Mohammed Bencheikh
, Chakib Mustapha Anouar Zouaoui, Abdennacer Bounoua, Nasreddine Taleb, Mohamed Naimi
:
An Effective Load-Balancing Approach for Multicast IPTV Traffic in Multihoming Networks. - Zhaoqian Zhang

, Di Wu, Qiang Zhu, Wei Qin:
Blockchain-Based Ciphertext-Policy Attribute-Based Encryption for Controlled Multi-User Collaboration. - Ruizhong Du, Ziyuan Wang, Yuan Wan:

A Multi-Level Role-Based Provable Data Possession Scheme for Medical Cloud Storage. - Yongwang Song, Haiyan Jiang

:
Hockey Trajectory Prediction Combining Visual Object Alignment Algorithm and Template Matching Model. - Zexin Zhang

:
Weak-Strong Synergy Learning With Random Grayscale Substitution for Cross-Modality Person Re-Identification. - Mustafa Özdemir

:
Predicting the Best Green Growth Performance With Integrated Intuitionistic Fuzzy and Metaheuristic Algorithms. - Mustafa Etcil

, Bilge Kagan Dedeturk
, Burak Kolukisa
, Burcu Bakir-Gungor, Vehbi Cagri Gungor:
Breast Cancer Detection Using a New Parallel Hybrid Logistic Regression Model Trained by Particle Swarm Optimization and Clonal Selection Algorithms. - Kun Zeng

, Zhonghua Peng, Zuoyong Li
, Yun Chen, Feng Chen, Nanbing Wu:
Multi-Modal Anomalous Driving Behavior Detection With Adaptive Masking. - Zhaoqian Zhang

, Di Wu, Shang Gao:
Attribute-Based Access Control With Credible Outsourcing and Collusion-Resistant Revocation Based on Blockchain for Iomt.
Volume 37, Numbers 15-17, 2025
- Kajal Tiwari

, Sanjay Kumar:
Accelerating Healthcare Data Access: A Blockchain and Decentralized Indexing Approach. - Jia Deng

, Jianxun Liu
, Yi Liu, Yiming Yin, Yong Xiao:
An Android API Recommendation Approach Based on API Dependency Paths Learning. - Vaibhav Pandey

, Poonam Saini, Mansi Gupta, Aditya Bhardwaj:
Dynamic Job Scheduling for Energy Savings in YARN: A Comparative Study With Benchmark Workloads. - P. Lakshmiramana

, A. Vadivel:
Secuyolo: Secure Object Detection Framework With Darknet-53 and CBAM in Edge Devices. - Mohd Anas Wajid

, Shaharyar Alam Ansari
, Mohammad Luqman, Mohammad Khubeb Siddiqui, Mohammad Saif Wajid
:
GSR-C2N: Graph Feature Extracted Spar-Raven Optimized CNN Based Crypto Mining Framework. - Yi-Peng Shang-Guan, Jie-Sheng Wang

, Yong-Cheng Sun, Yu-Wei Song, Yu-Liang Qi:
Multi-Strategy Fusion Binary Zebra Optimization Algorithm for Solving Complex Industrial Process Data Feature Selection and Prediction Models. - Cristian Campos

, Rafael Asenjo
, Javier Hormigo
, Angeles G. Navarro
:
Leveraging SYCL for Heterogeneous cDTW Computation on CPU, GPU, and FPGA. - Bing Tang

, Haiyan Li, Wei Xu, Buqing Cao
, Qing Yang:
Energy-Latency Tradeoffs for Service Placement Based on Reinforcement Learning in Edge Computing. - Biao Gan, Xiaoxia Jin

:
Integration of Knowledge Graph and CNN-GRU in College Students' Mental Health Education and Psychological Crisis Intervention. - Qingzhi Liu, Changbo Chen

, Hanwen Dai:
Fusing the Polyhedral and Tensor Compilers to Accelerate Scientific Computing Kernels. - Xuchao Liu

, Jiayang Li:
Defect Detection of Prefabricated Building Components With Integrated YOLOv5s-GhostNet. - Hema Priya Natarajan

:
Privacy Preserving Federated Reinforcement Imitation Learning Framework With Robust Aggregation for Cloud-Based Domestic Robots. - Lucas Bragança da Silva

, César Grandis, Jeronimo Penha, José Augusto Miranda Nacif
, Ricardo S. Ferreira
:
Reconfigurable Domain-Specific Architectures Based on Coarse-Grained Operators in High-Performance FPGAs. - Kang Wang

, Xin Zeng, Sujie Xian, Zhongxin Li, Zhilin Wu:
HKSCSO: A Novel Enhanced Sand Cat Swarm Optimization Algorithm for UAV Three-Dimensional Path Planning. - Ioannis Vardas

, Jesper Larsson Träff, Ruben Laso
, Sascha Hunold:
Mpisee: Communicator-Centric Profiling of MPI Applications. - P. Sridhar

, Sathiya R. R
:
Cloud Workload Forecasting via Latency-Aware Time Series Clustering-Based Scheduling Technique. - Md Akram Khan, Bibudatta Sahoo, Sambit Kumar Mishra

:
Container Placement Using Penalty-Based PSO in the Cloud Data Center. - Yongqin Zhu

, Bojiang Xie:
Leveraging Traversal Tree for Node Pair Selection-Based Reliable IoT Network Construction. - Pinky

, Karan Verma
:
Enhanced Task Scheduling With Metaheuristics for Delay and Energy Optimization in Cloud-Fog Computing. - Somayeh Rahmani

, Vahid Khajehvand, Mohsen Torabian:
Entropy-Aware VM Selection and Placement in Cloud Data Centers. - Fengyi Gao

, Na Wang
, Jianwei Liu, Zhiquan Liu, Junsong Fu, Lunzhi Deng
:
A Verifiable and Efficient Multi-Keyword Fuzzy Rank Search Scheme Over Encrypted Data With Privacy-Preserving. - Huseyin Guney

:
A Fast-Optimizing and Adaptable Intrusion Detection System Based on Progressively Optimized Support Vector Machines. - Dawei Sun

, Jia Peng, Ting Zhu, Jonathan Kua, Shang Gao, Rajkumar Buyya
:
Toward High-Availability Distributed Stream Computing Systems via Checkpoint Adaptation. - Qikun Zhang

, Jinbo Feng, Ruifang Wang, Yongjiao Li, Junling Yuan, Yu-an Tan
:
An Access Control Model Against Attribute Guessing Attacks for Data Sharing in Cloud Computing Environment. - Mahdieh Khorashadizade, Soodeh Hosseini

, Morteza Jouyban:
An Improved Binary Slime Mold Algorithm for Intrusion Detection Systems. - Yan Zhang

, Yali Peng, Shengnan Wu, Shigang Liu:
Dual-Weighted Multiview Clustering Based on Anchor. - Shuguang Zhang, Lingjie Liu

, Xuntao Zhi, Yu Cheng, Xinyu Zheng, Yunlong Wang:
Shilling Attack Detection Method Integrating Item Temporal Information and Relational Networks. - Maryam Naghibi, Hamid Barati, Ali Barati

:
HDAMM: Hierarchical Geographical Data Aggregation Method Using Mobile Sink in Wireless Sensor Networks. - Jiaqi Li

:
RIES Low-Carbon Economic Dispatch With Improved WSO Algorithm Considering Integrated Demand Response. - Neeshu Rathi

, Sanjeev Kumar
:
Enhanced Quantum Ensemble Classification Algorithm With Shallow Circuit and Parallelism Mechanism. - Wisam Makki Alwash

, Mustafa Kara
, Muhammed Ali Aydin
, Hasan Hüseyin Balik
:
An Effective Federated Learning Approach for Secure and Private Scalable Intrusion Detection on the Internet of Vehicles. - Andavarapu Sravani

, Golagani Lavanya Devi
:
DSPCNN: Deep Spiking Parallel Convolutional Neural Network for Video Recommendation System. - A. Swaminathan

, R. Saravanan, Baskar Kasi, S. Ramaraju
:
A Novel Distributed Learning Approach for Detecting Covert Communications in Wireless Sensor Networks. - Linh Nguyen Thi My

, Vu Nguyen, Tham Vo:
Adaptive Deep Fuzzy Neural Network With Multi-Headed Self-Attention for Improving Performance of Social Network Representation Learning and Link Prediction. - Keyu Wang, Huailiang Tan

, Zaihong He
, Jinyou Li
, Keqin Li:
Innovative Bloom Filter-Based Multilevel Block Classification: A Practical Approach to Enhancing SSD Performance and Endurance.
Volume 37, Numbers 18-20, 2025
- Zhiqiang Zheng, Yiyang Li

, Zhi Weng, Xiaoding Wu
:
PMS-LoFTR: A Model for Cattle Identification Based on Image Matching. - Jianyong Zhu

, Hao Chen
, Hongtao Wang:
SDT-MCS: Topology-Aware Microservice Orchestration With Adaptive Learning in Cloud-Edge Environments. - Liu Kun, Wenbo Zhou

, Wang Hui, Zihao Shen, Peiqian Liu:
Privacy-Secure Asynchronous Federated Multimodal Pedestrian Trajectory Prediction Models. - Ahmed A. Mawgoud, Mohamed Hamed N. Taha

, Mohamed Loey, Mazhar Hussain Malik, Nour Eldeen Mahmoud Khalifa
:
Enhancing Data Privacy and Trust in E-Learning: A Blockchain-Based Access Control Protocol for Cloud Educational Systems. - Jie Xu

, Zikang Li, Jianping Chen
:
Feature Extraction Algorithm Based on Maximizing Circular Margin Discriminant Analysis. - Changhong Zhu, Haitao Zhang

, Xingtao Xu:
DualRT: A Qos-Aware Soft Real-Time Video Analytics Framework for Dual-Stage GPU-CPU Tasks on Edge. - Marcin Lawenda

, Kyrylo Khloponin, Krzesimir Samborski, Lukasz Szustak:
Profiling and Optimization of Multicard GPU Machine Learning Jobs. - Eht E. Sham, Pratibha Yadav, Deo Prakash Vidyarthi

:
Admission Control and Resource Provisioning in Fog-Integrated Cloud Using Modified Genetic Adaptive Neuro-Fuzzy Inference System. - Gadde Swetha

, Kurilinga Sannalingappa Ananda Kumar, Hanumantharao Nadendla, Nageswararao Eluri, Gowrisankar Kalakoti, Venkata Srinivasu Veesam
:
Quantum-Resilient Cloud Data Protection: A Novel Framework for Secure Encryption and Key Exchange. - Deyong Wu

, Zhiming Luo, Jiezhou He
, Shaozi Li:
Niching-Based Two-Stage Differential Evolution for Feature Selection. - Uma Meena

, Promila Sharma:
Deep Learning Based Secure Routing in WSN Using Hyper Ledger Fabric Block Chain Model. - Ricky Mohanty, Subhendu Kumar Pani, Abdulaziz S. Almazyad, Ali Wagdy Mohamed, Mehdi Hosseinzadeh

, Mohammad Shokouhifar
:
LWC2S2C: An Efficient Light-Weight Consensus Model for Context-Sensitive Sidechains in Blockchain Networks. - Fatma Akalin, Dilara Top:

Proposed Image Processing Filters to Improve Digital Image Perception for Color Blindness Types. - Hadi Ghahremani

, Masumeh Damrudi
, Ali Ghaffari
, Kamal Jadidy Aval
:
Quality of Service Enhancement in Mobile Crowdsensing Through Metaheuristic Techniques: A Survey. - Xiaoming Han, Kangjian Yang

, Yu Guo, Jin Xu:
Remaining Useful Life Prediction for Exciter Rolling Bearing Based on Self-Attentive CNN-GRU. - Hariprasath Manoharan

, Gayathri Devi P:
Security Frame Towards 6G Networks for Isolating False Data Using Artificial Intelligence Algorithm. - Jintao Liu, Wenjin Xue, Wei Liu, Guowei Xu, Jian Liu:

Enhanced YOLOv7 for EMU Damage Detection: Overcoming False Detection and Data Scarcity by Network Optimization and AIGC. - Kofi Sarpong Adu-Manu

, Charles Adjetey:
PoAD: A Scalable and Energy-Efficient Consensus Algorithm for Smart Contract Execution in Decentralized Systems. - Ahmed Saidi

, A. Ouadoud Khouri:
Enhancing Data Privacy in Intrusion Detection: A Federated Learning Framework With Differential Privacy. - Mohsen Fallah, Meisam Yadollahzadeh Tabari

, Mohammad Adabitabar Firozja, Homayun Motameni:
Intermodal Terminal Planning Using Timed Colored Petri Nets and Fuzzy Data Envelopment Analysis. - Jie Shen

, Xinran Du, Houqun Yang:
Improved Semantic Segmentation of High-Resolution Remote Sensing Data: Utilizing a Novel Enhanced Boundary-Aware Network for Efficient Processing. - Qiangqiang Niu

, Pengfei Wang:
Open-Pit Mine Autonomous Truck Dispatching: Many-Objective Joint Optimization Strategy Considering Uncertainties. - Jiahui Liu, Zhe Liu

, Baiqiang Hu, Zeling Hou:
A Framework for Parallel Segmentation of Lung Nodule Images Based on Reinforcement Learning Enhancement With Multiple Agents. - Dinesh Dash

, Rupayan Das
, Chandra Bhushan Kumar Yadav
:
Enhancing Wireless Sensor Durability via On-Demand Mobile Charging and Energy Estimation. - Jianwei Zhang

, Qinglong Wang
, Zengyu Cai, Kejun Wang, Liang Zhu:
Unknown Attack Detection Method Based on Deep Metric Learning. - Vidyullata Devmane

, B. K. Lande:
Secure Data Authentication for Remotely Stored Data Using Bilinear Pairing on Elliptic Curves With Optimized Data Block Size. - Fujun Wang

, Ziniu Shen, Yunfang Chen:
Automated Vulnerability Pre-Detection for Smart Contracts: A Blockchain-Based Data Sharing Platform With Incentivized Consensus. - Kavitapu Naga Siva Shankara Vara Prasad

, Dasari Haritha
:
Parallel Symmetric Appearance-Motion Framework With Diffusion and Refinement Blocks for Video Anomaly Detection System.
Volume 37, Numbers 21-22, 2025
- Sara Hameed, Syed Hashim Raza Bukhari

, Syeda Umm E. Abiha Rizvi, Meerab Tahir, Farhan Aadil
:
A Comparative Analysis on the Services Offered by Amazon Web Services and Microsoft Azure. - Zehra Karapinar Senturk

, Recep Guler, Yunus Özcan, Mehmet Gamsizkan:
Automated Classification of Skin Diseases Using Microscopic Images: A Machine Learning Approach. - Fatima Ziya, Sanjay Kumar

:
MetaLP-DGI: Meta-Learning-Based Link Prediction With Centrality-Aware Deep Graph Infomax Embeddings. - Dan Xia, Enyu Xu, Yuan Tian, Qiusha Min:

Optimal Control of Information Dissemination Based on Model-Free Reinforcement Learning. - Qi Yue, He Huang

, Yuan Tao:
Multi-Attribute Many-to-One Elderly Care Service Matching Group Decision-Making Considering Double Intermediaries. - Majd Alkorabi, Alireza Souri, Nihat Inanç:

Deep Learning Algorithms for Autonomous Vehicle Communications: Technical Insights and Open Challenges. - Biao Hu

, Xincheng Yang:
Mixed-Criticality Scheduling Toward Real-Time Applications in a Vehicular Edge Computing System. - Sayed Zabihullah Musawi, Mohammad Farshi

, Sepehr Ebrahimi Mood, Alireza Souri:
Enhancing the Harris Hawks Optimization Algorithm With Ambush-Based Operators for Feature Selection in UAV-Based Intrusion Detection Systems. - Pawel K. Radtke

, Tobias Weinzierl
:
Annotation-Guided AoS-to-SoA Conversions and GPU Offloading With Data Views in C++. - Jihua Ye, Wentao Geng

, Tiantian Wang, Youcai Zou, Chao Wang, Zhan Xu, Aiwen Jiang:
Dual-Branch Cross-Scale Texture Feature Fusion for Low-Resolution Face Recognition. - Anand Polamarasetti

:
Explainable Graph Neural Networks for Optimized Allocation in Spatio-Temporal Bike Sharing Demand Prediction. - Xu Yong, Sang Bicong, Zhang Yi:

Research on Optimization Algorithm and Application of Improved Northern Goshawk Based on Fusion Strategy. - Mohammad Ali Nezafat Tabalvandani

, Mirsaeid Hosseini Shirvani
:
A Survey Study on Meta-Heuristic-Based Web Service Composition Schemes in Cloud Computing Environments: Classification, Advantages, and Limitations. - Qizhao Zhou

, Zhongyu Shi:
Predictive VNF Deployment With Virtual Network Mapping Using SDN/NFV-Enabled UAV Swarms. - Hugo Alcaraz-Herrera, Michail-Antisthenis I. Tsompanas

, Igor Balaz, Andrew Adamatzky:
Optimizing the Substrate for Hypercube-Based Neuroevolution of Augmented Topologies to Design Soft Actuators. - Zhan Wen, Cheng Zhang

, Wenzao Li, Yanhe Na
, Dehao Ren:
C-CNPS: A Blockchain Sharding Network Model and Communication Strategy. - Vikas Kumar Jain

, Meenakshi Tripathi:
SmartSecure: An Integrated Semantic Vulnerability Mining Framework for Ethereum Smart Contract. - Kaushik Dehingia

, Nimisha Dutta:
Hybrid Quantum Key Distribution Framework: Integrating BB84, B92, E91, and GHZ Protocols for Enhanced Cryptographic Security. - Shahnawaz Ahmad

, Mohd. Nazim, Mohd Arif, Javed Ahmad, Shabana Mehfuz, Mohd. Aquib Ansari
:
Protecting Data in the Cloud: A Systematic Literature Review of Key Management. - Ibtihal Alablani

, Mohammed J. F. Alenazi
:
Robust Attack Detection Framework Using Pretrained CNN Model for the Edge Industrial IoT Networks. - Amina Ahmed Nacer

, Mohammed Riyadh Abdmeziem
:
Toward a Reinforcement Learning Approach for Balancing Risk and Cost in Cloud-Based IoT-Driven Business Processes. - Faming Lu, Xiaoyu Wang

, Qingtian Zeng, Guiyuan Yuan, Yunxia Bao:
Segment-Based May-Happen-in-Parallel Analysis for C Programs.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














