


default search action
Journal of Cloud Computing, Volume 14
Volume 14, Number 1, December 2025
- Mohammad A. Altahat
, Tariq Daradkeh, Anjali Agarwal:
Virtual machine scheduling and migration management across multi-cloud data centers: blockchain-based versus centralized frameworks. 1 - Peng Liu, Xinglong Wu, Yanjun Peng, Hangguan Shan, Saïd Mahmoudi, Bong Jun Choi, Haksrun Lao:
Trustworthy and efficient project scheduling in IIoT based on smart contracts and edge computing. 2 - K. Babu, A. Gokula Chandar, S. Kannadhasan
:
Prediction and diagnosis of cardiovascular disease using cloud and machine learning design. 3 - Jian Yu, Qiong Yu, Zhixing Lin, Xiangmei Xiao:
An approach for multipath optimal selection of network service combinations based on golden eagle optimizer with double learning strategies. 4 - Umesh Kumar Lilhore, Sarita Simaiya, Yogesh Kumar Sharma
, Anjani Kumar Rai, S. M. Padmaja, Khan Vajid Nabilal, Vimal Kumar, Roobaea Alroobaea
, Hamed Alsufyani:
Cloud-edge hybrid deep learning framework for scalable IoT resource optimization. 5 - Saulo Ferreira, Júlio Mendonça, Bruno C. S. Nogueira, Willy Tiengo, Ermeson Carneiro de Andrade:
Correction to: Impacts of data consistency levels in cloud-based NoSQL for data-intensive applications. 6 - Hao Feng, Haoyu Li, Yuming Liu, Kun Cao, Xiumin Zhou:
A novel virtual machine placement algorithm based on grey wolf optimization. 7 - Ting-Yan Lai, I-Ching Hsu:
Integrating semantic web into context-aware mobile application based on cloud computing. 8 - B. Bhasker, S. Kaliraj, C. Gobinath, V. Sivakumar:
Optimizing energy task offloading technique using IoMT cloud in healthcare applications. 9 - Jincheng Zhou, Umesh Kumar Lilhore, Poongodi M, Tao Hai, Sarita Simaiya, Dayang Norhayati Abang Jawawi, Deema Mohammed Alsekait, Sachin Ahuja, Cresantus N. Biamba, Mounir Hamdi:
Correction to: Comparative analysis of metaheuristic load balancing algorithms for efficient load balancing in cloud computing. 10 - Xianmei Hua, Xinrong Zhan, Feng Li, Junwen Lu:
Financial service composition with various privacy levels in multiple cloud environment. 11 - Zhang Ting-Ting, Chen Yan, Dong Ren-zhi, Chen Tao
, Liu Yan, Zhang Kai-Ge, Song Ai-Guo, Lan Yu-Shi:
Autonomous decision-making of UAV cluster with communication constraints based on reinforcement learning. 12 - Lionel Nkenyereye, Boon-Giin Lee
, Wan-Young Chung:
Functionality-aware offloading technique for scheduling containerized edge applications in IoT edge computing. 13 - Muhammad Younus, Eko Priyo Purnomo, Achmad Nurmandi, Dyah Mutiarin, Halimah Abdul Manaf, Fathiya Mumtaz, Tiara Khairunnisa:
Analyzing the trend of government support for cloud computing usage in e-government architecture. 14 - Jie Cao, Cuicui Zhang, Ping Qi, Kekun Hu:
Utility-driven virtual machine allocation in edge cloud environments using a partheno-genetic algorithm. 15 - Xianglong Kong, Qiyu Liu, Wei Huang, Jiayu Du, Hongfa Li, Wen Ji, Fan Zhang:
Enhancing configuration security with heterogeneous read points. 16 - Lukasz Pawlik
:
Google Cloud vs. Azure: sentiment analysis accuracy for Polish and English across content types. 17 - Junjie Cao, Zhiyong Yu, Min Cao, Baohong Zhu, Jian Yang:
Server deployment strategies considering robustness and resource constraints in edge computing. 18 - Sultan H. Almotiri:
AI driven IOMT security framework for advanced malware and ransomware detection in SDN. 19 - Jay Dave, Kamalesh Ram R., Pratik Patil, Himanshu Patil, Sarvesh Borole, Subhrakanta Panda:
Secure and efficient ownership verification for deduplicated cloud computing systems. 20 - Altaf Hussain, Shuaiyong Li, Tariq Hussain, Razaz Waheeb Attar, Ahmed Alhomoud, Reem Alsagri, Ahmad Ali AlZubi:
Blockchain-enabled Zero Trust-based Secure and Energy Efficient scheme for 6G-enabled UASNs. 21 - Pietro Fusco, Alba Amato, Salvatore Venticinque:
Cloud-based analysis of aerial imagery for unveiling ancient archaeological patterns. 22 - José María López, Joaquín Entrialgo, Manuel García, Javier García, José Luis Díaz, Rubén Usamentiaga:
Fast autoscaling algorithm for cost optimization of container clusters. 23 - Dinah Waref, Yomna Alayary, Nadeen Fathallah, Mohamed A. Abd El Ghany, Mohammed A.-M. Salem:
Client aware adaptive federated learning using UCB-based reinforcement for people re-identification. 24

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
