callback( { "result":{ "query":":facetid:stream:\"streams/journals/tjs\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"85.16" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"6177", "@dc":"6177", "@oc":"6177", "@id":"43261686", "text":":facetid:stream:streams/journals/tjs" } }, "hits":{ "@total":"6177", "@computed":"1000", "@sent":"1000", "@first":"0", "hit":[{ "@score":"1", "@id":"36441", "info":{"authors":{"author":{"@pid":"313/2937","text":"Omar Younis Abdulhammed"}},"title":"A robust image steganography based on a novel technique by using improved DNA and modified chaotic approach.","venue":"J. Supercomput.","volume":"80","number":"1","pages":"226-248","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/Abdulhammed24","doi":"10.1007/S11227-023-05459-X","ee":"https://doi.org/10.1007/s11227-023-05459-x","url":"https://dblp.org/rec/journals/tjs/Abdulhammed24"}, "url":"URL#36441" }, { "@score":"1", "@id":"36442", "info":{"authors":{"author":[{"@pid":"308/1793","text":"Rihab Abidi"},{"@pid":"38/4481","text":"Nadia Ben Azzouna"},{"@pid":"221/0351","text":"Wassim Trojet"},{"@pid":"38/3287","text":"Ghaleb Hoblos"},{"@pid":"40/1065","text":"Nabil Sahli"}]},"title":"A study of mechanisms and approaches for IoV trust models requirements achievement.","venue":"J. Supercomput.","volume":"80","number":"3","pages":"4157-4201","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/AbidiATHS24","doi":"10.1007/S11227-023-05620-6","ee":"https://doi.org/10.1007/s11227-023-05620-6","url":"https://dblp.org/rec/journals/tjs/AbidiATHS24"}, "url":"URL#36442" }, { "@score":"1", "@id":"36443", "info":{"authors":{"author":[{"@pid":"165/2532","text":"Mahboubeh Afzali"},{"@pid":"322/9786","text":"Amin Mohammad Vali Samani"},{"@pid":"79/5995","text":"Hamid Reza Naji"}]},"title":"An efficient resource allocation of IoT requests in hybrid fog-cloud environment.","venue":"J. Supercomput.","volume":"80","number":"4","pages":"4600-4624","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/AfzaliSN24","doi":"10.1007/S11227-023-05586-5","ee":"https://doi.org/10.1007/s11227-023-05586-5","url":"https://dblp.org/rec/journals/tjs/AfzaliSN24"}, "url":"URL#36443" }, { "@score":"1", "@id":"36444", "info":{"authors":{"author":[{"@pid":"367/3597","text":"A. Ahila"},{"@pid":"268/9547","text":"V. Prema"},{"@pid":"90/7661","text":"S. Ayyasamy"},{"@pid":"212/3575","text":"M. Sivasubramanian"}]},"title":"An enhanced deep learning model for high-speed classification of plant diseases with bioinspired algorithm.","venue":"J. Supercomput.","volume":"80","number":"3","pages":"3713-3737","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/AhilaPAS24","doi":"10.1007/S11227-023-05622-4","ee":"https://doi.org/10.1007/s11227-023-05622-4","url":"https://dblp.org/rec/journals/tjs/AhilaPAS24"}, "url":"URL#36444" }, { "@score":"1", "@id":"36445", "info":{"authors":{"author":[{"@pid":"268/6540","text":"Emmanuel Ahishakiye"},{"@pid":"239/6297","text":"Waweru Mwangi"},{"@pid":"133/5053","text":"Petronilla Muriithi"},{"@pid":"319/3131","text":"Fredrick Kanobe"},{"@pid":"194/5582","text":"Godliver Owomugisha"},{"@pid":"366/0560","text":"Danison Taremwa"},{"@pid":"249/2078","text":"Lenard Nkalubo"}]},"title":"Deep Gaussian convolutional neural network model in classification of cassava diseases using spectral data.","venue":"J. Supercomput.","volume":"80","number":"1","pages":"463-485","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/AhishakiyeMMKOTN24","doi":"10.1007/S11227-023-05498-4","ee":"https://doi.org/10.1007/s11227-023-05498-4","url":"https://dblp.org/rec/journals/tjs/AhishakiyeMMKOTN24"}, "url":"URL#36445" }, { "@score":"1", "@id":"36446", "info":{"authors":{"author":[{"@pid":"65/4165","text":"Arash Ahmadi"},{"@pid":"186/1806","text":"Amanj Khorramian"}]},"title":"Efficient Brute-force state space search for Yin-Yang puzzle.","venue":"J. Supercomput.","volume":"80","number":"3","pages":"3066-3088","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/AhmadiK24","doi":"10.1007/S11227-023-05565-W","ee":"https://doi.org/10.1007/s11227-023-05565-w","url":"https://dblp.org/rec/journals/tjs/AhmadiK24"}, "url":"URL#36446" }, { "@score":"1", "@id":"36447", "info":{"authors":{"author":[{"@pid":"367/3306","text":"Nartay Aikyn"},{"@pid":"367/3319","text":"Ardan Zhanegizov"},{"@pid":"367/3581","text":"Temirlan Aidarov"},{"@pid":"170/2026","text":"Dinh-Mao Bui"},{"@pid":"157/7974","text":"Nguyen Anh Tu"}]},"title":"Efficient facial expression recognition framework based on edge computing.","venue":"J. Supercomput.","volume":"80","number":"2","pages":"1935-1972","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/AikynZABT24","doi":"10.1007/S11227-023-05548-X","ee":"https://doi.org/10.1007/s11227-023-05548-x","url":"https://dblp.org/rec/journals/tjs/AikynZABT24"}, "url":"URL#36447" }, { "@score":"1", "@id":"36448", "info":{"authors":{"author":[{"@pid":"318/0218","text":"Taymaz Akan"},{"@pid":"37/10395","text":"Diego Oliva"},{"@pid":"259/1831","text":"Ali-Reza Feizi-Derakhshi"},{"@pid":"337/1723","text":"Amir-Reza Feizi-Derakhshi"},{"@pid":"13/1481","text":"Marco Pérez-Cisneros"},{"@pid":"288/4296","text":"Mohammad Alfrad Nobel Bhuiyan"}]},"title":"Battle royale optimizer for multilevel image thresholding.","venue":"J. Supercomput.","volume":"80","number":"4","pages":"5298-5340","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/AkanOFFPB24","doi":"10.1007/S11227-023-05664-8","ee":"https://doi.org/10.1007/s11227-023-05664-8","url":"https://dblp.org/rec/journals/tjs/AkanOFFPB24"}, "url":"URL#36448" }, { "@score":"1", "@id":"36449", "info":{"authors":{"author":[{"@pid":"356/5577","text":"Luttfi A. Al-Haddad"},{"@pid":"160/8996","text":"Alaa Abdulhady Jaber"},{"@pid":"367/3357","text":"Sinan A. Al-Haddad"},{"@pid":"367/3644","text":"Yousif M. Al-Muslim"}]},"title":"Fault diagnosis of actuator damage in UAVs using embedded recorded data and stacked machine learning models.","venue":"J. Supercomput.","volume":"80","number":"3","pages":"3005-3024","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/AlHaddadJAA24","doi":"10.1007/S11227-023-05584-7","ee":"https://doi.org/10.1007/s11227-023-05584-7","url":"https://dblp.org/rec/journals/tjs/AlHaddadJAA24"}, "url":"URL#36449" }, { "@score":"1", "@id":"36450", "info":{"authors":{"author":[{"@pid":"279/0304","text":"Rawaa Alatrash"},{"@pid":"173/6718","text":"Rojalina Priyadarshini"},{"@pid":"279/0342","text":"Hadi Ezaldeen"}]},"title":"Collaborative filtering integrated fine-grained sentiment for hybrid recommender system.","venue":"J. Supercomput.","volume":"80","number":"4","pages":"4760-4807","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/AlatrashPE24","doi":"10.1007/S11227-023-05600-W","ee":"https://doi.org/10.1007/s11227-023-05600-w","url":"https://dblp.org/rec/journals/tjs/AlatrashPE24"}, "url":"URL#36450" }, { "@score":"1", "@id":"36451", "info":{"authors":{"author":[{"@pid":"367/3598","text":"Alavieh Sadat Alavizadeh"},{"@pid":"51/10093","text":"Seyed Hossein Erfani"},{"@pid":"98/8460","text":"Meghdad Mirabi"},{"@pid":"81/4963","text":"Amir Sahafi"}]},"title":"An efficient distributed and secure algorithm for transaction confirmation in IOTA using cloud computing.","venue":"J. Supercomput.","volume":"80","number":"2","pages":"1491-1521","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/AlavizadehEMS24","doi":"10.1007/S11227-023-05525-4","ee":"https://doi.org/10.1007/s11227-023-05525-4","url":"https://dblp.org/rec/journals/tjs/AlavizadehEMS24"}, "url":"URL#36451" }, { "@score":"1", "@id":"36452", "info":{"authors":{"author":[{"@pid":"367/3619","text":"Melika Amiri"},{"@pid":"23/8232","text":"Massoud Dousti"},{"@pid":"77/5984","text":"Majid Mohammadi"}]},"title":"Design and implementation of carry-save adder using quantum-dot cellular automata.","venue":"J. Supercomput.","volume":"80","number":"2","pages":"1554-1567","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/AmiriDM24","doi":"10.1007/S11227-023-05532-5","ee":"https://doi.org/10.1007/s11227-023-05532-5","url":"https://dblp.org/rec/journals/tjs/AmiriDM24"}, "url":"URL#36452" }, { "@score":"1", "@id":"36453", "info":{"authors":{"author":[{"@pid":"367/3623","text":"Djihad Arrar"},{"@pid":"98/6742","text":"Nadjet Kamel"},{"@pid":"180/5580","text":"Abdelaziz Lakhfif"}]},"title":"A comprehensive survey of link prediction methods.","venue":"J. Supercomput.","volume":"80","number":"3","pages":"3902-3942","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/ArrarKL24","doi":"10.1007/S11227-023-05591-8","ee":"https://doi.org/10.1007/s11227-023-05591-8","url":"https://dblp.org/rec/journals/tjs/ArrarKL24"}, "url":"URL#36453" }, { "@score":"1", "@id":"36454", "info":{"authors":{"author":[{"@pid":"323/9357","text":"Divyanshu Awasthi"},{"@pid":"284/8318","text":"Priyank Khare"},{"@pid":"56/9103","text":"Vinay Kumar Srivastava"}]},"title":"Internet of medical things-based authentication for an optimized watermarking of encrypted EEG.","venue":"J. Supercomput.","volume":"80","number":"3","pages":"2970-3004","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/AwasthiKS24","doi":"10.1007/S11227-023-05566-9","ee":"https://doi.org/10.1007/s11227-023-05566-9","url":"https://dblp.org/rec/journals/tjs/AwasthiKS24"}, "url":"URL#36454" }, { "@score":"1", "@id":"36455", "info":{"authors":{"author":{"@pid":"271/6000","text":"Salih Berkan Aydemir"}},"title":"Ideal solution candidate search for starling murmuration optimizer and its applications on global optimization and engineering problems.","venue":"J. Supercomput.","volume":"80","number":"3","pages":"4083-4156","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/Aydemir24","doi":"10.1007/S11227-023-05618-0","ee":"https://doi.org/10.1007/s11227-023-05618-0","url":"https://dblp.org/rec/journals/tjs/Aydemir24"}, "url":"URL#36455" }, { "@score":"1", "@id":"36456", "info":{"authors":{"author":[{"@pid":"135/2746","text":"Sadoon Azizi"},{"@pid":"317/9071","text":"Pedram Farzin"},{"@pid":"06/8812","text":"Mohammad Shojafar"},{"@pid":"r/OmerFRana","text":"Omer F. Rana"}]},"title":"A scalable and flexible platform for service placement in multi-fog and multi-cloud environments.","venue":"J. Supercomput.","volume":"80","number":"1","pages":"1109-1136","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/AziziFSR24","doi":"10.1007/S11227-023-05520-9","ee":"https://doi.org/10.1007/s11227-023-05520-9","url":"https://dblp.org/rec/journals/tjs/AziziFSR24"}, "url":"URL#36456" }, { "@score":"1", "@id":"36457", "info":{"authors":{"author":[{"@pid":"354/7303","text":"Oussama Azzouzi"},{"@pid":"36/4317","text":"Mohamed Anane"},{"@pid":"50/5791","text":"Mouloud Koudil"},{"@pid":"45/3666","text":"Mohamed Issad"},{"@pid":"151/7154","text":"Yassine Himeur"}]},"title":"Novel area-efficient and flexible architectures for optimal Ate pairing on FPGA.","venue":"J. Supercomput.","volume":"80","number":"2","pages":"2633-2659","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/AzzouziAKIH24","doi":"10.1007/S11227-023-05578-5","ee":"https://doi.org/10.1007/s11227-023-05578-5","url":"https://dblp.org/rec/journals/tjs/AzzouziAKIH24"}, "url":"URL#36457" }, { "@score":"1", "@id":"36458", "info":{"authors":{"author":[{"@pid":"264/6487","text":"Payam Bahrani"},{"@pid":"89/566","text":"Behrouz Minaei-Bidgoli"},{"@pid":"54/5936","text":"Hamid Parvin"},{"@pid":"52/363","text":"Mitra Mirzarezaee"},{"@pid":"125/9663","text":"Ahmad Keshavarz"}]},"title":"A new improved KNN-based recommender system.","venue":"J. Supercomput.","volume":"80","number":"1","pages":"800-834","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/BahraniMPMK24","doi":"10.1007/S11227-023-05447-1","ee":"https://doi.org/10.1007/s11227-023-05447-1","url":"https://dblp.org/rec/journals/tjs/BahraniMPMK24"}, "url":"URL#36458" }, { "@score":"1", "@id":"36459", "info":{"authors":{"author":[{"@pid":"72/5696","text":"Mei Bai"},{"@pid":"150/5394","text":"Qibo Wang"},{"@pid":"367/3408","text":"Shihan Chang"},{"@pid":"91/11145","text":"Xite Wang"},{"@pid":"93/7765","text":"Guanyu Li"}]},"title":"Location-based skyline query processing technology in road networks.","venue":"J. Supercomput.","volume":"80","number":"3","pages":"3183-3211","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/BaiWCWL24","doi":"10.1007/S11227-023-05563-Y","ee":"https://doi.org/10.1007/s11227-023-05563-y","url":"https://dblp.org/rec/journals/tjs/BaiWCWL24"}, "url":"URL#36459" }, { "@score":"1", "@id":"36460", "info":{"authors":{"author":[{"@pid":"190/4243","text":"Neha Bansal"},{"@pid":"79/7935","text":"Shelly Sachdeva"},{"@pid":"33/7489","text":"Lalit Kumar Awasthi"}]},"title":"Schema generation for document stores using workload-driven approach.","venue":"J. Supercomput.","volume":"80","number":"3","pages":"4000-4048","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/BansalSA24","doi":"10.1007/S11227-023-05613-5","ee":"https://doi.org/10.1007/s11227-023-05613-5","url":"https://dblp.org/rec/journals/tjs/BansalSA24"}, "url":"URL#36460" }, { "@score":"1", "@id":"36461", "info":{"authors":{"author":[{"@pid":"167/1879","text":"Abdelhakim Baouya"},{"@pid":"81/7708","text":"Salim Chehida"},{"@pid":"01/5624","text":"Saddek Bensalem"},{"@pid":"51/4058","text":"Levent Gürgen"},{"@pid":"231/3924","text":"Richard Nicholson"},{"@pid":"217/7221","text":"Miquel Cantero"},{"@pid":"94/242","text":"Mario Diaz-Nava"},{"@pid":"129/0582","text":"Enrico Ferrera"}]},"title":"Deploying warehouse robots with confidence: the BRAIN-IoT framework's functional assurance.","venue":"J. Supercomput.","volume":"80","number":"1","pages":"1206-1237","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/BaouyaCBGNCDF24","doi":"10.1007/S11227-023-05483-X","ee":"https://doi.org/10.1007/s11227-023-05483-x","url":"https://dblp.org/rec/journals/tjs/BaouyaCBGNCDF24"}, "url":"URL#36461" }, { "@score":"1", "@id":"36462", "info":{"authors":{"author":[{"@pid":"367/3651","text":"Louiza Belkhiri-Brahmi"},{"@pid":"40/1761","text":"Samira Yessad"},{"@pid":"15/9731","text":"Fouzi Semchedine"}]},"title":"Congestion control-based sink MOBility pattern for data gathering optimization in WSN.","venue":"J. Supercomput.","volume":"80","number":"3","pages":"3441-3479","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/BelkhiriBrahmiYS24","doi":"10.1007/S11227-023-05596-3","ee":"https://doi.org/10.1007/s11227-023-05596-3","url":"https://dblp.org/rec/journals/tjs/BelkhiriBrahmiYS24"}, "url":"URL#36462" }, { "@score":"1", "@id":"36463", "info":{"authors":{"author":[{"@pid":"313/1221","text":"Ismail Biri"},{"@pid":"313/1581","text":"Ülkü Tuncer Küçüktas"},{"@pid":"284/8849","text":"Fatih Uysal"},{"@pid":"71/6415","text":"Firat Hardalaç"}]},"title":"Forecasting the future popularity of the anti-vax narrative on Twitter with machine learning.","venue":"J. Supercomput.","volume":"80","number":"3","pages":"2917-2947","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/BiriKUH24","doi":"10.1007/S11227-023-05567-8","ee":"https://doi.org/10.1007/s11227-023-05567-8","url":"https://dblp.org/rec/journals/tjs/BiriKUH24"}, "url":"URL#36463" }, { "@score":"1", "@id":"36464", "info":{"authors":{"author":[{"@pid":"369/6329","text":"Adeola Borode"},{"@pid":"285/7205","text":"Peter A. Olubambi"}]},"title":"Optimisation of artificial intelligence models and response surface methodology for predicting viscosity and relative viscosity of GNP-alumina hybrid nanofluid: incorporating the effects of mixing ratio and temperature.","venue":"J. Supercomput.","volume":"80","number":"4","pages":"4841-4869","year":"2024","type":"Journal Articles","access":"open","key":"journals/tjs/BorodeO24","doi":"10.1007/S11227-023-05652-Y","ee":"https://doi.org/10.1007/s11227-023-05652-y","url":"https://dblp.org/rec/journals/tjs/BorodeO24"}, "url":"URL#36464" }, { "@score":"1", "@id":"36465", "info":{"authors":{"author":[{"@pid":"314/5511","text":"Ismael Boureima"},{"@pid":"250/9228","text":"Manish Bhattarai"},{"@pid":"274/1070","text":"Maksim Ekin Eren"},{"@pid":"180/2801","text":"Erik Skau"},{"@pid":"89/8356","text":"Philip Romero"},{"@pid":"54/5929","text":"Stephan J. Eidenbenz"},{"@pid":"41/11017","text":"Boian S. Alexandrov"}]},"title":"Distributed out-of-memory NMF on CPU/GPU architectures.","venue":"J. Supercomput.","volume":"80","number":"3","pages":"3970-3999","year":"2024","type":"Journal Articles","access":"open","key":"journals/tjs/BoureimaBESREA24","doi":"10.1007/S11227-023-05587-4","ee":"https://doi.org/10.1007/s11227-023-05587-4","url":"https://dblp.org/rec/journals/tjs/BoureimaBESREA24"}, "url":"URL#36465" }, { "@score":"1", "@id":"36466", "info":{"authors":{"author":[{"@pid":"314/5511","text":"Ismael Boureima"},{"@pid":"250/9228","text":"Manish Bhattarai"},{"@pid":"369/6428","text":"Maksim Eren"},{"@pid":"180/2801","text":"Erik Skau"},{"@pid":"89/8356","text":"Philip Romero"},{"@pid":"54/5929","text":"Stephan J. Eidenbenz"},{"@pid":"41/11017","text":"Boian S. Alexandrov"}]},"title":"Correction to: Distributed out-of-memory NMF on CPU/GPU architectures.","venue":"J. Supercomput.","volume":"80","number":"4","pages":"5731-5732","year":"2024","type":"Journal Articles","access":"open","key":"journals/tjs/BoureimaBESREA24a","doi":"10.1007/S11227-023-05675-5","ee":"https://doi.org/10.1007/s11227-023-05675-5","url":"https://dblp.org/rec/journals/tjs/BoureimaBESREA24a"}, "url":"URL#36466" }, { "@score":"1", "@id":"36467", "info":{"authors":{"author":[{"@pid":"263/9139","text":"Mehmet Bozdal"},{"@pid":"366/0653","text":"Kadir Ileri"},{"@pid":"366/0518","text":"Ali Ozkahraman"}]},"title":"Comparative analysis of dimensionality reduction techniques for cybersecurity in the SWaT dataset.","venue":"J. Supercomput.","volume":"80","number":"1","pages":"1059-1079","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/BozdalIO24","doi":"10.1007/S11227-023-05511-W","ee":"https://doi.org/10.1007/s11227-023-05511-w","url":"https://dblp.org/rec/journals/tjs/BozdalIO24"}, "url":"URL#36467" }, { "@score":"1", "@id":"36468", "info":{"authors":{"author":{"@pid":"338/8494","text":"Mehmet Akif Bülbül"}},"title":"Optimization of artificial neural network structure and hyperparameters in hybrid model by genetic algorithm: iOS-android application for breast cancer diagnosis/prediction.","venue":"J. Supercomput.","volume":"80","number":"4","pages":"4533-4553","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/Bulbul24","doi":"10.1007/S11227-023-05635-Z","ee":"https://doi.org/10.1007/s11227-023-05635-z","url":"https://dblp.org/rec/journals/tjs/Bulbul24"}, "url":"URL#36468" }, { "@score":"1", "@id":"36469", "info":{"authors":{"author":[{"@pid":"322/4357","text":"Preetpal Kaur Buttar"},{"@pid":"252/6717","text":"Manoj Kumar Sachan"}]},"title":"Semantic segmentation of satellite images for crop type identification in smallholder farms.","venue":"J. Supercomput.","volume":"80","number":"2","pages":"1367-1395","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/ButtarS24","doi":"10.1007/S11227-023-05533-4","ee":"https://doi.org/10.1007/s11227-023-05533-4","url":"https://dblp.org/rec/journals/tjs/ButtarS24"}, "url":"URL#36469" }, { "@score":"1", "@id":"36470", "info":{"authors":{"author":[{"@pid":"337/6133","text":"Ruyi Cao"},{"@pid":"337/6501","text":"Wanghao Mo"},{"@pid":"66/5033","text":"Wendong Zhang"}]},"title":"MFMDet: multi-scale face mask detection using improved Cascade rcnn.","venue":"J. Supercomput.","volume":"80","number":"4","pages":"4914-4942","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/CaoMZ24","doi":"10.1007/S11227-023-05653-X","ee":"https://doi.org/10.1007/s11227-023-05653-x","url":"https://dblp.org/rec/journals/tjs/CaoMZ24"}, "url":"URL#36470" }, { "@score":"1", "@id":"36471", "info":{"authors":{"author":{"@pid":"00/4544","text":"Carmen Carrión 0001"}},"title":"Research streams and open challenges in the metaverse.","venue":"J. Supercomput.","volume":"80","number":"2","pages":"1598-1639","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/Carrion24","doi":"10.1007/S11227-023-05544-1","ee":"https://doi.org/10.1007/s11227-023-05544-1","url":"https://dblp.org/rec/journals/tjs/Carrion24"}, "url":"URL#36471" }, { "@score":"1", "@id":"36472", "info":{"authors":{"author":[{"@pid":"54/3777","text":"Chih-Yung Chang"},{"@pid":"366/0461","text":"Syu-Jhih Jhang"},{"@pid":"35/10136","text":"Shih-Jung Wu"},{"@pid":"30/10604","text":"Diptendu Sinha Roy"}]},"title":"JCF: joint coarse- and fine-grained similarity comparison for plagiarism detection based on NLP.","venue":"J. Supercomput.","volume":"80","number":"1","pages":"363-394","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/ChangJWR24","doi":"10.1007/S11227-023-05472-0","ee":"https://doi.org/10.1007/s11227-023-05472-0","url":"https://dblp.org/rec/journals/tjs/ChangJWR24"}, "url":"URL#36472" }, { "@score":"1", "@id":"36473", "info":{"authors":{"author":[{"@pid":"339/5940","text":"Dikshit Chauhan"},{"@pid":"118/6905","text":"Anupam Yadav"}]},"title":"Stability and agent dynamics of artificial electric field algorithm.","venue":"J. Supercomput.","volume":"80","number":"1","pages":"835-864","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/ChauhanY24","doi":"10.1007/S11227-023-05502-X","ee":"https://doi.org/10.1007/s11227-023-05502-x","url":"https://dblp.org/rec/journals/tjs/ChauhanY24"}, "url":"URL#36473" }, { "@score":"1", "@id":"36474", "info":{"authors":{"author":[{"@pid":"195/5816","text":"Zhonghua Chen"},{"@pid":"74/4322","text":"S. B. Goyal"},{"@pid":"160/0490","text":"Anand Singh Rajawat"}]},"title":"Smart contracts attribute-based access control model for security & privacy of IoT system using blockchain and edge computing.","venue":"J. Supercomput.","volume":"80","number":"2","pages":"1396-1425","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/ChenGR24","doi":"10.1007/S11227-023-05517-4","ee":"https://doi.org/10.1007/s11227-023-05517-4","url":"https://dblp.org/rec/journals/tjs/ChenGR24"}, "url":"URL#36474" }, { "@score":"1", "@id":"36475", "info":{"authors":{"author":[{"@pid":"273/6306","text":"Yilu Chen"},{"@pid":"305/9178","text":"Miaodi Su"},{"@pid":"163/8533","text":"Hongzhi Ding"},{"@pid":"314/9225","text":"Shaohong Weng"},{"@pid":"02/7753","text":"Zhifeng Lin"},{"@pid":"258/3155","text":"Xiqiong Bai"}]},"title":"High-correlation 3D routability estimation for congestion-guided global routing.","venue":"J. Supercomput.","volume":"80","number":"3","pages":"3114-3141","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/ChenSDWLB24","doi":"10.1007/S11227-023-05553-0","ee":"https://doi.org/10.1007/s11227-023-05553-0","url":"https://dblp.org/rec/journals/tjs/ChenSDWLB24"}, "url":"URL#36475" }, { "@score":"1", "@id":"36476", "info":{"authors":{"author":[{"@pid":"65/1392","text":"Jiaxin Chen"},{"@pid":"47/4778","text":"Xuguang Zhang"},{"@pid":"42/5975","text":"Yinggan Tang"},{"@pid":"26/6190-1","text":"Hui Yu 0001"}]},"title":"ICE-YoloX: research on face mask detection algorithm based on improved YoloX network.","venue":"J. Supercomput.","volume":"80","number":"3","pages":"2948-2969","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/ChenZTY24","doi":"10.1007/S11227-023-05585-6","ee":"https://doi.org/10.1007/s11227-023-05585-6","url":"https://dblp.org/rec/journals/tjs/ChenZTY24"}, "url":"URL#36476" }, { "@score":"1", "@id":"36477", "info":{"authors":{"author":[{"@pid":"80/4313","text":"Sheng-Tzong Cheng"},{"@pid":"45/4638","text":"Gwo-Jiun Horng"},{"@pid":"80/382","text":"Chih-Wei Hsu"},{"@pid":"366/0789","text":"Z.-Yu Su"}]},"title":"Per-user network access control kernel module with secure multifactor authentication.","venue":"J. Supercomput.","volume":"80","number":"1","pages":"970-1008","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/ChengHHS24","doi":"10.1007/S11227-023-05480-0","ee":"https://doi.org/10.1007/s11227-023-05480-0","url":"https://dblp.org/rec/journals/tjs/ChengHHS24"}, "url":"URL#36477" }, { "@score":"1", "@id":"36478", "info":{"authors":{"author":[{"@pid":"367/3626","text":"Tengteng Cheng"},{"@pid":"39/233","text":"Guosun Zeng"},{"@pid":"57/8107","text":"Zhipeng Sun"}]},"title":"A big graph clustering method to support parallel processing by perceiving graph's application algorithm semantics.","venue":"J. Supercomput.","volume":"80","number":"2","pages":"2838-2861","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/ChengZS24","doi":"10.1007/S11227-023-05572-X","ee":"https://doi.org/10.1007/s11227-023-05572-x","url":"https://dblp.org/rec/journals/tjs/ChengZS24"}, "url":"URL#36478" }, { "@score":"1", "@id":"36479", "info":{"authors":{"author":[{"@pid":"183/5855","text":"Sarra Cherbal"},{"@pid":"236/3216","text":"Abdelhak Zier"},{"@pid":"259/8330","text":"Sara Hebal"},{"@pid":"168/5146","text":"Lemia Louail"},{"@pid":"259/4447","text":"Boubakeur Annane"}]},"title":"Security in internet of things: a review on approaches based on blockchain, machine learning, cryptography, and quantum computing.","venue":"J. Supercomput.","volume":"80","number":"3","pages":"3738-3816","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/CherbalZHLA24","doi":"10.1007/S11227-023-05616-2","ee":"https://doi.org/10.1007/s11227-023-05616-2","url":"https://dblp.org/rec/journals/tjs/CherbalZHLA24"}, "url":"URL#36479" }, { "@score":"1", "@id":"36480", "info":{"authors":{"author":[{"@pid":"42/6214","text":"Mao-Lun Chiang"},{"@pid":"70/1798","text":"Hui-Ching Hsieh"},{"@pid":"49/10682","text":"Tzu-Ling Lin"},{"@pid":"90/7296","text":"Tsui-Ping Chang"},{"@pid":"06/5687","text":"Hong-Wei Chen"}]},"title":"Dynamic weight-based connectivity recovery in wireless sensor and actor networks.","venue":"J. Supercomput.","volume":"80","number":"1","pages":"734-760","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/ChiangHLCC24","doi":"10.1007/S11227-023-05518-3","ee":"https://doi.org/10.1007/s11227-023-05518-3","url":"https://dblp.org/rec/journals/tjs/ChiangHLCC24"}, "url":"URL#36480" }, { "@score":"1", "@id":"36481", "info":{"authors":{"author":[{"@pid":"262/1986","text":"Ali Dabba"},{"@pid":"25/6153","text":"Abdelkamel Tari"},{"@pid":"03/5598","text":"Samy Meftali"}]},"title":"A novel grey wolf optimization algorithm based on geometric transformations for gene selection and cancer classification.","venue":"J. Supercomput.","volume":"80","number":"4","pages":"4808-4840","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/DabbaTM24","doi":"10.1007/S11227-023-05643-Z","ee":"https://doi.org/10.1007/s11227-023-05643-z","url":"https://dblp.org/rec/journals/tjs/DabbaTM24"}, "url":"URL#36481" }, { "@score":"1", "@id":"36482", "info":{"authors":{"author":[{"@pid":"366/0497","text":"Elham Dalirinia"},{"@pid":"00/5212","text":"Mehrdad Jalali"},{"@pid":"27/8635","text":"Mahdi Yaghoobi"},{"@pid":"41/3515","text":"Hamid Tabatabaee"}]},"title":"Lotus effect optimization algorithm (LEA): a lotus nature-inspired algorithm for engineering design optimization.","venue":"J. Supercomput.","volume":"80","number":"1","pages":"761-799","year":"2024","type":"Journal Articles","access":"open","key":"journals/tjs/DaliriniaJYT24","doi":"10.1007/S11227-023-05513-8","ee":"https://doi.org/10.1007/s11227-023-05513-8","url":"https://dblp.org/rec/journals/tjs/DaliriniaJYT24"}, "url":"URL#36482" }, { "@score":"1", "@id":"36483", "info":{"authors":{"author":[{"@pid":"15/8101","text":"Khalid A. Darabkh"},{"@pid":"367/3312","text":"Thara A. Alzboun"},{"@pid":"343/0430","text":"Marwa H. Al-Tahaineh"}]},"title":"A novel routing protocol for stable route selection in IoT networks.","venue":"J. Supercomput.","volume":"80","number":"2","pages":"2572-2600","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/DarabkhAA24","doi":"10.1007/S11227-023-05570-Z","ee":"https://doi.org/10.1007/s11227-023-05570-z","url":"https://dblp.org/rec/journals/tjs/DarabkhAA24"}, "url":"URL#36483" }, { "@score":"1", "@id":"36484", "info":{"authors":{"author":[{"@pid":"369/6447","text":"Shao Deng"},{"@pid":"215/7916","text":"Shanzhu Xiao"},{"@pid":"237/6074","text":"Qiuqun Deng"},{"@pid":"78/422","text":"Huanzhang Lu"}]},"title":"A hovering swarm particle swarm optimization algorithm based on node resource attributes for hardware/software partitioning.","venue":"J. Supercomput.","volume":"80","number":"4","pages":"4625-4647","year":"2024","type":"Journal Articles","access":"open","key":"journals/tjs/DengXDL24","doi":"10.1007/S11227-023-05603-7","ee":"https://doi.org/10.1007/s11227-023-05603-7","url":"https://dblp.org/rec/journals/tjs/DengXDL24"}, "url":"URL#36484" }, { "@score":"1", "@id":"36485", "info":{"authors":{"author":[{"@pid":"229/1316","text":"Xinnan Ding"},{"@pid":"70/6348","text":"Shan Du"},{"@pid":"50/671","text":"Yu Zhang"},{"@pid":"93/1599","text":"Kejun Wang"}]},"title":"Spatiotemporal multi-scale bilateral motion network for gait recognition.","venue":"J. Supercomput.","volume":"80","number":"3","pages":"3412-3440","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/DingDZW24","doi":"10.1007/S11227-023-05607-3","ee":"https://doi.org/10.1007/s11227-023-05607-3","url":"https://dblp.org/rec/journals/tjs/DingDZW24"}, "url":"URL#36485" }, { "@score":"1", "@id":"36486", "info":{"authors":{"author":[{"@pid":"98/7403","text":"Na Dong"},{"@pid":"350/3545","text":"Qingyue Feng"},{"@pid":"272/9201","text":"Jianfang Chang"},{"@pid":"231/3374","text":"Xiaoming Mai"}]},"title":"White blood cell classification based on a novel ensemble convolutional neural network framework.","venue":"J. Supercomput.","volume":"80","number":"1","pages":"249-270","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/DongFCM24","doi":"10.1007/S11227-023-05490-Y","ee":"https://doi.org/10.1007/s11227-023-05490-y","url":"https://dblp.org/rec/journals/tjs/DongFCM24"}, "url":"URL#36486" }, { "@score":"1", "@id":"36487", "info":{"authors":{"author":[{"@pid":"253/0798","text":"Rajesh Dwivedi"},{"@pid":"07/3137","text":"Aruna Tiwari"},{"@pid":"118/7044","text":"Neha Bharill"},{"@pid":"228/9322","text":"Milind B. Ratnaparkhe"},{"@pid":"367/3553","text":"Parul Mogre"},{"@pid":"367/3473","text":"Pranjal Gadge"},{"@pid":"367/3476","text":"Kethavath Jagadeesh"}]},"title":"A novel apache spark-based 14-dimensional scalable feature extraction approach for the clustering of genomics data.","venue":"J. Supercomput.","volume":"80","number":"3","pages":"3554-3588","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/DwivediTBRMGJ24","doi":"10.1007/S11227-023-05602-8","ee":"https://doi.org/10.1007/s11227-023-05602-8","url":"https://dblp.org/rec/journals/tjs/DwivediTBRMGJ24"}, "url":"URL#36487" }, { "@score":"1", "@id":"36488", "info":{"authors":{"author":[{"@pid":"366/0453","text":"Rebecca H. K. Emanuel"},{"@pid":"27/4755","text":"Paul David Docherty"},{"@pid":"366/0525","text":"Helen Lunt"},{"@pid":"00/75","text":"Knut Möller"}]},"title":"The effect of activation functions on accuracy, convergence speed, and misclassification confidence in CNN text classification: a comprehensive exploration.","venue":"J. Supercomput.","volume":"80","number":"1","pages":"292-312","year":"2024","type":"Journal Articles","access":"open","key":"journals/tjs/EmanuelDLM24","doi":"10.1007/S11227-023-05441-7","ee":"https://doi.org/10.1007/s11227-023-05441-7","url":"https://dblp.org/rec/journals/tjs/EmanuelDLM24"}, "url":"URL#36488" }, { "@score":"1", "@id":"36489", "info":{"authors":{"author":[{"@pid":"202/3794","text":"Weibei Fan"},{"@pid":"369/6877","text":"Xuanli Liu"},{"@pid":"233/8560","text":"Mengjie Lv"}]},"title":"Hamiltonian cycle embedding with fault-tolerant edges and adaptive diagnosis in half hypercube.","venue":"J. Supercomput.","volume":"80","number":"4","pages":"5654-5674","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/FanLL24","doi":"10.1007/S11227-023-05674-6","ee":"https://doi.org/10.1007/s11227-023-05674-6","url":"https://dblp.org/rec/journals/tjs/FanLL24"}, "url":"URL#36489" }, { "@score":"1", "@id":"36490", "info":{"authors":{"author":[{"@pid":"127/6440","text":"Samira Shirinabadi Farahani"},{"@pid":"88/11276","text":"Mohammad Reza Reshadinezhad"},{"@pid":"294/8291","text":"Seyed Erfan Fatemieh"}]},"title":"New design for error-resilient approximate multipliers used in image processing in CNTFET technology.","venue":"J. Supercomput.","volume":"80","number":"3","pages":"3694-3712","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/FarahaniRF24","doi":"10.1007/S11227-023-05623-3","ee":"https://doi.org/10.1007/s11227-023-05623-3","url":"https://dblp.org/rec/journals/tjs/FarahaniRF24"}, "url":"URL#36490" }, { "@score":"1", "@id":"36491", "info":{"authors":{"author":[{"@pid":"304/3398","text":"Viswanatha Reddy G"},{"@pid":"286/2019","text":"B. S. N. V. Chaitanya"},{"@pid":"304/2980","text":"Prathyush P"},{"@pid":"304/3388","text":"Sumanth M"},{"@pid":"304/3077","text":"Mrinalini C"},{"@pid":"304/3382","text":"Dileep Kumar P"},{"@pid":"94/5766","text":"Snehasis Mukherjee"}]},"title":"DFW-PP: dynamic feature weighting-based popularity prediction for social media content.","venue":"J. Supercomput.","volume":"80","number":"4","pages":"5708-5730","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/GCPMCPM24","doi":"10.1007/S11227-023-05672-8","ee":"https://doi.org/10.1007/s11227-023-05672-8","url":"https://dblp.org/rec/journals/tjs/GCPMCPM24"}, "url":"URL#36491" }, { "@score":"1", "@id":"36492", "info":{"authors":{"author":[{"@pid":"79/518","text":"Rong Gao"},{"@pid":"20/6417","text":"Wei He"},{"@pid":"123/2929","text":"Lingyu Yan"},{"@pid":"38/6038","text":"Donghua Liu"},{"@pid":"99/7486","text":"Yonghong Yu"},{"@pid":"60/3208","text":"Zhiwei Ye"}]},"title":"Hybrid graph transformer networks for multivariate time series anomaly detection.","venue":"J. Supercomput.","volume":"80","number":"1","pages":"642-669","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/GaoHYLYY24","doi":"10.1007/S11227-023-05503-W","ee":"https://doi.org/10.1007/s11227-023-05503-w","url":"https://dblp.org/rec/journals/tjs/GaoHYLYY24"}, "url":"URL#36492" }, { "@score":"1", "@id":"36493", "info":{"authors":{"author":[{"@pid":"128/4973","text":"Xiaoxin Gao"},{"@pid":"07/2397","text":"Fazhi He"},{"@pid":"213/4732","text":"Songwei Zhang"},{"@pid":"266/4465","text":"Jinkun Luo"},{"@pid":"94/2020","text":"Bo Fan"}]},"title":"A fast nondominated sorting-based MOEA with convergence and diversity adjusted adaptively.","venue":"J. Supercomput.","volume":"80","number":"2","pages":"1426-1463","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/GaoHZLF24","doi":"10.1007/S11227-023-05516-5","ee":"https://doi.org/10.1007/s11227-023-05516-5","url":"https://dblp.org/rec/journals/tjs/GaoHZLF24"}, "url":"URL#36493" }, { "@score":"1", "@id":"36494", "info":{"authors":{"author":[{"@pid":"87/4209","text":"Nan Gao"},{"@pid":"42/2758","text":"Bowei Yang"},{"@pid":"27/7017-8","text":"Peng Chen 0008"},{"@pid":"132/6446","text":"Li Ping Qian 0001"}]},"title":"A multi-stage recognizer for nested named entity with weakly labeled data.","venue":"J. Supercomput.","volume":"80","number":"3","pages":"3663-3693","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/GaoYCQ24","doi":"10.1007/S11227-023-05619-Z","ee":"https://doi.org/10.1007/s11227-023-05619-z","url":"https://dblp.org/rec/journals/tjs/GaoYCQ24"}, "url":"URL#36494" }, { "@score":"1", "@id":"36495", "info":{"authors":{"author":[{"@pid":"367/3536","text":"Bahar Ghasemi"},{"@pid":"58/4186","text":"Mahmood Ahmadi"},{"@pid":"253/5465","text":"Hamed Alimohammadi"}]},"title":"A neural gas network-based scheme for SDN many-field packet classification.","venue":"J. Supercomput.","volume":"80","number":"2","pages":"2601-2632","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/GhasemiAA24","doi":"10.1007/S11227-023-05564-X","ee":"https://doi.org/10.1007/s11227-023-05564-x","url":"https://dblp.org/rec/journals/tjs/GhasemiAA24"}, "url":"URL#36495" }, { "@score":"1", "@id":"36496", "info":{"authors":{"author":[{"@pid":"332/5647","text":"Anit Kumar Ghosal"},{"@pid":"236/9086","text":"Amit Sardar"},{"@pid":"332/6085","text":"Dipanwita Roychowdhury"}]},"title":"Differential fault analysis attack-tolerant hardware implementation of AES.","venue":"J. Supercomput.","volume":"80","number":"4","pages":"4648-4681","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/GhosalSC24","doi":"10.1007/S11227-023-05632-2","ee":"https://doi.org/10.1007/s11227-023-05632-2","url":"https://dblp.org/rec/journals/tjs/GhosalSC24"}, "url":"URL#36496" }, { "@score":"1", "@id":"36497", "info":{"authors":{"author":[{"@pid":"368/5155","text":"Peda Gopi Arepalli"},{"@pid":"261/6758","text":"K. Jairam Naik"}]},"title":"A deep learning-enabled IoT framework for early hypoxia detection in aqua water using light weight spatially shared attention-LSTM network.","venue":"J. Supercomput.","volume":"80","number":"2","pages":"2718-2747","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/GopiN24","doi":"10.1007/S11227-023-05580-X","ee":"https://doi.org/10.1007/s11227-023-05580-x","url":"https://dblp.org/rec/journals/tjs/GopiN24"}, "url":"URL#36497" }, { "@score":"1", "@id":"36498", "info":{"authors":{"author":[{"@pid":"29/4862","text":"Xu Gu"},{"@pid":"90/7625","text":"Xiaoliang Chen"},{"@pid":"86/241","text":"Peng Lu"},{"@pid":"45/5842","text":"Xiang Lan"},{"@pid":"135/7788","text":"Xianyong Li"},{"@pid":"70/1320","text":"Yajun Du"}]},"title":"SiMaLSTM-SNP: novel semantic relatedness learning model preserving both Siamese networks and membrane computing.","venue":"J. Supercomput.","volume":"80","number":"3","pages":"3382-3411","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/GuCLLLD24","doi":"10.1007/S11227-023-05592-7","ee":"https://doi.org/10.1007/s11227-023-05592-7","url":"https://dblp.org/rec/journals/tjs/GuCLLLD24"}, "url":"URL#36498" }, { "@score":"1", "@id":"36499", "info":{"authors":{"author":[{"@pid":"261/8385","text":"Hengliang Guo"},{"@pid":"48/2807","text":"Long Zhang"},{"@pid":"64/6544","text":"Yi Zhang"},{"@pid":"27/973","text":"Jianan Li"},{"@pid":"36/7583","text":"Xiaoyue Xu"},{"@pid":"31/2088","text":"Lu Liu"},{"@pid":"367/3639","text":"Kuangsheng Cai"},{"@pid":"19/5635","text":"Dan Wu"},{"@pid":"91/252","text":"Shuxin Yang"},{"@pid":"05/4851","text":"Lingbo Kong"},{"@pid":"30/9374","text":"Xu Gao"}]},"title":"OpenMP offloading data transfer optimization for DCUs.","venue":"J. Supercomput.","volume":"80","number":"2","pages":"2381-2402","year":"2024","type":"Journal Articles","access":"open","key":"journals/tjs/GuoZZLXLCWYKG24","doi":"10.1007/S11227-023-05422-W","ee":"https://doi.org/10.1007/s11227-023-05422-w","url":"https://dblp.org/rec/journals/tjs/GuoZZLXLCWYKG24"}, "url":"URL#36499" }, { "@score":"1", "@id":"36500", "info":{"authors":{"author":[{"@pid":"23/6442","text":"Swati Gupta"},{"@pid":"133/2722","text":"Niraj Pratap Singh"}]},"title":"Underwater wireless sensor networks: a review of routing protocols, taxonomy, and future directions.","venue":"J. Supercomput.","volume":"80","number":"4","pages":"5163-5196","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/GuptaS24","doi":"10.1007/S11227-023-05646-W","ee":"https://doi.org/10.1007/s11227-023-05646-w","url":"https://dblp.org/rec/journals/tjs/GuptaS24"}, "url":"URL#36500" }, { "@score":"1", "@id":"36501", "info":{"authors":{"author":[{"@pid":"367/3539","text":"Yanjiang Han"},{"@pid":"179/8081","text":"Fengping Wang"},{"@pid":"35/7092","text":"Wei Wang"},{"@pid":"87/9032","text":"Xiangyu Li"},{"@pid":"262/0510","text":"Jianyang Zhang"}]},"title":"YOLO-SG: Small traffic signs detection method in complex scene.","venue":"J. Supercomput.","volume":"80","number":"2","pages":"2025-2046","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/HanWWLZ24","doi":"10.1007/S11227-023-05547-Y","ee":"https://doi.org/10.1007/s11227-023-05547-y","url":"https://dblp.org/rec/journals/tjs/HanWWLZ24"}, "url":"URL#36501" }, { "@score":"1", "@id":"36502", "info":{"authors":{"author":[{"@pid":"h/RamziAHaraty","text":"Ramzi A. Haraty"},{"@pid":"367/3436","text":"Ali Assaf 0004"}]},"title":"DG-means: a superior greedy algorithm for clustering distributed data.","venue":"J. Supercomput.","volume":"80","number":"2","pages":"1990-2024","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/HaratyA24","doi":"10.1007/S11227-023-05508-5","ee":"https://doi.org/10.1007/s11227-023-05508-5","url":"https://dblp.org/rec/journals/tjs/HaratyA24"}, "url":"URL#36502" }, { "@score":"1", "@id":"36503", "info":{"authors":{"author":[{"@pid":"335/2114","text":"Sadiqa Jafari"},{"@pid":"67/663","text":"Yung Cheol Byun"}]},"title":"Accurate remaining useful life estimation of lithium-ion batteries in electric vehicles based on a measurable feature-based approach with explainable AI.","venue":"J. Supercomput.","volume":"80","number":"4","pages":"4707-4732","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/JafariB24","doi":"10.1007/S11227-023-05648-8","ee":"https://doi.org/10.1007/s11227-023-05648-8","url":"https://dblp.org/rec/journals/tjs/JafariB24"}, "url":"URL#36503" }, { "@score":"1", "@id":"36504", "info":{"authors":{"author":[{"@pid":"117/8095","text":"Ehsan Jafari"},{"@pid":"18/2746","text":"Ardeshir Dolati"},{"@pid":"139/7979","text":"Kamran Layeghi"}]},"title":"Object tracking using local structural information and energy minimization.","venue":"J. Supercomput.","volume":"80","number":"4","pages":"5255-5278","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/JafariDL24","doi":"10.1007/S11227-023-05650-0","ee":"https://doi.org/10.1007/s11227-023-05650-0","url":"https://dblp.org/rec/journals/tjs/JafariDL24"}, "url":"URL#36504" }, { "@score":"1", "@id":"36505", "info":{"authors":{"author":{"@pid":"330/2874","text":"Hamed Jalilian"}},"title":"Total variation method based on modified Barzilai-Borwein algorithm to noise reduction in MRI images.","venue":"J. Supercomput.","volume":"80","number":"1","pages":"601-619","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/Jalilian24","doi":"10.1007/S11227-023-05500-Z","ee":"https://doi.org/10.1007/s11227-023-05500-z","url":"https://dblp.org/rec/journals/tjs/Jalilian24"}, "url":"URL#36505" }, { "@score":"1", "@id":"36506", "info":{"authors":{"author":[{"@pid":"152/9692","text":"Khalid Javeed"},{"@pid":"99/6710","text":"Ali El-Moursy"},{"@pid":"g/DavidGregg","text":"David Gregg"}]},"title":"E2CSM: efficient FPGA implementation of elliptic curve scalar multiplication over generic prime field GF(p).","venue":"J. Supercomput.","volume":"80","number":"1","pages":"50-74","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/JaveedEG24","doi":"10.1007/S11227-023-05428-4","ee":"https://doi.org/10.1007/s11227-023-05428-4","url":"https://dblp.org/rec/journals/tjs/JaveedEG24"}, "url":"URL#36506" }, { "@score":"1", "@id":"36507", "info":{"authors":{"author":[{"@pid":"330/7808","text":"Siti Nuraishah Agos Jawaddi"},{"@pid":"358/9972","text":"Azlan Ismail"},{"@pid":"369/6557","text":"Muhammad Nur Haziq Mohammad Hatta"},{"@pid":"369/6680","text":"Anis Faqihah Kamarulzaman"}]},"title":"Insights into cloud autoscaling: a unique perspective through MDP and DTMC formal models.","venue":"J. Supercomput.","volume":"80","number":"4","pages":"5073-5107","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/JawaddiIHK24","doi":"10.1007/S11227-023-05665-7","ee":"https://doi.org/10.1007/s11227-023-05665-7","url":"https://dblp.org/rec/journals/tjs/JawaddiIHK24"}, "url":"URL#36507" }, { "@score":"1", "@id":"36508", "info":{"authors":{"author":[{"@pid":"321/6778","text":"Junjun Jiao"},{"@pid":"241/1183","text":"Zhisheng Chen"},{"@pid":"98/4450","text":"Tao Zhou"}]},"title":"Minimal Kapur cross-entropy-based image segmentation for distribution grid inspection using improved INFO optimization algorithm.","venue":"J. Supercomput.","volume":"80","number":"3","pages":"4309-4352","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/JiaoCZ24","doi":"10.1007/S11227-023-05628-Y","ee":"https://doi.org/10.1007/s11227-023-05628-y","url":"https://dblp.org/rec/journals/tjs/JiaoCZ24"}, "url":"URL#36508" }, { "@score":"1", "@id":"36509", "info":{"authors":{"author":[{"@pid":"369/6128","text":"Chang Jie"},{"@pid":"369/7016","text":"Chen Jiming"},{"@pid":"369/6526","text":"Shao Ying"},{"@pid":"221/6849","text":"Yanchun Tong"},{"@pid":"356/4276","text":"Haodong Ren"}]},"title":"A pyramid GNN model for CXR-based COVID-19 classification.","venue":"J. Supercomput.","volume":"80","number":"4","pages":"5490-5508","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/JieJYTR24","doi":"10.1007/S11227-023-05633-1","ee":"https://doi.org/10.1007/s11227-023-05633-1","url":"https://dblp.org/rec/journals/tjs/JieJYTR24"}, "url":"URL#36509" }, { "@score":"1", "@id":"36510", "info":{"authors":{"author":[{"@pid":"369/6690","text":"Azad Johari"},{"@pid":"358/9972","text":"Azlan Ismail"}]},"title":"PMLAP: a methodology for annotating SSML elements into HTML5.","venue":"J. Supercomput.","volume":"80","number":"4","pages":"5675-5707","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/JohariI24","doi":"10.1007/S11227-023-05673-7","ee":"https://doi.org/10.1007/s11227-023-05673-7","url":"https://dblp.org/rec/journals/tjs/JohariI24"}, "url":"URL#36510" }, { "@score":"1", "@id":"36511", "info":{"authors":{"author":[{"@pid":"302/2690","text":"Anil Kumar Kamboj"},{"@pid":"122/2834","text":"Poonam Jindal"},{"@pid":"154/8934","text":"Pankaj Verma"}]},"title":"Reinforcement learning-based secure joint relay and jammer selection in dual-hop wireless networks.","venue":"J. Supercomput.","volume":"80","number":"2","pages":"2660-2680","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/KambojJV24","doi":"10.1007/S11227-023-05575-8","ee":"https://doi.org/10.1007/s11227-023-05575-8","url":"https://dblp.org/rec/journals/tjs/KambojJV24"}, "url":"URL#36511" }, { "@score":"1", "@id":"36512", "info":{"authors":{"author":[{"@pid":"32/1654","text":"Yan Kang"},{"@pid":"50/2755","text":"Xiaoshe Dong"},{"@pid":"79/10743","text":"Ziheng Wang"},{"@pid":"00/890-2","text":"Heng Chen 0002"},{"@pid":"64/5630","text":"Qiang Wang"}]},"title":"Parallel implementations of post-quantum leighton-Micali signature on multiple nodes.","venue":"J. Supercomput.","volume":"80","number":"4","pages":"5042-5072","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/KangDWCW24","doi":"10.1007/S11227-023-05662-W","ee":"https://doi.org/10.1007/s11227-023-05662-w","url":"https://dblp.org/rec/journals/tjs/KangDWCW24"}, "url":"URL#36512" }, { "@score":"1", "@id":"36513", "info":{"authors":{"author":[{"@pid":"137/9774","text":"Avita Katal"},{"@pid":"122/3000","text":"Tanupriya Choudhury"},{"@pid":"286/7979","text":"Susheela Dahiya"}]},"title":"Energy optimized container placement for cloud data centers: a meta-heuristic approach.","venue":"J. Supercomput.","volume":"80","number":"1","pages":"98-140","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/KatalCD24","doi":"10.1007/S11227-023-05462-2","ee":"https://doi.org/10.1007/s11227-023-05462-2","url":"https://dblp.org/rec/journals/tjs/KatalCD24"}, "url":"URL#36513" }, { "@score":"1", "@id":"36514", "info":{"authors":{"author":[{"@pid":"309/7593","text":"Parisa Kavianpour"},{"@pid":"309/5993","text":"Mohammadreza Kavianpour"},{"@pid":"142/1275","text":"Ehsan Jahani"},{"@pid":"60/3107","text":"Amin Ramezani"}]},"title":"Correction to: A CNN-BiLSTM model with attention mechanism for earthquake prediction.","venue":"J. Supercomput.","volume":"80","number":"2","pages":"2913","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/KavianpourKJR24","doi":"10.1007/S11227-023-05497-5","ee":"https://doi.org/10.1007/s11227-023-05497-5","url":"https://dblp.org/rec/journals/tjs/KavianpourKJR24"}, "url":"URL#36514" }, { "@score":"1", "@id":"36515", "info":{"authors":{"author":[{"@pid":"172/9116","text":"Shwet Ketu"},{"@pid":"126/5258","text":"Pramod Kumar Mishra"}]},"title":"An intelligent hybrid classification model for heart disease detection using imbalanced electrocardiogram signals.","venue":"J. Supercomput.","volume":"80","number":"3","pages":"4286-4308","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/KetuM24","doi":"10.1007/S11227-023-05583-8","ee":"https://doi.org/10.1007/s11227-023-05583-8","url":"https://dblp.org/rec/journals/tjs/KetuM24"}, "url":"URL#36515" }, { "@score":"1", "@id":"36516", "info":{"authors":{"author":[{"@pid":"366/0760","text":"Maedeh Khalifavi"},{"@pid":"155/0932","text":"Zahra Shirmohammadi"},{"@pid":"177/6862","text":"Sahar Kianian"}]},"title":"FASR-LED: reducing energy consumption in wireless body area networks by an efficient smart method.","venue":"J. Supercomput.","volume":"80","number":"1","pages":"1009-1036","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/KhalifaviSK24","doi":"10.1007/S11227-023-05481-Z","ee":"https://doi.org/10.1007/s11227-023-05481-z","url":"https://dblp.org/rec/journals/tjs/KhalifaviSK24"}, "url":"URL#36516" }, { "@score":"1", "@id":"36517", "info":{"authors":{"author":[{"@pid":"169/7620","text":"Mohsen Khani"},{"@pid":"71/4994","text":"Shahram Jamali"},{"@pid":"115/6198","text":"Mohammad Karim Sohrabi"}]},"title":"Approximate Q-learning-based (AQL) network slicing in mobile edge-cloud for delay-sensitive services.","venue":"J. Supercomput.","volume":"80","number":"3","pages":"4226-4247","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/KhaniJS24","doi":"10.1007/S11227-023-05614-4","ee":"https://doi.org/10.1007/s11227-023-05614-4","url":"https://dblp.org/rec/journals/tjs/KhaniJS24"}, "url":"URL#36517" }, { "@score":"1", "@id":"36518", "info":{"authors":{"author":[{"@pid":"367/3380","text":"Soroush Babaee Khobdeh"},{"@pid":"329/7020","text":"Mohammad Reza Yamaghani"},{"@pid":"367/3348","text":"Siavash Khodaparast Sareshkeh"}]},"title":"Basketball action recognition based on the combination of YOLO and a deep fuzzy LSTM network.","venue":"J. Supercomput.","volume":"80","number":"3","pages":"3528-3553","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/KhobdehYS24","doi":"10.1007/S11227-023-05611-7","ee":"https://doi.org/10.1007/s11227-023-05611-7","url":"https://dblp.org/rec/journals/tjs/KhobdehYS24"}, "url":"URL#36518" }, { "@score":"1", "@id":"36519", "info":{"authors":{"author":[{"@pid":"367/3464","text":"Saif Eddine Khouni"},{"@pid":"194/1085","text":"Tidjani Menacer"}]},"title":"Nizar optimization algorithm: a novel metaheuristic algorithm for global optimization and engineering applications.","venue":"J. Supercomput.","volume":"80","number":"3","pages":"3229-3281","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/KhouniM24","doi":"10.1007/S11227-023-05579-4","ee":"https://doi.org/10.1007/s11227-023-05579-4","url":"https://dblp.org/rec/journals/tjs/KhouniM24"}, "url":"URL#36519" }, { "@score":"1", "@id":"36520", "info":{"authors":{"author":[{"@pid":"86/5830","text":"Chandan Kumar"},{"@pid":"287/3680","text":"Sudhanshu Kumar Jha"},{"@pid":"132/0062","text":"Dilip Kumar Yadav"},{"@pid":"78/6423","text":"Shiv Prakash"},{"@pid":"116/4606","text":"Mukesh Prasad"}]},"title":"A generalized approach to construct node probability table for Bayesian belief network using fuzzy logic.","venue":"J. Supercomput.","volume":"80","number":"1","pages":"75-97","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/KumarJYPP24","doi":"10.1007/S11227-023-05458-Y","ee":"https://doi.org/10.1007/s11227-023-05458-y","url":"https://dblp.org/rec/journals/tjs/KumarJYPP24"}, "url":"URL#36520" }, { "@score":"1", "@id":"36521", "info":{"authors":{"author":[{"@pid":"98/4371","text":"Rakesh Kumar"},{"@pid":"35/1141-2","text":"Sunil K. Singh 0002"},{"@pid":"51/4831","text":"D. K. Lobiyal 0001"}]},"title":"UPSRVNet: Ultralightweight, Privacy preserved, and Secure RFID-based authentication protocol for VIoT Networks.","venue":"J. Supercomput.","volume":"80","number":"1","pages":"942-969","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/KumarSL24","doi":"10.1007/S11227-023-05463-1","ee":"https://doi.org/10.1007/s11227-023-05463-1","url":"https://dblp.org/rec/journals/tjs/KumarSL24"}, "url":"URL#36521" }, { "@score":"1", "@id":"36522", "info":{"authors":{"author":[{"@pid":"234/0920","text":"Masashi Kuwano"},{"@pid":"259/6265","text":"Mio Hosoe"},{"@pid":"259/6571","text":"Taku Moriyama"}]},"title":"Prediction of railroad user count using number of route searches via bivariate state-space modeling.","venue":"J. Supercomput.","volume":"80","number":"4","pages":"4554-4576","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/KuwanoHM24","doi":"10.1007/S11227-023-05642-0","ee":"https://doi.org/10.1007/s11227-023-05642-0","url":"https://dblp.org/rec/journals/tjs/KuwanoHM24"}, "url":"URL#36522" }, { "@score":"1", "@id":"36523", "info":{"authors":{"author":[{"@pid":"366/0503","text":"Yonghao Lai"},{"@pid":"127/0003","text":"Xiaohui Hua"}]},"title":"Component edge connectivity and extra edge connectivity of alternating group networks.","venue":"J. Supercomput.","volume":"80","number":"1","pages":"313-330","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/LaiH24","doi":"10.1007/S11227-023-05464-0","ee":"https://doi.org/10.1007/s11227-023-05464-0","url":"https://dblp.org/rec/journals/tjs/LaiH24"}, "url":"URL#36523" }, { "@score":"1", "@id":"36524", "info":{"authors":{"author":[{"@pid":"290/6036","text":"Mohamed Yassine Landolsi"},{"@pid":"40/2658","text":"Lotfi Ben Romdhane"},{"@pid":"97/3960","text":"Lobna Hlaoua"}]},"title":"Hybrid medical named entity recognition using document structure and surrounding context.","venue":"J. Supercomput.","volume":"80","number":"4","pages":"5011-5041","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/LandolsiRH24","doi":"10.1007/S11227-023-05647-9","ee":"https://doi.org/10.1007/s11227-023-05647-9","url":"https://dblp.org/rec/journals/tjs/LandolsiRH24"}, "url":"URL#36524" }, { "@score":"1", "@id":"36525", "info":{"authors":{"author":[{"@pid":"366/0781","text":"Jihene Latrech"},{"@pid":"92/7116","text":"Zahra Kodia"},{"@pid":"38/4481","text":"Nadia Ben Azzouna"}]},"title":"CoDFi-DL: a hybrid recommender system combining enhanced collaborative and demographic filtering based on deep learning.","venue":"J. Supercomput.","volume":"80","number":"1","pages":"1160-1182","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/LatrechKA24","doi":"10.1007/S11227-023-05519-2","ee":"https://doi.org/10.1007/s11227-023-05519-2","url":"https://dblp.org/rec/journals/tjs/LatrechKA24"}, "url":"URL#36525" }, { "@score":"1", "@id":"36526", "info":{"authors":{"author":[{"@pid":"343/4097","text":"Subeen Leem"},{"@pid":"343/4126","text":"Jisong Oh"},{"@pid":"220/8735","text":"Jihoon Moon"},{"@pid":"72/10851","text":"Mucheol Kim"},{"@pid":"73/4067","text":"Seungmin Rho"}]},"title":"Enhancing multistep-ahead bike-sharing demand prediction with a two-stage online learning-based time-series model: insight from Seoul.","venue":"J. Supercomput.","volume":"80","number":"3","pages":"4049-4082","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/LeemOMKR24","doi":"10.1007/S11227-023-05593-6","ee":"https://doi.org/10.1007/s11227-023-05593-6","url":"https://dblp.org/rec/journals/tjs/LeemOMKR24"}, "url":"URL#36526" }, { "@score":"1", "@id":"36527", "info":{"authors":{"author":[{"@pid":"74/2397","text":"Zhen Li"},{"@pid":"44/832","text":"Zining Cao"},{"@pid":"87/8540","text":"Chao Xing"}]},"title":"Performance modeling and quantitative evaluation for cyber-physical systems based on LTS.","venue":"J. Supercomput.","volume":"80","number":"4","pages":"5616-5653","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/LiCX24","doi":"10.1007/S11227-023-05669-3","ee":"https://doi.org/10.1007/s11227-023-05669-3","url":"https://dblp.org/rec/journals/tjs/LiCX24"}, "url":"URL#36527" }, { "@score":"1", "@id":"36528", "info":{"authors":{"author":[{"@pid":"64/6025","text":"Wei Li"},{"@pid":"362/4136","text":"Yetong Gao"},{"@pid":"181/2817","text":"Lei Wang"}]},"title":"A multipopulation particle swarm optimization based on divergent guidance and knowledge transfer for multimodal multiobjective problems.","venue":"J. Supercomput.","volume":"80","number":"3","pages":"3480-3527","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/LiGW24","doi":"10.1007/S11227-023-05624-2","ee":"https://doi.org/10.1007/s11227-023-05624-2","url":"https://dblp.org/rec/journals/tjs/LiGW24"}, "url":"URL#36528" }, { "@score":"1", "@id":"36529", "info":{"authors":{"author":[{"@pid":"96/1434","text":"Di Li"},{"@pid":"181/2665","text":"Lang Li"},{"@pid":"273/7651","text":"Yu Ou"}]},"title":"Side-channel analysis based on Siamese neural network.","venue":"J. Supercomput.","volume":"80","number":"4","pages":"4423-4450","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/LiLO24","doi":"10.1007/S11227-023-05631-3","ee":"https://doi.org/10.1007/s11227-023-05631-3","url":"https://dblp.org/rec/journals/tjs/LiLO24"}, "url":"URL#36529" }, { "@score":"1", "@id":"36530", "info":{"authors":{"author":[{"@pid":"53/4014","text":"Xiaomei Li"},{"@pid":"05/511","text":"Ye Lu"},{"@pid":"65/2433","text":"Xiaoyu Zhao"},{"@pid":"37/7459","text":"Xiong Deng"},{"@pid":"52/7608","text":"Zhijiang Xie"}]},"title":"Path planning for intelligent vehicles based on improved D* Lite.","venue":"J. Supercomput.","volume":"80","number":"1","pages":"1294-1330","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/LiLZDX24","doi":"10.1007/S11227-023-05528-1","ee":"https://doi.org/10.1007/s11227-023-05528-1","url":"https://dblp.org/rec/journals/tjs/LiLZDX24"}, "url":"URL#36530" }, { "@score":"1", "@id":"36531", "info":{"authors":{"author":[{"@pid":"08/2489-12","text":"Xiaohong Li 0012"},{"@pid":"320/8456","text":"Qixuan Peng"},{"@pid":"90/3204","text":"Ruihong Li"},{"@pid":"37/7406","text":"Huifang Ma"}]},"title":"Dual graph neural network for overlapping community detection.","venue":"J. Supercomput.","volume":"80","number":"2","pages":"2196-2222","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/LiPLM24","doi":"10.1007/S11227-023-05435-5","ee":"https://doi.org/10.1007/s11227-023-05435-5","url":"https://dblp.org/rec/journals/tjs/LiPLM24"}, "url":"URL#36531" }, { "@score":"1", "@id":"36532", "info":{"authors":{"author":[{"@pid":"42/6066","text":"Qun Li"},{"@pid":"02/4369","text":"Bei Tang"},{"@pid":"262/1679","text":"Jianxin Li"},{"@pid":"52/7560","text":"Siguang Chen"}]},"title":"User satisfaction-based energy-saving computation offloading in fog computing networks.","venue":"J. Supercomput.","volume":"80","number":"1","pages":"620-641","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/LiTLC24","doi":"10.1007/S11227-023-05484-W","ee":"https://doi.org/10.1007/s11227-023-05484-w","url":"https://dblp.org/rec/journals/tjs/LiTLC24"}, "url":"URL#36532" }, { "@score":"1", "@id":"36533", "info":{"authors":{"author":[{"@pid":"274/6708","text":"Shengbin Liang"},{"@pid":"367/3627","text":"Fuqi Sun"},{"@pid":"138/2055","text":"Haoran Sun"},{"@pid":"44/5410","text":"Tingting Chen"},{"@pid":"22/7436","text":"Wencai Du"}]},"title":"A medical text classification approach with ZEN and capsule network.","venue":"J. Supercomput.","volume":"80","number":"3","pages":"4353-4377","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/LiangSSCD24","doi":"10.1007/S11227-023-05612-6","ee":"https://doi.org/10.1007/s11227-023-05612-6","url":"https://dblp.org/rec/journals/tjs/LiangSSCD24"}, "url":"URL#36533" }, { "@score":"1", "@id":"36534", "info":{"authors":{"author":[{"@pid":"82/1364","text":"Xiao Liu"},{"@pid":"204/8242","text":"Junlong Chen"},{"@pid":"08/4959","text":"Deyu Qi 0001"},{"@pid":"07/4227","text":"Tong Zhang"}]},"title":"Exploration of low-resource language-oriented machine translation system of genetic algorithm-optimized hyper-task network under cloud platform technology.","venue":"J. Supercomput.","volume":"80","number":"3","pages":"3310-3333","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/LiuCQZ24","doi":"10.1007/S11227-023-05604-6","ee":"https://doi.org/10.1007/s11227-023-05604-6","url":"https://dblp.org/rec/journals/tjs/LiuCQZ24"}, "url":"URL#36534" }, { "@score":"1", "@id":"36535", "info":{"authors":{"author":[{"@pid":"95/169","text":"Runsheng Liu"},{"@pid":"358/5348","text":"Wencong Cai"},{"@pid":"215/8338","text":"Junyang Zhang"},{"@pid":"52/452","text":"Xiaoling Wu"},{"@pid":"367/3608","text":"Lilin Yang"},{"@pid":"259/8790","text":"Kaiqing Luo"}]},"title":"CF-lines: a fusing contour features optimization method for line segment detector.","venue":"J. Supercomput.","volume":"80","number":"3","pages":"3644-3662","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/LiuCZWYL24","doi":"10.1007/S11227-023-05615-3","ee":"https://doi.org/10.1007/s11227-023-05615-3","url":"https://dblp.org/rec/journals/tjs/LiuCZWYL24"}, "url":"URL#36535" }, { "@score":"1", "@id":"36536", "info":{"authors":{"author":[{"@pid":"07/8546","text":"Tundong Liu"},{"@pid":"43/9047","text":"Fengqiang Gao"},{"@pid":"24/1518","text":"Xin Chen"},{"@pid":"38/805","text":"Guifang Shao"},{"@pid":"230/8661","text":"Chenhan Wang"}]},"title":"Research on load-balancing scheduling optimization for wafer surface defect detection.","venue":"J. Supercomput.","volume":"80","number":"1","pages":"1137-1159","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/LiuGCSW24","doi":"10.1007/S11227-023-05521-8","ee":"https://doi.org/10.1007/s11227-023-05521-8","url":"https://dblp.org/rec/journals/tjs/LiuGCSW24"}, "url":"URL#36536" }, { "@score":"1", "@id":"36537", "info":{"authors":{"author":[{"@pid":"44/7429","text":"Jing-Wei Liu"},{"@pid":"369/6466","text":"Ming-Hua Hsu"},{"@pid":"20/6992","text":"Chun-Liang Lai"},{"@pid":"369/6809","text":"Sheng-K. Wu"}]},"title":"Using video analysis and artificial neural network to explore association rules and influence scenarios in elite table tennis matches.","venue":"J. Supercomput.","volume":"80","number":"4","pages":"5472-5489","year":"2024","type":"Journal Articles","access":"open","key":"journals/tjs/LiuHLW24","doi":"10.1007/S11227-023-05684-4","ee":"https://doi.org/10.1007/s11227-023-05684-4","url":"https://dblp.org/rec/journals/tjs/LiuHLW24"}, "url":"URL#36537" }, { "@score":"1", "@id":"36538", "info":{"authors":{"author":[{"@pid":"53/1217","text":"Haiying Liu"},{"@pid":"367/3562","text":"ZhiHao Li"},{"@pid":"158/8493","text":"Kuihua Huang"},{"@pid":"06/2293","text":"Rui Wang"},{"@pid":"78/8843","text":"Guangquan Cheng"},{"@pid":"96/9492","text":"Tiexiang Li"}]},"title":"Evolutionary reinforcement learning algorithm for large-scale multi-agent cooperation and confrontation applications.","venue":"J. Supercomput.","volume":"80","number":"2","pages":"2319-2346","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/LiuLHWCL24","doi":"10.1007/S11227-023-05551-2","ee":"https://doi.org/10.1007/s11227-023-05551-2","url":"https://dblp.org/rec/journals/tjs/LiuLHWCL24"}, "url":"URL#36538" }, { "@score":"1", "@id":"36539", "info":{"authors":{"author":[{"@pid":"240/2599","text":"Yanru Liu"},{"@pid":"35/9805","text":"Jiali Xu"},{"@pid":"324/8751","text":"Austin Lin Yee"}]},"title":"The analysis of Iris image acquisition and real-time detection system using convolutional neural network.","venue":"J. Supercomput.","volume":"80","number":"4","pages":"4500-4532","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/LiuXY24","doi":"10.1007/S11227-023-05629-X","ee":"https://doi.org/10.1007/s11227-023-05629-x","url":"https://dblp.org/rec/journals/tjs/LiuXY24"}, "url":"URL#36539" }, { "@score":"1", "@id":"36540", "info":{"authors":{"author":[{"@pid":"369/6793","text":"Jingan Lu"},{"@pid":"24/8073","text":"Zhenfang Zhu"},{"@pid":"24/8384","text":"Kefeng Li"},{"@pid":"88/7525","text":"Shuai Gong"},{"@pid":"369/6765","text":"Hongli Pei"},{"@pid":"179/7885","text":"Wenling Wang"}]},"title":"Gtpsum: guided tensor product framework for abstractive summarization.","venue":"J. Supercomput.","volume":"80","number":"4","pages":"4972-4995","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/LuZLGPW24","doi":"10.1007/S11227-023-05630-4","ee":"https://doi.org/10.1007/s11227-023-05630-4","url":"https://dblp.org/rec/journals/tjs/LuZLGPW24"}, "url":"URL#36540" }, { "@score":"1", "@id":"36541", "info":{"authors":{"author":[{"@pid":"316/1146","text":"Indushree M"},{"@pid":"143/8308","text":"Manish Raj"}]},"title":"A novel Blockchain-based authentication scheme for telecare medical information system.","venue":"J. Supercomput.","volume":"80","number":"1","pages":"1080-1108","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/MR24","doi":"10.1007/S11227-023-05526-3","ee":"https://doi.org/10.1007/s11227-023-05526-3","url":"https://dblp.org/rec/journals/tjs/MR24"}, "url":"URL#36541" }, { "@score":"1", "@id":"36542", "info":{"authors":{"author":[{"@pid":"367/3590","text":"Mirna Magdy"},{"@pid":"307/2181","text":"Mohamed O. Grida"},{"@pid":"307/2256","text":"Gawaher S. Hussein"}]},"title":"Disruption mitigation in the semiconductors supply chain by using public blockchains.","venue":"J. Supercomput.","volume":"80","number":"2","pages":"1852-1906","year":"2024","type":"Journal Articles","access":"open","key":"journals/tjs/MagdyGH24","doi":"10.1007/S11227-023-05543-2","ee":"https://doi.org/10.1007/s11227-023-05543-2","url":"https://dblp.org/rec/journals/tjs/MagdyGH24"}, "url":"URL#36542" }, { "@score":"1", "@id":"36543", "info":{"authors":{"author":[{"@pid":"274/7848","text":"K. Uma Maheswari"},{"@pid":"191/5974","text":"S. Mary Saira Bhanu"},{"@pid":"55/10121","text":"Nickolas Savarimuthu"}]},"title":"Clustering-based data integrity verification approach for multi-replica in a fog environment.","venue":"J. Supercomput.","volume":"80","number":"3","pages":"3089-3113","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/MaheswariBS24","doi":"10.1007/S11227-023-05576-7","ee":"https://doi.org/10.1007/s11227-023-05576-7","url":"https://dblp.org/rec/journals/tjs/MaheswariBS24"}, "url":"URL#36543" }, { "@score":"1", "@id":"36544", "info":{"authors":{"author":[{"@pid":"152/4607","text":"Zahra Mahmoodabadi"},{"@pid":"366/0740","text":"Mostafa Nouri-Baygi"}]},"title":"An approximation algorithm for virtual machine placement in cloud data centers.","venue":"J. Supercomput.","volume":"80","number":"1","pages":"915-941","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/MahmoodabadiN24","doi":"10.1007/S11227-023-05505-8","ee":"https://doi.org/10.1007/s11227-023-05505-8","url":"https://dblp.org/rec/journals/tjs/MahmoodabadiN24"}, "url":"URL#36544" }, { "@score":"1", "@id":"36545", "info":{"authors":{"author":[{"@pid":"239/0043","text":"P. Mathivanan"},{"@pid":"189/6324","text":"Maran Ponnambalam"}]},"title":"Color image encryption based on novel kolam scrambling and modified 2D logistic cascade map (2D LCM).","venue":"J. Supercomput.","volume":"80","number":"2","pages":"2164-2195","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/MathivananP24","doi":"10.1007/S11227-023-05539-Y","ee":"https://doi.org/10.1007/s11227-023-05539-y","url":"https://dblp.org/rec/journals/tjs/MathivananP24"}, "url":"URL#36545" }, { "@score":"1", "@id":"36546", "info":{"authors":{"author":[{"@pid":"239/0043","text":"P. Mathivanan"},{"@pid":"189/6324","text":"Maran Ponnambalam"}]},"title":"Correction to: Color image encryption based on novel kolam scrambling and modified 2D logistic cascade map (2D LCM).","venue":"J. Supercomput.","volume":"80","number":"3","pages":"4420-4422","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/MathivananP24a","doi":"10.1007/S11227-023-05590-9","ee":"https://doi.org/10.1007/s11227-023-05590-9","url":"https://dblp.org/rec/journals/tjs/MathivananP24a"}, "url":"URL#36546" }, { "@score":"1", "@id":"36547", "info":{"authors":{"author":[{"@pid":"38/10867","text":"Chandrashekhar Meshram"},{"@pid":"91/2882","text":"Mohammad S. Obaidat"},{"@pid":"80/9412","text":"Rabha W. Ibrahim"},{"@pid":"207/0818","text":"Sarita Gajbhiye Meshram"},{"@pid":"367/3407","text":"Arpit Vijay Raikwar"}]},"title":"An efficient privacy-preserved authentication technique based on conformable fractional chaotic map for TMIS under smart homes environments.","venue":"J. Supercomput.","volume":"80","number":"2","pages":"2514-2537","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/MeshramOIMR24","doi":"10.1007/S11227-023-05536-1","ee":"https://doi.org/10.1007/s11227-023-05536-1","url":"https://dblp.org/rec/journals/tjs/MeshramOIMR24"}, "url":"URL#36547" }, { "@score":"1", "@id":"36548", "info":{"authors":{"author":[{"@pid":"315/3069","text":"Arvind Mewada"},{"@pid":"216/7096","text":"Rupesh Kumar Dewang"}]},"title":"NRWalk2Vec-HIN: spammer group detection based on heterogeneous information network embedding over social media.","venue":"J. Supercomput.","volume":"80","number":"2","pages":"1818-1851","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/MewadaD24","doi":"10.1007/S11227-023-05537-0","ee":"https://doi.org/10.1007/s11227-023-05537-0","url":"https://dblp.org/rec/journals/tjs/MewadaD24"}, "url":"URL#36548" }, { "@score":"1", "@id":"36549", "info":{"authors":{"author":[{"@pid":"209/7371","text":"Maryam Nasr-Esfahani"},{"@pid":"69/1695","text":"Behrouz Shahgholi Ghahfarokhi"},{"@pid":"118/7142","text":"Shahram Etemadi Borujeni"}]},"title":"Blockchain-based end-to-end privacy-preserving scheme for IoT-based healthcare systems.","venue":"J. Supercomput.","volume":"80","number":"2","pages":"2067-2127","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/NasrEsfahaniGB24","doi":"10.1007/S11227-023-05522-7","ee":"https://doi.org/10.1007/s11227-023-05522-7","url":"https://dblp.org/rec/journals/tjs/NasrEsfahaniGB24"}, "url":"URL#36549" }, { "@score":"1", "@id":"36550", "info":{"authors":{"author":[{"@pid":"367/3443","text":"Shaimaa E. Nassar"},{"@pid":"272/0905","text":"Ibrahim Yasser"},{"@pid":"237/0853","text":"Hanan M. Amer"},{"@pid":"210/0517","text":"Mohamed A. Mohamed"}]},"title":"A robust MRI-based brain tumor classification via a hybrid deep learning technique.","venue":"J. Supercomput.","volume":"80","number":"2","pages":"2403-2427","year":"2024","type":"Journal Articles","access":"open","key":"journals/tjs/NassarYAM24","doi":"10.1007/S11227-023-05549-W","ee":"https://doi.org/10.1007/s11227-023-05549-w","url":"https://dblp.org/rec/journals/tjs/NassarYAM24"}, "url":"URL#36550" }, { "@score":"1", "@id":"36551", "info":{"authors":{"author":[{"@pid":"48/7665","text":"Nima Jafari Navimipour"},{"@pid":"226/2309","text":"Seyed-Sajad Ahmadpour"},{"@pid":"13/369","text":"Senay Yalçin"}]},"title":"A nano-scale arithmetic and logic unit using a reversible logic and quantum-dots.","venue":"J. Supercomput.","volume":"80","number":"1","pages":"395-412","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/NavimipourAY24","doi":"10.1007/S11227-023-05491-X","ee":"https://doi.org/10.1007/s11227-023-05491-x","url":"https://dblp.org/rec/journals/tjs/NavimipourAY24"}, "url":"URL#36551" }, { "@score":"1", "@id":"36552", "info":{"authors":{"author":[{"@pid":"260/8987","text":"Zixiang Nie"},{"@pid":"48/1097","text":"Jin Li"},{"@pid":"283/5147","text":"Fenghui Duan"},{"@pid":"24/334","text":"Yueming Lu"}]},"title":"A collaborative ledger storing model for lightweight blockchains based on Chord Ring.","venue":"J. Supercomput.","volume":"80","number":"4","pages":"5593-5615","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/NieLDL24","doi":"10.1007/S11227-023-05667-5","ee":"https://doi.org/10.1007/s11227-023-05667-5","url":"https://dblp.org/rec/journals/tjs/NieLDL24"}, "url":"URL#36552" }, { "@score":"1", "@id":"36553", "info":{"authors":{"author":[{"@pid":"287/2923","text":"C. Pabitha"},{"@pid":"92/9570","text":"B. Vanathi"}]},"title":"Dense Mesh RCNN: assessment of human skin burn and burn depth severity.","venue":"J. Supercomput.","volume":"80","number":"1","pages":"1331-1362","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/PabithaV24","doi":"10.1007/S11227-023-05660-Y","ee":"https://doi.org/10.1007/s11227-023-05660-y","url":"https://dblp.org/rec/journals/tjs/PabithaV24"}, "url":"URL#36553" }, { "@score":"1", "@id":"36554", "info":{"authors":{"author":[{"@pid":"343/3573","text":"Divya Paikaray"},{"@pid":"160/6692","text":"Ashok Kumar Mehta"},{"@pid":"148/8627","text":"Danish Ali Khan"}]},"title":"Optimized convolutional neural network for the classification of lung cancer.","venue":"J. Supercomput.","volume":"80","number":"2","pages":"1973-1989","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/PaikarayMK24","doi":"10.1007/S11227-023-05550-3","ee":"https://doi.org/10.1007/s11227-023-05550-3","url":"https://dblp.org/rec/journals/tjs/PaikarayMK24"}, "url":"URL#36554" }, { "@score":"1", "@id":"36555", "info":{"authors":{"author":[{"@pid":"59/7282","text":"Ju-Won Park"},{"@pid":"98/5766","text":"Xin Huang"},{"@pid":"70/1627","text":"Chul-Ho Lee"}]},"title":"Analyzing and predicting job failures from HPC system log.","venue":"J. Supercomput.","volume":"80","number":"1","pages":"435-462","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/ParkHL24","doi":"10.1007/S11227-023-05482-Y","ee":"https://doi.org/10.1007/s11227-023-05482-y","url":"https://dblp.org/rec/journals/tjs/ParkHL24"}, "url":"URL#36555" }, { "@score":"1", "@id":"36556", "info":{"authors":{"author":[{"@pid":"326/0010","text":"Usha Patel"},{"@pid":"120/1834","text":"Vibha Patel"}]},"title":"Active learning-based hyperspectral image classification: a reinforcement learning approach.","venue":"J. Supercomput.","volume":"80","number":"2","pages":"2461-2486","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/PatelP24","doi":"10.1007/S11227-023-05568-7","ee":"https://doi.org/10.1007/s11227-023-05568-7","url":"https://dblp.org/rec/journals/tjs/PatelP24"}, "url":"URL#36556" }, { "@score":"1", "@id":"36557", "info":{"authors":{"author":[{"@pid":"366/0479","text":"Tobias Piontek"},{"@pid":"276/5182","text":"Kawsar Haghshenas"},{"@pid":"43/3220-1","text":"Marco Aiello 0001"}]},"title":"Carbon emission-aware job scheduling for Kubernetes deployments.","venue":"J. Supercomput.","volume":"80","number":"1","pages":"549-569","year":"2024","type":"Journal Articles","access":"open","key":"journals/tjs/PiontekHA24","doi":"10.1007/S11227-023-05506-7","ee":"https://doi.org/10.1007/s11227-023-05506-7","url":"https://dblp.org/rec/journals/tjs/PiontekHA24"}, "url":"URL#36557" }, { "@score":"1", "@id":"36558", "info":{"authors":{"author":[{"@pid":"241/6733","text":"Pijush Kanti Dutta Pramanik"},{"@pid":"89/9508","text":"Saurabh Pal"},{"@pid":"66/8142","text":"Prasenjit Choudhury"}]},"title":"Mobile crowd computing: potential, architecture, requirements, challenges, and applications.","venue":"J. Supercomput.","volume":"80","number":"2","pages":"2223-2318","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/PramanikPC24","doi":"10.1007/S11227-023-05545-0","ee":"https://doi.org/10.1007/s11227-023-05545-0","url":"https://dblp.org/rec/journals/tjs/PramanikPC24"}, "url":"URL#36558" }, { "@score":"1", "@id":"36559", "info":{"authors":{"author":{"@pid":"78/4738","text":"Sultan Noman Qasem"}},"title":"A novel honey badger algorithm with multilayer perceptron for predicting COVID-19 time series data.","venue":"J. Supercomput.","volume":"80","number":"3","pages":"3943-3969","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/Qasem24","doi":"10.1007/S11227-023-05560-1","ee":"https://doi.org/10.1007/s11227-023-05560-1","url":"https://dblp.org/rec/journals/tjs/Qasem24"}, "url":"URL#36559" }, { "@score":"1", "@id":"36560", "info":{"authors":{"author":[{"@pid":"195/8095","text":"Sibo Qi"},{"@pid":"54/2717","text":"Juan Chen"},{"@pid":"27/7017-7","text":"Peng Chen 0007"},{"@pid":"343/8900","text":"Peian Wen"},{"@pid":"34/1548","text":"Xianhua Niu"},{"@pid":"19/360","text":"Lei Xu"}]},"title":"An efficient GAN-based predictive framework for multivariate time series anomaly prediction in cloud data centers.","venue":"J. Supercomput.","volume":"80","number":"1","pages":"1268-1293","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/QiCCWNX24","doi":"10.1007/S11227-023-05534-3","ee":"https://doi.org/10.1007/s11227-023-05534-3","url":"https://dblp.org/rec/journals/tjs/QiCCWNX24"}, "url":"URL#36560" }, { "@score":"1", "@id":"36561", "info":{"authors":{"author":[{"@pid":"337/3017","text":"Liuling Qi"},{"@pid":"93/1076","text":"Junfeng Tian"},{"@pid":"337/3022","text":"Mengjia Chai"},{"@pid":"247/9265-2","text":"Hongyun Cai 0002"}]},"title":"STFM: a blockchain sharding algorithm based on trust field model for heterogeneous Internet of Things.","venue":"J. Supercomput.","volume":"80","number":"3","pages":"3875-3901","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/QiTCC24","doi":"10.1007/S11227-023-05610-8","ee":"https://doi.org/10.1007/s11227-023-05610-8","url":"https://dblp.org/rec/journals/tjs/QiTCC24"}, "url":"URL#36561" }, { "@score":"1", "@id":"36562", "info":{"authors":{"author":[{"@pid":"60/9542","text":"Lijun Qi"},{"@pid":"127/3531","text":"Jincheng Zhuang"}]},"title":"RLWE-based public key searchable encryption: securer, faster, and lower end-to-end delay for cloud computing.","venue":"J. Supercomput.","volume":"80","number":"2","pages":"2767-2798","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/QiZ24","doi":"10.1007/S11227-023-05574-9","ee":"https://doi.org/10.1007/s11227-023-05574-9","url":"https://dblp.org/rec/journals/tjs/QiZ24"}, "url":"URL#36562" }, { "@score":"1", "@id":"36563", "info":{"authors":{"author":[{"@pid":"166/1117","text":"Amjad Qtaish"},{"@pid":"06/2554","text":"Malik Braik"},{"@pid":"221/3991","text":"Dheeb Albashish"},{"@pid":"267/2558","text":"Mohammad T. Alshammari"},{"@pid":"141/0095","text":"Abdulrahman Alreshidi"},{"@pid":"237/9709","text":"Eissa Jaber Alreshidi"}]},"title":"Optimization of K-means clustering method using hybrid capuchin search algorithm.","venue":"J. Supercomput.","volume":"80","number":"2","pages":"1728-1787","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/QtaishBAAAA24","doi":"10.1007/S11227-023-05540-5","ee":"https://doi.org/10.1007/s11227-023-05540-5","url":"https://dblp.org/rec/journals/tjs/QtaishBAAAA24"}, "url":"URL#36563" }, { "@score":"1", "@id":"36564", "info":{"authors":{"author":[{"@pid":"03/7520","text":"R. Rajalakshmi"},{"@pid":"355/3837","text":"P. Sivakumar"},{"@pid":"343/3803","text":"L. Krishna Kumari"},{"@pid":"366/0649","text":"M. Chengathir Selvi"}]},"title":"A novel deep learning model for diabetes melliuts prediction in IoT-based healthcare environment with effective feature selection mechanism.","venue":"J. Supercomput.","volume":"80","number":"1","pages":"271-291","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/RajalakshmiSKS24","doi":"10.1007/S11227-023-05496-6","ee":"https://doi.org/10.1007/s11227-023-05496-6","url":"https://dblp.org/rec/journals/tjs/RajalakshmiSKS24"}, "url":"URL#36564" }, { "@score":"1", "@id":"36565", "info":{"authors":{"author":[{"@pid":"212/0118","text":"Ruisheng Ran"},{"@pid":"12/2633","text":"Ting Wang"},{"@pid":"10/1143","text":"Zheng Li"},{"@pid":"94/4033-1","text":"Bin Fang 0001"}]},"title":"Polynomial linear discriminant analysis.","venue":"J. Supercomput.","volume":"80","number":"1","pages":"413-434","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/RanWLF24","doi":"10.1007/S11227-023-05485-9","ee":"https://doi.org/10.1007/s11227-023-05485-9","url":"https://dblp.org/rec/journals/tjs/RanWLF24"}, "url":"URL#36565" }, { "@score":"1", "@id":"36566", "info":{"authors":{"author":[{"@pid":"207/1752","text":"Divya Rani"},{"@pid":"56/5125","text":"Sachin Tripathi"}]},"title":"Design of blockchain-based authentication and key agreement protocol for health data sharing in cooperative hospital network.","venue":"J. Supercomput.","volume":"80","number":"2","pages":"2681-2717","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/RaniT24","doi":"10.1007/S11227-023-05577-6","ee":"https://doi.org/10.1007/s11227-023-05577-6","url":"https://dblp.org/rec/journals/tjs/RaniT24"}, "url":"URL#36566" }, { "@score":"1", "@id":"36567", "info":{"authors":{"author":{"@pid":"147/6937","text":"Bahram Rashidi"}},"title":"Fault-tolerant and error-correcting 4-bit S-boxes for cryptography applications with multiple errors detection.","venue":"J. Supercomput.","volume":"80","number":"2","pages":"1464-1490","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/Rashidi24","doi":"10.1007/S11227-023-05530-7","ee":"https://doi.org/10.1007/s11227-023-05530-7","url":"https://dblp.org/rec/journals/tjs/Rashidi24"}, "url":"URL#36567" }, { "@score":"1", "@id":"36568", "info":{"authors":{"author":[{"@pid":"158/4516","text":"K. Hemant Kumar Reddy"},{"@pid":"365/9942","text":"Rajat Shubhra Goswami"},{"@pid":"30/10604","text":"Diptendu Sinha Roy"}]},"title":"A deep learning-based smart service model for context-aware intelligent transportation system.","venue":"J. Supercomput.","volume":"80","number":"4","pages":"4477-4499","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/ReddyGR24","doi":"10.1007/S11227-023-05597-2","ee":"https://doi.org/10.1007/s11227-023-05597-2","url":"https://dblp.org/rec/journals/tjs/ReddyGR24"}, "url":"URL#36568" }, { "@score":"1", "@id":"36569", "info":{"authors":{"author":[{"@pid":"94/10779","text":"Samad Rostampour"},{"@pid":"44/7270","text":"Nasour Bagheri"},{"@pid":"36/2917","text":"Behnam Ghavami"},{"@pid":"26/3971","text":"Ygal Bendavid"},{"@pid":"06/10193","text":"Saru Kumari"},{"@pid":"154/0073","text":"Honorio Martín"},{"@pid":"157/4619","text":"Carmen Camara"}]},"title":"Using a privacy-enhanced authentication process to secure IoT-based smart grid infrastructures.","venue":"J. Supercomput.","volume":"80","number":"2","pages":"1668-1693","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/RostampourBGBKMC24","doi":"10.1007/S11227-023-05535-2","ee":"https://doi.org/10.1007/s11227-023-05535-2","url":"https://dblp.org/rec/journals/tjs/RostampourBGBKMC24"}, "url":"URL#36569" }, { "@score":"1", "@id":"36570", "info":{"authors":{"author":[{"@pid":"94/10779","text":"Samad Rostampour"},{"@pid":"44/7270","text":"Nasour Bagheri"},{"@pid":"36/2917","text":"Behnam Ghavami"},{"@pid":"26/3971","text":"Ygal Bendavid"},{"@pid":"06/10193","text":"Saru Kumari"},{"@pid":"154/0073","text":"Honorio Martín"},{"@pid":"157/4619","text":"Carmen Camara"}]},"title":"Correction to: Using a privacy‑enhanced authentication process to secure IoT‑based smart grid infrastructures.","venue":"J. Supercomput.","volume":"80","number":"2","pages":"2914-2915","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/RostampourBGBKMC24a","doi":"10.1007/S11227-023-05555-Y","ee":"https://doi.org/10.1007/s11227-023-05555-y","url":"https://dblp.org/rec/journals/tjs/RostampourBGBKMC24a"}, "url":"URL#36570" }, { "@score":"1", "@id":"36571", "info":{"authors":{"author":[{"@pid":"351/6040","text":"Sujit Sangram Sahoo"},{"@pid":"225/5961","text":"Vijay Kumar Chaurasiya"}]},"title":"Proof of location based delivery system using multi-party virtual state channel: a blockchain model.","venue":"J. Supercomput.","volume":"80","number":"1","pages":"703-733","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/SahooC24","doi":"10.1007/S11227-023-05510-X","ee":"https://doi.org/10.1007/s11227-023-05510-x","url":"https://dblp.org/rec/journals/tjs/SahooC24"}, "url":"URL#36571" }, { "@score":"1", "@id":"36572", "info":{"authors":{"author":[{"@pid":"313/3924","text":"Yashar Salami"},{"@pid":"257/4609","text":"Vahid Khajehvand"},{"@pid":"73/10695","text":"Esmaeil Zeinali"}]},"title":"SOS-FCI: a secure offloading scheme in fog-cloud-based IoT.","venue":"J. Supercomput.","volume":"80","number":"1","pages":"570-600","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/SalamiKZ24","doi":"10.1007/S11227-023-05499-3","ee":"https://doi.org/10.1007/s11227-023-05499-3","url":"https://dblp.org/rec/journals/tjs/SalamiKZ24"}, "url":"URL#36572" }, { "@score":"1", "@id":"36573", "info":{"authors":{"author":[{"@pid":"366/0507","text":"Sally Mohamed Sameh"},{"@pid":"295/7984","text":"Hossam El-Din Moustafa"},{"@pid":"230/5059","text":"Ehab H. Abdelhay"},{"@pid":"145/4235","text":"Mohamed Maher Ata"}]},"title":"An effective chaotic maps image encryption based on metaheuristic optimizers.","venue":"J. Supercomput.","volume":"80","number":"1","pages":"141-201","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/SamehMAA24","doi":"10.1007/S11227-023-05413-X","ee":"https://doi.org/10.1007/s11227-023-05413-x","url":"https://dblp.org/rec/journals/tjs/SamehMAA24"}, "url":"URL#36573" }, { "@score":"1", "@id":"36574", "info":{"authors":{"author":[{"@pid":"367/3353","text":"S. Saumiya"},{"@pid":"147/5527","text":"S. Wilfred Franklin"}]},"title":"Unified automated deep learning framework for segmentation and classification of liver tumors.","venue":"J. Supercomput.","volume":"80","number":"2","pages":"2347-2380","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/SaumiyaF24","doi":"10.1007/S11227-023-05524-5","ee":"https://doi.org/10.1007/s11227-023-05524-5","url":"https://dblp.org/rec/journals/tjs/SaumiyaF24"}, "url":"URL#36574" }, { "@score":"1", "@id":"36575", "info":{"authors":{"author":[{"@pid":"367/3392","text":"Massoud Seifpour"},{"@pid":"98/7473","text":"Seyyed Amir Asghari"},{"@pid":"174/1761","text":"Mostafa Ghobaei-Arani"}]},"title":"A stochastic multi-objective optimization method for railways scheduling: a NSGA-II-based hybrid approach.","venue":"J. Supercomput.","volume":"80","number":"2","pages":"2128-2163","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/SeifpourAG24","doi":"10.1007/S11227-023-05529-0","ee":"https://doi.org/10.1007/s11227-023-05529-0","url":"https://dblp.org/rec/journals/tjs/SeifpourAG24"}, "url":"URL#36575" }, { "@score":"1", "@id":"36576", "info":{"authors":{"author":[{"@pid":"08/10022","text":"Tariq Shah"},{"@pid":"237/5474","text":"Tanveer ul Haq"}]},"title":"Construction of 24-by-24 nonlinear layer for symmetric algorithm and its application to data encryption in parallel with DNA transform.","venue":"J. Supercomput.","volume":"80","number":"1","pages":"1037-1058","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/ShahH24","doi":"10.1007/S11227-023-05512-9","ee":"https://doi.org/10.1007/s11227-023-05512-9","url":"https://dblp.org/rec/journals/tjs/ShahH24"}, "url":"URL#36576" }, { "@score":"1", "@id":"36577", "info":{"authors":{"author":[{"@pid":"318/6278","text":"Eht E. Sham"},{"@pid":"21/1893","text":"Deo Prakash Vidyarthi"}]},"title":"A modified fuzzy similarity measure for trapezoidal fuzzy number with their applications.","venue":"J. Supercomput.","volume":"80","number":"4","pages":"4733-4759","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/ShamV24","doi":"10.1007/S11227-023-05608-2","ee":"https://doi.org/10.1007/s11227-023-05608-2","url":"https://dblp.org/rec/journals/tjs/ShamV24"}, "url":"URL#36577" }, { "@score":"1", "@id":"36578", "info":{"authors":{"author":[{"@pid":"234/6930","text":"Sumit Sharma 0007"},{"@pid":"00/7626-1","text":"Sarika Jain 0001"}]},"title":"CovidO: an ontology for COVID-19 metadata.","venue":"J. Supercomput.","volume":"80","number":"1","pages":"1238-1267","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/SharmaJ24","doi":"10.1007/S11227-023-05509-4","ee":"https://doi.org/10.1007/s11227-023-05509-4","url":"https://dblp.org/rec/journals/tjs/SharmaJ24"}, "url":"URL#36578" }, { "@score":"1", "@id":"36579", "info":{"authors":{"author":[{"@pid":"78/9083","text":"Neetu Sharma"},{"@pid":"25/4467","text":"Rajesh Rohilla"}]},"title":"A multilevel authentication-based blockchain powered medicine anti-counterfeiting for reliable IoT supply chain management.","venue":"J. Supercomput.","volume":"80","number":"4","pages":"4870-4913","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/SharmaR24","doi":"10.1007/S11227-023-05654-W","ee":"https://doi.org/10.1007/s11227-023-05654-w","url":"https://dblp.org/rec/journals/tjs/SharmaR24"}, "url":"URL#36579" }, { "@score":"1", "@id":"36580", "info":{"authors":{"author":[{"@pid":"19/8659","text":"N. Sheena"},{"@pid":"232/7017","text":"Shelbi Joseph"},{"@pid":"227/9941","text":"Shailesh Sivan"},{"@pid":"42/6662","text":"Bharat Bhushan"}]},"title":"EMCP: evolutionary multi-objective clustering protocol for prolonged lifetime of heterogeneous IoT networks.","venue":"J. Supercomput.","volume":"80","number":"4","pages":"5224-5254","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/SheenaJSB24","doi":"10.1007/S11227-023-05651-Z","ee":"https://doi.org/10.1007/s11227-023-05651-z","url":"https://dblp.org/rec/journals/tjs/SheenaJSB24"}, "url":"URL#36580" }, { "@score":"1", "@id":"36581", "info":{"authors":{"author":[{"@pid":"369/6445","text":"Shreyshi Shree"},{"@pid":"98/1013","text":"Chen Zhou"},{"@pid":"123/6730","text":"Masoud Barati"}]},"title":"Data protection in internet of medical things using blockchain and secret sharing method.","venue":"J. Supercomput.","volume":"80","number":"4","pages":"5108-5135","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/ShreeZB24","doi":"10.1007/S11227-023-05657-7","ee":"https://doi.org/10.1007/s11227-023-05657-7","url":"https://dblp.org/rec/journals/tjs/ShreeZB24"}, "url":"URL#36581" }, { "@score":"1", "@id":"36582", "info":{"authors":{"author":[{"@pid":"136/4793","text":"Namrata Singh"},{"@pid":"68/10357","text":"Ayan Kumar Das"}]},"title":"TFAS: two factor authentication scheme for blockchain enabled IoMT using PUF and fuzzy extractor.","venue":"J. Supercomput.","volume":"80","number":"1","pages":"865-914","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/SinghD24","doi":"10.1007/S11227-023-05507-6","ee":"https://doi.org/10.1007/s11227-023-05507-6","url":"https://dblp.org/rec/journals/tjs/SinghD24"}, "url":"URL#36582" }, { "@score":"1", "@id":"36583", "info":{"authors":{"author":[{"@pid":"260/1757","text":"Raushan Kumar Singh"},{"@pid":"88/4978-5","text":"Mukesh Kumar 0005"}]},"title":"Correction to: Future trends of path planning framework considering accident attributes for smart cities.","venue":"J. Supercomput.","volume":"80","number":"2","pages":"2912","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/SinghK24","doi":"10.1007/S11227-023-05554-Z","ee":"https://doi.org/10.1007/s11227-023-05554-z","url":"https://dblp.org/rec/journals/tjs/SinghK24"}, "url":"URL#36583" }, { "@score":"1", "@id":"36584", "info":{"authors":{"author":[{"@pid":"11/9715","text":"Raghuraj Singh"},{"@pid":"92/2849","text":"Kuldeep Kumar"}]},"title":"Hybrid optimization-enabled deep Q network for fault prediction in service-oriented architecture.","venue":"J. Supercomput.","volume":"80","number":"4","pages":"5565-5592","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/SinghK24a","doi":"10.1007/S11227-023-05659-5","ee":"https://doi.org/10.1007/s11227-023-05659-5","url":"https://dblp.org/rec/journals/tjs/SinghK24a"}, "url":"URL#36584" }, { "@score":"1", "@id":"36585", "info":{"authors":{"author":[{"@pid":"348/1284","text":"Tinka Singh"},{"@pid":"348/1196","text":"Ramagopal V. S. Uppaluri"}]},"title":"Feed-forward ANN and traditional machine learning-based prediction of biogas generation rate from meteorological and organic waste parameters.","venue":"J. Supercomput.","volume":"80","number":"2","pages":"2538-2571","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/SinghU24","doi":"10.1007/S11227-023-05569-6","ee":"https://doi.org/10.1007/s11227-023-05569-6","url":"https://dblp.org/rec/journals/tjs/SinghU24"}, "url":"URL#36585" }, { "@score":"1", "@id":"36586", "info":{"authors":{"author":[{"@pid":"367/3469","text":"Chakaravarthi Sivanandam"},{"@pid":"367/3579","text":"Vaishnnave Mala Perumal"},{"@pid":"367/3325","text":"Jagadeesh Mohan"}]},"title":"A novel light GBM-optimized long short-term memory for enhancing quality and security in web service recommendation system.","venue":"J. Supercomput.","volume":"80","number":"2","pages":"2428-2460","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/SivanandamPM24","doi":"10.1007/S11227-023-05552-1","ee":"https://doi.org/10.1007/s11227-023-05552-1","url":"https://dblp.org/rec/journals/tjs/SivanandamPM24"}, "url":"URL#36586" }, { "@score":"1", "@id":"36587", "info":{"authors":{"author":[{"@pid":"361/8242","text":"G. Sivapriya"},{"@pid":"279/3298","text":"R. Manjula Devi"},{"@pid":"300/7115","text":"Keerthika Periasamy"}]},"title":"Computer-aided diagnostic model for retinal vascular diseases using graph-based attention mechanism.","venue":"J. Supercomput.","volume":"80","number":"2","pages":"2862-2888","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/SivapriyaDP24","doi":"10.1007/S11227-023-05581-W","ee":"https://doi.org/10.1007/s11227-023-05581-w","url":"https://dblp.org/rec/journals/tjs/SivapriyaDP24"}, "url":"URL#36587" }, { "@score":"1", "@id":"36588", "info":{"authors":{"author":[{"@pid":"239/1436","text":"Liqiang Song"},{"@pid":"321/0071","text":"Huaiguang Wang"},{"@pid":"252/4033","text":"Baojian Yang"}]},"title":"Hybrid compression scheme based on VMD optimization algorithm application to mechanical equipment monitoring.","venue":"J. Supercomput.","volume":"80","number":"4","pages":"5341-5362","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/SongWY24","doi":"10.1007/S11227-023-05663-9","ee":"https://doi.org/10.1007/s11227-023-05663-9","url":"https://dblp.org/rec/journals/tjs/SongWY24"}, "url":"URL#36588" }, { "@score":"1", "@id":"36589", "info":{"authors":{"author":[{"@pid":"26/8455","text":"Yuqin Song"},{"@pid":"354/3674","text":"Jitao Zhao"},{"@pid":"369/6074","text":"Chunliang Shang"}]},"title":"A multi-stage feature fusion defogging network based on the attention mechanism.","venue":"J. Supercomput.","volume":"80","number":"4","pages":"4577-4599","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/SongZS24","doi":"10.1007/S11227-023-05644-Y","ee":"https://doi.org/10.1007/s11227-023-05644-y","url":"https://dblp.org/rec/journals/tjs/SongZS24"}, "url":"URL#36589" }, { "@score":"1", "@id":"36590", "info":{"authors":{"author":[{"@pid":"309/4483","text":"Shaurya Sood"},{"@pid":"20/7949","text":"Neminath Hubballi"}]},"title":"SlowTrack: detecting slow rate Denial of Service attacks against HTTP with behavioral parameters.","venue":"J. Supercomput.","volume":"80","number":"2","pages":"1788-1817","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/SoodH24","doi":"10.1007/S11227-023-05453-3","ee":"https://doi.org/10.1007/s11227-023-05453-3","url":"https://dblp.org/rec/journals/tjs/SoodH24"}, "url":"URL#36590" }, { "@score":"1", "@id":"36591", "info":{"authors":{"author":[{"@pid":"08/4860","text":"Jingbo Sun"},{"@pid":"26/9109","text":"Weiming Peng"},{"@pid":"129/2030","text":"Tianbao Song"},{"@pid":"17/144-7","text":"Haitao Liu 0007"},{"@pid":"190/4467","text":"Shuqin Zhu"},{"@pid":"138/8290","text":"Jihua Song"}]},"title":"Enhanced cross-prompt trait scoring via syntactic feature fusion and contrastive learning.","venue":"J. Supercomput.","volume":"80","number":"4","pages":"5390-5407","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/SunPSLZS24","doi":"10.1007/S11227-023-05640-2","ee":"https://doi.org/10.1007/s11227-023-05640-2","url":"https://dblp.org/rec/journals/tjs/SunPSLZS24"}, "url":"URL#36591" }, { "@score":"1", "@id":"36592", "info":{"authors":{"author":[{"@pid":"369/6916","text":"Ru Sun"},{"@pid":"88/3999","text":"Ting Yang"}]},"title":"Hybrid parameter-based PSO flexible needle percutaneous puncture path planning.","venue":"J. Supercomput.","volume":"80","number":"4","pages":"5408-5427","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/SunY24","doi":"10.1007/S11227-023-05661-X","ee":"https://doi.org/10.1007/s11227-023-05661-x","url":"https://dblp.org/rec/journals/tjs/SunY24"}, "url":"URL#36592" }, { "@score":"1", "@id":"36593", "info":{"authors":{"author":[{"@pid":"185/7856","text":"Xiaoxiao Sun"},{"@pid":"71/2050","text":"Siqing Yang"},{"@pid":"263/9999","text":"Chenying Zhao"},{"@pid":"95/5625","text":"Dongjin Yu"}]},"title":"Design-time business process compliance assessment based on multi-granularity semantic information.","venue":"J. Supercomput.","volume":"80","number":"4","pages":"4943-4971","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/SunYZY24","doi":"10.1007/S11227-023-05626-0","ee":"https://doi.org/10.1007/s11227-023-05626-0","url":"https://dblp.org/rec/journals/tjs/SunYZY24"}, "url":"URL#36593" }, { "@score":"1", "@id":"36594", "info":{"authors":{"author":[{"@pid":"259/4861","text":"Yaqian Tang"},{"@pid":"03/9018","text":"Baolei Cheng"},{"@pid":"59/2227-78","text":"Yan Wang 0078"},{"@pid":"04/8511","text":"Yuejuan Han"},{"@pid":"86/3457","text":"Jia Yu"},{"@pid":"93/2399","text":"Jianxi Fan"}]},"title":"Connectivity and diagnosability of a class of recursive networks.","venue":"J. Supercomput.","volume":"80","number":"3","pages":"3817-3848","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/TangCWHYF24","doi":"10.1007/S11227-023-05589-2","ee":"https://doi.org/10.1007/s11227-023-05589-2","url":"https://dblp.org/rec/journals/tjs/TangCWHYF24"}, "url":"URL#36594" }, { "@score":"1", "@id":"36595", "info":{"authors":{"author":[{"@pid":"86/2476","text":"Yuxin Tang"},{"@pid":"307/9882","text":"Yudi Qiu"},{"@pid":"49/3816","text":"Yanwei Liu"},{"@pid":"249/6270","text":"Jie Jiao"},{"@pid":"21/1048","text":"Peng Zhang"},{"@pid":"15/6772","text":"Yibo Fan"}]},"title":"Scalable short-entry dual-grain coherence directories with flexible region granularity.","venue":"J. Supercomput.","volume":"80","number":"2","pages":"2889-2911","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/TangQLJZF24","doi":"10.1007/S11227-023-05559-8","ee":"https://doi.org/10.1007/s11227-023-05559-8","url":"https://dblp.org/rec/journals/tjs/TangQLJZF24"}, "url":"URL#36595" }, { "@score":"1", "@id":"36596", "info":{"authors":{"author":[{"@pid":"35/1725","text":"Minghua Tang"},{"@pid":"35/11048","text":"Enrico Russo"},{"@pid":"45/1025","text":"Maurizio Palesi"}]},"title":"Correction to: The position-based compression techniques for DNN model.","venue":"J. Supercomput.","volume":"80","number":"1","pages":"1365","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/TangRP24","doi":"10.1007/S11227-023-05514-7","ee":"https://doi.org/10.1007/s11227-023-05514-7","url":"https://dblp.org/rec/journals/tjs/TangRP24"}, "url":"URL#36596" }, { "@score":"1", "@id":"36597", "info":{"authors":{"author":[{"@pid":"97/6203","text":"Jianxin Tang"},{"@pid":"310/3843","text":"Shihui Song"},{"@pid":"08/6204","text":"Hongyu Zhu"},{"@pid":"351/3948","text":"Qian Du 0011"},{"@pid":"351/3768","text":"Jitao Qu"}]},"title":"Sequential seeding policy on social influence maximization: a Q-learning-driven discrete differential evolution optimization.","venue":"J. Supercomput.","volume":"80","number":"3","pages":"3334-3359","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/TangSZDQ24","doi":"10.1007/S11227-023-05601-9","ee":"https://doi.org/10.1007/s11227-023-05601-9","url":"https://dblp.org/rec/journals/tjs/TangSZDQ24"}, "url":"URL#36597" }, { "@score":"1", "@id":"36598", "info":{"authors":{"author":[{"@pid":"91/5889","text":"Min Tian"},{"@pid":"95/2446","text":"Qi Liu"},{"@pid":"57/6978","text":"Jingshan Pan"},{"@pid":"145/0204","text":"Ying Gou"},{"@pid":"34/7702","text":"Zanjun Zhang"}]},"title":"swPTS: an efficient parallel Thomas split algorithm for tridiagonal systems on Sunway manycore processors.","venue":"J. Supercomput.","volume":"80","number":"4","pages":"4682-4706","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/TianLPGZ24","doi":"10.1007/S11227-023-05641-1","ee":"https://doi.org/10.1007/s11227-023-05641-1","url":"https://dblp.org/rec/journals/tjs/TianLPGZ24"}, "url":"URL#36598" }, { "@score":"1", "@id":"36599", "info":{"authors":{"author":[{"@pid":"62/5501","text":"Tian Tian"},{"@pid":"197/5722","text":"Anshi Wang"},{"@pid":"366/0777","text":"Xiuting Yang"},{"@pid":"15/394","text":"Dunwei Gong"},{"@pid":"14/5528","text":"Tie Hou"},{"@pid":"02/86","text":"Xiangjuan Yao"}]},"title":"Parallel program testing based on critical communication and branch transformation.","venue":"J. Supercomput.","volume":"80","number":"1","pages":"519-548","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/TianWYGHY24","doi":"10.1007/S11227-023-05460-4","ee":"https://doi.org/10.1007/s11227-023-05460-4","url":"https://dblp.org/rec/journals/tjs/TianWYGHY24"}, "url":"URL#36599" }, { "@score":"1", "@id":"36600", "info":{"authors":{"author":[{"@pid":"317/1568","text":"Zhaoxia Tian"},{"@pid":"146/8932","text":"Mingzu Zhang"},{"@pid":"121/5751","text":"Xing Feng"}]},"title":"Concentration phenomenon about h-extra edge-connectivity of the n-th cartesian product of complete graph K4 with large-scale faulty links.","venue":"J. Supercomput.","volume":"80","number":"2","pages":"1640-1667","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/TianZF24","doi":"10.1007/S11227-023-05350-9","ee":"https://doi.org/10.1007/s11227-023-05350-9","url":"https://dblp.org/rec/journals/tjs/TianZF24"}, "url":"URL#36600" }, { "@score":"1", "@id":"36601", "info":{"authors":{"author":[{"@pid":"350/1102","text":"Yinsheng Tong"},{"@pid":"16/7695","text":"Zuoyong Li"},{"@pid":"33/5763-9","text":"Hui Huang 0009"},{"@pid":"209/3663","text":"Libin Gao"},{"@pid":"62/10860","text":"Minghai Xu"},{"@pid":"31/11263-1","text":"Zhongyi Hu 0001"}]},"title":"Research of spatial context convolutional neural networks for early diagnosis of Alzheimer's disease.","venue":"J. Supercomput.","volume":"80","number":"4","pages":"5279-5297","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/TongLHGXH24","doi":"10.1007/S11227-023-05655-9","ee":"https://doi.org/10.1007/s11227-023-05655-9","url":"https://dblp.org/rec/journals/tjs/TongLHGXH24"}, "url":"URL#36601" }, { "@score":"1", "@id":"36602", "info":{"authors":{"author":[{"@pid":"321/6380","text":"Santosh Kumar Uppada"},{"@pid":"367/3615","text":"B. S. Ashwin"},{"@pid":"132/9186","text":"B. Sivaselvan"}]},"title":"A novel evolutionary approach-based multimodal model to detect fake news in OSNs using text and metadata.","venue":"J. Supercomput.","volume":"80","number":"2","pages":"1522-1553","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/UppadaAS24","doi":"10.1007/S11227-023-05531-6","ee":"https://doi.org/10.1007/s11227-023-05531-6","url":"https://dblp.org/rec/journals/tjs/UppadaAS24"}, "url":"URL#36602" }, { "@score":"1", "@id":"36603", "info":{"authors":{"author":[{"@pid":"169/3613","text":"Beste Ustubioglu"},{"@pid":"297/0926","text":"Gul Tahaoglu"},{"@pid":"34/7657","text":"Güzin Ulutas"},{"@pid":"144/2243","text":"Arda Ustubioglu"},{"@pid":"366/0469","text":"Muhammed Kilic"}]},"title":"Audio forgery detection and localization with super-resolution spectrogram and keypoint-based clustering approach.","venue":"J. Supercomput.","volume":"80","number":"1","pages":"486-518","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/UstubiogluTUUK24","doi":"10.1007/S11227-023-05504-9","ee":"https://doi.org/10.1007/s11227-023-05504-9","url":"https://dblp.org/rec/journals/tjs/UstubiogluTUUK24"}, "url":"URL#36603" }, { "@score":"1", "@id":"36604", "info":{"authors":{"author":[{"@pid":"369/6136","text":"Prashant Vaish"},{"@pid":"206/3651","text":"Niharika Anand"},{"@pid":"193/9923","text":"Vishal Krishna Singh"},{"@pid":"181/2824","text":"Gaurav Sharma"}]},"title":"Applications hosting over cloud-assisted IOT: a productivity model and method defining accessibility of data security.","venue":"J. Supercomput.","volume":"80","number":"4","pages":"5540-5564","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/VaishASS24","doi":"10.1007/S11227-023-05668-4","ee":"https://doi.org/10.1007/s11227-023-05668-4","url":"https://dblp.org/rec/journals/tjs/VaishASS24"}, "url":"URL#36604" }, { "@score":"1", "@id":"36605", "info":{"authors":{"author":[{"@pid":"145/6832","text":"Fatemeh Vardi"},{"@pid":"320/4068","text":"Alireza Mahjoub"}]},"title":"A hot-module-aware mapping approach in network-on-chip.","venue":"J. Supercomput.","volume":"80","number":"1","pages":"670-702","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/VardiM24","doi":"10.1007/S11227-023-05424-8","ee":"https://doi.org/10.1007/s11227-023-05424-8","url":"https://dblp.org/rec/journals/tjs/VardiM24"}, "url":"URL#36605" }, { "@score":"1", "@id":"36606", "info":{"authors":{"author":[{"@pid":"309/6120","text":"Junfan Wang"},{"@pid":"49/6574","text":"Yi Chen"},{"@pid":"334/1913","text":"Yeting Gu"},{"@pid":"203/6952","text":"Yunfeng Yan"},{"@pid":"181/2688","text":"Qi Li"},{"@pid":"61/7672-2","text":"Mingyu Gao 0002"},{"@pid":"162/8503","text":"Zhekang Dong"}]},"title":"A lightweight vehicle mounted multi-scale traffic sign detector using attention fusion pyramid.","venue":"J. Supercomput.","volume":"80","number":"3","pages":"3360-3381","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/WangCGYLGD24","doi":"10.1007/S11227-023-05594-5","ee":"https://doi.org/10.1007/s11227-023-05594-5","url":"https://dblp.org/rec/journals/tjs/WangCGYLGD24"}, "url":"URL#36606" }, { "@score":"1", "@id":"36607", "info":{"authors":{"author":[{"@pid":"73/4416","text":"Youwei Wang"},{"@pid":"144/7269","text":"Lizhou Feng"},{"@pid":"182/7579","text":"Ao Liu"},{"@pid":"51/5775","text":"Weiqi Wang"},{"@pid":"311/4437","text":"Yudong Hou"}]},"title":"Dual BiGRU-CNN-based sentiment classification method combining global and local attention.","venue":"J. Supercomput.","volume":"80","number":"2","pages":"2799-2837","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/WangFLWH24","doi":"10.1007/S11227-023-05558-9","ee":"https://doi.org/10.1007/s11227-023-05558-9","url":"https://dblp.org/rec/journals/tjs/WangFLWH24"}, "url":"URL#36607" }, { "@score":"1", "@id":"36608", "info":{"authors":{"author":[{"@pid":"00/555","text":"Yifei Wang"},{"@pid":"45/8056","text":"Mert Pilanci"}]},"title":"Correction to: Sketching the Krylov subspace: faster computation of the entire ridge regularization path.","venue":"J. Supercomput.","volume":"80","number":"1","pages":"1366","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/WangP24","doi":"10.1007/S11227-023-05476-W","ee":"https://doi.org/10.1007/s11227-023-05476-w","url":"https://dblp.org/rec/journals/tjs/WangP24"}, "url":"URL#36608" }, { "@score":"1", "@id":"36609", "info":{"authors":{"author":[{"@pid":"340/9368","text":"Yuju Wang"},{"@pid":"57/4791","text":"Liang-Hong Wu"},{"@pid":"74/1803","text":"Liang-Chuan Wu"}]},"title":"An integrative extraction approach for index-tracking portfolio construction and forecasting under a deep learning framework.","venue":"J. Supercomput.","volume":"80","number":"2","pages":"2047-2066","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/WangWW24","doi":"10.1007/S11227-023-05538-Z","ee":"https://doi.org/10.1007/s11227-023-05538-z","url":"https://dblp.org/rec/journals/tjs/WangWW24"}, "url":"URL#36609" }, { "@score":"1", "@id":"36610", "info":{"authors":{"author":[{"@pid":"330/2302","text":"Guangjin Wang"},{"@pid":"315/9794","text":"Yuanying Wang"},{"@pid":"06/4525","text":"Fuyong Xu"},{"@pid":"55/6614","text":"Yongsheng Zhang"},{"@pid":"85/670","text":"Peiyu Liu"}]},"title":"Syntactic and semantic dual-enhanced bidirectional network for aspect sentiment triplet extraction.","venue":"J. Supercomput.","volume":"80","number":"3","pages":"3025-3041","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/WangWXZL24","doi":"10.1007/S11227-023-05573-W","ee":"https://doi.org/10.1007/s11227-023-05573-w","url":"https://dblp.org/rec/journals/tjs/WangWXZL24"}, "url":"URL#36610" }, { "@score":"1", "@id":"36611", "info":{"authors":{"author":[{"@pid":"76/2328","text":"Zhenghong Wang"},{"@pid":"128/7830","text":"Fanhua Yu"},{"@pid":"23/2060","text":"Dan Wang"},{"@pid":"22/8579","text":"Taihui Liu"},{"@pid":"367/3377","text":"Rongjun Hu"}]},"title":"Multi-threshold segmentation of breast cancer images based on improved dandelion optimization algorithm.","venue":"J. Supercomput.","volume":"80","number":"3","pages":"3849-3874","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/WangYWLH24","doi":"10.1007/S11227-023-05605-5","ee":"https://doi.org/10.1007/s11227-023-05605-5","url":"https://dblp.org/rec/journals/tjs/WangYWLH24"}, "url":"URL#36611" }, { "@score":"1", "@id":"36612", "info":{"authors":{"author":[{"@pid":"36/5574","text":"Xuesong Wang"},{"@pid":"181/2621","text":"Zheng Zhang"},{"@pid":"97/4647","text":"Dongsheng Zhang"},{"@pid":"367/3492","text":"Limin Ding"}]},"title":"Pose visual detection method for cellphone dropping process incorporating prior information.","venue":"J. Supercomput.","volume":"80","number":"3","pages":"3142-3161","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/WangZZD24","doi":"10.1007/S11227-023-05527-2","ee":"https://doi.org/10.1007/s11227-023-05527-2","url":"https://dblp.org/rec/journals/tjs/WangZZD24"}, "url":"URL#36612" }, { "@score":"1", "@id":"36613", "info":{"authors":{"author":[{"@pid":"87/5280","text":"Huafeng Wu"},{"@pid":"90/4225","text":"Feng Wang"},{"@pid":"240/2892","text":"Xiaojun Mei"},{"@pid":"289/1453","text":"Linian Liang"},{"@pid":"74/2721","text":"Bing Han"},{"@pid":"48/1843","text":"Dezhi Han"},{"@pid":"81/3025","text":"Tien-Hsiung Weng"},{"@pid":"l/KuanChingLi","text":"Kuan-Ching Li"}]},"title":"A novel fuzzy control path planning algorithm for intelligent ship based on scale factors.","venue":"J. Supercomput.","volume":"80","number":"1","pages":"202-225","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/WuWMLHHWL24","doi":"10.1007/S11227-023-05438-2","ee":"https://doi.org/10.1007/s11227-023-05438-2","url":"https://dblp.org/rec/journals/tjs/WuWMLHHWL24"}, "url":"URL#36613" }, { "@score":"1", "@id":"36614", "info":{"authors":{"author":[{"@pid":"87/5280","text":"Huafeng Wu"},{"@pid":"126/5240","text":"Yuxuan Zhang"},{"@pid":"289/1453","text":"Linian Liang"},{"@pid":"240/2892","text":"Xiaojun Mei"},{"@pid":"48/1843","text":"Dezhi Han"},{"@pid":"74/2721","text":"Bing Han"},{"@pid":"81/3025","text":"Tien-Hsiung Weng"},{"@pid":"l/KuanChingLi","text":"Kuan-Ching Li"}]},"title":"Correction to: Multi‑head attention‑based model for reconstructing continuous missing time series data.","venue":"J. Supercomput.","volume":"80","number":"1","pages":"1363-1364","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/WuZLMHHWL24","doi":"10.1007/S11227-023-05515-6","ee":"https://doi.org/10.1007/s11227-023-05515-6","url":"https://dblp.org/rec/journals/tjs/WuZLMHHWL24"}, "url":"URL#36614" }, { "@score":"1", "@id":"36615", "info":{"authors":{"author":[{"@pid":"177/9274","text":"Chenxing Xia"},{"@pid":"367/3343","text":"Difeng Chen"},{"@pid":"202/2563","text":"Xiuju Gao"},{"@pid":"79/3482","text":"Bin Ge"},{"@pid":"l/KuanChingLi","text":"Kuan-Ching Li"},{"@pid":"49/8453","text":"Xianjin Fang"},{"@pid":"04/3348","text":"Yan Zhang"},{"@pid":"80/4136","text":"Ke Yang"}]},"title":"MFCINet: multi-level feature and context information fusion network for RGB-D salient object detection.","venue":"J. Supercomput.","volume":"80","number":"2","pages":"2487-2513","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/XiaCGGLFZY24","doi":"10.1007/S11227-023-05561-0","ee":"https://doi.org/10.1007/s11227-023-05561-0","url":"https://dblp.org/rec/journals/tjs/XiaCGGLFZY24"}, "url":"URL#36615" }, { "@score":"1", "@id":"36616", "info":{"authors":{"author":[{"@pid":"275/4786","text":"Dahai Xia"},{"@pid":"155/5537","text":"Xinyun Wu"},{"@pid":"131/4289-2","text":"Meng Yan 0002"},{"@pid":"21/4828","text":"Caiquan Xiong"}]},"title":"An adaptive stochastic ranking-based tournament selection method for differential evolution.","venue":"J. Supercomput.","volume":"80","number":"1","pages":"20-49","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/XiaWYX24","doi":"10.1007/S11227-023-05390-1","ee":"https://doi.org/10.1007/s11227-023-05390-1","url":"https://dblp.org/rec/journals/tjs/XiaWYX24"}, "url":"URL#36616" }, { "@score":"1", "@id":"36617", "info":{"authors":{"author":[{"@pid":"129/9670","text":"Chunjing Xiao"},{"@pid":"345/8231","text":"Shenkai Lv"},{"@pid":"54/3488-1","text":"Wei Fan 0001"},{"@pid":"36/2935","text":"W. H. Ip"}]},"title":"Temporal-order association-based dynamic graph evolution for recommendation.","venue":"J. Supercomput.","volume":"80","number":"4","pages":"5197-5223","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/XiaoLFI24","doi":"10.1007/S11227-023-05645-X","ee":"https://doi.org/10.1007/s11227-023-05645-x","url":"https://dblp.org/rec/journals/tjs/XiaoLFI24"}, "url":"URL#36617" }, { "@score":"1", "@id":"36618", "info":{"authors":{"author":[{"@pid":"236/1898","text":"Junbi Xiao"},{"@pid":"264/1793","text":"Xingjian Pan"},{"@pid":"122/5065","text":"Jianhang Liu"},{"@pid":"39/449","text":"Jian Wang"},{"@pid":"24/9047","text":"Peiying Zhang"},{"@pid":"190/6566","text":"Laith Abualigah"}]},"title":"Load balancing strategy for SDN multi-controller clusters based on load prediction.","venue":"J. Supercomput.","volume":"80","number":"4","pages":"5136-5162","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/XiaoPLWZA24","doi":"10.1007/S11227-023-05658-6","ee":"https://doi.org/10.1007/s11227-023-05658-6","url":"https://dblp.org/rec/journals/tjs/XiaoPLWZA24"}, "url":"URL#36618" }, { "@score":"1", "@id":"36619", "info":{"authors":{"author":[{"@pid":"302/4497","text":"Ruihang Xu"},{"@pid":"156/6667","text":"Peisen Wang"},{"@pid":"233/2194","text":"Xuanjing Li"},{"@pid":"367/3575","text":"Ruifeng Nie"}]},"title":"YOLO-ARGhost: a lightweight face mask detection model.","venue":"J. Supercomput.","volume":"80","number":"3","pages":"3162-3182","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/XuWLN24","doi":"10.1007/S11227-023-05588-3","ee":"https://doi.org/10.1007/s11227-023-05588-3","url":"https://dblp.org/rec/journals/tjs/XuWLN24"}, "url":"URL#36619" }, { "@score":"1", "@id":"36620", "info":{"authors":{"author":[{"@pid":"97/3265","text":"Jin Xu"},{"@pid":"90/4237","text":"Huiqun Yu"},{"@pid":"17/5233","text":"Guisheng Fan"},{"@pid":"15/8208","text":"Jiayin Zhang"},{"@pid":"188/7735","text":"Zengpeng Li"},{"@pid":"144/9066","text":"Qifeng Tang"}]},"title":"Adaptive edge service deployment in burst load scenarios using deep reinforcement learning.","venue":"J. Supercomput.","volume":"80","number":"4","pages":"5446-5471","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/XuYFZLT24","doi":"10.1007/S11227-023-05656-8","ee":"https://doi.org/10.1007/s11227-023-05656-8","url":"https://dblp.org/rec/journals/tjs/XuYFZLT24"}, "url":"URL#36620" }, { "@score":"1", "@id":"36621", "info":{"authors":{"author":[{"@pid":"172/9047","text":"Ashok Kumar Yadav"},{"@pid":"00/505","text":"Karan Singh"},{"@pid":"206/5603","text":"Pramod Kumar Srivastava"}]},"title":"Probabilistic estimation of comprehensive utility based on user preference and network condition for network selection in future in HetNet.","venue":"J. Supercomput.","volume":"80","number":"3","pages":"4378-4400","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/YadavSS24","doi":"10.1007/S11227-023-05595-4","ee":"https://doi.org/10.1007/s11227-023-05595-4","url":"https://dblp.org/rec/journals/tjs/YadavSS24"}, "url":"URL#36621" }, { "@score":"1", "@id":"36622", "info":{"authors":{"author":[{"@pid":"187/1683","text":"Yanni Yang"},{"@pid":"367/3292","text":"Yiting Tan"},{"@pid":"367/3360","text":"Jintao Min"},{"@pid":"153/2292","text":"Zhengwei Huang"}]},"title":"Automatic text summarization for government news reports based on multiple features.","venue":"J. Supercomput.","volume":"80","number":"3","pages":"3212-3228","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/YangTMH24","doi":"10.1007/S11227-023-05599-0","ee":"https://doi.org/10.1007/s11227-023-05599-0","url":"https://dblp.org/rec/journals/tjs/YangTMH24"}, "url":"URL#36622" }, { "@score":"1", "@id":"36623", "info":{"authors":{"author":[{"@pid":"33/4854-17","text":"Yi Yang 0017"},{"@pid":"141/9042","text":"Jiaxuan Wei"},{"@pid":"133/0438","text":"Zhixuan Yu"},{"@pid":"73/401","text":"Ruisheng Zhang"}]},"title":"A trustworthy neural architecture search framework for pneumonia image classification utilizing blockchain technology.","venue":"J. Supercomput.","volume":"80","number":"2","pages":"1694-1727","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/YangWYZ24","doi":"10.1007/S11227-023-05541-4","ee":"https://doi.org/10.1007/s11227-023-05541-4","url":"https://dblp.org/rec/journals/tjs/YangWYZ24"}, "url":"URL#36623" }, { "@score":"1", "@id":"36624", "info":{"authors":{"author":[{"@pid":"51/2890","text":"Jin Yang"},{"@pid":"84/8385","text":"Wangdong Yang"},{"@pid":"366/0654","text":"Ruixuan Qi"},{"@pid":"304/6066","text":"Qinyun Tsai"},{"@pid":"304/5542","text":"Shengle Lin"},{"@pid":"366/0710","text":"Fengkun Dong"},{"@pid":"l/KenliLi","text":"Kenli Li 0001"},{"@pid":"l/KeqinLi","text":"Keqin Li 0001"}]},"title":"Parallel algorithm design and optimization of geodynamic numerical simulation application on the Tianhe new-generation high-performance computer.","venue":"J. Supercomput.","volume":"80","number":"1","pages":"331-362","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/YangYQTLDLL24","doi":"10.1007/S11227-023-05469-9","ee":"https://doi.org/10.1007/s11227-023-05469-9","url":"https://dblp.org/rec/journals/tjs/YangYQTLDLL24"}, "url":"URL#36624" }, { "@score":"1", "@id":"36625", "info":{"authors":{"author":[{"@pid":"19/2504","text":"Fei Yang"},{"@pid":"53/175","text":"Huyin Zhang"},{"@pid":"312/8468","text":"Shiming Tao"},{"@pid":"59/8593","text":"Xiying Fan"}]},"title":"Simple hierarchical PageRank graph neural networks.","venue":"J. Supercomput.","volume":"80","number":"4","pages":"5509-5539","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/YangZTF24","doi":"10.1007/S11227-023-05666-6","ee":"https://doi.org/10.1007/s11227-023-05666-6","url":"https://dblp.org/rec/journals/tjs/YangZTF24"}, "url":"URL#36625" }, { "@score":"1", "@id":"36626", "info":{"authors":{"author":[{"@pid":"325/1665","text":"Md Yeasin"},{"@pid":"151/8176","text":"Ranjit Kumar Paul"}]},"title":"OptiSembleForecasting: optimization-based ensemble forecasting using MCS algorithm and PCA-based error index.","venue":"J. Supercomput.","volume":"80","number":"2","pages":"1568-1597","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/YeasinP24","doi":"10.1007/S11227-023-05542-3","ee":"https://doi.org/10.1007/s11227-023-05542-3","url":"https://dblp.org/rec/journals/tjs/YeasinP24"}, "url":"URL#36626" }, { "@score":"1", "@id":"36627", "info":{"authors":{"author":[{"@pid":"01/9103","text":"Chao Yin"},{"@pid":"52/8874","text":"Qin Fang"},{"@pid":"88/5785","text":"Hongyi Li"},{"@pid":"367/3498","text":"Yingjian Peng"},{"@pid":"118/2268","text":"Xiaogang Xu"},{"@pid":"38/5641","text":"Dan Tang"}]},"title":"An optimized resource scheduling algorithm based on GA and ACO algorithm in fog computing.","venue":"J. Supercomput.","volume":"80","number":"3","pages":"4248-4285","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/YinFLPXT24","doi":"10.1007/S11227-023-05571-Y","ee":"https://doi.org/10.1007/s11227-023-05571-y","url":"https://dblp.org/rec/journals/tjs/YinFLPXT24"}, "url":"URL#36627" }, { "@score":"1", "@id":"36628", "info":{"authors":{"author":[{"@pid":"09/4195","text":"Zhiyi Yu"},{"@pid":"93/6234","text":"Hong Li"},{"@pid":"369/6407","text":"Jialin Feng"}]},"title":"Contrastive learning for unsupervised sentence embeddings using negative samples with diminished semantics.","venue":"J. Supercomput.","volume":"80","number":"4","pages":"5428-5445","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/YuLF24","doi":"10.1007/S11227-023-05682-6","ee":"https://doi.org/10.1007/s11227-023-05682-6","url":"https://dblp.org/rec/journals/tjs/YuLF24"}, "url":"URL#36628" }, { "@score":"1", "@id":"36629", "info":{"authors":{"author":[{"@pid":"29/5782","text":"Quan Yuan"},{"@pid":"62/3650","text":"Shanshan Wang"},{"@pid":"263/5411","text":"Mai Hu"},{"@pid":"09/2922","text":"Liang Zeng"}]},"title":"SLDChOA: a comprehensive and competitive multi-strategy-enhanced chimp algorithm for global optimization and engineering design.","venue":"J. Supercomput.","volume":"80","number":"3","pages":"3589-3643","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/YuanWHZ24","doi":"10.1007/S11227-023-05617-1","ee":"https://doi.org/10.1007/s11227-023-05617-1","url":"https://dblp.org/rec/journals/tjs/YuanWHZ24"}, "url":"URL#36629" }, { "@score":"1", "@id":"36630", "info":{"authors":{"author":[{"@pid":"27/5935","text":"Hongwei Zhang"},{"@pid":"369/6887","text":"Shuaibo Liu"},{"@pid":"09/404","text":"Chi Wang"},{"@pid":"62/2062","text":"Shuai Lu"},{"@pid":"366/3273","text":"Wenbo Xiong"}]},"title":"Color-patterned fabric defect detection algorithm based on triplet attention multi-scale U-shape denoising convolutional auto-encoder.","venue":"J. Supercomput.","volume":"80","number":"4","pages":"4451-4476","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/ZhangLWLX24","doi":"10.1007/S11227-023-05639-9","ee":"https://doi.org/10.1007/s11227-023-05639-9","url":"https://dblp.org/rec/journals/tjs/ZhangLWLX24"}, "url":"URL#36630" }, { "@score":"1", "@id":"36631", "info":{"authors":{"author":[{"@pid":"37/1629","text":"Lin Zhang"},{"@pid":"02/2187","text":"Fang'ai Liu"},{"@pid":"33/11211","text":"Hongchen Wu"},{"@pid":"257/2699","text":"Xuqiang Zhuang"},{"@pid":"346/0235","text":"Yaoyao Yan"}]},"title":"CFF: combining interactive features and user interest features for click-through rate prediction.","venue":"J. Supercomput.","volume":"80","number":"3","pages":"3282-3309","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/ZhangLWZY24","doi":"10.1007/S11227-023-05598-1","ee":"https://doi.org/10.1007/s11227-023-05598-1","url":"https://dblp.org/rec/journals/tjs/ZhangLWZY24"}, "url":"URL#36631" }, { "@score":"1", "@id":"36632", "info":{"authors":{"author":[{"@pid":"64/7820","text":"Guifang Zhang"},{"@pid":"37/3778","text":"Hon-Cheng Wong"}]},"title":"Saliency-based dual-attention network for unsupervised video object segmentation.","venue":"J. Supercomput.","volume":"80","number":"4","pages":"4996-5010","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/ZhangW24","doi":"10.1007/S11227-023-05637-X","ee":"https://doi.org/10.1007/s11227-023-05637-x","url":"https://dblp.org/rec/journals/tjs/ZhangW24"}, "url":"URL#36632" }, { "@score":"1", "@id":"36633", "info":{"authors":{"author":[{"@pid":"300/5444","text":"Huanwen Zhang"},{"@pid":"59/2227-78","text":"Yan Wang 0078"},{"@pid":"93/2399","text":"Jianxi Fan"},{"@pid":"04/8511","text":"Yuejuan Han"},{"@pid":"03/9018","text":"Baolei Cheng"}]},"title":"Constructing edge-disjoint spanning trees in several cube-based networks with applications to edge fault-tolerant communication.","venue":"J. Supercomput.","volume":"80","number":"2","pages":"1907-1934","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/ZhangWFHC24","doi":"10.1007/S11227-023-05546-Z","ee":"https://doi.org/10.1007/s11227-023-05546-z","url":"https://dblp.org/rec/journals/tjs/ZhangWFHC24"}, "url":"URL#36633" }, { "@score":"1", "@id":"36634", "info":{"authors":{"author":[{"@pid":"24/4986","text":"Hongxia Zhang"},{"@pid":"352/1729","text":"Mengde Wu"},{"@pid":"352/1514","text":"Qiqi Feng"},{"@pid":"17/5705","text":"Hao Li"}]},"title":"AERQP: adaptive embedding representation-based QoS prediction for web service recommendation.","venue":"J. Supercomput.","volume":"80","number":"3","pages":"3042-3065","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/ZhangWFL24","doi":"10.1007/S11227-023-05582-9","ee":"https://doi.org/10.1007/s11227-023-05582-9","url":"https://dblp.org/rec/journals/tjs/ZhangWFL24"}, "url":"URL#36634" }, { "@score":"1", "@id":"36635", "info":{"authors":{"author":[{"@pid":"360/7212","text":"Zuoyan Zhang"},{"@pid":"120/1768","text":"Jinchen Xu"},{"@pid":"292/5167","text":"Jiangwei Hao"},{"@pid":"08/2613","text":"Yang Qu"},{"@pid":"302/9857","text":"Haotian He"},{"@pid":"14/153","text":"Bei Zhou"}]},"title":"Hierarchical search algorithm for error detection in floating-point arithmetic expressions.","venue":"J. Supercomput.","volume":"80","number":"1","pages":"1183-1205","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/ZhangXHQHZ24","doi":"10.1007/S11227-023-05523-6","ee":"https://doi.org/10.1007/s11227-023-05523-6","url":"https://dblp.org/rec/journals/tjs/ZhangXHQHZ24"}, "url":"URL#36635" }, { "@score":"1", "@id":"36636", "info":{"authors":{"author":[{"@pid":"48/76","text":"Yue Zhao"},{"@pid":"25/4120","text":"Yuan Yao"},{"@pid":"02/1554","text":"Tong He"},{"@pid":"369/6899","text":"Xingshe Zhou"},{"@pid":"181/2857","text":"Bo Shen"}]},"title":"Sl4u: a scenario description language for unmanned swarm.","venue":"J. Supercomput.","volume":"80","number":"4","pages":"5363-5389","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/ZhaoYHZS24","doi":"10.1007/S11227-023-05636-Y","ee":"https://doi.org/10.1007/s11227-023-05636-y","url":"https://dblp.org/rec/journals/tjs/ZhaoYHZS24"}, "url":"URL#36636" }, { "@score":"1", "@id":"36637", "info":{"authors":{"author":[{"@pid":"20/3589","text":"Xiaoyu Zheng"},{"@pid":"61/4547","text":"Dewang Chen"},{"@pid":"296/2389","text":"Zhiming Lin"},{"@pid":"266/5708","text":"Liping Zhuang"},{"@pid":"143/0237","text":"Wendi Zhao"}]},"title":"Method on generating massive virtual driving curves for high-speed trains of the Cross-Taiwan Strait Railway and its statistical analysis.","venue":"J. Supercomput.","volume":"80","number":"3","pages":"4202-4225","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/ZhengCLZZ24","doi":"10.1007/S11227-023-05621-5","ee":"https://doi.org/10.1007/s11227-023-05621-5","url":"https://dblp.org/rec/journals/tjs/ZhengCLZZ24"}, "url":"URL#36637" }, { "@score":"1", "@id":"36638", "info":{"authors":{"author":[{"@pid":"65/3628","text":"Bo Zhou"},{"@pid":"51/944","text":"Hai Huang"},{"@pid":"22/3650","text":"Jun Xia"},{"@pid":"99/7484","text":"Donghai Tian"}]},"title":"A novel malware detection method based on API embedding and API parameters.","venue":"J. Supercomput.","volume":"80","number":"2","pages":"2748-2766","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/ZhouHXT24","doi":"10.1007/S11227-023-05556-X","ee":"https://doi.org/10.1007/s11227-023-05556-x","url":"https://dblp.org/rec/journals/tjs/ZhouHXT24"}, "url":"URL#36638" }, { "@score":"1", "@id":"36639", "info":{"authors":{"author":[{"@pid":"16/8258","text":"Zhiyong Zhou"},{"@pid":"42/3493","text":"Yuanning Liu"},{"@pid":"08/2470-1","text":"Xiaodong Zhu 0001"},{"@pid":"76/5789-6","text":"Shuai Liu 0006"},{"@pid":"73/6863","text":"Shaoqiang Zhang"},{"@pid":"147/6070","text":"Yuanfeng Li"},{"@pid":"77/35","text":"Zhen Liu"}]},"title":"Lifelong iris presentation attack detection without forgetting.","venue":"J. Supercomput.","volume":"80","number":"1","pages":"1-19","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/ZhouLZLZLL24","doi":"10.1007/S11227-023-05445-3","ee":"https://doi.org/10.1007/s11227-023-05445-3","url":"https://dblp.org/rec/journals/tjs/ZhouLZLZLL24"}, "url":"URL#36639" }, { "@score":"1", "@id":"36640", "info":{"authors":{"author":[{"@pid":"40/7018","text":"Yuan Zhou"},{"@pid":"149/7549","text":"Lei Xiang"},{"@pid":"56/2849","text":"Fan Liu"},{"@pid":"82/4334","text":"Haoran Duan"},{"@pid":"82/10183-1","text":"Yang Long 0001"}]},"title":"Dynamic visual-guided selection for zero-shot learning.","venue":"J. Supercomput.","volume":"80","number":"3","pages":"4401-4419","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tjs/ZhouXLDL24","doi":"10.1007/S11227-023-05625-1","ee":"https://doi.org/10.1007/s11227-023-05625-1","url":"https://dblp.org/rec/journals/tjs/ZhouXLDL24"}, "url":"URL#36640" }, { "@score":"1", "@id":"248194", "info":{"authors":{"author":[{"@pid":"80/5117-3","text":"Gaurav Khanna 0003"},{"@pid":"67/9120","text":"Sanjay K. Chaturvedi"},{"@pid":"06/635","text":"Mohamed Othman"}]},"title":"On design and performance analysis of improved shuffle exchange gamma interconnection network layouts.","venue":"J. Supercomput.","volume":"79","number":"11","pages":"11611-11640","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/0003CO23","doi":"10.1007/S11227-022-04735-6","ee":"https://doi.org/10.1007/s11227-022-04735-6","url":"https://dblp.org/rec/journals/tjs/0003CO23"}, "url":"URL#248194" }, { "@score":"1", "@id":"248195", "info":{"authors":{"author":[{"@pid":"58/2670-45","text":"Bo Liu 0045"},{"@pid":"02/1003","text":"Rui Chen"},{"@pid":"53/282-1","text":"Weiwei Lin 0001"},{"@pid":"181/3887","text":"Wentai Wu"},{"@pid":"231/0619","text":"Jianpeng Lin"},{"@pid":"l/KeqinLi","text":"Keqin Li 0001"}]},"title":"Thermal-aware virtual machine placement based on multi-objective optimization.","venue":"J. Supercomput.","volume":"79","number":"11","pages":"12563-12590","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/0045C0WL023","doi":"10.1007/S11227-023-05136-Z","ee":"https://doi.org/10.1007/s11227-023-05136-z","url":"https://dblp.org/rec/journals/tjs/0045C0WL023"}, "url":"URL#248195" }, { "@score":"1", "@id":"248196", "info":{"authors":{"author":[{"@pid":"64/6025-68","text":"Wei Li 0068"},{"@pid":"217/4051","text":"Junqing Yuan"},{"@pid":"w/LeiWang30","text":"Lei Wang 0030"}]},"title":"An enhanced decomposition-based multiobjective evolutionary algorithm with adaptive neighborhood operator and extended distance-based environmental selection.","venue":"J. Supercomput.","volume":"79","number":"11","pages":"12341-12393","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/0068Y023","doi":"10.1007/S11227-023-05118-1","ee":"https://doi.org/10.1007/s11227-023-05118-1","url":"https://dblp.org/rec/journals/tjs/0068Y023"}, "url":"URL#248196" }, { "@score":"1", "@id":"248197", "info":{"authors":{"author":[{"@pid":"332/4480","text":"Sudeh Shirkavand Saleh Abad"},{"@pid":"44/2716","text":"Mohammad Hossein Moaiyeri"}]},"title":"Hardware-accuracy trade-offs for error-resilient applications using an ultra-efficient hybrid approximate multiplier.","venue":"J. Supercomput.","volume":"79","number":"3","pages":"3357-3372","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/AbadM23","doi":"10.1007/S11227-022-04789-6","ee":"https://doi.org/10.1007/s11227-022-04789-6","url":"https://dblp.org/rec/journals/tjs/AbadM23"}, "url":"URL#248197" }, { "@score":"1", "@id":"248198", "info":{"authors":{"author":[{"@pid":"173/5740","text":"Maryam Nooraei Abadeh"},{"@pid":"172/4061","text":"Mansooreh Mirzaie"}]},"title":"A differential machine learning approach for trust prediction in signed social networks.","venue":"J. Supercomput.","volume":"79","number":"9","pages":"9443-9466","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/AbadehM23","doi":"10.1007/S11227-023-05044-2","ee":"https://doi.org/10.1007/s11227-023-05044-2","url":"https://dblp.org/rec/journals/tjs/AbadehM23"}, "url":"URL#248198" }, { "@score":"1", "@id":"248199", "info":{"authors":{"author":[{"@pid":"348/0767","text":"Ahmed Abdelkhalek 0003"},{"@pid":"169/4849","text":"Maggie Mashaly"}]},"title":"Addressing the class imbalance problem in network intrusion detection systems using data resampling and deep learning.","venue":"J. Supercomput.","volume":"79","number":"10","pages":"10611-10644","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/AbdelkhalekM23","doi":"10.1007/S11227-023-05073-X","ee":"https://doi.org/10.1007/s11227-023-05073-x","url":"https://dblp.org/rec/journals/tjs/AbdelkhalekM23"}, "url":"URL#248199" }, { "@score":"1", "@id":"248200", "info":{"authors":{"author":[{"@pid":"169/6285","text":"Yousef Abdi"},{"@pid":"168/6129","text":"Mohammad Asadpour"}]},"title":"On the impact of information-sharing model between subpopulations in the Island-based evolutionary algorithms: search manager framework as a case study.","venue":"J. Supercomput.","volume":"79","number":"13","pages":"14245-14286","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/AbdiA23","doi":"10.1007/S11227-023-05218-Y","ee":"https://doi.org/10.1007/s11227-023-05218-y","url":"https://dblp.org/rec/journals/tjs/AbdiA23"}, "url":"URL#248200" }, { "@score":"1", "@id":"248201", "info":{"authors":{"author":[{"@pid":"217/8814","text":"Athena Abdi"},{"@pid":"317/6930","text":"Sina Shahoveisi"}]},"title":"FT-EALU: fault-tolerant arithmetic and logic unit for critical embedded and real-time systems.","venue":"J. Supercomput.","volume":"79","number":"1","pages":"626-649","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/AbdiS23","doi":"10.1007/S11227-022-04698-8","ee":"https://doi.org/10.1007/s11227-022-04698-8","url":"https://dblp.org/rec/journals/tjs/AbdiS23"}, "url":"URL#248201" }, { "@score":"1", "@id":"248202", "info":{"authors":{"author":[{"@pid":"305/7266","text":"Solmaz Abdollahizad"},{"@pid":"43/3612","text":"Mohammad Ali Balafar"},{"@pid":"121/6665","text":"Bakhtiar Feizizadeh"},{"@pid":"132/9233","text":"Amin Babazadeh Sangar"},{"@pid":"305/7234","text":"Karim Samadzamini"}]},"title":"Stacking ensemble approach in data mining methods for landslide prediction.","venue":"J. Supercomput.","volume":"79","number":"8","pages":"8583-8610","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/AbdollahizadBFSS23","doi":"10.1007/S11227-022-05006-0","ee":"https://doi.org/10.1007/s11227-022-05006-0","url":"https://dblp.org/rec/journals/tjs/AbdollahizadBFSS23"}, "url":"URL#248202" }, { "@score":"1", "@id":"248203", "info":{"authors":{"author":[{"@pid":"335/2722","text":"M. Mohideen AbdulKader"},{"@pid":"38/10298","text":"S. Ganesh Kumar"}]},"title":"A privacy-preserving data transfer in a blockchain-based commercial real estate platform using random address generation mechanism.","venue":"J. Supercomput.","volume":"79","number":"10","pages":"10796-10822","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/AbdulKaderK23","doi":"10.1007/S11227-022-04906-5","ee":"https://doi.org/10.1007/s11227-022-04906-5","url":"https://dblp.org/rec/journals/tjs/AbdulKaderK23"}, "url":"URL#248203" }, { "@score":"1", "@id":"248204", "info":{"authors":{"author":[{"@pid":"358/1828","text":"Zeinab Nazemi Absardi"},{"@pid":"26/9656","text":"Reza Javidan"}]},"title":"A QoE-driven SDN traffic management for IoT-enabled surveillance systems using deep learning based on edge cloud computing.","venue":"J. Supercomput.","volume":"79","number":"17","pages":"19168-19193","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/AbsardiJ23","doi":"10.1007/S11227-023-05412-Y","ee":"https://doi.org/10.1007/s11227-023-05412-y","url":"https://dblp.org/rec/journals/tjs/AbsardiJ23"}, "url":"URL#248204" }, { "@score":"1", "@id":"248205", "info":{"authors":{"author":{"@pid":"156/0905","text":"Achour Achroufene"}},"title":"RSSI-based geometric localization in wireless sensor networks.","venue":"J. Supercomput.","volume":"79","number":"5","pages":"5615-5642","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/Achroufene23","doi":"10.1007/S11227-022-04887-5","ee":"https://doi.org/10.1007/s11227-022-04887-5","url":"https://dblp.org/rec/journals/tjs/Achroufene23"}, "url":"URL#248205" }, { "@score":"1", "@id":"248206", "info":{"authors":{"author":[{"@pid":"207/6153","text":"Abhinav Adarsh"},{"@pid":"246/3652","text":"Shashwat Pathak"},{"@pid":"169/3593","text":"Digvijay Singh Chauhan"},{"@pid":"29/9554","text":"Basant Kumar"}]},"title":"Low-latency and High-Reliability FBMC Modulation scheme using Optimized Filter design for enabling NextG Real-time Smart Healthcare Applications.","venue":"J. Supercomput.","volume":"79","number":"4","pages":"3643-3665","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/AdarshPCK23","doi":"10.1007/S11227-022-04799-4","ee":"https://doi.org/10.1007/s11227-022-04799-4","url":"https://dblp.org/rec/journals/tjs/AdarshPCK23"}, "url":"URL#248206" }, { "@score":"1", "@id":"248207", "info":{"authors":{"author":[{"@pid":"322/3980","text":"Syeda Afiya"},{"@pid":"192/6418","text":"M. Rajesh"}]},"title":"MinLA of (K9-C9)n and its optimal layout into certain trees.","venue":"J. Supercomput.","volume":"79","number":"11","pages":"12000-12012","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/AfiyaR23","doi":"10.1007/S11227-023-05140-3","ee":"https://doi.org/10.1007/s11227-023-05140-3","url":"https://dblp.org/rec/journals/tjs/AfiyaR23"}, "url":"URL#248207" }, { "@score":"1", "@id":"248208", "info":{"authors":{"author":[{"@pid":"339/4605","text":"Ali Aghamohammadpour"},{"@pid":"132/6658","text":"Ebrahim Mahdipour"},{"@pid":"33/10051","text":"Iman Attarzadeh"}]},"title":"Architecting threat hunting system based on the DODAF framework.","venue":"J. Supercomput.","volume":"79","number":"4","pages":"4215-4242","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/AghamohammadpourMA23","doi":"10.1007/S11227-022-04808-6","ee":"https://doi.org/10.1007/s11227-022-04808-6","url":"https://dblp.org/rec/journals/tjs/AghamohammadpourMA23"}, "url":"URL#248208" }, { "@score":"1", "@id":"248209", "info":{"authors":{"author":[{"@pid":"156/0261","text":"Nasser Aghazadeh"},{"@pid":"341/0822","text":"Paria Moradi"},{"@pid":"94/398","text":"Giovanna Castellano"},{"@pid":"225/4362","text":"Parisa Noras"}]},"title":"An automatic MRI brain image segmentation technique using edge-region-based level set.","venue":"J. Supercomput.","volume":"79","number":"7","pages":"7337-7359","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/AghazadehMCN23","doi":"10.1007/S11227-022-04948-9","ee":"https://doi.org/10.1007/s11227-022-04948-9","url":"https://dblp.org/rec/journals/tjs/AghazadehMCN23"}, "url":"URL#248209" }, { "@score":"1", "@id":"248210", "info":{"authors":{"author":[{"@pid":"a/ZaherAlAghbari","text":"Zaher Al Aghbari"},{"@pid":"262/4240","text":"P. V. Pravija Raj"},{"@pid":"72/5176","text":"Ahmed M. Khedr"}]},"title":"FtCFt: a fault-tolerant coverage preserving strategy for face topology-based wireless sensor networks.","venue":"J. Supercomput.","volume":"79","number":"10","pages":"10915-10940","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/AghbariRK23","doi":"10.1007/S11227-023-05092-8","ee":"https://doi.org/10.1007/s11227-023-05092-8","url":"https://dblp.org/rec/journals/tjs/AghbariRK23"}, "url":"URL#248210" }, { "@score":"1", "@id":"248211", "info":{"authors":{"author":[{"@pid":"144/4585","text":"Supriya Agrawal"},{"@pid":"343/6856","text":"Prachi Natu"}]},"title":"ABGS Segmenter: pixel wise adaptive background subtraction and intensity ratio based shadow removal approach for moving object detection.","venue":"J. Supercomput.","volume":"79","number":"7","pages":"7937-7969","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/AgrawalN23","doi":"10.1007/S11227-022-04972-9","ee":"https://doi.org/10.1007/s11227-022-04972-9","url":"https://dblp.org/rec/journals/tjs/AgrawalN23"}, "url":"URL#248211" }, { "@score":"1", "@id":"248212", "info":{"authors":{"author":[{"@pid":"35/6490","text":"Israr Ahmad"},{"@pid":"133/4888","text":"Saima Abdullah"},{"@pid":"135/2667","text":"Adeel Ahmed"}]},"title":"IoT-fog-based healthcare 4.0 system using blockchain technology.","venue":"J. Supercomput.","volume":"79","number":"4","pages":"3999-4020","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/AhmadAA23","doi":"10.1007/S11227-022-04788-7","ee":"https://doi.org/10.1007/s11227-022-04788-7","url":"https://dblp.org/rec/journals/tjs/AhmadAA23"}, "url":"URL#248212" }, { "@score":"1", "@id":"248213", "info":{"authors":{"author":[{"@pid":"329/0426","text":"Shahnawaz Ahmad"},{"@pid":"26/6280","text":"Shabana Mehfuz"},{"@pid":"329/0203","text":"Javed Beg"}]},"title":"Hybrid cryptographic approach to enhance the mode of key management system in cloud environment.","venue":"J. Supercomput.","volume":"79","number":"7","pages":"7377-7413","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/AhmadMB23","doi":"10.1007/S11227-022-04964-9","ee":"https://doi.org/10.1007/s11227-022-04964-9","url":"https://dblp.org/rec/journals/tjs/AhmadMB23"}, "url":"URL#248213" }, { "@score":"1", "@id":"248214", "info":{"authors":{"author":[{"@pid":"123/7184","text":"Saeed Ahmadluei"},{"@pid":"13/730","text":"Karim Faez"},{"@pid":"22/9344","text":"Behrooz Masoumi"}]},"title":"Convolutional neural network pruning based on misclassification cost.","venue":"J. Supercomput.","volume":"79","number":"18","pages":"21185-21234","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/AhmadlueiFM23","doi":"10.1007/S11227-023-05487-7","ee":"https://doi.org/10.1007/s11227-023-05487-7","url":"https://dblp.org/rec/journals/tjs/AhmadlueiFM23"}, "url":"URL#248214" }, { "@score":"1", "@id":"248215", "info":{"authors":{"author":[{"@pid":"63/2255","text":"Usman Ahmed"},{"@pid":"41/912","text":"Jerry Chun-Wei Lin"}]},"title":"Robust adversarial uncertainty quantification for deep learning fine-tuning.","venue":"J. Supercomput.","volume":"79","number":"10","pages":"11355-11386","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/AhmedL23","doi":"10.1007/S11227-023-05087-5","ee":"https://doi.org/10.1007/s11227-023-05087-5","url":"https://dblp.org/rec/journals/tjs/AhmedL23"}, "url":"URL#248215" }, { "@score":"1", "@id":"248216", "info":{"authors":{"author":[{"@pid":"144/7847","text":"Sima Sarv Ahrabi"},{"@pid":"220/5587","text":"Alireza Momenzadeh"},{"@pid":"60/2171","text":"Enzo Baccarelli"},{"@pid":"84/2773","text":"Michele Scarpiniti"},{"@pid":"34/296","text":"Lorenzo Piazzo"}]},"title":"How much BiGAN and CycleGAN-learned hidden features are effective for COVID-19 detection from CT images? A comparative study.","venue":"J. Supercomput.","volume":"79","number":"3","pages":"2850-2881","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/AhrabiMBSP23","doi":"10.1007/S11227-022-04775-Y","ee":"https://doi.org/10.1007/s11227-022-04775-y","url":"https://dblp.org/rec/journals/tjs/AhrabiMBSP23"}, "url":"URL#248216" }, { "@score":"1", "@id":"248217", "info":{"authors":{"author":[{"@pid":"172/9130","text":"Kashav Ajmera"},{"@pid":"214/2813","text":"Tribhuwan Kumar Tewari"}]},"title":"SR-PSO: server residual efficiency-aware particle swarm optimization for dynamic virtual machine scheduling.","venue":"J. Supercomput.","volume":"79","number":"14","pages":"15459-15495","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/AjmeraT23","doi":"10.1007/S11227-023-05270-8","ee":"https://doi.org/10.1007/s11227-023-05270-8","url":"https://dblp.org/rec/journals/tjs/AjmeraT23"}, "url":"URL#248217" }, { "@score":"1", "@id":"248218", "info":{"authors":{"author":[{"@pid":"280/8931","text":"Emran Al-Bashabsheh"},{"@pid":"147/5649","text":"Ahmad Alaiad 0001"},{"@pid":"10/7992","text":"Mahmoud Al-Ayyoub"},{"@pid":"349/2916","text":"Othman Beni-Yonis"},{"@pid":"z/RAZitar","text":"Raed Abu Zitar"},{"@pid":"190/6566","text":"Laith Abualigah"}]},"title":"Improving clinical documentation: automatic inference of ICD-10 codes from patient notes using BERT model.","venue":"J. Supercomput.","volume":"79","number":"11","pages":"12766-12790","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/Al-Bashabsheh0A23","doi":"10.1007/S11227-023-05160-Z","ee":"https://doi.org/10.1007/s11227-023-05160-z","url":"https://dblp.org/rec/journals/tjs/Al-Bashabsheh0A23"}, "url":"URL#248218" }, { "@score":"1", "@id":"248219", "info":{"authors":{"author":[{"@pid":"295/8311","text":"Hussein Al-Omaisi"},{"@pid":"73/993","text":"Elankovan A. Sundararajan"},{"@pid":"22/10130","text":"Raed A. Alsaqour"},{"@pid":"36/8515","text":"Nor Fadzilah Abdullah"},{"@pid":"299/5197","text":"Khairul Azmi Abu Bakar"},{"@pid":"38/10132","text":"Maha S. Abdelhaq"}]},"title":"IDTracS: an Interest-Data-flow tracking-based forwarding scheme for vehicular named data networks.","venue":"J. Supercomput.","volume":"79","number":"15","pages":"16580-16615","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/AlOmaisiSAABA23","doi":"10.1007/S11227-023-05268-2","ee":"https://doi.org/10.1007/s11227-023-05268-2","url":"https://dblp.org/rec/journals/tjs/AlOmaisiSAABA23"}, "url":"URL#248219" }, { "@score":"1", "@id":"248220", "info":{"title":"Retraction Note: Big data analytic diabetics using map reduce and classification techniques.","venue":"J. Supercomput.","volume":"79","number":"5","pages":"5831","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/AlZubi23","doi":"10.1007/S11227-022-04858-W","ee":"https://doi.org/10.1007/s11227-022-04858-w","url":"https://dblp.org/rec/journals/tjs/AlZubi23"}, "url":"URL#248220" }, { "@score":"1", "@id":"248221", "info":{"authors":{"author":[{"@pid":"343/7002","text":"Guillermo Alaejos"},{"@pid":"154/7966","text":"Adrián Castelló 0001"},{"@pid":"40/9854","text":"Héctor Martínez"},{"@pid":"89/8296","text":"Pedro Alonso-Jordá"},{"@pid":"88/501","text":"Francisco D. Igual"},{"@pid":"27/786","text":"Enrique S. Quintana-Ortí"}]},"title":"Micro-kernels for portable and efficient matrix multiplication in deep learning.","venue":"J. Supercomput.","volume":"79","number":"7","pages":"8124-8147","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/AlaejosCMAIQ23","doi":"10.1007/S11227-022-05003-3","ee":"https://doi.org/10.1007/s11227-022-05003-3","url":"https://dblp.org/rec/journals/tjs/AlaejosCMAIQ23"}, "url":"URL#248221" }, { "@score":"1", "@id":"248222", "info":{"authors":{"author":[{"@pid":"213/2343","text":"Aravindhan Alagarsamy"},{"@pid":"244/8564","text":"Sundarakannan Mahilmaran"},{"@pid":"97/1546","text":"Gopalakrishnan Lakshminarayanan"},{"@pid":"41/3994","text":"Seok-Bum Ko"}]},"title":"SaHNoC: an optimal energy efficient hybrid networks-on-chip architecture.","venue":"J. Supercomput.","volume":"79","number":"6","pages":"6538-6559","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/AlagarsamyMLK23","doi":"10.1007/S11227-022-04910-9","ee":"https://doi.org/10.1007/s11227-022-04910-9","url":"https://dblp.org/rec/journals/tjs/AlagarsamyMLK23"}, "url":"URL#248222" }, { "@score":"1", "@id":"248223", "info":{"authors":{"author":[{"@pid":"132/4981","text":"Mahdi R. Alagheband"},{"@pid":"49/4622","text":"Atefeh Mashatan"}]},"title":"Formal unlinkability analysis of message authentication protocols based on authentic channels.","venue":"J. Supercomput.","volume":"79","number":"7","pages":"8097-8123","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/AlaghebandM23","doi":"10.1007/S11227-022-04993-4","ee":"https://doi.org/10.1007/s11227-022-04993-4","url":"https://dblp.org/rec/journals/tjs/AlaghebandM23"}, "url":"URL#248223" }, { "@score":"1", "@id":"248224", "info":{"authors":{"author":[{"@pid":"338/6267","text":"Yeganeh Asghari Alaie"},{"@pid":"201/5807","text":"Mirsaeid Hosseini Shirvani"},{"@pid":"24/1563","text":"Amir Masoud Rahmani"}]},"title":"A hybrid bi-objective scheduling algorithm for execution of scientific workflows on cloud platforms with execution time and reliability approach.","venue":"J. Supercomput.","volume":"79","number":"2","pages":"1451-1503","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/AlaieSR23","doi":"10.1007/S11227-022-04703-0","ee":"https://doi.org/10.1007/s11227-022-04703-0","url":"https://dblp.org/rec/journals/tjs/AlaieSR23"}, "url":"URL#248224" }, { "@score":"1", "@id":"248225", "info":{"authors":{"author":[{"@pid":"00/10963","text":"Md. Golam Rabiul Alam"},{"@pid":"337/6255","text":"Abde Musavvir Khan"},{"@pid":"337/5778","text":"Myesha Farid Shejuty"},{"@pid":"337/6446","text":"Syed Ibna Zubayear"},{"@pid":"257/9514","text":"Shariar Md Imtiaz"},{"@pid":"281/2236","text":"Meteb Altaf"},{"@pid":"84/4762","text":"Mohammad Mehedi Hassan"},{"@pid":"20/5270","text":"Salman A. AlQahtani"},{"@pid":"216/4736","text":"Ahmed Alsanad"}]},"title":"Ejection Fraction estimation using deep semantic segmentation neural network.","venue":"J. Supercomput.","volume":"79","number":"1","pages":"27-50","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/AlamKSZIAHAA23","doi":"10.1007/S11227-022-04642-W","ee":"https://doi.org/10.1007/s11227-022-04642-w","url":"https://dblp.org/rec/journals/tjs/AlamKSZIAHAA23"}, "url":"URL#248225" }, { "@score":"1", "@id":"248226", "info":{"authors":{"author":[{"@pid":"261/3261","text":"Ekhlas Abbas Albahrani"},{"@pid":"319/7282","text":"Tayseer Karam Alshekly"},{"@pid":"261/2918","text":"Sadeq H. Lafta"}]},"title":"New secure and efficient substitution and permutation method for audio encryption algorithm.","venue":"J. Supercomput.","volume":"79","number":"15","pages":"16616-16646","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/AlbahraniAL23","doi":"10.1007/S11227-023-05249-5","ee":"https://doi.org/10.1007/s11227-023-05249-5","url":"https://dblp.org/rec/journals/tjs/AlbahraniAL23"}, "url":"URL#248226" }, { "@score":"1", "@id":"248227", "info":{"authors":{"author":[{"@pid":"290/6797","text":"Mohammed Albishari"},{"@pid":"83/3175","text":"Mingchu Li"},{"@pid":"244/1050","text":"Runfa Zhang"},{"@pid":"333/7131","text":"Esmail Almosharea"}]},"title":"Deep learning-based early stage detection (DL-ESD) for routing attacks in Internet of Things networks.","venue":"J. Supercomput.","volume":"79","number":"3","pages":"2626-2653","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/AlbishariLZA23","doi":"10.1007/S11227-022-04753-4","ee":"https://doi.org/10.1007/s11227-022-04753-4","url":"https://dblp.org/rec/journals/tjs/AlbishariLZA23"}, "url":"URL#248227" }, { "@score":"1", "@id":"248228", "info":{"authors":{"author":{"@pid":"69/11073","text":"Hamza Aldabbas"}},"title":"Efficient bandwidth allocation in SDN-based peer-to-peer data streaming using machine learning algorithm.","venue":"J. Supercomput.","volume":"79","number":"6","pages":"6802-6824","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/Aldabbas23","doi":"10.1007/S11227-022-04929-Y","ee":"https://doi.org/10.1007/s11227-022-04929-y","url":"https://dblp.org/rec/journals/tjs/Aldabbas23"}, "url":"URL#248228" }, { "@score":"1", "@id":"248229", "info":{"authors":{"author":[{"@pid":"354/9130","text":"Alaa Lateef Noor Al-hajjar"},{"@pid":"243/0814","text":"Ali Kadhum M. Al-Qurabat"}]},"title":"An overview of machine learning methods in enabling IoMT-based epileptic seizure detection.","venue":"J. Supercomput.","volume":"79","number":"14","pages":"16017-16064","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/AlhajjarA23","doi":"10.1007/S11227-023-05299-9","ee":"https://doi.org/10.1007/s11227-023-05299-9","url":"https://dblp.org/rec/journals/tjs/AlhajjarA23"}, "url":"URL#248229" }, { "@score":"1", "@id":"248230", "info":{"authors":{"author":[{"@pid":"233/1736","text":"Mohammed Alharbi"},{"@pid":"117/9985","text":"Gerard Edwards"},{"@pid":"10/10122","text":"Richard Stocker 0001"}]},"title":"Novel ultra-energy-efficient reversible designs of sequential logic quantum-dot cellular automata flip-flop circuits.","venue":"J. Supercomput.","volume":"79","number":"10","pages":"11530-11557","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/AlharbiES23","doi":"10.1007/S11227-023-05134-1","ee":"https://doi.org/10.1007/s11227-023-05134-1","url":"https://dblp.org/rec/journals/tjs/AlharbiES23"}, "url":"URL#248230" }, { "@score":"1", "@id":"248231", "info":{"authors":{"author":[{"@pid":"214/4421","text":"Shallaw Mohammed Ali"},{"@pid":"31/6374","text":"Gabor Kecskemeti"}]},"title":"SeQual: an unsupervised feature selection method for cloud workload traces.","venue":"J. Supercomput.","volume":"79","number":"13","pages":"15079-15097","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/AliK23","doi":"10.1007/S11227-023-05163-W","ee":"https://doi.org/10.1007/s11227-023-05163-w","url":"https://dblp.org/rec/journals/tjs/AliK23"}, "url":"URL#248231" }, { "@score":"1", "@id":"248232", "info":{"authors":{"author":[{"@pid":"64/5995","text":"Muhammad Ali"},{"@pid":"15/3695","text":"Asad Waqar Malik"},{"@pid":"202/0577","text":"Anis Ur Rahman 0001"}]},"title":"Clustering-based re-routing framework for network traffic congestion avoidance on urban vehicular roads.","venue":"J. Supercomput.","volume":"79","number":"18","pages":"21144-21165","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/AliMR23","doi":"10.1007/S11227-023-05455-1","ee":"https://doi.org/10.1007/s11227-023-05455-1","url":"https://dblp.org/rec/journals/tjs/AliMR23"}, "url":"URL#248232" }, { "@score":"1", "@id":"248233", "info":{"authors":{"author":[{"@pid":"207/1120","text":"Zainab Hassan Ali"},{"@pid":"317/6493","text":"John Zaki"},{"@pid":"271/6178","text":"Nora El-Rashidy"}]},"title":"Dynamic urban evaluation routing protocol for enhanced vehicle ad hoc networks.","venue":"J. Supercomput.","volume":"79","number":"6","pages":"6017-6039","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/AliZE23","doi":"10.1007/S11227-022-04877-7","ee":"https://doi.org/10.1007/s11227-022-04877-7","url":"https://dblp.org/rec/journals/tjs/AliZE23"}, "url":"URL#248233" }, { "@score":"1", "@id":"248234", "info":{"authors":{"author":[{"@pid":"287/5474","text":"Sergio H. Almanza-Ruiz"},{"@pid":"38/7507","text":"Arturo Chavoya"},{"@pid":"46/5794","text":"Hector A. Duran-Limon"}]},"title":"Parallel protein multiple sequence alignment approaches: a systematic literature review.","venue":"J. Supercomput.","volume":"79","number":"2","pages":"1201-1234","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/Almanza-RuizCD23","doi":"10.1007/S11227-022-04697-9","ee":"https://doi.org/10.1007/s11227-022-04697-9","url":"https://dblp.org/rec/journals/tjs/Almanza-RuizCD23"}, "url":"URL#248234" }, { "@score":"1", "@id":"248235", "info":{"authors":{"author":{"@pid":"281/7313","text":"Malek Q. Alrashidi"}},"title":"Synergistic integration between internet of things and augmented reality technologies for deaf persons in e-learning platform.","venue":"J. Supercomput.","volume":"79","number":"10","pages":"10747-10773","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/Alrashidi23","doi":"10.1007/S11227-022-04952-Z","ee":"https://doi.org/10.1007/s11227-022-04952-z","url":"https://dblp.org/rec/journals/tjs/Alrashidi23"}, "url":"URL#248235" }, { "@score":"1", "@id":"248236", "info":{"authors":{"author":[{"@pid":"359/5323","text":"Marya Alseid"},{"@pid":"99/6710","text":"Ali A. El-Moursy"},{"@pid":"279/5750","text":"Oruba Alfawaz"},{"@pid":"72/5176","text":"Ahmed M. Khedr"}]},"title":"MSSAMTO-IoV: modified sparrow search algorithm for multi-hop task offloading for IoV.","venue":"J. Supercomput.","volume":"79","number":"18","pages":"20769-20789","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/AlseidEAK23","doi":"10.1007/S11227-023-05446-2","ee":"https://doi.org/10.1007/s11227-023-05446-2","url":"https://dblp.org/rec/journals/tjs/AlseidEAK23"}, "url":"URL#248236" }, { "@score":"1", "@id":"248237", "info":{"authors":{"author":[{"@pid":"341/0653","text":"Anuarbek Amanov"},{"@pid":"172/4536","text":"Akbar Majidi"},{"@pid":"341/0778","text":"Nazila Jahnabakhsh"},{"@pid":"40/11086","text":"Aydin Çetin"}]},"title":"Adjusting ECN marking threshold in multi-queue DCNs with deep learning.","venue":"J. Supercomput.","volume":"79","number":"5","pages":"5443-5468","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/AmanovMJC23","doi":"10.1007/S11227-022-04893-7","ee":"https://doi.org/10.1007/s11227-022-04893-7","url":"https://dblp.org/rec/journals/tjs/AmanovMJC23"}, "url":"URL#248237" }, { "@score":"1", "@id":"248238", "info":{"authors":{"author":[{"@pid":"344/8839","text":"Vahid Amini"},{"@pid":"06/8002","text":"Mahmoud Momtazpour"},{"@pid":"69/5980","text":"Morteza Saheb Zamani"}]},"title":"An energy-efficient and accuracy-aware edge computing framework for heart arrhythmia detection: A joint model selection and task offloading approach.","venue":"J. Supercomput.","volume":"79","number":"8","pages":"8178-8204","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/AminiMZ23","doi":"10.1007/S11227-022-04987-2","ee":"https://doi.org/10.1007/s11227-022-04987-2","url":"https://dblp.org/rec/journals/tjs/AminiMZ23"}, "url":"URL#248238" }, { "@score":"1", "@id":"248239", "info":{"authors":{"author":[{"@pid":"287/4611","text":"Zahra Heydaran Daroogheh Amnyieh"},{"@pid":"313/0079","text":"Seyed Mohammad Jalal Rastegar Fatemi"},{"@pid":"124/3757","text":"Maryam Rastgarpour"},{"@pid":"268/6636","text":"Golnaz Aghaee Ghazvini"}]},"title":"CNN-RDM: a new image processing model for improving the structure of deep learning based on representational dissimilarity matrix.","venue":"J. Supercomput.","volume":"79","number":"4","pages":"4266-4290","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/AmnyiehFRG23","doi":"10.1007/S11227-022-04661-7","ee":"https://doi.org/10.1007/s11227-022-04661-7","url":"https://dblp.org/rec/journals/tjs/AmnyiehFRG23"}, "url":"URL#248239" }, { "@score":"1", "@id":"248240", "info":{"authors":{"author":[{"@pid":"216/4221","text":"Arij Ben Amor"},{"@pid":"181/7120","text":"Sarra Jebri"},{"@pid":"71/1639","text":"Mohamed Abid"},{"@pid":"39/6920","text":"Aref Meddeb"}]},"title":"A secure lightweight mutual authentication scheme in Social Industrial IoT environment.","venue":"J. Supercomput.","volume":"79","number":"12","pages":"13578-13600","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/AmorJAM23","doi":"10.1007/S11227-023-05176-5","ee":"https://doi.org/10.1007/s11227-023-05176-5","url":"https://dblp.org/rec/journals/tjs/AmorJAM23"}, "url":"URL#248240" }, { "@score":"1", "@id":"248241", "info":{"authors":{"author":[{"@pid":"196/0048","text":"Azam Andalib"},{"@pid":"55/6094","text":"Seyed Morteza Babamir"}]},"title":"Anomaly detection of policies in distributed firewalls using data log analysis.","venue":"J. Supercomput.","volume":"79","number":"17","pages":"19473-19514","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/AndalibB23","doi":"10.1007/S11227-023-05417-7","ee":"https://doi.org/10.1007/s11227-023-05417-7","url":"https://dblp.org/rec/journals/tjs/AndalibB23"}, "url":"URL#248241" }, { "@score":"1", "@id":"248242", "info":{"authors":{"author":[{"@pid":"83/10372","text":"Francisco J. Andújar"},{"@pid":"337/6334","text":"Miguel Sánchez de la Rosa"},{"@pid":"72/1341","text":"Jesús Escudero-Sahuquillo"},{"@pid":"30/4785-2","text":"José L. Sánchez 0002"}]},"title":"Extending the VEF traces framework to model data center network workloads.","venue":"J. Supercomput.","volume":"79","number":"1","pages":"814-831","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/AndujarRES23","doi":"10.1007/S11227-022-04692-0","ee":"https://doi.org/10.1007/s11227-022-04692-0","url":"https://dblp.org/rec/journals/tjs/AndujarRES23"}, "url":"URL#248242" }, { "@score":"1", "@id":"248243", "info":{"authors":{"author":[{"@pid":"297/1273","text":"AhmadShahab Arkan"},{"@pid":"58/4186","text":"Mahmood Ahmadi"}]},"title":"An unsupervised and hierarchical intrusion detection system for software-defined wireless sensor networks.","venue":"J. Supercomput.","volume":"79","number":"11","pages":"11844-11870","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ArkanA23","doi":"10.1007/S11227-023-05117-2","ee":"https://doi.org/10.1007/s11227-023-05117-2","url":"https://dblp.org/rec/journals/tjs/ArkanA23"}, "url":"URL#248243" }, { "@score":"1", "@id":"248244", "info":{"authors":{"author":[{"@pid":"348/0821","text":"Pouya Aryai"},{"@pid":"84/5245","text":"Ahmad Khademzadeh"},{"@pid":"53/2942","text":"Somayyeh Jafarali Jassbi"},{"@pid":"66/10052-1","text":"Mehdi Hosseinzadeh 0001"}]},"title":"SIMOF: swarm intelligence multi-objective fuzzy thermal-aware routing protocol for WBANs.","venue":"J. Supercomput.","volume":"79","number":"10","pages":"10941-10976","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/AryaiKJH23","doi":"10.1007/S11227-023-05102-9","ee":"https://doi.org/10.1007/s11227-023-05102-9","url":"https://dblp.org/rec/journals/tjs/AryaiKJH23"}, "url":"URL#248244" }, { "@score":"1", "@id":"248245", "info":{"authors":{"author":[{"@pid":"01/7647","text":"Arghavan Asad"},{"@pid":"37/9432","text":"Farah A. Mohammadi"}]},"title":"Godiva: green on-chip interconnection for DNNs.","venue":"J. Supercomput.","volume":"79","number":"3","pages":"2404-2430","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/AsadM23","doi":"10.1007/S11227-022-04749-0","ee":"https://doi.org/10.1007/s11227-022-04749-0","url":"https://dblp.org/rec/journals/tjs/AsadM23"}, "url":"URL#248245" }, { "@score":"1", "@id":"248246", "info":{"authors":{"author":[{"@pid":"202/2918","text":"Ali Asghari"},{"@pid":"350/3974","text":"Marjan Sayadi"},{"@pid":"211/6976","text":"Hossein Azgomi"}]},"title":"Energy-aware edge server placement using the improved butterfly optimization algorithm.","venue":"J. Supercomput.","volume":"79","number":"13","pages":"14954-14980","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/AsghariSA23","doi":"10.1007/S11227-023-05271-7","ee":"https://doi.org/10.1007/s11227-023-05271-7","url":"https://dblp.org/rec/journals/tjs/AsghariSA23"}, "url":"URL#248246" }, { "@score":"1", "@id":"248247", "info":{"authors":{"author":[{"@pid":"94/10686","text":"Asghar Asgharian-Sardroud"},{"@pid":"73/5355","text":"Mohsen Ghasemi"}]},"title":"The g-good-neighbor diagnosability of triangle-free graphs.","venue":"J. Supercomput.","volume":"79","number":"7","pages":"7272-7285","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/AsgharianSardroudG23","doi":"10.1007/S11227-022-04942-1","ee":"https://doi.org/10.1007/s11227-022-04942-1","url":"https://dblp.org/rec/journals/tjs/AsgharianSardroudG23"}, "url":"URL#248247" }, { "@score":"1", "@id":"248248", "info":{"authors":{"author":[{"@pid":"342/3987","text":"Zeeshan Ashraf"},{"@pid":"27/11473","text":"Adnan Sohail"},{"@pid":"46/8275","text":"Muhammad Yousaf"}]},"title":"Lightweight and authentic symmetric session key cryptosystem for client-server mobile communication.","venue":"J. Supercomput.","volume":"79","number":"14","pages":"16181-16205","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/AshrafSY23","doi":"10.1007/S11227-023-05239-7","ee":"https://doi.org/10.1007/s11227-023-05239-7","url":"https://dblp.org/rec/journals/tjs/AshrafSY23"}, "url":"URL#248248" }, { "@score":"1", "@id":"248249", "info":{"authors":{"author":[{"@pid":"166/5274","text":"Hernán Asorey"},{"@pid":"95/5499","text":"Rafael Mayo-García"}]},"title":"Calculation of the high-energy neutron flux for anticipating errors and recovery techniques in exascale supercomputer centres.","venue":"J. Supercomput.","volume":"79","number":"8","pages":"8205-8235","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/AsoreyM23","doi":"10.1007/S11227-022-04981-8","ee":"https://doi.org/10.1007/s11227-022-04981-8","url":"https://dblp.org/rec/journals/tjs/AsoreyM23"}, "url":"URL#248249" }, { "@score":"1", "@id":"248250", "info":{"authors":{"author":[{"@pid":"349/2338","text":"Sevket Ay"},{"@pid":"158/0656","text":"Ekin Ekinci"},{"@pid":"309/9545","text":"Zeynep Garip"}]},"title":"A comparative analysis of meta-heuristic optimization algorithms for feature selection on ML-based classification of heart-related diseases.","venue":"J. Supercomput.","volume":"79","number":"11","pages":"11797-11826","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/AyEG23","doi":"10.1007/S11227-023-05132-3","ee":"https://doi.org/10.1007/s11227-023-05132-3","url":"https://dblp.org/rec/journals/tjs/AyEG23"}, "url":"URL#248250" }, { "@score":"1", "@id":"248251", "info":{"authors":{"author":[{"@pid":"149/0641","text":"Tülin Erçelebi Ayyildiz"},{"@pid":"350/3837","text":"Elmas Burcu Mamak Ekinci"}]},"title":"Selection of Six Sigma projects based on integrated multi-criteria decision-making methods: the case of the software development industry.","venue":"J. Supercomput.","volume":"79","number":"13","pages":"14981-15003","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/AyyildizE23","doi":"10.1007/S11227-023-05250-Y","ee":"https://doi.org/10.1007/s11227-023-05250-y","url":"https://dblp.org/rec/journals/tjs/AyyildizE23"}, "url":"URL#248251" }, { "@score":"1", "@id":"248252", "info":{"authors":{"author":[{"@pid":"275/2913","text":"Lina Ba"},{"@pid":"275/4945","text":"Hailun Wu"},{"@pid":"02/4699","text":"Heping Zhang"}]},"title":"Star-structure connectivity of folded hypercubes and augmented cubes.","venue":"J. Supercomput.","volume":"79","number":"3","pages":"3257-3276","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/BaWZ23","doi":"10.1007/S11227-022-04758-Z","ee":"https://doi.org/10.1007/s11227-022-04758-z","url":"https://dblp.org/rec/journals/tjs/BaWZ23"}, "url":"URL#248252" }, { "@score":"1", "@id":"248253", "info":{"authors":{"author":[{"@pid":"275/2913","text":"Lina Ba"},{"@pid":"275/4945","text":"Hailun Wu"},{"@pid":"02/4699","text":"Heping Zhang"}]},"title":"Correction to: Star-structure connectivity of folded hypercubes and augmented cubes.","venue":"J. Supercomput.","volume":"79","number":"5","pages":"5828","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/BaWZ23a","doi":"10.1007/S11227-022-04843-3","ee":"https://doi.org/10.1007/s11227-022-04843-3","url":"https://dblp.org/rec/journals/tjs/BaWZ23a"}, "url":"URL#248253" }, { "@score":"1", "@id":"248254", "info":{"authors":{"author":[{"@pid":"b/JoseMBadia","text":"José M. Badía"},{"@pid":"161/5357","text":"Adrian Amor-Martin"},{"@pid":"89/10398","text":"Jose A. Belloch"},{"@pid":"115/6949","text":"Luis Emilio García-Castillo"}]},"title":"Strategies to parallelize a finite element mesh truncation technique on multi-core and many-core architectures.","venue":"J. Supercomput.","volume":"79","number":"7","pages":"7648-7664","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/BadiaABG23","doi":"10.1007/S11227-022-04975-6","ee":"https://doi.org/10.1007/s11227-022-04975-6","url":"https://dblp.org/rec/journals/tjs/BadiaABG23"}, "url":"URL#248254" }, { "@score":"1", "@id":"248255", "info":{"authors":{"author":[{"@pid":"293/9856","text":"Taghreed Bagies"},{"@pid":"76/5788","text":"Wei Le"},{"@pid":"357/5227","text":"Jeremy Sheaffer"},{"@pid":"74/1277","text":"Ali Jannesari"}]},"title":"Reducing branch divergence to speed up parallel execution of unit testing on GPUs.","venue":"J. Supercomput.","volume":"79","number":"16","pages":"18340-18374","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/BagiesLSJ23","doi":"10.1007/S11227-023-05375-0","ee":"https://doi.org/10.1007/s11227-023-05375-0","url":"https://dblp.org/rec/journals/tjs/BagiesLSJ23"}, "url":"URL#248255" }, { "@score":"1", "@id":"248256", "info":{"authors":{"author":[{"@pid":"226/4087","text":"Ainaz Bahramlou"},{"@pid":"50/7721","text":"Massoud Reza Hashemi"},{"@pid":"210/0245","text":"Zeinab Zali"}]},"title":"Ensemble clustering and feature weighting in time series data.","venue":"J. Supercomput.","volume":"79","number":"15","pages":"16442-16478","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/BahramlouHZ23","doi":"10.1007/S11227-023-05290-4","ee":"https://doi.org/10.1007/s11227-023-05290-4","url":"https://dblp.org/rec/journals/tjs/BahramlouHZ23"}, "url":"URL#248256" }, { "@score":"1", "@id":"248257", "info":{"authors":{"author":[{"@pid":"264/1724","text":"Yuxuan Bai"},{"@pid":"283/6088","text":"Mingshuai Dong"},{"@pid":"59/610","text":"Shimin Wei"},{"@pid":"33/5448","text":"Jian Li"},{"@pid":"67/8779","text":"Xiuli Yu"}]},"title":"YOLOOD: an arbitrary-oriented flexible flat cable detection method in robotic assembly.","venue":"J. Supercomput.","volume":"79","number":"13","pages":"14869-14893","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/BaiDWLY23","doi":"10.1007/S11227-023-05254-8","ee":"https://doi.org/10.1007/s11227-023-05254-8","url":"https://dblp.org/rec/journals/tjs/BaiDWLY23"}, "url":"URL#248257" }, { "@score":"1", "@id":"248258", "info":{"authors":{"author":[{"@pid":"224/2063","text":"Qingchun Bai"},{"@pid":"71/2308","text":"Jun Xiao"},{"@pid":"00/5012-15","text":"Jie Zhou 0015"}]},"title":"A weakly supervised knowledge attentive network for aspect-level sentiment classification.","venue":"J. Supercomput.","volume":"79","number":"5","pages":"5403-5420","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/BaiXZ23","doi":"10.1007/S11227-022-04820-W","ee":"https://doi.org/10.1007/s11227-022-04820-w","url":"https://dblp.org/rec/journals/tjs/BaiXZ23"}, "url":"URL#248258" }, { "@score":"1", "@id":"248259", "info":{"authors":{"author":[{"@pid":"354/8378","text":"Niloofar Barati Bakhtiari"},{"@pid":"354/8202","text":"Masood Rafighi"},{"@pid":"260/3216","text":"Reza Ahsan"}]},"title":"TTLA: two-way trust between clients and fog servers using Bayesian learning automata.","venue":"J. Supercomput.","volume":"79","number":"14","pages":"16152-16180","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/BakhtiariRA23","doi":"10.1007/S11227-023-05264-6","ee":"https://doi.org/10.1007/s11227-023-05264-6","url":"https://dblp.org/rec/journals/tjs/BakhtiariRA23"}, "url":"URL#248259" }, { "@score":"1", "@id":"248260", "info":{"authors":{"author":[{"@pid":"295/6859","text":"Mohana Bakshi"},{"@pid":"62/3389","text":"Chandreyee Chowdhury"},{"@pid":"93/3249","text":"Ujjwal Maulik"}]},"title":"Cuckoo search optimization-based energy efficient job scheduling approach for IoT-edge environment.","venue":"J. Supercomput.","volume":"79","number":"16","pages":"18227-18255","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/BakshiCM23","doi":"10.1007/S11227-023-05358-1","ee":"https://doi.org/10.1007/s11227-023-05358-1","url":"https://dblp.org/rec/journals/tjs/BakshiCM23"}, "url":"URL#248260" }, { "@score":"1", "@id":"248261", "info":{"authors":{"author":[{"@pid":"243/6214","text":"Jiwoo Bang"},{"@pid":"267/7490","text":"Chungyong Kim"},{"@pid":"83/2554","text":"Eun-Kyu Byun"},{"@pid":"185/2560","text":"Hanul Sung"},{"@pid":"25/6105-1","text":"Jaehwan Lee 0001"},{"@pid":"54/1476","text":"Hyeonsang Eom"}]},"title":"Accelerating I/O performance of ZFS-based Lustre file system in HPC environment.","venue":"J. Supercomput.","volume":"79","number":"7","pages":"7665-7691","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/BangKBSLE23","doi":"10.1007/S11227-022-04966-7","ee":"https://doi.org/10.1007/s11227-022-04966-7","url":"https://dblp.org/rec/journals/tjs/BangKBSLE23"}, "url":"URL#248261" }, { "@score":"1", "@id":"248262", "info":{"authors":{"author":[{"@pid":"80/6207","text":"Liang Bao"},{"@pid":"51/2890","text":"Jin Yang"},{"@pid":"294/2382","text":"Zhengtong Zhang"},{"@pid":"90/11325","text":"Wenjing Liu"},{"@pid":"215/2594","text":"Junhao Chen"},{"@pid":"76/2904","text":"Chase Q. Wu"}]},"title":"On accurate prediction of cloud workloads with adaptive pattern mining.","venue":"J. Supercomput.","volume":"79","number":"1","pages":"160-187","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/BaoYZLCW23","doi":"10.1007/S11227-022-04647-5","ee":"https://doi.org/10.1007/s11227-022-04647-5","url":"https://dblp.org/rec/journals/tjs/BaoYZLCW23"}, "url":"URL#248262" }, { "@score":"1", "@id":"248263", "info":{"authors":{"author":[{"@pid":"167/1879","text":"Abdelhakim Baouya"},{"@pid":"95/4076","text":"Otmane Aït Mohamed"},{"@pid":"33/3427","text":"Samir Ouchani"}]},"title":"Toward a context-driven deployment optimization for embedded systems: a product line approach.","venue":"J. Supercomput.","volume":"79","number":"2","pages":"2180-2211","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/BaouyaMO23","doi":"10.1007/S11227-022-04741-8","ee":"https://doi.org/10.1007/s11227-022-04741-8","url":"https://dblp.org/rec/journals/tjs/BaouyaMO23"}, "url":"URL#248263" }, { "@score":"1", "@id":"248264", "info":{"authors":{"author":[{"@pid":"97/8881","text":"Malek Barhoush"},{"@pid":"168/4084","text":"Bilal H. Abed-alguni"},{"@pid":"359/5271","text":"Nour Elhuda A. Al-qudah"}]},"title":"Improved discrete salp swarm algorithm using exploration and exploitation techniques for feature selection in intrusion detection systems.","venue":"J. Supercomput.","volume":"79","number":"18","pages":"21265-21309","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/BarhoushAA23","doi":"10.1007/S11227-023-05444-4","ee":"https://doi.org/10.1007/s11227-023-05444-4","url":"https://dblp.org/rec/journals/tjs/BarhoushAA23"}, "url":"URL#248264" }, { "@score":"1", "@id":"248265", "info":{"authors":{"author":[{"@pid":"344/9198","text":"Yashoda Barve"},{"@pid":"188/6511","text":"Jatinderkumar R. Saini"}]},"title":"Detecting and classifying online health misinformation with 'Content Similarity Measure (CSM)' algorithm: an automated fact-checking-based approach.","venue":"J. Supercomput.","volume":"79","number":"8","pages":"9127-9156","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/BarveS23","doi":"10.1007/S11227-022-05032-Y","ee":"https://doi.org/10.1007/s11227-022-05032-y","url":"https://dblp.org/rec/journals/tjs/BarveS23"}, "url":"URL#248265" }, { "@score":"1", "@id":"248266", "info":{"authors":{"author":[{"@pid":"350/4369","text":"Eliza Batool"},{"@pid":"230/2890","text":"Saira Andleeb Gillani"},{"@pid":"88/10307","text":"Sheneela Naz"},{"@pid":"283/1454","text":"Maryam Bukhari"},{"@pid":"218/1863","text":"Muazzam Maqsood"},{"@pid":"y/SangSooYeo","text":"Sang-Soo Yeo"},{"@pid":"73/4067","text":"Seungmin Rho"}]},"title":"POSNet: a hybrid deep learning model for efficient person re-identification.","venue":"J. Supercomput.","volume":"79","number":"12","pages":"13090-13118","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/BatoolGNBMYR23","doi":"10.1007/S11227-023-05169-4","ee":"https://doi.org/10.1007/s11227-023-05169-4","url":"https://dblp.org/rec/journals/tjs/BatoolGNBMYR23"}, "url":"URL#248266" }, { "@score":"1", "@id":"248267", "info":{"authors":{"author":[{"@pid":"350/4145","text":"Cihan Bayraktar"},{"@pid":"60/640","text":"Ziya Karakaya"},{"@pid":"98/43","text":"Hadi Gökçen"}]},"title":"Real-time anomaly detection system within the scope of smart factories.","venue":"J. Supercomput.","volume":"79","number":"13","pages":"14707-14742","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/BayraktarKG23","doi":"10.1007/S11227-023-05236-W","ee":"https://doi.org/10.1007/s11227-023-05236-w","url":"https://dblp.org/rec/journals/tjs/BayraktarKG23"}, "url":"URL#248267" }, { "@score":"1", "@id":"248268", "info":{"authors":{"author":[{"@pid":"338/6163","text":"Merve Vildan Baysal"},{"@pid":"81/6650","text":"Özden Özcan-Top"},{"@pid":"31/6100","text":"Aysu Betin-Can"}]},"title":"Blockchain technology applications in the health domain: a multivocal literature review.","venue":"J. Supercomput.","volume":"79","number":"3","pages":"3112-3156","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/BaysalOB23","doi":"10.1007/S11227-022-04772-1","ee":"https://doi.org/10.1007/s11227-022-04772-1","url":"https://dblp.org/rec/journals/tjs/BaysalOB23"}, "url":"URL#248268" }, { "@score":"1", "@id":"248269", "info":{"authors":{"author":[{"@pid":"229/7524","text":"Zohre Beiki"},{"@pid":"00/4099","text":"Ali Jahanian 0001"}]},"title":"Generic and scalable DNA-based logic design methodology for massive parallel computation.","venue":"J. Supercomput.","volume":"79","number":"2","pages":"1426-1450","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/BeikiJ23","doi":"10.1007/S11227-022-04693-Z","ee":"https://doi.org/10.1007/s11227-022-04693-z","url":"https://dblp.org/rec/journals/tjs/BeikiJ23"}, "url":"URL#248269" }, { "@score":"1", "@id":"248270", "info":{"authors":{"author":[{"@pid":"227/0126","text":"Ali Belgacem"},{"@pid":"56/6930","text":"Saïd Mahmoudi"},{"@pid":"142/9937","text":"Mohamed Amine Ferrag"}]},"title":"A machine learning model for improving virtual machine migration in cloud computing.","venue":"J. Supercomput.","volume":"79","number":"9","pages":"9486-9508","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/BelgacemMF23","doi":"10.1007/S11227-022-05031-Z","ee":"https://doi.org/10.1007/s11227-022-05031-z","url":"https://dblp.org/rec/journals/tjs/BelgacemMF23"}, "url":"URL#248270" }, { "@score":"1", "@id":"248271", "info":{"authors":{"author":[{"@pid":"257/0589","text":"Amira Benachour"},{"@pid":"13/10703","text":"Saïd Yahiaoui"},{"@pid":"24/3003","text":"Didier El Baz"},{"@pid":"40/4561","text":"Nadia Nouali-Taboudjemat"},{"@pid":"99/6650","text":"Hamamache Kheddouci"}]},"title":"Fast parallel algorithms for finding elementary circuits of a directed graph: a GPU-based approach.","venue":"J. Supercomput.","volume":"79","number":"5","pages":"4791-4819","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/BenachourYBNK23","doi":"10.1007/S11227-022-04835-3","ee":"https://doi.org/10.1007/s11227-022-04835-3","url":"https://dblp.org/rec/journals/tjs/BenachourYBNK23"}, "url":"URL#248271" }, { "@score":"1", "@id":"248272", "info":{"authors":{"author":[{"@pid":"258/7095","text":"Soufia Bennai"},{"@pid":"94/5906","text":"Kamal Amroun"},{"@pid":"79/3951","text":"Samir Loudni"},{"@pid":"146/4696","text":"Abdelkader Ouali"}]},"title":"An efficient heuristic approach combining maximal itemsets and area measure for compressing voluminous table constraints.","venue":"J. Supercomput.","volume":"79","number":"1","pages":"650-676","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/BennaiALO23","doi":"10.1007/S11227-022-04667-1","ee":"https://doi.org/10.1007/s11227-022-04667-1","url":"https://dblp.org/rec/journals/tjs/BennaiALO23"}, "url":"URL#248272" }, { "@score":"1", "@id":"248273", "info":{"authors":{"author":[{"@pid":"201/4105","text":"Ala-Eddine Benrazek"},{"@pid":"99/11041","text":"Zineddine Kouahla"},{"@pid":"46/7706","text":"Brahim Farou"},{"@pid":"57/5383","text":"Hamid Seridi"},{"@pid":"321/4369","text":"Imane Allele"},{"@pid":"142/9937","text":"Mohamed Amine Ferrag"}]},"title":"Tree-based indexing technique for efficient and real-time label retrieval in the object tracking system.","venue":"J. Supercomput.","volume":"79","number":"18","pages":"20562-20599","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/BenrazekKFSAF23","doi":"10.1007/S11227-023-05478-8","ee":"https://doi.org/10.1007/s11227-023-05478-8","url":"https://dblp.org/rec/journals/tjs/BenrazekKFSAF23"}, "url":"URL#248273" }, { "@score":"1", "@id":"248274", "info":{"authors":{"author":[{"@pid":"180/7475","text":"Somnath Bera"},{"@pid":"349/3631","text":"Tanushree Dey"},{"@pid":"125/7690","text":"Anwesha Mukherjee"},{"@pid":"b/RajkumarBuyya","text":"Rajkumar Buyya"}]},"title":"E-CropReco: a dew-edge-based multi-parametric crop recommendation framework for internet of agricultural things.","venue":"J. Supercomput.","volume":"79","number":"11","pages":"11965-11999","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/BeraDMB23","doi":"10.1007/S11227-023-05131-4","ee":"https://doi.org/10.1007/s11227-023-05131-4","url":"https://dblp.org/rec/journals/tjs/BeraDMB23"}, "url":"URL#248274" }, { "@score":"1", "@id":"248275", "info":{"authors":{"author":[{"@pid":"350/0217","text":"Sourav Bera"},{"@pid":"350/0593","text":"Suryakant Prasad"},{"@pid":"129/2777","text":"Y. Sreenivasa Rao"}]},"title":"Verifiable and Boolean keyword searchable attribute-based signcryption for electronic medical record storage and retrieval in cloud computing environment.","venue":"J. Supercomput.","volume":"79","number":"18","pages":"20324-20382","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/BeraPR23","doi":"10.1007/S11227-023-05416-8","ee":"https://doi.org/10.1007/s11227-023-05416-8","url":"https://dblp.org/rec/journals/tjs/BeraPR23"}, "url":"URL#248275" }, { "@score":"1", "@id":"248276", "info":{"authors":{"author":[{"@pid":"354/8946","text":"Erhan Bergil"},{"@pid":"354/8559","text":"Canan Oral"},{"@pid":"135/9892","text":"Engin Ufuk Ergul"}]},"title":"Classification of arithmetic mental task performances using EEG and ECG signals.","venue":"J. Supercomput.","volume":"79","number":"14","pages":"15535-15547","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/BergilOE23","doi":"10.1007/S11227-023-05294-0","ee":"https://doi.org/10.1007/s11227-023-05294-0","url":"https://dblp.org/rec/journals/tjs/BergilOE23"}, "url":"URL#248276" }, { "@score":"1", "@id":"248277", "info":{"authors":{"author":[{"@pid":"313/5614","text":"Vasudeva Bevara"},{"@pid":"338/6446","text":"Syed Alihussain"},{"@pid":"338/5546","text":"P. N. S. B. S. V. Prasad"},{"@pid":"150/4785","text":"Pradyut Kumar Sanki"}]},"title":"Design of an efficient QCA-based median filter with energy dissipation analysis.","venue":"J. Supercomput.","volume":"79","number":"3","pages":"2984-3004","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/BevaraAPS23","doi":"10.1007/S11227-022-04780-1","ee":"https://doi.org/10.1007/s11227-022-04780-1","url":"https://dblp.org/rec/journals/tjs/BevaraAPS23"}, "url":"URL#248277" }, { "@score":"1", "@id":"248278", "info":{"authors":{"author":[{"@pid":"168/1156","text":"Rati Bhan"},{"@pid":"184/2100","text":"Rajendra Pamula"},{"@pid":"17/11140","text":"Parvez Faruki"},{"@pid":"141/0663","text":"Jyoti Gajrani"}]},"title":"Blockchain-enabled secure and efficient data sharing scheme for trust management in healthcare smartphone network.","venue":"J. Supercomput.","volume":"79","number":"14","pages":"16233-16274","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/BhanPFG23","doi":"10.1007/S11227-023-05272-6","ee":"https://doi.org/10.1007/s11227-023-05272-6","url":"https://dblp.org/rec/journals/tjs/BhanPFG23"}, "url":"URL#248278" }, { "@score":"1", "@id":"248279", "info":{"title":"Retraction Note to: An optimization algorithm-based resource allocation for cooperative cognitive radio networks.","venue":"J. Supercomput.","volume":"79","number":"5","pages":"5844","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/BharathiJ23","doi":"10.1007/S11227-022-04861-1","ee":"https://doi.org/10.1007/s11227-022-04861-1","url":"https://dblp.org/rec/journals/tjs/BharathiJ23"}, "url":"URL#248279" }, { "@score":"1", "@id":"248280", "info":{"authors":{"author":[{"@pid":"306/5905","text":"Hossein BiTalebi"},{"@pid":"41/4838","text":"Farshad Safaei"}]},"title":"Criticality-aware priority to accelerate GPU memory access.","venue":"J. Supercomput.","volume":"79","number":"1","pages":"188-213","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/BiTalebiS23","doi":"10.1007/S11227-022-04657-3","ee":"https://doi.org/10.1007/s11227-022-04657-3","url":"https://dblp.org/rec/journals/tjs/BiTalebiS23"}, "url":"URL#248280" }, { "@score":"1", "@id":"248281", "info":{"authors":{"author":[{"@pid":"221/6731","text":"Genqing Bian"},{"@pid":"299/5941","text":"Mingxuan Song"},{"@pid":"225/8609","text":"Bilin Shao"}]},"title":"Certificateless network coding scheme from certificateless public auditing protocol.","venue":"J. Supercomput.","volume":"79","number":"3","pages":"2570-2602","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/BianSS23","doi":"10.1007/S11227-022-04719-6","ee":"https://doi.org/10.1007/s11227-022-04719-6","url":"https://dblp.org/rec/journals/tjs/BianSS23"}, "url":"URL#248281" }, { "@score":"1", "@id":"248282", "info":{"authors":{"author":[{"@pid":"338/5757","text":"Sarah Bolton"},{"@pid":"249/6289","text":"Richard Dill"},{"@pid":"g/MichaelRGrimaila","text":"Michael R. Grimaila"},{"@pid":"33/7391","text":"Douglas D. Hodson"}]},"title":"ADS-B classification using multivariate long short-term memory-fully convolutional networks and data reduction techniques.","venue":"J. Supercomput.","volume":"79","number":"2","pages":"2281-2307","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/BoltonDGH23","doi":"10.1007/S11227-022-04737-4","ee":"https://doi.org/10.1007/s11227-022-04737-4","url":"https://dblp.org/rec/journals/tjs/BoltonDGH23"}, "url":"URL#248282" }, { "@score":"1", "@id":"248283", "info":{"authors":{"author":[{"@pid":"338/7043","text":"Niloofar Bozorgvar"},{"@pid":"146/5914","text":"Abbas Rasoolzadegan"},{"@pid":"12/4138","text":"Ahad Harati"}]},"title":"Probabilistic detection of GoF design patterns.","venue":"J. Supercomput.","volume":"79","number":"2","pages":"1654-1682","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/BozorgvarRH23","doi":"10.1007/S11227-022-04718-7","ee":"https://doi.org/10.1007/s11227-022-04718-7","url":"https://dblp.org/rec/journals/tjs/BozorgvarRH23"}, "url":"URL#248283" }, { "@score":"1", "@id":"248284", "info":{"authors":{"author":[{"@pid":"340/4351","text":"A. Hadj Brahim"},{"@pid":"251/3665","text":"Ali-Pacha Adda"},{"@pid":"68/7708","text":"Naima Hadj-Said"}]},"title":"A new fast image compression-encryption scheme based on compressive sensing and parallel blocks.","venue":"J. Supercomput.","volume":"79","number":"8","pages":"8843-8889","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/BrahimAH23","doi":"10.1007/S11227-022-04999-Y","ee":"https://doi.org/10.1007/s11227-022-04999-y","url":"https://dblp.org/rec/journals/tjs/BrahimAH23"}, "url":"URL#248284" }, { "@score":"1", "@id":"248285", "info":{"authors":{"author":[{"@pid":"06/2554","text":"Malik Braik"},{"@pid":"12/10437-1","text":"Mohammed A. Awadallah 0001"},{"@pid":"90/7990","text":"Mohammed Azmi Al-Betar"},{"@pid":"35/7477","text":"Heba Al-Hiary"}]},"title":"Enhanced whale optimization algorithm-based modeling and simulation analysis for industrial system parameter identification.","venue":"J. Supercomput.","volume":"79","number":"13","pages":"14489-14544","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/BraikAAA23","doi":"10.1007/S11227-023-05215-1","ee":"https://doi.org/10.1007/s11227-023-05215-1","url":"https://dblp.org/rec/journals/tjs/BraikAAA23"}, "url":"URL#248285" }, { "@score":"1", "@id":"248286", "info":{"authors":{"author":[{"@pid":"b/NievesRBrisaboa","text":"Nieves R. Brisaboa"},{"@pid":"63/6279","text":"Ana Cerdeira-Pena"},{"@pid":"66/1310","text":"Guillermo de Bernardo"},{"@pid":"37/1556","text":"Antonio Fariña"},{"@pid":"n/GonzaloNavarro","text":"Gonzalo Navarro 0001"}]},"title":"Space/time-efficient RDF stores based on circular suffix sorting.","venue":"J. Supercomput.","volume":"79","number":"5","pages":"5643-5683","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/BrisaboaCBFN23","doi":"10.1007/S11227-022-04890-W","ee":"https://doi.org/10.1007/s11227-022-04890-w","url":"https://dblp.org/rec/journals/tjs/BrisaboaCBFN23"}, "url":"URL#248286" }, { "@score":"1", "@id":"248287", "info":{"authors":{"author":[{"@pid":"14/9378","text":"Andrés Bustos"},{"@pid":"307/2761","text":"Antonio J. Rubio-Montero"},{"@pid":"350/3982","text":"Roberto Méndez"},{"@pid":"145/6472","text":"Sergio Rivera"},{"@pid":"31/2968","text":"Francisco González"},{"@pid":"350/4541","text":"Xandra Campo"},{"@pid":"166/5274","text":"Hernán Asorey"},{"@pid":"95/5499","text":"Rafael Mayo-García"}]},"title":"Response of HPC hardware to neutron radiation at the dawn of exascale.","venue":"J. Supercomput.","volume":"79","number":"12","pages":"13817-13838","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/BustosRMRGCAM23","doi":"10.1007/S11227-023-05199-Y","ee":"https://doi.org/10.1007/s11227-023-05199-y","url":"https://dblp.org/rec/journals/tjs/BustosRMRGCAM23"}, "url":"URL#248287" }, { "@score":"1", "@id":"248288", "info":{"authors":{"author":{"@pid":"48/3984","text":"Jin Wook Byun"}},"title":"Towards serverless fast one round authentication with two mobile end devices.","venue":"J. Supercomput.","volume":"79","number":"5","pages":"5684-5704","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/Byun23","doi":"10.1007/S11227-022-04891-9","ee":"https://doi.org/10.1007/s11227-022-04891-9","url":"https://dblp.org/rec/journals/tjs/Byun23"}, "url":"URL#248288" }, { "@score":"1", "@id":"248289", "info":{"authors":{"author":[{"@pid":"52/11235","text":"Linqin Cai"},{"@pid":"319/5036","text":"Haodu Fang"},{"@pid":"28/7403","text":"Zhiqing Li"}]},"title":"Pre-trained multilevel fuse network based on vision-conditioned reasoning and bilinear attentions for medical image visual question answering.","venue":"J. Supercomput.","volume":"79","number":"12","pages":"13696-13723","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/CaiFL23","doi":"10.1007/S11227-023-05195-2","ee":"https://doi.org/10.1007/s11227-023-05195-2","url":"https://dblp.org/rec/journals/tjs/CaiFL23"}, "url":"URL#248289" }, { "@score":"1", "@id":"248290", "info":{"authors":{"author":[{"@pid":"18/7669","text":"Gang Cai"},{"@pid":"346/0483","text":"Lingyan Wu"}]},"title":"Cycle sampling neural network algorithms and applications.","venue":"J. Supercomput.","volume":"79","number":"9","pages":"9889-9914","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/CaiW23","doi":"10.1007/S11227-022-05019-9","ee":"https://doi.org/10.1007/s11227-022-05019-9","url":"https://dblp.org/rec/journals/tjs/CaiW23"}, "url":"URL#248290" }, { "@score":"1", "@id":"248291", "info":{"authors":{"author":[{"@pid":"292/4272","text":"Rui Calheno"},{"@pid":"52/5239-2","text":"Paulo Carvalho 0002"},{"@pid":"37/5677","text":"Solange Rito Lima"},{"@pid":"23/1224","text":"Pedro Rangel Henriques"},{"@pid":"177/3374","text":"Mateo Ramos Merino"}]},"title":"Improving conformance checking in process modelling: a multiperspective algorithm.","venue":"J. Supercomput.","volume":"79","number":"16","pages":"18256-18292","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/CalhenoCLHM23","doi":"10.1007/S11227-023-05315-Y","ee":"https://doi.org/10.1007/s11227-023-05315-y","url":"https://dblp.org/rec/journals/tjs/CalhenoCLHM23"}, "url":"URL#248291" }, { "@score":"1", "@id":"248292", "info":{"authors":{"author":[{"@pid":"204/2971","text":"Lifeng Cao"},{"@pid":"341/0508","text":"Shoucai Zhao"},{"@pid":"190/4682","text":"Zhensheng Gao"},{"@pid":"23/7673","text":"Xuehui Du"}]},"title":"Cross-chain data traceability mechanism for cross-domain access.","venue":"J. Supercomput.","volume":"79","number":"5","pages":"4944-4961","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/CaoZGD23","doi":"10.1007/S11227-022-04793-W","ee":"https://doi.org/10.1007/s11227-022-04793-w","url":"https://dblp.org/rec/journals/tjs/CaoZGD23"}, "url":"URL#248292" }, { "@score":"1", "@id":"248293", "info":{"authors":{"author":[{"@pid":"202/6648","text":"Rocío Carratalá-Sáez"},{"@pid":"117/6986","text":"Yuri Torres"},{"@pid":"295/7036","text":"José Sierra-Pallares"},{"@pid":"239/8957","text":"Sergio López-Huguet"},{"@pid":"l/DiegoRLlanosFerraris","text":"Diego R. Llanos"}]},"title":"UVaFTLE: Lagrangian finite time Lyapunov exponent extraction for fluid dynamic applications.","venue":"J. Supercomput.","volume":"79","number":"9","pages":"9635-9665","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/CarratalaSaezTSLL23","doi":"10.1007/S11227-022-05017-X","ee":"https://doi.org/10.1007/s11227-022-05017-x","url":"https://dblp.org/rec/journals/tjs/CarratalaSaezTSLL23"}, "url":"URL#248293" }, { "@score":"1", "@id":"248294", "info":{"authors":{"author":[{"@pid":"356/1927","text":"Angel Casas-Ordaz"},{"@pid":"37/10395","text":"Diego Oliva"},{"@pid":"259/9360","text":"Mario A. Navarro"},{"@pid":"318/5707","text":"Alfonso Ramos-Michel"},{"@pid":"13/1481","text":"Marco Antonio Pérez Cisneros"}]},"title":"An improved opposition-based Runge Kutta optimizer for multilevel image thresholding.","venue":"J. Supercomput.","volume":"79","number":"15","pages":"17247-17354","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/CasasOrdazONRC23","doi":"10.1007/S11227-023-05227-X","ee":"https://doi.org/10.1007/s11227-023-05227-x","url":"https://dblp.org/rec/journals/tjs/CasasOrdazONRC23"}, "url":"URL#248294" }, { "@score":"1", "@id":"248295", "info":{"authors":{"author":[{"@pid":"93/2300","text":"Manuel de Castro"},{"@pid":"60/6349","text":"Roberto R. Osorio"},{"@pid":"67/1339","text":"David López Vilariño"},{"@pid":"35/7039","text":"Arturo González-Escribano"},{"@pid":"l/DiegoRLlanosFerraris","text":"Diego R. Llanos"}]},"title":"Implementation of a motion estimation algorithm for Intel FPGAs using OpenCL.","venue":"J. Supercomput.","volume":"79","number":"9","pages":"9866-9888","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/CastroOVGL23","doi":"10.1007/S11227-023-05051-3","ee":"https://doi.org/10.1007/s11227-023-05051-3","url":"https://dblp.org/rec/journals/tjs/CastroOVGL23"}, "url":"URL#248295" }, { "@score":"1", "@id":"248296", "info":{"authors":{"author":[{"@pid":"93/2300","text":"Manuel de Castro"},{"@pid":"346/0791","text":"Inmaculada Santamaria-Valenzuela"},{"@pid":"117/6986","text":"Yuri Torres"},{"@pid":"35/7039","text":"Arturo González-Escribano"},{"@pid":"l/DiegoRLlanosFerraris","text":"Diego R. Llanos"}]},"title":"EPSILOD: efficient parallel skeleton for generic iterative stencil computations in distributed GPUs.","venue":"J. Supercomput.","volume":"79","number":"9","pages":"9409-9442","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/CastroSTGL23","doi":"10.1007/S11227-022-05040-Y","ee":"https://doi.org/10.1007/s11227-022-05040-y","url":"https://dblp.org/rec/journals/tjs/CastroSTGL23"}, "url":"URL#248296" }, { "@score":"1", "@id":"248297", "info":{"authors":{"author":[{"@pid":"127/7623","text":"Tugrul Çavdar"},{"@pid":"292/8539","text":"Nader Ebrahimpour"},{"@pid":"208/0165","text":"Muhammet Talha Kakiz"},{"@pid":"158/1435","text":"Faruk Baturalp Gunay"}]},"title":"Decision-making for the anomalies in IIoTs based on 1D convolutional neural networks and Dempster-Shafer theory (DS-1DCNN).","venue":"J. Supercomput.","volume":"79","number":"2","pages":"1683-1704","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/CavdarEKG23","doi":"10.1007/S11227-022-04739-2","ee":"https://doi.org/10.1007/s11227-022-04739-2","url":"https://dblp.org/rec/journals/tjs/CavdarEKG23"}, "url":"URL#248297" }, { "@score":"1", "@id":"248298", "info":{"authors":{"author":[{"@pid":"46/3951","text":"Yu-Teng Chang"},{"@pid":"338/7070","text":"Neng-Hsun Fan"}]},"title":"A novel approach to market segmentation selection using artificial intelligence techniques.","venue":"J. Supercomput.","volume":"79","number":"2","pages":"1235-1262","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ChangF23","doi":"10.1007/S11227-022-04666-2","ee":"https://doi.org/10.1007/s11227-022-04666-2","url":"https://dblp.org/rec/journals/tjs/ChangF23"}, "url":"URL#248298" }, { "@score":"1", "@id":"248299", "info":{"authors":{"author":[{"@pid":"78/2510","text":"Shih-Hao Chang"},{"@pid":"51/5797","text":"Chih-Hsien Hsia"},{"@pid":"253/0300","text":"Wei-Zhi Hong"}]},"title":"A secured internet of robotic things (IoRT) for long-term care services in a smart building.","venue":"J. Supercomput.","volume":"79","number":"5","pages":"5276-5290","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ChangHH23","doi":"10.1007/S11227-022-04845-1","ee":"https://doi.org/10.1007/s11227-022-04845-1","url":"https://dblp.org/rec/journals/tjs/ChangHH23"}, "url":"URL#248299" }, { "@score":"1", "@id":"248300", "info":{"authors":{"author":[{"@pid":"48/6131","text":"Guanghui Chang"},{"@pid":"173/2251","text":"Shiyang Hu"},{"@pid":"252/0139","text":"Haihui Huang"}]},"title":"Two-channel hierarchical attention mechanism model for short text classification.","venue":"J. Supercomput.","volume":"79","number":"6","pages":"6991-7013","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ChangHH23a","doi":"10.1007/S11227-022-04950-1","ee":"https://doi.org/10.1007/s11227-022-04950-1","url":"https://dblp.org/rec/journals/tjs/ChangHH23a"}, "url":"URL#248300" }, { "@score":"1", "@id":"248301", "info":{"authors":{"author":[{"@pid":"78/2510","text":"Shih-Hao Chang"},{"@pid":"51/5797","text":"Chih-Hsien Hsia"},{"@pid":"253/0300","text":"Wei-Zhi Hong"}]},"title":"Correction to: A secured internet of robotic things (IoRT) for long-term care services in a smart building.","venue":"J. Supercomput.","volume":"79","number":"6","pages":"7062","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ChangHH23b","doi":"10.1007/S11227-022-04927-0","ee":"https://doi.org/10.1007/s11227-022-04927-0","url":"https://dblp.org/rec/journals/tjs/ChangHH23b"}, "url":"URL#248301" }, { "@score":"1", "@id":"248302", "info":{"authors":{"author":[{"@pid":"12/1272","text":"Wenbing Chang"},{"@pid":"334/2309","text":"Ruowen Li"},{"@pid":"09/3263","text":"Yu Fu"},{"@pid":"05/6872","text":"Yiyong Xiao"},{"@pid":"49/6599","text":"Shenghan Zhou"}]},"title":"A multistep forecasting method for online car-hailing demand based on wavelet decomposition and deep Gaussian process regression.","venue":"J. Supercomput.","volume":"79","number":"3","pages":"3412-3436","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ChangLFXZ23","doi":"10.1007/S11227-022-04773-0","ee":"https://doi.org/10.1007/s11227-022-04773-0","url":"https://dblp.org/rec/journals/tjs/ChangLFXZ23"}, "url":"URL#248302" }, { "@score":"1", "@id":"248303", "info":{"authors":{"author":[{"@pid":"182/6574","text":"Zhuoqing Chang"},{"@pid":"90/4308","text":"Shubo Liu"},{"@pid":"330/7570","text":"Run Qiu"},{"@pid":"88/1952","text":"Song Song"},{"@pid":"55/4240","text":"Zhaohui Cai"},{"@pid":"26/4495","text":"Guoqing Tu"}]},"title":"Time-aware neural ordinary differential equations for incomplete time series modeling.","venue":"J. Supercomput.","volume":"79","number":"16","pages":"18699-18727","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ChangLQSCT23","doi":"10.1007/S11227-023-05327-8","ee":"https://doi.org/10.1007/s11227-023-05327-8","url":"https://dblp.org/rec/journals/tjs/ChangLQSCT23"}, "url":"URL#248303" }, { "@score":"1", "@id":"248304", "info":{"authors":{"author":[{"@pid":"24/8830","text":"Pinkey Chauhan"},{"@pid":"280/2808","text":"Mithilesh Atulkar"}]},"title":"An efficient centralized DDoS attack detection approach for Software Defined Internet of Things.","venue":"J. Supercomput.","volume":"79","number":"9","pages":"10386-10422","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ChauhanA23","doi":"10.1007/S11227-023-05072-Y","ee":"https://doi.org/10.1007/s11227-023-05072-y","url":"https://dblp.org/rec/journals/tjs/ChauhanA23"}, "url":"URL#248304" }, { "@score":"1", "@id":"248305", "info":{"authors":{"author":[{"@pid":"305/7909","text":"Parul Chauhan"},{"@pid":"62/9067","text":"Anjana Gupta"},{"@pid":"258/6082","text":"Tanya Malhotra"}]},"title":"A novel cloud model based on multiplicative unbalanced linguistic term set.","venue":"J. Supercomput.","volume":"79","number":"14","pages":"16378-16408","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ChauhanGM23","doi":"10.1007/S11227-023-05295-Z","ee":"https://doi.org/10.1007/s11227-023-05295-z","url":"https://dblp.org/rec/journals/tjs/ChauhanGM23"}, "url":"URL#248305" }, { "@score":"1", "@id":"248306", "info":{"authors":{"author":{"@pid":"98/6406","text":"Mostafa Haghir Chehreghani"}},"title":"On using affine sketches for multiple-response dynamic graph regression.","venue":"J. Supercomput.","volume":"79","number":"5","pages":"5139-5153","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/Chehreghani23","doi":"10.1007/S11227-022-04865-X","ee":"https://doi.org/10.1007/s11227-022-04865-x","url":"https://dblp.org/rec/journals/tjs/Chehreghani23"}, "url":"URL#248306" }, { "@score":"1", "@id":"248307", "info":{"authors":{"author":[{"@pid":"98/6406","text":"Mostafa Haghir Chehreghani"},{"@pid":"344/9209","text":"Zahra Yaghoobi"}]},"title":"Improving empirical efficiency of CUR decomposition.","venue":"J. Supercomput.","volume":"79","number":"8","pages":"9350-9366","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ChehreghaniY23","doi":"10.1007/S11227-022-05039-5","ee":"https://doi.org/10.1007/s11227-022-05039-5","url":"https://dblp.org/rec/journals/tjs/ChehreghaniY23"}, "url":"URL#248307" }, { "@score":"1", "@id":"248308", "info":{"authors":{"author":{"@pid":"358/2145","text":"Fengxian Chen"}},"title":"Job runtime prediction of HPC cluster based on PC-Transformer.","venue":"J. Supercomput.","volume":"79","number":"17","pages":"20208-20234","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/Chen23","doi":"10.1007/S11227-023-05470-2","ee":"https://doi.org/10.1007/s11227-023-05470-2","url":"https://dblp.org/rec/journals/tjs/Chen23"}, "url":"URL#248308" }, { "@score":"1", "@id":"248309", "info":{"authors":{"author":[{"@pid":"69/510","text":"Tao Chen"},{"@pid":"67/6351","text":"Yong Chen"},{"@pid":"174/8301-4","text":"Zhicheng He 0004"},{"@pid":"82/3391","text":"Eric Li"},{"@pid":"205/7567","text":"Chenglin Zhang"},{"@pid":"298/2979","text":"Yuanyi Huang"}]},"title":"A novel marine predators algorithm with adaptive update strategy.","venue":"J. Supercomput.","volume":"79","number":"6","pages":"6612-6645","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ChenCHLZH23","doi":"10.1007/S11227-022-04903-8","ee":"https://doi.org/10.1007/s11227-022-04903-8","url":"https://dblp.org/rec/journals/tjs/ChenCHLZH23"}, "url":"URL#248309" }, { "@score":"1", "@id":"248310", "info":{"authors":{"author":[{"@pid":"50/6996","text":"Min Chen"},{"@pid":"341/8084","text":"Wenhu Du"}]},"title":"The predicting public sentiment evolution on public emergencies under deep learning and internet of things.","venue":"J. Supercomput.","volume":"79","number":"6","pages":"6452-6470","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ChenD23","doi":"10.1007/S11227-022-04900-X","ee":"https://doi.org/10.1007/s11227-022-04900-x","url":"https://dblp.org/rec/journals/tjs/ChenD23"}, "url":"URL#248310" }, { "@score":"1", "@id":"248311", "info":{"authors":{"author":[{"@pid":"78/1633-6","text":"Yanping Chen 0006"},{"@pid":"339/4395","text":"Shengsheng He"},{"@pid":"82/8150","text":"Xiaomin Jin"},{"@pid":"22/1280","text":"Zhongmin Wang"},{"@pid":"150/0832","text":"Fengwei Wang"},{"@pid":"09/3666","text":"Lei Chen"}]},"title":"Resource utilization and cost optimization oriented container placement for edge computing in industrial internet.","venue":"J. Supercomput.","volume":"79","number":"4","pages":"3821-3849","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ChenHJWWC23","doi":"10.1007/S11227-022-04801-Z","ee":"https://doi.org/10.1007/s11227-022-04801-z","url":"https://dblp.org/rec/journals/tjs/ChenHJWWC23"}, "url":"URL#248311" }, { "@score":"1", "@id":"248312", "info":{"authors":{"author":[{"@pid":"96/2823","text":"Meirun Chen"},{"@pid":"55/6705","text":"Michel Habib"},{"@pid":"16/5439","text":"Cheng-Kuan Lin"}]},"title":"Diagnosability for a family of matching composition networks.","venue":"J. Supercomput.","volume":"79","number":"7","pages":"7584-7608","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ChenHL23","doi":"10.1007/S11227-022-04949-8","ee":"https://doi.org/10.1007/s11227-022-04949-8","url":"https://dblp.org/rec/journals/tjs/ChenHL23"}, "url":"URL#248312" }, { "@score":"1", "@id":"248313", "info":{"authors":{"author":[{"@pid":"65/2429","text":"Zhiqiang Chen"},{"@pid":"91/9124","text":"Meng Han"},{"@pid":"32/5311","text":"Hongxin Wu"},{"@pid":"303/7137","text":"Muhang Li"},{"@pid":"26/3710","text":"Xilong Zhang"}]},"title":"A multi-level weighted concept drift detection method.","venue":"J. Supercomput.","volume":"79","number":"5","pages":"5154-5180","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ChenHWLZ23","doi":"10.1007/S11227-022-04864-Y","ee":"https://doi.org/10.1007/s11227-022-04864-y","url":"https://dblp.org/rec/journals/tjs/ChenHWLZ23"}, "url":"URL#248313" }, { "@score":"1", "@id":"248314", "info":{"authors":{"author":[{"@pid":"160/0623","text":"Yen-Chun Chen"},{"@pid":"70/2368","text":"Chin-Feng Lai"}]},"title":"An intuitive pre-processing method based on human-robot interactions: zero-shot learning semantic segmentation based on synthetic semantic template.","venue":"J. Supercomput.","volume":"79","number":"11","pages":"11743-11766","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ChenL23","doi":"10.1007/S11227-023-05068-8","ee":"https://doi.org/10.1007/s11227-023-05068-8","url":"https://dblp.org/rec/journals/tjs/ChenL23"}, "url":"URL#248314" }, { "@score":"1", "@id":"248315", "info":{"authors":{"author":[{"@pid":"352/1513","text":"Renjiang Chen"},{"@pid":"43/656-29","text":"Tao Liu 0029"},{"@pid":"145/9858","text":"Zhaoyuan Liu"},{"@pid":"58/6810","text":"Li Wang"},{"@pid":"91/5889","text":"Min Tian"},{"@pid":"12/1208","text":"Ying Guo"},{"@pid":"57/6978","text":"Jingshan Pan"},{"@pid":"98/2898","text":"Xiaoming Wu"},{"@pid":"32/9556","text":"Meihong Yang"}]},"title":"Parallel optimization of method of characteristics based on Sunway Bluelight II supercomputer.","venue":"J. Supercomput.","volume":"79","number":"14","pages":"16275-16299","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ChenLLWTGPWY23","doi":"10.1007/S11227-023-05313-0","ee":"https://doi.org/10.1007/s11227-023-05313-0","url":"https://dblp.org/rec/journals/tjs/ChenLLWTGPWY23"}, "url":"URL#248315" }, { "@score":"1", "@id":"248316", "info":{"title":"Retraction Note: Cognitive learning performance assessment and analysis with CSCL applied on the NetGuru platform and CSPL applied on the TAoD platform for the network experiment class.","venue":"J. Supercomput.","volume":"79","number":"5","pages":"5845-5846","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ChenLTDCL23","doi":"10.1007/S11227-022-04855-Z","ee":"https://doi.org/10.1007/s11227-022-04855-z","url":"https://dblp.org/rec/journals/tjs/ChenLTDCL23"}, "url":"URL#248316" }, { "@score":"1", "@id":"248317", "info":{"authors":{"author":[{"@pid":"346/0806","text":"Naiyuan Chen"},{"@pid":"87/660","text":"Yan Li"},{"@pid":"346/0115","text":"Zhuomin Yang"},{"@pid":"346/0172","text":"Zhensong Lu"},{"@pid":"89/10686","text":"Sai Wang"},{"@pid":"346/0083","text":"Junang Wang"}]},"title":"LODNU: lightweight object detection network in UAV vision.","venue":"J. Supercomput.","volume":"79","number":"9","pages":"10117-10138","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ChenLYLWW23","doi":"10.1007/S11227-023-05065-X","ee":"https://doi.org/10.1007/s11227-023-05065-x","url":"https://dblp.org/rec/journals/tjs/ChenLYLWW23"}, "url":"URL#248317" }, { "@score":"1", "@id":"248318", "info":{"authors":{"author":[{"@pid":"174/9791","text":"Ruibo Chen"},{"@pid":"197/1603","text":"Yanjun Pu"},{"@pid":"169/3160","text":"Bowen Shi"},{"@pid":"06/241-1","text":"Wenjun Wu 0001"}]},"title":"An automatic model management system and its implementation for AIOps on microservice platforms.","venue":"J. Supercomput.","volume":"79","number":"10","pages":"11410-11426","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ChenPSW23","doi":"10.1007/S11227-023-05123-4","ee":"https://doi.org/10.1007/s11227-023-05123-4","url":"https://dblp.org/rec/journals/tjs/ChenPSW23"}, "url":"URL#248318" }, { "@score":"1", "@id":"248319", "info":{"authors":{"author":[{"@pid":"09/3666","text":"Lei Chen"},{"@pid":"52/10364","text":"Na Song"},{"@pid":"139/2063-1","text":"Yunpeng Ma 0001"}]},"title":"Harris hawks optimization based on global cross-variation and tent mapping.","venue":"J. Supercomput.","volume":"79","number":"5","pages":"5576-5614","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ChenSM23","doi":"10.1007/S11227-022-04869-7","ee":"https://doi.org/10.1007/s11227-022-04869-7","url":"https://dblp.org/rec/journals/tjs/ChenSM23"}, "url":"URL#248319" }, { "@score":"1", "@id":"248320", "info":{"authors":{"author":[{"@pid":"89/5615-7","text":"Bo Chen 0007"},{"@pid":"162/0684","text":"Hang Tao"},{"@pid":"91/11473","text":"Xuehuan Jiang"},{"@pid":"64/5715","text":"Yufeng Chen"},{"@pid":"15/10422","text":"Xiue Gao"},{"@pid":"296/7175","text":"Panling Jiang"},{"@pid":"203/2428","text":"Rui Tong"}]},"title":"A command-and-control hypernetwork modeling approach based on hierarchy-betweenness edge-linking strategy.","venue":"J. Supercomput.","volume":"79","number":"5","pages":"5705-5729","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ChenTJCGJT23","doi":"10.1007/S11227-022-04876-8","ee":"https://doi.org/10.1007/s11227-022-04876-8","url":"https://dblp.org/rec/journals/tjs/ChenTJCGJT23"}, "url":"URL#248320" }, { "@score":"1", "@id":"248321", "info":{"authors":{"author":[{"@pid":"64/5725","text":"Long Chen"},{"@pid":"291/7821","text":"Fangyi Xu"},{"@pid":"295/2456","text":"Kezhong Jin"},{"@pid":"53/9871","text":"Zhenzhou Tang"}]},"title":"Energy-saving access point configurations in WLANs: a swarm intelligent approach.","venue":"J. Supercomput.","volume":"79","number":"17","pages":"19332-19364","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ChenXJT23","doi":"10.1007/S11227-023-05402-0","ee":"https://doi.org/10.1007/s11227-023-05402-0","url":"https://dblp.org/rec/journals/tjs/ChenXJT23"}, "url":"URL#248321" }, { "@score":"1", "@id":"248322", "info":{"authors":{"author":[{"@pid":"50/6996","text":"Min Chen"},{"@pid":"00/6528","text":"Lili Zhang"}]},"title":"Application of edge computing combined with deep learning model in the dynamic evolution of network public opinion in emergencies.","venue":"J. Supercomput.","volume":"79","number":"2","pages":"1526-1543","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ChenZ23","doi":"10.1007/S11227-022-04733-8","ee":"https://doi.org/10.1007/s11227-022-04733-8","url":"https://dblp.org/rec/journals/tjs/ChenZ23"}, "url":"URL#248322" }, { "@score":"1", "@id":"248323", "info":{"authors":{"author":[{"@pid":"251/5100","text":"Fengmei Chen"},{"@pid":"73/4325","text":"Bin Zhao"},{"@pid":"276/6786","text":"Yilong Gao"},{"@pid":"63/6333","text":"Wenyin Zhang"}]},"title":"BTDA: Two-factor dynamic identity authentication scheme for data trading based on alliance chain.","venue":"J. Supercomput.","volume":"79","number":"17","pages":"19118-19137","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ChenZGZ23","doi":"10.1007/S11227-023-05393-Y","ee":"https://doi.org/10.1007/s11227-023-05393-y","url":"https://dblp.org/rec/journals/tjs/ChenZGZ23"}, "url":"URL#248323" }, { "@score":"1", "@id":"248324", "info":{"authors":{"author":[{"@pid":"249/3846","text":"Junde Chen"},{"@pid":"202/3822","text":"Adnan Zeb"},{"@pid":"69/11182","text":"Yuandong Sun"},{"@pid":"93/5881","text":"Defu Zhang"}]},"title":"A power line loss analysis method based on boost clustering.","venue":"J. Supercomput.","volume":"79","number":"3","pages":"3210-3226","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ChenZSZ23","doi":"10.1007/S11227-022-04777-W","ee":"https://doi.org/10.1007/s11227-022-04777-w","url":"https://dblp.org/rec/journals/tjs/ChenZSZ23"}, "url":"URL#248324" }, { "@score":"1", "@id":"248325", "info":{"authors":{"author":{"@pid":"136/2169","text":"Dongqin Cheng"}},"title":"Path covers of bubble-sort star graphs.","venue":"J. Supercomput.","volume":"79","number":"13","pages":"14848-14868","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/Cheng23","doi":"10.1007/S11227-023-05256-6","ee":"https://doi.org/10.1007/s11227-023-05256-6","url":"https://dblp.org/rec/journals/tjs/Cheng23"}, "url":"URL#248325" }, { "@score":"1", "@id":"248326", "info":{"authors":{"author":[{"@pid":"47/10054","text":"Dun-Wei Cheng"},{"@pid":"341/0690","text":"Jo-Yi Chang"},{"@pid":"10/1114","text":"Chen-Yen Lin"},{"@pid":"122/3961","text":"Limei Lin"},{"@pid":"218/2128","text":"Yanze Huang"},{"@pid":"27/5528","text":"Krishnaiyan Thulasiraman"},{"@pid":"63/3158","text":"Sun-Yuan Hsieh"}]},"title":"Efficient survivable mapping algorithm for logical topology in IP-over-WDM optical networks against node failure.","venue":"J. Supercomput.","volume":"79","number":"5","pages":"5037-5063","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ChengCLLHTH23","doi":"10.1007/S11227-022-04841-5","ee":"https://doi.org/10.1007/s11227-022-04841-5","url":"https://dblp.org/rec/journals/tjs/ChengCLLHTH23"}, "url":"URL#248326" }, { "@score":"1", "@id":"248327", "info":{"authors":{"author":[{"@pid":"25/3475","text":"Min-Yuan Cheng"},{"@pid":"140/4613","text":"Minh-Tu Cao"},{"@pid":"339/4079","text":"Christian Kentaro Nuralim"}]},"title":"Computer vision-based deep learning for supervising excavator operations and measuring real-time earthwork productivity.","venue":"J. Supercomput.","volume":"79","number":"4","pages":"4468-4492","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ChengCN23","doi":"10.1007/S11227-022-04803-X","ee":"https://doi.org/10.1007/s11227-022-04803-x","url":"https://dblp.org/rec/journals/tjs/ChengCN23"}, "url":"URL#248327" }, { "@score":"1", "@id":"248328", "info":{"authors":{"author":[{"@pid":"80/4313","text":"Sheng-Tzong Cheng"},{"@pid":"80/382","text":"Chih-Wei Hsu"},{"@pid":"45/4638","text":"Gwo-Jiun Horng"},{"@pid":"341/7484","text":"Kuan-Ting Tsai"}]},"title":"Quadro-W learning for human behavior prediction in an evolving environment: a case study of the intelligent butler technology.","venue":"J. Supercomput.","volume":"79","number":"6","pages":"6309-6346","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ChengHHT23","doi":"10.1007/S11227-022-04899-1","ee":"https://doi.org/10.1007/s11227-022-04899-1","url":"https://dblp.org/rec/journals/tjs/ChengHHT23"}, "url":"URL#248328" }, { "@score":"1", "@id":"248329", "info":{"authors":{"author":[{"@pid":"00/6261","text":"Xiaoyu Cheng"},{"@pid":"51/4558","text":"Peng Han"},{"@pid":"20/6417-8","text":"Wei He 0008"},{"@pid":"07/2895","text":"Guohui Zhou"}]},"title":"A new interval constructed belief rule base with rule reliability.","venue":"J. Supercomput.","volume":"79","number":"14","pages":"15835-15867","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ChengHHZ23","doi":"10.1007/S11227-023-05284-2","ee":"https://doi.org/10.1007/s11227-023-05284-2","url":"https://dblp.org/rec/journals/tjs/ChengHHZ23"}, "url":"URL#248329" }, { "@score":"1", "@id":"248330", "info":{"authors":{"author":[{"@pid":"77/7487","text":"Yuzhu Cheng"},{"@pid":"263/4723","text":"Qiuying Shi"}]},"title":"PCMIgr: a fast packet classification method based on information gain ratio.","venue":"J. Supercomput.","volume":"79","number":"7","pages":"7414-7437","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/ChengS23","doi":"10.1007/S11227-022-04951-0","ee":"https://doi.org/10.1007/s11227-022-04951-0","url":"https://dblp.org/rec/journals/tjs/ChengS23"}, "url":"URL#248330" }, { "@score":"1", "@id":"248331", "info":{"authors":{"author":[{"@pid":"25/5516","text":"Jing-Ru C. Cheng"},{"@pid":"341/0479","text":"Corwin Stanford"},{"@pid":"167/0129","text":"Steven R. Glandon"},{"@pid":"341/0829","text":"Anthony L. Lam"},{"@pid":"341/0456","text":"Warren R. Williams"}]},"title":"Macro benchmarking edge devices using enhanced super-resolution generative adversarial networks (ESRGANs).","venue":"J. Supercomput.","volume":"79","number":"5","pages":"5360-5373","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ChengSGLW23","doi":"10.1007/S11227-022-04819-3","ee":"https://doi.org/10.1007/s11227-022-04819-3","url":"https://dblp.org/rec/journals/tjs/ChengSGLW23"}, "url":"URL#248331" }, { "@score":"1", "@id":"248332", "info":{"authors":{"author":[{"@pid":"05/3038","text":"Hojin Cho"},{"@pid":"31/3709","text":"Myungsun Kim"}]},"title":"gCFS: completely fair scheduling on multiple GPUs for improved multi-DNN execution in terms of performance isolation.","venue":"J. Supercomput.","volume":"79","number":"6","pages":"5851-5877","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ChoK23","doi":"10.1007/S11227-022-04901-W","ee":"https://doi.org/10.1007/s11227-022-04901-w","url":"https://dblp.org/rec/journals/tjs/ChoK23"}, "url":"URL#248332" }, { "@score":"1", "@id":"248333", "info":{"authors":{"author":[{"@pid":"155/5921","text":"Joong-Yeon Cho"},{"@pid":"357/5034","text":"Pu-Rum Seo"},{"@pid":"36/2516","text":"Hyun-Wook Jin"}]},"title":"Exploiting copy engines for intra-node MPI collective communication.","venue":"J. Supercomput.","volume":"79","number":"16","pages":"17962-17982","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/ChoSJ23","doi":"10.1007/S11227-023-05340-X","ee":"https://doi.org/10.1007/s11227-023-05340-x","url":"https://dblp.org/rec/journals/tjs/ChoSJ23"}, "url":"URL#248333" }, { "@score":"1", "@id":"248334", "info":{"authors":{"author":[{"@pid":"349/3817","text":"Yurim Choi"},{"@pid":"40/2195","text":"Hangbae Chang"}]},"title":"Design of evaluation items of the security levels for suppliers in the manufacturing industry.","venue":"J. Supercomput.","volume":"79","number":"11","pages":"11707-11742","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ChoiC23","doi":"10.1007/S11227-023-05101-W","ee":"https://doi.org/10.1007/s11227-023-05101-w","url":"https://dblp.org/rec/journals/tjs/ChoiC23"}, "url":"URL#248334" }, { "@score":"1", "@id":"248335", "info":{"authors":{"author":[{"@pid":"220/1079","text":"Rajib Chowdhuri"},{"@pid":"220/1096","text":"MrinalKanti Deb Barma"}]},"title":"Node position estimation based on optimal clustering and detection of coverage hole in wireless sensor networks using hybrid deep reinforcement learning.","venue":"J. Supercomput.","volume":"79","number":"18","pages":"20845-20877","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ChowdhuriB23","doi":"10.1007/S11227-023-05494-8","ee":"https://doi.org/10.1007/s11227-023-05494-8","url":"https://dblp.org/rec/journals/tjs/ChowdhuriB23"}, "url":"URL#248335" }, { "@score":"1", "@id":"248336", "info":{"authors":{"author":[{"@pid":"288/3082","text":"Amine Chraibi"},{"@pid":"141/7197","text":"Said Ben Alla"},{"@pid":"20/1555","text":"Abdellah Touhafi"},{"@pid":"146/0567","text":"Abdellah Ezzati"}]},"title":"A novel dynamic multi-objective task scheduling optimization based on Dueling DQN and PER.","venue":"J. Supercomput.","volume":"79","number":"18","pages":"21368-21423","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ChraibiATE23","doi":"10.1007/S11227-023-05489-5","ee":"https://doi.org/10.1007/s11227-023-05489-5","url":"https://dblp.org/rec/journals/tjs/ChraibiATE23"}, "url":"URL#248336" }, { "@score":"1", "@id":"248337", "info":{"authors":{"author":[{"@pid":"78/1824","text":"Edward Chuah"},{"@pid":"45/4421","text":"Arshad Jhumka"},{"@pid":"122/0990","text":"Sai Narasimhamurthy"}]},"title":"An empirical study of major page faults for failure diagnosis in cluster systems.","venue":"J. Supercomput.","volume":"79","number":"16","pages":"18445-18479","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ChuahJN23","doi":"10.1007/S11227-023-05366-1","ee":"https://doi.org/10.1007/s11227-023-05366-1","url":"https://dblp.org/rec/journals/tjs/ChuahJN23"}, "url":"URL#248337" }, { "@score":"1", "@id":"248338", "info":{"authors":{"author":[{"@pid":"78/6916","text":"Po-Jen Chuang"},{"@pid":"350/4395","text":"Pang-Yu Huang"}]},"title":"B-VAE: a new dataset balancing approach using batched Variational AutoEncoders to enhance network intrusion detection.","venue":"J. Supercomput.","volume":"79","number":"12","pages":"13262-13286","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ChuangH23","doi":"10.1007/S11227-023-05171-W","ee":"https://doi.org/10.1007/s11227-023-05171-w","url":"https://dblp.org/rec/journals/tjs/ChuangH23"}, "url":"URL#248338" }, { "@score":"1", "@id":"248339", "info":{"authors":{"author":[{"@pid":"310/3961","text":"Leonel Feitosa Correia"},{"@pid":"123/2647","text":"Jamilson Dantas"},{"@pid":"165/3596","text":"Francisco Airton Silva"}]},"title":"Blockchain as a service environment: a dependability evaluation.","venue":"J. Supercomput.","volume":"79","number":"16","pages":"17919-17943","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/CorreiaDS23","doi":"10.1007/S11227-023-05342-9","ee":"https://doi.org/10.1007/s11227-023-05342-9","url":"https://dblp.org/rec/journals/tjs/CorreiaDS23"}, "url":"URL#248339" }, { "@score":"1", "@id":"248340", "info":{"authors":{"author":[{"@pid":"328/9215","text":"Jingkai Cui"},{"@pid":"134/1099","text":"Tianyu Liu"},{"@pid":"45/5012","text":"Mingchao Zhu"},{"@pid":"203/1463","text":"Zhenbang Xu"}]},"title":"Improved team learning-based grey wolf optimizer for optimization tasks and engineering problems.","venue":"J. Supercomput.","volume":"79","number":"10","pages":"10864-10914","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/CuiLZX23","doi":"10.1007/S11227-022-04930-5","ee":"https://doi.org/10.1007/s11227-022-04930-5","url":"https://dblp.org/rec/journals/tjs/CuiLZX23"}, "url":"URL#248340" }, { "@score":"1", "@id":"248341", "info":{"authors":{"author":[{"@pid":"08/2437","text":"Yu Cui"},{"@pid":"06/6785","text":"Yang Zhang"},{"@pid":"97/30","text":"Xia Li"},{"@pid":"19/2104","text":"Shunfu Jin"}]},"title":"A dynamic energy conservation scheme with dual-rate adjustment and semi-sleep mode in cloud system.","venue":"J. Supercomput.","volume":"79","number":"3","pages":"2451-2487","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/CuiZLJ23","doi":"10.1007/S11227-022-04715-W","ee":"https://doi.org/10.1007/s11227-022-04715-w","url":"https://dblp.org/rec/journals/tjs/CuiZLJ23"}, "url":"URL#248341" }, { "@score":"1", "@id":"248342", "info":{"authors":{"author":[{"@pid":"155/6588","text":"Fei Dai"},{"@pid":"30/2325","text":"Yawen Chen 0001"},{"@pid":"13/6225-1","text":"Zhiyi Huang 0001"},{"@pid":"99/5971-1","text":"Haibo Zhang 0001"},{"@pid":"55/2270","text":"Hao Zhang"},{"@pid":"236/2965","text":"Chengpeng Xia"}]},"title":"Comparing the performance of multi-layer perceptron training on electrical and optical network-on-chips.","venue":"J. Supercomput.","volume":"79","number":"10","pages":"10725-10746","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/DaiCHZZX23","doi":"10.1007/S11227-022-04945-Y","ee":"https://doi.org/10.1007/s11227-022-04945-y","url":"https://dblp.org/rec/journals/tjs/DaiCHZZX23"}, "url":"URL#248342" }, { "@score":"1", "@id":"248343", "info":{"authors":{"author":[{"@pid":"40/549","text":"Deniz Dal"},{"@pid":"61/10661","text":"Esra Celik"}]},"title":"Investigation of the impact of different versions of GCC on various metaheuristic-based solvers for traveling salesman problem.","venue":"J. Supercomput.","volume":"79","number":"11","pages":"12394-12440","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/DalC23","doi":"10.1007/S11227-023-05152-Z","ee":"https://doi.org/10.1007/s11227-023-05152-z","url":"https://dblp.org/rec/journals/tjs/DalC23"}, "url":"URL#248343" }, { "@score":"1", "@id":"248344", "info":{"authors":{"author":[{"@pid":"307/1883","text":"Nayan Ranjan Das"},{"@pid":"51/8909","text":"Imon Mukherjee"},{"@pid":"356/2167","text":"Anubhav D. Patel"},{"@pid":"67/1220","text":"Goutam Paul 0001"}]},"title":"An intelligent clustering framework for substitute recommendation and player selection.","venue":"J. Supercomput.","volume":"79","number":"15","pages":"16409-16441","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/DasMPP23","doi":"10.1007/S11227-023-05314-Z","ee":"https://doi.org/10.1007/s11227-023-05314-z","url":"https://dblp.org/rec/journals/tjs/DasMPP23"}, "url":"URL#248344" }, { "@score":"1", "@id":"248345", "info":{"authors":{"author":[{"@pid":"212/0029","text":"Surajit Das"},{"@pid":"293/9892","text":"Mahamuda Sultana"},{"@pid":"07/5653","text":"Suman Bhattacharya"},{"@pid":"255/8754","text":"Diganta Sengupta"},{"@pid":"26/5592","text":"Debashis De"}]},"title":"XAI-reduct: accuracy preservation despite dimensionality reduction for heart disease classification using explainable AI.","venue":"J. Supercomput.","volume":"79","number":"16","pages":"18167-18197","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/DasSBSD23","doi":"10.1007/S11227-023-05356-3","ee":"https://doi.org/10.1007/s11227-023-05356-3","url":"https://dblp.org/rec/journals/tjs/DasSBSD23"}, "url":"URL#248345" }, { "@score":"1", "@id":"248346", "info":{"authors":{"author":[{"@pid":"178/7887","text":"Priti Deb"},{"@pid":"125/7690","text":"Anwesha Mukherjee"},{"@pid":"26/5592","text":"Debashis De"},{"@pid":"34/9049-1","text":"Soumya K. Ghosh 0001"}]},"title":"IoBT: beamforming design in internet of things.","venue":"J. Supercomput.","volume":"79","number":"15","pages":"16773-16792","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/DebMDG23","doi":"10.1007/S11227-023-05307-Y","ee":"https://doi.org/10.1007/s11227-023-05307-y","url":"https://dblp.org/rec/journals/tjs/DebMDG23"}, "url":"URL#248346" }, { "@score":"1", "@id":"248347", "info":{"authors":{"author":[{"@pid":"359/5315","text":"M. Deepthi"},{"@pid":"359/5229","text":"G. N. V. R. Vikram"},{"@pid":"221/8479","text":"P. Venkatappareddy"}]},"title":"Development of a novel activation function based on Chebyshev polynomials: an aid for classification and denoising of images.","venue":"J. Supercomput.","volume":"79","number":"18","pages":"20515-20531","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/DeepthiVV23","doi":"10.1007/S11227-023-05466-Y","ee":"https://doi.org/10.1007/s11227-023-05466-y","url":"https://dblp.org/rec/journals/tjs/DeepthiVV23"}, "url":"URL#248347" }, { "@score":"1", "@id":"248348", "info":{"authors":{"author":{"@pid":"285/6421","text":"Afsaneh Banitalebi Dehkordi"}},"title":"Examining the status of CPU working load, processing load and controller bandwidth under the influence of packet-in buffer status located in Openflow switches in SDN-based IoT framework.","venue":"J. Supercomput.","volume":"79","number":"14","pages":"15814-15834","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/Dehkordi23","doi":"10.1007/S11227-023-05258-4","ee":"https://doi.org/10.1007/s11227-023-05258-4","url":"https://dblp.org/rec/journals/tjs/Dehkordi23"}, "url":"URL#248348" }, { "@score":"1", "@id":"248349", "info":{"authors":{"author":[{"@pid":"341/8856","text":"Narendra K. Dewangan"},{"@pid":"188/6655","text":"Preeti Chandrakar"}]},"title":"TempChain: a blockchain scheme for telehealth data sharing between two blockchains using property mapping function.","venue":"J. Supercomput.","volume":"79","number":"13","pages":"14808-14826","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/DewanganC23","doi":"10.1007/S11227-023-05259-3","ee":"https://doi.org/10.1007/s11227-023-05259-3","url":"https://dblp.org/rec/journals/tjs/DewanganC23"}, "url":"URL#248349" }, { "@score":"1", "@id":"248350", "info":{"authors":{"author":[{"@pid":"337/6916","text":"Arsalan Dezhkam"},{"@pid":"76/7025","text":"Mohammad Taghi Manzuri"},{"@pid":"339/4912","text":"Ahmad Aghapour"},{"@pid":"295/9143","text":"Afshin Karimi"},{"@pid":"339/3919","text":"Ali Rabiee"},{"@pid":"268/7994","text":"Shervin Manzuri Shalmani"}]},"title":"A Bayesian-based classification framework for financial time series trend prediction.","venue":"J. Supercomput.","volume":"79","number":"4","pages":"4622-4659","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/DezhkamMAKRS23","doi":"10.1007/S11227-022-04834-4","ee":"https://doi.org/10.1007/s11227-022-04834-4","url":"https://dblp.org/rec/journals/tjs/DezhkamMAKRS23"}, "url":"URL#248350" }, { "@score":"1", "@id":"248351", "info":{"authors":{"author":[{"@pid":"164/1801","text":"Krishna Gopal Dhal"},{"@pid":"264/2792","text":"Arunita Das"},{"@pid":"264/2805","text":"Swarnajit Ray"},{"@pid":"252/5467","text":"Rebika Rai"},{"@pid":"184/7318","text":"Tarun Kumar Ghosh"}]},"title":"Archimedes optimizer-based fast and robust fuzzy clustering for noisy image segmentation.","venue":"J. Supercomput.","volume":"79","number":"4","pages":"3691-3730","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/DhalDRRG23","doi":"10.1007/S11227-022-04769-W","ee":"https://doi.org/10.1007/s11227-022-04769-w","url":"https://dblp.org/rec/journals/tjs/DhalDRRG23"}, "url":"URL#248351" }, { "@score":"1", "@id":"248352", "info":{"authors":{"author":[{"@pid":"338/7121","text":"Bijan Pourghorbani Dinachali"},{"@pid":"85/5516","text":"Sam Jabbehdari"},{"@pid":"83/7728","text":"Hamid Haj Seyyed Javadi"}]},"title":"A pricing approach for optimal use of computing resources in cloud federation.","venue":"J. Supercomput.","volume":"79","number":"3","pages":"3055-3094","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/DinachaliJJ23","doi":"10.1007/S11227-022-04725-8","ee":"https://doi.org/10.1007/s11227-022-04725-8","url":"https://dblp.org/rec/journals/tjs/DinachaliJJ23"}, "url":"URL#248352" }, { "@score":"1", "@id":"248353", "info":{"authors":{"author":[{"@pid":"359/5145","text":"Junyuan Ding"},{"@pid":"90/7625","text":"Xiaoliang Chen"},{"@pid":"86/241","text":"Peng Lu"},{"@pid":"359/5191","text":"Zaiyan Yang"},{"@pid":"135/7788","text":"Xianyong Li"},{"@pid":"70/1320","text":"Yajun Du"}]},"title":"DialogueINAB: an interaction neural network based on attitudes and behaviors of interlocutors for dialogue emotion recognition.","venue":"J. Supercomput.","volume":"79","number":"18","pages":"20481-20514","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/DingCLYLD23","doi":"10.1007/S11227-023-05439-1","ee":"https://doi.org/10.1007/s11227-023-05439-1","url":"https://dblp.org/rec/journals/tjs/DingCLYLD23"}, "url":"URL#248353" }, { "@score":"1", "@id":"248354", "info":{"authors":{"author":[{"@pid":"341/0926","text":"Xiaoyao Ding"},{"@pid":"67/4904","text":"Gang Zhou"},{"@pid":"77/10934","text":"Jicang Lu"},{"@pid":"341/0867","text":"Taojie Zhu"}]},"title":"CLGR-Net: a collaborative local-global reasoning network for document-level relation extraction.","venue":"J. Supercomput.","volume":"79","number":"5","pages":"5469-5485","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/DingZLZ23","doi":"10.1007/S11227-022-04875-9","ee":"https://doi.org/10.1007/s11227-022-04875-9","url":"https://dblp.org/rec/journals/tjs/DingZLZ23"}, "url":"URL#248354" }, { "@score":"1", "@id":"248355", "info":{"authors":{"author":[{"@pid":"332/6025","text":"S. Haleh S. Dizaji"},{"@pid":"119/5911","text":"Saeid Pashazadeh"},{"@pid":"132/4204","text":"Javad Musevi Niya"}]},"title":"Wasserstein generative adversarial networks for modeling marked events.","venue":"J. Supercomput.","volume":"79","number":"3","pages":"2961-2983","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/DizajiPN23","doi":"10.1007/S11227-022-04781-0","ee":"https://doi.org/10.1007/s11227-022-04781-0","url":"https://dblp.org/rec/journals/tjs/DizajiPN23"}, "url":"URL#248355" }, { "@score":"1", "@id":"248356", "info":{"authors":{"author":[{"@pid":"163/6448","text":"Cong Thuan Do"},{"@pid":"31/4577","text":"Cheol Hong Kim"},{"@pid":"46/2413","text":"Sung Woo Chung"}]},"title":"Aggressive GPU cache bypassing with monolithic 3D-based NoC.","venue":"J. Supercomput.","volume":"79","number":"5","pages":"5421-5442","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/DoKC23","doi":"10.1007/S11227-022-04878-6","ee":"https://doi.org/10.1007/s11227-022-04878-6","url":"https://dblp.org/rec/journals/tjs/DoKC23"}, "url":"URL#248356" }, { "@score":"1", "@id":"248357", "info":{"authors":{"author":[{"@pid":"163/6448","text":"Cong Thuan Do"},{"@pid":"31/4577","text":"Cheol Hong Kim"},{"@pid":"46/2413","text":"Sung Woo Chung"}]},"title":"Correction to: Aggressive GPU cache bypassing with monolithic 3D-based NoC.","venue":"J. Supercomput.","volume":"79","number":"6","pages":"7061","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/DoKC23a","doi":"10.1007/S11227-022-04917-2","ee":"https://doi.org/10.1007/s11227-022-04917-2","url":"https://dblp.org/rec/journals/tjs/DoKC23a"}, "url":"URL#248357" }, { "@score":"1", "@id":"248358", "info":{"authors":{"author":[{"@pid":"350/4502","text":"Thi Van Thao Doan"},{"@pid":"20/9245","text":"Mohamed-Lamine Messai"},{"@pid":"15/5059","text":"Gérald Gavin"},{"@pid":"d/JeromeDarmont","text":"Jérôme Darmont"}]},"title":"A survey on implementations of homomorphic encryption schemes.","venue":"J. Supercomput.","volume":"79","number":"13","pages":"15098-15139","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/DoanMGD23","doi":"10.1007/S11227-023-05233-Z","ee":"https://doi.org/10.1007/s11227-023-05233-z","url":"https://dblp.org/rec/journals/tjs/DoanMGD23"}, "url":"URL#248358" }, { "@score":"1", "@id":"248359", "info":{"authors":{"author":[{"@pid":"336/0858","text":"Javad Dogani"},{"@pid":"91/6142","text":"Farshad Khunjush"},{"@pid":"219/3701","text":"Mohammad Reza Mahmoudi"},{"@pid":"336/0715","text":"Mehdi Seydali"}]},"title":"Multivariate workload and resource prediction in cloud computing using CNN and GRU by attention mechanism.","venue":"J. Supercomput.","volume":"79","number":"3","pages":"3437-3470","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/DoganiKMS23","doi":"10.1007/S11227-022-04782-Z","ee":"https://doi.org/10.1007/s11227-022-04782-z","url":"https://dblp.org/rec/journals/tjs/DoganiKMS23"}, "url":"URL#248359" }, { "@score":"1", "@id":"248360", "info":{"authors":{"author":[{"@pid":"88/7977","text":"Manuel F. Dolz"},{"@pid":"b/SergioBarrachina","text":"Sergio Barrachina 0001"},{"@pid":"40/9854","text":"Héctor Martínez"},{"@pid":"154/7966","text":"Adrián Castelló 0001"},{"@pid":"v/AntonioMVidal","text":"Antonio-Manuel Vidal-Maciá"},{"@pid":"15/1803","text":"Germán Fabregat"},{"@pid":"118/5331","text":"Andrés E. Tomás"}]},"title":"Performance-energy trade-offs of deep learning convolution algorithms on ARM processors.","venue":"J. Supercomput.","volume":"79","number":"9","pages":"9819-9836","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/DolzBMCVFT23","doi":"10.1007/S11227-023-05050-4","ee":"https://doi.org/10.1007/s11227-023-05050-4","url":"https://dblp.org/rec/journals/tjs/DolzBMCVFT23"}, "url":"URL#248360" }, { "@score":"1", "@id":"248361", "info":{"authors":{"author":[{"@pid":"88/7977","text":"Manuel F. Dolz"},{"@pid":"40/9854","text":"Héctor Martínez"},{"@pid":"154/7966","text":"Adrián Castelló 0001"},{"@pid":"89/8296","text":"Pedro Alonso-Jordá"},{"@pid":"27/786","text":"Enrique S. Quintana-Ortí"}]},"title":"Efficient and portable Winograd convolutions for multi-core processors.","venue":"J. Supercomput.","volume":"79","number":"10","pages":"10589-10610","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/DolzMCAQ23","doi":"10.1007/S11227-023-05088-4","ee":"https://doi.org/10.1007/s11227-023-05088-4","url":"https://dblp.org/rec/journals/tjs/DolzMCAQ23"}, "url":"URL#248361" }, { "@score":"1", "@id":"248362", "info":{"authors":{"author":[{"@pid":"209/6950","text":"Daniel Di Domenico"},{"@pid":"98/8779","text":"João V. F. Lima"},{"@pid":"c/GGHCavalheiro","text":"Gerson G. H. Cavalheiro"}]},"title":"NAS Parallel Benchmarks with Python: a performance and programming effort analysis focusing on GPUs.","venue":"J. Supercomput.","volume":"79","number":"8","pages":"8890-8911","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/DomenicoLC23","doi":"10.1007/S11227-022-04932-3","ee":"https://doi.org/10.1007/s11227-022-04932-3","url":"https://dblp.org/rec/journals/tjs/DomenicoLC23"}, "url":"URL#248362" }, { "@score":"1", "@id":"248363", "info":{"authors":{"author":[{"@pid":"46/4155","text":"Dong Dong"},{"@pid":"85/8167","text":"Hongxu Jiang"},{"@pid":"356/2035","text":"Hanqun Lin"},{"@pid":"25/11539","text":"Yanfei Song"}]},"title":"PCGC: a performance compact graph compiler based on multilevel fusion-splitting rules.","venue":"J. Supercomput.","volume":"79","number":"15","pages":"17419-17444","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/DongJLS23","doi":"10.1007/S11227-023-05298-W","ee":"https://doi.org/10.1007/s11227-023-05298-w","url":"https://dblp.org/rec/journals/tjs/DongJLS23"}, "url":"URL#248363" }, { "@score":"1", "@id":"248364", "info":{"authors":{"author":[{"@pid":"348/0878","text":"Yongchuan Dong"},{"@pid":"23/10300","text":"Qiaosha Zou"},{"@pid":"205/4088","text":"Chuanjin Richard Shi"}]},"title":"Augmenting aspect-level sentiment classification with distance-related local context input.","venue":"J. Supercomput.","volume":"79","number":"10","pages":"11198-11217","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/DongZS23","doi":"10.1007/S11227-023-05108-3","ee":"https://doi.org/10.1007/s11227-023-05108-3","url":"https://dblp.org/rec/journals/tjs/DongZS23"}, "url":"URL#248364" }, { "@score":"1", "@id":"248365", "info":{"authors":{"author":[{"@pid":"d/YumingDong","text":"Yumin Dong"},{"@pid":"357/4849","text":"Yongfu Zha"},{"@pid":"53/3451","text":"Yongjian Zhang"},{"@pid":"357/4677","text":"Xinji Zha"}]},"title":"Long- and short-term collaborative attention networks for sequential recommendation.","venue":"J. Supercomput.","volume":"79","number":"16","pages":"18375-18393","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/DongZZZ23","doi":"10.1007/S11227-023-05348-3","ee":"https://doi.org/10.1007/s11227-023-05348-3","url":"https://dblp.org/rec/journals/tjs/DongZZZ23"}, "url":"URL#248365" }, { "@score":"1", "@id":"248366", "info":{"authors":{"author":[{"@pid":"333/3349","text":"Maryam Douiba"},{"@pid":"09/10879","text":"Said Benkirane"},{"@pid":"199/5134","text":"Azidine Guezzaz"},{"@pid":"199/5113","text":"Mourade Azrour"}]},"title":"An improved anomaly detection model for IoT security using decision tree and gradient boosting.","venue":"J. Supercomput.","volume":"79","number":"3","pages":"3392-3411","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/DouibaBGA23","doi":"10.1007/S11227-022-04783-Y","ee":"https://doi.org/10.1007/s11227-022-04783-y","url":"https://dblp.org/rec/journals/tjs/DouibaBGA23"}, "url":"URL#248366" }, { "@score":"1", "@id":"248367", "info":{"authors":{"author":[{"@pid":"145/4226","text":"Xiaoyu Du"},{"@pid":"66/332","text":"Cheng Cheng"},{"@pid":"116/7911","text":"Zhijie Han 0001"},{"@pid":"202/3794","text":"Weibei Fan"},{"@pid":"03/2902","text":"Shuai Ding"}]},"title":"Hamiltonian properties of HCN and BCN networks.","venue":"J. Supercomput.","volume":"79","number":"2","pages":"1622-1653","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/DuCHFD23","doi":"10.1007/S11227-022-04723-W","ee":"https://doi.org/10.1007/s11227-022-04723-w","url":"https://dblp.org/rec/journals/tjs/DuCHFD23"}, "url":"URL#248367" }, { "@score":"1", "@id":"248368", "info":{"authors":{"author":[{"@pid":"78/105","text":"Ming Du"},{"@pid":"359/5369","text":"Wanting Ma"},{"@pid":"287/5998","text":"Yuting Tan"},{"@pid":"45/3793","text":"Junfeng Zhou"}]},"title":"Continuous community search with attribute constraints in temporal graphs.","venue":"J. Supercomput.","volume":"79","number":"18","pages":"21089-21115","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/DuMTZ23","doi":"10.1007/S11227-023-05451-5","ee":"https://doi.org/10.1007/s11227-023-05451-5","url":"https://dblp.org/rec/journals/tjs/DuMTZ23"}, "url":"URL#248368" }, { "@score":"1", "@id":"248369", "info":{"authors":{"author":[{"@pid":"54/6951","text":"Hossein Ebrahimpour"},{"@pid":"151/0072","text":"Mehrdad Ashtiani"},{"@pid":"349/3259","text":"Fatemeh Bakhshi"},{"@pid":"349/3068","text":"Ghazaleh Bakhtiariazad"}]},"title":"A heuristic-based package-aware function scheduling approach for creating a trade-off between cold start time and cost in FaaS computing environments.","venue":"J. Supercomput.","volume":"79","number":"11","pages":"12142-12190","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/EbrahimpourABB23","doi":"10.1007/S11227-023-05128-Z","ee":"https://doi.org/10.1007/s11227-023-05128-z","url":"https://dblp.org/rec/journals/tjs/EbrahimpourABB23"}, "url":"URL#248369" }, { "@score":"1", "@id":"248370", "info":{"authors":{"author":[{"@pid":"17/4747","text":"Erol Egrioglu"},{"@pid":"30/6047","text":"Crina Grosan"},{"@pid":"143/2734","text":"Eren Bas"}]},"title":"A new genetic algorithm method based on statistical-based replacement for the training of multiplicative neuron model artificial neural networks.","venue":"J. Supercomput.","volume":"79","number":"7","pages":"7286-7304","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/EgriogluGB23","doi":"10.1007/S11227-022-04935-0","ee":"https://doi.org/10.1007/s11227-022-04935-0","url":"https://dblp.org/rec/journals/tjs/EgriogluGB23"}, "url":"URL#248370" }, { "@score":"1", "@id":"248371", "info":{"authors":{"author":[{"@pid":"229/8333","text":"Somaya A. El-Feshawy"},{"@pid":"97/1189","text":"Waleed Saad"},{"@pid":"16/2506","text":"Mona Shokair"},{"@pid":"76/2326","text":"Moawad I. Dessouky"}]},"title":"IoT framework for brain tumor detection based on optimized modified ResNet 18 (OMRES).","venue":"J. Supercomput.","volume":"79","number":"1","pages":"1081-1110","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/El-FeshawySSD23","doi":"10.1007/S11227-022-04678-Y","ee":"https://doi.org/10.1007/s11227-022-04678-y","url":"https://dblp.org/rec/journals/tjs/El-FeshawySSD23"}, "url":"URL#248371" }, { "@score":"1", "@id":"248372", "info":{"authors":{"author":[{"@pid":"294/9029","text":"Bahaa Eddine Elbaghazaoui"},{"@pid":"13/9885","text":"Mohamed Amnai"},{"@pid":"43/8654","text":"Youssef Fakhri"}]},"title":"Predicting the next word using the Markov chain model according to profiling personality.","venue":"J. Supercomput.","volume":"79","number":"11","pages":"12126-12141","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ElbaghazaouiAF23","doi":"10.1007/S11227-023-05125-2","ee":"https://doi.org/10.1007/s11227-023-05125-2","url":"https://dblp.org/rec/journals/tjs/ElbaghazaouiAF23"}, "url":"URL#248372" }, { "@score":"1", "@id":"248373", "info":{"authors":{"author":[{"@pid":"216/4332","text":"Islam Elleuch"},{"@pid":"14/3937","text":"Achraf Makni"},{"@pid":"49/3001","text":"Rafik Bouaziz"}]},"title":"CICAPS: a cooperative intersection collision avoidance persistent system for cooperative intersection ADAS.","venue":"J. Supercomput.","volume":"79","number":"6","pages":"6087-6114","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ElleuchMB23","doi":"10.1007/S11227-022-04849-X","ee":"https://doi.org/10.1007/s11227-022-04849-x","url":"https://dblp.org/rec/journals/tjs/ElleuchMB23"}, "url":"URL#248373" }, { "@score":"1", "@id":"248374", "info":{"authors":{"author":[{"@pid":"350/4132","text":"Omar Elnakib"},{"@pid":"07/8036","text":"Eman Shaaban"},{"@pid":"64/2149","text":"Mohamed Mahmoud"},{"@pid":"23/7464","text":"Karim Emara"}]},"title":"EIDM: deep learning model for IoT intrusion detection systems.","venue":"J. Supercomput.","volume":"79","number":"12","pages":"13241-13261","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/ElnakibSME23","doi":"10.1007/S11227-023-05197-0","ee":"https://doi.org/10.1007/s11227-023-05197-0","url":"https://dblp.org/rec/journals/tjs/ElnakibSME23"}, "url":"URL#248374" }, { "@score":"1", "@id":"248375", "info":{"authors":{"author":[{"@pid":"148/6393","text":"Eman M. Elshahed"},{"@pid":"174/7978","text":"Randa M. Abdelmoneem"},{"@pid":"07/8036","text":"Eman Shaaban"},{"@pid":"148/6301","text":"Hayam A. Elzahed"},{"@pid":"148/6226","text":"Shahinaz M. Al-Tabbakh"}]},"title":"Prioritized scheduling technique for healthcare tasks in cloud computing.","venue":"J. Supercomput.","volume":"79","number":"5","pages":"4895-4916","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/ElshahedASEA23","doi":"10.1007/S11227-022-04823-7","ee":"https://doi.org/10.1007/s11227-022-04823-7","url":"https://dblp.org/rec/journals/tjs/ElshahedASEA23"}, "url":"URL#248375" }, { "@score":"1", "@id":"248376", "info":{"authors":{"author":[{"@pid":"334/9710","text":"Ahmed A. Elsway"},{"@pid":"72/5176","text":"Ahmed M. Khedr"},{"@pid":"279/5750","text":"Oruba Alfawaz"},{"@pid":"23/2859","text":"Walid Osamy"}]},"title":"Energy-aware disjoint dominating sets-based whale optimization algorithm for data collection in WSNs.","venue":"J. Supercomput.","volume":"79","number":"4","pages":"4318-4350","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ElswayKAO23","doi":"10.1007/S11227-022-04814-8","ee":"https://doi.org/10.1007/s11227-022-04814-8","url":"https://dblp.org/rec/journals/tjs/ElswayKAO23"}, "url":"URL#248376" }, { "@score":"1", "@id":"248377", "info":{"authors":{"author":[{"@pid":"356/2009","text":"Demyana Emil"},{"@pid":"356/2062","text":"Mohammed Hamdy"},{"@pid":"312/0286","text":"Gihan Nagib"}]},"title":"Development an efficient AXI-interconnect unit between set of customized peripheral devices and an implemented dual-core RISC-V processor.","venue":"J. Supercomput.","volume":"79","number":"15","pages":"17000-17019","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/EmilHN23","doi":"10.1007/S11227-023-05304-1","ee":"https://doi.org/10.1007/s11227-023-05304-1","url":"https://dblp.org/rec/journals/tjs/EmilHN23"}, "url":"URL#248377" }, { "@score":"1", "@id":"248378", "info":{"authors":{"author":[{"@pid":"350/4390","text":"Hosein Eskandari"},{"@pid":"143/0083","text":"Maryam Imani"},{"@pid":"65/10931","text":"Mohsen Parsa Moghaddam"}]},"title":"Best-tree wavelet packet transform bidirectional GRU for short-term load forecasting.","venue":"J. Supercomput.","volume":"79","number":"12","pages":"13545-13577","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/EskandariIM23","doi":"10.1007/S11227-023-05193-4","ee":"https://doi.org/10.1007/s11227-023-05193-4","url":"https://dblp.org/rec/journals/tjs/EskandariIM23"}, "url":"URL#248378" }, { "@score":"1", "@id":"248379", "info":{"authors":{"author":[{"@pid":"157/5752","text":"Rasool Esmaeilyfard"},{"@pid":"341/0757","text":"Mahsa Moghisi"}]},"title":"An incentive mechanism design for multitask and multipublisher mobile crowdsensing environment.","venue":"J. Supercomput.","volume":"79","number":"5","pages":"5248-5275","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/EsmaeilyfardM23","doi":"10.1007/S11227-022-04852-2","ee":"https://doi.org/10.1007/s11227-022-04852-2","url":"https://dblp.org/rec/journals/tjs/EsmaeilyfardM23"}, "url":"URL#248379" }, { "@score":"1", "@id":"248380", "info":{"authors":{"author":[{"@pid":"338/5963","text":"Amir Etefaghi"},{"@pid":"63/4264","text":"Saeed Sharifian"}]},"title":"AdaInNet: an adaptive inference engine for distributed deep neural networks offloading in IoT-FOG applications based on reinforcement learning.","venue":"J. Supercomput.","volume":"79","number":"2","pages":"1592-1621","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/EtefaghiS23","doi":"10.1007/S11227-022-04728-5","ee":"https://doi.org/10.1007/s11227-022-04728-5","url":"https://dblp.org/rec/journals/tjs/EtefaghiS23"}, "url":"URL#248380" }, { "@score":"1", "@id":"248381", "info":{"authors":{"author":[{"@pid":"121/3969","text":"Fairouz Fakhfakh"},{"@pid":"53/10598","text":"Saoussen Cheikhrouhou"},{"@pid":"152/8963","text":"Bouthaina Dammak"},{"@pid":"123/9190","text":"Monia Hamdi"},{"@pid":"133/3985","text":"Mouna Rekik 0001"}]},"title":"Multi-objective approach for scheduling time-aware business processes in cloud-fog environment.","venue":"J. Supercomput.","volume":"79","number":"8","pages":"8153-8177","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/FakhfakhCDHR23","doi":"10.1007/S11227-022-04690-2","ee":"https://doi.org/10.1007/s11227-022-04690-2","url":"https://dblp.org/rec/journals/tjs/FakhfakhCDHR23"}, "url":"URL#248381" }, { "@score":"1", "@id":"248382", "info":{"authors":{"author":[{"@pid":"121/3969","text":"Fairouz Fakhfakh"},{"@pid":"53/10598","text":"Saoussen Cheikhrouhou"},{"@pid":"152/8963","text":"Bouthaina Dammak"},{"@pid":"123/9190","text":"Monia Hamdi"},{"@pid":"133/3985","text":"Mouna Rekik 0001"}]},"title":"Correction to: Multi-objective approach for scheduling time-aware business processes in cloud-fog environment.","venue":"J. Supercomput.","volume":"79","number":"8","pages":"9367","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/FakhfakhCDHR23a","doi":"10.1007/S11227-022-04905-6","ee":"https://doi.org/10.1007/s11227-022-04905-6","url":"https://dblp.org/rec/journals/tjs/FakhfakhCDHR23a"}, "url":"URL#248382" }, { "@score":"1", "@id":"248383", "info":{"authors":{"author":[{"@pid":"334/1621","text":"Wenguang Fan"},{"@pid":"59/9610","text":"Bahman Arasteh"},{"@pid":"41/7213","text":"Asgarali Bouyer"},{"@pid":"126/4813","text":"Vahid Majidnezhad"}]},"title":"A divide and conquer based development of gray wolf optimizer and its application in data replication problem in distributed systems.","venue":"J. Supercomput.","volume":"79","number":"17","pages":"19396-19430","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/FanABM23","doi":"10.1007/S11227-023-05401-1","ee":"https://doi.org/10.1007/s11227-023-05401-1","url":"https://dblp.org/rec/journals/tjs/FanABM23"}, "url":"URL#248383" }, { "@score":"1", "@id":"248384", "info":{"authors":{"author":[{"@pid":"69/5289","text":"Juan Fang"},{"@pid":"170/5778","text":"Yixiang Xu"},{"@pid":"250/1091","text":"Han Kong"},{"@pid":"87/5549","text":"Min Cai"}]},"title":"A prefetch control strategy based on improved hill-climbing method in asymmetric multi-core architecture.","venue":"J. Supercomput.","volume":"79","number":"10","pages":"10570-10588","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/FangXKC23","doi":"10.1007/S11227-023-05078-6","ee":"https://doi.org/10.1007/s11227-023-05078-6","url":"https://dblp.org/rec/journals/tjs/FangXKC23"}, "url":"URL#248384" }, { "@score":"1", "@id":"248385", "info":{"authors":{"author":[{"@pid":"69/5289","text":"Juan Fang"},{"@pid":"324/3518","text":"Li'ang Zhao"},{"@pid":"87/5549","text":"Min Cai"},{"@pid":"120/1181","text":"Huijing Yang"}]},"title":"WSMP: a warp scheduling strategy based on MFQ and PPF.","venue":"J. Supercomput.","volume":"79","number":"11","pages":"12317-12340","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/FangZCY23","doi":"10.1007/S11227-023-05127-0","ee":"https://doi.org/10.1007/s11227-023-05127-0","url":"https://dblp.org/rec/journals/tjs/FangZCY23"}, "url":"URL#248385" }, { "@score":"1", "@id":"248386", "info":{"authors":{"author":[{"@pid":"292/8806","text":"Youssef Faqir-Rhazoui"},{"@pid":"21/5403-1","text":"Carlos García 0001"}]},"title":"Exploring the performance and portability of the k-means algorithm on SYCL across CPU and GPU architectures.","venue":"J. Supercomput.","volume":"79","number":"16","pages":"18480-18506","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/FaqirRhazouiG23","doi":"10.1007/S11227-023-05373-2","ee":"https://doi.org/10.1007/s11227-023-05373-2","url":"https://dblp.org/rec/journals/tjs/FaqirRhazouiG23"}, "url":"URL#248386" }, { "@score":"1", "@id":"248387", "info":{"authors":{"author":[{"@pid":"77/5196","text":"Shuai Feng"},{"@pid":"183/5512","text":"Huaming Qian"},{"@pid":"77/2589","text":"Huilin Wang"}]},"title":"A deep feature matching pipeline with triple search strategy.","venue":"J. Supercomput.","volume":"79","number":"18","pages":"20878-20898","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/FengQW23","doi":"10.1007/S11227-023-05418-6","ee":"https://doi.org/10.1007/s11227-023-05418-6","url":"https://dblp.org/rec/journals/tjs/FengQW23"}, "url":"URL#248387" }, { "@score":"1", "@id":"248388", "info":{"authors":{"author":[{"@pid":"320/1950","text":"Jinxiang Feng"},{"@pid":"37/5126","text":"Jie Xu"},{"@pid":"358/1735","text":"Yizhi Deng"},{"@pid":"82/4977","text":"Jun Gao"}]},"title":"A Fechner multiscale local descriptor for face recognition.","venue":"J. Supercomput.","volume":"79","number":"17","pages":"19671-19698","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/FengXDG23","doi":"10.1007/S11227-023-05421-X","ee":"https://doi.org/10.1007/s11227-023-05421-x","url":"https://dblp.org/rec/journals/tjs/FengXDG23"}, "url":"URL#248388" }, { "@score":"1", "@id":"248389", "info":{"authors":{"author":[{"@pid":"198/7341","text":"Pengbin Feng"},{"@pid":"09/3925","text":"Li Yang"},{"@pid":"70/5794","text":"Di Lu"},{"@pid":"84/5683-2","text":"Ning Xi 0002"},{"@pid":"12/6604-1","text":"Jian-Feng Ma 0001"}]},"title":"BejaGNN: behavior-based Java malware detection via graph neural network.","venue":"J. Supercomput.","volume":"79","number":"14","pages":"15390-15414","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/FengYLXM23","doi":"10.1007/S11227-023-05243-X","ee":"https://doi.org/10.1007/s11227-023-05243-x","url":"https://dblp.org/rec/journals/tjs/FengYLXM23"}, "url":"URL#248389" }, { "@score":"1", "@id":"248390", "info":{"authors":{"author":[{"@pid":"98/7666","text":"Junhong Feng"},{"@pid":"84/6889-72","text":"Jie Zhang 0072"},{"@pid":"62/7808","text":"Xiaoshu Zhu"},{"@pid":"35/8546","text":"Jian-Hong Wang"}]},"title":"Gene selection and clustering of single-cell data based on Fisher score and genetic algorithm.","venue":"J. Supercomput.","volume":"79","number":"7","pages":"7067-7093","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/FengZZW23","doi":"10.1007/S11227-022-04920-7","ee":"https://doi.org/10.1007/s11227-022-04920-7","url":"https://dblp.org/rec/journals/tjs/FengZZW23"}, "url":"URL#248390" }, { "@score":"1", "@id":"248391", "info":{"authors":{"author":[{"@pid":"348/0791","text":"Antonio M. Fernández-Gómez"},{"@pid":"59/10351","text":"David Gutiérrez-Avilés"},{"@pid":"87/240","text":"Alicia Troncoso"},{"@pid":"31/2102","text":"Francisco Martínez-Álvarez"}]},"title":"A new Apache Spark-based framework for big data streaming forecasting in IoT networks.","venue":"J. Supercomput.","volume":"79","number":"10","pages":"11078-11100","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/FernandezGomezGTM23","doi":"10.1007/S11227-023-05100-X","ee":"https://doi.org/10.1007/s11227-023-05100-x","url":"https://dblp.org/rec/journals/tjs/FernandezGomezGTM23"}, "url":"URL#248391" }, { "@score":"1", "@id":"248392", "info":{"authors":{"author":[{"@pid":"207/0771","text":"Marjan Firouznia"},{"@pid":"28/7719","text":"Pietro Ruiu"},{"@pid":"97/2638","text":"Giuseppe A. Trunfio"}]},"title":"Adaptive cooperative coevolutionary differential evolution for parallel feature selection in high-dimensional datasets.","venue":"J. Supercomput.","volume":"79","number":"14","pages":"15215-15244","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/FirouzniaRT23","doi":"10.1007/S11227-023-05226-Y","ee":"https://doi.org/10.1007/s11227-023-05226-y","url":"https://dblp.org/rec/journals/tjs/FirouzniaRT23"}, "url":"URL#248392" }, { "@score":"1", "@id":"248393", "info":{"authors":{"author":[{"@pid":"f/GianluigiFolino","text":"Gianluigi Folino"},{"@pid":"318/4461","text":"Carla Otranto Godano"},{"@pid":"126/7860","text":"Francesco Sergio Pisani"}]},"title":"An ensemble-based framework for user behaviour anomaly detection and classification for cybersecurity.","venue":"J. Supercomput.","volume":"79","number":"11","pages":"11660-11683","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/FolinoGP23","doi":"10.1007/S11227-023-05049-X","ee":"https://doi.org/10.1007/s11227-023-05049-x","url":"https://dblp.org/rec/journals/tjs/FolinoGP23"}, "url":"URL#248393" }, { "@score":"1", "@id":"248394", "info":{"authors":{"author":[{"@pid":"303/7427","text":"Manuel Freire 0002"},{"@pid":"350/3832","text":"Juan Ferrand"},{"@pid":"336/0125","text":"Franco Seveso"},{"@pid":"132/7493","text":"Ernesto Dufrechou"},{"@pid":"71/8239","text":"Pablo Ezzatti"}]},"title":"A GPU method for the analysis stage of the SPTRSV kernel.","venue":"J. Supercomput.","volume":"79","number":"13","pages":"15051-15078","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/FreireFSDE23","doi":"10.1007/S11227-023-05238-8","ee":"https://doi.org/10.1007/s11227-023-05238-8","url":"https://dblp.org/rec/journals/tjs/FreireFSDE23"}, "url":"URL#248394" }, { "@score":"1", "@id":"248395", "info":{"authors":{"author":[{"@pid":"68/6751","text":"Weihong Fu"},{"@pid":"79/5815","text":"Yue Chen"}]},"title":"Parameters estimation method and ISAR imaging of multi-target with complex maneuvering.","venue":"J. Supercomput.","volume":"79","number":"12","pages":"13839-13863","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/FuC23","doi":"10.1007/S11227-023-05188-1","ee":"https://doi.org/10.1007/s11227-023-05188-1","url":"https://dblp.org/rec/journals/tjs/FuC23"}, "url":"URL#248395" }, { "@score":"1", "@id":"248396", "info":{"authors":{"author":[{"@pid":"80/2780","text":"Wenlong Fu"},{"@pid":"87/3144","text":"Xing Liu"},{"@pid":"258/7505","text":"Fanwu Chu"},{"@pid":"47/5998","text":"Bailin Li"},{"@pid":"273/2526","text":"Jiahao Gu"}]},"title":"A disassembly sequence planning method with improved discrete grey wolf optimizer for equipment maintenance in hydropower station.","venue":"J. Supercomput.","volume":"79","number":"4","pages":"4351-4382","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/FuLCLG23","doi":"10.1007/S11227-022-04822-8","ee":"https://doi.org/10.1007/s11227-022-04822-8","url":"https://dblp.org/rec/journals/tjs/FuLCLG23"}, "url":"URL#248396" }, { "@score":"1", "@id":"248397", "info":{"authors":{"author":[{"@pid":"302/1237","text":"Yiyang Fu"},{"@pid":"26/6923","text":"Xiaojun Xie"},{"@pid":"15/4777-10","text":"Tao Zhang 0010"}]},"title":"MRAN: a attention-based approach for social recommendation.","venue":"J. Supercomput.","volume":"79","number":"8","pages":"8295-8321","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/FuXZ23","doi":"10.1007/S11227-022-04985-4","ee":"https://doi.org/10.1007/s11227-022-04985-4","url":"https://dblp.org/rec/journals/tjs/FuXZ23"}, "url":"URL#248397" }, { "@score":"1", "@id":"248398", "info":{"authors":{"author":[{"@pid":"163/4139","text":"Antonio Fuentes-Alventosa"},{"@pid":"28/7411","text":"Juan Gómez-Luna"},{"@pid":"73/2679","text":"Rafael Medina Carnicer"}]},"title":"GVLE: a highly optimized GPU-based implementation of variable-length encoding.","venue":"J. Supercomput.","volume":"79","number":"8","pages":"8447-8474","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/FuentesAlventosaGC23","doi":"10.1007/S11227-022-04994-3","ee":"https://doi.org/10.1007/s11227-022-04994-3","url":"https://dblp.org/rec/journals/tjs/FuentesAlventosaGC23"}, "url":"URL#248398" }, { "@score":"1", "@id":"248399", "info":{"authors":{"author":[{"@pid":"07/1653","text":"Wlodzimierz Funika"},{"@pid":"116/7063","text":"Pawel Koperek"},{"@pid":"31/6823","text":"Jacek Kitowski"}]},"title":"Automated cloud resources provisioning with the use of the proximal policy optimization.","venue":"J. Supercomput.","volume":"79","number":"6","pages":"6674-6704","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/FunikaKK23","doi":"10.1007/S11227-022-04924-3","ee":"https://doi.org/10.1007/s11227-022-04924-3","url":"https://dblp.org/rec/journals/tjs/FunikaKK23"}, "url":"URL#248399" }, { "@score":"1", "@id":"248400", "info":{"authors":{"author":[{"@pid":"358/1976","text":"Venkata Datta Adithya Gadhamsetty"},{"@pid":"193/0179","text":"Rohit Kumar Das"}]},"title":"ASM-SDN: an automated station migration system in cluster-based heterogeneous software-defined network.","venue":"J. Supercomput.","volume":"79","number":"17","pages":"18993-19018","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/GadhamsettyD23","doi":"10.1007/S11227-023-05392-Z","ee":"https://doi.org/10.1007/s11227-023-05392-z","url":"https://dblp.org/rec/journals/tjs/GadhamsettyD23"}, "url":"URL#248400" }, { "@score":"1", "@id":"248401", "info":{"authors":{"author":[{"@pid":"00/6513","text":"Shuang Gao"},{"@pid":"244/3271","text":"Kaiwei Ma"},{"@pid":"89/4402","text":"Yang Gao"},{"@pid":"304/4416","text":"Zhenjiang Jiang"},{"@pid":"75/6206","text":"Xin Shen"},{"@pid":"233/4675","text":"Mingxing Yang"},{"@pid":"57/8667","text":"Fengyu Xu"}]},"title":"Combined compensation method of robot kinematics error based on MRIPN-IMA.","venue":"J. Supercomput.","volume":"79","number":"12","pages":"12924-12948","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/GaoMGJSYX23","doi":"10.1007/S11227-023-05177-4","ee":"https://doi.org/10.1007/s11227-023-05177-4","url":"https://dblp.org/rec/journals/tjs/GaoMGJSYX23"}, "url":"URL#248401" }, { "@score":"1", "@id":"248402", "info":{"authors":{"author":[{"@pid":"194/0634","text":"Jinsheng Gao"},{"@pid":"09/4144","text":"Xiaomin Zhu"},{"@pid":"78/1350","text":"Runtong Zhang"}]},"title":"Optimization of parallel test task scheduling with constraint satisfaction.","venue":"J. Supercomput.","volume":"79","number":"7","pages":"7206-7227","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/GaoZZ23","doi":"10.1007/S11227-022-04943-0","ee":"https://doi.org/10.1007/s11227-022-04943-0","url":"https://dblp.org/rec/journals/tjs/GaoZZ23"}, "url":"URL#248402" }, { "@score":"1", "@id":"248403", "info":{"authors":{"author":[{"@pid":"237/7420","text":"Adriano Marques Garcia"},{"@pid":"135/0603","text":"Dalvan Griebler"},{"@pid":"79/5559","text":"Claudio Schepke"},{"@pid":"f/LuizGustavoFernandes","text":"Luiz Gustavo Fernandes"}]},"title":"Micro-batch and data frequency for stream processing on multi-cores.","venue":"J. Supercomput.","volume":"79","number":"8","pages":"9206-9244","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/GarciaGSF23","doi":"10.1007/S11227-022-05024-Y","ee":"https://doi.org/10.1007/s11227-022-05024-y","url":"https://dblp.org/rec/journals/tjs/GarciaGSF23"}, "url":"URL#248403" }, { "@score":"1", "@id":"248404", "info":{"authors":{"author":[{"@pid":"90/2350","text":"Víctor M. García-Molla"},{"@pid":"89/8296","text":"Pedro Alonso-Jordá"}]},"title":"Parallel border tracking in binary images for multicore computers.","venue":"J. Supercomput.","volume":"79","number":"9","pages":"9915-9931","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/GarciaMollaA23","doi":"10.1007/S11227-023-05052-2","ee":"https://doi.org/10.1007/s11227-023-05052-2","url":"https://dblp.org/rec/journals/tjs/GarciaMollaA23"}, "url":"URL#248404" }, { "@score":"1", "@id":"248405", "info":{"authors":{"author":[{"@pid":"344/8489","text":"J.-Luis García-Nava"},{"@pid":"23/2652","text":"Juan J. Flores"},{"@pid":"344/8757","text":"Victor M. Tellez"},{"@pid":"83/4919","text":"Félix Calderón"}]},"title":"Fast training of a transformer for global multi-horizon time series forecasting on tensor processing units.","venue":"J. Supercomput.","volume":"79","number":"8","pages":"8475-8498","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/GarciaNavaFTC23","doi":"10.1007/S11227-022-05009-X","ee":"https://doi.org/10.1007/s11227-022-05009-x","url":"https://dblp.org/rec/journals/tjs/GarciaNavaFTC23"}, "url":"URL#248405" }, { "@score":"1", "@id":"248406", "info":{"authors":{"author":[{"@pid":"346/0170","text":"Jerónimo S. García"},{"@pid":"238/9053","text":"Savíns Puertas-Martín"},{"@pid":"49/7048","text":"Juana López Redondo"},{"@pid":"331/8183","text":"Juan José Moreno"},{"@pid":"20/3186","text":"Pilar M. Ortigosa"}]},"title":"Improving drug discovery through parallelism.","venue":"J. Supercomput.","volume":"79","number":"9","pages":"9538-9557","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/GarciaPRMO23","doi":"10.1007/S11227-022-05014-0","ee":"https://doi.org/10.1007/s11227-022-05014-0","url":"https://dblp.org/rec/journals/tjs/GarciaPRMO23"}, "url":"URL#248406" }, { "@score":"1", "@id":"248407", "info":{"authors":{"author":[{"@pid":"172/8383","text":"Alberto S. Garea"},{"@pid":"35/3570","text":"Dora B. Heras"},{"@pid":"04/501","text":"Francisco Argüello"},{"@pid":"47/622","text":"Begüm Demir"}]},"title":"A hybrid CUDA, OpenMP, and MPI parallel TCA-based domain adaptation for classification of very high-resolution remote sensing images.","venue":"J. Supercomput.","volume":"79","number":"7","pages":"7513-7532","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/GareaHAD23","doi":"10.1007/S11227-022-04961-Y","ee":"https://doi.org/10.1007/s11227-022-04961-y","url":"https://dblp.org/rec/journals/tjs/GareaHAD23"}, "url":"URL#248407" }, { "@score":"1", "@id":"248408", "info":{"authors":{"author":[{"@pid":"332/3296","text":"Aakansha Garg"},{"@pid":"217/3299","text":"Rajeev Arya 0001"},{"@pid":"250/6170","text":"Maheshwari Prasad Singh"}]},"title":"Price elasticity log-log model for cost optimization in D2D underlay mobile edge computing system.","venue":"J. Supercomput.","volume":"79","number":"7","pages":"7094-7131","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/GargAS23","doi":"10.1007/S11227-022-04928-Z","ee":"https://doi.org/10.1007/s11227-022-04928-z","url":"https://dblp.org/rec/journals/tjs/GargAS23"}, "url":"URL#248408" }, { "@score":"1", "@id":"248409", "info":{"authors":{"author":[{"@pid":"77/2220","text":"Adriana Gaudiani"},{"@pid":"88/7891","text":"Alvaro Wong"},{"@pid":"92/4942","text":"Emilio Luque"},{"@pid":"93/1849","text":"Dolores Rexachs"}]},"title":"A computational methodology applied to optimize the performance of a river model under uncertainty conditions.","venue":"J. Supercomput.","volume":"79","number":"5","pages":"4737-4759","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/GaudianiWLR23","doi":"10.1007/S11227-022-04816-6","ee":"https://doi.org/10.1007/s11227-022-04816-6","url":"https://dblp.org/rec/journals/tjs/GaudianiWLR23"}, "url":"URL#248409" }, { "@score":"1", "@id":"248410", "info":{"authors":{"author":[{"@pid":"72/9834","text":"Mohammed Gharib"},{"@pid":"77/8991","text":"MohammadAmin Fazli"}]},"title":"Secure cloud storage with anonymous deduplication using ID-based key management.","venue":"J. Supercomput.","volume":"79","number":"2","pages":"2356-2382","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/GharibF23","doi":"10.1007/S11227-022-04751-6","ee":"https://doi.org/10.1007/s11227-022-04751-6","url":"https://dblp.org/rec/journals/tjs/GharibF23"}, "url":"URL#248410" }, { "@score":"1", "@id":"248411", "info":{"authors":{"author":[{"@pid":"151/5616","text":"Majid Ilchi Ghazaan"},{"@pid":"128/4849","text":"Pedram Ghaderi"},{"@pid":"357/4962","text":"Amirali Rezaeizadeh"}]},"title":"A fast convergence EO-based multi-objective optimization algorithm using archive evolution path and its application to engineering design problems.","venue":"J. Supercomput.","volume":"79","number":"16","pages":"18849-18885","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/GhazaanGR23","doi":"10.1007/S11227-023-05362-5","ee":"https://doi.org/10.1007/s11227-023-05362-5","url":"https://dblp.org/rec/journals/tjs/GhazaanGR23"}, "url":"URL#248411" }, { "@score":"1", "@id":"248412", "info":{"authors":{"author":[{"@pid":"239/5377","text":"Subha Ghosh"},{"@pid":"26/5592","text":"Debashis De"}]},"title":"TARA: weighted majority cooperative game theory-based task assignment and resource allocation in 5G heterogeneous fog network for IoT.","venue":"J. Supercomput.","volume":"79","number":"13","pages":"14633-14683","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/GhoshD23","doi":"10.1007/S11227-023-05228-W","ee":"https://doi.org/10.1007/s11227-023-05228-w","url":"https://dblp.org/rec/journals/tjs/GhoshD23"}, "url":"URL#248412" }, { "@score":"1", "@id":"248413", "info":{"authors":{"author":[{"@pid":"239/5377","text":"Subha Ghosh"},{"@pid":"26/5592","text":"Debashis De"}]},"title":"DewGame: D2D communication enabled dew computing for 5G IoT using coalition formation game.","venue":"J. Supercomput.","volume":"79","number":"15","pages":"16821-16858","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/GhoshD23a","doi":"10.1007/S11227-023-05311-2","ee":"https://doi.org/10.1007/s11227-023-05311-2","url":"https://dblp.org/rec/journals/tjs/GhoshD23a"}, "url":"URL#248413" }, { "@score":"1", "@id":"248414", "info":{"authors":{"author":[{"@pid":"284/3718","text":"Tasneem Ali Ghunaim"},{"@pid":"82/617","text":"Ibrahim Kamel"},{"@pid":"a/ZaherAlAghbari","text":"Zaher Al Aghbari"}]},"title":"Secure kNN query of outsourced spatial data using two-cloud architecture.","venue":"J. Supercomput.","volume":"79","number":"18","pages":"21310-21345","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/GhunaimKA23","doi":"10.1007/S11227-023-05495-7","ee":"https://doi.org/10.1007/s11227-023-05495-7","url":"https://dblp.org/rec/journals/tjs/GhunaimKA23"}, "url":"URL#248414" }, { "@score":"1", "@id":"248415", "info":{"authors":{"author":[{"@pid":"220/6773","text":"Christina Giannoula"},{"@pid":"341/7449","text":"Athanasios Peppas"},{"@pid":"74/3246","text":"Georgios I. Goumas"},{"@pid":"24/4627","text":"Nectarios Koziris"}]},"title":"High-performance and balanced parallel graph coloring on multicore platforms.","venue":"J. Supercomput.","volume":"79","number":"6","pages":"6373-6421","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/GiannoulaPGK23","doi":"10.1007/S11227-022-04894-6","ee":"https://doi.org/10.1007/s11227-022-04894-6","url":"https://dblp.org/rec/journals/tjs/GiannoulaPGK23"}, "url":"URL#248415" }, { "@score":"1", "@id":"248416", "info":{"authors":{"author":[{"@pid":"350/4135","text":"Elham Golrasan"},{"@pid":"49/1302","text":"Marzieh Varposhti"}]},"title":"Probabilistic coverage in mobile directional sensor networks: a game theoretical approach.","venue":"J. Supercomput.","volume":"79","number":"13","pages":"14200-14220","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/GolrasanV23","doi":"10.1007/S11227-023-05231-1","ee":"https://doi.org/10.1007/s11227-023-05231-1","url":"https://dblp.org/rec/journals/tjs/GolrasanV23"}, "url":"URL#248416" }, { "@score":"1", "@id":"248417", "info":{"authors":{"author":[{"@pid":"92/2001","text":"Carlos Gomes"},{"@pid":"63/6029","text":"Meuse Nogueira de O. Junior"},{"@pid":"26/440","text":"Bruno C. S. Nogueira"},{"@pid":"m/PRMartinsMaciel","text":"Paulo R. M. Maciel"},{"@pid":"t/EduardoTavares","text":"Eduardo Tavares"}]},"title":"NoSQL-based storage systems: influence of consistency on performance, availability and energy consumption.","venue":"J. Supercomput.","volume":"79","number":"18","pages":"21424-21448","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/GomesJNMT23","doi":"10.1007/S11227-023-05488-6","ee":"https://doi.org/10.1007/s11227-023-05488-6","url":"https://dblp.org/rec/journals/tjs/GomesJNMT23"}, "url":"URL#248417" }, { "@score":"1", "@id":"248418", "info":{"authors":{"author":[{"@pid":"22/4217","text":"Changqing Gong"},{"@pid":"169/7637","text":"Wanying He"},{"@pid":"12/2633","text":"Ting Wang"},{"@pid":"12/989","text":"Abdullah Gani"},{"@pid":"115/6628","text":"Han Qi"}]},"title":"Dynamic resource allocation scheme for mobile edge computing.","venue":"J. Supercomput.","volume":"79","number":"15","pages":"17187-17207","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/GongHWGQ23","doi":"10.1007/S11227-023-05323-Y","ee":"https://doi.org/10.1007/s11227-023-05323-y","url":"https://dblp.org/rec/journals/tjs/GongHWGQ23"}, "url":"URL#248418" }, { "@score":"1", "@id":"248419", "info":{"authors":{"author":[{"@pid":"99/4318","text":"Hao Gong"},{"@pid":"91/112","text":"Ying Liu"},{"@pid":"59/931","text":"Xiaoying Chen"},{"@pid":"54/2062","text":"Cheng Wang"}]},"title":"Scene optimization of GPU-based back-projection algorithm.","venue":"J. Supercomput.","volume":"79","number":"4","pages":"4192-4214","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/GongLCW23","doi":"10.1007/S11227-022-04785-W","ee":"https://doi.org/10.1007/s11227-022-04785-w","url":"https://dblp.org/rec/journals/tjs/GongLCW23"}, "url":"URL#248419" }, { "@score":"1", "@id":"248420", "info":{"authors":{"author":[{"@pid":"22/4217","text":"Changqing Gong"},{"@pid":"350/4067","text":"Hongsheng Zhu"},{"@pid":"12/989","text":"Abdullah Gani"},{"@pid":"115/6628","text":"Han Qi"}]},"title":"QGA-QGCNN: a model of quantum gate circuit neural network optimized by quantum genetic algorithm.","venue":"J. Supercomput.","volume":"79","number":"12","pages":"13421-13441","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/GongZGQ23","doi":"10.1007/S11227-023-05158-7","ee":"https://doi.org/10.1007/s11227-023-05158-7","url":"https://dblp.org/rec/journals/tjs/GongZGQ23"}, "url":"URL#248420" }, { "@score":"1", "@id":"248421", "info":{"authors":{"author":[{"@pid":"88/7525","text":"Shuai Gong"},{"@pid":"24/8073","text":"Zhenfang Zhu"},{"@pid":"73/8488","text":"Jiangtao Qi"},{"@pid":"85/10347","text":"Wenqing Wu"},{"@pid":"22/7250","text":"Chunling Tong"}]},"title":"SeburSum: a novel set-based summary ranking strategy for summary-level extractive summarization.","venue":"J. Supercomput.","volume":"79","number":"12","pages":"12949-12977","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/GongZQWT23","doi":"10.1007/S11227-023-05165-8","ee":"https://doi.org/10.1007/s11227-023-05165-8","url":"https://dblp.org/rec/journals/tjs/GongZQWT23"}, "url":"URL#248421" }, { "@score":"1", "@id":"248422", "info":{"authors":{"author":[{"@pid":"287/0905","text":"V. Gowthami"},{"@pid":"93/9473","text":"K. Bhoopathy Bagan"},{"@pid":"311/0304","text":"Ewins Pon Pushpa"}]},"title":"A novel approach towards high-performance image compression using multilevel wavelet transformation for heterogeneous datasets.","venue":"J. Supercomput.","volume":"79","number":"3","pages":"2488-2518","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/GowthamiBP23","doi":"10.1007/S11227-022-04744-5","ee":"https://doi.org/10.1007/s11227-022-04744-5","url":"https://dblp.org/rec/journals/tjs/GowthamiBP23"}, "url":"URL#248422" }, { "@score":"1", "@id":"248423", "info":{"authors":{"author":[{"@pid":"177/3393","text":"Daniel Guamán"},{"@pid":"04/3680","text":"Jennifer Pérez"},{"@pid":"153/6618","text":"Priscila Valdiviezo Díaz"}]},"title":"Estimating the energy consumption of model-view-controller applications.","venue":"J. Supercomput.","volume":"79","number":"12","pages":"13766-13793","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/GuamanPD23","doi":"10.1007/S11227-023-05202-6","ee":"https://doi.org/10.1007/s11227-023-05202-6","url":"https://dblp.org/rec/journals/tjs/GuamanPD23"}, "url":"URL#248423" }, { "@score":"1", "@id":"248424", "info":{"authors":{"author":[{"@pid":"338/6709","text":"Runwei Guan"},{"@pid":"m/KaLokMan","text":"Ka Lok Man"},{"@pid":"245/9219","text":"Haocheng Zhao"},{"@pid":"271/9367","text":"Ruixiao Zhang"},{"@pid":"55/7761","text":"Shanliang Yao"},{"@pid":"81/8286","text":"Jeremy S. Smith"},{"@pid":"130/1634","text":"Eng Gee Lim"},{"@pid":"205/3143","text":"Yutao Yue"}]},"title":"MAN and CAT: mix attention to nn and concatenate attention to YOLO.","venue":"J. Supercomput.","volume":"79","number":"2","pages":"2108-2136","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/GuanMZZYSLY23","doi":"10.1007/S11227-022-04726-7","ee":"https://doi.org/10.1007/s11227-022-04726-7","url":"https://dblp.org/rec/journals/tjs/GuanMZZYSLY23"}, "url":"URL#248424" }, { "@score":"1", "@id":"248425", "info":{"authors":{"author":[{"@pid":"57/9474","text":"Sajjad Jahanbakhsh Gudakahriz"},{"@pid":"97/5614","text":"Amir-Masoud Eftekhari-Moghadam"},{"@pid":"95/1689","text":"Fariborz Mahmoudi"}]},"title":"Opinion texts summarization based on texts concepts with multi-objective pruning approach.","venue":"J. Supercomput.","volume":"79","number":"5","pages":"5013-5036","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/GudakahrizEM23","doi":"10.1007/S11227-022-04842-4","ee":"https://doi.org/10.1007/s11227-022-04842-4","url":"https://dblp.org/rec/journals/tjs/GudakahrizEM23"}, "url":"URL#248425" }, { "@score":"1", "@id":"248426", "info":{"authors":{"author":[{"@pid":"354/8273","text":"Naima Guenifi"},{"@pid":"202/6199","text":"Shiromani Balmukund Rahi"},{"@pid":"354/8658","text":"Faiza Benmahdi"},{"@pid":"354/8918","text":"Houda Chabane"}]},"title":"Optimization of tunneling current in ferroelectric tunnel FET using genetic algorithm.","venue":"J. Supercomput.","volume":"79","number":"14","pages":"15773-15789","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/GuenifiRBC23","doi":"10.1007/S11227-023-05240-0","ee":"https://doi.org/10.1007/s11227-023-05240-0","url":"https://dblp.org/rec/journals/tjs/GuenifiRBC23"}, "url":"URL#248426" }, { "@score":"1", "@id":"248427", "info":{"authors":{"author":[{"@pid":"250/6904","text":"Weixia Gui"},{"@pid":"271/2145","text":"Fulai Pan"},{"@pid":"09/11267","text":"Dandan Zhu"},{"@pid":"92/2954","text":"Feng Li"}]},"title":"Faulty processor identification for a multiprocessor system under the Malek model using an improved binary bat algorithm.","venue":"J. Supercomput.","volume":"79","number":"4","pages":"3791-3820","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/GuiPZL23","doi":"10.1007/S11227-022-04790-Z","ee":"https://doi.org/10.1007/s11227-022-04790-z","url":"https://dblp.org/rec/journals/tjs/GuiPZL23"}, "url":"URL#248427" }, { "@score":"1", "@id":"248428", "info":{"authors":{"author":[{"@pid":"350/4105","text":"Gunish Gunish"},{"@pid":"350/4283","text":"Sheema Madhusudhanan"},{"@pid":"167/6947","text":"Arun Cyril Jose"}]},"title":"Hybrid image processing model: a base for smart emergency applications.","venue":"J. Supercomput.","volume":"79","number":"12","pages":"13119-13141","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/GunishMJ23","doi":"10.1007/S11227-023-05174-7","ee":"https://doi.org/10.1007/s11227-023-05174-7","url":"https://dblp.org/rec/journals/tjs/GunishMJ23"}, "url":"URL#248428" }, { "@score":"1", "@id":"248429", "info":{"authors":{"author":[{"@pid":"05/5518","text":"Ming Guo"},{"@pid":"92/5891","text":"Jia Lu"}]},"title":"ND-S: an oversampling algorithm based on natural neighbor and density peaks clustering.","venue":"J. Supercomput.","volume":"79","number":"8","pages":"8668-8698","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/GuoL23","doi":"10.1007/S11227-022-04965-8","ee":"https://doi.org/10.1007/s11227-022-04965-8","url":"https://dblp.org/rec/journals/tjs/GuoL23"}, "url":"URL#248429" }, { "@score":"1", "@id":"248430", "info":{"authors":{"author":[{"@pid":"33/86","text":"Peng Guo"},{"@pid":"95/2446","text":"Qi Liu"},{"@pid":"90/3575-1","text":"Shui Yu 0001"},{"@pid":"257/4849","text":"Jianyu Xiong"},{"@pid":"82/10179","text":"Xiang Tan"},{"@pid":"82/340","text":"Chao Guo"}]},"title":"A transformer with layer-cross decoding for remaining useful life prediction.","venue":"J. Supercomput.","volume":"79","number":"10","pages":"11558-11584","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/GuoLYXTG23","doi":"10.1007/S11227-023-05126-1","ee":"https://doi.org/10.1007/s11227-023-05126-1","url":"https://dblp.org/rec/journals/tjs/GuoLYXTG23"}, "url":"URL#248430" }, { "@score":"1", "@id":"248431", "info":{"authors":{"author":[{"@pid":"166/3547","text":"Yijie Guo"},{"@pid":"01/2086","text":"Lu Lu"},{"@pid":"358/2090","text":"Songxiang Zhu"}]},"title":"Novel accelerated methods for convolution neural network with matrix core.","venue":"J. Supercomput.","volume":"79","number":"17","pages":"19547-19573","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/GuoLZ23","doi":"10.1007/S11227-023-05399-6","ee":"https://doi.org/10.1007/s11227-023-05399-6","url":"https://dblp.org/rec/journals/tjs/GuoLZ23"}, "url":"URL#248431" }, { "@score":"1", "@id":"248432", "info":{"authors":{"author":[{"@pid":"300/5322","text":"Ruyan Guo"},{"@pid":"59/2227-78","text":"Yan Wang 0078"},{"@pid":"93/2399","text":"Jianxi Fan"},{"@pid":"202/3794","text":"Weibei Fan"}]},"title":"Embedding hierarchical folded cubes into linear arrays and complete binary trees with minimum wirelength.","venue":"J. Supercomput.","volume":"79","number":"10","pages":"11300-11327","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/GuoWFF23","doi":"10.1007/S11227-023-05095-5","ee":"https://doi.org/10.1007/s11227-023-05095-5","url":"https://dblp.org/rec/journals/tjs/GuoWFF23"}, "url":"URL#248432" }, { "@score":"1", "@id":"248433", "info":{"authors":{"author":[{"@pid":"66/841","text":"Aditya Gupta"},{"@pid":"327/1101","text":"Monu Bhagat"},{"@pid":"300/3175","text":"Vibha Jain"}]},"title":"Blockchain-enabled healthcare monitoring system for early Monkeypox detection.","venue":"J. Supercomput.","volume":"79","number":"14","pages":"15675-15699","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/GuptaBJ23","doi":"10.1007/S11227-023-05288-Y","ee":"https://doi.org/10.1007/s11227-023-05288-y","url":"https://dblp.org/rec/journals/tjs/GuptaBJ23"}, "url":"URL#248433" }, { "@score":"1", "@id":"248434", "info":{"authors":{"author":[{"@pid":"19/10241","text":"Rohit Kumar Gupta"},{"@pid":"341/1101","text":"Shashwat Mahajan"},{"@pid":"12/1024","text":"Rajiv Misra"}]},"title":"Resource orchestration in network slicing using GAN-based distributional deep Q-network for industrial applications.","venue":"J. Supercomput.","volume":"79","number":"5","pages":"5109-5138","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/GuptaMM23","doi":"10.1007/S11227-022-04867-9","ee":"https://doi.org/10.1007/s11227-022-04867-9","url":"https://dblp.org/rec/journals/tjs/GuptaMM23"}, "url":"URL#248434" }, { "@score":"1", "@id":"248435", "info":{"authors":{"author":[{"@pid":"119/8859","text":"Supriya Gupta"},{"@pid":"177/6852","text":"Aakanksha Sharaff"},{"@pid":"43/10220","text":"Naresh Kumar Nagwani"}]},"title":"Frequent item-set mining and clustering based ranked biomedical text summarization.","venue":"J. Supercomput.","volume":"79","number":"1","pages":"139-159","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/GuptaSN23","doi":"10.1007/S11227-022-04578-1","ee":"https://doi.org/10.1007/s11227-022-04578-1","url":"https://dblp.org/rec/journals/tjs/GuptaSN23"}, "url":"URL#248435" }, { "@score":"1", "@id":"248436", "info":{"authors":{"author":[{"@pid":"98/722","text":"Christophe Guyeux"},{"@pid":"220/6984","text":"Gaby Bou Tayeh"},{"@pid":"72/5353","text":"Abdallah Makhoul"},{"@pid":"75/6753","text":"Stéphane Chrétien"},{"@pid":"51/1752","text":"Julien Bourgeois"},{"@pid":"58/5562","text":"Jacques M. Bahi"}]},"title":"Using data science to predict firemen interventions: a case study.","venue":"J. Supercomput.","volume":"79","number":"7","pages":"7160-7175","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/GuyeuxTMCBB23","doi":"10.1007/S11227-022-04956-9","ee":"https://doi.org/10.1007/s11227-022-04956-9","url":"https://dblp.org/rec/journals/tjs/GuyeuxTMCBB23"}, "url":"URL#248436" }, { "@score":"1", "@id":"248437", "info":{"authors":{"author":[{"@pid":"312/7405","text":"Hamid Hadian"},{"@pid":"312/7273","text":"Mohammadreza Farrokh"},{"@pid":"15/4626","text":"Mohsen Sharifi"},{"@pid":"45/3593","text":"Ali Jafari"}]},"title":"An elastic and traffic-aware scheduler for distributed data stream processing in heterogeneous clusters.","venue":"J. Supercomput.","volume":"79","number":"1","pages":"461-498","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/HadianFSJ23","doi":"10.1007/S11227-022-04669-Z","ee":"https://doi.org/10.1007/s11227-022-04669-z","url":"https://dblp.org/rec/journals/tjs/HadianFSJ23"}, "url":"URL#248437" }, { "@score":"1", "@id":"248438", "info":{"authors":{"author":[{"@pid":"341/7255","text":"Jumana Haimour"},{"@pid":"19/2386-1","text":"Ali Al-Haj 0001"}]},"title":"An adaptive centralized authentication control method to reduce association delay in the IoT 802.11ah protocol.","venue":"J. Supercomput.","volume":"79","number":"6","pages":"6730-6755","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/HaimourA23","doi":"10.1007/S11227-022-04919-0","ee":"https://doi.org/10.1007/s11227-022-04919-0","url":"https://dblp.org/rec/journals/tjs/HaimourA23"}, "url":"URL#248438" }, { "@score":"1", "@id":"248439", "info":{"authors":{"author":[{"@pid":"71/671","text":"Riadh Ben Halima"},{"@pid":"148/6278","text":"Marwa Hachicha"},{"@pid":"133/4204","text":"Ahmed Jemal"},{"@pid":"09/5212","text":"Ahmed Hadj Kacem"}]},"title":"MAPE-K patterns for self-adaptation in cyber-physical systems.","venue":"J. Supercomput.","volume":"79","number":"5","pages":"4917-4943","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/HalimaHJK23","doi":"10.1007/S11227-022-04828-2","ee":"https://doi.org/10.1007/s11227-022-04828-2","url":"https://dblp.org/rec/journals/tjs/HalimaHJK23"}, "url":"URL#248439" }, { "@score":"1", "@id":"248440", "info":{"authors":{"author":[{"@pid":"354/8470","text":"Bakhtyar Rafeeq HamaKarim"},{"@pid":"204/3087","text":"Rojiar Pir Mohammadiani"},{"@pid":"149/7878","text":"Amir Sheikhahmadi"},{"@pid":"354/8880","text":"Bryar Rafiq Hamakarim"},{"@pid":"354/8252","text":"Mehri Bahrami"}]},"title":"A method based on k-shell decomposition to identify influential nodes in complex networks.","venue":"J. Supercomput.","volume":"79","number":"14","pages":"15597-15622","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/HamaKarimMSHB23","doi":"10.1007/S11227-023-05296-Y","ee":"https://doi.org/10.1007/s11227-023-05296-y","url":"https://dblp.org/rec/journals/tjs/HamaKarimMSHB23"}, "url":"URL#248440" }, { "@score":"1", "@id":"248441", "info":{"authors":{"author":[{"@pid":"212/9231","text":"Melika Hamian"},{"@pid":"13/730","text":"Karim Faez"},{"@pid":"162/3505","text":"Soheila Nazari"},{"@pid":"73/7407","text":"Malihe Sabeti"}]},"title":"A novel learning approach in deep spiking neural networks with multi-objective optimization algorithms for automatic digit speech recognition.","venue":"J. Supercomput.","volume":"79","number":"18","pages":"20263-20288","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/HamianFNS23","doi":"10.1007/S11227-023-05420-Y","ee":"https://doi.org/10.1007/s11227-023-05420-y","url":"https://dblp.org/rec/journals/tjs/HamianFNS23"}, "url":"URL#248441" }, { "@score":"1", "@id":"248442", "info":{"authors":{"author":[{"@pid":"198/9786","text":"Hamza Hammami"},{"@pid":"20/6407","text":"Sadok Ben Yahia"},{"@pid":"91/2882","text":"Mohammad S. Obaidat"}]},"title":"A novel efficient and lightweight authentication scheme for secure smart grid communication systems.","venue":"J. Supercomput.","volume":"79","number":"7","pages":"7360-7376","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/HammamiYO23","doi":"10.1007/S11227-022-04944-Z","ee":"https://doi.org/10.1007/s11227-022-04944-z","url":"https://dblp.org/rec/journals/tjs/HammamiYO23"}, "url":"URL#248442" }, { "@score":"1", "@id":"248443", "info":{"authors":{"author":[{"@pid":"288/3241","text":"Ju Hee Han"},{"@pid":"43/2364","text":"Jee-In Kim"},{"@pid":"36/5354","text":"Jang-Won Suh"},{"@pid":"16/6515-1","text":"Hyungseok Kim 0001"}]},"title":"Customizing blendshapes to capture facial details.","venue":"J. Supercomput.","volume":"79","number":"6","pages":"6347-6372","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/HanKSK23","doi":"10.1007/S11227-022-04885-7","ee":"https://doi.org/10.1007/s11227-022-04885-7","url":"https://dblp.org/rec/journals/tjs/HanKSK23"}, "url":"URL#248443" }, { "@score":"1", "@id":"248444", "info":{"authors":{"author":[{"@pid":"346/0520","text":"Md Raful Hassan"},{"@pid":"201/9012","text":"Walaa N. Ismail"},{"@pid":"319/2946","text":"Ahmad Chowdhury"},{"@pid":"319/2879","text":"Sharara Hossain"},{"@pid":"45/3684","text":"Shamsul Huda"},{"@pid":"84/4762","text":"Mohammad Mehedi Hassan"}]},"title":"Correction to: A framework of genetic algorithm-based CNN on multi-access edge computing for automated detection of COVID-19.","venue":"J. Supercomput.","volume":"79","number":"9","pages":"10507-10508","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/HassanICHHH23","doi":"10.1007/S11227-023-05063-Z","ee":"https://doi.org/10.1007/s11227-023-05063-z","url":"https://dblp.org/rec/journals/tjs/HassanICHHH23"}, "url":"URL#248444" }, { "@score":"1", "@id":"248445", "info":{"authors":{"author":[{"@pid":"232/9409","text":"Asad Hayat"},{"@pid":"227/7897","text":"Yasir Noman Khalid"},{"@pid":"74/9528","text":"Muhammad Siraj Rathore"},{"@pid":"354/9057","text":"Muhammad Nadeem Nadir"}]},"title":"A machine learning-based resource-efficient task scheduler for heterogeneous computer systems.","venue":"J. Supercomput.","volume":"79","number":"14","pages":"15700-15728","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/HayatKRN23","doi":"10.1007/S11227-023-05266-4","ee":"https://doi.org/10.1007/s11227-023-05266-4","url":"https://dblp.org/rec/journals/tjs/HayatKRN23"}, "url":"URL#248445" }, { "@score":"1", "@id":"248446", "info":{"authors":{"author":[{"@pid":"323/1553","text":"Dun He"},{"@pid":"148/6527","text":"Jue Chen"},{"@pid":"258/7989","text":"Xihe Qiu"}]},"title":"A density algorithm for controller placement problem in software defined wide area networks.","venue":"J. Supercomput.","volume":"79","number":"5","pages":"5374-5402","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/HeCQ23","doi":"10.1007/S11227-022-04873-X","ee":"https://doi.org/10.1007/s11227-022-04873-x","url":"https://dblp.org/rec/journals/tjs/HeCQ23"}, "url":"URL#248446" }, { "@score":"1", "@id":"248447", "info":{"authors":{"author":[{"@pid":"343/9114","text":"Xinfeng He"},{"@pid":"311/3739","text":"Shuchao Sun"}]},"title":"A two-phase detection method against APT attack on flow table management in SDN.","venue":"J. Supercomput.","volume":"79","number":"14","pages":"15415-15434","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/HeS23","doi":"10.1007/S11227-023-05281-5","ee":"https://doi.org/10.1007/s11227-023-05281-5","url":"https://dblp.org/rec/journals/tjs/HeS23"}, "url":"URL#248447" }, { "@score":"1", "@id":"248448", "info":{"authors":{"author":[{"@pid":"309/9386","text":"Suna He"},{"@pid":"21/1136","text":"Jigang Wu"},{"@pid":"58/1390","text":"Bing Wei"},{"@pid":"06/6984","text":"Jiaxin Wu"}]},"title":"Algorithms for tree-shaped task partition and allocation on heterogeneous multiprocessors.","venue":"J. Supercomput.","volume":"79","number":"12","pages":"13210-13240","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/HeWWW23","doi":"10.1007/S11227-023-05186-3","ee":"https://doi.org/10.1007/s11227-023-05186-3","url":"https://dblp.org/rec/journals/tjs/HeWWW23"}, "url":"URL#248448" }, { "@score":"1", "@id":"248449", "info":{"authors":{"author":[{"@pid":"30/10644","text":"Qin-lu He"},{"@pid":"21/3626","text":"Fan Zhang"},{"@pid":"221/6731","text":"Genqing Bian"},{"@pid":"57/10702","text":"Weiqi Zhang"},{"@pid":"74/2397","text":"Zhen Li"},{"@pid":"65/4423","text":"Chen Chen"}]},"title":"Dynamic decision-making strategy of replica number based on data hot.","venue":"J. Supercomput.","volume":"79","number":"9","pages":"9584-9603","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/HeZBZLC23","doi":"10.1007/S11227-022-05029-7","ee":"https://doi.org/10.1007/s11227-022-05029-7","url":"https://dblp.org/rec/journals/tjs/HeZBZLC23"}, "url":"URL#248449" }, { "@score":"1", "@id":"248450", "info":{"authors":{"author":[{"@pid":"30/1058","text":"S. Hemavathi"},{"@pid":"37/7685","text":"B. Latha"}]},"title":"FRHO: Fuzzy rule-based hybrid optimization for optimal cluster head selection and enhancing quality of service in wireless sensor network.","venue":"J. Supercomput.","volume":"79","number":"11","pages":"12238-12265","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/HemavathiL23","doi":"10.1007/S11227-023-05106-5","ee":"https://doi.org/10.1007/s11227-023-05106-5","url":"https://dblp.org/rec/journals/tjs/HemavathiL23"}, "url":"URL#248450" }, { "@score":"1", "@id":"248451", "info":{"authors":{"author":[{"@pid":"183/1581","text":"Hanshu Hong"},{"@pid":"09/5754","text":"Zhixin Sun"}]},"title":"Constructing conditional PKEET with verification mechanism for data privacy protection in intelligent systems.","venue":"J. Supercomput.","volume":"79","number":"13","pages":"15004-15022","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/HongS23","doi":"10.1007/S11227-023-05253-9","ee":"https://doi.org/10.1007/s11227-023-05253-9","url":"https://dblp.org/rec/journals/tjs/HongS23"}, "url":"URL#248451" }, { "@score":"1", "@id":"248452", "info":{"authors":{"author":[{"@pid":"88/5135","text":"Yan Hong"},{"@pid":"66/1893","text":"Yuzhu Wang"},{"@pid":"357/4806","text":"Xuanying Zhang"},{"@pid":"181/6457","text":"Xiaocong Wang"},{"@pid":"24/2058","text":"He Zhang"},{"@pid":"45/7449","text":"Jinrong Jiang"}]},"title":"A GPU-enabled acceleration algorithm for the CAM5 cloud microphysics scheme.","venue":"J. Supercomput.","volume":"79","number":"16","pages":"17784-17809","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/HongWZWZJ23","doi":"10.1007/S11227-023-05360-7","ee":"https://doi.org/10.1007/s11227-023-05360-7","url":"https://dblp.org/rec/journals/tjs/HongWZWZJ23"}, "url":"URL#248452" }, { "@score":"1", "@id":"248453", "info":{"authors":{"author":[{"@pid":"89/7291","text":"Shih-Cheng Horng"},{"@pid":"83/6810","text":"Shieh-Shing Lin"}]},"title":"Incorporate seagull optimization into ordinal optimization for solving the constrained binary simulation optimization problems.","venue":"J. Supercomput.","volume":"79","number":"5","pages":"5730-5758","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/HorngL23","doi":"10.1007/S11227-022-04880-Y","ee":"https://doi.org/10.1007/s11227-022-04880-y","url":"https://dblp.org/rec/journals/tjs/HorngL23"}, "url":"URL#248453" }, { "@score":"1", "@id":"248454", "info":{"authors":{"author":[{"@pid":"96/3128","text":"Gábor Horváth 0002"},{"@pid":"124/6083","text":"András Mészáros"},{"@pid":"05/2204","text":"Péter Szilágyi"}]},"title":"TeleDAL: a regression-based template-less unsupervised method for finding anomalies in log sequences.","venue":"J. Supercomput.","volume":"79","number":"16","pages":"18394-18416","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/HorvathMS23","doi":"10.1007/S11227-023-05379-W","ee":"https://doi.org/10.1007/s11227-023-05379-w","url":"https://dblp.org/rec/journals/tjs/HorvathMS23"}, "url":"URL#248454" }, { "@score":"1", "@id":"248455", "info":{"title":"Retraction Note: Application of PLS algorithm in discriminant analysis in multidimensional data mining.","venue":"J. Supercomput.","volume":"79","number":"5","pages":"5838-5839","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/HuFDLJ23","doi":"10.1007/S11227-022-04856-Y","ee":"https://doi.org/10.1007/s11227-022-04856-y","url":"https://dblp.org/rec/journals/tjs/HuFDLJ23"}, "url":"URL#248455" }, { "@score":"1", "@id":"248456", "info":{"authors":{"author":[{"@pid":"149/5091","text":"Junying Hu"},{"@pid":"40/10403","text":"Xiaofei Qian"},{"@pid":"16/8228","text":"Changchun Tan"},{"@pid":"41/8074","text":"Xinbao Liu"}]},"title":"Point and interval prediction of aircraft engine maintenance cost by bootstrapped SVR and improved RFE.","venue":"J. Supercomput.","volume":"79","number":"7","pages":"7997-8025","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/HuQTL23","doi":"10.1007/S11227-022-04986-3","ee":"https://doi.org/10.1007/s11227-022-04986-3","url":"https://dblp.org/rec/journals/tjs/HuQTL23"}, "url":"URL#248456" }, { "@score":"1", "@id":"248457", "info":{"authors":{"author":[{"@pid":"149/5148","text":"Fengyi Huang"},{"@pid":"82/181","text":"Hengzhou Ye"},{"@pid":"23/1867-4","text":"Wei Hao 0004"}]},"title":"Cost-aware resource management based on market pricing mechanisms in edge federation environments.","venue":"J. Supercomput.","volume":"79","number":"6","pages":"5939-5961","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/HuangYH23","doi":"10.1007/S11227-022-04870-0","ee":"https://doi.org/10.1007/s11227-022-04870-0","url":"https://dblp.org/rec/journals/tjs/HuangYH23"}, "url":"URL#248457" }, { "@score":"1", "@id":"248458", "info":{"authors":{"author":[{"@pid":"284/0455","text":"Jianying Huang"},{"@pid":"339/4352","text":"Seunghyeok Yang"},{"@pid":"76/1275","text":"Jinhui Li"},{"@pid":"164/4061","text":"Jeill Oh"},{"@pid":"77/3634","text":"Hoon Kang"}]},"title":"Prediction model of sparse autoencoder-based bidirectional LSTM for wastewater flow rate.","venue":"J. Supercomput.","volume":"79","number":"4","pages":"4412-4435","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/HuangYLOK23","doi":"10.1007/S11227-022-04827-3","ee":"https://doi.org/10.1007/s11227-022-04827-3","url":"https://dblp.org/rec/journals/tjs/HuangYLOK23"}, "url":"URL#248458" }, { "@score":"1", "@id":"248459", "info":{"authors":{"author":[{"@pid":"51/944","text":"Hai Huang"},{"@pid":"285/4529","text":"Haoran Zong"}]},"title":"Secure matrix multiplication based on fully homomorphic encryption.","venue":"J. Supercomput.","volume":"79","number":"5","pages":"5064-5085","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/HuangZ23","doi":"10.1007/S11227-022-04850-4","ee":"https://doi.org/10.1007/s11227-022-04850-4","url":"https://dblp.org/rec/journals/tjs/HuangZ23"}, "url":"URL#248459" }, { "@score":"1", "@id":"248460", "info":{"authors":{"author":[{"@pid":"49/1028","text":"Haijun Huang"},{"@pid":"24/6914","text":"Hong Zhang"},{"@pid":"356/2178","text":"Zidi Zhao"},{"@pid":"118/4616","text":"Shouhua Zhang"}]},"title":"A traceable and verifiable CP-ABE scheme with blockchain in VANET.","venue":"J. Supercomput.","volume":"79","number":"15","pages":"16859-16883","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/HuangZZZ23","doi":"10.1007/S11227-023-05322-Z","ee":"https://doi.org/10.1007/s11227-023-05322-z","url":"https://dblp.org/rec/journals/tjs/HuangZZZ23"}, "url":"URL#248460" }, { "@score":"1", "@id":"248461", "info":{"title":"Retraction Note: Motion video tracking technology in sports training based on Mean-Shift algorithm.","venue":"J. Supercomput.","volume":"79","number":"5","pages":"5836","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/Hui23","doi":"10.1007/S11227-022-04863-Z","ee":"https://doi.org/10.1007/s11227-022-04863-z","url":"https://dblp.org/rec/journals/tjs/Hui23"}, "url":"URL#248461" }, { "@score":"1", "@id":"248462", "info":{"authors":{"author":[{"@pid":"331/3058","text":"Ahmed Mohammed Hussein"},{"@pid":"171/1301","text":"Ali Kadhum Idrees"},{"@pid":"26/3185","text":"Raphaël Couturier"}]},"title":"A distributed prediction-compression-based mechanism for energy saving in IoT networks.","venue":"J. Supercomput.","volume":"79","number":"15","pages":"16963-16999","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/HusseinIC23","doi":"10.1007/S11227-023-05317-W","ee":"https://doi.org/10.1007/s11227-023-05317-w","url":"https://dblp.org/rec/journals/tjs/HusseinIC23"}, "url":"URL#248462" }, { "@score":"1", "@id":"248463", "info":{"authors":{"author":[{"@pid":"84/3386","text":"Mario Ibáñez"},{"@pid":"242/1698","text":"Manuel Luna"},{"@pid":"29/3095","text":"José Luis Bosque"},{"@pid":"24/5270","text":"Ramón Beivide"}]},"title":"Parallelisation of decision-making techniques in aquaculture enterprises.","venue":"J. Supercomput.","volume":"79","number":"11","pages":"11827-11843","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/IbanezLBB23","doi":"10.1007/S11227-023-05124-3","ee":"https://doi.org/10.1007/s11227-023-05124-3","url":"https://dblp.org/rec/journals/tjs/IbanezLBB23"}, "url":"URL#248463" }, { "@score":"1", "@id":"248464", "info":{"authors":{"author":[{"@pid":"23/2334","text":"Vicente Galiano Ibarra"},{"@pid":"65/5809","text":"Héctor Migallón"},{"@pid":"90/1933","text":"Miguel Martínez-Rach"},{"@pid":"77/5377","text":"Otoniel López Granado"},{"@pid":"85/4617","text":"Manuel P. Malumbres"}]},"title":"Correction to: On the use of deep learning and parallelism techniques to significantly reduce the HEVC intra-coding time.","venue":"J. Supercomput.","volume":"79","number":"7","pages":"8148-8149","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/IbarraMMGM23","doi":"10.1007/S11227-022-04918-1","ee":"https://doi.org/10.1007/s11227-022-04918-1","url":"https://dblp.org/rec/journals/tjs/IbarraMMGM23"}, "url":"URL#248464" }, { "@score":"1", "@id":"248465", "info":{"authors":{"author":[{"@pid":"23/2334","text":"Vicente Galiano Ibarra"},{"@pid":"65/5809","text":"Héctor Migallón"},{"@pid":"90/1933","text":"Miguel Martínez-Rach"},{"@pid":"77/5377","text":"Otoniel López Granado"},{"@pid":"85/4617","text":"Manuel P. Malumbres"}]},"title":"On the use of deep learning and parallelism techniques to significantly reduce the HEVC intra-coding time.","venue":"J. Supercomput.","volume":"79","number":"11","pages":"11641-11659","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/IbarraMMGM23a","doi":"10.1007/S11227-022-04764-1","ee":"https://doi.org/10.1007/s11227-022-04764-1","url":"https://dblp.org/rec/journals/tjs/IbarraMMGM23a"}, "url":"URL#248465" }, { "@score":"1", "@id":"248466", "info":{"authors":{"author":[{"@pid":"183/3286","text":"Osman Ali Sadek Ibrahim"},{"@pid":"332/4561","text":"Belal A. Hamed"},{"@pid":"52/10544","text":"Tarek Abd-El-Hafeez"}]},"title":"A new fast technique for pattern matching in biological sequences.","venue":"J. Supercomput.","volume":"79","number":"1","pages":"367-388","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/IbrahimHA23","doi":"10.1007/S11227-022-04673-3","ee":"https://doi.org/10.1007/s11227-022-04673-3","url":"https://dblp.org/rec/journals/tjs/IbrahimHA23"}, "url":"URL#248466" }, { "@score":"1", "@id":"248467", "info":{"authors":{"author":[{"@pid":"171/1301","text":"Ali Kadhum Idrees"},{"@pid":"344/8517","text":"Marwa Saieed Khlief"}]},"title":"Efficient compression technique for reducing transmitted EEG data without loss in IoMT networks based on fog computing.","venue":"J. Supercomput.","volume":"79","number":"8","pages":"9047-9072","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/IdreesK23","doi":"10.1007/S11227-022-05027-9","ee":"https://doi.org/10.1007/s11227-022-05027-9","url":"https://dblp.org/rec/journals/tjs/IdreesK23"}, "url":"URL#248467" }, { "@score":"1", "@id":"248468", "info":{"authors":{"author":{"@pid":"143/0083","text":"Maryam Imani"}},"title":"Fuzzy-based weighting long short-term memory network for demand forecasting.","venue":"J. Supercomput.","volume":"79","number":"1","pages":"435-460","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/Imani23","doi":"10.1007/S11227-022-04659-1","ee":"https://doi.org/10.1007/s11227-022-04659-1","url":"https://dblp.org/rec/journals/tjs/Imani23"}, "url":"URL#248468" }, { "@score":"1", "@id":"248469", "info":{"authors":{"author":[{"@pid":"203/3371","text":"Youcef Imine"},{"@pid":"129/2211","text":"Hicham Lakhlef"},{"@pid":"r/MichelRaynal","text":"Michel Raynal"},{"@pid":"97/1881","text":"François Taïani"}]},"title":"DMCSC: a fully distributed multi-coloring approach for scalable communication in synchronous broadcast networks.","venue":"J. Supercomput.","volume":"79","number":"1","pages":"788-813","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ImineLRT23","doi":"10.1007/S11227-022-04700-3","ee":"https://doi.org/10.1007/s11227-022-04700-3","url":"https://dblp.org/rec/journals/tjs/ImineLRT23"}, "url":"URL#248469" }, { "@score":"1", "@id":"248470", "info":{"authors":{"author":[{"@pid":"323/7823","text":"Samiulla Itoo"},{"@pid":"89/8467-1","text":"Musheer Ahmad 0001"},{"@pid":"26/6904-3","text":"Vinod Kumar 0003"},{"@pid":"231/6596","text":"Ahmed Alkhayyat"}]},"title":"RKMIS: robust key management protocol for industrial sensor network system.","venue":"J. Supercomput.","volume":"79","number":"9","pages":"9837-9865","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ItooAKA23","doi":"10.1007/S11227-022-05041-X","ee":"https://doi.org/10.1007/s11227-022-05041-x","url":"https://dblp.org/rec/journals/tjs/ItooAKA23"}, "url":"URL#248470" }, { "@score":"1", "@id":"248471", "info":{"authors":{"author":[{"@pid":"183/5737","text":"Mehrad Jaberi"},{"@pid":"19/7507","text":"Hamid Mala"}]},"title":"Privacy-preserving multi-party PCA computation on horizontally and vertically partitioned data based on outsourced QR decomposition.","venue":"J. Supercomput.","volume":"79","number":"13","pages":"14358-14387","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/JaberiM23","doi":"10.1007/S11227-023-05206-2","ee":"https://doi.org/10.1007/s11227-023-05206-2","url":"https://dblp.org/rec/journals/tjs/JaberiM23"}, "url":"URL#248471" }, { "@score":"1", "@id":"248472", "info":{"authors":{"author":[{"@pid":"338/7403","text":"Saeedeh Jahanshahi"},{"@pid":"25/3621","text":"Amir Sabbagh Molahosseini"},{"@pid":"79/10637","text":"Azadeh Alsadat Emrani Zarandi"}]},"title":"uLog: a software-based approximate logarithmic number system for computations on SIMD processors.","venue":"J. Supercomput.","volume":"79","number":"2","pages":"1750-1783","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/JahanshahiMZ23","doi":"10.1007/S11227-022-04713-Y","ee":"https://doi.org/10.1007/s11227-022-04713-y","url":"https://dblp.org/rec/journals/tjs/JahanshahiMZ23"}, "url":"URL#248472" }, { "@score":"1", "@id":"248473", "info":{"authors":{"author":[{"@pid":"332/3312","text":"Vineet Jaiswal"},{"@pid":"205/9799","text":"Trailokya Nath Sasamal"}]},"title":"Novel approach for the design of efficient full adder in MQCA.","venue":"J. Supercomput.","volume":"79","number":"7","pages":"7900-7915","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/JaiswalS23","doi":"10.1007/S11227-022-04989-0","ee":"https://doi.org/10.1007/s11227-022-04989-0","url":"https://dblp.org/rec/journals/tjs/JaiswalS23"}, "url":"URL#248473" }, { "@score":"1", "@id":"248474", "info":{"authors":{"author":[{"@pid":"238/6277","text":"Sung-Su Jang"},{"@pid":"220/8708","text":"Cheol-Jin Kim"},{"@pid":"343/6543","text":"Seong-yeon Hwang"},{"@pid":"36/1366","text":"Myung-Jae Lee"},{"@pid":"25/6540","text":"Young-Guk Ha"}]},"title":"L-GAN: landmark-based generative adversarial network for efficient face de-identification.","venue":"J. Supercomput.","volume":"79","number":"7","pages":"7132-7159","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/JangKHLH23","doi":"10.1007/S11227-022-04954-X","ee":"https://doi.org/10.1007/s11227-022-04954-x","url":"https://dblp.org/rec/journals/tjs/JangKHLH23"}, "url":"URL#248474" }, { "@score":"1", "@id":"248475", "info":{"authors":{"author":[{"@pid":"37/6362","text":"Mohammad Javidi"},{"@pid":"253/1622","text":"Mahdi Saedshoar Heris"}]},"title":"New numerical methods for solving the partial fractional differential equations with uniform and non-uniform meshes.","venue":"J. Supercomput.","volume":"79","number":"13","pages":"14457-14488","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/JavidiH23","doi":"10.1007/S11227-023-05198-Z","ee":"https://doi.org/10.1007/s11227-023-05198-z","url":"https://dblp.org/rec/journals/tjs/JavidiH23"}, "url":"URL#248475" }, { "@score":"1", "@id":"248476", "info":{"authors":{"author":[{"@pid":"354/8146","text":"K. S. Jayanthan"},{"@pid":"42/5250","text":"S. Domnic"}]},"title":"An attentive convolutional transformer-based network for road safety.","venue":"J. Supercomput.","volume":"79","number":"14","pages":"16351-16377","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/JayanthanD23","doi":"10.1007/S11227-023-05293-1","ee":"https://doi.org/10.1007/s11227-023-05293-1","url":"https://dblp.org/rec/journals/tjs/JayanthanD23"}, "url":"URL#248476" }, { "@score":"1", "@id":"248477", "info":{"authors":{"author":[{"@pid":"305/3819","text":"Seyedeh Shabnam Jazaeri"},{"@pid":"172/9881","text":"Parvaneh Asghari"},{"@pid":"85/5516","text":"Sam Jabbehdari"},{"@pid":"83/7728","text":"Hamid Haj Seyyed Javadi"}]},"title":"Composition of caching and classification in edge computing based on quality optimization for SDN-based IoT healthcare solutions.","venue":"J. Supercomput.","volume":"79","number":"15","pages":"17619-17669","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/JazaeriAJJ23","doi":"10.1007/S11227-023-05332-X","ee":"https://doi.org/10.1007/s11227-023-05332-x","url":"https://dblp.org/rec/journals/tjs/JazaeriAJJ23"}, "url":"URL#248477" }, { "@score":"1", "@id":"248478", "info":{"authors":{"author":[{"@pid":"46/5717","text":"Emmanuel Jeannot"},{"@pid":"271/6879","text":"Richard Sartori"}]},"title":"An introspection monitoring library to improve MPI communication time.","venue":"J. Supercomput.","volume":"79","number":"10","pages":"10774-10795","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/JeannotS23","doi":"10.1007/S11227-023-05084-8","ee":"https://doi.org/10.1007/s11227-023-05084-8","url":"https://dblp.org/rec/journals/tjs/JeannotS23"}, "url":"URL#248478" }, { "@score":"1", "@id":"248479", "info":{"authors":{"author":[{"@pid":"334/2580","text":"Mingyoung Joshua Jeng"},{"@pid":"334/2906","text":"S. M. Ishraq Ul Islam"},{"@pid":"23/6949","text":"David Levy"},{"@pid":"352/3621","text":"Andrew E. Riachi"},{"@pid":"313/9570","text":"Manu Chaudhary"},{"@pid":"334/2838","text":"Md. Alvir Islam Nobel"},{"@pid":"352/2565","text":"Dylan Kneidel"},{"@pid":"359/5429","text":"Vinayak Jha"},{"@pid":"352/2758","text":"Jack G. Bauer"},{"@pid":"359/0594","text":"Anshul Maurya"},{"@pid":"234/0138","text":"Naveed Mahmud"},{"@pid":"98/82","text":"Esam El-Araby"}]},"title":"Improving quantum-to-classical data decoding using optimized quantum wavelet transform.","venue":"J. Supercomput.","volume":"79","number":"18","pages":"20532-20561","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/JengILRCNKJBMME23","doi":"10.1007/S11227-023-05433-7","ee":"https://doi.org/10.1007/s11227-023-05433-7","url":"https://dblp.org/rec/journals/tjs/JengILRCNKJBMME23"}, "url":"URL#248479" }, { "@score":"1", "@id":"248480", "info":{"authors":{"author":[{"@pid":"339/4195","text":"Young-Sang Jeong"},{"@pid":"317/0619","text":"Nam-Wook Cho"}]},"title":"Evaluation of e-learners' concentration using recurrent neural networks.","venue":"J. Supercomput.","volume":"79","number":"4","pages":"4146-4163","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/JeongC23","doi":"10.1007/S11227-022-04804-W","ee":"https://doi.org/10.1007/s11227-022-04804-w","url":"https://dblp.org/rec/journals/tjs/JeongC23"}, "url":"URL#248480" }, { "@score":"1", "@id":"248481", "info":{"authors":{"author":[{"@pid":"50/2269","text":"Chang-Hoo Jeong"},{"@pid":"67/6176","text":"Mun Yong Yi"}]},"title":"Correcting rainfall forecasts of a numerical weather prediction model using generative adversarial networks.","venue":"J. Supercomput.","volume":"79","number":"2","pages":"1289-1317","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/JeongY23","doi":"10.1007/S11227-022-04686-Y","ee":"https://doi.org/10.1007/s11227-022-04686-y","url":"https://dblp.org/rec/journals/tjs/JeongY23"}, "url":"URL#248481" }, { "@score":"1", "@id":"248482", "info":{"authors":{"author":[{"@pid":"350/4486","text":"Lauê Jesus"},{"@pid":"350/4251","text":"Peterson Nogueira"},{"@pid":"350/3829","text":"João Speglich"},{"@pid":"02/5996","text":"Murilo Boratto"}]},"title":"GPU performance analysis for viscoacoustic wave equations using fast stencil computation from the symbolic specification.","venue":"J. Supercomput.","volume":"79","number":"12","pages":"12853-12868","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/JesusNSB23","doi":"10.1007/S11227-023-05178-3","ee":"https://doi.org/10.1007/s11227-023-05178-3","url":"https://dblp.org/rec/journals/tjs/JesusNSB23"}, "url":"URL#248482" }, { "@score":"1", "@id":"248483", "info":{"authors":{"author":{"@pid":"72/4908","text":"Pranava K. Jha"}},"title":"Vertex transitivity and distance metric of the quad-cube.","venue":"J. Supercomput.","volume":"79","number":"13","pages":"13952-13970","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/Jha23","doi":"10.1007/S11227-023-05181-8","ee":"https://doi.org/10.1007/s11227-023-05181-8","url":"https://dblp.org/rec/journals/tjs/Jha23"}, "url":"URL#248483" }, { "@score":"1", "@id":"248484", "info":{"authors":{"author":[{"@pid":"260/3770","text":"Luyu Jiang"},{"@pid":"43/3931","text":"Dantong Ouyang"},{"@pid":"188/7826","text":"Huisi Zhou"},{"@pid":"224/9894","text":"Naiyu Tian"},{"@pid":"66/6011-5","text":"Liming Zhang 0005"}]},"title":"DPAHMA: a novel dual-population adaptive hybrid memetic algorithm for non-slicing VLSI floorplans.","venue":"J. Supercomput.","volume":"79","number":"14","pages":"15496-15534","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/JiangOZTZ23","doi":"10.1007/S11227-023-05277-1","ee":"https://doi.org/10.1007/s11227-023-05277-1","url":"https://dblp.org/rec/journals/tjs/JiangOZTZ23"}, "url":"URL#248484" }, { "@score":"1", "@id":"248485", "info":{"authors":{"author":[{"@pid":"346/0078","text":"Baoxing Jiang"},{"@pid":"216/5261","text":"Guangtao Xu"},{"@pid":"85/670","text":"Peiyu Liu"}]},"title":"Aspect-level sentiment classification via location enhanced aspect-merged graph convolutional networks.","venue":"J. Supercomput.","volume":"79","number":"9","pages":"9666-9691","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/JiangXL23","doi":"10.1007/S11227-022-05002-4","ee":"https://doi.org/10.1007/s11227-022-05002-4","url":"https://dblp.org/rec/journals/tjs/JiangXL23"}, "url":"URL#248485" }, { "@score":"1", "@id":"248486", "info":{"authors":{"author":[{"@pid":"357/5057","text":"Xuebin Jin"},{"@pid":"44/4790","text":"Yewang Chen"},{"@pid":"18/7544","text":"Wentao Fan"},{"@pid":"66/4615","text":"Yong Zhang"},{"@pid":"09/6169","text":"Jixiang Du"}]},"title":"Fast algorithm for parallel solving inversion of large scale small matrices based on GPU.","venue":"J. Supercomput.","volume":"79","number":"16","pages":"18313-18339","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/JinCFZD23","doi":"10.1007/S11227-023-05336-7","ee":"https://doi.org/10.1007/s11227-023-05336-7","url":"https://dblp.org/rec/journals/tjs/JinCFZD23"}, "url":"URL#248486" }, { "@score":"1", "@id":"248487", "info":{"authors":{"author":[{"@pid":"83/1396","text":"Chen Jing"},{"@pid":"68/1979","text":"Jincheng Huang"},{"@pid":"24/1518","text":"Xin Chen"},{"@pid":"196/5007","text":"Mingxin Liu"}]},"title":"Research on information dissemination model based on heat transfer in online social network.","venue":"J. Supercomput.","volume":"79","number":"7","pages":"7717-7735","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/JingHCL23","doi":"10.1007/S11227-022-04968-5","ee":"https://doi.org/10.1007/s11227-022-04968-5","url":"https://dblp.org/rec/journals/tjs/JingHCL23"}, "url":"URL#248487" }, { "@score":"1", "@id":"248488", "info":{"authors":{"author":[{"@pid":"288/8609","text":"Zhao Jingzhuan"},{"@pid":"36/31-2","text":"Xuan Zhang 0002"},{"@pid":"76/5013","text":"Chen Gao"},{"@pid":"288/3212","text":"Zhudong Li"},{"@pid":"337/6422","text":"Bao-lei Wang"}]},"title":"KG2Lib: knowledge-graph-based convolutional network for third-party library recommendation.","venue":"J. Supercomput.","volume":"79","number":"1","pages":"1-26","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/JingzhuanZGLW23","doi":"10.1007/S11227-022-04603-3","ee":"https://doi.org/10.1007/s11227-022-04603-3","url":"https://dblp.org/rec/journals/tjs/JingzhuanZGLW23"}, "url":"URL#248488" }, { "@score":"1", "@id":"248489", "info":{"authors":{"author":[{"@pid":"288/1323","text":"Jean Justus John"},{"@pid":"201/0873","text":"M. Anuradha"}]},"title":"Resource allocation scheme for CCRN using hybrid Giza Pyramids construction-based complex-valued satin bowerbird optimization.","venue":"J. Supercomput.","volume":"79","number":"5","pages":"4687-4712","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/JohnA23","doi":"10.1007/S11227-022-04761-4","ee":"https://doi.org/10.1007/s11227-022-04761-4","url":"https://dblp.org/rec/journals/tjs/JohnA23"}, "url":"URL#248489" }, { "@score":"1", "@id":"248490", "info":{"authors":{"author":[{"@pid":"306/1405","text":"Seyed Mohsen Ebadi Jokandan"},{"@pid":"49/2287","text":"Peyman Bayat"},{"@pid":"306/1452","text":"Mehdi Farrokhbakht Foumani"}]},"title":"Predicting product advertisement links using hybrid learning within social networks.","venue":"J. Supercomput.","volume":"79","number":"13","pages":"15023-15050","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/JokandanBF23","doi":"10.1007/S11227-023-05213-3","ee":"https://doi.org/10.1007/s11227-023-05213-3","url":"https://dblp.org/rec/journals/tjs/JokandanBF23"}, "url":"URL#248490" }, { "@score":"1", "@id":"248491", "info":{"authors":{"author":[{"@pid":"343/5968","text":"Nandkishor Joshi"},{"@pid":"217/3310","text":"S. C. Sharma 0001"}]},"title":"Switching algorithm in listen-and-talk-based MAC protocols for full-duplex cognitive radio networks with type 2 fuzzy cooperative spectrum sensing.","venue":"J. Supercomput.","volume":"79","number":"18","pages":"21235-21264","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/JoshiS23","doi":"10.1007/S11227-023-05477-9","ee":"https://doi.org/10.1007/s11227-023-05477-9","url":"https://dblp.org/rec/journals/tjs/JoshiS23"}, "url":"URL#248491" }, { "@score":"1", "@id":"248492", "info":{"authors":{"author":[{"@pid":"199/7246","text":"Mohamed Ouwais Kabaou"},{"@pid":"357/4638","text":"Zoghlami Nesrine"},{"@pid":"199/7075","text":"Hassen Hamouda"},{"@pid":"357/5323","text":"Baabou Fatma"}]},"title":"Performance evaluation of opportunistic schedulers based on fairness and throughput in new-generation mobile networks.","venue":"J. Supercomput.","volume":"79","number":"16","pages":"18053-18088","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/KabaouNHF23","doi":"10.1007/S11227-023-05308-X","ee":"https://doi.org/10.1007/s11227-023-05308-x","url":"https://dblp.org/rec/journals/tjs/KabaouNHF23"}, "url":"URL#248492" }, { "@score":"1", "@id":"248493", "info":{"authors":{"author":[{"@pid":"256/0616","text":"Dhruba Jyoti Kalita"},{"@pid":"195/5321","text":"Vibhav Prakash Singh"},{"@pid":"19/2279","text":"Vinay Kumar"}]},"title":"A lightweight knowledge-based PSO for SVM hyper-parameters tuning in a dynamic environment.","venue":"J. Supercomput.","volume":"79","number":"16","pages":"18777-18799","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/KalitaSK23","doi":"10.1007/S11227-023-05385-Y","ee":"https://doi.org/10.1007/s11227-023-05385-y","url":"https://dblp.org/rec/journals/tjs/KalitaSK23"}, "url":"URL#248493" }, { "@score":"1", "@id":"248494", "info":{"authors":{"author":[{"@pid":"339/4916","text":"Nadia Kalsoom"},{"@pid":"15/3695","text":"Asad Waqar Malik"},{"@pid":"202/0577","text":"Anis Ur Rahman 0001"},{"@pid":"155/8344","text":"Muhammad Ahsan"},{"@pid":"148/8385","text":"Arsalan Ahmad"}]},"title":"SUDV: Malicious fog node management framework for software update dissemination in connected vehicles.","venue":"J. Supercomput.","volume":"79","number":"4","pages":"4534-4555","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/KalsoomMRAA23","doi":"10.1007/S11227-022-04829-1","ee":"https://doi.org/10.1007/s11227-022-04829-1","url":"https://dblp.org/rec/journals/tjs/KalsoomMRAA23"}, "url":"URL#248494" }, { "@score":"1", "@id":"248495", "info":{"authors":{"author":[{"@pid":"337/6512","text":"Célestin Tshimanga Kamanga"},{"@pid":"178/5628","text":"Emmanuel Bugingo"},{"@pid":"337/6550","text":"Simon Ntumba Badibanga"},{"@pid":"308/8223","text":"Eugene Mbuyi Mukendi"}]},"title":"A multi-criteria decision making heuristic for workflow scheduling in cloud computing environment.","venue":"J. Supercomput.","volume":"79","number":"1","pages":"243-264","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/KamangaBBM23","doi":"10.1007/S11227-022-04677-Z","ee":"https://doi.org/10.1007/s11227-022-04677-z","url":"https://dblp.org/rec/journals/tjs/KamangaBBM23"}, "url":"URL#248495" }, { "@score":"1", "@id":"248496", "info":{"title":"Retraction Note: Smart communication using tri-spectral sign recognition for hearing-impaired people.","venue":"J. Supercomput.","volume":"79","number":"5","pages":"5834-5835","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/KanishaMBVK23","doi":"10.1007/S11227-022-04859-9","ee":"https://doi.org/10.1007/s11227-022-04859-9","url":"https://dblp.org/rec/journals/tjs/KanishaMBVK23"}, "url":"URL#248496" }, { "@score":"1", "@id":"248497", "info":{"authors":{"author":[{"@pid":"358/2139","text":"Purbani Kar"},{"@pid":"127/3488","text":"Swapan Debbarma"}]},"title":"Multilingual hate speech detection sentimental analysis on social media platforms using optimal feature extraction and hybrid diagonal gated recurrent neural network.","venue":"J. Supercomput.","volume":"79","number":"17","pages":"19515-19546","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/KarD23","doi":"10.1007/S11227-023-05361-6","ee":"https://doi.org/10.1007/s11227-023-05361-6","url":"https://dblp.org/rec/journals/tjs/KarD23"}, "url":"URL#248497" }, { "@score":"1", "@id":"248498", "info":{"authors":{"author":[{"@pid":"357/5249","text":"Osman Volkan Karaca"},{"@pid":"49/10023","text":"Kayhan M. Imre"},{"@pid":"79/5665","text":"Ali Ziya Alkar"}]},"title":"Network accelerator for parallel discrete event simulations.","venue":"J. Supercomput.","volume":"79","number":"16","pages":"18728-18747","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/KaracaIA23","doi":"10.1007/S11227-023-05365-2","ee":"https://doi.org/10.1007/s11227-023-05365-2","url":"https://dblp.org/rec/journals/tjs/KaracaIA23"}, "url":"URL#248498" }, { "@score":"1", "@id":"248499", "info":{"authors":{"author":[{"@pid":"278/5771","text":"Mouna Karaja"},{"@pid":"148/0869","text":"Abir Chaabani"},{"@pid":"124/8432","text":"Ameni Azzouz"},{"@pid":"91/4996","text":"Lamjed Ben Said"}]},"title":"Dynamic bag-of-tasks scheduling problem in a heterogeneous multi-cloud environment: a taxonomy and a new bi-level multi-follower modeling.","venue":"J. Supercomput.","volume":"79","number":"15","pages":"17716-17753","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/KarajaCAS23","doi":"10.1007/S11227-023-05341-W","ee":"https://doi.org/10.1007/s11227-023-05341-w","url":"https://dblp.org/rec/journals/tjs/KarajaCAS23"}, "url":"URL#248499" }, { "@score":"1", "@id":"248500", "info":{"authors":{"author":[{"@pid":"354/8989","text":"Akanksha Karotia"},{"@pid":"134/9243","text":"Seba Susan"}]},"title":"CovSumm: an unsupervised transformer-cum-graph-based hybrid document summarization model for CORD-19.","venue":"J. Supercomput.","volume":"79","number":"14","pages":"16328-16350","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/KarotiaS23","doi":"10.1007/S11227-023-05291-3","ee":"https://doi.org/10.1007/s11227-023-05291-3","url":"https://dblp.org/rec/journals/tjs/KarotiaS23"}, "url":"URL#248500" }, { "@score":"1", "@id":"248501", "info":{"authors":{"author":[{"@pid":"293/1329","text":"Stelios Karozis"},{"@pid":"00/11537","text":"Xenia Ziouvelou"},{"@pid":"79/5857","text":"Vangelis Karkaletsis"}]},"title":"Mapping the national HPC ecosystem and training needs: The Greek paradigm.","venue":"J. Supercomput.","volume":"79","number":"10","pages":"10691-10705","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/KarozisZK23","doi":"10.1007/S11227-023-05080-Y","ee":"https://doi.org/10.1007/s11227-023-05080-y","url":"https://dblp.org/rec/journals/tjs/KarozisZK23"}, "url":"URL#248501" }, { "@score":"1", "@id":"248502", "info":{"title":"Retraction Note: Energy consumption analysis of Virtual Machine migration in cloud using hybrid swarm optimization (ABC-BA).","venue":"J. Supercomput.","volume":"79","number":"5","pages":"5832-5833","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/KarthikeyanSSLVEM23","doi":"10.1007/S11227-022-04860-2","ee":"https://doi.org/10.1007/s11227-022-04860-2","url":"https://dblp.org/rec/journals/tjs/KarthikeyanSSLVEM23"}, "url":"URL#248502" }, { "@score":"1", "@id":"248503", "info":{"authors":{"author":[{"@pid":"267/8063","text":"Anirudh Kasturi"},{"@pid":"50/4401","text":"Chittaranjan Hota"}]},"title":"OSGAN: One-shot distributed learning using generative adversarial networks.","venue":"J. Supercomput.","volume":"79","number":"12","pages":"13620-13640","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/KasturiH23","doi":"10.1007/S11227-023-05182-7","ee":"https://doi.org/10.1007/s11227-023-05182-7","url":"https://dblp.org/rec/journals/tjs/KasturiH23"}, "url":"URL#248503" }, { "@score":"1", "@id":"248504", "info":{"authors":{"author":[{"@pid":"209/5356","text":"Kiranbir Kaur"},{"@pid":"327/5119","text":"Salil Bharany"},{"@pid":"258/4941","text":"Sumit Badotra"},{"@pid":"145/3946","text":"Karan Aggarwal"},{"@pid":"157/3056","text":"Anand Nayyar"},{"@pid":"11/2278-2","text":"Sandeep Sharma 0002"}]},"title":"Energy-efficient polyglot persistence database live migration among heterogeneous clouds.","venue":"J. Supercomput.","volume":"79","number":"1","pages":"265-294","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/KaurBBANS23","doi":"10.1007/S11227-022-04662-6","ee":"https://doi.org/10.1007/s11227-022-04662-6","url":"https://dblp.org/rec/journals/tjs/KaurBBANS23"}, "url":"URL#248504" }, { "@score":"1", "@id":"248505", "info":{"authors":{"author":[{"@pid":"25/531","text":"Jasleen Kaur"},{"@pid":"75/4223-1","text":"Rajeev Kumar 0001"},{"@pid":"60/7554","text":"Alka Agrawal"},{"@pid":"01/8037","text":"Raees Ahmad Khan"}]},"title":"A neutrosophic AHP-based computational technique for security management in a fog computing network.","venue":"J. Supercomput.","volume":"79","number":"1","pages":"295-320","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/KaurKAK23","doi":"10.1007/S11227-022-04674-2","ee":"https://doi.org/10.1007/s11227-022-04674-2","url":"https://dblp.org/rec/journals/tjs/KaurKAK23"}, "url":"URL#248505" }, { "@score":"1", "@id":"248506", "info":{"authors":{"author":[{"@pid":"80/4424","text":"Prabhjot Kaur"},{"@pid":"35/2565","text":"Nitin Kumar"},{"@pid":"179/7496","text":"Maheep Singh"}]},"title":"SURFBCS: speeded up robust features based fuzzy vault scheme in biometric cryptosystem.","venue":"J. Supercomput.","volume":"79","number":"11","pages":"12292-12316","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/KaurKS23","doi":"10.1007/S11227-023-05142-1","ee":"https://doi.org/10.1007/s11227-023-05142-1","url":"https://dblp.org/rec/journals/tjs/KaurKS23"}, "url":"URL#248506" }, { "@score":"1", "@id":"248507", "info":{"authors":{"author":[{"@pid":"248/1959","text":"Mehrdad Kaveh"},{"@pid":"10/5462","text":"Mohammad Saadi Mesgari"},{"@pid":"137/9197","text":"Diego Martín 0001"},{"@pid":"270/6848","text":"Masoud Kaveh"}]},"title":"TDMBBO: a novel three-dimensional migration model of biogeography-based optimization (case study: facility planning and benchmark problems).","venue":"J. Supercomput.","volume":"79","number":"9","pages":"9715-9770","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/KavehMMK23","doi":"10.1007/S11227-023-05047-Z","ee":"https://doi.org/10.1007/s11227-023-05047-z","url":"https://dblp.org/rec/journals/tjs/KavehMMK23"}, "url":"URL#248507" }, { "@score":"1", "@id":"248508", "info":{"authors":{"author":[{"@pid":"309/7593","text":"Parisa Kavianpour"},{"@pid":"309/5993","text":"Mohammadreza Kavianpour"},{"@pid":"142/1275","text":"Ehsan Jahani"},{"@pid":"60/3107","text":"Amin Ramezani"}]},"title":"A CNN-BiLSTM model with attention mechanism for earthquake prediction.","venue":"J. Supercomput.","volume":"79","number":"17","pages":"19194-19226","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/KavianpourKJR23","doi":"10.1007/S11227-023-05369-Y","ee":"https://doi.org/10.1007/s11227-023-05369-y","url":"https://dblp.org/rec/journals/tjs/KavianpourKJR23"}, "url":"URL#248508" }, { "@score":"1", "@id":"248509", "info":{"authors":{"author":[{"@pid":"303/3226","text":"Devrim Kayali"},{"@pid":"349/3089","text":"Nemah Abu Shama"},{"@pid":"349/2965","text":"Suleyman Asir"},{"@pid":"53/4889","text":"Kamil Dimililer"}]},"title":"Machine learning-based models for the qualitative classification of potassium ferrocyanide using electrochemical methods.","venue":"J. Supercomput.","volume":"79","number":"11","pages":"12472-12491","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/KayaliSAD23","doi":"10.1007/S11227-023-05137-Y","ee":"https://doi.org/10.1007/s11227-023-05137-y","url":"https://dblp.org/rec/journals/tjs/KayaliSAD23"}, "url":"URL#248509" }, { "@score":"1", "@id":"248510", "info":{"authors":{"author":[{"@pid":"336/5906","text":"Maemoona Kayani"},{"@pid":"60/1980","text":"Abdul Ghafoor"},{"@pid":"123/2238","text":"Muhammad Mohsin Riaz"}]},"title":"Multi-modal text recognition and encryption in scanned document images.","venue":"J. Supercomput.","volume":"79","number":"7","pages":"7916-7936","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/KayaniGR23","doi":"10.1007/S11227-022-04912-7","ee":"https://doi.org/10.1007/s11227-022-04912-7","url":"https://dblp.org/rec/journals/tjs/KayaniGR23"}, "url":"URL#248510" }, { "@score":"1", "@id":"248511", "info":{"authors":{"author":[{"@pid":"92/11159","text":"Nesrine Khabou"},{"@pid":"85/794","text":"Ismael Bouassida Rodriguez"},{"@pid":"58/6741","text":"Mohamed Jmaiel"}]},"title":"Introduction to the special issue on new trends in autonomous systems engineering.","venue":"J. Supercomput.","volume":"79","number":"8","pages":"9368-9370","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/KhabouRJ23","doi":"10.1007/S11227-023-05157-8","ee":"https://doi.org/10.1007/s11227-023-05157-8","url":"https://dblp.org/rec/journals/tjs/KhabouRJ23"}, "url":"URL#248511" }, { "@score":"1", "@id":"248512", "info":{"authors":{"author":[{"@pid":"176/2577","text":"Ali A. Khalil"},{"@pid":"00/4303","text":"Mostafa El-Khamy"},{"@pid":"323/9800","text":"Fatma E. Ibrahim"},{"@pid":"03/4769","text":"Ashraf A. M. Khalaf"},{"@pid":"357/4663","text":"Entessar Gemeay"},{"@pid":"357/4809","text":"Hossam Kasem"},{"@pid":"173/8148","text":"Salah Eldeen A. Khamis"},{"@pid":"192/8791","text":"Ghada M. El Banby"},{"@pid":"78/10698","text":"Walid El-Shafai"},{"@pid":"04/8069","text":"El-Sayed M. El-Rabaie"},{"@pid":"209/6521","text":"Adel S. El-Fishawy"},{"@pid":"76/2326","text":"Moawad I. Dessouky"},{"@pid":"138/6890","text":"Ibrahim M. El-Dokany"},{"@pid":"175/4651","text":"Turky N. Alotaiby"},{"@pid":"73/9201","text":"Saleh A. Alshebeili"},{"@pid":"64/4299","text":"Fathi E. Abd El-Samie"}]},"title":"Efficient frameworks for statistical seizure detection and prediction.","venue":"J. Supercomput.","volume":"79","number":"16","pages":"17824-17858","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/KhalilEIKGKKBEEEDEAAE23","doi":"10.1007/S11227-022-05030-0","ee":"https://doi.org/10.1007/s11227-022-05030-0","url":"https://dblp.org/rec/journals/tjs/KhalilEIKGKKBEEEDEAAE23"}, "url":"URL#248512" }, { "@score":"1", "@id":"248513", "info":{"authors":{"author":[{"@pid":"293/1233","text":"Ebrahim Khalili"},{"@pid":"219/2970","text":"Razieh Malekhosseini"},{"@pid":"282/3234","text":"S. Hadi Yaghoubyan"},{"@pid":"202/8221","text":"Karamollah Bagherifard"},{"@pid":"54/5936","text":"Hamid Parvin"}]},"title":"Sequential semi-supervised active learning model in extremely low training set (SSSAL).","venue":"J. Supercomput.","volume":"79","number":"6","pages":"6646-6673","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/KhaliliMYBP23","doi":"10.1007/S11227-022-04847-Z","ee":"https://doi.org/10.1007/s11227-022-04847-z","url":"https://dblp.org/rec/journals/tjs/KhaliliMYBP23"}, "url":"URL#248513" }, { "@score":"1", "@id":"248514", "info":{"authors":{"author":[{"@pid":"184/9296","text":"Muhammad Hassan Khan"},{"@pid":"358/1855","text":"Hiba Azam"},{"@pid":"137/2340","text":"Muhammad Shahid Farid"}]},"title":"Automatic multi-gait recognition using pedestrian's spatiotemporal features.","venue":"J. Supercomput.","volume":"79","number":"17","pages":"19254-19276","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/KhanAF23","doi":"10.1007/S11227-023-05391-0","ee":"https://doi.org/10.1007/s11227-023-05391-0","url":"https://dblp.org/rec/journals/tjs/KhanAF23"}, "url":"URL#248514" }, { "@score":"1", "@id":"248515", "info":{"authors":{"author":[{"@pid":"k/UmairKhan","text":"Umair Khan"},{"@pid":"218/1863","text":"Muazzam Maqsood"},{"@pid":"230/2890","text":"Saira Andleeb Gillani"},{"@pid":"150/1430","text":"Mehr Yahya Durrani"},{"@pid":"73/8780","text":"Irfan Mehmood"},{"@pid":"65/2417","text":"Sanghyun Seo"}]},"title":"A deep learning-based framework for accurate identification and crop estimation of olive trees.","venue":"J. Supercomput.","volume":"79","number":"2","pages":"1834-1855","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/KhanMGDMS23","doi":"10.1007/S11227-022-04738-3","ee":"https://doi.org/10.1007/s11227-022-04738-3","url":"https://dblp.org/rec/journals/tjs/KhanMGDMS23"}, "url":"URL#248515" }, { "@score":"1", "@id":"248516", "info":{"authors":{"author":[{"@pid":"341/7835","text":"Bikram Khanal"},{"@pid":"314/1958","text":"Javier Orduz"},{"@pid":"87/8582","text":"Pablo Rivas 0001"},{"@pid":"341/7949","text":"Erich Baker"}]},"title":"Supercomputing leverages quantum machine learning and Grover's algorithm.","venue":"J. Supercomput.","volume":"79","number":"6","pages":"6918-6940","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/KhanalORB23","doi":"10.1007/S11227-022-04923-4","ee":"https://doi.org/10.1007/s11227-022-04923-4","url":"https://dblp.org/rec/journals/tjs/KhanalORB23"}, "url":"URL#248516" }, { "@score":"1", "@id":"248517", "info":{"authors":{"author":[{"@pid":"80/5117-3","text":"Gaurav Khanna 0003"},{"@pid":"67/9120","text":"Sanjay K. Chaturvedi"},{"@pid":"06/635","text":"Mohamed Othman"}]},"title":"Publisher Correction: On design and performance analysis of improved shuffle exchange gamma interconnection network layouts.","venue":"J. Supercomput.","volume":"79","number":"5","pages":"5829-5830","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/KhannaCO23","doi":"10.1007/S11227-022-04844-2","ee":"https://doi.org/10.1007/s11227-022-04844-2","url":"https://dblp.org/rec/journals/tjs/KhannaCO23"}, "url":"URL#248517" }, { "@score":"1", "@id":"248518", "info":{"authors":{"author":[{"@pid":"80/5117-3","text":"Gaurav Khanna 0003"},{"@pid":"67/9120","text":"Sanjay K. Chaturvedi"},{"@pid":"06/635","text":"Mohamed Othman"}]},"title":"Publisher Correction to: On design and performance analysis of improved shuffle exchange gamma interconnection network layouts.","venue":"J. Supercomput.","volume":"79","number":"7","pages":"8150-8151","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/KhannaCO23a","doi":"10.1007/S11227-022-04892-8","ee":"https://doi.org/10.1007/s11227-022-04892-8","url":"https://dblp.org/rec/journals/tjs/KhannaCO23a"}, "url":"URL#248518" }, { "@score":"1", "@id":"248519", "info":{"authors":{"author":[{"@pid":"72/5176","text":"Ahmed M. Khedr"},{"@pid":"356/2038","text":"S. Sheeja Rani"},{"@pid":"69/4582","text":"Mohamed Saad"}]},"title":"Hybridized Dragonfly and Jaya algorithm for optimal sensor node location identification in mobile wireless sensor networks.","venue":"J. Supercomput.","volume":"79","number":"15","pages":"16940-16962","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/KhedrRS23","doi":"10.1007/S11227-023-05326-9","ee":"https://doi.org/10.1007/s11227-023-05326-9","url":"https://dblp.org/rec/journals/tjs/KhedrRS23"}, "url":"URL#248519" }, { "@score":"1", "@id":"248520", "info":{"authors":{"author":[{"@pid":"350/3891","text":"Keihaneh Kia"},{"@pid":"58/5580","text":"Amir Rajabzadeh"}]},"title":"HDSAP: heterogeneity-aware dynamic scheduling algorithm to improve performance of nanoscale many-core processors for unknown workloads.","venue":"J. Supercomput.","volume":"79","number":"12","pages":"13341-13369","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/KiaR23","doi":"10.1007/S11227-023-05159-6","ee":"https://doi.org/10.1007/s11227-023-05159-6","url":"https://dblp.org/rec/journals/tjs/KiaR23"}, "url":"URL#248520" }, { "@score":"1", "@id":"248521", "info":{"title":"Retraction Note: Simulator considering modeling and performance evaluation for high-performance computing of collaborative-based mobile cloud infrastructure.","venue":"J. Supercomput.","volume":"79","number":"5","pages":"5837","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/KimKJ23","doi":"10.1007/S11227-022-04857-X","ee":"https://doi.org/10.1007/s11227-022-04857-x","url":"https://dblp.org/rec/journals/tjs/KimKJ23"}, "url":"URL#248521" }, { "@score":"1", "@id":"248522", "info":{"authors":{"author":[{"@pid":"98/52","text":"Eunsook Kim"},{"@pid":"181/1455","text":"Kyungwoon Lee"},{"@pid":"12/4989","text":"Chuck Yoo"}]},"title":"Network SLO-aware container scheduling in Kubernetes.","venue":"J. Supercomput.","volume":"79","number":"10","pages":"11478-11494","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/KimLY23","doi":"10.1007/S11227-023-05122-5","ee":"https://doi.org/10.1007/s11227-023-05122-5","url":"https://dblp.org/rec/journals/tjs/KimLY23"}, "url":"URL#248522" }, { "@score":"1", "@id":"248523", "info":{"authors":{"author":[{"@pid":"195/7925","text":"Minju Kim"},{"@pid":"305/9950","text":"Yeonghun Shin"},{"@pid":"169/2972","text":"Wooyeon Jo"},{"@pid":"15/5924","text":"Taeshik Shon"}]},"title":"Digital forensic analysis of intelligent and smart IoT devices.","venue":"J. Supercomput.","volume":"79","number":"1","pages":"973-997","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/KimSJS23","doi":"10.1007/S11227-022-04639-5","ee":"https://doi.org/10.1007/s11227-022-04639-5","url":"https://dblp.org/rec/journals/tjs/KimSJS23"}, "url":"URL#248523" }, { "@score":"1", "@id":"248524", "info":{"authors":{"author":[{"@pid":"35/8865","text":"Murat Kirisçi"},{"@pid":"42/7087","text":"Necip Simsek"}]},"title":"A novel kernel principal component analysis with application disaster preparedness of hospital: interval-valued Fermatean fuzzy set approach.","venue":"J. Supercomput.","volume":"79","number":"17","pages":"19848-19878","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/KirisciS23","doi":"10.1007/S11227-023-05395-W","ee":"https://doi.org/10.1007/s11227-023-05395-w","url":"https://dblp.org/rec/journals/tjs/KirisciS23"}, "url":"URL#248524" }, { "@score":"1", "@id":"248525", "info":{"authors":{"author":[{"@pid":"292/0623","text":"Mohammad Mahdi Emadi Kouchak"},{"@pid":"41/4838","text":"Farshad Safaei"},{"@pid":"02/2090","text":"M. Reshadi"}]},"title":"Graph entropies-graph energies indices for quantifying network structural irregularity.","venue":"J. Supercomput.","volume":"79","number":"2","pages":"1705-1749","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/KouchakSR23","doi":"10.1007/S11227-022-04724-9","ee":"https://doi.org/10.1007/s11227-022-04724-9","url":"https://dblp.org/rec/journals/tjs/KouchakSR23"}, "url":"URL#248525" }, { "@score":"1", "@id":"248526", "info":{"authors":{"author":[{"@pid":"231/1626","text":"Endah Kristiani"},{"@pid":"23/6936","text":"Yi-Chun Chen"},{"@pid":"y/ChaoTungYang","text":"Chao-Tung Yang"},{"@pid":"08/5848","text":"Chia-Hsin Li"}]},"title":"Flame and smoke recognition on smart edge using deep learning.","venue":"J. Supercomput.","volume":"79","number":"5","pages":"5552-5575","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/KristianiCYL23","doi":"10.1007/S11227-022-04884-8","ee":"https://doi.org/10.1007/s11227-022-04884-8","url":"https://dblp.org/rec/journals/tjs/KristianiCYL23"}, "url":"URL#248526" }, { "@score":"1", "@id":"248527", "info":{"authors":{"author":[{"@pid":"293/5928","text":"Sagar Kudkelwar"},{"@pid":"252/2350","text":"Bam Bahadur Sinha"},{"@pid":"297/2616","text":"Sravan Kumar Gunturi"}]},"title":"An Archimedes metaheuristic algorithm based optimum relay coordination in microgrid and combined overhead/cable distribution network.","venue":"J. Supercomput.","volume":"79","number":"18","pages":"21166-21184","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/KudkelwarSG23","doi":"10.1007/S11227-023-05486-8","ee":"https://doi.org/10.1007/s11227-023-05486-8","url":"https://dblp.org/rec/journals/tjs/KudkelwarSG23"}, "url":"URL#248527" }, { "@score":"1", "@id":"248528", "info":{"authors":{"author":[{"@pid":"302/2616","text":"Martin Joachim Kühn"},{"@pid":"168/8846","text":"Johannes Holke"},{"@pid":"304/4498","text":"Annette Lutz"},{"@pid":"64/9744","text":"Jonas Thies"},{"@pid":"155/4957","text":"Melven Röhrig-Zöllner"},{"@pid":"350/4280","text":"Alexander Bleh"},{"@pid":"185/1395","text":"Jan Backhaus"},{"@pid":"60/200","text":"Achim Basermann"}]},"title":"SIMD vectorization for simultaneous solution of locally varying linear systems with multiple right-hand sides.","venue":"J. Supercomput.","volume":"79","number":"13","pages":"14684-14706","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/KuhnHLTRBBB23","doi":"10.1007/S11227-023-05220-4","ee":"https://doi.org/10.1007/s11227-023-05220-4","url":"https://dblp.org/rec/journals/tjs/KuhnHLTRBBB23"}, "url":"URL#248528" }, { "@score":"1", "@id":"248529", "info":{"authors":{"author":[{"@pid":"19/139","text":"Rohit Kumar"},{"@pid":"40/2795","text":"Neha Agrawal"}]},"title":"A survey on software-defined vehicular networks (SDVNs): a security perspective.","venue":"J. Supercomput.","volume":"79","number":"8","pages":"8368-8400","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/KumarA23","doi":"10.1007/S11227-022-05008-Y","ee":"https://doi.org/10.1007/s11227-022-05008-y","url":"https://dblp.org/rec/journals/tjs/KumarA23"}, "url":"URL#248529" }, { "@score":"1", "@id":"248530", "info":{"authors":{"author":[{"@pid":"01/6902","text":"Sumit Kumar"},{"@pid":"03/9559","text":"Neera Batra"},{"@pid":"31/4964-2","text":"Shrawan Kumar 0002"}]},"title":"Optimized localization in large-scale heterogeneous WSN.","venue":"J. Supercomput.","volume":"79","number":"6","pages":"6705-6729","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/KumarBK23","doi":"10.1007/S11227-022-04922-5","ee":"https://doi.org/10.1007/s11227-022-04922-5","url":"https://dblp.org/rec/journals/tjs/KumarBK23"}, "url":"URL#248530" }, { "@score":"1", "@id":"248531", "info":{"authors":{"author":[{"@pid":"34/5378","text":"Ashish Kumar"},{"@pid":"40/7851","text":"Kakali Chatterjee"}]},"title":"A lightweight blockchain-based framework for medical cyber-physical system.","venue":"J. Supercomput.","volume":"79","number":"11","pages":"12013-12041","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/KumarC23","doi":"10.1007/S11227-023-05133-2","ee":"https://doi.org/10.1007/s11227-023-05133-2","url":"https://dblp.org/rec/journals/tjs/KumarC23"}, "url":"URL#248531" }, { "@score":"1", "@id":"248532", "info":{"authors":{"author":[{"@pid":"81/8673","text":"Jatinder Kumar"},{"@pid":"83/6555","text":"Rishabh Gupta"},{"@pid":"172/8855","text":"Deepika Saxena"},{"@pid":"94/3731-1","text":"Ashutosh Kumar Singh 0001"}]},"title":"Power consumption forecast model using ensemble learning for smart grid.","venue":"J. Supercomput.","volume":"79","number":"10","pages":"11007-11028","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/KumarGSS23","doi":"10.1007/S11227-023-05096-4","ee":"https://doi.org/10.1007/s11227-023-05096-4","url":"https://dblp.org/rec/journals/tjs/KumarGSS23"}, "url":"URL#248532" }, { "@score":"1", "@id":"248533", "info":{"authors":{"author":[{"@pid":"48/253","text":"Raman Kumar"},{"@pid":"71/5580","text":"Anuj Jain"}]},"title":"Driving behavior analysis and classification by vehicle OBD data using machine learning.","venue":"J. Supercomput.","volume":"79","number":"16","pages":"18800-18819","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/KumarJ23","doi":"10.1007/S11227-023-05364-3","ee":"https://doi.org/10.1007/s11227-023-05364-3","url":"https://dblp.org/rec/journals/tjs/KumarJ23"}, "url":"URL#248533" }, { "@score":"1", "@id":"248534", "info":{"authors":{"author":[{"@pid":"331/3400","text":"P. Hari Kumar"},{"@pid":"240/7071","text":"G. S. Anandha Mala"}]},"title":"HMAC-R: Hash-based message authentication code and Rijndael-based multilevel security model for data storage in cloud environment.","venue":"J. Supercomput.","volume":"79","number":"3","pages":"3181-3209","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/KumarM23","doi":"10.1007/S11227-022-04714-X","ee":"https://doi.org/10.1007/s11227-022-04714-x","url":"https://dblp.org/rec/journals/tjs/KumarM23"}, "url":"URL#248534" }, { "@score":"1", "@id":"248535", "info":{"authors":{"author":[{"@pid":"65/4930","text":"Sanjay Kumar"},{"@pid":"36/7496","text":"Abhishek Mallik"},{"@pid":"204/9830","text":"Sandeep Singh Sengar"}]},"title":"Community detection in complex networks using stacked autoencoders and crow search algorithm.","venue":"J. Supercomput.","volume":"79","number":"3","pages":"3329-3356","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/KumarMS23","doi":"10.1007/S11227-022-04767-Y","ee":"https://doi.org/10.1007/s11227-022-04767-y","url":"https://dblp.org/rec/journals/tjs/KumarMS23"}, "url":"URL#248535" }, { "@score":"1", "@id":"248536", "info":{"authors":{"author":[{"@pid":"44/4194","text":"Pankaj Kumar"},{"@pid":"06/5384","text":"Hari Om"}]},"title":"An anonymous and authenticated V2I communication with a simplified user revocation and re-registration strategy.","venue":"J. Supercomput.","volume":"79","number":"7","pages":"8070-8096","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/KumarO23","doi":"10.1007/S11227-022-04978-3","ee":"https://doi.org/10.1007/s11227-022-04978-3","url":"https://dblp.org/rec/journals/tjs/KumarO23"}, "url":"URL#248536" }, { "@score":"1", "@id":"248537", "info":{"authors":{"author":[{"@pid":"280/7139","text":"E. Praveen Kumar"},{"@pid":"78/8830","text":"S. Priyanka"}]},"title":"A password less authentication protocol for multi-server environment using physical unclonable function.","venue":"J. Supercomput.","volume":"79","number":"18","pages":"21474-21506","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/KumarP23","doi":"10.1007/S11227-023-05437-3","ee":"https://doi.org/10.1007/s11227-023-05437-3","url":"https://dblp.org/rec/journals/tjs/KumarP23"}, "url":"URL#248537" }, { "@score":"1", "@id":"248538", "info":{"authors":{"author":[{"@pid":"35/4304","text":"Ram Kumar"},{"@pid":"217/3310","text":"S. C. Sharma 0001"}]},"title":"Hybrid optimization and ontology-based semantic model for efficient text-based information retrieval.","venue":"J. Supercomput.","volume":"79","number":"2","pages":"2251-2280","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/KumarS23","doi":"10.1007/S11227-022-04708-9","ee":"https://doi.org/10.1007/s11227-022-04708-9","url":"https://dblp.org/rec/journals/tjs/KumarS23"}, "url":"URL#248538" }, { "@score":"1", "@id":"248539", "info":{"authors":{"author":[{"@pid":"302/5886","text":"Punam Kumari"},{"@pid":"132/3946","text":"Bhaskar Mondal"}]},"title":"Lightweight image encryption algorithm using NLFSR and CBC mode.","venue":"J. Supercomput.","volume":"79","number":"17","pages":"19452-19472","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/KumariM23","doi":"10.1007/S11227-023-05415-9","ee":"https://doi.org/10.1007/s11227-023-05415-9","url":"https://dblp.org/rec/journals/tjs/KumariM23"}, "url":"URL#248539" }, { "@score":"1", "@id":"248540", "info":{"authors":{"author":[{"@pid":"325/9509","text":"Yigit Çagatay Kuyu"},{"@pid":"200/6120","text":"Fahri Vatansever"}]},"title":"A conceptual investigation of the effect of random numbers over the performance of metaheuristic algorithms.","venue":"J. Supercomput.","volume":"79","number":"13","pages":"13971-14038","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/KuyuV23","doi":"10.1007/S11227-023-05111-8","ee":"https://doi.org/10.1007/s11227-023-05111-8","url":"https://dblp.org/rec/journals/tjs/KuyuV23"}, "url":"URL#248540" }, { "@score":"1", "@id":"248541", "info":{"authors":{"author":[{"@pid":"285/8137","text":"Soobin Kwak"},{"@pid":"66/11178","text":"Seokjun Ham"},{"@pid":"319/8161","text":"Youngjin Hwang"},{"@pid":"10/1976","text":"Junseok Kim"}]},"title":"Estimation and prediction of the multiply exponentially decaying daily case fatality rate of COVID-19.","venue":"J. Supercomput.","volume":"79","number":"10","pages":"11159-11169","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/KwakHHK23","doi":"10.1007/S11227-023-05119-0","ee":"https://doi.org/10.1007/s11227-023-05119-0","url":"https://dblp.org/rec/journals/tjs/KwakHHK23"}, "url":"URL#248541" }, { "@score":"1", "@id":"248542", "info":{"authors":{"author":[{"@pid":"82/6454","text":"Christos Kyriakopoulos"},{"@pid":"g/EfstratiosGallopoulos","text":"Efstratios Gallopoulos"},{"@pid":"79/4904","text":"Ioannis E. Venetis"}]},"title":"Hierarchical dynamic workload scheduling on heterogeneous clusters for grid search of inverse problems.","venue":"J. Supercomput.","volume":"79","number":"15","pages":"16720-16772","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/KyriakopoulosGV23","doi":"10.1007/S11227-023-05306-Z","ee":"https://doi.org/10.1007/s11227-023-05306-z","url":"https://dblp.org/rec/journals/tjs/KyriakopoulosGV23"}, "url":"URL#248542" }, { "@score":"1", "@id":"248543", "info":{"authors":{"author":[{"@pid":"151/1361","text":"Taher Labidi"},{"@pid":"247/7868","text":"Zaineb Sakhrawi"}]},"title":"On the value of parameter tuning in stacking ensemble model for software regression test effort estimation.","venue":"J. Supercomput.","volume":"79","number":"15","pages":"17123-17145","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/LabidiS23","doi":"10.1007/S11227-023-05334-9","ee":"https://doi.org/10.1007/s11227-023-05334-9","url":"https://dblp.org/rec/journals/tjs/LabidiS23"}, "url":"URL#248543" }, { "@score":"1", "@id":"248544", "info":{"authors":{"author":[{"@pid":"294/6834","text":"Diogo Lages"},{"@pid":"206/0199","text":"Eric Borba"},{"@pid":"t/EduardoTavares","text":"Eduardo Tavares"},{"@pid":"350/4273","text":"Andson Balieiro"},{"@pid":"350/3942","text":"Erica Souza"}]},"title":"A CPN-based model for assessing energy consumption of IoT networks.","venue":"J. Supercomput.","volume":"79","number":"12","pages":"12978-13000","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/LagesBTBS23","doi":"10.1007/S11227-023-05185-4","ee":"https://doi.org/10.1007/s11227-023-05185-4","url":"https://dblp.org/rec/journals/tjs/LagesBTBS23"}, "url":"URL#248544" }, { "@score":"1", "@id":"248545", "info":{"authors":{"author":[{"@pid":"26/1915","text":"Chun-Ming Lai"},{"@pid":"15/6741","text":"Ting-Wei Chang"},{"@pid":"y/ChaoTungYang","text":"Chao-Tung Yang"}]},"title":"An online and highly-scalable streaming platform for filtering trolls with transfer learning.","venue":"J. Supercomput.","volume":"79","number":"15","pages":"16664-16687","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/LaiCY23","doi":"10.1007/S11227-023-05312-1","ee":"https://doi.org/10.1007/s11227-023-05312-1","url":"https://dblp.org/rec/journals/tjs/LaiCY23"}, "url":"URL#248545" }, { "@score":"1", "@id":"248546", "info":{"authors":{"author":{"@pid":"83/3212","text":"Gun Ho Lee"}},"title":"Clustering customer orders in a smart factory using sequential pattern mining.","venue":"J. Supercomput.","volume":"79","number":"16","pages":"18970-18992","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/Lee23","doi":"10.1007/S11227-023-05351-8","ee":"https://doi.org/10.1007/s11227-023-05351-8","url":"https://dblp.org/rec/journals/tjs/Lee23"}, "url":"URL#248546" }, { "@score":"1", "@id":"248547", "info":{"authors":{"author":[{"@pid":"98/7810","text":"Chang-Eun Lee"},{"@pid":"210/6958","text":"Jaeuk Baek"},{"@pid":"03/8738","text":"Jeany Son"},{"@pid":"25/6540","text":"Young-Guk Ha"}]},"title":"Deep AI military staff: cooperative battlefield situation awareness for commander's decision making.","venue":"J. Supercomput.","volume":"79","number":"6","pages":"6040-6069","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/LeeBSH23","doi":"10.1007/S11227-022-04882-W","ee":"https://doi.org/10.1007/s11227-022-04882-w","url":"https://dblp.org/rec/journals/tjs/LeeBSH23"}, "url":"URL#248547" }, { "@score":"1", "@id":"248548", "info":{"authors":{"author":[{"@pid":"137/1728","text":"Hee-Jin Lee"},{"@pid":"156/2187","text":"Bum Yong Park"}]},"title":"Adaptive CVCF controller design for an energy storage system considering an operation mode change in a standalone microgrid.","venue":"J. Supercomput.","volume":"79","number":"10","pages":"10849-10863","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/LeeP23","doi":"10.1007/S11227-022-04953-Y","ee":"https://doi.org/10.1007/s11227-022-04953-y","url":"https://dblp.org/rec/journals/tjs/LeeP23"}, "url":"URL#248548" }, { "@score":"1", "@id":"248549", "info":{"authors":{"author":[{"@pid":"68/9982","text":"David Chunhu Li"},{"@pid":"214/5032","text":"Pin-Hao Chen"},{"@pid":"93/6509","text":"Li-Der Chou"}]},"title":"GAP4NSH: a genetic service function chaining with network service header for P4-based software-defined networks.","venue":"J. Supercomput.","volume":"79","number":"10","pages":"11495-11529","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/LiCC23","doi":"10.1007/S11227-023-05121-6","ee":"https://doi.org/10.1007/s11227-023-05121-6","url":"https://dblp.org/rec/journals/tjs/LiCC23"}, "url":"URL#248549" }, { "@score":"1", "@id":"248550", "info":{"authors":{"author":[{"@pid":"83/6353","text":"Peng Li"},{"@pid":"79/3631","text":"Rui Hou"}]},"title":"Int-Monitor: a model triggered hardware trojan in deep learning accelerators.","venue":"J. Supercomput.","volume":"79","number":"3","pages":"3095-3111","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/LiH23","doi":"10.1007/S11227-022-04759-Y","ee":"https://doi.org/10.1007/s11227-022-04759-y","url":"https://dblp.org/rec/journals/tjs/LiH23"}, "url":"URL#248550" }, { "@score":"1", "@id":"248551", "info":{"authors":{"author":[{"@pid":"09/1182","text":"Hongzhi Li"},{"@pid":"48/1843","text":"Dezhi Han"}]},"title":"Blockchain-assisted secure message authentication with reputation management for VANETs.","venue":"J. Supercomput.","volume":"79","number":"17","pages":"19903-19933","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/LiH23a","doi":"10.1007/S11227-023-05394-X","ee":"https://doi.org/10.1007/s11227-023-05394-x","url":"https://dblp.org/rec/journals/tjs/LiH23a"}, "url":"URL#248551" }, { "@score":"1", "@id":"248552", "info":{"authors":{"author":[{"@pid":"93/7773","text":"Dun Li"},{"@pid":"48/1843","text":"Dezhi Han"},{"@pid":"84/4327","text":"Noël Crespi"},{"@pid":"21/6676","text":"Roberto Minerva"},{"@pid":"l/KuanChingLi","text":"Kuan-Ching Li"}]},"title":"A blockchain-based secure storage and access control scheme for supply chain finance.","venue":"J. Supercomput.","volume":"79","number":"1","pages":"109-138","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/LiHCML23","doi":"10.1007/S11227-022-04655-5","ee":"https://doi.org/10.1007/s11227-022-04655-5","url":"https://dblp.org/rec/journals/tjs/LiHCML23"}, "url":"URL#248552" }, { "@score":"1", "@id":"248553", "info":{"authors":{"author":[{"@pid":"64/6025-68","text":"Wei Li 0068"},{"@pid":"175/7532","text":"Haonan Luo"},{"@pid":"w/LeiWang30","text":"Lei Wang 0030"}]},"title":"Multifactorial brain storm optimization algorithm based on direct search transfer mechanism and concave lens imaging learning strategy.","venue":"J. Supercomput.","volume":"79","number":"6","pages":"6168-6202","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/LiLW23","doi":"10.1007/S11227-022-04916-3","ee":"https://doi.org/10.1007/s11227-022-04916-3","url":"https://dblp.org/rec/journals/tjs/LiLW23"}, "url":"URL#248553" }, { "@score":"1", "@id":"248554", "info":{"authors":{"author":[{"@pid":"146/0297","text":"Xingxing Li"},{"@pid":"74/3883","text":"Weidong Li"},{"@pid":"68/3522","text":"Xuejie Zhang"}]},"title":"Multiresource fair allocation with time window constraints.","venue":"J. Supercomput.","volume":"79","number":"14","pages":"15927-15954","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/LiLZ23","doi":"10.1007/S11227-023-05248-6","ee":"https://doi.org/10.1007/s11227-023-05248-6","url":"https://dblp.org/rec/journals/tjs/LiLZ23"}, "url":"URL#248554" }, { "@score":"1", "@id":"248555", "info":{"authors":{"author":[{"@pid":"93/5856","text":"Hongjian Li"},{"@pid":"185/7318","text":"Dongjun Li"},{"@pid":"29/2362","text":"Xue Zhang"},{"@pid":"67/9615","text":"Hu Sun"}]},"title":"Cooperative computation offloading combined with data compression in mobile edge computing system.","venue":"J. Supercomput.","volume":"79","number":"12","pages":"13490-13518","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/LiLZS23","doi":"10.1007/S11227-023-05200-8","ee":"https://doi.org/10.1007/s11227-023-05200-8","url":"https://dblp.org/rec/journals/tjs/LiLZS23"}, "url":"URL#248555" }, { "@score":"1", "@id":"248556", "info":{"authors":{"author":[{"@pid":"52/6049","text":"Yijun Li"},{"@pid":"144/9287","text":"Ziqiong Lin"},{"@pid":"98/5684-3","text":"Wenjie Zhang 0003"},{"@pid":"60/3312","text":"Yifeng Zheng"},{"@pid":"229/2944","text":"Jingmin Yang"}]},"title":"Mobile edge computing-enabled blockchain: contract-guided computation offloading.","venue":"J. Supercomput.","volume":"79","number":"7","pages":"7970-7996","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/LiLZZY23","doi":"10.1007/S11227-022-04990-7","ee":"https://doi.org/10.1007/s11227-022-04990-7","url":"https://dblp.org/rec/journals/tjs/LiLZZY23"}, "url":"URL#248556" }, { "@score":"1", "@id":"248557", "info":{"authors":{"author":[{"@pid":"68/5486","text":"John Li"},{"@pid":"54/135","text":"Maria Pantoja"},{"@pid":"14/6730","text":"Gerardo Fernández-Escribano"}]},"title":"Reliable adaptive distributed hyperparameter optimization (RadHPO) for deep learning training and uncertainty estimation.","venue":"J. Supercomput.","volume":"79","number":"10","pages":"10677-10690","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/LiPF23","doi":"10.1007/S11227-023-05081-X","ee":"https://doi.org/10.1007/s11227-023-05081-x","url":"https://dblp.org/rec/journals/tjs/LiPF23"}, "url":"URL#248557" }, { "@score":"1", "@id":"248558", "info":{"title":"Retraction Note: Multimodal transport path optimization model and algorithm considering carbon emission multitask.","venue":"J. Supercomput.","volume":"79","number":"5","pages":"5840","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/LiS23","doi":"10.1007/S11227-022-04853-1","ee":"https://doi.org/10.1007/s11227-022-04853-1","url":"https://dblp.org/rec/journals/tjs/LiS23"}, "url":"URL#248558" }, { "@score":"1", "@id":"248559", "info":{"authors":{"author":[{"@pid":"93/5856","text":"Hongjian Li"},{"@pid":"32/1203","text":"Jie Shen"},{"@pid":"86/5344","text":"Lei Zheng"},{"@pid":"346/0722","text":"Yuzheng Cui"},{"@pid":"145/6013","text":"Zhi Mao"}]},"title":"Cost-efficient scheduling algorithms based on beetle antennae search for containerized applications in Kubernetes clouds.","venue":"J. Supercomput.","volume":"79","number":"9","pages":"10300-10334","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/LiSZCM23","doi":"10.1007/S11227-023-05077-7","ee":"https://doi.org/10.1007/s11227-023-05077-7","url":"https://dblp.org/rec/journals/tjs/LiSZCM23"}, "url":"URL#248559" }, { "@score":"1", "@id":"248560", "info":{"authors":{"author":[{"@pid":"188/7735","text":"Zengpeng Li"},{"@pid":"90/4237","text":"Huiqun Yu"},{"@pid":"17/5233","text":"Guisheng Fan"}]},"title":"Cost-effective approaches for deadline-constrained workflow scheduling in clouds.","venue":"J. Supercomput.","volume":"79","number":"7","pages":"7484-7512","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/LiYF23","doi":"10.1007/S11227-022-04962-X","ee":"https://doi.org/10.1007/s11227-022-04962-x","url":"https://dblp.org/rec/journals/tjs/LiYF23"}, "url":"URL#248560" }, { "@score":"1", "@id":"248561", "info":{"authors":{"author":[{"@pid":"13/2692","text":"Bing Li"},{"@pid":"57/5443","text":"Peng Yang"},{"@pid":"351/7895","text":"Zhongjian Hu"},{"@pid":"351/8054","text":"Yuankang Sun"},{"@pid":"28/8547","text":"Meng Yi"}]},"title":"Graph-enhanced multi-answer summarization under question-driven guidance.","venue":"J. Supercomput.","volume":"79","number":"18","pages":"20417-20444","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/LiYHSY23","doi":"10.1007/S11227-023-05457-Z","ee":"https://doi.org/10.1007/s11227-023-05457-z","url":"https://dblp.org/rec/journals/tjs/LiYHSY23"}, "url":"URL#248561" }, { "@score":"1", "@id":"248562", "info":{"authors":{"author":[{"@pid":"214/5962","text":"Qianyu Li"},{"@pid":"94/6627","text":"Wensheng Zhang"},{"@pid":"64/8337","text":"Mengxing Huang"}]},"title":"Efficient slot correlation learning network for multi-domain dialogue state tracking.","venue":"J. Supercomput.","volume":"79","number":"16","pages":"18547-18568","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/LiZH23","doi":"10.1007/S11227-023-05217-Z","ee":"https://doi.org/10.1007/s11227-023-05217-z","url":"https://dblp.org/rec/journals/tjs/LiZH23"}, "url":"URL#248562" }, { "@score":"1", "@id":"248563", "info":{"authors":{"author":[{"@pid":"246/8725","text":"Jieling Li"},{"@pid":"55/2270","text":"Hao Zhang"},{"@pid":"251/8150","text":"Zhihuang Liu"},{"@pid":"13/3438","text":"Yanhua Liu"}]},"title":"Network intrusion detection via tri-broad learning system based on spatial-temporal granularity.","venue":"J. Supercomput.","volume":"79","number":"8","pages":"9180-9205","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/LiZLL23","doi":"10.1007/S11227-022-05025-X","ee":"https://doi.org/10.1007/s11227-022-05025-x","url":"https://dblp.org/rec/journals/tjs/LiZLL23"}, "url":"URL#248563" }, { "@score":"1", "@id":"248564", "info":{"authors":{"author":[{"@pid":"344/9512","text":"Chi-Hsiu Liang"},{"@pid":"344/9167","text":"Chun-Ho Cheng"},{"@pid":"344/9522","text":"Hong-Lin Wu"},{"@pid":"344/9049","text":"Chao-Chin Li"},{"@pid":"155/0324","text":"Po-Lin Huang"},{"@pid":"85/4117","text":"Chi-Chuan Hwang"}]},"title":"Performance evaluation of multi-exaflops machines using Equality network topology.","venue":"J. Supercomput.","volume":"79","number":"8","pages":"8729-8753","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/LiangCWLHH23","doi":"10.1007/S11227-022-05005-1","ee":"https://doi.org/10.1007/s11227-022-05005-1","url":"https://dblp.org/rec/journals/tjs/LiangCWLHH23"}, "url":"URL#248564" }, { "@score":"1", "@id":"248565", "info":{"authors":{"author":[{"@pid":"61/10795","text":"Jiarong Liang"},{"@pid":"73/1810","text":"Yang Guo"},{"@pid":"238/6385","text":"Yuhao Xie"},{"@pid":"223/1339","text":"Xinyu Liang"}]},"title":"An evolutionary fault diagnosis algorithm for interconnection networks under the PMC model.","venue":"J. Supercomput.","volume":"79","number":"9","pages":"9964-9984","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/LiangGXL23","doi":"10.1007/S11227-023-05054-0","ee":"https://doi.org/10.1007/s11227-023-05054-0","url":"https://dblp.org/rec/journals/tjs/LiangGXL23"}, "url":"URL#248565" }, { "@score":"1", "@id":"248566", "info":{"authors":{"author":[{"@pid":"56/2376","text":"Hong Liang"},{"@pid":"356/2180","text":"Shaoshuai Han"},{"@pid":"97/6241","text":"Mingwen Shao"},{"@pid":"04/2024","text":"Qian Zhang"}]},"title":"FGPGAN: a finer-grained CNN pruning via generative adversarial network.","venue":"J. Supercomput.","volume":"79","number":"15","pages":"16647-16663","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/LiangHSZ23","doi":"10.1007/S11227-023-05320-1","ee":"https://doi.org/10.1007/s11227-023-05320-1","url":"https://dblp.org/rec/journals/tjs/LiangHSZ23"}, "url":"URL#248566" }, { "@score":"1", "@id":"248567", "info":{"authors":{"author":[{"@pid":"339/3740","text":"Zongnan Liang"},{"@pid":"315/6901","text":"Jiawei Nian"},{"@pid":"53/5163","text":"Hongjin Liu"},{"@pid":"339/3729","text":"Xuru Wang"},{"@pid":"11/3418","text":"Mengfei Yang"}]},"title":"C-DMR: a cache-based fault-tolerant protection method for register file.","venue":"J. Supercomput.","volume":"79","number":"4","pages":"4383-4397","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/LiangNLWY23","doi":"10.1007/S11227-022-04836-2","ee":"https://doi.org/10.1007/s11227-022-04836-2","url":"https://dblp.org/rec/journals/tjs/LiangNLWY23"}, "url":"URL#248567" }, { "@score":"1", "@id":"248568", "info":{"authors":{"author":[{"@pid":"61/10795","text":"Jiarong Liang"},{"@pid":"284/3734","text":"Weijian Zeng"},{"@pid":"22/5535","text":"Xiaojiang Du"}]},"title":"Construction of node- and link-fault-tolerant virtual backbones in wireless networks.","venue":"J. Supercomput.","volume":"79","number":"12","pages":"13050-13074","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/LiangZD23","doi":"10.1007/S11227-023-05180-9","ee":"https://doi.org/10.1007/s11227-023-05180-9","url":"https://dblp.org/rec/journals/tjs/LiangZD23"}, "url":"URL#248568" }, { "@score":"1", "@id":"248569", "info":{"authors":{"author":[{"@pid":"259/7305","text":"Xiufang Liang"},{"@pid":"350/3922","text":"Yingzheng Zhu"},{"@pid":"284/9329","text":"Huajuan Duan"},{"@pid":"06/4525","text":"Fuyong Xu"},{"@pid":"85/670-1","text":"Peiyu Liu 0001"},{"@pid":"221/0889","text":"Ran Lu"}]},"title":"MISR: a multiple behavior interactive enhanced learning model for social-aware recommendation.","venue":"J. Supercomput.","volume":"79","number":"13","pages":"14221-14244","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/LiangZDXLL23","doi":"10.1007/S11227-023-05175-6","ee":"https://doi.org/10.1007/s11227-023-05175-6","url":"https://dblp.org/rec/journals/tjs/LiangZDXLL23"}, "url":"URL#248569" }, { "@score":"1", "@id":"248570", "info":{"authors":{"author":[{"@pid":"259/7305","text":"Xiufang Liang"},{"@pid":"350/3922","text":"Yingzheng Zhu"},{"@pid":"284/9329","text":"Huajuan Duan"},{"@pid":"06/4525","text":"Fuyong Xu"},{"@pid":"85/670-1","text":"Peiyu Liu 0001"},{"@pid":"221/0889","text":"Ran Lu"}]},"title":"Publisher Correction to: MISR: a multiple behavior interactive enhanced learning model for social-aware recommendation.","venue":"J. Supercomput.","volume":"79","number":"15","pages":"17758","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/LiangZDXLL23a","doi":"10.1007/S11227-023-05301-4","ee":"https://doi.org/10.1007/s11227-023-05301-4","url":"https://dblp.org/rec/journals/tjs/LiangZDXLL23a"}, "url":"URL#248570" }, { "@score":"1", "@id":"248571", "info":{"authors":{"author":[{"@pid":"182/8304","text":"Yanping Liao"},{"@pid":"58/3794","text":"Fan Jiang"},{"@pid":"05/1947","text":"Jinli Wang"}]},"title":"Intra-pulse modulation recognition of radar signals based on multi-feature random matching fusion network.","venue":"J. Supercomput.","volume":"79","number":"6","pages":"6422-6451","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/LiaoJW23","doi":"10.1007/S11227-022-04902-9","ee":"https://doi.org/10.1007/s11227-022-04902-9","url":"https://dblp.org/rec/journals/tjs/LiaoJW23"}, "url":"URL#248571" }, { "@score":"1", "@id":"248572", "info":{"authors":{"author":[{"@pid":"48/5348-4","text":"Jing Liao 0004"},{"@pid":"354/1532","text":"Xiande Su"},{"@pid":"96/1994-7","text":"Lei Jiang 0007"},{"@pid":"l/KuanChingLi","text":"Kuan-Ching Li"},{"@pid":"81/3025","text":"Tien-Hsiung Weng"},{"@pid":"94/4779","text":"Subhash Bhalla"}]},"title":"Performance of representation fusion model for entity and relationship extraction within unstructured text.","venue":"J. Supercomput.","volume":"79","number":"18","pages":"20826-20844","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/LiaoSJLWB23","doi":"10.1007/S11227-023-05442-6","ee":"https://doi.org/10.1007/s11227-023-05442-6","url":"https://dblp.org/rec/journals/tjs/LiaoSJLWB23"}, "url":"URL#248572" }, { "@score":"1", "@id":"248573", "info":{"authors":{"author":[{"@pid":"91/6546","text":"Xiaoxin Liao"},{"@pid":"248/7785","text":"Jingyi Yuan"},{"@pid":"81/11043","text":"Zemin Cai"},{"@pid":"78/1117","text":"Jian-Huang Lai"}]},"title":"An attention-based bidirectional GRU network for temporal action proposals generation.","venue":"J. Supercomput.","volume":"79","number":"8","pages":"8322-8339","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/LiaoYCL23","doi":"10.1007/S11227-022-04973-8","ee":"https://doi.org/10.1007/s11227-022-04973-8","url":"https://dblp.org/rec/journals/tjs/LiaoYCL23"}, "url":"URL#248573" }, { "@score":"1", "@id":"248574", "info":{"authors":{"author":[{"@pid":"25/1270","text":"Shengbin Liao"},{"@pid":"23/2694","text":"Zongkai Yang"},{"@pid":"344/8766","text":"Qingzhou Liao"},{"@pid":"344/8811","text":"Zhangxiong zheng"}]},"title":"TopicLPRank: a keyphrase extraction method based on improved TopicRank.","venue":"J. Supercomput.","volume":"79","number":"8","pages":"9073-9092","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/LiaoYLz23","doi":"10.1007/S11227-022-05022-0","ee":"https://doi.org/10.1007/s11227-022-05022-0","url":"https://dblp.org/rec/journals/tjs/LiaoYLz23"}, "url":"URL#248574" }, { "@score":"1", "@id":"248575", "info":{"authors":{"author":[{"@pid":"339/4860","text":"André Luis da Cunha Dantas Lima"},{"@pid":"304/8777","text":"Vitor Moraes Aranha"},{"@pid":"256/6828","text":"Erick Giovani Sperandio Nascimento"}]},"title":"Predictive maintenance applied to mission critical supercomputing environments: remaining useful life estimation of a hydraulic cooling system using deep learning.","venue":"J. Supercomput.","volume":"79","number":"4","pages":"4660-4684","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/LimaAN23","doi":"10.1007/S11227-022-04833-5","ee":"https://doi.org/10.1007/s11227-022-04833-5","url":"https://dblp.org/rec/journals/tjs/LimaAN23"}, "url":"URL#248575" }, { "@score":"1", "@id":"248576", "info":{"authors":{"author":[{"@pid":"11/6105","text":"Pei-Chun Lin"},{"@pid":"h/PCKHung","text":"Patrick C. K. Hung"},{"@pid":"42/1709","text":"Ying Jiang"},{"@pid":"338/5542","text":"Carolina Padilla Velasco"},{"@pid":"338/7273","text":"Marco Antonio Martínez Cano"}]},"title":"An experimental design for facial and color emotion expression of a social robot.","venue":"J. Supercomput.","volume":"79","number":"2","pages":"1980-2009","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/LinHJVC23","doi":"10.1007/S11227-022-04734-7","ee":"https://doi.org/10.1007/s11227-022-04734-7","url":"https://dblp.org/rec/journals/tjs/LinHJVC23"}, "url":"URL#248576" }, { "@score":"1", "@id":"248577", "info":{"authors":{"author":{"@pid":"00/105","text":"Weiming Liu"}},"title":"Literature survey of multi-track music generation model based on generative confrontation network in intelligent composition.","venue":"J. Supercomput.","volume":"79","number":"6","pages":"6560-6582","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/Liu23","doi":"10.1007/S11227-022-04914-5","ee":"https://doi.org/10.1007/s11227-022-04914-5","url":"https://dblp.org/rec/journals/tjs/Liu23"}, "url":"URL#248577" }, { "@score":"1", "@id":"248578", "info":{"authors":{"author":[{"@pid":"58/2670-45","text":"Bo Liu 0045"},{"@pid":"02/1003","text":"Rui Chen"},{"@pid":"53/282-1","text":"Weiwei Lin 0001"},{"@pid":"181/3887","text":"Wentai Wu"},{"@pid":"231/0619","text":"Jianpeng Lin"},{"@pid":"l/KeqinLi","text":"Keqin Li 0001"}]},"title":"Publisher Correction to: Thermal‑aware virtual machine placement based on multi‑objective optimization.","venue":"J. Supercomput.","volume":"79","number":"15","pages":"17756-17757","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/LiuCLWLL23","doi":"10.1007/S11227-023-05345-6","ee":"https://doi.org/10.1007/s11227-023-05345-6","url":"https://dblp.org/rec/journals/tjs/LiuCLWLL23"}, "url":"URL#248578" }, { "@score":"1", "@id":"248579", "info":{"authors":{"author":[{"@pid":"23/4955-15","text":"Yifan Liu 0015"},{"@pid":"21/7549","text":"Jincai Chen"},{"@pid":"39/7035-6","text":"Ping Lu 0006"},{"@pid":"303/0021-2","text":"Chuanbo Zhu 0002"},{"@pid":"349/9805","text":"Yugen Jian"},{"@pid":"54/3957","text":"Chao Sun"},{"@pid":"40/2957","text":"Han Liang"}]},"title":"MOONLIT: momentum-contrast and large-kernel for multi-fine-grained deraining.","venue":"J. Supercomput.","volume":"79","number":"14","pages":"15729-15759","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/LiuCLZJSL23","doi":"10.1007/S11227-023-05286-0","ee":"https://doi.org/10.1007/s11227-023-05286-0","url":"https://dblp.org/rec/journals/tjs/LiuCLZJSL23"}, "url":"URL#248579" }, { "@score":"1", "@id":"248580", "info":{"authors":{"author":[{"@pid":"268/2181","text":"Zizhen Liu"},{"@pid":"93/5439","text":"Si Chen"},{"@pid":"80/2212-1","text":"Jing Ye 0001"},{"@pid":"36/2152","text":"Junfeng Fan"},{"@pid":"70/576-1","text":"Huawei Li 0001"},{"@pid":"37/5372-1","text":"Xiaowei Li 0001"}]},"title":"DHSA: efficient doubly homomorphic secure aggregation for cross-silo federated learning.","venue":"J. Supercomput.","volume":"79","number":"3","pages":"2819-2849","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/LiuCYFLL23","doi":"10.1007/S11227-022-04745-4","ee":"https://doi.org/10.1007/s11227-022-04745-4","url":"https://dblp.org/rec/journals/tjs/LiuCYFLL23"}, "url":"URL#248580" }, { "@score":"1", "@id":"248581", "info":{"authors":{"author":[{"@pid":"39/4747","text":"Ying-Ho Liu"},{"@pid":"305/9472","text":"Chia-Yu Kuo"}]},"title":"SiMAIM: identifying sockpuppets and puppetmasters on a single forum-oriented social media site.","venue":"J. Supercomput.","volume":"79","number":"16","pages":"18667-18698","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/LiuK23","doi":"10.1007/S11227-023-05376-Z","ee":"https://doi.org/10.1007/s11227-023-05376-z","url":"https://dblp.org/rec/journals/tjs/LiuK23"}, "url":"URL#248581" }, { "@score":"1", "@id":"248582", "info":{"authors":{"author":[{"@pid":"356/2157","text":"Yuanxuan Liu"},{"@pid":"41/972","text":"Dequan Li"}]},"title":"AdaXod: a new adaptive and momental bound algorithm for training deep neural networks.","venue":"J. Supercomput.","volume":"79","number":"15","pages":"17691-17715","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/LiuL23","doi":"10.1007/S11227-023-05338-5","ee":"https://doi.org/10.1007/s11227-023-05338-5","url":"https://dblp.org/rec/journals/tjs/LiuL23"}, "url":"URL#248582" }, { "@score":"1", "@id":"248583", "info":{"authors":{"author":[{"@pid":"95/2903","text":"Xuemei Liu"},{"@pid":"86/109","text":"Jixiang Meng"},{"@pid":"32/7265","text":"Yingzhi Tian"}]},"title":"On forcibly k-edge-connected and forcibly super edge-connected uniform hypergraphic sequences.","venue":"J. Supercomput.","volume":"79","number":"14","pages":"15980-15996","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/LiuMT23","doi":"10.1007/S11227-023-05287-Z","ee":"https://doi.org/10.1007/s11227-023-05287-z","url":"https://dblp.org/rec/journals/tjs/LiuMT23"}, "url":"URL#248583" }, { "@score":"1", "@id":"248584", "info":{"authors":{"author":[{"@pid":"76/2081","text":"Zhenpeng Liu"},{"@pid":"18/3178","text":"Jingyi Wang"},{"@pid":"211/6912","text":"Zilin Gao"},{"@pid":"330/2189","text":"Jianhang Wei"}]},"title":"Privacy-preserving edge computing offloading scheme based on whale optimization algorithm.","venue":"J. Supercomput.","volume":"79","number":"3","pages":"3005-3023","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/LiuWGW23","doi":"10.1007/S11227-022-04756-1","ee":"https://doi.org/10.1007/s11227-022-04756-1","url":"https://dblp.org/rec/journals/tjs/LiuWGW23"}, "url":"URL#248584" }, { "@score":"1", "@id":"248585", "info":{"authors":{"author":[{"@pid":"133/4787","text":"Zhuohua Liu"},{"@pid":"77/377-25","text":"Bin Yang 0025"},{"@pid":"297/1489","text":"Jingrui An"},{"@pid":"245/0964","text":"Caijuan Huang"}]},"title":"Similarity evaluation of graphic design based on deep visual saliency features.","venue":"J. Supercomput.","volume":"79","number":"18","pages":"21346-21367","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/LiuYAH23","doi":"10.1007/S11227-023-05468-W","ee":"https://doi.org/10.1007/s11227-023-05468-w","url":"https://dblp.org/rec/journals/tjs/LiuYAH23"}, "url":"URL#248585" }, { "@score":"1", "@id":"248586", "info":{"authors":{"author":[{"@pid":"324/2751","text":"Tianbo Liu 0005"},{"@pid":"48/8041","text":"Jindong Zhang"}]},"title":"An adaptive traffic flow prediction model based on spatiotemporal graph neural network.","venue":"J. Supercomput.","volume":"79","number":"14","pages":"15245-15269","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/LiuZ23","doi":"10.1007/S11227-023-05261-9","ee":"https://doi.org/10.1007/s11227-023-05261-9","url":"https://dblp.org/rec/journals/tjs/LiuZ23"}, "url":"URL#248586" }, { "@score":"1", "@id":"248587", "info":{"authors":{"author":[{"@pid":"23/8276","text":"Qiuyan Liu"},{"@pid":"24/3533","text":"Xuan Zhao"},{"@pid":"339/5195","text":"Kaihan Shi"}]},"title":"The analysis of agricultural Internet of things product marketing by deep learning.","venue":"J. Supercomput.","volume":"79","number":"4","pages":"4602-4621","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/LiuZS23","doi":"10.1007/S11227-022-04817-5","ee":"https://doi.org/10.1007/s11227-022-04817-5","url":"https://dblp.org/rec/journals/tjs/LiuZS23"}, "url":"URL#248587" }, { "@score":"1", "@id":"248588", "info":{"authors":{"author":[{"@pid":"284/2125","text":"Yaodi Liu"},{"@pid":"96/3115","text":"Kun Zhang"},{"@pid":"153/2385","text":"Zhendong Wang"}]},"title":"Intrusion detection of manifold regularized broad learning system based on LU decomposition.","venue":"J. Supercomput.","volume":"79","number":"18","pages":"20600-20648","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/LiuZW23","doi":"10.1007/S11227-023-05403-Z","ee":"https://doi.org/10.1007/s11227-023-05403-z","url":"https://dblp.org/rec/journals/tjs/LiuZW23"}, "url":"URL#248588" }, { "@score":"1", "@id":"248589", "info":{"authors":{"author":[{"@pid":"304/9015","text":"Diego Lloria"},{"@pid":"324/8922","text":"Pablo M. Aviles"},{"@pid":"89/10398","text":"Jose A. Belloch"},{"@pid":"19/3728-2","text":"Sandra Roger 0002"},{"@pid":"94/7528","text":"Carmen Botella-Mascarell"},{"@pid":"88/1638","text":"Almudena Lindoso"}]},"title":"Hybrid CPU-GPU implementation of the transformed spatial domain channel estimation algorithm for mmWave MIMO systems.","venue":"J. Supercomput.","volume":"79","number":"9","pages":"9371-9382","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/LloriaABRBL23","doi":"10.1007/S11227-022-05018-W","ee":"https://doi.org/10.1007/s11227-022-05018-w","url":"https://dblp.org/rec/journals/tjs/LloriaABRBL23"}, "url":"URL#248589" }, { "@score":"1", "@id":"248590", "info":{"authors":{"author":[{"@pid":"36/9840","text":"Sonia Lopez-Alarcon"},{"@pid":"348/1106","text":"Federico Rueda"}]},"title":"Compilation of Gaussian boson samplers for quantum computing.","venue":"J. Supercomput.","volume":"79","number":"10","pages":"10533-10554","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/LopezAlarconR23","doi":"10.1007/S11227-023-05075-9","ee":"https://doi.org/10.1007/s11227-023-05075-9","url":"https://dblp.org/rec/journals/tjs/LopezAlarconR23"}, "url":"URL#248590" }, { "@score":"1", "@id":"248591", "info":{"authors":{"author":[{"@pid":"336/9850","text":"Luis O. López"},{"@pid":"234/9579","text":"Francisco Orts"},{"@pid":"81/8378","text":"Gloria Ortega López"},{"@pid":"27/5873","text":"Vicente González Ruiz"},{"@pid":"09/2896","text":"Ester M. Garzón"}]},"title":"Fault-tolerant quantum algorithm for dual-threshold image segmentation.","venue":"J. Supercomput.","volume":"79","number":"11","pages":"12549-12562","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/LopezOLRG23","doi":"10.1007/S11227-023-05148-9","ee":"https://doi.org/10.1007/s11227-023-05148-9","url":"https://dblp.org/rec/journals/tjs/LopezOLRG23"}, "url":"URL#248591" }, { "@score":"1", "@id":"248592", "info":{"authors":{"author":[{"@pid":"278/9132","text":"Hassen Louati"},{"@pid":"200/2182","text":"Ali Louati"},{"@pid":"15/3310","text":"Slim Bechikh"},{"@pid":"250/0059","text":"Elham Kariri"}]},"title":"Embedding channel pruning within the CNN architecture design using a bi-level evolutionary approach.","venue":"J. Supercomput.","volume":"79","number":"14","pages":"16118-16151","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/LouatiLBK23","doi":"10.1007/S11227-023-05273-5","ee":"https://doi.org/10.1007/s11227-023-05273-5","url":"https://dblp.org/rec/journals/tjs/LouatiLBK23"}, "url":"URL#248592" }, { "@score":"1", "@id":"248593", "info":{"authors":{"author":[{"@pid":"67/6982","text":"Rong Lu"},{"@pid":"337/7159","text":"Quanyu Song"}]},"title":"Research on the improved gesture tracking algorithm in sign language synthesis.","venue":"J. Supercomput.","volume":"79","number":"1","pages":"867-879","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/LuS23","doi":"10.1007/S11227-022-04705-Y","ee":"https://doi.org/10.1007/s11227-022-04705-y","url":"https://dblp.org/rec/journals/tjs/LuS23"}, "url":"URL#248593" }, { "@score":"1", "@id":"248594", "info":{"authors":{"author":[{"@pid":"29/186","text":"Jie Luo"},{"@pid":"90/4308","text":"Shubo Liu"},{"@pid":"55/4240","text":"Zhaohui Cai"},{"@pid":"231/7852","text":"Chang Xiong"},{"@pid":"26/4495","text":"Guoqing Tu"}]},"title":"A multi-task learning model for non-intrusive load monitoring based on discrete wavelet transform.","venue":"J. Supercomput.","volume":"79","number":"8","pages":"9021-9046","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/LuoLCXT23","doi":"10.1007/S11227-022-05000-6","ee":"https://doi.org/10.1007/s11227-022-05000-6","url":"https://dblp.org/rec/journals/tjs/LuoLCXT23"}, "url":"URL#248594" }, { "@score":"1", "@id":"248595", "info":{"authors":{"author":[{"@pid":"336/3234","text":"Jiang-Yao Luo"},{"@pid":"336/4207","text":"Jian-Hua Yuan"}]},"title":"A kernel search algorithm for virtual machine consolidation problem in cloud computing.","venue":"J. Supercomput.","volume":"79","number":"17","pages":"19277-19296","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/LuoY23","doi":"10.1007/S11227-023-05406-W","ee":"https://doi.org/10.1007/s11227-023-05406-w","url":"https://dblp.org/rec/journals/tjs/LuoY23"}, "url":"URL#248595" }, { "@score":"1", "@id":"248596", "info":{"authors":{"author":[{"@pid":"284/4171","text":"Marcos Lupión"},{"@pid":"226/9083","text":"Nicolas C. Cruz"},{"@pid":"284/3889","text":"Juan F. Sanjuan"},{"@pid":"51/942","text":"Ben Paechter"},{"@pid":"20/3186","text":"Pilar M. Ortigosa"}]},"title":"Accelerating neural network architecture search using multi-GPU high-performance computing.","venue":"J. Supercomput.","volume":"79","number":"7","pages":"7609-7625","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/LupionCSPO23","doi":"10.1007/S11227-022-04960-Z","ee":"https://doi.org/10.1007/s11227-022-04960-z","url":"https://dblp.org/rec/journals/tjs/LupionCSPO23"}, "url":"URL#248596" }, { "@score":"1", "@id":"248597", "info":{"authors":{"author":[{"@pid":"323/6721","text":"Chunyan Lyu"},{"@pid":"70/6770","text":"Tong Xu"},{"@pid":"93/1599","text":"Kejun Wang"},{"@pid":"27/4364","text":"Jing Chen"}]},"title":"Person re-identification based on human semantic parsing and message passing.","venue":"J. Supercomput.","volume":"79","number":"5","pages":"5223-5247","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/LyuXWC23","doi":"10.1007/S11227-022-04866-W","ee":"https://doi.org/10.1007/s11227-022-04866-w","url":"https://dblp.org/rec/journals/tjs/LyuXWC23"}, "url":"URL#248597" }, { "@score":"1", "@id":"248598", "info":{"authors":{"author":[{"@pid":"m/ZongminMa","text":"Zongmin Ma 0001"},{"@pid":"61/6346","text":"Xiaowen Zhang"},{"@pid":"279/5595","text":"Yuhan Zhao"}]},"title":"Queries with aggregate functions over fuzzy RDF data.","venue":"J. Supercomput.","volume":"79","number":"13","pages":"14780-14807","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/MaZZ23","doi":"10.1007/S11227-023-05235-X","ee":"https://doi.org/10.1007/s11227-023-05235-x","url":"https://dblp.org/rec/journals/tjs/MaZZ23"}, "url":"URL#248598" }, { "@score":"1", "@id":"248599", "info":{"authors":{"author":[{"@pid":"342/4139","text":"Daniel E. Macedo"},{"@pid":"52/3568","text":"Danilo Santos 0001"},{"@pid":"21/2529","text":"Angelo Perkusich"},{"@pid":"222/1995","text":"Dalton Cézane Gomes Valadares"}]},"title":"A mobility-aware federated learning coordination algorithm.","venue":"J. Supercomput.","volume":"79","number":"17","pages":"19049-19063","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/MacedoSPV23","doi":"10.1007/S11227-023-05372-3","ee":"https://doi.org/10.1007/s11227-023-05372-3","url":"https://dblp.org/rec/journals/tjs/MacedoSPV23"}, "url":"URL#248599" }, { "@score":"1", "@id":"248600", "info":{"authors":{"author":[{"@pid":"183/2609","text":"Dylan Machovec"},{"@pid":"s/HowardJaySiegel","text":"Howard Jay Siegel"},{"@pid":"195/1477","text":"James A. Crowder"},{"@pid":"68/2349","text":"Sudeep Pasricha"},{"@pid":"m/AAMaciejewski","text":"Anthony A. Maciejewski"},{"@pid":"202/6653","text":"Ryan D. Friese"}]},"title":"Surveillance mission scheduling with unmanned aerial vehicles in dynamic heterogeneous environments.","venue":"J. Supercomput.","volume":"79","number":"12","pages":"13864-13888","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/MachovecSCPMF23","doi":"10.1007/S11227-023-05225-Z","ee":"https://doi.org/10.1007/s11227-023-05225-z","url":"https://dblp.org/rec/journals/tjs/MachovecSCPMF23"}, "url":"URL#248600" }, { "@score":"1", "@id":"248601", "info":{"authors":{"author":[{"@pid":"188/6167","text":"Mirmorsal Madani"},{"@pid":"143/8056","text":"Homayun Motameni"},{"@pid":"124/0377","text":"Hosein Mohamadi"}]},"title":"KNNGAN: an oversampling technique for textual imbalanced datasets.","venue":"J. Supercomput.","volume":"79","number":"5","pages":"5291-5326","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/MadaniMM23","doi":"10.1007/S11227-022-04851-3","ee":"https://doi.org/10.1007/s11227-022-04851-3","url":"https://dblp.org/rec/journals/tjs/MadaniMM23"}, "url":"URL#248601" }, { "@score":"1", "@id":"248602", "info":{"authors":{"author":[{"@pid":"343/7042","text":"Maged Magdy"},{"@pid":"83/8225","text":"Fayed F. M. Ghaleb"},{"@pid":"343/6885","text":"Dawlat A. El A. Mohamed"},{"@pid":"204/6210","text":"Wael Zakaria"}]},"title":"CC-IFIM: an efficient approach for incremental frequent itemset mining based on closed candidates.","venue":"J. Supercomput.","volume":"79","number":"7","pages":"7877-7899","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/MagdyGMZ23","doi":"10.1007/S11227-022-04976-5","ee":"https://doi.org/10.1007/s11227-022-04976-5","url":"https://dblp.org/rec/journals/tjs/MagdyGMZ23"}, "url":"URL#248602" }, { "@score":"1", "@id":"248603", "info":{"authors":{"author":[{"@pid":"357/4996","text":"Araby Mahdy"},{"@pid":"217/1273","text":"Abdullah Mohammed Shaheen"},{"@pid":"152/6364","text":"Ragab A. El-Sehiemy"},{"@pid":"280/3759","text":"Ahmed Rabie Ginidi"}]},"title":"Artificial ecosystem optimization by means of fitness distance balance model for engineering design optimization.","venue":"J. Supercomput.","volume":"79","number":"16","pages":"18021-18052","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/MahdySEG23","doi":"10.1007/S11227-023-05331-Y","ee":"https://doi.org/10.1007/s11227-023-05331-y","url":"https://dblp.org/rec/journals/tjs/MahdySEG23"}, "url":"URL#248603" }, { "@score":"1", "@id":"248604", "info":{"authors":{"author":[{"@pid":"61/10128","text":"Shabnam Mahjoub"},{"@pid":"145/8762","text":"Mehdi Golsorkhtabaramiri"},{"@pid":"325/0563","text":"Seyed Sadegh Salehi Amiri"}]},"title":"Optimal uniformization for non-uniform two-level loops using a hybrid method.","venue":"J. Supercomput.","volume":"79","number":"11","pages":"12791-12814","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/MahjoubGA23","doi":"10.1007/S11227-023-05194-3","ee":"https://doi.org/10.1007/s11227-023-05194-3","url":"https://dblp.org/rec/journals/tjs/MahjoubGA23"}, "url":"URL#248604" }, { "@score":"1", "@id":"248605", "info":{"authors":{"author":[{"@pid":"345/4650","text":"Dawrawee Makmuang"},{"@pid":"331/3304","text":"Wachiraphong Ratiphaphongthon"},{"@pid":"45/4268","text":"Rabian Wangkeeree"}]},"title":"Smooth support vector machine with generalized pinball loss for Pattern Classification.","venue":"J. Supercomput.","volume":"79","number":"11","pages":"11684-11706","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/MakmuangRW23","doi":"10.1007/S11227-023-05082-W","ee":"https://doi.org/10.1007/s11227-023-05082-w","url":"https://dblp.org/rec/journals/tjs/MakmuangRW23"}, "url":"URL#248605" }, { "@score":"1", "@id":"248606", "info":{"authors":{"author":[{"@pid":"284/8110","text":"Hanieh Malekijou"},{"@pid":"93/4228","text":"Vesal Hakami"},{"@pid":"00/6565","text":"Nastooh Taheri Javan"},{"@pid":"252/6432","text":"Amirhossein Malekijoo"}]},"title":"Q-learning-based algorithms for dynamic transmission control in IoT equipment.","venue":"J. Supercomput.","volume":"79","number":"1","pages":"75-108","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/MalekijouHJM23","doi":"10.1007/S11227-022-04643-9","ee":"https://doi.org/10.1007/s11227-022-04643-9","url":"https://dblp.org/rec/journals/tjs/MalekijouHJM23"}, "url":"URL#248606" }, { "@score":"1", "@id":"248607", "info":{"authors":{"author":{"@pid":"12/9206","text":"Mina Malekzadeh"}},"title":"Enabling efficient and reliable IoT deployment in 5G and LTE cellular areas for optimized service provisioning.","venue":"J. Supercomput.","volume":"79","number":"2","pages":"1926-1955","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/Malekzadeh23","doi":"10.1007/S11227-022-04722-X","ee":"https://doi.org/10.1007/s11227-022-04722-x","url":"https://dblp.org/rec/journals/tjs/Malekzadeh23"}, "url":"URL#248607" }, { "@score":"1", "@id":"248608", "info":{"authors":{"author":[{"@pid":"314/5482","text":"Annu Malik"},{"@pid":"203/7399","text":"Rashmi Kushwah"}]},"title":"Energy-efficient scheduling in IoT using Wi-Fi and ZigBee cross-technology.","venue":"J. Supercomput.","volume":"79","number":"10","pages":"10977-11006","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/MalikK23","doi":"10.1007/S11227-023-05093-7","ee":"https://doi.org/10.1007/s11227-023-05093-7","url":"https://dblp.org/rec/journals/tjs/MalikK23"}, "url":"URL#248608" }, { "@score":"1", "@id":"248609", "info":{"authors":{"author":[{"@pid":"254/8022","text":"Manjarini Mallik"},{"@pid":"62/3389","text":"Chandreyee Chowdhury"}]},"title":"Characteristic analysis of fingerprint datasets from a pragmatic view of indoor localization using machine learning approaches.","venue":"J. Supercomput.","volume":"79","number":"16","pages":"18507-18546","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/MallikC23","doi":"10.1007/S11227-023-05386-X","ee":"https://doi.org/10.1007/s11227-023-05386-x","url":"https://dblp.org/rec/journals/tjs/MallikC23"}, "url":"URL#248609" }, { "@score":"1", "@id":"248610", "info":{"authors":{"author":[{"@pid":"299/6788","text":"Dilip Mandloi"},{"@pid":"217/3299","text":"Rajeev Arya 0001"}]},"title":"Q-learning-based UAV-mounted base station positioning in a disaster scenario for connectivity to the users located at unknown positions.","venue":"J. Supercomput.","volume":"79","number":"14","pages":"15643-15674","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/MandloiA23","doi":"10.1007/S11227-023-05292-2","ee":"https://doi.org/10.1007/s11227-023-05292-2","url":"https://dblp.org/rec/journals/tjs/MandloiA23"}, "url":"URL#248610" }, { "@score":"1", "@id":"248611", "info":{"authors":{"author":[{"@pid":"338/7061","text":"Imane El Mansoum"},{"@pid":"169/2838","text":"Laaziz Lahlou"},{"@pid":"151/0191","text":"Fawaz A. Khasawneh"},{"@pid":"60/5323","text":"Nadjia Kara"},{"@pid":"247/2842","text":"Claes Edstrom"}]},"title":"VALKYRIE: a suite of topology-aware clustering approaches for cloud-based virtual network services.","venue":"J. Supercomput.","volume":"79","number":"3","pages":"3298-3328","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/MansoumLKKE23","doi":"10.1007/S11227-022-04786-9","ee":"https://doi.org/10.1007/s11227-022-04786-9","url":"https://dblp.org/rec/journals/tjs/MansoumLKKE23"}, "url":"URL#248611" }, { "@score":"1", "@id":"248612", "info":{"authors":{"author":[{"@pid":"236/8846","text":"Ivica Markovic"},{"@pid":"80/4899","text":"Suzana Stojkovic"}]},"title":"4-Valued spectral transforms implementation on GPU with Tensor Cores.","venue":"J. Supercomput.","volume":"79","number":"1","pages":"51-74","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/MarkovicS23","doi":"10.1007/S11227-022-04651-9","ee":"https://doi.org/10.1007/s11227-022-04651-9","url":"https://dblp.org/rec/journals/tjs/MarkovicS23"}, "url":"URL#248612" }, { "@score":"1", "@id":"248613", "info":{"authors":{"author":[{"@pid":"206/0018","text":"Marcos Maroñas"},{"@pid":"291/5758","text":"Antoni C. Navarro"},{"@pid":"62/6835","text":"Eduard Ayguadé"},{"@pid":"08/2158","text":"Vicenç Beltran 0001"}]},"title":"Mitigating the NUMA effect on task-based runtime systems.","venue":"J. Supercomput.","volume":"79","number":"13","pages":"14287-14312","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/MaronasNAB23","doi":"10.1007/S11227-023-05164-9","ee":"https://doi.org/10.1007/s11227-023-05164-9","url":"https://dblp.org/rec/journals/tjs/MaronasNAB23"}, "url":"URL#248613" }, { "@score":"1", "@id":"248614", "info":{"authors":{"author":[{"@pid":"302/1884","text":"Rawya Mars"},{"@pid":"53/10598","text":"Saoussen Cheikhrouhou"},{"@pid":"96/2929","text":"Slim Kallel"},{"@pid":"09/5212","text":"Ahmed Hadj Kacem"}]},"title":"A survey on automation approaches of smart contract generation.","venue":"J. Supercomput.","volume":"79","number":"14","pages":"16065-16097","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/MarsCKK23","doi":"10.1007/S11227-023-05262-8","ee":"https://doi.org/10.1007/s11227-023-05262-8","url":"https://dblp.org/rec/journals/tjs/MarsCKK23"}, "url":"URL#248614" }, { "@score":"1", "@id":"248615", "info":{"authors":{"author":[{"@pid":"177/8865","text":"Somnath Mazumdar"},{"@pid":"45/7691","text":"Alberto Scionti"},{"@pid":"81/2622","text":"Stéphane Zuckerman"},{"@pid":"20/6005","text":"Antoni Portero"}]},"title":"NoC-based hardware software co-design framework for dataflow thread management.","venue":"J. Supercomput.","volume":"79","number":"16","pages":"17983-18020","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/MazumdarSZP23","doi":"10.1007/S11227-023-05335-8","ee":"https://doi.org/10.1007/s11227-023-05335-8","url":"https://dblp.org/rec/journals/tjs/MazumdarSZP23"}, "url":"URL#248615" }, { "@score":"1", "@id":"248616", "info":{"authors":{"author":[{"@pid":"319/8485","text":"Angela Mazzonetto"},{"@pid":"60/6123","text":"Rafael Z. Frantz"},{"@pid":"63/5943","text":"Sandro Sawicki"},{"@pid":"63/5898","text":"Fabricia Roos-Frantz"},{"@pid":"203/9429","text":"Gerson Battisti"}]},"title":"Towards a dynamic heuristic for task scheduling in application integration platforms to handle large volumes of data.","venue":"J. Supercomput.","volume":"79","number":"1","pages":"998-1031","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/MazzonettoFSRB23","doi":"10.1007/S11227-022-04695-X","ee":"https://doi.org/10.1007/s11227-022-04695-x","url":"https://dblp.org/rec/journals/tjs/MazzonettoFSRB23"}, "url":"URL#248616" }, { "@score":"1", "@id":"248617", "info":{"authors":{"author":[{"@pid":"309/4321","text":"Marie Chantelle Cruz Medina"},{"@pid":"122/9540","text":"João Fausto Lorenzato de Oliveira"}]},"title":"A selective hybrid system for state-of-charge forecasting of lithium-ion batteries.","venue":"J. Supercomput.","volume":"79","number":"14","pages":"15623-15642","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/MedinaO23","doi":"10.1007/S11227-023-05285-1","ee":"https://doi.org/10.1007/s11227-023-05285-1","url":"https://dblp.org/rec/journals/tjs/MedinaO23"}, "url":"URL#248617" }, { "@score":"1", "@id":"248618", "info":{"authors":{"author":[{"@pid":"312/3493","text":"Brahim Mefgouda"},{"@pid":"39/4597","text":"Hanen Idoudi"}]},"title":"New network interface selection based on MADM and multi-objective whale optimization algorithm in heterogeneous wireless networks.","venue":"J. Supercomput.","volume":"79","number":"4","pages":"3580-3615","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/MefgoudaI23","doi":"10.1007/S11227-022-04791-Y","ee":"https://doi.org/10.1007/s11227-022-04791-y","url":"https://dblp.org/rec/journals/tjs/MefgoudaI23"}, "url":"URL#248618" }, { "@score":"1", "@id":"248619", "info":{"authors":{"author":[{"@pid":"358/1866","text":"Abdelmoujib Megzari"},{"@pid":"262/4240","text":"P. V. Pravija Raj"},{"@pid":"23/2859","text":"Walid Osamy"},{"@pid":"72/5176","text":"Ahmed M. Khedr"}]},"title":"Applications, challenges, and solutions to single- and multi-objective critical node detection problems: a survey.","venue":"J. Supercomput.","volume":"79","number":"17","pages":"19770-19808","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/MegzariROK23","doi":"10.1007/S11227-023-05429-3","ee":"https://doi.org/10.1007/s11227-023-05429-3","url":"https://dblp.org/rec/journals/tjs/MegzariROK23"}, "url":"URL#248619" }, { "@score":"1", "@id":"248620", "info":{"authors":{"author":[{"@pid":"304/5553","text":"Noha El Menbawy"},{"@pid":"30/2629","text":"Hesham A. Ali"},{"@pid":"278/8696","text":"Mohamed S. Saraya"},{"@pid":"10/6723","text":"Amr M. T. Ali-Eldin"},{"@pid":"278/1692","text":"Mohamed M. Abdelsalam"}]},"title":"Energy-efficient computation offloading using hybrid GA with PSO in internet of robotic things environment.","venue":"J. Supercomput.","volume":"79","number":"17","pages":"20076-20115","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/MenbawyASAA23","doi":"10.1007/S11227-023-05387-W","ee":"https://doi.org/10.1007/s11227-023-05387-w","url":"https://dblp.org/rec/journals/tjs/MenbawyASAA23"}, "url":"URL#248620" }, { "@score":"1", "@id":"248621", "info":{"authors":{"author":[{"@pid":"328/0990","text":"Javier Alonso Mencía"},{"@pid":"356/2023","text":"Marta Castro-Rodríguez"},{"@pid":"356/2182","text":"Beatriz Herrero-Pinilla"},{"@pid":"354/5888","text":"Juan M. Alonso-Weber"},{"@pid":"213/5254","text":"Leocadio Rodríguez-Mañas"},{"@pid":"80/11155","text":"Rodrigo Pérez-Rodríguez"}]},"title":"ADELA: a conversational virtual assistant to prevent delirium in hospitalized older persons.","venue":"J. Supercomput.","volume":"79","number":"15","pages":"17670-17690","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/MenciaCHARP23","doi":"10.1007/S11227-023-05352-7","ee":"https://doi.org/10.1007/s11227-023-05352-7","url":"https://dblp.org/rec/journals/tjs/MenciaCHARP23"}, "url":"URL#248621" }, { "@score":"1", "@id":"248622", "info":{"authors":{"author":[{"@pid":"304/4946","text":"Chunyun Meng"},{"@pid":"128/3305","text":"Xiaobing He"},{"@pid":"13/10345","text":"Zhen Tan"},{"@pid":"256/4625","text":"Li Luan"}]},"title":"Gait recognition based on 3D human body reconstruction and multi-granular feature fusion.","venue":"J. Supercomput.","volume":"79","number":"11","pages":"12106-12125","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/MengHTL23","doi":"10.1007/S11227-023-05143-0","ee":"https://doi.org/10.1007/s11227-023-05143-0","url":"https://dblp.org/rec/journals/tjs/MengHTL23"}, "url":"URL#248622" }, { "@score":"1", "@id":"248623", "info":{"authors":{"author":[{"@pid":"249/8612","text":"Imen Merdassi"},{"@pid":"18/7584","text":"Cherif Ghazel"},{"@pid":"77/6522","text":"Leïla Saïdane"}]},"title":"A new LTMA-ABE location and time access security control scheme for mobile cloud.","venue":"J. Supercomput.","volume":"79","number":"11","pages":"12074-12105","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/MerdassiGS23","doi":"10.1007/S11227-023-05107-4","ee":"https://doi.org/10.1007/s11227-023-05107-4","url":"https://dblp.org/rec/journals/tjs/MerdassiGS23"}, "url":"URL#248623" }, { "@score":"1", "@id":"248624", "info":{"authors":{"author":[{"@pid":"38/10867","text":"Chandrashekhar Meshram"},{"@pid":"80/9412","text":"Rabha W. Ibrahim"},{"@pid":"345/8820","text":"Preecha Yupapin"},{"@pid":"321/1641","text":"Ismail Bahkali"},{"@pid":"131/2562","text":"Agbotiname Lucky Imoize"},{"@pid":"207/0818","text":"Sarita Gajbhiye Meshram"}]},"title":"An efficient certificateless group signcryption scheme using Quantum Chebyshev Chaotic Maps in HC-IoT environments.","venue":"J. Supercomput.","volume":"79","number":"15","pages":"16914-16939","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/MeshramIYBIM23","doi":"10.1007/S11227-023-05303-2","ee":"https://doi.org/10.1007/s11227-023-05303-2","url":"https://dblp.org/rec/journals/tjs/MeshramIYBIM23"}, "url":"URL#248624" }, { "@score":"1", "@id":"248625", "info":{"authors":{"author":[{"@pid":"358/1915","text":"Ahmet Metin"},{"@pid":"306/3344","text":"Ahmet Kasif"},{"@pid":"88/2962","text":"Cagatay Catal"}]},"title":"Temporal fusion transformer-based prediction in aquaponics.","venue":"J. Supercomput.","volume":"79","number":"17","pages":"19934-19958","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/MetinKC23","doi":"10.1007/S11227-023-05389-8","ee":"https://doi.org/10.1007/s11227-023-05389-8","url":"https://dblp.org/rec/journals/tjs/MetinKC23"}, "url":"URL#248625" }, { "@score":"1", "@id":"248626", "info":{"authors":{"author":[{"@pid":"315/3069","text":"Arvind Mewada"},{"@pid":"216/7096","text":"Rupesh Kumar Dewang"}]},"title":"SA-ASBA: a hybrid model for aspect-based sentiment analysis using synthetic attention in pre-trained language BERT model with extreme gradient boosting.","venue":"J. Supercomput.","volume":"79","number":"5","pages":"5516-5551","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/MewadaD23","doi":"10.1007/S11227-022-04881-X","ee":"https://doi.org/10.1007/s11227-022-04881-x","url":"https://dblp.org/rec/journals/tjs/MewadaD23"}, "url":"URL#248626" }, { "@score":"1", "@id":"248627", "info":{"authors":{"author":[{"@pid":"192/9415","text":"Mina Mirhosseini"},{"@pid":"61/5947","text":"Mahmood Fazlali"},{"@pid":"94/4801","text":"Mohammad K. Fallah"},{"@pid":"47/1839","text":"Jeong-A Lee"}]},"title":"A fast MILP solver for high-level synthesis based on heuristic model reduction and enhanced branch and bound algorithm.","venue":"J. Supercomput.","volume":"79","number":"11","pages":"12042-12073","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/MirhosseiniFFL23","doi":"10.1007/S11227-023-05109-2","ee":"https://doi.org/10.1007/s11227-023-05109-2","url":"https://dblp.org/rec/journals/tjs/MirhosseiniFFL23"}, "url":"URL#248627" }, { "@score":"1", "@id":"248628", "info":{"authors":{"author":[{"@pid":"322/9129","text":"Hojjat Moayed"},{"@pid":"13/6345","text":"Eghbal G. Mansoori"},{"@pid":"83/9475","text":"Mohammad R. Moosavi"}]},"title":"An efficient pruning method for subgraph matching in large-scale graphs.","venue":"J. Supercomput.","volume":"79","number":"10","pages":"10511-10532","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/MoayedMM23","doi":"10.1007/S11227-023-05061-1","ee":"https://doi.org/10.1007/s11227-023-05061-1","url":"https://dblp.org/rec/journals/tjs/MoayedMM23"}, "url":"URL#248628" }, { "@score":"1", "@id":"248629", "info":{"authors":{"author":[{"@pid":"268/3849","text":"Tejas M. Modi"},{"@pid":"94/11497","text":"Pravati Swain"}]},"title":"Hybrid deep learning models and link probability based routing in software defined-DCN.","venue":"J. Supercomput.","volume":"79","number":"9","pages":"9771-9794","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ModiS23","doi":"10.1007/S11227-022-04995-2","ee":"https://doi.org/10.1007/s11227-022-04995-2","url":"https://dblp.org/rec/journals/tjs/ModiS23"}, "url":"URL#248629" }, { "@score":"1", "@id":"248630", "info":{"authors":{"author":[{"@pid":"226/2272","text":"Somayeh Mohammadi"},{"@pid":"181/8379","text":"Latif Pourkarimi"},{"@pid":"358/1901","text":"Felix Droop"},{"@pid":"331/5389","text":"Ninon De Mecquenem"},{"@pid":"l/UlfLeser","text":"Ulf Leser"},{"@pid":"10/884","text":"Knut Reinert"}]},"title":"A mathematical programming approach for resource allocation of data analysis workflows on heterogeneous clusters.","venue":"J. Supercomput.","volume":"79","number":"17","pages":"19019-19048","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/MohammadiPDMLR23","doi":"10.1007/S11227-023-05325-W","ee":"https://doi.org/10.1007/s11227-023-05325-w","url":"https://dblp.org/rec/journals/tjs/MohammadiPDMLR23"}, "url":"URL#248630" }, { "@score":"1", "@id":"248631", "info":{"authors":{"author":[{"@pid":"356/2109","text":"Mojtaba Mohammadzadeh"},{"@pid":"356/1887","text":"Abdoul-Ahad Choupani"},{"@pid":"356/1883","text":"Farshid Afshar"}]},"title":"The short-term prediction of daily traffic volume for rural roads using shallow and deep learning networks: ANN and LSTM.","venue":"J. Supercomput.","volume":"79","number":"15","pages":"17475-17494","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/MohammadzadehCA23","doi":"10.1007/S11227-023-05333-W","ee":"https://doi.org/10.1007/s11227-023-05333-w","url":"https://dblp.org/rec/journals/tjs/MohammadzadehCA23"}, "url":"URL#248631" }, { "@score":"1", "@id":"248632", "info":{"authors":{"author":[{"@pid":"64/10465","text":"Ali Mohammadzadeh"},{"@pid":"357/4943","text":"Mahdi Akbari Zarkesh"},{"@pid":"357/4784","text":"Pouria Haji Shahmohamd"},{"@pid":"357/4706","text":"Javid Akhavan"},{"@pid":"98/2203","text":"Amit Chhabra"}]},"title":"Energy-aware workflow scheduling in fog computing using a hybrid chaotic algorithm.","venue":"J. Supercomput.","volume":"79","number":"16","pages":"18569-18604","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/MohammadzadehZSAC23","doi":"10.1007/S11227-023-05330-Z","ee":"https://doi.org/10.1007/s11227-023-05330-z","url":"https://dblp.org/rec/journals/tjs/MohammadzadehZSAC23"}, "url":"URL#248632" }, { "@score":"1", "@id":"248633", "info":{"title":"Retraction Note: Decision support system for nasopharyngeal carcinoma discrimination from endoscopic images using artificial neural network.","venue":"J. Supercomput.","volume":"79","number":"5","pages":"5849-5850","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/MohammedGNHMAA23","doi":"10.1007/S11227-022-04871-Z","ee":"https://doi.org/10.1007/s11227-022-04871-z","url":"https://dblp.org/rec/journals/tjs/MohammedGNHMAA23"}, "url":"URL#248633" }, { "@score":"1", "@id":"248634", "info":{"authors":{"author":[{"@pid":"284/9175","text":"Satinder Singh Mohar"},{"@pid":"152/7821","text":"Sonia Goyal"},{"@pid":"154/8610","text":"Ranjit Kaur"}]},"title":"Exploration of different topologies for optimal sensor nodes deployment in wireless sensor networks using jaya-sine cosine optimization algorithm.","venue":"J. Supercomput.","volume":"79","number":"12","pages":"13001-13030","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/MoharGK23","doi":"10.1007/S11227-023-05147-W","ee":"https://doi.org/10.1007/s11227-023-05147-w","url":"https://dblp.org/rec/journals/tjs/MoharGK23"}, "url":"URL#248634" }, { "@score":"1", "@id":"248635", "info":{"authors":{"author":[{"@pid":"344/9400","text":"Anam Moin"},{"@pid":"140/1285","text":"Farhan Aadil"},{"@pid":"43/3299","text":"Zeeshan Ali"},{"@pid":"86/10102","text":"Dongwann Kang"}]},"title":"Emotion recognition framework using multiple modalities for an effective human-computer interaction.","venue":"J. Supercomput.","volume":"79","number":"8","pages":"9320-9349","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/MoinAAK23","doi":"10.1007/S11227-022-05026-W","ee":"https://doi.org/10.1007/s11227-022-05026-w","url":"https://dblp.org/rec/journals/tjs/MoinAAK23"}, "url":"URL#248635" }, { "@score":"1", "@id":"248636", "info":{"authors":{"author":[{"@pid":"79/9830","text":"Pablo Cabañas Molero"},{"@pid":"238/9109","text":"Antonio Jesús Muñoz-Montoro"},{"@pid":"66/4253","text":"Pedro Vera-Candeas"},{"@pid":"11/796","text":"José Ranilla"}]},"title":"The music demixing machine: toward real-time remixing of classical music.","venue":"J. Supercomput.","volume":"79","number":"13","pages":"14342-14357","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/MoleroMVR23","doi":"10.1007/S11227-023-05192-5","ee":"https://doi.org/10.1007/s11227-023-05192-5","url":"https://dblp.org/rec/journals/tjs/MoleroMVR23"}, "url":"URL#248636" }, { "@score":"1", "@id":"248637", "info":{"authors":{"author":[{"@pid":"84/5387","text":"Manuel Mora"},{"@pid":"76/4313","text":"Olayele Adelakun"},{"@pid":"179/7998","text":"Paola Yuritzy Reyes-Delgado"},{"@pid":"356/2113","text":"Oswaldo Diaz"}]},"title":"AVS_FD_MVITS: an agile IT service design workflow for small data centers.","venue":"J. Supercomput.","volume":"79","number":"15","pages":"17519-17561","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/MoraARD23","doi":"10.1007/S11227-023-05244-W","ee":"https://doi.org/10.1007/s11227-023-05244-w","url":"https://dblp.org/rec/journals/tjs/MoraARD23"}, "url":"URL#248637" }, { "@score":"1", "@id":"248638", "info":{"authors":{"author":[{"@pid":"359/5373","text":"Sajedeh Morabbi"},{"@pid":"95/7442","text":"Hadi Soltanizadeh"},{"@pid":"00/2581","text":"Saeed Mozaffari"},{"@pid":"11/932","text":"Mohammad Javad Fadaeieslam"}]},"title":"Improving generalization in deep neural network using knowledge transformation based on fisher criterion.","venue":"J. Supercomput.","volume":"79","number":"18","pages":"20899-20922","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/MorabbiSMF23","doi":"10.1007/S11227-023-05448-0","ee":"https://doi.org/10.1007/s11227-023-05448-0","url":"https://dblp.org/rec/journals/tjs/MorabbiSMF23"}, "url":"URL#248638" }, { "@score":"1", "@id":"248639", "info":{"authors":{"author":[{"@pid":"279/7715","text":"Juan Morales-García"},{"@pid":"66/6985","text":"Andrés Bueno-Crespo"},{"@pid":"45/1356-2","text":"Raquel Martínez-España"},{"@pid":"346/0642","text":"Juan-Luis Posadas"},{"@pid":"22/2967","text":"Pietro Manzoni"},{"@pid":"36/7795","text":"José M. Cecilia"}]},"title":"Evaluation of low-power devices for smart greenhouse development.","venue":"J. Supercomput.","volume":"79","number":"9","pages":"10277-10299","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/MoralesGarciaBMPMC23","doi":"10.1007/S11227-023-05076-8","ee":"https://doi.org/10.1007/s11227-023-05076-8","url":"https://dblp.org/rec/journals/tjs/MoralesGarciaBMPMC23"}, "url":"URL#248639" }, { "@score":"1", "@id":"248640", "info":{"authors":{"author":[{"@pid":"330/3175","text":"Nemat allah Mottaki"},{"@pid":"143/8056","text":"Homayun Motameni"},{"@pid":"124/0377","text":"Hosein Mohamadi"}]},"title":"An effective hybrid genetic algorithm and tabu search for maximizing network lifetime using coverage sets scheduling in wireless sensor networks.","venue":"J. Supercomput.","volume":"79","number":"3","pages":"3277-3297","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/MottakiMM23","doi":"10.1007/S11227-022-04710-1","ee":"https://doi.org/10.1007/s11227-022-04710-1","url":"https://dblp.org/rec/journals/tjs/MottakiMM23"}, "url":"URL#248640" }, { "@score":"1", "@id":"248641", "info":{"authors":{"author":[{"@pid":"350/3879","text":"Mahsa Hadikhah Mozhdehi"},{"@pid":"350/4180","text":"AmirMasoud Eftekhari Moghadam"}]},"title":"Textual emotion detection utilizing a transfer learning approach.","venue":"J. Supercomput.","volume":"79","number":"12","pages":"13075-13089","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/MozhdehiM23","doi":"10.1007/S11227-023-05168-5","ee":"https://doi.org/10.1007/s11227-023-05168-5","url":"https://dblp.org/rec/journals/tjs/MozhdehiM23"}, "url":"URL#248641" }, { "@score":"1", "@id":"248642", "info":{"authors":{"author":[{"@pid":"136/9877","text":"Tong Mu"},{"@pid":"315/8275","text":"Qiaochuan Ren"},{"@pid":"225/8609","text":"Bilin Shao"},{"@pid":"221/6731","text":"Genqing Bian"},{"@pid":"63/3991","text":"Jing Song"}]},"title":"A secure and lightweight cloud-centric intelligent medical system based on Internet of Medical Things.","venue":"J. Supercomput.","volume":"79","number":"16","pages":"18820-18848","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/MuRSBS23","doi":"10.1007/S11227-023-05363-4","ee":"https://doi.org/10.1007/s11227-023-05363-4","url":"https://dblp.org/rec/journals/tjs/MuRSBS23"}, "url":"URL#248642" }, { "@score":"1", "@id":"248643", "info":{"authors":{"author":[{"@pid":"195/3847","text":"Aradhita Mukherjee"},{"@pid":"78/5976","text":"Rituparna Chaki"},{"@pid":"88/4552","text":"Nabendu Chaki"}]},"title":"An unsupervised learning-guided multi-node failure-recovery model for distributed graph processing systems.","venue":"J. Supercomput.","volume":"79","number":"9","pages":"9383-9408","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/MukherjeeCC23","doi":"10.1007/S11227-022-05028-8","ee":"https://doi.org/10.1007/s11227-022-05028-8","url":"https://dblp.org/rec/journals/tjs/MukherjeeCC23"}, "url":"URL#248643" }, { "@score":"1", "@id":"248644", "info":{"authors":{"author":[{"@pid":"125/7690","text":"Anwesha Mukherjee"},{"@pid":"133/4864-2","text":"Shreya Ghosh 0002"},{"@pid":"34/9049-1","text":"Soumya K. Ghosh 0001"},{"@pid":"b/RajkumarBuyya","text":"Rajkumar Buyya"}]},"title":"Mobi-Sense: mobility-aware sensor-fog paradigm for mission-critical applications using network coding and steganography.","venue":"J. Supercomput.","volume":"79","number":"15","pages":"17495-17518","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/MukherjeeGGB23","doi":"10.1007/S11227-023-05300-5","ee":"https://doi.org/10.1007/s11227-023-05300-5","url":"https://dblp.org/rec/journals/tjs/MukherjeeGGB23"}, "url":"URL#248644" }, { "@score":"1", "@id":"248645", "info":{"authors":{"author":[{"@pid":"341/6870","text":"Nirmalya Mukhopadhyay"},{"@pid":"120/4097","text":"Babul P. Tewari"}]},"title":"Dynamic cost effective solution for efficient cloud infrastructure.","venue":"J. Supercomput.","volume":"79","number":"6","pages":"6471-6506","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/MukhopadhyayT23","doi":"10.1007/S11227-022-04913-6","ee":"https://doi.org/10.1007/s11227-022-04913-6","url":"https://dblp.org/rec/journals/tjs/MukhopadhyayT23"}, "url":"URL#248645" }, { "@score":"1", "@id":"248646", "info":{"authors":{"author":[{"@pid":"38/2797","text":"Rubén Muñiz"},{"@pid":"115/8141","text":"Fernando Nuño 0001"},{"@pid":"119/5414","text":"Juan Díaz 0001"},{"@pid":"08/9822","text":"María González"},{"@pid":"119/5485","text":"Miguel J. Prieto"},{"@pid":"341/7617","text":"Óliver Menéndez"}]},"title":"Real-time monitoring solution with vibration analysis for industry 4.0 ventilation systems.","venue":"J. Supercomput.","volume":"79","number":"6","pages":"6203-6227","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/MunizNDGPM23","doi":"10.1007/S11227-022-04897-3","ee":"https://doi.org/10.1007/s11227-022-04897-3","url":"https://dblp.org/rec/journals/tjs/MunizNDGPM23"}, "url":"URL#248646" }, { "@score":"1", "@id":"248647", "info":{"authors":{"author":[{"@pid":"238/9109","text":"Antonio Jesús Muñoz-Montoro"},{"@pid":"06/7578","text":"Pablo Revuelta Sanz"},{"@pid":"14/2692","text":"Damián Martínez-Muñoz"},{"@pid":"260/6480","text":"Juan De La Torre Cruz"},{"@pid":"11/796","text":"José Ranilla"}]},"title":"An ambient denoising method based on multi-channel non-negative matrix factorization for wheezing detection.","venue":"J. Supercomput.","volume":"79","number":"2","pages":"1571-1591","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/Munoz-MontoroSM23","doi":"10.1007/S11227-022-04706-X","ee":"https://doi.org/10.1007/s11227-022-04706-x","url":"https://dblp.org/rec/journals/tjs/Munoz-MontoroSM23"}, "url":"URL#248647" }, { "@score":"1", "@id":"248648", "info":{"authors":{"author":[{"@pid":"238/9109","text":"Antonio Jesús Muñoz-Montoro"},{"@pid":"02/7055","text":"Julio J. Carabias-Orti"},{"@pid":"119/8669","text":"Daniele Salvati"},{"@pid":"90/2975","text":"Raquel Cortina"}]},"title":"Efficient parallel kernel based on Cholesky decomposition to accelerate multichannel nonnegative matrix factorization.","venue":"J. Supercomput.","volume":"79","number":"18","pages":"20649-20664","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/MunozMontoroCSC23","doi":"10.1007/S11227-023-05471-1","ee":"https://doi.org/10.1007/s11227-023-05471-1","url":"https://dblp.org/rec/journals/tjs/MunozMontoroCSC23"}, "url":"URL#248648" }, { "@score":"1", "@id":"248649", "info":{"authors":{"author":[{"@pid":"355/1902","text":"M. Naim"},{"@pid":"355/1975","text":"A. Ali Pacha"}]},"title":"A new chaotic satellite image encryption algorithm based on a 2D filter and Fisher-Yates shuffling.","venue":"J. Supercomput.","volume":"79","number":"15","pages":"17585-17618","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/NaimP23","doi":"10.1007/S11227-023-05346-5","ee":"https://doi.org/10.1007/s11227-023-05346-5","url":"https://dblp.org/rec/journals/tjs/NaimP23"}, "url":"URL#248649" }, { "@score":"1", "@id":"248650", "info":{"authors":{"author":[{"@pid":"210/0307","text":"Samad Najjar-Ghabel"},{"@pid":"92/7402","text":"Leili Farzinvash"},{"@pid":"15/9134","text":"Seyed Naser Razavi"}]},"title":"Data harvesting in wireless sensor networks using mobile sinks under real-world circumstances.","venue":"J. Supercomput.","volume":"79","number":"5","pages":"5486-5515","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/NajjarGhabelFR23","doi":"10.1007/S11227-022-04888-4","ee":"https://doi.org/10.1007/s11227-022-04888-4","url":"https://dblp.org/rec/journals/tjs/NajjarGhabelFR23"}, "url":"URL#248650" }, { "@score":"1", "@id":"248651", "info":{"authors":{"author":[{"@pid":"319/0735","text":"P. S. Nandhini"},{"@pid":"88/6760","text":"S. Kuppuswami"},{"@pid":"194/0947","text":"Subramaniam Malliga"},{"@pid":"154/4881","text":"R. Devi Priya"}]},"title":"Enhanced Rank Attack Detection Algorithm (E-RAD) for securing RPL-based IoT networks by early detection and isolation of rank attackers.","venue":"J. Supercomput.","volume":"79","number":"6","pages":"6825-6848","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/NandhiniKMP23","doi":"10.1007/S11227-022-04921-6","ee":"https://doi.org/10.1007/s11227-022-04921-6","url":"https://dblp.org/rec/journals/tjs/NandhiniKMP23"}, "url":"URL#248651" }, { "@score":"1", "@id":"248652", "info":{"authors":{"author":[{"@pid":"166/7195","text":"C. Narmatha"},{"@pid":"231/0897","text":"P. Manimegalai"},{"@pid":"314/3967","text":"Krishnadas J."},{"@pid":"252/8680","text":"Prajoona Valsalan"},{"@pid":"166/7230","text":"S. Manimurugan"},{"@pid":"81/5373","text":"Mohammed Mustafa"}]},"title":"Ovarian cysts classification using novel deep reinforcement learning with Harris Hawks Optimization method.","venue":"J. Supercomput.","volume":"79","number":"2","pages":"1374-1397","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/NarmathaMJVMM23","doi":"10.1007/S11227-022-04709-8","ee":"https://doi.org/10.1007/s11227-022-04709-8","url":"https://dblp.org/rec/journals/tjs/NarmathaMJVMM23"}, "url":"URL#248652" }, { "@score":"1", "@id":"248653", "info":{"authors":{"author":[{"@pid":"185/6776","text":"Saeed NasehiMoghaddam"},{"@pid":"68/4083","text":"Mohammad Fathian"},{"@pid":"19/3711","text":"Babak Amiri"}]},"title":"Risk-Averse Influence Maximization.","venue":"J. Supercomput.","volume":"79","number":"3","pages":"2519-2569","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/NasehiMoghaddam23","doi":"10.1007/S11227-022-04731-W","ee":"https://doi.org/10.1007/s11227-022-04731-w","url":"https://dblp.org/rec/journals/tjs/NasehiMoghaddam23"}, "url":"URL#248653" }, { "@score":"1", "@id":"248654", "info":{"authors":{"author":[{"@pid":"29/6018","text":"Babak Nasersharif"},{"@pid":"350/3945","text":"Manije Ebrahimpour"},{"@pid":"249/5442","text":"Navid Naderi"}]},"title":"Multi-layer maximum mean discrepancy in auto-encoders for cross-corpus speech emotion recognition.","venue":"J. Supercomput.","volume":"79","number":"12","pages":"13031-13049","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/NasersharifEN23","doi":"10.1007/S11227-023-05161-Y","ee":"https://doi.org/10.1007/s11227-023-05161-y","url":"https://dblp.org/rec/journals/tjs/NasersharifEN23"}, "url":"URL#248654" }, { "@score":"1", "@id":"248655", "info":{"authors":{"author":[{"@pid":"245/6334","text":"Agustín Navarro-Torres"},{"@pid":"05/2274","text":"Jesús Alastruey-Benedé"},{"@pid":"22/672","text":"Pablo Ibáñez"},{"@pid":"52/512","text":"Víctor Viñals Yúfera"}]},"title":"BALANCER: bandwidth allocation and cache partitioning for multicore processors.","venue":"J. Supercomput.","volume":"79","number":"9","pages":"10252-10276","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/NavarroTorresAIY23","doi":"10.1007/S11227-023-05070-0","ee":"https://doi.org/10.1007/s11227-023-05070-0","url":"https://dblp.org/rec/journals/tjs/NavarroTorresAIY23"}, "url":"URL#248655" }, { "@score":"1", "@id":"248656", "info":{"authors":{"author":[{"@pid":"335/4807","text":"Priyanka Nehra"},{"@pid":"132/9530","text":"Nishtha Kesswani"}]},"title":"Efficient resource allocation and management by using load balanced multi-dimensional bin packing heuristic in cloud data centers.","venue":"J. Supercomput.","volume":"79","number":"2","pages":"1398-1425","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/NehraK23","doi":"10.1007/S11227-022-04707-W","ee":"https://doi.org/10.1007/s11227-022-04707-w","url":"https://dblp.org/rec/journals/tjs/NehraK23"}, "url":"URL#248656" }, { "@score":"1", "@id":"248657", "info":{"authors":{"author":[{"@pid":"182/1380","text":"Nadia Nekouie"},{"@pid":"87/4042","text":"Morteza Romoozi"},{"@pid":"31/7866","text":"Mahdi Esmaeili"}]},"title":"Multimodal feature selection from microarray data based on Dempster-Shafer evidence fusion.","venue":"J. Supercomput.","volume":"79","number":"11","pages":"12591-12621","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/NekouieRE23","doi":"10.1007/S11227-023-05138-X","ee":"https://doi.org/10.1007/s11227-023-05138-x","url":"https://dblp.org/rec/journals/tjs/NekouieRE23"}, "url":"URL#248657" }, { "@score":"1", "@id":"248658", "info":{"authors":{"author":[{"@pid":"182/1380","text":"Nadia Nekouie"},{"@pid":"87/4042","text":"Morteza Romoozi"},{"@pid":"31/7866","text":"Mahdi Esmaeili"}]},"title":"Correction to: Multimodal feature selection from microarray data based on Dempster-Shafer evidence fusion.","venue":"J. Supercomput.","volume":"79","number":"15","pages":"17754","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/NekouieRE23a","doi":"10.1007/S11227-023-05344-7","ee":"https://doi.org/10.1007/s11227-023-05344-7","url":"https://dblp.org/rec/journals/tjs/NekouieRE23a"}, "url":"URL#248658" }, { "@score":"1", "@id":"248659", "info":{"authors":{"author":[{"@pid":"338/6751","text":"Mohammad Nematpour"},{"@pid":"131/0237","text":"Habib Izadkhah"},{"@pid":"49/9409","text":"Farnaz Mahan"}]},"title":"Enhanced genetic algorithm with some heuristic principles for task graph scheduling.","venue":"J. Supercomput.","volume":"79","number":"2","pages":"1784-1813","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/NematpourIM23","doi":"10.1007/S11227-022-04684-0","ee":"https://doi.org/10.1007/s11227-022-04684-0","url":"https://dblp.org/rec/journals/tjs/NematpourIM23"}, "url":"URL#248659" }, { "@score":"1", "@id":"248660", "info":{"authors":{"author":[{"@pid":"343/6864","text":"Seyed Soroush Nezamdoust"},{"@pid":"124/3719","text":"Mohammad Ali Pourmina"},{"@pid":"43/1037","text":"Farbod Razzazi"}]},"title":"Optimal prediction of cloud spot instance price utilizing deep learning.","venue":"J. Supercomput.","volume":"79","number":"7","pages":"7626-7647","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/NezamdoustPR23","doi":"10.1007/S11227-022-04970-X","ee":"https://doi.org/10.1007/s11227-022-04970-x","url":"https://dblp.org/rec/journals/tjs/NezamdoustPR23"}, "url":"URL#248660" }, { "@score":"1", "@id":"248661", "info":{"authors":{"author":[{"@pid":"284/0103","text":"Alladoumbaye Ngueilbaye"},{"@pid":"h/JoshuaZhexueHuang","text":"Joshua Zhexue Huang"},{"@pid":"272/6951","text":"Mehak Khan"},{"@pid":"81/940","text":"Hongzhi Wang 0001"}]},"title":"Data quality model for assessing public COVID-19 big datasets.","venue":"J. Supercomput.","volume":"79","number":"17","pages":"19574-19606","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/NgueilbayeHKW23","doi":"10.1007/S11227-023-05410-0","ee":"https://doi.org/10.1007/s11227-023-05410-0","url":"https://dblp.org/rec/journals/tjs/NgueilbayeHKW23"}, "url":"URL#248661" }, { "@score":"1", "@id":"248662", "info":{"authors":{"author":[{"@pid":"358/1794","text":"Klaus Nölp"},{"@pid":"139/5013","text":"Lena Oden"}]},"title":"Simplifying non-contiguous data transfer with MPI for Python.","venue":"J. Supercomput.","volume":"79","number":"17","pages":"20019-20040","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/NolpO23","doi":"10.1007/S11227-023-05398-7","ee":"https://doi.org/10.1007/s11227-023-05398-7","url":"https://dblp.org/rec/journals/tjs/NolpO23"}, "url":"URL#248662" }, { "@score":"1", "@id":"248663", "info":{"authors":{"author":[{"@pid":"220/3176","text":"Raúl Nozal"},{"@pid":"29/3095","text":"José Luis Bosque"}]},"title":"Mashing load balancing algorithm to boost hybrid kernels in molecular dynamics simulations.","venue":"J. Supercomput.","volume":"79","number":"1","pages":"1065-1080","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/NozalB23","doi":"10.1007/S11227-022-04671-5","ee":"https://doi.org/10.1007/s11227-022-04671-5","url":"https://dblp.org/rec/journals/tjs/NozalB23"}, "url":"URL#248663" }, { "@score":"1", "@id":"248664", "info":{"authors":{"author":[{"@pid":"338/5566","text":"Abubakar Abdussalam Nuhu"},{"@pid":"80/7398","text":"Qasim Zeeshan"},{"@pid":"261/4967","text":"Babak Safaei"},{"@pid":"250/0705","text":"Muhammad Atif Shahzad"}]},"title":"Machine learning-based techniques for fault diagnosis in the semiconductor manufacturing process: a comparative study.","venue":"J. Supercomput.","volume":"79","number":"2","pages":"2031-2081","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/NuhuZSS23","doi":"10.1007/S11227-022-04730-X","ee":"https://doi.org/10.1007/s11227-022-04730-x","url":"https://dblp.org/rec/journals/tjs/NuhuZSS23"}, "url":"URL#248664" }, { "@score":"1", "@id":"248665", "info":{"authors":{"author":[{"@pid":"234/9579","text":"Francisco Orts"},{"@pid":"81/8378","text":"Gloria Ortega López"},{"@pid":"05/598","text":"Elías F. Combarro"},{"@pid":"45/2801","text":"Ignacio F. Rúa"},{"@pid":"190/5821","text":"Antonio Manuel Puertas"},{"@pid":"09/2896","text":"Ester M. Garzón"}]},"title":"Efficient design of a quantum absolute-value circuit using Clifford+T gates.","venue":"J. Supercomput.","volume":"79","number":"11","pages":"12656-12670","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/OrtsLCRPG23","doi":"10.1007/S11227-023-05162-X","ee":"https://doi.org/10.1007/s11227-023-05162-x","url":"https://dblp.org/rec/journals/tjs/OrtsLCRPG23"}, "url":"URL#248665" }, { "@score":"1", "@id":"248666", "info":{"authors":{"author":[{"@pid":"23/2859","text":"Walid Osamy"},{"@pid":"72/5176","text":"Ahmed M. Khedr"},{"@pid":"341/7595","text":"Dilna Vijayan"},{"@pid":"66/5623","text":"Ahmed Salim"}]},"title":"TACTIRSO: trust aware clustering technique based on improved rat swarm optimizer for WSN-enabled intelligent transportation system.","venue":"J. Supercomput.","volume":"79","number":"6","pages":"5962-6016","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/OsamyKVS23","doi":"10.1007/S11227-022-04889-3","ee":"https://doi.org/10.1007/s11227-022-04889-3","url":"https://dblp.org/rec/journals/tjs/OsamyKVS23"}, "url":"URL#248666" }, { "@score":"1", "@id":"248667", "info":{"authors":{"author":[{"@pid":"119/2643","text":"Yiming Ouyang"},{"@pid":"187/5848","text":"Chenglong Sun"},{"@pid":"38/6776","text":"Ruifeng Li"},{"@pid":"19/1924-27","text":"Qi Wang 0027"},{"@pid":"93/3389-3","text":"Jianhua Li 0003"}]},"title":"Transit ring: bubble flow control for eliminating inter-ring communication congestion.","venue":"J. Supercomput.","volume":"79","number":"2","pages":"1161-1181","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/OuyangSLWL23","doi":"10.1007/S11227-022-04712-Z","ee":"https://doi.org/10.1007/s11227-022-04712-z","url":"https://dblp.org/rec/journals/tjs/OuyangSLWL23"}, "url":"URL#248667" }, { "@score":"1", "@id":"248668", "info":{"authors":{"author":[{"@pid":"119/2643","text":"Yiming Ouyang"},{"@pid":"18/4231","text":"Jiaxin Wang"},{"@pid":"187/5848","text":"Chenglong Sun"},{"@pid":"19/1924-27","text":"Qi Wang 0027"},{"@pid":"30/6037","text":"Huaguo Liang"}]},"title":"URMP: using reconfigurable multicast path for NoC-based deep neural network accelerators.","venue":"J. Supercomput.","volume":"79","number":"13","pages":"14827-14847","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/OuyangWSWL23","doi":"10.1007/S11227-023-05255-7","ee":"https://doi.org/10.1007/s11227-023-05255-7","url":"https://dblp.org/rec/journals/tjs/OuyangWSWL23"}, "url":"URL#248668" }, { "@score":"1", "@id":"248669", "info":{"authors":{"author":[{"@pid":"332/9275","text":"Parita Rajiv Oza"},{"@pid":"226/4144","text":"Paawan Sharma"},{"@pid":"143/0561","text":"Samir Patel"}]},"title":"Deep ensemble transfer learning-based framework for mammographic image classification.","venue":"J. Supercomput.","volume":"79","number":"7","pages":"8048-8069","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/OzaSP23","doi":"10.1007/S11227-022-04992-5","ee":"https://doi.org/10.1007/s11227-022-04992-5","url":"https://dblp.org/rec/journals/tjs/OzaSP23"}, "url":"URL#248669" }, { "@score":"1", "@id":"248670", "info":{"authors":{"author":[{"@pid":"189/7663","text":"Kürsad Özkan"},{"@pid":"139/8993","text":"Ahmet Mert"},{"@pid":"169/4178","text":"Serkan Özdemir"}]},"title":"A new proposed GLCM texture feature: modified Rényi Deng entropy.","venue":"J. Supercomput.","volume":"79","number":"18","pages":"21507-21527","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/OzkanMO23","doi":"10.1007/S11227-023-05627-Z","ee":"https://doi.org/10.1007/s11227-023-05627-z","url":"https://dblp.org/rec/journals/tjs/OzkanMO23"}, "url":"URL#248670" }, { "@score":"1", "@id":"248671", "info":{"authors":{"author":[{"@pid":"328/4328","text":"Halit Öztekin"},{"@pid":"356/2108","text":"Abdelkader Lazzem"},{"@pid":"04/8628","text":"Ihsan Pehlivan"}]},"title":"Using FPGA-based content-addressable memory for mnemonics instruction searching in assembler design.","venue":"J. Supercomput.","volume":"79","number":"15","pages":"17386-17418","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/OztekinLP23","doi":"10.1007/S11227-023-05357-2","ee":"https://doi.org/10.1007/s11227-023-05357-2","url":"https://dblp.org/rec/journals/tjs/OztekinLP23"}, "url":"URL#248671" }, { "@score":"1", "@id":"248672", "info":{"authors":{"author":[{"@pid":"322/4697","text":"Muneeswaran Packiaraj"},{"@pid":"63/9995","text":"Sriram Kailasam"}]},"title":"HyPar-FCA+: an improved workload-aware elastic framework for FCA.","venue":"J. Supercomput.","volume":"79","number":"11","pages":"11767-11796","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/PackiarajK23","doi":"10.1007/S11227-023-05116-3","ee":"https://doi.org/10.1007/s11227-023-05116-3","url":"https://dblp.org/rec/journals/tjs/PackiarajK23"}, "url":"URL#248672" }, { "@score":"1", "@id":"248673", "info":{"authors":{"author":[{"@pid":"295/9904","text":"Vincenzo Eduardo Padulano"},{"@pid":"344/9038","text":"Pablo Oliver Cortés"},{"@pid":"89/8296","text":"Pedro Alonso-Jordá"},{"@pid":"73/704","text":"Enric Tejedor Saavedra"},{"@pid":"248/2320","text":"Sebastián Risco"},{"@pid":"13/3623","text":"Germán Moltó"}]},"title":"Leveraging an open source serverless framework for high energy physics computing.","venue":"J. Supercomput.","volume":"79","number":"8","pages":"8940-8965","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/PadulanoCASRM23","doi":"10.1007/S11227-022-05016-Y","ee":"https://doi.org/10.1007/s11227-022-05016-y","url":"https://dblp.org/rec/journals/tjs/PadulanoCASRM23"}, "url":"URL#248673" }, { "@score":"1", "@id":"248674", "info":{"authors":{"author":[{"@pid":"32/3540","text":"Kung-Jui Pai"},{"@pid":"61/3429","text":"Ro-Yu Wu"},{"@pid":"30/1658","text":"Sheng-Lung Peng"},{"@pid":"08/4586","text":"Jou-Ming Chang"}]},"title":"Three edge-disjoint Hamiltonian cycles in crossed cubes with applications to fault-tolerant data broadcasting.","venue":"J. Supercomput.","volume":"79","number":"4","pages":"4126-4145","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/PaiWPC23","doi":"10.1007/S11227-022-04825-5","ee":"https://doi.org/10.1007/s11227-022-04825-5","url":"https://dblp.org/rec/journals/tjs/PaiWPC23"}, "url":"URL#248674" }, { "@score":"1", "@id":"248675", "info":{"authors":{"author":[{"@pid":"253/3941","text":"Debranjan Pal"},{"@pid":"320/2285","text":"Md Rasid Ali"},{"@pid":"73/1871-4","text":"Abhijit Das 0004"},{"@pid":"09/6690","text":"Dipanwita Roy Chowdhury"}]},"title":"A cluster-based practical key recovery attack on reduced-round AES using impossible-differential cryptanalysis.","venue":"J. Supercomput.","volume":"79","number":"6","pages":"6252-6289","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/PalADC23","doi":"10.1007/S11227-022-04872-Y","ee":"https://doi.org/10.1007/s11227-022-04872-y","url":"https://dblp.org/rec/journals/tjs/PalADC23"}, "url":"URL#248675" }, { "@score":"1", "@id":"248676", "info":{"authors":{"author":[{"@pid":"316/8951","text":"Sudip Kumar Palit"},{"@pid":"03/3484","text":"Mohuya Chakraborty"},{"@pid":"316/8433","text":"Subhalaxmi Chakraborty"}]},"title":"Performance analysis of 5GMAKA: lightweight mutual authentication and key agreement scheme for 5G network.","venue":"J. Supercomput.","volume":"79","number":"4","pages":"3902-3935","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/PalitCC23","doi":"10.1007/S11227-022-04807-7","ee":"https://doi.org/10.1007/s11227-022-04807-7","url":"https://dblp.org/rec/journals/tjs/PalitCC23"}, "url":"URL#248676" }, { "@score":"1", "@id":"248677", "info":{"authors":{"author":[{"@pid":"165/9485","text":"Priyanka Paliwal"},{"@pid":"41/7912","text":"Julian L. Webber"},{"@pid":"45/3942","text":"Abolfazl Mehbodniya"},{"@pid":"142/5978","text":"Mohd Anul Haq"},{"@pid":"88/6447-9","text":"Anil Kumar 0009"},{"@pid":"309/0848","text":"Prem Kumar Chaurasiya"}]},"title":"Correction to: Multi-agent-based approach for generation expansion planning in isolated micro-grid with renewable energy sources and battery storage.","venue":"J. Supercomput.","volume":"79","number":"1","pages":"1156-1157","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/PaliwalWMHKC23","doi":"10.1007/S11227-022-04683-1","ee":"https://doi.org/10.1007/s11227-022-04683-1","url":"https://dblp.org/rec/journals/tjs/PaliwalWMHKC23"}, "url":"URL#248677" }, { "@score":"1", "@id":"248678", "info":{"authors":{"author":[{"@pid":"253/2214","text":"Patitapaban Palo"},{"@pid":"44/5813","text":"Aurobinda Routray"},{"@pid":"255/3984","text":"Rahul Mahadik"},{"@pid":"304/0188","text":"Sanjai Kumar Singh"}]},"title":"Fault detection in seismic data using graph convolutional network.","venue":"J. Supercomput.","volume":"79","number":"11","pages":"12737-12765","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/PaloRMS23","doi":"10.1007/S11227-023-05173-8","ee":"https://doi.org/10.1007/s11227-023-05173-8","url":"https://dblp.org/rec/journals/tjs/PaloRMS23"}, "url":"URL#248678" }, { "@score":"1", "@id":"248679", "info":{"authors":{"author":[{"@pid":"339/4200","text":"Kaige Pan"},{"@pid":"136/2169","text":"Dongqin Cheng"}]},"title":"Star structure connectivity of cayley graphs generated by transposition trees.","venue":"J. Supercomput.","volume":"79","number":"4","pages":"4398-4411","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/PanC23","doi":"10.1007/S11227-022-04837-1","ee":"https://doi.org/10.1007/s11227-022-04837-1","url":"https://dblp.org/rec/journals/tjs/PanC23"}, "url":"URL#248679" }, { "@score":"1", "@id":"248680", "info":{"authors":{"author":[{"@pid":"63/7761","text":"Wenjun Pan"},{"@pid":"125/3930","text":"Miao Lin"}]},"title":"Dynamics and risk assessment of a remanufacturing closed-loop supply chain system using the internet of things and neural network approach.","venue":"J. Supercomput.","volume":"79","number":"4","pages":"3878-3901","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/PanL23","doi":"10.1007/S11227-022-04727-6","ee":"https://doi.org/10.1007/s11227-022-04727-6","url":"https://dblp.org/rec/journals/tjs/PanL23"}, "url":"URL#248680" }, { "@score":"1", "@id":"248681", "info":{"authors":{"author":[{"@pid":"57/6978","text":"Jingshan Pan"},{"@pid":"51/6195","text":"Lei Xiao"},{"@pid":"91/5889","text":"Min Tian"},{"@pid":"43/656-29","text":"Tao Liu 0029"},{"@pid":"97/7016","text":"Yinglong Wang"}]},"title":"swParaFEM: a highly efficient parallel finite element solver on Sunway many-core architecture.","venue":"J. Supercomput.","volume":"79","number":"10","pages":"11427-11451","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/PanXTLW23","doi":"10.1007/S11227-023-05114-5","ee":"https://doi.org/10.1007/s11227-023-05114-5","url":"https://dblp.org/rec/journals/tjs/PanXTLW23"}, "url":"URL#248681" }, { "@score":"1", "@id":"248682", "info":{"authors":{"author":[{"@pid":"344/9188","text":"Suguna Paramasivam"},{"@pid":"119/4997","text":"R. Leela Velusamy"}]},"title":"Cor-ENTC:correlation with ensembled approach for network traffic classification using SDN technology for future networks.","venue":"J. Supercomput.","volume":"79","number":"8","pages":"8513-8537","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ParamasivamV23","doi":"10.1007/S11227-022-04969-4","ee":"https://doi.org/10.1007/s11227-022-04969-4","url":"https://dblp.org/rec/journals/tjs/ParamasivamV23"}, "url":"URL#248682" }, { "@score":"1", "@id":"248683", "info":{"authors":{"author":[{"@pid":"35/610","text":"Jung-Heum Park"},{"@pid":"58/1249","text":"Hyeong-Seok Lim"}]},"title":"Characterization of interval graphs that are paired 2-disjoint path coverable.","venue":"J. Supercomput.","volume":"79","number":"3","pages":"2783-2800","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ParkL23","doi":"10.1007/S11227-022-04768-X","ee":"https://doi.org/10.1007/s11227-022-04768-x","url":"https://dblp.org/rec/journals/tjs/ParkL23"}, "url":"URL#248683" }, { "@score":"1", "@id":"248684", "info":{"authors":{"author":[{"@pid":"37/179","text":"Sungwoo Park"},{"@pid":"279/2624","text":"Jaeuk Moon"},{"@pid":"317/0452","text":"Seongkuk Cho"},{"@pid":"54/1072","text":"Eenjun Hwang"}]},"title":"Instance segmentation-based review photo validation scheme.","venue":"J. Supercomput.","volume":"79","number":"3","pages":"3489-3510","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ParkMCH23","doi":"10.1007/S11227-022-04784-X","ee":"https://doi.org/10.1007/s11227-022-04784-x","url":"https://dblp.org/rec/journals/tjs/ParkMCH23"}, "url":"URL#248684" }, { "@score":"1", "@id":"248685", "info":{"authors":{"author":[{"@pid":"338/6415","text":"Andrew T. Park"},{"@pid":"338/6517","text":"Nathaniel Peck"},{"@pid":"249/6289","text":"Richard Dill"},{"@pid":"33/7391","text":"Douglas D. Hodson"},{"@pid":"g/MichaelRGrimaila","text":"Michael R. Grimaila"},{"@pid":"146/1944","text":"Wayne C. Henry"}]},"title":"Distribution of DDS-cerberus authenticated facial recognition streams.","venue":"J. Supercomput.","volume":"79","number":"3","pages":"3471-3488","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/ParkPDHGH23","doi":"10.1007/S11227-022-04771-2","ee":"https://doi.org/10.1007/s11227-022-04771-2","url":"https://dblp.org/rec/journals/tjs/ParkPDHGH23"}, "url":"URL#248685" }, { "@score":"1", "@id":"248686", "info":{"authors":{"author":[{"@pid":"338/6415","text":"Andrew T. Park"},{"@pid":"338/6517","text":"Nathaniel Peck"},{"@pid":"249/6289","text":"Richard Dill"},{"@pid":"33/7391","text":"Douglas D. Hodson"},{"@pid":"g/MichaelRGrimaila","text":"Michael R. Grimaila"},{"@pid":"146/1944","text":"Wayne C. Henry"}]},"title":"Quantifying DDS-cerberus network control overhead.","venue":"J. Supercomput.","volume":"79","number":"4","pages":"3616-3642","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/ParkPDHGH23a","doi":"10.1007/S11227-022-04770-3","ee":"https://doi.org/10.1007/s11227-022-04770-3","url":"https://dblp.org/rec/journals/tjs/ParkPDHGH23a"}, "url":"URL#248686" }, { "@score":"1", "@id":"248687", "info":{"authors":{"author":[{"@pid":"198/9071","text":"Massimiliano Lupo Pasini"},{"@pid":"57/11273","text":"Junqi Yin"}]},"title":"Stable parallel training of Wasserstein conditional generative adversarial neural networks.","venue":"J. Supercomput.","volume":"79","number":"2","pages":"1856-1876","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/PasiniY23","doi":"10.1007/S11227-022-04721-Y","ee":"https://doi.org/10.1007/s11227-022-04721-y","url":"https://dblp.org/rec/journals/tjs/PasiniY23"}, "url":"URL#248687" }, { "@score":"1", "@id":"248688", "info":{"authors":{"author":[{"@pid":"120/7791","text":"Mukesh Patidar"},{"@pid":"187/8872","text":"Upendra Singh"},{"@pid":"224/5933","text":"Surendra Kumar Shukla"},{"@pid":"316/3867","text":"Giriraj Kumar Prajapati"},{"@pid":"282/3223","text":"Namit Gupta"}]},"title":"An ultra-area-efficient ALU design in QCA technology using synchronized clock zone scheme.","venue":"J. Supercomput.","volume":"79","number":"8","pages":"8265-8294","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/PatidarSSPG23","doi":"10.1007/S11227-022-05012-2","ee":"https://doi.org/10.1007/s11227-022-05012-2","url":"https://dblp.org/rec/journals/tjs/PatidarSSPG23"}, "url":"URL#248688" }, { "@score":"1", "@id":"248689", "info":{"authors":{"author":[{"@pid":"151/7032","text":"Aditi Paul"},{"@pid":"272/3872","text":"Somnath Sinha"}]},"title":"Received signal strength-based location verification technique in Wireless Sensor Network using Spline curve.","venue":"J. Supercomput.","volume":"79","number":"9","pages":"10093-10116","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/PaulS23","doi":"10.1007/S11227-023-05069-7","ee":"https://doi.org/10.1007/s11227-023-05069-7","url":"https://dblp.org/rec/journals/tjs/PaulS23"}, "url":"URL#248689" }, { "@score":"1", "@id":"248690", "info":{"authors":{"author":[{"@pid":"333/8483","text":"Yanhua Peng"},{"@pid":"254/5313","text":"Yipu Yan"},{"@pid":"213/9417","text":"Guoyu Chen"},{"@pid":"10/10646","text":"Biao Feng"},{"@pid":"32/4831-2","text":"Xingyu Gao 0002"}]},"title":"An underwater attenuation image enhancement method with adaptive color compensation and detail optimization.","venue":"J. Supercomput.","volume":"79","number":"2","pages":"1544-1570","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/PengYCFG23","doi":"10.1007/S11227-022-04720-Z","ee":"https://doi.org/10.1007/s11227-022-04720-z","url":"https://dblp.org/rec/journals/tjs/PengYCFG23"}, "url":"URL#248690" }, { "@score":"1", "@id":"248691", "info":{"authors":{"author":[{"@pid":"198/3352","text":"Esteban Pérez-Wohlfeil"},{"@pid":"t/OswaldoTrelles","text":"Oswaldo Trelles"},{"@pid":"g/NicolasGuilMata","text":"Nicolás Guil"}]},"title":"Irregular alignment of arbitrarily long DNA sequences on GPU.","venue":"J. Supercomput.","volume":"79","number":"8","pages":"8699-8728","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/PerezWohlfeilTG23","doi":"10.1007/S11227-022-05007-Z","ee":"https://doi.org/10.1007/s11227-022-05007-z","url":"https://dblp.org/rec/journals/tjs/PerezWohlfeilTG23"}, "url":"URL#248691" }, { "@score":"1", "@id":"248692", "info":{"authors":{"author":[{"@pid":"344/8369","text":"Thi-Ngot Pham"},{"@pid":"344/9176","text":"Viet-Hoan Nguyen"},{"@pid":"58/3207","text":"Jun-Ho Huh"}]},"title":"Integration of improved YOLOv5 for face mask detector and auto-labeling to generate dataset for fighting against COVID-19.","venue":"J. Supercomput.","volume":"79","number":"8","pages":"8966-8992","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/PhamNH23","doi":"10.1007/S11227-022-04979-2","ee":"https://doi.org/10.1007/s11227-022-04979-2","url":"https://dblp.org/rec/journals/tjs/PhamNH23"}, "url":"URL#248692" }, { "@score":"1", "@id":"248693", "info":{"authors":{"author":[{"@pid":"320/4811","text":"Dang Thi Phuc"},{"@pid":"348/1061","text":"Ngoc Trinh Tran"},{"@pid":"348/0739","text":"Van Hau To"},{"@pid":"320/4338","text":"Tran Thi Minh Khoa"}]},"title":"Improved YOLOv5 for real-time traffic signs recognition in bad weather conditions.","venue":"J. Supercomput.","volume":"79","number":"10","pages":"10706-10724","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/PhucTTK23","doi":"10.1007/S11227-023-05097-3","ee":"https://doi.org/10.1007/s11227-023-05097-3","url":"https://dblp.org/rec/journals/tjs/PhucTTK23"}, "url":"URL#248693" }, { "@score":"1", "@id":"248694", "info":{"authors":{"author":[{"@pid":"224/7707","text":"Thiago Felipe da Silva Pinheiro"},{"@pid":"23/4827","text":"Paulo Pereira"},{"@pid":"92/7568","text":"Bruno Silva 0001"},{"@pid":"m/PRMartinsMaciel","text":"Paulo Maciel 0001"}]},"title":"A performance modeling framework for microservices-based cloud infrastructures.","venue":"J. Supercomput.","volume":"79","number":"7","pages":"7762-7803","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/PinheiroPSM23","doi":"10.1007/S11227-022-04967-6","ee":"https://doi.org/10.1007/s11227-022-04967-6","url":"https://dblp.org/rec/journals/tjs/PinheiroPSM23"}, "url":"URL#248694" }, { "@score":"1", "@id":"248695", "info":{"authors":{"author":[{"@pid":"177/4770","text":"Otto Benjamin Piramuthu"},{"@pid":"09/384","text":"Matthew Caesar 0001"}]},"title":"VANET authentication protocols: security analysis and a proposal.","venue":"J. Supercomput.","volume":"79","number":"2","pages":"2153-2179","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/PiramuthuC23","doi":"10.1007/S11227-022-04736-5","ee":"https://doi.org/10.1007/s11227-022-04736-5","url":"https://dblp.org/rec/journals/tjs/PiramuthuC23"}, "url":"URL#248695" }, { "@score":"1", "@id":"248696", "info":{"authors":{"author":[{"@pid":"312/1643","text":"Amit Kumar Pramanik"},{"@pid":"200/8236","text":"Mahabub Hasan Mahalat"},{"@pid":"134/8511","text":"Jayanta Pal"},{"@pid":"226/2309","text":"Seyed-Sajad Ahmadpour"},{"@pid":"03/8746","text":"Bibhash Sen"}]},"title":"Cost-effective synthesis of QCA logic circuit using genetic algorithm.","venue":"J. Supercomput.","volume":"79","number":"4","pages":"3850-3877","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/PramanikMPAS23","doi":"10.1007/S11227-022-04757-0","ee":"https://doi.org/10.1007/s11227-022-04757-0","url":"https://dblp.org/rec/journals/tjs/PramanikMPAS23"}, "url":"URL#248696" }, { "@score":"1", "@id":"248697", "info":{"authors":{"author":[{"@pid":"277/6108","text":"Daniel Precioso"},{"@pid":"82/8082","text":"David Gómez-Ullate"}]},"title":"Thresholding methods in non-intrusive load monitoring.","venue":"J. Supercomput.","volume":"79","number":"13","pages":"14039-14062","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/PreciosoG23","doi":"10.1007/S11227-023-05149-8","ee":"https://doi.org/10.1007/s11227-023-05149-8","url":"https://dblp.org/rec/journals/tjs/PreciosoG23"}, "url":"URL#248697" }, { "@score":"1", "@id":"248698", "info":{"authors":{"author":[{"@pid":"271/1493","text":"Rahul Priyadarshi"},{"@pid":"28/11294","text":"Bharat Gupta"}]},"title":"2-D coverage optimization in obstacle-based FOI in WSN using modified PSO.","venue":"J. Supercomput.","volume":"79","number":"5","pages":"4847-4869","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/PriyadarshiG23","doi":"10.1007/S11227-022-04832-6","ee":"https://doi.org/10.1007/s11227-022-04832-6","url":"https://dblp.org/rec/journals/tjs/PriyadarshiG23"}, "url":"URL#248698" }, { "@score":"1", "@id":"248699", "info":{"title":"Retraction Note: Agent-based supply chain allocation model and its application in smart manufacturing enterprises.","venue":"J. Supercomput.","volume":"79","number":"9","pages":"10509","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/PuJYT23","doi":"10.1007/S11227-023-05230-2","ee":"https://doi.org/10.1007/s11227-023-05230-2","url":"https://dblp.org/rec/journals/tjs/PuJYT23"}, "url":"URL#248699" }, { "@score":"1", "@id":"248700", "info":{"authors":{"author":[{"@pid":"61/11374","text":"Hongwei Qiao"},{"@pid":"86/109","text":"Jixiang Meng"},{"@pid":"152/5321","text":"Eminjan Sabir"}]},"title":"The edge fault-tolerant spanning laceability of the enhanced hypercube networks.","venue":"J. Supercomput.","volume":"79","number":"6","pages":"6070-6086","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/QiaoMS23","doi":"10.1007/S11227-022-04896-4","ee":"https://doi.org/10.1007/s11227-022-04896-4","url":"https://dblp.org/rec/journals/tjs/QiaoMS23"}, "url":"URL#248700" }, { "@score":"1", "@id":"248701", "info":{"authors":{"author":[{"@pid":"68/7434","text":"Yuhua Qin"},{"@pid":"91/4193","text":"Haoran Liu"},{"@pid":"154/1932","text":"Rongrong Yin"},{"@pid":"12/6839","text":"Shiwei Zhao"},{"@pid":"154/1959","text":"Mingru Dong"}]},"title":"Non-cooperative target tracking method based on underwater acoustic sensor networks.","venue":"J. Supercomput.","volume":"79","number":"17","pages":"19227-19253","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/QinLYZD23","doi":"10.1007/S11227-023-05367-0","ee":"https://doi.org/10.1007/s11227-023-05367-0","url":"https://dblp.org/rec/journals/tjs/QinLYZD23"}, "url":"URL#248701" }, { "@score":"1", "@id":"248702", "info":{"authors":{"author":[{"@pid":"335/4314","text":"Yugang Qin"},{"@pid":"55/7726","text":"Yurong Qian"},{"@pid":"199/1387","text":"Hongyang Wei"},{"@pid":"135/8957","text":"Yingying Fan"},{"@pid":"339/4464","text":"Peiyun Feng"}]},"title":"FE-CSP: a fast and efficient pedestrian detector with center and scale prediction.","venue":"J. Supercomput.","volume":"79","number":"4","pages":"4084-4104","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/QinQWFF23","doi":"10.1007/S11227-022-04815-7","ee":"https://doi.org/10.1007/s11227-022-04815-7","url":"https://dblp.org/rec/journals/tjs/QinQWFF23"}, "url":"URL#248702" }, { "@score":"1", "@id":"248703", "info":{"authors":{"author":[{"@pid":"262/2160","text":"Rixuan Qiu"},{"@pid":"283/4111","text":"Jiawen Bao"},{"@pid":"82/3439","text":"Yuancheng Li"},{"@pid":"05/3403","text":"Xin Zhou"},{"@pid":"62/1052","text":"Liang Liang"},{"@pid":"57/1592","text":"Hui Tian"},{"@pid":"341/7977","text":"Yanting Zeng"},{"@pid":"38/5467","text":"Jie Shi"}]},"title":"Virtual network function deployment algorithm based on graph convolution deep reinforcement learning.","venue":"J. Supercomput.","volume":"79","number":"6","pages":"6849-6870","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/QiuBLZLTZS23","doi":"10.1007/S11227-022-04947-W","ee":"https://doi.org/10.1007/s11227-022-04947-w","url":"https://dblp.org/rec/journals/tjs/QiuBLZLTZS23"}, "url":"URL#248703" }, { "@score":"1", "@id":"248704", "info":{"authors":{"author":[{"@pid":"348/0797","text":"Mohammed Qorich"},{"@pid":"210/4109","text":"Rajae El Ouazzani"}]},"title":"Text sentiment classification of Amazon reviews using word embeddings and convolutional neural networks.","venue":"J. Supercomput.","volume":"79","number":"10","pages":"11029-11054","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/QorichO23","doi":"10.1007/S11227-023-05094-6","ee":"https://doi.org/10.1007/s11227-023-05094-6","url":"https://dblp.org/rec/journals/tjs/QorichO23"}, "url":"URL#248704" }, { "@score":"1", "@id":"248705", "info":{"authors":{"author":[{"@pid":"187/6864","text":"Xiaofeng Qu"},{"@pid":"19/3380","text":"Huiqiang Wang"}]},"title":"A joint optimization scheme of task caching and offloading for smart factories.","venue":"J. Supercomput.","volume":"79","number":"13","pages":"15185-15211","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/QuW23","doi":"10.1007/S11227-023-05257-5","ee":"https://doi.org/10.1007/s11227-023-05257-5","url":"https://dblp.org/rec/journals/tjs/QuW23"}, "url":"URL#248705" }, { "@score":"1", "@id":"248706", "info":{"authors":{"author":[{"@pid":"39/5054","text":"Hua Qu"},{"@pid":"181/2613","text":"Ke Wang"},{"@pid":"84/5466","text":"Jihong Zhao 0001"}]},"title":"Survivable SFC deployment method based on federated learning in multi-domain network.","venue":"J. Supercomput.","volume":"79","number":"16","pages":"18198-18226","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/QuWZ23","doi":"10.1007/S11227-023-05382-1","ee":"https://doi.org/10.1007/s11227-023-05382-1","url":"https://dblp.org/rec/journals/tjs/QuWZ23"}, "url":"URL#248706" }, { "@score":"1", "@id":"248707", "info":{"authors":{"author":[{"@pid":"136/4837","text":"Wen Qu"},{"@pid":"42/5105","text":"Ting Zhu"},{"@pid":"03/2134","text":"Jie Liu"},{"@pid":"262/1679","text":"Jianxin Li"}]},"title":"Correction to: A time sequence location method of long video violence based on improved C3D network.","venue":"J. Supercomput.","volume":"79","number":"1","pages":"1158","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/QuZLL23","doi":"10.1007/S11227-022-04699-7","ee":"https://doi.org/10.1007/s11227-022-04699-7","url":"https://dblp.org/rec/journals/tjs/QuZLL23"}, "url":"URL#248707" }, { "@score":"1", "@id":"248708", "info":{"authors":{"author":[{"@pid":"41/160","text":"José L. Quiroz-Fabian"},{"@pid":"20/3943","text":"Graciela Román-Alonso"},{"@pid":"76/4204","text":"Miguel A. Castro-García"},{"@pid":"20/5830","text":"Manuel Aguilar Cornejo"}]},"title":"PAARes: an efficient process allocation based on the available resources of cluster nodes.","venue":"J. Supercomput.","volume":"79","number":"9","pages":"10423-10441","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/QuirozFabianRCC23","doi":"10.1007/S11227-023-05085-7","ee":"https://doi.org/10.1007/s11227-023-05085-7","url":"https://dblp.org/rec/journals/tjs/QuirozFabianRCC23"}, "url":"URL#248708" }, { "@score":"1", "@id":"248709", "info":{"authors":{"author":[{"@pid":"05/7750","text":"Ricardo Quislant"},{"@pid":"253/4128","text":"Ivan Fernandez"},{"@pid":"96/5804","text":"Eladio Gutiérrez"},{"@pid":"77/5831","text":"Oscar G. Plata"}]},"title":"Time series analysis acceleration with advanced vectorization extensions.","venue":"J. Supercomput.","volume":"79","number":"9","pages":"10178-10207","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/QuislantFGP23","doi":"10.1007/S11227-023-05060-2","ee":"https://doi.org/10.1007/s11227-023-05060-2","url":"https://dblp.org/rec/journals/tjs/QuislantFGP23"}, "url":"URL#248709" }, { "@score":"1", "@id":"248710", "info":{"authors":{"author":[{"@pid":"13/9019","text":"Moh'd A. Radaideh"},{"@pid":"346/0744","text":"Nadil Iyad Mohammad"},{"@pid":"346/0580","text":"Maya Mohammad Mukbil"}]},"title":"A proposed cloud‑based platform for facilitating donation services in support to needy-students.","venue":"J. Supercomput.","volume":"79","number":"9","pages":"10063-10092","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/RadaidehMM23","doi":"10.1007/S11227-023-05062-0","ee":"https://doi.org/10.1007/s11227-023-05062-0","url":"https://dblp.org/rec/journals/tjs/RadaidehMM23"}, "url":"URL#248710" }, { "@score":"1", "@id":"248711", "info":{"authors":{"author":{"@pid":"242/3057","text":"Mojtaba Rafiee"}},"title":"Flexible multi-client functional encryption for set intersection.","venue":"J. Supercomput.","volume":"79","number":"12","pages":"13744-13765","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/Rafiee23","doi":"10.1007/S11227-023-05129-Y","ee":"https://doi.org/10.1007/s11227-023-05129-y","url":"https://dblp.org/rec/journals/tjs/Rafiee23"}, "url":"URL#248711" }, { "@score":"1", "@id":"248712", "info":{"authors":{"author":[{"@pid":"130/3619","text":"G. K. Ragesh"},{"@pid":"85/4670","text":"Ajay Kumar"}]},"title":"Trust-based secure routing and message delivery protocol for signal processing attacks in IoT applications.","venue":"J. Supercomput.","volume":"79","number":"3","pages":"2882-2909","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/RageshK23","doi":"10.1007/S11227-022-04766-Z","ee":"https://doi.org/10.1007/s11227-022-04766-z","url":"https://dblp.org/rec/journals/tjs/RageshK23"}, "url":"URL#248712" }, { "@score":"1", "@id":"248713", "info":{"authors":{"author":[{"@pid":"252/0175","text":"Raghav"},{"@pid":"223/3819","text":"Nitish Andola"},{"@pid":"339/4134","text":"Katyayani Verma"},{"@pid":"43/5587-2","text":"S. Venkatesan 0002"},{"@pid":"39/2285","text":"Shekhar Verma"}]},"title":"Proactive threshold-proxy re-encryption scheme for secure data sharing on cloud.","venue":"J. Supercomput.","volume":"79","number":"13","pages":"14117-14145","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/RaghavAVVV23","doi":"10.1007/S11227-023-05221-3","ee":"https://doi.org/10.1007/s11227-023-05221-3","url":"https://dblp.org/rec/journals/tjs/RaghavAVVV23"}, "url":"URL#248713" }, { "@score":"1", "@id":"248714", "info":{"authors":{"author":[{"@pid":"252/0175","text":"Raghav"},{"@pid":"223/3819","text":"Nitish Andola"},{"@pid":"339/4134","text":"Katyayani Verma"},{"@pid":"43/5587-2","text":"S. Venkatesan 0002"},{"@pid":"39/2285","text":"Shekhar Verma"}]},"title":"Correction to: Proactive threshold‑proxy re‑encryption scheme for secure data sharing on cloud.","venue":"J. Supercomput.","volume":"79","number":"15","pages":"17755","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/RaghavAVVV23a","doi":"10.1007/S11227-023-05343-8","ee":"https://doi.org/10.1007/s11227-023-05343-8","url":"https://dblp.org/rec/journals/tjs/RaghavAVVV23a"}, "url":"URL#248714" }, { "@score":"1", "@id":"248715", "info":{"authors":{"author":[{"@pid":"55/10505","text":"Peyman Rahmani"},{"@pid":"162/9263","text":"Seyed Mostafa Fakhrahmad"},{"@pid":"72/4993","text":"Mohammad Taheri"}]},"title":"Secure data outsourcing based on seed-residual shares and order-shuffling encryption.","venue":"J. Supercomput.","volume":"79","number":"9","pages":"10442-10480","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/RahmaniFT23","doi":"10.1007/S11227-023-05048-Y","ee":"https://doi.org/10.1007/s11227-023-05048-y","url":"https://dblp.org/rec/journals/tjs/RahmaniFT23"}, "url":"URL#248715" }, { "@score":"1", "@id":"248716", "info":{"authors":{"author":[{"@pid":"338/7211","text":"Mehdi Rahmanian"},{"@pid":"16/8812","text":"Ramin Nassiri"},{"@pid":"59/2424","text":"Mehran Mohsenzadeh"},{"@pid":"76/5","text":"Reza Ravanmehr"}]},"title":"Test case generation for enterprise business services based on enterprise architecture design.","venue":"J. Supercomput.","volume":"79","number":"2","pages":"1877-1907","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/RahmanianNMR23","doi":"10.1007/S11227-022-04742-7","ee":"https://doi.org/10.1007/s11227-022-04742-7","url":"https://dblp.org/rec/journals/tjs/RahmanianNMR23"}, "url":"URL#248716" }, { "@score":"1", "@id":"248717", "info":{"authors":{"author":[{"@pid":"160/1468","text":"Ranjit Rajak"},{"@pid":"31/4964-2","text":"Shrawan Kumar 0002"},{"@pid":"78/6423","text":"Shiv Prakash"},{"@pid":"331/9607","text":"Nidhi Rajak"},{"@pid":"287/3910","text":"Pratibha Dixit"}]},"title":"A novel technique to optimize quality of service for directed acyclic graph (DAG) scheduling in cloud computing environment using heuristic approach.","venue":"J. Supercomput.","volume":"79","number":"2","pages":"1956-1979","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/RajakKPRD23","doi":"10.1007/S11227-022-04729-4","ee":"https://doi.org/10.1007/s11227-022-04729-4","url":"https://dblp.org/rec/journals/tjs/RajakKPRD23"}, "url":"URL#248717" }, { "@score":"1", "@id":"248718", "info":{"authors":{"author":[{"@pid":"246/6667","text":"P. Rajasekar"},{"@pid":"174/5865","text":"H. Mangalam"},{"@pid":"246/6637","text":"C. S. Subash Kumar"}]},"title":"Logic Realization of Galois Field for AES SBOX using Quantum Dot Cellular Automata.","venue":"J. Supercomput.","volume":"79","number":"3","pages":"3024-3054","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/RajasekarMK23","doi":"10.1007/S11227-022-04779-8","ee":"https://doi.org/10.1007/s11227-022-04779-8","url":"https://dblp.org/rec/journals/tjs/RajasekarMK23"}, "url":"URL#248718" }, { "@score":"1", "@id":"248719", "info":{"authors":{"author":[{"@pid":"276/8488","text":"Pintu Kumar Ram"},{"@pid":"48/11140","text":"Pratyay Kuila"}]},"title":"GAAE: a novel genetic algorithm based on autoencoder with ensemble classifiers for imbalanced healthcare data.","venue":"J. Supercomput.","volume":"79","number":"1","pages":"541-572","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/RamK23","doi":"10.1007/S11227-022-04679-X","ee":"https://doi.org/10.1007/s11227-022-04679-x","url":"https://dblp.org/rec/journals/tjs/RamK23"}, "url":"URL#248719" }, { "@score":"1", "@id":"248720", "info":{"title":"Retraction Note to: Accurate computation: COVID-19 rRT-PCR positive test dataset using stages classification through textual big data mining with machine learning.","venue":"J. Supercomput.","volume":"79","number":"6","pages":"7065","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/RamanathanR23","doi":"10.1007/S11227-022-04937-Y","ee":"https://doi.org/10.1007/s11227-022-04937-y","url":"https://dblp.org/rec/journals/tjs/RamanathanR23"}, "url":"URL#248720" }, { "@score":"1", "@id":"248721", "info":{"authors":{"author":[{"@pid":"288/4214","text":"Y. V. Ramanjaneyulu"},{"@pid":"75/6514","text":"Jitendra Kumar"},{"@pid":"11/8472","text":"Korra Sathya Babu"},{"@pid":"330/2574","text":"Bidyut Kumar Patra"}]},"title":"Enhancing the accuracy of group recommendation using slope one.","venue":"J. Supercomput.","volume":"79","number":"1","pages":"499-540","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/RamanjaneyuluKB23","doi":"10.1007/S11227-022-04664-4","ee":"https://doi.org/10.1007/s11227-022-04664-4","url":"https://dblp.org/rec/journals/tjs/RamanjaneyuluKB23"}, "url":"URL#248721" }, { "@score":"1", "@id":"248722", "info":{"authors":{"author":[{"@pid":"357/5247","text":"Ali Ramezanzad"},{"@pid":"92/5442","text":"Mehran Rezaei"},{"@pid":"42/5747","text":"Hooman Nikmehr"},{"@pid":"232/6159","text":"Mahdi Kalbasi"}]},"title":"Real-time approximate and combined 2D convolvers for FPGA-based image processing.","venue":"J. Supercomput.","volume":"79","number":"16","pages":"18910-18946","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/RamezanzadRNK23","doi":"10.1007/S11227-023-05377-Y","ee":"https://doi.org/10.1007/s11227-023-05377-y","url":"https://dblp.org/rec/journals/tjs/RamezanzadRNK23"}, "url":"URL#248722" }, { "@score":"1", "@id":"248723", "info":{"authors":{"author":[{"@pid":"297/0465","text":"G. Ramya"},{"@pid":"74/6214","text":"R. Manoharan"}]},"title":"Traffic-aware dynamic controller placement in SDN using NFV.","venue":"J. Supercomput.","volume":"79","number":"2","pages":"2082-2107","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/RamyaM23","doi":"10.1007/S11227-022-04717-8","ee":"https://doi.org/10.1007/s11227-022-04717-8","url":"https://dblp.org/rec/journals/tjs/RamyaM23"}, "url":"URL#248723" }, { "@score":"1", "@id":"248724", "info":{"authors":{"author":[{"@pid":"212/0118","text":"Ruisheng Ran"},{"@pid":"357/5168","text":"Qianghui Zeng"},{"@pid":"41/10513","text":"Xiaopeng Jiang"},{"@pid":"94/4033-1","text":"Bin Fang 0001"}]},"title":"Isometric projection with reconstruction.","venue":"J. Supercomput.","volume":"79","number":"16","pages":"18648-18666","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/RanZJF23","doi":"10.1007/S11227-023-05354-5","ee":"https://doi.org/10.1007/s11227-023-05354-5","url":"https://dblp.org/rec/journals/tjs/RanZJF23"}, "url":"URL#248724" }, { "@score":"1", "@id":"248725", "info":{"authors":{"author":[{"@pid":"177/0874","text":"Alessio De Rango"},{"@pid":"95/1770","text":"Andrea Giordano"},{"@pid":"93/883","text":"Giuseppe Mendicino"},{"@pid":"95/4234","text":"Rocco Rongo"},{"@pid":"58/6561","text":"William Spataro"}]},"title":"Tailoring load balancing of cellular automata parallel execution to the case of a two-dimensional partitioned domain.","venue":"J. Supercomput.","volume":"79","number":"8","pages":"9273-9287","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/RangoGMRS23","doi":"10.1007/S11227-023-05043-3","ee":"https://doi.org/10.1007/s11227-023-05043-3","url":"https://dblp.org/rec/journals/tjs/RangoGMRS23"}, "url":"URL#248725" }, { "@score":"1", "@id":"248726", "info":{"authors":{"author":[{"@pid":"291/4340","text":"Radha Rani"},{"@pid":"188/1042","text":"Dharmendra Prasad Mahato"}]},"title":"A randomized algorithm for the wait-free consensus problem.","venue":"J. Supercomput.","volume":"79","number":"4","pages":"3666-3690","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/RaniM23","doi":"10.1007/S11227-022-04774-Z","ee":"https://doi.org/10.1007/s11227-022-04774-z","url":"https://dblp.org/rec/journals/tjs/RaniM23"}, "url":"URL#248726" }, { "@score":"1", "@id":"248727", "info":{"authors":{"author":[{"@pid":"70/555","text":"Tarik A. Rashid"},{"@pid":"255/1270","text":"Bryar A. Hassan"},{"@pid":"160/8936","text":"Abeer Alsadoon"},{"@pid":"292/3443","text":"Shko M. Qader"},{"@pid":"247/2071","text":"S. Vimal 0001"},{"@pid":"98/2203","text":"Amit Chhabra"},{"@pid":"181/9645","text":"Zaher Mundher Yaseen"}]},"title":"Awareness requirement and performance management for adaptive systems: a survey.","venue":"J. Supercomput.","volume":"79","number":"9","pages":"9692-9714","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/RashidHAQVCY23","doi":"10.1007/S11227-022-05021-1","ee":"https://doi.org/10.1007/s11227-022-05021-1","url":"https://dblp.org/rec/journals/tjs/RashidHAQVCY23"}, "url":"URL#248727" }, { "@score":"1", "@id":"248728", "info":{"authors":{"author":[{"@pid":"347/5457","text":"Arjun Singh Rawat"},{"@pid":"180/2955","text":"Maroti Deshmukh"},{"@pid":"179/7496","text":"Maheep Singh"}]},"title":"Natural share-based lightweight (n, n) single secret image sharing scheme using LSB stuffing for medical images.","venue":"J. Supercomput.","volume":"79","number":"17","pages":"19138-19167","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/RawatDS23","doi":"10.1007/S11227-023-05396-9","ee":"https://doi.org/10.1007/s11227-023-05396-9","url":"https://dblp.org/rec/journals/tjs/RawatDS23"}, "url":"URL#248728" }, { "@score":"1", "@id":"248729", "info":{"authors":{"author":[{"@pid":"28/9187","text":"Ali Raza"},{"@pid":"140/1234","text":"Zeshan Iqbal"},{"@pid":"140/1285","text":"Farhan Aadil"}]},"title":"UAV-assisted ubiquitous communication architecture for urban VANET environment.","venue":"J. Supercomput.","volume":"79","number":"13","pages":"14602-14632","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/RazaIA23","doi":"10.1007/S11227-023-05223-1","ee":"https://doi.org/10.1007/s11227-023-05223-1","url":"https://dblp.org/rec/journals/tjs/RazaIA23"}, "url":"URL#248729" }, { "@score":"1", "@id":"248730", "info":{"authors":{"author":[{"@pid":"321/3445","text":"K. Rasool Reddy"},{"@pid":"69/8014","text":"Ravindra Dhuli"}]},"title":"Detection of brain tumors from MR images using fuzzy thresholding and texture feature descriptor.","venue":"J. Supercomput.","volume":"79","number":"8","pages":"9288-9319","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ReddyD23","doi":"10.1007/S11227-022-05033-X","ee":"https://doi.org/10.1007/s11227-022-05033-x","url":"https://dblp.org/rec/journals/tjs/ReddyD23"}, "url":"URL#248730" }, { "@score":"1", "@id":"248731", "info":{"authors":{"author":[{"@pid":"359/5156","text":"Posham Bhargava Reddy"},{"@pid":"122/1776","text":"Chapram Sudhakar"}]},"title":"An osmotic approach-based dynamic deadline-aware task offloading in edge-fog-cloud computing environment.","venue":"J. Supercomput.","volume":"79","number":"18","pages":"20938-20960","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ReddyS23","doi":"10.1007/S11227-023-05440-8","ee":"https://doi.org/10.1007/s11227-023-05440-8","url":"https://dblp.org/rec/journals/tjs/ReddyS23"}, "url":"URL#248731" }, { "@score":"1", "@id":"248732", "info":{"authors":{"author":[{"@pid":"346/6526","text":"M. Venkata Krishna Reddy"},{"@pid":"232/7902","text":"P. V. S. Srinivas"},{"@pid":"186/6448","text":"M. Chandra Mohan"}]},"title":"Energy efficient routing with secure and adaptive trust threshold approach in mobile ad hoc networks.","venue":"J. Supercomput.","volume":"79","number":"12","pages":"13519-13544","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ReddySM23","doi":"10.1007/S11227-023-05187-2","ee":"https://doi.org/10.1007/s11227-023-05187-2","url":"https://dblp.org/rec/journals/tjs/ReddySM23"}, "url":"URL#248732" }, { "@score":"1", "@id":"248733", "info":{"authors":{"author":[{"@pid":"171/3191","text":"Fujia Ren"},{"@pid":"82/1202","text":"Chenhui Yang"},{"@pid":"249/3733","text":"Yaser Ahangari Nanehkaran"}]},"title":"MRI-based model for MCI conversion using deep zero-shot transfer learning.","venue":"J. Supercomput.","volume":"79","number":"2","pages":"1182-1200","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/RenYN23","doi":"10.1007/S11227-022-04668-0","ee":"https://doi.org/10.1007/s11227-022-04668-0","url":"https://dblp.org/rec/journals/tjs/RenYN23"}, "url":"URL#248733" }, { "@score":"1", "@id":"248734", "info":{"authors":{"author":[{"@pid":"179/7998","text":"Paola Yuritzy Reyes-Delgado"},{"@pid":"84/5387","text":"Manuel Mora"},{"@pid":"43/4866","text":"Fen Wang"},{"@pid":"75/6773","text":"Jorge Marx Gómez"}]},"title":"AHP evaluation of rigorous and agile IT service design-building phases-workflows in data centers.","venue":"J. Supercomput.","volume":"79","number":"16","pages":"18089-18166","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ReyesDelgadoMWG23","doi":"10.1007/S11227-023-05219-X","ee":"https://doi.org/10.1007/s11227-023-05219-x","url":"https://dblp.org/rec/journals/tjs/ReyesDelgadoMWG23"}, "url":"URL#248734" }, { "@score":"1", "@id":"248735", "info":{"authors":{"author":[{"@pid":"310/8588","text":"Majdi Richa"},{"@pid":"90/3439","text":"Jean-Christophe Prévotet"},{"@pid":"119/7761","text":"Mickaël Dardaillon"},{"@pid":"44/8861","text":"Mohamad Mroué"},{"@pid":"08/7047","text":"Abed Ellatif Samhat"}]},"title":"High-level power estimation techniques in embedded systems hardware: an overview.","venue":"J. Supercomput.","volume":"79","number":"4","pages":"3771-3790","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/RichaPDMS23","doi":"10.1007/S11227-022-04798-5","ee":"https://doi.org/10.1007/s11227-022-04798-5","url":"https://dblp.org/rec/journals/tjs/RichaPDMS23"}, "url":"URL#248735" }, { "@score":"1", "@id":"248736", "info":{"authors":{"author":[{"@pid":"220/9824","text":"Noelia Rico"},{"@pid":"02/1038-1","text":"Pedro Alonso 0001"},{"@pid":"01/2014","text":"Irene Díaz"}]},"title":"Kemeny ranking aggregation meets the GPU.","venue":"J. Supercomput.","volume":"79","number":"9","pages":"10335-10352","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/RicoAD23","doi":"10.1007/S11227-023-05058-W","ee":"https://doi.org/10.1007/s11227-023-05058-w","url":"https://dblp.org/rec/journals/tjs/RicoAD23"}, "url":"URL#248736" }, { "@score":"1", "@id":"248737", "info":{"authors":{"author":[{"@pid":"357/5250","text":"Samira Riki"},{"@pid":"249/3134","text":"Fatemeh Serajeh-hassani"}]},"title":"Designing a one-bit coplanar QCA ALU using a novel robust area-efficient three-input majority gate design.","venue":"J. Supercomput.","volume":"79","number":"16","pages":"17897-17918","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/RikiS23","doi":"10.1007/S11227-023-05280-6","ee":"https://doi.org/10.1007/s11227-023-05280-6","url":"https://dblp.org/rec/journals/tjs/RikiS23"}, "url":"URL#248737" }, { "@score":"1", "@id":"248738", "info":{"authors":{"author":[{"@pid":"285/9780","text":"Lorenzo Di Rocco"},{"@pid":"41/3936","text":"Umberto Ferraro Petrillo"},{"@pid":"234/3270","text":"Francesco Palini"}]},"title":"Using software visualization to support the teaching of distributed programming.","venue":"J. Supercomput.","volume":"79","number":"4","pages":"3974-3998","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/RoccoPP23","doi":"10.1007/S11227-022-04805-9","ee":"https://doi.org/10.1007/s11227-022-04805-9","url":"https://dblp.org/rec/journals/tjs/RoccoPP23"}, "url":"URL#248738" }, { "@score":"1", "@id":"248739", "info":{"authors":{"author":[{"@pid":"207/3465","text":"Jose Rocher-Gonzalez"},{"@pid":"72/1341","text":"Jesús Escudero-Sahuquillo"},{"@pid":"74/6776","text":"Pedro Javier García"},{"@pid":"30/2177","text":"Francisco J. Quiles 0001"}]},"title":"Congestion management in high-performance interconnection networks using adaptive routing notifications.","venue":"J. Supercomput.","volume":"79","number":"7","pages":"7804-7834","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/RocherGonzalezEGQ23","doi":"10.1007/S11227-022-04926-1","ee":"https://doi.org/10.1007/s11227-022-04926-1","url":"https://dblp.org/rec/journals/tjs/RocherGonzalezEGQ23"}, "url":"URL#248739" }, { "@score":"1", "@id":"248740", "info":{"authors":{"author":[{"@pid":"249/8180","text":"Iago Richard Rodrigues Silva"},{"@pid":"297/8166","text":"Marrone Dantas"},{"@pid":"276/4633","text":"Assis T. de Oliveira Filho"},{"@pid":"122/9544","text":"Gibson B. N. Barbosa"},{"@pid":"176/0932","text":"Daniel Bezerra"},{"@pid":"93/5625","text":"Ricardo S. Souza"},{"@pid":"225/7898","text":"Maria Valéria Marquezini"},{"@pid":"18/8101","text":"Patricia Takako Endo"},{"@pid":"10/1554","text":"Judith Kelner"},{"@pid":"s/DjamelSadok","text":"Djamel Sadok"}]},"title":"A framework for robotic arm pose estimation and movement prediction based on deep and extreme learning models.","venue":"J. Supercomput.","volume":"79","number":"7","pages":"7176-7205","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/RodriguesDFBBSMEKS23","doi":"10.1007/S11227-022-04936-Z","ee":"https://doi.org/10.1007/s11227-022-04936-z","url":"https://dblp.org/rec/journals/tjs/RodriguesDFBBSMEKS23"}, "url":"URL#248740" }, { "@score":"1", "@id":"248741", "info":{"authors":{"author":[{"@pid":"356/7736","text":"Roopa Vuppula"},{"@pid":"148/8568","text":"Himansu Shekhar Pradhan"}]},"title":"Mathematical modeling and performance evaluation of BeRAN for 6G wireless networks.","venue":"J. Supercomput.","volume":"79","number":"15","pages":"16479-16528","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/RoopaP23","doi":"10.1007/S11227-023-05321-0","ee":"https://doi.org/10.1007/s11227-023-05321-0","url":"https://dblp.org/rec/journals/tjs/RoopaP23"}, "url":"URL#248741" }, { "@score":"1", "@id":"248742", "info":{"authors":{"author":[{"@pid":"192/8283","text":"Reza Roshani"},{"@pid":"143/8056","text":"Homayun Motameni"},{"@pid":"124/0377","text":"Hosein Mohamadi"}]},"title":"A decentralized method for initial populations of genetic algorithms.","venue":"J. Supercomput.","volume":"79","number":"9","pages":"10232-10251","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/RoshaniMM23","doi":"10.1007/S11227-023-05066-W","ee":"https://doi.org/10.1007/s11227-023-05066-w","url":"https://dblp.org/rec/journals/tjs/RoshaniMM23"}, "url":"URL#248742" }, { "@score":"1", "@id":"248743", "info":{"authors":{"author":[{"@pid":"356/2024","text":"Chitrangada Roy"},{"@pid":"140/2294","text":"Dushmanta Kumar Das"}]},"title":"Ameliorated class topper optimizer for cost optimization using demand side management program in a day-ahead energy market.","venue":"J. Supercomput.","volume":"79","number":"15","pages":"16688-16719","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/RoyD23","doi":"10.1007/S11227-023-05297-X","ee":"https://doi.org/10.1007/s11227-023-05297-x","url":"https://dblp.org/rec/journals/tjs/RoyD23"}, "url":"URL#248743" }, { "@score":"1", "@id":"248744", "info":{"authors":{"author":[{"@pid":"49/2493","text":"Aditi Roy"},{"@pid":"237/4239","text":"Kokila Jagadeesh"},{"@pid":"240/8316","text":"Natarajan Ramasubramanian"},{"@pid":"199/3541","text":"B. Shameedha Begum"}]},"title":"Device-specific security challenges and solution in IoT edge computing: a review.","venue":"J. Supercomput.","volume":"79","number":"18","pages":"20790-20825","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/RoyJRB23","doi":"10.1007/S11227-023-05450-6","ee":"https://doi.org/10.1007/s11227-023-05450-6","url":"https://dblp.org/rec/journals/tjs/RoyJRB23"}, "url":"URL#248744" }, { "@score":"1", "@id":"248745", "info":{"authors":{"author":[{"@pid":"349/2842","text":"Sergio Ruiz-Villafranca"},{"@pid":"256/1392","text":"Javier Carrillo Mondéjar"},{"@pid":"256/1415","text":"Juan Manuel Castelo Gómez"},{"@pid":"256/1478","text":"José Roldán Gómez"}]},"title":"MECInOT: a multi-access edge computing and industrial internet of things emulator for the modelling and study of cybersecurity threats.","venue":"J. Supercomput.","volume":"79","number":"11","pages":"11895-11933","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/Ruiz-Villafranca23","doi":"10.1007/S11227-023-05098-2","ee":"https://doi.org/10.1007/s11227-023-05098-2","url":"https://dblp.org/rec/journals/tjs/Ruiz-Villafranca23"}, "url":"URL#248745" }, { "@score":"1", "@id":"248746", "info":{"authors":{"author":[{"@pid":"86/2457","text":"Karl K. Sabelfeld"},{"@pid":"56/8850","text":"Sergey Kireev"},{"@pid":"135/0161","text":"Anastasiya E. Kireeva"}]},"title":"Parallel implementations of randomized vector algorithm for solving large systems of linear equations.","venue":"J. Supercomput.","volume":"79","number":"10","pages":"10555-10569","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/SabelfeldKK23","doi":"10.1007/S11227-023-05079-5","ee":"https://doi.org/10.1007/s11227-023-05079-5","url":"https://dblp.org/rec/journals/tjs/SabelfeldKK23"}, "url":"URL#248746" }, { "@score":"1", "@id":"248747", "info":{"authors":{"author":[{"@pid":"309/0389","text":"Anuj Sachan"},{"@pid":"152/8326","text":"Neetesh Kumar"}]},"title":"S-Edge: heterogeneity-aware, light-weighted, and edge computing integrated adaptive traffic light control framework.","venue":"J. Supercomput.","volume":"79","number":"13","pages":"14923-14953","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/SachanK23","doi":"10.1007/S11227-023-05216-0","ee":"https://doi.org/10.1007/s11227-023-05216-0","url":"https://dblp.org/rec/journals/tjs/SachanK23"}, "url":"URL#248747" }, { "@score":"1", "@id":"248748", "info":{"authors":{"author":[{"@pid":"37/2491","text":"Maryam Sadeghi"},{"@pid":"39/4242","text":"Mohammad Naderi Dehkordi"},{"@pid":"133/7279","text":"Behrang Barekatain"},{"@pid":"119/6807","text":"Naser Khani"}]},"title":"Improve customer churn prediction through the proposed PCA-PSO-K means algorithm in the communication industry.","venue":"J. Supercomput.","volume":"79","number":"6","pages":"6871-6888","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/SadeghiDBK23","doi":"10.1007/S11227-022-04907-4","ee":"https://doi.org/10.1007/s11227-022-04907-4","url":"https://dblp.org/rec/journals/tjs/SadeghiDBK23"}, "url":"URL#248748" }, { "@score":"1", "@id":"248749", "info":{"authors":{"author":[{"@pid":"37/2491","text":"Maryam Sadeghi"},{"@pid":"39/4242","text":"Mohammad Naderi Dehkordi"},{"@pid":"133/7279","text":"Behrang Barekatain"},{"@pid":"119/6807","text":"Naser Khani"}]},"title":"Correction to: Improve customer churn prediction through the proposed PCA‑PSO‑K means algorithm in the communication industry.","venue":"J. Supercomput.","volume":"79","number":"9","pages":"10505","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/SadeghiDBK23a","doi":"10.1007/S11227-022-05015-Z","ee":"https://doi.org/10.1007/s11227-022-05015-z","url":"https://dblp.org/rec/journals/tjs/SadeghiDBK23a"}, "url":"URL#248749" }, { "@score":"1", "@id":"248750", "info":{"authors":{"author":[{"@pid":"37/2491","text":"Maryam Sadeghi"},{"@pid":"39/4242","text":"Mohammad Naderi Dehkordi"},{"@pid":"133/7279","text":"Behrang Barekatain"},{"@pid":"119/6807","text":"Naser Khani"}]},"title":"Correction to: Improve customer churn prediction through the proposed PCA‑PSO‑K means algorithm in the communication industry.","venue":"J. Supercomput.","volume":"79","number":"13","pages":"15212","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/SadeghiDBK23b","doi":"10.1007/S11227-023-05204-4","ee":"https://doi.org/10.1007/s11227-023-05204-4","url":"https://dblp.org/rec/journals/tjs/SadeghiDBK23b"}, "url":"URL#248750" }, { "@score":"1", "@id":"248751", "info":{"authors":{"author":[{"@pid":"270/2778","text":"Muhammad Umair Sadiq"},{"@pid":"58/966","text":"Muhammad Murtaza Yousaf"}]},"title":"Space-efficient computation of parallel approximate string matching.","venue":"J. Supercomput.","volume":"79","number":"8","pages":"9093-9126","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/SadiqY23","doi":"10.1007/S11227-022-05038-6","ee":"https://doi.org/10.1007/s11227-022-05038-6","url":"https://dblp.org/rec/journals/tjs/SadiqY23"}, "url":"URL#248751" }, { "@score":"1", "@id":"248752", "info":{"authors":{"author":[{"@pid":"310/6863","text":"Behrouz Safaiezadeh"},{"@pid":"25/6784","text":"Lauri Kettunen"},{"@pid":"97/6804","text":"Majid Haghparast"}]},"title":"Novel high-performance QCA Fredkin gate and designing scalable QCA binary to gray and vice versa.","venue":"J. Supercomput.","volume":"79","number":"6","pages":"7037-7060","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/SafaiezadehKH23","doi":"10.1007/S11227-022-04939-W","ee":"https://doi.org/10.1007/s11227-022-04939-w","url":"https://dblp.org/rec/journals/tjs/SafaiezadehKH23"}, "url":"URL#248752" }, { "@score":"1", "@id":"248753", "info":{"authors":{"author":[{"@pid":"338/5601","text":"Saadat Safiri"},{"@pid":"97/10684","text":"Amirhossein Nikoofard"}]},"title":"Ladybug Beetle Optimization algorithm: application for real-world problems.","venue":"J. Supercomput.","volume":"79","number":"3","pages":"3511-3560","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/SafiriN23","doi":"10.1007/S11227-022-04755-2","ee":"https://doi.org/10.1007/s11227-022-04755-2","url":"https://dblp.org/rec/journals/tjs/SafiriN23"}, "url":"URL#248753" }, { "@score":"1", "@id":"248754", "info":{"authors":{"author":[{"@pid":"171/1281","text":"Masoud Sagharichian"},{"@pid":"182/3013","text":"Morteza Alipour Langouri"}]},"title":"iPartition: a distributed partitioning algorithm for block-centric graph processing systems.","venue":"J. Supercomput.","volume":"79","number":"18","pages":"21116-21143","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/SagharichianL23","doi":"10.1007/S11227-023-05492-W","ee":"https://doi.org/10.1007/s11227-023-05492-w","url":"https://dblp.org/rec/journals/tjs/SagharichianL23"}, "url":"URL#248754" }, { "@score":"1", "@id":"248755", "info":{"authors":{"author":[{"@pid":"345/0190","text":"Munmun Saha"},{"@pid":"125/1687","text":"Sanjaya Kumar Panda"},{"@pid":"21/6012","text":"Suvasini Panigrahi"},{"@pid":"t/DavidTaniar","text":"David Taniar"}]},"title":"An efficient composite cloud service model using multi-criteria decision-making techniques.","venue":"J. Supercomput.","volume":"79","number":"8","pages":"8754-8788","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/SahaPPT23","doi":"10.1007/S11227-022-05013-1","ee":"https://doi.org/10.1007/s11227-022-05013-1","url":"https://dblp.org/rec/journals/tjs/SahaPPT23"}, "url":"URL#248755" }, { "@score":"1", "@id":"248756", "info":{"authors":{"author":[{"@pid":"293/5151","text":"Mufeed Ahmed Naji Saif"},{"@pid":"80/3230","text":"S. K. Niranjan"},{"@pid":"282/7144","text":"Belal Abdullah Hezam Murshed"},{"@pid":"326/5475","text":"Fahd A. Ghanem"},{"@pid":"337/5811","text":"Ammar Abdullah Qasem Ahmed"}]},"title":"CSO-ILB: chicken swarm optimized inter-cloud load balancer for elastic containerized multi-cloud environment.","venue":"J. Supercomput.","volume":"79","number":"1","pages":"1111-1155","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/SaifNMGA23","doi":"10.1007/S11227-022-04688-W","ee":"https://doi.org/10.1007/s11227-022-04688-w","url":"https://dblp.org/rec/journals/tjs/SaifNMGA23"}, "url":"URL#248756" }, { "@score":"1", "@id":"248757", "info":{"authors":{"author":[{"@pid":"309/6494","text":"Kanika Saini"},{"@pid":"76/10220","text":"Sheetal Kalra"},{"@pid":"72/7850","text":"Sandeep K. Sood"}]},"title":"Fog-inspired framework for emergency rescue operations in post-disaster scenario.","venue":"J. Supercomput.","volume":"79","number":"18","pages":"21057-21088","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/SainiKS23","doi":"10.1007/S11227-023-05475-X","ee":"https://doi.org/10.1007/s11227-023-05475-x","url":"https://dblp.org/rec/journals/tjs/SainiKS23"}, "url":"URL#248757" }, { "@score":"1", "@id":"248758", "info":{"authors":{"author":[{"@pid":"149/2480","text":"Anish Saini"},{"@pid":"47/9458","text":"Athanasios Tsokanos"},{"@pid":"48/5592","text":"Raimund Kirner"}]},"title":"CryptoQNRG: a new framework for evaluation of cryptographic strength in quantum and pseudorandom number generation for key-scheduling algorithms.","venue":"J. Supercomput.","volume":"79","number":"11","pages":"12219-12237","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/SainiTK23","doi":"10.1007/S11227-023-05115-4","ee":"https://doi.org/10.1007/s11227-023-05115-4","url":"https://dblp.org/rec/journals/tjs/SainiTK23"}, "url":"URL#248758" }, { "@score":"1", "@id":"248759", "info":{"authors":{"author":[{"@pid":"43/233","text":"Sadiq M. Sait"},{"@pid":"e/AimanHElMaleh","text":"Aiman El-Maleh"},{"@pid":"329/6191","text":"Mohammad Altakrouri"},{"@pid":"201/5041","text":"Ahmad Shawahna"}]},"title":"Optimization of FPGA-based CNN accelerators using metaheuristics.","venue":"J. Supercomput.","volume":"79","number":"4","pages":"4493-4533","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/SaitEAS23","doi":"10.1007/S11227-022-04787-8","ee":"https://doi.org/10.1007/s11227-022-04787-8","url":"https://dblp.org/rec/journals/tjs/SaitEAS23"}, "url":"URL#248759" }, { "@score":"1", "@id":"248760", "info":{"authors":{"author":[{"@pid":"338/5978","text":"Shalaw Faraj Salih"},{"@pid":"142/2329","text":"Alan Anwer Abdulla"}]},"title":"An effective bi-layer content-based image retrieval technique.","venue":"J. Supercomput.","volume":"79","number":"2","pages":"2308-2331","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/SalihA23","doi":"10.1007/S11227-022-04748-1","ee":"https://doi.org/10.1007/s11227-022-04748-1","url":"https://dblp.org/rec/journals/tjs/SalihA23"}, "url":"URL#248760" }, { "@score":"1", "@id":"248761", "info":{"authors":{"author":[{"@pid":"349/2766","text":"D. Santhadevi"},{"@pid":"247/8472","text":"B. Janet"}]},"title":"Stacked Deep Learning Framework for Edge-Based Intelligent Threat Detection in IoT Network.","venue":"J. Supercomput.","volume":"79","number":"11","pages":"12622-12655","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/SanthadeviJ23","doi":"10.1007/S11227-023-05153-Y","ee":"https://doi.org/10.1007/s11227-023-05153-y","url":"https://dblp.org/rec/journals/tjs/SanthadeviJ23"}, "url":"URL#248761" }, { "@score":"1", "@id":"248762", "info":{"authors":{"author":[{"@pid":"346/0679","text":"R. Saravanan 0007"},{"@pid":"30/7054","text":"K. Suresh"},{"@pid":"323/1447","text":"S. S. Arumugam"}]},"title":"A modified k-means-based cluster head selection and Philippine eagle optimization-based secure routing for MANET.","venue":"J. Supercomput.","volume":"79","number":"9","pages":"10481-10504","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/SaravananSA23","doi":"10.1007/S11227-023-05053-1","ee":"https://doi.org/10.1007/s11227-023-05053-1","url":"https://dblp.org/rec/journals/tjs/SaravananSA23"}, "url":"URL#248762" }, { "@score":"1", "@id":"248763", "info":{"authors":{"author":[{"@pid":"157/7724","text":"Paolo Savio"},{"@pid":"45/7691","text":"Alberto Scionti"},{"@pid":"267/2459","text":"Giacomo Vitali"},{"@pid":"55/10024-1","text":"Paolo Viviani 0001"},{"@pid":"322/4086","text":"Chiara Vercellino"},{"@pid":"45/7475","text":"Olivier Terzo"},{"@pid":"177/3265","text":"Huy-Nam Nguyen"},{"@pid":"194/6201","text":"Donato Magarielli"},{"@pid":"343/6676","text":"Ennio Spano"},{"@pid":"343/6505","text":"Michele Marconcini"},{"@pid":"67/1234","text":"Francesco Poli"}]},"title":"Accelerating legacy applications with spatial computing devices.","venue":"J. Supercomput.","volume":"79","number":"7","pages":"7461-7483","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/SavioSVVVTNMSMP23","doi":"10.1007/S11227-022-04925-2","ee":"https://doi.org/10.1007/s11227-022-04925-2","url":"https://dblp.org/rec/journals/tjs/SavioSVVVTNMSMP23"}, "url":"URL#248763" }, { "@score":"1", "@id":"248764", "info":{"authors":{"author":[{"@pid":"255/2722","text":"Shrutika S. Sawant"},{"@pid":"315/7470","text":"F. X. Erick"},{"@pid":"315/7280","text":"Stephan Göb"},{"@pid":"338/7498","text":"Nina Holzer"},{"@pid":"315/7344","text":"Elmar W. Lang"},{"@pid":"174/1337","text":"Theresa Götz"}]},"title":"An adaptive binary particle swarm optimization for solving multi-objective convolutional filter pruning problem.","venue":"J. Supercomput.","volume":"79","number":"12","pages":"13287-13306","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/SawantEGHLG23","doi":"10.1007/S11227-023-05150-1","ee":"https://doi.org/10.1007/s11227-023-05150-1","url":"https://dblp.org/rec/journals/tjs/SawantEGHLG23"}, "url":"URL#248764" }, { "@score":"1", "@id":"248765", "info":{"authors":{"author":[{"@pid":"233/5116","text":"Fateh Seghir"},{"@pid":"304/7371","text":"Ghizlane Khababa"}]},"title":"An improved discrete flower pollination algorithm for fuzzy QoS-aware IoT services composition based on skyline operator.","venue":"J. Supercomput.","volume":"79","number":"10","pages":"10645-10676","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/SeghirK23","doi":"10.1007/S11227-023-05074-W","ee":"https://doi.org/10.1007/s11227-023-05074-w","url":"https://dblp.org/rec/journals/tjs/SeghirK23"}, "url":"URL#248765" }, { "@score":"1", "@id":"248766", "info":{"authors":{"author":[{"@pid":"191/7813","text":"Albert Segura"},{"@pid":"117/0577","text":"José-María Arnau"},{"@pid":"g/AntonioGonzalez1","text":"Antonio González 0001"}]},"title":"Irregular accesses reorder unit: improving GPGPU memory coalescing for graph-based workloads.","venue":"J. Supercomput.","volume":"79","number":"1","pages":"762-787","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/SeguraAG23","doi":"10.1007/S11227-022-04621-1","ee":"https://doi.org/10.1007/s11227-022-04621-1","url":"https://dblp.org/rec/journals/tjs/SeguraAG23"}, "url":"URL#248766" }, { "@score":"1", "@id":"248767", "info":{"authors":{"author":[{"@pid":"358/1792","text":"Azam Seilsepour"},{"@pid":"76/5","text":"Reza Ravanmehr"},{"@pid":"16/8812","text":"Ramin Nassiri"}]},"title":"Topic sentiment analysis based on deep neural network using document embedding technique.","venue":"J. Supercomput.","volume":"79","number":"17","pages":"19809-19847","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/SeilsepourRN23","doi":"10.1007/S11227-023-05423-9","ee":"https://doi.org/10.1007/s11227-023-05423-9","url":"https://dblp.org/rec/journals/tjs/SeilsepourRN23"}, "url":"URL#248767" }, { "@score":"1", "@id":"248768", "info":{"authors":{"author":[{"@pid":"31/10039","text":"K. Selvi"},{"@pid":"257/2407","text":"K. Muthumanickam"},{"@pid":"00/6756","text":"P. Vijayalakshmi"},{"@pid":"253/6768","text":"P. C. Senthil Mahesh"}]},"title":"ECC-reliant secure authentication protocol for cloud server and smart devices in IoT.","venue":"J. Supercomput.","volume":"79","number":"11","pages":"12191-12218","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/SelviMVM23","doi":"10.1007/S11227-023-05135-0","ee":"https://doi.org/10.1007/s11227-023-05135-0","url":"https://dblp.org/rec/journals/tjs/SelviMVM23"}, "url":"URL#248768" }, { "@score":"1", "@id":"248769", "info":{"authors":{"author":[{"@pid":"27/229","text":"Jiwon Seo"},{"@pid":"282/0221","text":"Inyoung Bang"},{"@pid":"329/6397","text":"Yungi Cho"},{"@pid":"187/8338","text":"Jangseop Shin"},{"@pid":"163/8641","text":"Dongil Hwang"},{"@pid":"130/9723","text":"Donghyun Kwon"},{"@pid":"130/9710","text":"Yeongpil Cho"},{"@pid":"65/3751","text":"Yunheung Paek"}]},"title":"Exploring effective uses of the tagged memory for reducing bounds checking overheads.","venue":"J. Supercomput.","volume":"79","number":"1","pages":"1032-1064","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/SeoBCSHKCP23","doi":"10.1007/S11227-022-04694-Y","ee":"https://doi.org/10.1007/s11227-022-04694-y","url":"https://dblp.org/rec/journals/tjs/SeoBCSHKCP23"}, "url":"URL#248769" }, { "@score":"1", "@id":"248770", "info":{"authors":{"author":[{"@pid":"346/0668","text":"Seunghee Seo"},{"@pid":"252/6461","text":"Byoungjin Seok"},{"@pid":"93/3417","text":"Changhoon Lee"}]},"title":"Digital forensic investigation framework for the metaverse.","venue":"J. Supercomput.","volume":"79","number":"9","pages":"9467-9485","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/SeoSL23","doi":"10.1007/S11227-023-05045-1","ee":"https://doi.org/10.1007/s11227-023-05045-1","url":"https://dblp.org/rec/journals/tjs/SeoSL23"}, "url":"URL#248770" }, { "@score":"1", "@id":"248771", "info":{"authors":{"author":[{"@pid":"211/8075","text":"Abdolah Sepahvand"},{"@pid":"01/3519","text":"Mohammadreza Razzazi"}]},"title":"Spanning simple path inside a simple polygon.","venue":"J. Supercomput.","volume":"79","number":"3","pages":"2740-2766","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/SepahvandR23","doi":"10.1007/S11227-022-04765-0","ee":"https://doi.org/10.1007/s11227-022-04765-0","url":"https://dblp.org/rec/journals/tjs/SepahvandR23"}, "url":"URL#248771" }, { "@score":"1", "@id":"248772", "info":{"authors":{"author":[{"@pid":"336/8644","text":"Biswajeet Sethi"},{"@pid":"177/2106","text":"Sourav Kanti Addya"},{"@pid":"348/1042","text":"Jay Bhutada"},{"@pid":"34/9049-1","text":"Soumya K. Ghosh 0001"}]},"title":"Shipping code towards data in an inter-region serverless environment to leverage latency.","venue":"J. Supercomput.","volume":"79","number":"10","pages":"11585-11610","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/SethiABG23","doi":"10.1007/S11227-023-05104-7","ee":"https://doi.org/10.1007/s11227-023-05104-7","url":"https://dblp.org/rec/journals/tjs/SethiABG23"}, "url":"URL#248772" }, { "@score":"1", "@id":"248773", "info":{"authors":{"author":[{"@pid":"258/7486","text":"Kübra Seyhan"},{"@pid":"07/8815","text":"Sedat Akleylek"}]},"title":"A new password-authenticated module learning with rounding-based key exchange protocol: Saber.PAKE.","venue":"J. Supercomput.","volume":"79","number":"16","pages":"17859-17896","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/SeyhanA23","doi":"10.1007/S11227-023-05251-X","ee":"https://doi.org/10.1007/s11227-023-05251-x","url":"https://dblp.org/rec/journals/tjs/SeyhanA23"}, "url":"URL#248773" }, { "@score":"1", "@id":"248774", "info":{"authors":{"author":[{"@pid":"255/1148","text":"Balawal Shabir"},{"@pid":"202/0577","text":"Anis Ur Rahman 0001"},{"@pid":"15/3695","text":"Asad Waqar Malik"},{"@pid":"b/RajkumarBuyya","text":"Rajkumar Buyya"},{"@pid":"143/2867","text":"Muazzam Ali Khan"}]},"title":"A federated multi-agent deep reinforcement learning for vehicular fog computing.","venue":"J. Supercomput.","volume":"79","number":"6","pages":"6141-6167","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ShabirRMBK23","doi":"10.1007/S11227-022-04911-8","ee":"https://doi.org/10.1007/s11227-022-04911-8","url":"https://dblp.org/rec/journals/tjs/ShabirRMBK23"}, "url":"URL#248774" }, { "@score":"1", "@id":"248775", "info":{"authors":{"author":[{"@pid":"332/4489","text":"B. Shaji"},{"@pid":"332/4825","text":"R. Lal Raja Singh"},{"@pid":"201/5859","text":"K. L. Nisha"}]},"title":"High-performance fuzzy optimized deep convolutional neural network model for big data classification based on the social internet of things.","venue":"J. Supercomput.","volume":"79","number":"9","pages":"9509-9537","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ShajiSN23","doi":"10.1007/S11227-022-04974-7","ee":"https://doi.org/10.1007/s11227-022-04974-7","url":"https://dblp.org/rec/journals/tjs/ShajiSN23"}, "url":"URL#248775" }, { "@score":"1", "@id":"248776", "info":{"authors":{"author":[{"@pid":"331/8299","text":"P. V. Shalini"},{"@pid":"122/1949","text":"V. Radha 0001"},{"@pid":"41/1616","text":"Sriram G. Sanjeevi"}]},"title":"Early detection and mitigation of TCP SYN flood attacks in SDN using chi-square test.","venue":"J. Supercomput.","volume":"79","number":"9","pages":"10353-10385","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ShaliniRS23","doi":"10.1007/S11227-023-05057-X","ee":"https://doi.org/10.1007/s11227-023-05057-x","url":"https://dblp.org/rec/journals/tjs/ShaliniRS23"}, "url":"URL#248776" }, { "@score":"1", "@id":"248777", "info":{"authors":{"author":[{"@pid":"220/3031","text":"Chuanhui Shan"},{"@pid":"54/2788","text":"Ao Li"},{"@pid":"170/8229","text":"Xiumei Chen"}]},"title":"Deep delay rectified neural networks.","venue":"J. Supercomput.","volume":"79","number":"1","pages":"880-896","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ShanLC23","doi":"10.1007/S11227-022-04704-Z","ee":"https://doi.org/10.1007/s11227-022-04704-z","url":"https://dblp.org/rec/journals/tjs/ShanLC23"}, "url":"URL#248777" }, { "@score":"1", "@id":"248778", "info":{"title":"Retraction Note to: Optimal feature-based multi-kernel SVM approach for thyroid disease classification.","venue":"J. Supercomput.","volume":"79","number":"6","pages":"7063-7064","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ShankarLGMA23","doi":"10.1007/S11227-022-04941-2","ee":"https://doi.org/10.1007/s11227-022-04941-2","url":"https://dblp.org/rec/journals/tjs/ShankarLGMA23"}, "url":"URL#248778" }, { "@score":"1", "@id":"248779", "info":{"authors":{"author":[{"@pid":"211/4112","text":"Ravi Shanker"},{"@pid":"335/3854","text":"Heet Sankesara"},{"@pid":"260/5347","text":"Surendra Nagar"},{"@pid":"46/2793","text":"Mahua Bhattacharya"}]},"title":"RESPNet: resource-efficient and structure-preserving network for deformable image registration.","venue":"J. Supercomput.","volume":"79","number":"5","pages":"4713-4736","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ShankerSNB23","doi":"10.1007/S11227-022-04840-6","ee":"https://doi.org/10.1007/s11227-022-04840-6","url":"https://dblp.org/rec/journals/tjs/ShankerSNB23"}, "url":"URL#248779" }, { "@score":"1", "@id":"248780", "info":{"authors":{"author":[{"@pid":"52/791-1","text":"Sonia Sharma"},{"@pid":"294/1238","text":"Rajendra Kumar Bharti"}]},"title":"Two phased Yarn scheduling with novel binary hypergraphed PSO.","venue":"J. Supercomput.","volume":"79","number":"18","pages":"20712-20746","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/SharmaB23","doi":"10.1007/S11227-023-05310-3","ee":"https://doi.org/10.1007/s11227-023-05310-3","url":"https://dblp.org/rec/journals/tjs/SharmaB23"}, "url":"URL#248780" }, { "@score":"1", "@id":"248781", "info":{"authors":{"author":[{"@pid":"120/5101","text":"Mradula Sharma"},{"@pid":"152/3771","text":"Parmeet Kaur 0001"}]},"title":"Reliable federated learning in a cloud-fog-IoT environment.","venue":"J. Supercomput.","volume":"79","number":"14","pages":"15435-15458","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/SharmaK23","doi":"10.1007/S11227-023-05252-W","ee":"https://doi.org/10.1007/s11227-023-05252-w","url":"https://dblp.org/rec/journals/tjs/SharmaK23"}, "url":"URL#248781" }, { "@score":"1", "@id":"248782", "info":{"authors":{"author":[{"@pid":"356/2082","text":"Samaneh Sheibani"},{"@pid":"127/2309","text":"Hassan Shakeri"},{"@pid":"212/4601","text":"Reza Sheibani"}]},"title":"Four-dimensional trust propagation model for improving the accuracy of recommender systems.","venue":"J. Supercomput.","volume":"79","number":"15","pages":"16793-16820","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/SheibaniSS23","doi":"10.1007/S11227-023-05278-0","ee":"https://doi.org/10.1007/s11227-023-05278-0","url":"https://dblp.org/rec/journals/tjs/SheibaniSS23"}, "url":"URL#248782" }, { "@score":"1", "@id":"248783", "info":{"authors":{"author":[{"@pid":"14/8409","text":"Farnaz Sheikhi"},{"@pid":"359/5244","text":"Aliakbar Taghdiri"},{"@pid":"359/5375","text":"Danial Moradisabzevar"},{"@pid":"359/5426","text":"Hanieh Rezakhani"},{"@pid":"359/5367","text":"Hasti Daneshkia"},{"@pid":"359/5263","text":"Mobina Goodarzi"}]},"title":"Automatic detection of COVID-19 and pneumonia from chest X-ray images using texture features.","venue":"J. Supercomput.","volume":"79","number":"18","pages":"21449-21473","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/SheikhiTMRDG23","doi":"10.1007/S11227-023-05452-4","ee":"https://doi.org/10.1007/s11227-023-05452-4","url":"https://dblp.org/rec/journals/tjs/SheikhiTMRDG23"}, "url":"URL#248783" }, { "@score":"1", "@id":"248784", "info":{"authors":{"author":[{"@pid":"204/2287","text":"Jingcheng Shen"},{"@pid":"141/0607","text":"Linbo Long"},{"@pid":"24/4856","text":"Xin Deng"},{"@pid":"35/1710","text":"Masao Okita"},{"@pid":"64/201","text":"Fumihiko Ino"}]},"title":"A compression-based memory-efficient optimization for out-of-core GPU stencil computation.","venue":"J. Supercomput.","volume":"79","number":"10","pages":"11055-11077","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ShenLDOI23","doi":"10.1007/S11227-023-05103-8","ee":"https://doi.org/10.1007/s11227-023-05103-8","url":"https://dblp.org/rec/journals/tjs/ShenLDOI23"}, "url":"URL#248784" }, { "@score":"1", "@id":"248785", "info":{"authors":{"author":[{"@pid":"28/7434","text":"Wenfeng Shen"},{"@pid":"337/6341","text":"Zhengsen Liu"},{"@pid":"337/6204","text":"Yunjie Tan"},{"@pid":"144/6254","text":"Zhaokai Luo"},{"@pid":"90/3667","text":"Zhou Lei"}]},"title":"KubeGPU: efficient sharing and isolation mechanisms for GPU resource management in container cloud.","venue":"J. Supercomput.","volume":"79","number":"1","pages":"591-625","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ShenLTLL23","doi":"10.1007/S11227-022-04682-2","ee":"https://doi.org/10.1007/s11227-022-04682-2","url":"https://dblp.org/rec/journals/tjs/ShenLTLL23"}, "url":"URL#248785" }, { "@score":"1", "@id":"248786", "info":{"authors":{"author":[{"@pid":"95/4097-4","text":"Tao Shen 0004"},{"@pid":"92/9835","text":"Tianyu Li"},{"@pid":"09/6190","text":"Zhuo Yu"},{"@pid":"316/6679","text":"Fenhua Bai"},{"@pid":"91/195","text":"Chi Zhang"}]},"title":"GT-NRSM: efficient and scalable sharding consensus mechanism for consortium blockchain.","venue":"J. Supercomput.","volume":"79","number":"17","pages":"20041-20075","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ShenLYBZ23","doi":"10.1007/S11227-023-05414-W","ee":"https://doi.org/10.1007/s11227-023-05414-w","url":"https://dblp.org/rec/journals/tjs/ShenLYBZ23"}, "url":"URL#248786" }, { "@score":"1", "@id":"248787", "info":{"authors":{"author":[{"@pid":"257/2185","text":"Xiayang Shi"},{"@pid":"357/5118","text":"Zhenqiang Yu"},{"@pid":"74/2050","text":"Xuhui Wang"},{"@pid":"52/6049","text":"Yijun Li"},{"@pid":"127/4754","text":"Yufeng Niu"}]},"title":"Text-image matching for multi-model machine translation.","venue":"J. Supercomput.","volume":"79","number":"16","pages":"17810-17823","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ShiYWLN23","doi":"10.1007/S11227-023-05318-9","ee":"https://doi.org/10.1007/s11227-023-05318-9","url":"https://dblp.org/rec/journals/tjs/ShiYWLN23"}, "url":"URL#248787" }, { "@score":"1", "@id":"248788", "info":{"authors":{"author":[{"@pid":"18/2228","text":"Wen-Chung Shih"},{"@pid":"y/ChaoTungYang","text":"Chao-Tung Yang"},{"@pid":"341/0544","text":"Cheng-Tian Jiang"},{"@pid":"231/1626","text":"Endah Kristiani"}]},"title":"Implementation and visualization of a netflow log data lake system for cyberattack detection using distributed deep learning.","venue":"J. Supercomput.","volume":"79","number":"5","pages":"4983-5012","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ShihYJK23","doi":"10.1007/S11227-022-04802-Y","ee":"https://doi.org/10.1007/s11227-022-04802-y","url":"https://dblp.org/rec/journals/tjs/ShihYJK23"}, "url":"URL#248788" }, { "@score":"1", "@id":"248789", "info":{"authors":{"author":[{"@pid":"251/3725","text":"B. Shilpa"},{"@pid":"280/6419","text":"Puranam Revanth Kumar"},{"@pid":"247/3491","text":"Rajesh Kumar Jha"}]},"title":"LoRa DL: a deep learning model for enhancing the data transmission over LoRa using autoencoder.","venue":"J. Supercomput.","volume":"79","number":"15","pages":"17079-17097","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ShilpaKJ23","doi":"10.1007/S11227-023-05355-4","ee":"https://doi.org/10.1007/s11227-023-05355-4","url":"https://dblp.org/rec/journals/tjs/ShilpaKJ23"}, "url":"URL#248789" }, { "@score":"1", "@id":"248790", "info":{"authors":{"author":[{"@pid":"286/0989","text":"Shilpi"},{"@pid":"207/1286","text":"Prateek Raj Gautam"},{"@pid":"45/3365","text":"Sunil Kumar"},{"@pid":"86/660","text":"Arvind Kumar"}]},"title":"An optimized sensor node localization approach for wireless sensor networks using RSSI.","venue":"J. Supercomput.","volume":"79","number":"7","pages":"7692-7716","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ShilpiGKK23","doi":"10.1007/S11227-022-04971-W","ee":"https://doi.org/10.1007/s11227-022-04971-w","url":"https://dblp.org/rec/journals/tjs/ShilpiGKK23"}, "url":"URL#248790" }, { "@score":"1", "@id":"248791", "info":{"authors":{"author":[{"@pid":"155/0932","text":"Zahra Shirmohammadi"},{"@pid":"338/7494","text":"Yassin Allivand"},{"@pid":"217/1188","text":"Fereshte Mozafari"},{"@pid":"25/5234","text":"Ahmad Patooghy"},{"@pid":"166/8377","text":"Mona Jalal"},{"@pid":"174/1568","text":"Sanaz Kazemi Abharian"}]},"title":"ReNo: novel switch architecture for reliability improvement of NoCs.","venue":"J. Supercomput.","volume":"79","number":"3","pages":"2801-2818","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ShirmohammadiAM23","doi":"10.1007/S11227-022-04732-9","ee":"https://doi.org/10.1007/s11227-022-04732-9","url":"https://dblp.org/rec/journals/tjs/ShirmohammadiAM23"}, "url":"URL#248791" }, { "@score":"1", "@id":"248792", "info":{"authors":{"author":[{"@pid":"155/0932","text":"Zahra Shirmohammadi"},{"@pid":"338/7494","text":"Yassin Allivand"},{"@pid":"217/1188","text":"Fereshte Mozafari"},{"@pid":"25/5234","text":"Ahmad Patooghy"},{"@pid":"166/8377","text":"Mona Jalal"},{"@pid":"174/1568","text":"Sanaz Kazemi Abharian"}]},"title":"Correction to: ReNo: novel switch architecture for reliability improvement of NoCs.","venue":"J. Supercomput.","volume":"79","number":"4","pages":"4685","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ShirmohammadiAMPJA23","doi":"10.1007/S11227-022-04800-0","ee":"https://doi.org/10.1007/s11227-022-04800-0","url":"https://dblp.org/rec/journals/tjs/ShirmohammadiAMPJA23"}, "url":"URL#248792" }, { "@score":"1", "@id":"248793", "info":{"authors":{"author":[{"@pid":"195/5991","text":"Prashant Shukla"},{"@pid":"184/7510","text":"Sudhakar Pandey"}]},"title":"MAA: multi-objective artificial algae algorithm for workflow scheduling in heterogeneous fog-cloud environment.","venue":"J. Supercomput.","volume":"79","number":"10","pages":"11218-11260","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ShuklaP23","doi":"10.1007/S11227-023-05110-9","ee":"https://doi.org/10.1007/s11227-023-05110-9","url":"https://dblp.org/rec/journals/tjs/ShuklaP23"}, "url":"URL#248793" }, { "@score":"1", "@id":"248794", "info":{"authors":{"author":[{"@pid":"349/3689","text":"Asma Siagh"},{"@pid":"146/1044","text":"Fatima Zohra Laallam"},{"@pid":"42/7907","text":"Okba Kazar"},{"@pid":"170/7353","text":"Hajer Salem"}]},"title":"An improved sentiment classification model based on data quality and word embeddings.","venue":"J. Supercomput.","volume":"79","number":"11","pages":"11871-11894","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/SiaghLKS23","doi":"10.1007/S11227-023-05099-1","ee":"https://doi.org/10.1007/s11227-023-05099-1","url":"https://dblp.org/rec/journals/tjs/SiaghLKS23"}, "url":"URL#248794" }, { "@score":"1", "@id":"248795", "info":{"authors":{"author":[{"@pid":"59/4233","text":"Pierre Siegel"},{"@pid":"32/5876","text":"Andrei Doncescu"},{"@pid":"01/4045","text":"Vincent Risch"},{"@pid":"78/5277","text":"Sylvain Sené"}]},"title":"Representation of gene regulation networks by hypothesis logic-based Boolean systems.","venue":"J. Supercomput.","volume":"79","number":"4","pages":"4556-4581","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/SiegelDRS23","doi":"10.1007/S11227-022-04809-5","ee":"https://doi.org/10.1007/s11227-022-04809-5","url":"https://dblp.org/rec/journals/tjs/SiegelDRS23"}, "url":"URL#248795" }, { "@score":"1", "@id":"248796", "info":{"authors":{"author":[{"@pid":"309/6378","text":"Lucas Ferreira Da Silva"},{"@pid":"98/8779","text":"João V. F. Lima"}]},"title":"An evaluation of relational and NoSQL distributed databases on a low-power cluster.","venue":"J. Supercomput.","volume":"79","number":"12","pages":"13402-13420","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/SilvaL23","doi":"10.1007/S11227-023-05166-7","ee":"https://doi.org/10.1007/s11227-023-05166-7","url":"https://dblp.org/rec/journals/tjs/SilvaL23"}, "url":"URL#248796" }, { "@score":"1", "@id":"248797", "info":{"authors":{"author":[{"@pid":"318/1324","text":"Hígor Uélinton Silva"},{"@pid":"275/2001","text":"Natiele Lucca"},{"@pid":"79/5559","text":"Claudio Schepke"},{"@pid":"318/1180","text":"Dalmo Paim de Oliveira"},{"@pid":"318/1299","text":"César Flaubiano da Cruz Cristaldo"}]},"title":"Parallel OpenMP and OpenACC porous media simulation.","venue":"J. Supercomput.","volume":"79","number":"8","pages":"8425-8446","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/SilvaLSOC23","doi":"10.1007/S11227-022-05004-2","ee":"https://doi.org/10.1007/s11227-022-05004-2","url":"https://dblp.org/rec/journals/tjs/SilvaLSOC23"}, "url":"URL#248797" }, { "@score":"1", "@id":"248798", "info":{"authors":{"author":{"@pid":"240/6120","text":"Nikita Singh"}},"title":"CPU power and network bandwidth-aware optimal block size computation for blockchain-based applications using meta-heuristic algorithms.","venue":"J. Supercomput.","volume":"79","number":"13","pages":"14063-14078","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/Singh23","doi":"10.1007/S11227-023-05210-6","ee":"https://doi.org/10.1007/s11227-023-05210-6","url":"https://dblp.org/rec/journals/tjs/Singh23"}, "url":"URL#248798" }, { "@score":"1", "@id":"248799", "info":{"authors":{"author":[{"@pid":"118/7858","text":"Manisha Singh"},{"@pid":"166/7506","text":"Gaurav Baranwal"},{"@pid":"79/5825","text":"Anil Kumar Tripathi"}]},"title":"A novel 2-phase consensus with customized feedback based group decision-making involving heterogeneous decision-makers.","venue":"J. Supercomput.","volume":"79","number":"4","pages":"3936-3973","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/SinghBT23","doi":"10.1007/S11227-022-04796-7","ee":"https://doi.org/10.1007/s11227-022-04796-7","url":"https://dblp.org/rec/journals/tjs/SinghBT23"}, "url":"URL#248799" }, { "@score":"1", "@id":"248800", "info":{"authors":{"author":[{"@pid":"118/7858","text":"Manisha Singh"},{"@pid":"166/7506","text":"Gaurav Baranwal"},{"@pid":"79/5825","text":"Anil Kumar Tripathi"}]},"title":"Decentralized group decision making using blockchain.","venue":"J. Supercomput.","volume":"79","number":"17","pages":"20141-20178","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/SinghBT23a","doi":"10.1007/S11227-023-05426-6","ee":"https://doi.org/10.1007/s11227-023-05426-6","url":"https://dblp.org/rec/journals/tjs/SinghBT23a"}, "url":"URL#248800" }, { "@score":"1", "@id":"248801", "info":{"authors":{"author":[{"@pid":"52/7146-4","text":"Manish Kumar Singh 0004"},{"@pid":"74/9223","text":"Amit Choudhary"},{"@pid":"312/8448","text":"Sandeep Gulia"},{"@pid":"72/8828","text":"Anurag Verma"}]},"title":"Multi-objective NSGA-II optimization framework for UAV path planning in an UAV-assisted WSN.","venue":"J. Supercomput.","volume":"79","number":"1","pages":"832-866","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/SinghCGV23","doi":"10.1007/S11227-022-04701-2","ee":"https://doi.org/10.1007/s11227-022-04701-2","url":"https://dblp.org/rec/journals/tjs/SinghCGV23"}, "url":"URL#248801" }, { "@score":"1", "@id":"248802", "info":{"authors":{"author":[{"@pid":"307/0900","text":"Tinku Singh"},{"@pid":"29/8830","text":"Shivam Gupta"},{"@pid":"27/3318","text":"Satakshi"},{"@pid":"35/4332-1","text":"Manish Kumar 0001"}]},"title":"Adaptive load balancing in cluster computing environment.","venue":"J. Supercomput.","volume":"79","number":"17","pages":"20179-20207","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/SinghGSK23","doi":"10.1007/S11227-023-05434-6","ee":"https://doi.org/10.1007/s11227-023-05434-6","url":"https://dblp.org/rec/journals/tjs/SinghGSK23"}, "url":"URL#248802" }, { "@score":"1", "@id":"248803", "info":{"authors":{"author":[{"@pid":"121/3575","text":"Indu Singh"},{"@pid":"09/7284","text":"Rajni Jindal"}]},"title":"Trust factor-based analysis of user behavior using sequential pattern mining for detecting intrusive transactions in databases.","venue":"J. Supercomput.","volume":"79","number":"10","pages":"11101-11133","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/SinghJ23","doi":"10.1007/S11227-023-05090-W","ee":"https://doi.org/10.1007/s11227-023-05090-w","url":"https://dblp.org/rec/journals/tjs/SinghJ23"}, "url":"URL#248803" }, { "@score":"1", "@id":"248804", "info":{"authors":{"author":[{"@pid":"94/3731-1","text":"Ashutosh Kumar Singh 0001"},{"@pid":"81/8673","text":"Jatinder Kumar"}]},"title":"A privacy-preserving multidimensional data aggregation scheme with secure query processing for smart grid.","venue":"J. Supercomput.","volume":"79","number":"4","pages":"3750-3770","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/SinghK23","doi":"10.1007/S11227-022-04794-9","ee":"https://doi.org/10.1007/s11227-022-04794-9","url":"https://dblp.org/rec/journals/tjs/SinghK23"}, "url":"URL#248804" }, { "@score":"1", "@id":"248805", "info":{"authors":{"author":[{"@pid":"260/1757","text":"Raushan Kumar Singh"},{"@pid":"88/4978-5","text":"Mukesh Kumar 0005"}]},"title":"Future trends of path planning framework considering accident attributes for smart cities.","venue":"J. Supercomput.","volume":"79","number":"15","pages":"16884-16913","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/SinghK23a","doi":"10.1007/S11227-023-05305-0","ee":"https://doi.org/10.1007/s11227-023-05305-0","url":"https://dblp.org/rec/journals/tjs/SinghK23a"}, "url":"URL#248805" }, { "@score":"1", "@id":"248806", "info":{"authors":{"author":[{"@pid":"260/1757","text":"Raushan Kumar Singh"},{"@pid":"88/4978-5","text":"Mukesh Kumar 0005"}]},"title":"Correction to: Future trends of path planning framework considering accident attributes for smart cities.","venue":"J. Supercomput.","volume":"79","number":"18","pages":"21528","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/SinghK23b","doi":"10.1007/S11227-023-05431-9","ee":"https://doi.org/10.1007/s11227-023-05431-9","url":"https://dblp.org/rec/journals/tjs/SinghK23b"}, "url":"URL#248806" }, { "@score":"1", "@id":"248807", "info":{"authors":{"author":[{"@pid":"307/0900","text":"Tinku Singh"},{"@pid":"307/2285","text":"Riya Khanna"},{"@pid":"27/3318","text":"Satakshi"},{"@pid":"35/4332-1","text":"Manish Kumar 0001"}]},"title":"Improved multi-class classification approach for imbalanced big data on spark.","venue":"J. Supercomput.","volume":"79","number":"6","pages":"6583-6611","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/SinghKSK23","doi":"10.1007/S11227-022-04908-3","ee":"https://doi.org/10.1007/s11227-022-04908-3","url":"https://dblp.org/rec/journals/tjs/SinghKSK23"}, "url":"URL#248807" }, { "@score":"1", "@id":"248808", "info":{"authors":{"author":[{"@pid":"94/3731-1","text":"Ashutosh Kumar Singh 0001"},{"@pid":"153/4246","text":"Pooja Rani"}]},"title":"An AI-driven fault-tolerant aggregation model for smart grid.","venue":"J. Supercomput.","volume":"79","number":"18","pages":"20665-20683","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/SinghR23","doi":"10.1007/S11227-023-05461-3","ee":"https://doi.org/10.1007/s11227-023-05461-3","url":"https://dblp.org/rec/journals/tjs/SinghR23"}, "url":"URL#248808" }, { "@score":"1", "@id":"248809", "info":{"authors":{"author":[{"@pid":"307/0900","text":"Tinku Singh"},{"@pid":"343/6553","text":"Vinarm Rajput"},{"@pid":"27/3318","text":"Satakshi"},{"@pid":"343/6871","text":"Umesh Prasad"},{"@pid":"35/4332-1","text":"Manish Kumar 0001"}]},"title":"Real-time traffic light violations using distributed streaming.","venue":"J. Supercomput.","volume":"79","number":"7","pages":"7533-7559","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/SinghRSPK23","doi":"10.1007/S11227-022-04977-4","ee":"https://doi.org/10.1007/s11227-022-04977-4","url":"https://dblp.org/rec/journals/tjs/SinghRSPK23"}, "url":"URL#248809" }, { "@score":"1", "@id":"248810", "info":{"authors":{"author":[{"@pid":"99/3788","text":"Pankaj Singh"},{"@pid":"280/7245","text":"Rupali Singh"}]},"title":"A sliced architecture using novel configurable logic modules in quantum dot cellular automata for application of field-programmable gate arrays.","venue":"J. Supercomput.","volume":"79","number":"4","pages":"4105-4125","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/SinghS23","doi":"10.1007/S11227-022-04812-W","ee":"https://doi.org/10.1007/s11227-022-04812-w","url":"https://dblp.org/rec/journals/tjs/SinghS23"}, "url":"URL#248810" }, { "@score":"1", "@id":"248811", "info":{"authors":{"author":{"@pid":"173/8752","text":"D. Sirisha"}},"title":"Complexity versus quality: a trade-off for scheduling workflows in heterogeneous computing environments.","venue":"J. Supercomput.","volume":"79","number":"1","pages":"924-946","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/Sirisha23","doi":"10.1007/S11227-022-04687-X","ee":"https://doi.org/10.1007/s11227-022-04687-x","url":"https://dblp.org/rec/journals/tjs/Sirisha23"}, "url":"URL#248811" }, { "@score":"1", "@id":"248812", "info":{"authors":{"author":[{"@pid":"354/2266","text":"Santhosh Sivasubramani"},{"@pid":"208/0546","text":"Sanghamitra Debroy"},{"@pid":"188/2318","text":"Swati Ghosh Acharyya"},{"@pid":"54/8180","text":"Amit Acharyya"}]},"title":"Graphene-based area efficient power planning architecture design methodology for nanomagnetic logic implementation.","venue":"J. Supercomput.","volume":"79","number":"18","pages":"20961-20983","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/SivasubramaniDAA23","doi":"10.1007/S11227-023-05449-Z","ee":"https://doi.org/10.1007/s11227-023-05449-z","url":"https://dblp.org/rec/journals/tjs/SivasubramaniDAA23"}, "url":"URL#248812" }, { "@score":"1", "@id":"248813", "info":{"authors":{"author":[{"@pid":"162/0574","text":"Mohammad Soltani"},{"@pid":"133/7279","text":"Behrang Barekatain"},{"@pid":"354/7987","text":"Faramarz Hendesi"},{"@pid":"124/9452","text":"Zahra Beheshti"}]},"title":"FSCN: a novel forwarding method based on Shannon entropy and COPRAS decision process in named data networking.","venue":"J. Supercomput.","volume":"79","number":"14","pages":"15324-15357","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/SoltaniBHB23","doi":"10.1007/S11227-023-05265-5","ee":"https://doi.org/10.1007/s11227-023-05265-5","url":"https://dblp.org/rec/journals/tjs/SoltaniBHB23"}, "url":"URL#248813" }, { "@score":"1", "@id":"248814", "info":{"authors":{"author":[{"@pid":"168/6068","text":"Yao Song"},{"@pid":"56/4499-20","text":"Liang Wang 0020"},{"@pid":"31/5990","text":"Limin Xiao"},{"@pid":"321/8291","text":"Runnan Shen"},{"@pid":"40/1277","text":"Jinquan Wang"},{"@pid":"337/1091","text":"Chenhao Zhang"}]},"title":"Dynamic two-side matching of tasks and resources in wide-area distributed computing environments.","venue":"J. Supercomput.","volume":"79","number":"9","pages":"10208-10231","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/SongWXSWZ23","doi":"10.1007/S11227-023-05056-Y","ee":"https://doi.org/10.1007/s11227-023-05056-y","url":"https://dblp.org/rec/journals/tjs/SongWXSWZ23"}, "url":"URL#248814" }, { "@score":"1", "@id":"248815", "info":{"authors":{"author":[{"@pid":"201/5459","text":"Yixin Song"},{"@pid":"26/3195","text":"Junyang Yu"},{"@pid":"166/2519","text":"Jinjiang Wang"},{"@pid":"69/1798","text":"Xin He"}]},"title":"Memory management optimization strategy in Spark framework based on less contention.","venue":"J. Supercomput.","volume":"79","number":"2","pages":"1504-1525","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/SongYWH23","doi":"10.1007/S11227-022-04663-5","ee":"https://doi.org/10.1007/s11227-022-04663-5","url":"https://dblp.org/rec/journals/tjs/SongYWH23"}, "url":"URL#248815" }, { "@score":"1", "@id":"248816", "info":{"authors":{"author":[{"@pid":"296/6131","text":"Chouaib Souaidia"},{"@pid":"152/6168","text":"Tawfik Thelaidjia"},{"@pid":"152/6178","text":"Salah Chenikher"}]},"title":"Independent vector analysis based on binary grey wolf feature selection and extreme learning machine for bearing fault diagnosis.","venue":"J. Supercomput.","volume":"79","number":"6","pages":"7014-7036","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/SouaidiaTC23","doi":"10.1007/S11227-022-04931-4","ee":"https://doi.org/10.1007/s11227-022-04931-4","url":"https://dblp.org/rec/journals/tjs/SouaidiaTC23"}, "url":"URL#248816" }, { "@score":"1", "@id":"248817", "info":{"authors":{"author":[{"@pid":"297/2445","text":"Lubnnia Morais Florêncio Souza"},{"@pid":"237/7404","text":"Kádna Camboim"},{"@pid":"59/10512","text":"Jean Araujo 0001"},{"@pid":"31/5316","text":"Fernanda M. R. Alencar"},{"@pid":"m/PRMartinsMaciel","text":"Paulo R. M. Maciel"},{"@pid":"62/1526-2","text":"João Ferreira 0002"}]},"title":"Dependability evaluation and sensitivity analysis of data center cooling systems.","venue":"J. Supercomput.","volume":"79","number":"17","pages":"19607-19635","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/SouzaCAAMF23","doi":"10.1007/S11227-023-05419-5","ee":"https://doi.org/10.1007/s11227-023-05419-5","url":"https://dblp.org/rec/journals/tjs/SouzaCAAMF23"}, "url":"URL#248817" }, { "@score":"1", "@id":"248818", "info":{"authors":{"author":[{"@pid":"254/8284","text":"Cédric St-Onge"},{"@pid":"60/5323","text":"Nadjia Kara"},{"@pid":"247/2842","text":"Claes Edstrom"}]},"title":"Multivariate outlier filtering for A-NFVLearn: an advanced deep VNF resource usage forecasting technique.","venue":"J. Supercomput.","volume":"79","number":"14","pages":"16206-16232","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/StOngeKE23","doi":"10.1007/S11227-023-05283-3","ee":"https://doi.org/10.1007/s11227-023-05283-3","url":"https://dblp.org/rec/journals/tjs/StOngeKE23"}, "url":"URL#248818" }, { "@score":"1", "@id":"248819", "info":{"authors":{"author":[{"@pid":"84/11143","text":"Ziyi Su"},{"@pid":"36/5558","text":"Tong Liu"},{"@pid":"322/4706","text":"Xiatong Hao"},{"@pid":"74/1838","text":"Xiaojian Hu"}]},"title":"Spatial-temporal graph convolutional networks for traffic flow prediction considering multiple traffic parameters.","venue":"J. Supercomput.","volume":"79","number":"16","pages":"18293-18312","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/SuLHH23","doi":"10.1007/S11227-023-05383-0","ee":"https://doi.org/10.1007/s11227-023-05383-0","url":"https://dblp.org/rec/journals/tjs/SuLHH23"}, "url":"URL#248819" }, { "@score":"1", "@id":"248820", "info":{"authors":{"author":[{"@pid":"337/6632","text":"Yuerong Su"},{"@pid":"63/6566","text":"Weiwei Sun"}]},"title":"Classification and interaction of new media instant music video based on deep learning under the background of artificial intelligence.","venue":"J. Supercomput.","volume":"79","number":"1","pages":"214-242","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/SuS23","doi":"10.1007/S11227-022-04672-4","ee":"https://doi.org/10.1007/s11227-022-04672-4","url":"https://dblp.org/rec/journals/tjs/SuS23"}, "url":"URL#248820" }, { "@score":"1", "@id":"248821", "info":{"title":"Retraction Note to: An ontology-driven personalized food recommendation in IoT-based healthcare system.","venue":"J. Supercomput.","volume":"79","number":"5","pages":"5847-5848","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/SubramaniyaswamyMRVCDS23","doi":"10.1007/S11227-022-04868-8","ee":"https://doi.org/10.1007/s11227-022-04868-8","url":"https://dblp.org/rec/journals/tjs/SubramaniyaswamyMRVCDS23"}, "url":"URL#248821" }, { "@score":"1", "@id":"248822", "info":{"authors":{"author":[{"@pid":"350/4410","text":"V. Sudha"},{"@pid":"00/3393","text":"K. S. Easwarakumar"}]},"title":"Hexagonal picture generation in DNA computing.","venue":"J. Supercomput.","volume":"79","number":"13","pages":"15140-15184","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/SudhaE23","doi":"10.1007/S11227-023-05247-7","ee":"https://doi.org/10.1007/s11227-023-05247-7","url":"https://dblp.org/rec/journals/tjs/SudhaE23"}, "url":"URL#248822" }, { "@score":"1", "@id":"248823", "info":{"authors":{"author":[{"@pid":"190/3547","text":"Xueli Sun"},{"@pid":"93/2399","text":"Jianxi Fan"},{"@pid":"152/5321","text":"Eminjan Sabir"},{"@pid":"03/9018","text":"Baolei Cheng"},{"@pid":"86/3457-5","text":"Jia Yu 0005"}]},"title":"Reliability of augmented k-ary n-cubes under the extra connectivity condition.","venue":"J. Supercomput.","volume":"79","number":"12","pages":"13641-13669","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/SunFSCY23","doi":"10.1007/S11227-023-05141-2","ee":"https://doi.org/10.1007/s11227-023-05141-2","url":"https://dblp.org/rec/journals/tjs/SunFSCY23"}, "url":"URL#248823" }, { "@score":"1", "@id":"248824", "info":{"authors":{"author":[{"@pid":"350/3792","text":"Keshuo Sun"},{"@pid":"199/5039","text":"Haiying Gao"}]},"title":"Adaptively secure CP-ABE for circuits with fan-in n and fan-out 1.","venue":"J. Supercomput.","volume":"79","number":"12","pages":"13307-13340","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/SunG23","doi":"10.1007/S11227-023-05130-5","ee":"https://doi.org/10.1007/s11227-023-05130-5","url":"https://dblp.org/rec/journals/tjs/SunG23"}, "url":"URL#248824" }, { "@score":"1", "@id":"248825", "info":{"authors":{"author":[{"@pid":"09/1171","text":"Kai Sun"},{"@pid":"176/1538","text":"Huajie Jiang"},{"@pid":"72/4503","text":"Yongli Hu"},{"@pid":"91/4706","text":"Baocai Yin"}]},"title":"Substructure-aware subgraph reasoning for inductive relation prediction.","venue":"J. Supercomput.","volume":"79","number":"18","pages":"21008-21027","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/SunJHY23","doi":"10.1007/S11227-023-05493-9","ee":"https://doi.org/10.1007/s11227-023-05493-9","url":"https://dblp.org/rec/journals/tjs/SunJHY23"}, "url":"URL#248825" }, { "@score":"1", "@id":"248826", "info":{"authors":{"author":[{"@pid":"09/4573","text":"Haibin Sun"},{"@pid":"130/4374","text":"Meng Tian"}]},"title":"Improved range-free localization algorithm based on reliable node optimization and enhanced sand cat optimization algorithm.","venue":"J. Supercomput.","volume":"79","number":"18","pages":"20289-20323","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/SunT23","doi":"10.1007/S11227-023-05436-4","ee":"https://doi.org/10.1007/s11227-023-05436-4","url":"https://dblp.org/rec/journals/tjs/SunT23"}, "url":"URL#248826" }, { "@score":"1", "@id":"248827", "info":{"authors":{"author":[{"@pid":"53/8276-1","text":"Dawei Sun 0001"},{"@pid":"97/6864","text":"Minghui Wu"},{"@pid":"50/3463","text":"Zhihong Yang"},{"@pid":"81/6885","text":"Atul Sajjanhar"},{"@pid":"b/RajkumarBuyya","text":"Rajkumar Buyya"}]},"title":"A two-tier coordinated load balancing strategy over skewed data streams.","venue":"J. Supercomput.","volume":"79","number":"18","pages":"21028-21056","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/SunWYSB23","doi":"10.1007/S11227-023-05473-Z","ee":"https://doi.org/10.1007/s11227-023-05473-z","url":"https://dblp.org/rec/journals/tjs/SunWYSB23"}, "url":"URL#248827" }, { "@score":"1", "@id":"248828", "info":{"authors":{"author":[{"@pid":"75/1714","text":"Amira Samy Talaat"},{"@pid":"91/11508","text":"Shaker H. Ali El-Sappagh"}]},"title":"Enhanced aerial vehicle system techniques for detection and tracking in fog, sandstorm, and snow conditions.","venue":"J. Supercomput.","volume":"79","number":"14","pages":"15868-15893","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/TalaatE23","doi":"10.1007/S11227-023-05245-9","ee":"https://doi.org/10.1007/s11227-023-05245-9","url":"https://dblp.org/rec/journals/tjs/TalaatE23"}, "url":"URL#248828" }, { "@score":"1", "@id":"248829", "info":{"authors":{"author":[{"@pid":"178/5630","text":"Mengmeng Tang"},{"@pid":"80/5390","text":"Yuanbo Guo"},{"@pid":"224/2063","text":"Qingchun Bai"},{"@pid":"26/4189","text":"Han Zhang"}]},"title":"Trigger-free cybersecurity event detection based on contrastive learning.","venue":"J. Supercomput.","volume":"79","number":"18","pages":"20984-21007","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/TangGBZ23","doi":"10.1007/S11227-023-05454-2","ee":"https://doi.org/10.1007/s11227-023-05454-2","url":"https://dblp.org/rec/journals/tjs/TangGBZ23"}, "url":"URL#248829" }, { "@score":"1", "@id":"248830", "info":{"authors":{"author":[{"@pid":"35/1725","text":"Minghua Tang"},{"@pid":"35/11048","text":"Enrico Russo"},{"@pid":"45/1025","text":"Maurizio Palesi"}]},"title":"The position-based compression techniques for DNN model.","venue":"J. Supercomput.","volume":"79","number":"15","pages":"17445-17474","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/TangRP23","doi":"10.1007/S11227-023-05339-4","ee":"https://doi.org/10.1007/s11227-023-05339-4","url":"https://dblp.org/rec/journals/tjs/TangRP23"}, "url":"URL#248830" }, { "@score":"1", "@id":"248831", "info":{"authors":{"author":[{"@pid":"337/7969","text":"Ji'ao Tang"},{"@pid":"07/6928-1","text":"Xiaojun Zhu 0001"},{"@pid":"86/2209","text":"Lu Lin"},{"@pid":"16/1278-1","text":"Chao Dong 0001"},{"@pid":"97/8704","text":"Lei Zhang"}]},"title":"Monitoring routing status of UAV networks with NB-IoT.","venue":"J. Supercomput.","volume":"79","number":"17","pages":"19064-19094","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/TangZLDZ23","doi":"10.1007/S11227-023-05411-Z","ee":"https://doi.org/10.1007/s11227-023-05411-z","url":"https://dblp.org/rec/journals/tjs/TangZLDZ23"}, "url":"URL#248831" }, { "@score":"1", "@id":"248832", "info":{"authors":{"author":[{"@pid":"53/8453","text":"Zhifu Tao"},{"@pid":"338/6705","text":"Bingxin Yao"},{"@pid":"179/0957","text":"Jiaming Zhu"}]},"title":"Exploring interval implicitization in real-valued time series classification and its applications.","venue":"J. Supercomput.","volume":"79","number":"3","pages":"3373-3391","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/TaoYZ23","doi":"10.1007/S11227-022-04792-X","ee":"https://doi.org/10.1007/s11227-022-04792-x","url":"https://dblp.org/rec/journals/tjs/TaoYZ23"}, "url":"URL#248832" }, { "@score":"1", "@id":"248833", "info":{"authors":{"author":[{"@pid":"265/9270","text":"Murat Tasyurek"},{"@pid":"244/6900","text":"Ertugrul Gul"}]},"title":"A new deep learning approach based on grayscale conversion and DWT for object detection on adversarial attacked images.","venue":"J. Supercomput.","volume":"79","number":"18","pages":"20383-20416","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/TasyurekG23","doi":"10.1007/S11227-023-05456-0","ee":"https://doi.org/10.1007/s11227-023-05456-0","url":"https://dblp.org/rec/journals/tjs/TasyurekG23"}, "url":"URL#248833" }, { "@score":"1", "@id":"248834", "info":{"authors":{"author":[{"@pid":"06/11160","text":"Rafael Keller Tesser"},{"@pid":"55/608","text":"Edson Borin"}]},"title":"Containers in HPC: a survey.","venue":"J. Supercomput.","volume":"79","number":"5","pages":"5759-5827","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/TesserB23","doi":"10.1007/S11227-022-04848-Y","ee":"https://doi.org/10.1007/s11227-022-04848-y","url":"https://dblp.org/rec/journals/tjs/TesserB23"}, "url":"URL#248834" }, { "@score":"1", "@id":"248835", "info":{"authors":{"author":[{"@pid":"323/4904","text":"Peeyush Tewari"},{"@pid":"300/2018","text":"Sandesh Tripathi"}]},"title":"An energy efficient routing scheme in internet of things enabled WSN: neuro-fuzzy approach.","venue":"J. Supercomput.","volume":"79","number":"10","pages":"11134-11158","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/TewariT23","doi":"10.1007/S11227-023-05091-9","ee":"https://doi.org/10.1007/s11227-023-05091-9","url":"https://dblp.org/rec/journals/tjs/TewariT23"}, "url":"URL#248835" }, { "@score":"1", "@id":"248836", "info":{"authors":{"author":[{"@pid":"313/9665","text":"Shaik Thaherbasha"},{"@pid":"69/8014","text":"Ravindra Dhuli"},{"@pid":"354/9145","text":"S. D. Nageena Parveen"},{"@pid":"330/0891","text":"Hareesh Ayanampudi"}]},"title":"A unified approach to evaluate the precise outage probability of NOMA over various fading scenarios.","venue":"J. Supercomput.","volume":"79","number":"14","pages":"15548-15578","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ThaherbashaDPA23","doi":"10.1007/S11227-023-05275-3","ee":"https://doi.org/10.1007/s11227-023-05275-3","url":"https://dblp.org/rec/journals/tjs/ThaherbashaDPA23"}, "url":"URL#248836" }, { "@score":"1", "@id":"248837", "info":{"authors":{"author":[{"@pid":"308/7102","text":"Tran Duy Thanh"},{"@pid":"58/3207","text":"Jun-Ho Huh"}]},"title":"New machine learning model based on the time factor for e-commerce recommendation systems.","venue":"J. Supercomput.","volume":"79","number":"6","pages":"6756-6801","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ThanhH23","doi":"10.1007/S11227-022-04909-2","ee":"https://doi.org/10.1007/s11227-022-04909-2","url":"https://dblp.org/rec/journals/tjs/ThanhH23"}, "url":"URL#248837" }, { "@score":"1", "@id":"248838", "info":{"authors":{"author":[{"@pid":"308/7102","text":"Tran Duy Thanh"},{"@pid":"58/3207","text":"Jun-Ho Huh"}]},"title":"Forecast of seasonal consumption behavior of consumers and privacy-preserving data mining with new S-Apriori algorithm.","venue":"J. Supercomput.","volume":"79","number":"11","pages":"12691-12736","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ThanhH23a","doi":"10.1007/S11227-023-05105-6","ee":"https://doi.org/10.1007/s11227-023-05105-6","url":"https://dblp.org/rec/journals/tjs/ThanhH23a"}, "url":"URL#248838" }, { "@score":"1", "@id":"248839", "info":{"authors":{"author":[{"@pid":"308/7102","text":"Tran Duy Thanh"},{"@pid":"58/3207","text":"Jun-Ho Huh"},{"@pid":"88/1733","text":"Jae-Hwan Kim"}]},"title":"Building a Lucy hybrid model for grocery sales forecasting based on time series.","venue":"J. Supercomput.","volume":"79","number":"4","pages":"4048-4083","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ThanhHK23","doi":"10.1007/S11227-022-04824-6","ee":"https://doi.org/10.1007/s11227-022-04824-6","url":"https://dblp.org/rec/journals/tjs/ThanhHK23"}, "url":"URL#248839" }, { "@score":"1", "@id":"248840", "info":{"authors":{"author":[{"@pid":"332/8417","text":"Le Quang Thao"},{"@pid":"353/3260","text":"Nguyen Duy Thien"},{"@pid":"353/2952","text":"Ngo Chi Bach"},{"@pid":"332/8677","text":"Duong Duc Cuong"},{"@pid":"188/4738","text":"Le Duc Anh"},{"@pid":"354/8113","text":"Dang Gia Khanh"},{"@pid":"353/3341","text":"Nguyen Ha Minh Hieu"},{"@pid":"353/3086","text":"Nguyen Trieu Hoang Minh"}]},"title":"PesViT: a deep learning approach for detecting misuse of pesticides on farm.","venue":"J. Supercomput.","volume":"79","number":"14","pages":"15790-15813","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ThaoTBCAKHM23","doi":"10.1007/S11227-023-05302-3","ee":"https://doi.org/10.1007/s11227-023-05302-3","url":"https://dblp.org/rec/journals/tjs/ThaoTBCAKHM23"}, "url":"URL#248840" }, { "@score":"1", "@id":"248841", "info":{"authors":{"author":[{"@pid":"338/6433","text":"P. Thilakavathy"},{"@pid":"338/7430","text":"B. Diwan"}]},"title":"Intelligent quotient estimation from MRI images using optimal light gradient boosting machine.","venue":"J. Supercomput.","volume":"79","number":"3","pages":"2431-2450","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ThilakavathyD23","doi":"10.1007/S11227-022-04711-0","ee":"https://doi.org/10.1007/s11227-022-04711-0","url":"https://dblp.org/rec/journals/tjs/ThilakavathyD23"}, "url":"URL#248841" }, { "@score":"1", "@id":"248842", "info":{"authors":{"author":[{"@pid":"185/0587","text":"Polykarpos Thomadakis"},{"@pid":"41/5222","text":"Nikos Chrisochoides"}]},"title":"Toward runtime support for unstructured and dynamic exascale-era applications.","venue":"J. Supercomput.","volume":"79","number":"8","pages":"9245-9272","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ThomadakisC23","doi":"10.1007/S11227-022-05023-Z","ee":"https://doi.org/10.1007/s11227-022-05023-z","url":"https://dblp.org/rec/journals/tjs/ThomadakisC23"}, "url":"URL#248842" }, { "@score":"1", "@id":"248843", "info":{"authors":{"author":[{"@pid":"302/5587","text":"Leki Chom Thungon"},{"@pid":"234/6618","text":"Subhas Chandra Sahana"},{"@pid":"196/3757","text":"Md. Iftekhar Hussain"}]},"title":"A lightweight certificate-based authentication scheme for 6LoWPAN-based internet of things.","venue":"J. Supercomput.","volume":"79","number":"11","pages":"12523-12548","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ThungonSH23","doi":"10.1007/S11227-023-05089-3","ee":"https://doi.org/10.1007/s11227-023-05089-3","url":"https://dblp.org/rec/journals/tjs/ThungonSH23"}, "url":"URL#248843" }, { "@score":"1", "@id":"248844", "info":{"authors":{"author":[{"@pid":"93/1076","text":"Junfeng Tian"},{"@pid":"323/1611","text":"Haoyi Jia"},{"@pid":"323/1437","text":"Wenqing Bai"}]},"title":"CCECGP: causal consistency model of edge-cloud collaborative based on grouping protocol.","venue":"J. Supercomput.","volume":"79","number":"8","pages":"8401-8424","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/TianJB23","doi":"10.1007/S11227-022-04997-0","ee":"https://doi.org/10.1007/s11227-022-04997-0","url":"https://dblp.org/rec/journals/tjs/TianJB23"}, "url":"URL#248844" }, { "@score":"1", "@id":"248845", "info":{"authors":{"author":[{"@pid":"93/1076","text":"Junfeng Tian"},{"@pid":"79/1501","text":"Hongwei Xu"},{"@pid":"04/4658","text":"Jin Tian"}]},"title":"DCCP: a dependable committee consensus protocol for permissionless blockchain.","venue":"J. Supercomput.","volume":"79","number":"4","pages":"4021-4047","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/TianXT23","doi":"10.1007/S11227-022-04811-X","ee":"https://doi.org/10.1007/s11227-022-04811-x","url":"https://dblp.org/rec/journals/tjs/TianXT23"}, "url":"URL#248845" }, { "@score":"1", "@id":"248846", "info":{"authors":{"author":[{"@pid":"34/10809","text":"Ting Tian"},{"@pid":"51/4497","text":"Shumin Zhang"},{"@pid":"223/7062","text":"Yalan Li"}]},"title":"Hybrid fault g-good-neighbor conditional diagnosability of star graphs.","venue":"J. Supercomput.","volume":"79","number":"17","pages":"19297-19311","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/TianZL23","doi":"10.1007/S11227-023-05368-Z","ee":"https://doi.org/10.1007/s11227-023-05368-z","url":"https://dblp.org/rec/journals/tjs/TianZL23"}, "url":"URL#248846" }, { "@score":"1", "@id":"248847", "info":{"authors":{"author":[{"@pid":"357/4859","text":"Amirhossein Tighkhorshid"},{"@pid":"354/7167","text":"Seyed Mohamad Ali Tousi"},{"@pid":"97/10684","text":"Amirhossein Nikoofard"}]},"title":"Car depth estimation within a monocular image using a light CNN.","venue":"J. Supercomput.","volume":"79","number":"16","pages":"17944-17961","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/TighkhorshidTN23","doi":"10.1007/S11227-023-05359-0","ee":"https://doi.org/10.1007/s11227-023-05359-0","url":"https://dblp.org/rec/journals/tjs/TighkhorshidTN23"}, "url":"URL#248847" }, { "@score":"1", "@id":"248848", "info":{"authors":{"author":[{"@pid":"308/2072","text":"Tunahan Timucin"},{"@pid":"66/8721","text":"Serdar Birogul"}]},"title":"Collaborative Smart Contracts (CoSC): example of real estate purchase and sale(s).","venue":"J. Supercomput.","volume":"79","number":"12","pages":"13442-13461","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/TimucinB23","doi":"10.1007/S11227-023-05196-1","ee":"https://doi.org/10.1007/s11227-023-05196-1","url":"https://dblp.org/rec/journals/tjs/TimucinB23"}, "url":"URL#248848" }, { "@score":"1", "@id":"248849", "info":{"authors":{"author":[{"@pid":"277/1434","text":"Peyman Tirandazi"},{"@pid":"147/6766","text":"Seyed Mojtaba Hosseini Bamakan"},{"@pid":"343/6624","text":"Aref Toghroljerdi"}]},"title":"A review of studies on internet of everything as an enabler of neuromarketing methods and techniques.","venue":"J. Supercomput.","volume":"79","number":"7","pages":"7835-7876","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/TirandaziBT23","doi":"10.1007/S11227-022-04988-1","ee":"https://doi.org/10.1007/s11227-022-04988-1","url":"https://dblp.org/rec/journals/tjs/TirandaziBT23"}, "url":"URL#248849" }, { "@score":"1", "@id":"248850", "info":{"authors":{"author":[{"@pid":"35/6110","text":"Anurag Tiwari"},{"@pid":"56/9103","text":"Vinay Kumar Srivastava"}]},"title":"Novel schemes for the improvement of lifting wavelet transform-based image watermarking using Schur decomposition.","venue":"J. Supercomput.","volume":"79","number":"12","pages":"13142-13179","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/TiwariS23","doi":"10.1007/S11227-023-05167-6","ee":"https://doi.org/10.1007/s11227-023-05167-6","url":"https://dblp.org/rec/journals/tjs/TiwariS23"}, "url":"URL#248850" }, { "@score":"1", "@id":"248851", "info":{"authors":{"author":[{"@pid":"318/8874","text":"Burak Topçu"},{"@pid":"25/9378","text":"Isil Öz"}]},"title":"Soft error vulnerability prediction of GPGPU applications.","venue":"J. Supercomput.","volume":"79","number":"6","pages":"6965-6990","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/TopcuO23","doi":"10.1007/S11227-022-04933-2","ee":"https://doi.org/10.1007/s11227-022-04933-2","url":"https://dblp.org/rec/journals/tjs/TopcuO23"}, "url":"URL#248851" }, { "@score":"1", "@id":"248852", "info":{"authors":{"author":[{"@pid":"288/8891","text":"Ahmet Toprak"},{"@pid":"156/1387","text":"Metin Turan"}]},"title":"Enhanced Named Entity Recognition algorithm for financial document verification.","venue":"J. Supercomput.","volume":"79","number":"17","pages":"19431-19451","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ToprakT23","doi":"10.1007/S11227-023-05371-4","ee":"https://doi.org/10.1007/s11227-023-05371-4","url":"https://dblp.org/rec/journals/tjs/ToprakT23"}, "url":"URL#248852" }, { "@score":"1", "@id":"248853", "info":{"authors":{"author":[{"@pid":"188/0448","text":"Nghi C. Tran"},{"@pid":"35/8546","text":"Jian-Hong Wang"},{"@pid":"188/1190","text":"Toan H. Vu"},{"@pid":"77/9050","text":"Tzu-Chiang Tai"},{"@pid":"41/2001","text":"Jia-Ching Wang"}]},"title":"Anti-aliasing convolution neural network of finger vein recognition for virtual reality (VR) human-robot equipment of metaverse.","venue":"J. Supercomput.","volume":"79","number":"3","pages":"2767-2782","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/TranWVTW23","doi":"10.1007/S11227-022-04680-4","ee":"https://doi.org/10.1007/s11227-022-04680-4","url":"https://dblp.org/rec/journals/tjs/TranWVTW23"}, "url":"URL#248853" }, { "@score":"1", "@id":"248854", "info":{"authors":{"author":[{"@pid":"350/4011","text":"Gyananjaya Tripathy"},{"@pid":"177/6852","text":"Aakanksha Sharaff"}]},"title":"AEGA: enhanced feature selection based on ANOVA and extended genetic algorithm for online customer review analysis.","venue":"J. Supercomput.","volume":"79","number":"12","pages":"13180-13209","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/TripathyS23","doi":"10.1007/S11227-023-05179-2","ee":"https://doi.org/10.1007/s11227-023-05179-2","url":"https://dblp.org/rec/journals/tjs/TripathyS23"}, "url":"URL#248854" }, { "@score":"1", "@id":"248855", "info":{"authors":{"author":[{"@pid":"324/5878","text":"Chandan Trivedi"},{"@pid":"38/8821","text":"Udai Pratap Rao"}]},"title":"Secrecy aware key management scheme for Internet of Healthcare Things.","venue":"J. Supercomput.","volume":"79","number":"11","pages":"12492-12522","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/TrivediR23","doi":"10.1007/S11227-023-05144-Z","ee":"https://doi.org/10.1007/s11227-023-05144-z","url":"https://dblp.org/rec/journals/tjs/TrivediR23"}, "url":"URL#248855" }, { "@score":"1", "@id":"248856", "info":{"authors":{"author":[{"@pid":"72/11232","text":"Toan-Thinh Truong"},{"@pid":"44/7448","text":"Minh-Triet Tran"},{"@pid":"38/4130","text":"Anh Duc Duong"},{"@pid":"337/6940","text":"Phuong-Nam Nguyen-Pham"},{"@pid":"312/9061","text":"Hoang-Anh Nguyen"},{"@pid":"138/9983","text":"Trong-Nguyen Nguyen"}]},"title":"Provable user authentication scheme on ECC in multi-server environment.","venue":"J. Supercomput.","volume":"79","number":"1","pages":"725-761","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/TruongTDNNN23","doi":"10.1007/S11227-022-04641-X","ee":"https://doi.org/10.1007/s11227-022-04641-x","url":"https://dblp.org/rec/journals/tjs/TruongTDNNN23"}, "url":"URL#248856" }, { "@score":"1", "@id":"248857", "info":{"authors":{"author":[{"@pid":"77/3905","text":"Ming-Fong Tsai"},{"@pid":"341/0559","text":"Yi-Hong Wu"}]},"title":"User intent prediction search engine system based on query analysis and image recognition technologies.","venue":"J. Supercomput.","volume":"79","number":"5","pages":"5327-5359","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/TsaiW23","doi":"10.1007/S11227-022-04874-W","ee":"https://doi.org/10.1007/s11227-022-04874-w","url":"https://dblp.org/rec/journals/tjs/TsaiW23"}, "url":"URL#248857" }, { "@score":"1", "@id":"248858", "info":{"authors":{"author":[{"@pid":"251/8891","text":"Ivan Tsmots"},{"@pid":"252/0922","text":"Vasyl Teslyuk"},{"@pid":"79/1814","text":"Natalia Kryvinska"},{"@pid":"310/8039","text":"Oleksa Skorokhoda"},{"@pid":"298/0273","text":"Iryna Kazymyra"}]},"title":"Development of a generalized model for parallel-streaming neural element and structures for scalar product calculation devices.","venue":"J. Supercomput.","volume":"79","number":"5","pages":"4820-4846","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/TsmotsTKSK23","doi":"10.1007/S11227-022-04838-0","ee":"https://doi.org/10.1007/s11227-022-04838-0","url":"https://dblp.org/rec/journals/tjs/TsmotsTKSK23"}, "url":"URL#248858" }, { "@score":"1", "@id":"248859", "info":{"authors":{"author":[{"@pid":"249/2900","text":"Daniele Di Tullio"},{"@pid":"256/9305","text":"Manoj Gyawali"}]},"title":"A post-quantum key exchange protocol from the intersection of quadric surfaces.","venue":"J. Supercomput.","volume":"79","number":"15","pages":"16529-16558","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/TullioG23","doi":"10.1007/S11227-023-05146-X","ee":"https://doi.org/10.1007/s11227-023-05146-x","url":"https://dblp.org/rec/journals/tjs/TullioG23"}, "url":"URL#248859" }, { "@score":"1", "@id":"248860", "info":{"authors":{"author":[{"@pid":"350/4158","text":"Vikas Tyagi"},{"@pid":"132/0079","text":"Samayveer Singh"}]},"title":"GM-WOA: a hybrid energy efficient cluster routing technique for SDN-enabled WSNs.","venue":"J. Supercomput.","volume":"79","number":"13","pages":"14894-14922","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/TyagiS23","doi":"10.1007/S11227-023-05263-7","ee":"https://doi.org/10.1007/s11227-023-05263-7","url":"https://dblp.org/rec/journals/tjs/TyagiS23"}, "url":"URL#248860" }, { "@score":"1", "@id":"248861", "info":{"authors":{"author":[{"@pid":"350/3854","text":"Amal Francis V. Ukken"},{"@pid":"350/3809","text":"Arjun Bindu Jayachandran"},{"@pid":"350/3872","text":"Jaideep Kumar Punnath Malayathodi"},{"@pid":"226/8878","text":"Pranesh Das"}]},"title":"Statistically aided Binary Multi-Objective Grey Wolf Optimizer: a new feature selection approach for classification.","venue":"J. Supercomput.","volume":"79","number":"12","pages":"12869-12901","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/UkkenJMD23","doi":"10.1007/S11227-023-05145-Y","ee":"https://doi.org/10.1007/s11227-023-05145-y","url":"https://dblp.org/rec/journals/tjs/UkkenJMD23"}, "url":"URL#248861" }, { "@score":"1", "@id":"248862", "info":{"authors":{"author":[{"@pid":"260/1731","text":"Areeba Umair"},{"@pid":"28/168","text":"Elio Masciari"},{"@pid":"249/1126","text":"Muhammad Habib Ullah"}]},"title":"Vaccine sentiment analysis using BERT + NBSVM and geo-spatial approaches.","venue":"J. Supercomput.","volume":"79","number":"15","pages":"17355-17385","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/UmairMU23","doi":"10.1007/S11227-023-05319-8","ee":"https://doi.org/10.1007/s11227-023-05319-8","url":"https://dblp.org/rec/journals/tjs/UmairMU23"}, "url":"URL#248862" }, { "@score":"1", "@id":"248863", "info":{"authors":{"author":[{"@pid":"341/2433","text":"S. Usharani"},{"@pid":"123/4476","text":"K. Dhanalakshmi"}]},"title":"An image storage duplication detection method using recurrent learning for smart application services.","venue":"J. Supercomput.","volume":"79","number":"10","pages":"11328-11354","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/UsharaniD23","doi":"10.1007/S11227-023-05042-4","ee":"https://doi.org/10.1007/s11227-023-05042-4","url":"https://dblp.org/rec/journals/tjs/UsharaniD23"}, "url":"URL#248863" }, { "@score":"1", "@id":"248864", "info":{"authors":{"author":[{"@pid":"135/0684","text":"Mustafa Serter Uzer"},{"@pid":"135/0686","text":"Onur Inan"}]},"title":"A novel feature selection using binary hybrid improved whale optimization algorithm.","venue":"J. Supercomput.","volume":"79","number":"9","pages":"10020-10045","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/UzerI23","doi":"10.1007/S11227-023-05067-9","ee":"https://doi.org/10.1007/s11227-023-05067-9","url":"https://dblp.org/rec/journals/tjs/UzerI23"}, "url":"URL#248864" }, { "@score":"1", "@id":"248865", "info":{"authors":{"author":{"@pid":"137/0836","text":"Hamed Vahdat-Nejad"}},"title":"CAMID: architectural support of middleware for multiple-domain ubiquitous computing and IoT.","venue":"J. Supercomput.","volume":"79","number":"1","pages":"573-590","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/Vahdat-Nejad23","doi":"10.1007/S11227-022-04696-W","ee":"https://doi.org/10.1007/s11227-022-04696-w","url":"https://dblp.org/rec/journals/tjs/Vahdat-Nejad23"}, "url":"URL#248865" }, { "@score":"1", "@id":"248866", "info":{"authors":{"author":[{"@pid":"138/2528","text":"K. Vani"},{"@pid":"64/2375","text":"G. Sudha Sadasivam"}]},"title":"Privacy-aware network embedding-based ensemble for social recommendation.","venue":"J. Supercomput.","volume":"79","number":"8","pages":"8912-8939","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/VaniS23","doi":"10.1007/S11227-022-04958-7","ee":"https://doi.org/10.1007/s11227-022-04958-7","url":"https://dblp.org/rec/journals/tjs/VaniS23"}, "url":"URL#248866" }, { "@score":"1", "@id":"248867", "info":{"authors":{"author":[{"@pid":"288/2076","text":"Pothuri Surendra Varma"},{"@pid":"218/2879","text":"Veena Anand"}]},"title":"Intelligent scanning period dilation based Wi-Fi fingerprinting for energy efficient indoor positioning in IoT applications.","venue":"J. Supercomput.","volume":"79","number":"7","pages":"7736-7761","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/VarmaA23","doi":"10.1007/S11227-022-04980-9","ee":"https://doi.org/10.1007/s11227-022-04980-9","url":"https://dblp.org/rec/journals/tjs/VarmaA23"}, "url":"URL#248867" }, { "@score":"1", "@id":"248868", "info":{"authors":{"author":[{"@pid":"125/7558","text":"Francesco Vecil"},{"@pid":"70/801","text":"José Miguel Mantas"},{"@pid":"89/8296","text":"Pedro Alonso-Jordá"}]},"title":"Efficient GPU implementation of a Boltzmann-Schrödinger-Poisson solver for the simulation of nanoscale DG MOSFETs.","venue":"J. Supercomput.","volume":"79","number":"12","pages":"13370-13401","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/VecilMA23","doi":"10.1007/S11227-023-05189-0","ee":"https://doi.org/10.1007/s11227-023-05189-0","url":"https://dblp.org/rec/journals/tjs/VecilMA23"}, "url":"URL#248868" }, { "@score":"1", "@id":"248869", "info":{"authors":{"author":[{"@pid":"338/5674","text":"Rama Krishna Reddy Venna"},{"@pid":"338/5728","text":"G. Durga Jayakumar"}]},"title":"Design of novel area-efficient coplanar reversible arithmetic and logic unit with an energy estimation in quantum-dot cellular automata.","venue":"J. Supercomput.","volume":"79","number":"2","pages":"1908-1925","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/VennaJ23","doi":"10.1007/S11227-022-04740-9","ee":"https://doi.org/10.1007/s11227-022-04740-9","url":"https://dblp.org/rec/journals/tjs/VennaJ23"}, "url":"URL#248869" }, { "@score":"1", "@id":"248870", "info":{"authors":{"author":[{"@pid":"183/1028","text":"Richa Verma"},{"@pid":"72/7554","text":"Shalini Chandra"}]},"title":"HBI-LB: A Dependable Fault-Tolerant Load Balancing Approach for Fog based Internet-of-Things Environment.","venue":"J. Supercomput.","volume":"79","number":"4","pages":"3731-3749","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/VermaC23","doi":"10.1007/S11227-022-04797-6","ee":"https://doi.org/10.1007/s11227-022-04797-6","url":"https://dblp.org/rec/journals/tjs/VermaC23"}, "url":"URL#248870" }, { "@score":"1", "@id":"248871", "info":{"title":"Retraction Note: A method of progression detection for glaucoma using K-means and the GLCM algorithm toward smart medical prediction.","venue":"J. Supercomput.","volume":"79","number":"5","pages":"5841-5842","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/VimalRKVS23","doi":"10.1007/S11227-022-04854-0","ee":"https://doi.org/10.1007/s11227-022-04854-0","url":"https://dblp.org/rec/journals/tjs/VimalRKVS23"}, "url":"URL#248871" }, { "@score":"1", "@id":"248872", "info":{"authors":{"author":[{"@pid":"333/5609","text":"Dakshnamoorthy Vinoth"},{"@pid":"332/0433","text":"Prabhavathy Panneer"}]},"title":"Correction to: An intelligent machine learning-based sarcasm detection and classification model on social networks.","venue":"J. Supercomput.","volume":"79","number":"9","pages":"10506","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/VinothP23","doi":"10.1007/S11227-023-05071-Z","ee":"https://doi.org/10.1007/s11227-023-05071-z","url":"https://dblp.org/rec/journals/tjs/VinothP23"}, "url":"URL#248872" }, { "@score":"1", "@id":"248873", "info":{"authors":{"author":[{"@pid":"238/0616","text":"Heena Wadhwa"},{"@pid":"94/10192","text":"Rajni Aron"}]},"title":"Optimized task scheduling and preemption for distributed resource management in fog-assisted IoT environment.","venue":"J. Supercomput.","volume":"79","number":"2","pages":"2212-2250","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/WadhwaA23","doi":"10.1007/S11227-022-04747-2","ee":"https://doi.org/10.1007/s11227-022-04747-2","url":"https://dblp.org/rec/journals/tjs/WadhwaA23"}, "url":"URL#248873" }, { "@score":"1", "@id":"248874", "info":{"title":"Retraction Note: Application of deep learning to detect defects on the surface of steel balls in an IoT environment.","venue":"J. Supercomput.","volume":"79","number":"12","pages":"13907","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/Wang23","doi":"10.1007/S11227-023-05274-4","ee":"https://doi.org/10.1007/s11227-023-05274-4","url":"https://dblp.org/rec/journals/tjs/Wang23"}, "url":"URL#248874" }, { "@score":"1", "@id":"248875", "info":{"authors":{"author":[{"@pid":"50/8499","text":"Haoyu Wang"},{"@pid":"73/7088","text":"Jianwei An"}]},"title":"Dynamic stochastic game-based security of edge computing based on blockchain.","venue":"J. Supercomput.","volume":"79","number":"14","pages":"15894-15926","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/WangA23","doi":"10.1007/S11227-023-05289-X","ee":"https://doi.org/10.1007/s11227-023-05289-x","url":"https://dblp.org/rec/journals/tjs/WangA23"}, "url":"URL#248875" }, { "@score":"1", "@id":"248876", "info":{"authors":{"author":[{"@pid":"217/0197","text":"Wanwan Wang"},{"@pid":"182/9655","text":"Yu Duan"},{"@pid":"60/8430","text":"Longhan Cao"},{"@pid":"153/0646","text":"Zhenghong Jiang"}]},"title":"Application of improved Naive Bayes classification algorithm in 5G signaling analysis.","venue":"J. Supercomput.","volume":"79","number":"6","pages":"6941-6964","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/WangDCJ23","doi":"10.1007/S11227-022-04946-X","ee":"https://doi.org/10.1007/s11227-022-04946-x","url":"https://dblp.org/rec/journals/tjs/WangDCJ23"}, "url":"URL#248876" }, { "@score":"1", "@id":"248877", "info":{"authors":{"author":[{"@pid":"22/1280","text":"Zhongmin Wang"},{"@pid":"255/3294","text":"Yurong Ding"},{"@pid":"82/8150","text":"Xiaomin Jin"},{"@pid":"78/1633-6","text":"Yanping Chen 0006"},{"@pid":"132/6237-2","text":"Cong Gao 0002"}]},"title":"Task offloading for edge computing in industrial Internet with joint data compression and security protection.","venue":"J. Supercomput.","volume":"79","number":"4","pages":"4291-4317","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/WangDJCG23","doi":"10.1007/S11227-022-04821-9","ee":"https://doi.org/10.1007/s11227-022-04821-9","url":"https://dblp.org/rec/journals/tjs/WangDJCG23"}, "url":"URL#248877" }, { "@score":"1", "@id":"248878", "info":{"authors":{"author":[{"@pid":"79/10743-2","text":"Ziheng Wang 0002"},{"@pid":"50/2755","text":"Xiaoshe Dong"},{"@pid":"32/1654","text":"Yan Kang"},{"@pid":"00/890-2","text":"Heng Chen 0002"}]},"title":"Parallel SHA-256 on SW26010 many-core processor for hashing of multiple messages.","venue":"J. Supercomput.","volume":"79","number":"2","pages":"2332-2355","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/WangDKC23","doi":"10.1007/S11227-022-04750-7","ee":"https://doi.org/10.1007/s11227-022-04750-7","url":"https://dblp.org/rec/journals/tjs/WangDKC23"}, "url":"URL#248878" }, { "@score":"1", "@id":"248879", "info":{"title":"Retraction Note: Application of combined kernel function artificial intelligence algorithm in mobile communication network security authentication mechanism.","venue":"J. Supercomput.","volume":"79","number":"5","pages":"5843","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/WangF23","doi":"10.1007/S11227-022-04862-0","ee":"https://doi.org/10.1007/s11227-022-04862-0","url":"https://dblp.org/rec/journals/tjs/WangF23"}, "url":"URL#248879" }, { "@score":"1", "@id":"248880", "info":{"authors":{"author":[{"@pid":"182/7545","text":"Fengxian Wang"},{"@pid":"358/2066","text":"Shaozhi Feng"},{"@pid":"354/4573","text":"Youmei Pan"},{"@pid":"98/948","text":"Huanlong Zhang"},{"@pid":"358/1911","text":"Senlin Bi"},{"@pid":"58/8763","text":"Jiaxiang Zhang"}]},"title":"Dynamic spiral updating whale optimization algorithm for solving optimal power flow problem.","venue":"J. Supercomput.","volume":"79","number":"17","pages":"19959-20000","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/WangFPZBZ23","doi":"10.1007/S11227-023-05427-5","ee":"https://doi.org/10.1007/s11227-023-05427-5","url":"https://dblp.org/rec/journals/tjs/WangFPZBZ23"}, "url":"URL#248880" }, { "@score":"1", "@id":"248881", "info":{"authors":{"author":[{"@pid":"08/5760","text":"Xi Wang"},{"@pid":"354/8919","text":"Xinzhi Hu"},{"@pid":"202/3794","text":"Weibei Fan"},{"@pid":"85/5653","text":"Ruchuan Wang"}]},"title":"Efficient data persistence and data division for distributed computing in cloud data center networks.","venue":"J. Supercomput.","volume":"79","number":"14","pages":"16300-16327","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/WangHFW23","doi":"10.1007/S11227-023-05276-2","ee":"https://doi.org/10.1007/s11227-023-05276-2","url":"https://dblp.org/rec/journals/tjs/WangHFW23"}, "url":"URL#248881" }, { "@score":"1", "@id":"248882", "info":{"authors":{"author":[{"@pid":"84/3894","text":"Yunbo Wang"},{"@pid":"75/5673-12","text":"Lei He 0012"},{"@pid":"66/4615","text":"Yong Zhang"},{"@pid":"81/2612","text":"Zhong Zhao"},{"@pid":"03/2134","text":"Jie Liu"},{"@pid":"343/6640","text":"HaoYuan Zhang"}]},"title":"An efficient communication strategy for massively parallel computation in CFD.","venue":"J. Supercomput.","volume":"79","number":"7","pages":"7560-7583","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/WangHZZLZ23","doi":"10.1007/S11227-022-04940-3","ee":"https://doi.org/10.1007/s11227-022-04940-3","url":"https://dblp.org/rec/journals/tjs/WangHZZLZ23"}, "url":"URL#248882" }, { "@score":"1", "@id":"248883", "info":{"authors":{"author":[{"@pid":"138/2082","text":"Chunqiu Wang"},{"@pid":"319/7847","text":"Young Chun Ko"}]},"title":"Emotional representation of music in multi-source data by the Internet of Things and deep learning.","venue":"J. Supercomput.","volume":"79","number":"1","pages":"349-366","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/WangK23","doi":"10.1007/S11227-022-04665-3","ee":"https://doi.org/10.1007/s11227-022-04665-3","url":"https://dblp.org/rec/journals/tjs/WangK23"}, "url":"URL#248883" }, { "@score":"1", "@id":"248884", "info":{"authors":{"author":[{"@pid":"58/6299","text":"Jia Wang"},{"@pid":"79/5550-1","text":"Yanmin Luo 0001"}]},"title":"SA-GCN: structure-aware graph convolutional networks for crowd pose estimation.","venue":"J. Supercomput.","volume":"79","number":"9","pages":"10046-10062","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/WangL23","doi":"10.1007/S11227-023-05055-Z","ee":"https://doi.org/10.1007/s11227-023-05055-z","url":"https://dblp.org/rec/journals/tjs/WangL23"}, "url":"URL#248884" }, { "@score":"1", "@id":"248885", "info":{"authors":{"author":[{"@pid":"00/4918","text":"Yiwen Wang"},{"@pid":"09/3214-32","text":"Hao Liu 0032"},{"@pid":"144/8744","text":"Guiyan Ding"},{"@pid":"150/2377","text":"Liangping Tu"}]},"title":"Adaptive chimp optimization algorithm with chaotic map for global numerical optimization problems.","venue":"J. Supercomput.","volume":"79","number":"6","pages":"6507-6537","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/WangLDT23","doi":"10.1007/S11227-022-04886-6","ee":"https://doi.org/10.1007/s11227-022-04886-6","url":"https://dblp.org/rec/journals/tjs/WangLDT23"}, "url":"URL#248885" }, { "@score":"1", "@id":"248886", "info":{"authors":{"author":[{"@pid":"52/3194","text":"Fei Wang"},{"@pid":"70/576","text":"Huawei Li"},{"@pid":"92/8490","text":"Wanli Yang"},{"@pid":"358/1950","text":"Shidong Jin"},{"@pid":"29/5999-5","text":"Peng Gao 0005"}]},"title":"Cell tracking with multifeature fusion.","venue":"J. Supercomput.","volume":"79","number":"17","pages":"20001-20018","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/WangLYJG23","doi":"10.1007/S11227-023-05384-Z","ee":"https://doi.org/10.1007/s11227-023-05384-z","url":"https://dblp.org/rec/journals/tjs/WangLYJG23"}, "url":"URL#248886" }, { "@score":"1", "@id":"248887", "info":{"authors":{"author":[{"@pid":"301/7461","text":"Shunzhi Wang"},{"@pid":"12/2538","text":"Zhanyou Ma"},{"@pid":"66/4610","text":"Rong Wang"},{"@pid":"350/4136","text":"Wenming Fang"}]},"title":"Performance analysis of a queueing system based on working vacation with repairable fault in the P2P network.","venue":"J. Supercomput.","volume":"79","number":"12","pages":"12902-12923","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/WangMWF23","doi":"10.1007/S11227-023-05154-X","ee":"https://doi.org/10.1007/s11227-023-05154-x","url":"https://dblp.org/rec/journals/tjs/WangMWF23"}, "url":"URL#248887" }, { "@score":"1", "@id":"248888", "info":{"authors":{"author":[{"@pid":"62/2631","text":"Jingjing Wang"},{"@pid":"242/7222","text":"Hongji Meng"},{"@pid":"181/2854","text":"Jian Yang"},{"@pid":"24/7970","text":"Zhi Xie"}]},"title":"Multi-GPU accelerated cellular automaton model for simulating the solidification structure of continuous casting bloom.","venue":"J. Supercomput.","volume":"79","number":"5","pages":"4870-4894","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/WangMYX23","doi":"10.1007/S11227-022-04839-Z","ee":"https://doi.org/10.1007/s11227-022-04839-z","url":"https://dblp.org/rec/journals/tjs/WangMYX23"}, "url":"URL#248888" }, { "@score":"1", "@id":"248889", "info":{"authors":{"author":[{"@pid":"00/555","text":"Yifei Wang"},{"@pid":"45/8056","text":"Mert Pilanci"}]},"title":"Sketching the Krylov subspace: faster computation of the entire ridge regularization path.","venue":"J. Supercomput.","volume":"79","number":"16","pages":"18748-18776","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/WangP23","doi":"10.1007/S11227-023-05309-W","ee":"https://doi.org/10.1007/s11227-023-05309-w","url":"https://dblp.org/rec/journals/tjs/WangP23"}, "url":"URL#248889" }, { "@score":"1", "@id":"248890", "info":{"authors":{"author":[{"@pid":"77/2589","text":"Huilin Wang"},{"@pid":"183/5512","text":"Huaming Qian"},{"@pid":"77/5196","text":"Shuai Feng"},{"@pid":"325/9939","text":"Shuya Yan"}]},"title":"CALYOLOv4: lightweight YOLOv4 target detection based on coordinated attention.","venue":"J. Supercomput.","volume":"79","number":"16","pages":"18947-18969","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/WangQFY23","doi":"10.1007/S11227-023-05380-3","ee":"https://doi.org/10.1007/s11227-023-05380-3","url":"https://dblp.org/rec/journals/tjs/WangQFY23"}, "url":"URL#248890" }, { "@score":"1", "@id":"248891", "info":{"authors":{"author":[{"@pid":"12/5838","text":"Tao Wang"},{"@pid":"01/3168","text":"Xianghong Tang"},{"@pid":"190/5623","text":"Jianguang Lu"},{"@pid":"44/8305","text":"Fangjie Liu"}]},"title":"A novel spatio-temporal hybrid neural network for remaining useful life prediction.","venue":"J. Supercomput.","volume":"79","number":"17","pages":"19095-19117","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/WangTLL23","doi":"10.1007/S11227-023-05404-Y","ee":"https://doi.org/10.1007/s11227-023-05404-y","url":"https://dblp.org/rec/journals/tjs/WangTLL23"}, "url":"URL#248891" }, { "@score":"1", "@id":"248892", "info":{"authors":{"author":[{"@pid":"87/4461","text":"Guan Wang"},{"@pid":"41/1287","text":"Jie-Sheng Wang"},{"@pid":"96/3995","text":"Hong-Yu Wang"},{"@pid":"51/8390","text":"Jia-Xu Liu"}]},"title":"Component-wise design method of fuzzy C-means clustering validity function based on CRITIC combination weighting.","venue":"J. Supercomput.","volume":"79","number":"13","pages":"14571-14601","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/WangWWL23","doi":"10.1007/S11227-023-05234-Y","ee":"https://doi.org/10.1007/s11227-023-05234-y","url":"https://dblp.org/rec/journals/tjs/WangWWL23"}, "url":"URL#248892" }, { "@score":"1", "@id":"248893", "info":{"authors":{"author":[{"@pid":"125/8189-64","text":"Jun Wang 0064"},{"@pid":"275/6614","text":"Yadan Zhang"},{"@pid":"336/0468","text":"Xichao Wang"},{"@pid":"333/4963","text":"Pengjun Mao"},{"@pid":"58/2670","text":"Bo Liu"}]},"title":"A multi-objective parameter optimization approach to maximize lifetime of wireless sensor networks inspired by spider web.","venue":"J. Supercomput.","volume":"79","number":"2","pages":"1263-1288","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/WangZWML23","doi":"10.1007/S11227-022-04676-0","ee":"https://doi.org/10.1007/s11227-022-04676-0","url":"https://dblp.org/rec/journals/tjs/WangZWML23"}, "url":"URL#248893" }, { "@score":"1", "@id":"248894", "info":{"authors":{"author":[{"@pid":"259/1711","text":"Qihang Wang"},{"@pid":"49/1753","text":"Decheng Zuo"},{"@pid":"92/6841","text":"Zhan Zhang"},{"@pid":"84/5999","text":"Siyuan Chen"},{"@pid":"96/5013-3","text":"Tianming Liu 0003"}]},"title":"An adaptive non-migrating load-balanced distributed stream window join system.","venue":"J. Supercomput.","volume":"79","number":"8","pages":"8236-8264","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/WangZZCL23","doi":"10.1007/S11227-022-04991-6","ee":"https://doi.org/10.1007/s11227-022-04991-6","url":"https://dblp.org/rec/journals/tjs/WangZZCL23"}, "url":"URL#248894" }, { "@score":"1", "@id":"248895", "info":{"authors":{"author":[{"@pid":"316/8852","text":"Mayur Wankhade"},{"@pid":"158/4427","text":"Chandra Sekhara Rao Annavarapu"},{"@pid":"a/AAbraham","text":"Ajith Abraham"}]},"title":"MAPA BiLSTM-BERT: multi-aspects position aware attention for aspect level sentiment analysis.","venue":"J. Supercomput.","volume":"79","number":"10","pages":"11452-11477","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/WankhadeAA23","doi":"10.1007/S11227-023-05112-7","ee":"https://doi.org/10.1007/s11227-023-05112-7","url":"https://dblp.org/rec/journals/tjs/WankhadeAA23"}, "url":"URL#248895" }, { "@score":"1", "@id":"248896", "info":{"authors":{"author":[{"@pid":"14/4301","text":"Xing Wei"},{"@pid":"140/4333","text":"Ting Bai"},{"@pid":"44/6741","text":"Yan Zhai"},{"@pid":"09/3666","text":"Lei Chen"},{"@pid":"06/890","text":"Hui Luo"},{"@pid":"32/3558","text":"Chong Zhao"},{"@pid":"16/6317-15","text":"Yang Lu 0015"}]},"title":"Source-free domain adaptive object detection based on pseudo-supervised mean teacher.","venue":"J. Supercomput.","volume":"79","number":"6","pages":"6228-6251","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/WeiBZCLZL23","doi":"10.1007/S11227-022-04915-4","ee":"https://doi.org/10.1007/s11227-022-04915-4","url":"https://dblp.org/rec/journals/tjs/WeiBZCLZL23"}, "url":"URL#248896" }, { "@score":"1", "@id":"248897", "info":{"authors":{"author":[{"@pid":"346/0350","text":"Junlin Wei"},{"@pid":"45/7449","text":"Jinrong Jiang"},{"@pid":"49/634","text":"Hailong Liu"},{"@pid":"48/1294","text":"Feng Zhang"},{"@pid":"225/2696","text":"Pengfei Lin"},{"@pid":"90/4693","text":"Pengfei Wang"},{"@pid":"286/9415","text":"Yongqiang Yu"},{"@pid":"90/2174","text":"Xuebin Chi"},{"@pid":"82/4593","text":"Lian Zhao"},{"@pid":"346/0070","text":"Mengrong Ding"},{"@pid":"132/5432","text":"Yiwen Li"},{"@pid":"143/9470","text":"Zipeng Yu"},{"@pid":"329/8968","text":"Weipeng Zheng"},{"@pid":"66/1893","text":"Yuzhu Wang"}]},"title":"LICOM3-CUDA: a GPU version of LASG/IAP climate system ocean model version 3 based on CUDA.","venue":"J. Supercomput.","volume":"79","number":"9","pages":"9604-9634","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/WeiJLZLWYCZDLYZW23","doi":"10.1007/S11227-022-05020-2","ee":"https://doi.org/10.1007/s11227-022-05020-2","url":"https://dblp.org/rec/journals/tjs/WeiJLZLWYCZDLYZW23"}, "url":"URL#248897" }, { "@score":"1", "@id":"248898", "info":{"authors":{"author":[{"@pid":"24/4105","text":"Wei Wei"},{"@pid":"285/7515","text":"Xiaowan Li"},{"@pid":"39/10401","text":"Beibei Zhang"},{"@pid":"24/514","text":"Linfeng Li"},{"@pid":"15/3403","text":"Robertas Damasevicius"},{"@pid":"64/2091","text":"Rafal Scherer"}]},"title":"LSTM-SN: complex text classifying with LSTM fusion social network.","venue":"J. Supercomput.","volume":"79","number":"9","pages":"9558-9583","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/WeiLZLDS23","doi":"10.1007/S11227-022-05034-W","ee":"https://doi.org/10.1007/s11227-022-05034-w","url":"https://dblp.org/rec/journals/tjs/WeiLZLDS23"}, "url":"URL#248898" }, { "@score":"1", "@id":"248899", "info":{"authors":{"author":[{"@pid":"43/6075","text":"Yean-Fu Wen"},{"@pid":"168/8009","text":"Chen-Min Hsu"}]},"title":"A performance evaluation of modular functions and state databases for Hyperledger Fabric blockchain systems.","venue":"J. Supercomput.","volume":"79","number":"3","pages":"2654-2690","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/WenH23","doi":"10.1007/S11227-022-04762-3","ee":"https://doi.org/10.1007/s11227-022-04762-3","url":"https://dblp.org/rec/journals/tjs/WenH23"}, "url":"URL#248899" }, { "@score":"1", "@id":"248900", "info":{"authors":{"author":[{"@pid":"43/6075","text":"Yean-Fu Wen"},{"@pid":"358/2073","text":"Chia-Pei Wang"}]},"title":"Data privacy mechanisms development and performance evaluation for personal and ubiquitous blockchain-based storage.","venue":"J. Supercomput.","volume":"79","number":"17","pages":"19636-19670","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/WenW23","doi":"10.1007/S11227-023-05425-7","ee":"https://doi.org/10.1007/s11227-023-05425-7","url":"https://dblp.org/rec/journals/tjs/WenW23"}, "url":"URL#248900" }, { "@score":"1", "@id":"248901", "info":{"authors":{"author":[{"@pid":"58/10245","text":"Xiaoqiang Wen"},{"@pid":"58/6965","text":"Zhibin Wu"},{"@pid":"359/5261","text":"Mengchong Zhou"},{"@pid":"64/1071","text":"Jianguo Wang"},{"@pid":"06/1360","text":"Lifeng Wu"}]},"title":"Economic mining of thermal power plant based on improved Hadoop-based framework and Spark-based algorithms.","venue":"J. Supercomput.","volume":"79","number":"18","pages":"20235-20262","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/WenWZWW23","doi":"10.1007/S11227-023-05443-5","ee":"https://doi.org/10.1007/s11227-023-05443-5","url":"https://dblp.org/rec/journals/tjs/WenWZWW23"}, "url":"URL#248901" }, { "@score":"1", "@id":"248902", "info":{"authors":{"author":[{"@pid":"98/4432","text":"Bin Wu"},{"@pid":"75/2122","text":"Sean He"}]},"title":"Self-learning and explainable deep learning network toward the security of artificial intelligence of things.","venue":"J. Supercomput.","volume":"79","number":"4","pages":"4436-4467","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/WuH23","doi":"10.1007/S11227-022-04818-4","ee":"https://doi.org/10.1007/s11227-022-04818-4","url":"https://dblp.org/rec/journals/tjs/WuH23"}, "url":"URL#248902" }, { "@score":"1", "@id":"248903", "info":{"authors":{"author":[{"@pid":"207/1429","text":"Jiayang Wu"},{"@pid":"93/743","text":"Shihong Huang"},{"@pid":"354/8436","text":"Yanxu Yang"},{"@pid":"80/8438","text":"Bingzhi Zhang"}]},"title":"Evaluation of 3D LiDAR SLAM algorithms based on the KITTI dataset.","venue":"J. Supercomput.","volume":"79","number":"14","pages":"15760-15772","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/WuHYZ23","doi":"10.1007/S11227-023-05267-3","ee":"https://doi.org/10.1007/s11227-023-05267-3","url":"https://dblp.org/rec/journals/tjs/WuHYZ23"}, "url":"URL#248903" }, { "@score":"1", "@id":"248904", "info":{"authors":{"author":[{"@pid":"216/6883","text":"Ruizhi Wu"},{"@pid":"50/3402","text":"Bo Li"}]},"title":"Computation offloading and heterogeneous task caching in MEC-enabled vehicular networks.","venue":"J. Supercomput.","volume":"79","number":"15","pages":"17098-17122","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/WuL23","doi":"10.1007/S11227-023-05328-7","ee":"https://doi.org/10.1007/s11227-023-05328-7","url":"https://dblp.org/rec/journals/tjs/WuL23"}, "url":"URL#248904" }, { "@score":"1", "@id":"248905", "info":{"authors":{"author":[{"@pid":"13/1864","text":"Han Wu"},{"@pid":"319/4607","text":"Jiahao Nie 0001"},{"@pid":"56/10126","text":"Ziming Zhu"},{"@pid":"52/6077-1","text":"Zhiwei He 0001"},{"@pid":"61/7672-2","text":"Mingyu Gao 0002"}]},"title":"Leveraging temporal-aware fine-grained features for robust multiple object tracking.","venue":"J. Supercomput.","volume":"79","number":"3","pages":"2910-2931","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/WuNZHG23","doi":"10.1007/S11227-022-04776-X","ee":"https://doi.org/10.1007/s11227-022-04776-x","url":"https://dblp.org/rec/journals/tjs/WuNZHG23"}, "url":"URL#248905" }, { "@score":"1", "@id":"248906", "info":{"authors":{"author":[{"@pid":"325/8112","text":"Xinquan Wu"},{"@pid":"13/4745","text":"Xuefeng Yan"},{"@pid":"325/7706","text":"Xingchan Li"},{"@pid":"198/6597","text":"Yongzhen Wang"}]},"title":"Simulating hybrid SysML models: a model transformation approach under the DEVS framework.","venue":"J. Supercomput.","volume":"79","number":"2","pages":"2010-2030","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/WuYLW23","doi":"10.1007/S11227-022-04654-6","ee":"https://doi.org/10.1007/s11227-022-04654-6","url":"https://dblp.org/rec/journals/tjs/WuYLW23"}, "url":"URL#248906" }, { "@score":"1", "@id":"248907", "info":{"authors":{"author":[{"@pid":"87/5280","text":"Huafeng Wu"},{"@pid":"126/5240","text":"Yuxuan Zhang"},{"@pid":"289/1453","text":"Linian Liang"},{"@pid":"240/2892","text":"Xiaojun Mei"},{"@pid":"48/1843","text":"Dezhi Han"},{"@pid":"74/2721","text":"Bing Han"},{"@pid":"81/3025","text":"Tien-Hsiung Weng"},{"@pid":"l/KuanChingLi","text":"Kuan-Ching Li"}]},"title":"Multi-head attention-based model for reconstructing continuous missing time series data.","venue":"J. Supercomput.","volume":"79","number":"18","pages":"20684-20711","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/WuZLMHHWL23","doi":"10.1007/S11227-023-05465-Z","ee":"https://doi.org/10.1007/s11227-023-05465-z","url":"https://dblp.org/rec/journals/tjs/WuZLMHHWL23"}, "url":"URL#248907" }, { "@score":"1", "@id":"248908", "info":{"authors":{"author":[{"@pid":"69/2205","text":"Yuanqing Xia"},{"@pid":"173/1777","text":"Yufeng Zhan"},{"@pid":"34/3920-1","text":"Li Dai 0001"},{"@pid":"34/3902","text":"Yuehong Chen"}]},"title":"A cost and makespan aware scheduling algorithm for dynamic multi-workflow in cloud environment.","venue":"J. Supercomput.","volume":"79","number":"2","pages":"1814-1833","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/XiaZDC23","doi":"10.1007/S11227-022-04681-3","ee":"https://doi.org/10.1007/s11227-022-04681-3","url":"https://dblp.org/rec/journals/tjs/XiaZDC23"}, "url":"URL#248908" }, { "@score":"1", "@id":"248909", "info":{"authors":{"author":[{"@pid":"63/3742","text":"Lingyun Xiang"},{"@pid":"88/6605","text":"Huiqing You"},{"@pid":"337/6936","text":"Guoqing Guo"},{"@pid":"69/5902","text":"Qian Li"}]},"title":"Deep feature fusion for cold-start spam review detection.","venue":"J. Supercomput.","volume":"79","number":"1","pages":"419-434","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/XiangYGL23","doi":"10.1007/S11227-022-04685-Z","ee":"https://doi.org/10.1007/s11227-022-04685-z","url":"https://dblp.org/rec/journals/tjs/XiangYGL23"}, "url":"URL#248909" }, { "@score":"1", "@id":"248910", "info":{"authors":{"author":[{"@pid":"59/4568-3","text":"Ling Xiao 0003"},{"@pid":"37/2732","text":"Beiji Zou"},{"@pid":"150/4024","text":"Chengzhang Zhu"},{"@pid":"324/9460","text":"Fanbo Nie"}]},"title":"ESDedup: An efficient and secure deduplication scheme based on data similarity and blockchain for cloud-assisted medical storage systems.","venue":"J. Supercomput.","volume":"79","number":"3","pages":"2932-2960","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/XiaoZZN23","doi":"10.1007/S11227-022-04746-3","ee":"https://doi.org/10.1007/s11227-022-04746-3","url":"https://dblp.org/rec/journals/tjs/XiaoZZN23"}, "url":"URL#248910" }, { "@score":"1", "@id":"248911", "info":{"authors":{"author":[{"@pid":"87/243","text":"Ping Xie"},{"@pid":"224/2091","text":"Zhu Yuan"},{"@pid":"08/6001","text":"Yu Hu"}]},"title":"Nscale: an efficient RAID-6 online scaling via optimizing data migration.","venue":"J. Supercomput.","volume":"79","number":"3","pages":"2383-2403","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/XieYH23","doi":"10.1007/S11227-022-04752-5","ee":"https://doi.org/10.1007/s11227-022-04752-5","url":"https://dblp.org/rec/journals/tjs/XieYH23"}, "url":"URL#248911" }, { "@score":"1", "@id":"248912", "info":{"authors":{"author":[{"@pid":"150/8530","text":"Shanshan Xie"},{"@pid":"04/3348","text":"Yan Zhang"},{"@pid":"186/7470","text":"Danjv Lv"},{"@pid":"83/6331","text":"Xu Chen"},{"@pid":"77/1751","text":"Jing Lu"},{"@pid":"23/108","text":"Jiang Liu"}]},"title":"A new improved maximal relevance and minimal redundancy method based on feature subset.","venue":"J. Supercomput.","volume":"79","number":"3","pages":"3157-3180","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/XieZLCLL23","doi":"10.1007/S11227-022-04763-2","ee":"https://doi.org/10.1007/s11227-022-04763-2","url":"https://dblp.org/rec/journals/tjs/XieZLCLL23"}, "url":"URL#248912" }, { "@score":"1", "@id":"248913", "info":{"authors":{"author":[{"@pid":"297/9967","text":"Yijin Xiong"},{"@pid":"56/2203","text":"Xin Gao"},{"@pid":"10/3890","text":"Guoying Zhang"}]},"title":"Interactive object annotation based on one-click guidance.","venue":"J. Supercomput.","volume":"79","number":"14","pages":"16098-16117","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/XiongGZ23","doi":"10.1007/S11227-023-05279-Z","ee":"https://doi.org/10.1007/s11227-023-05279-z","url":"https://dblp.org/rec/journals/tjs/XiongGZ23"}, "url":"URL#248913" }, { "@score":"1", "@id":"248914", "info":{"authors":{"author":[{"@pid":"01/2009","text":"Yu Xiong"},{"@pid":"357/4829","text":"Minghe Yan"},{"@pid":"81/6204","text":"Xiang Hu"},{"@pid":"357/5045","text":"Chaohui Ren"},{"@pid":"214/6165","text":"Hang Tian"}]},"title":"An unsupervised opinion summarization model fused joint attention and dictionary learning.","venue":"J. Supercomput.","volume":"79","number":"16","pages":"17759-17783","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/XiongYHRT23","doi":"10.1007/S11227-023-05316-X","ee":"https://doi.org/10.1007/s11227-023-05316-x","url":"https://dblp.org/rec/journals/tjs/XiongYHRT23"}, "url":"URL#248914" }, { "@score":"1", "@id":"248915", "info":{"authors":{"author":[{"@pid":"06/4525","text":"Fuyong Xu"},{"@pid":"350/4466","text":"Zhaoxin Ding"},{"@pid":"24/8073","text":"Zhenfang Zhu"},{"@pid":"85/670-1","text":"Peiyu Liu 0001"}]},"title":"Exploring implicit persona knowledge for personalized dialogue generation.","venue":"J. Supercomput.","volume":"79","number":"13","pages":"14545-14570","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/XuDZL23","doi":"10.1007/S11227-023-05209-Z","ee":"https://doi.org/10.1007/s11227-023-05209-z","url":"https://dblp.org/rec/journals/tjs/XuDZL23"}, "url":"URL#248915" }, { "@score":"1", "@id":"248916", "info":{"authors":{"author":[{"@pid":"256/7478","text":"Saijuan Xu"},{"@pid":"249/1028","text":"Canyang Guo"},{"@pid":"312/7634","text":"Yuhan Zhu"},{"@pid":"54/10149","text":"Genggeng Liu"},{"@pid":"x/NaixueXiong","text":"Neal Xiong 0001"}]},"title":"CNN-VAE: An intelligent text representation algorithm.","venue":"J. Supercomput.","volume":"79","number":"11","pages":"12266-12291","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/XuGZL023","doi":"10.1007/S11227-023-05139-W","ee":"https://doi.org/10.1007/s11227-023-05139-w","url":"https://dblp.org/rec/journals/tjs/XuGZL023"}, "url":"URL#248916" }, { "@score":"1", "@id":"248917", "info":{"authors":{"author":[{"@pid":"283/7973","text":"Jinyi Xu"},{"@pid":"67/6136","text":"Hao Shi"},{"@pid":"11/1917","text":"Yixiang Chen"}]},"title":"Efficient tasks scheduling in multicore systems integrated with hardware accelerators.","venue":"J. Supercomput.","volume":"79","number":"7","pages":"7244-7271","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/XuSC23","doi":"10.1007/S11227-022-04955-W","ee":"https://doi.org/10.1007/s11227-022-04955-w","url":"https://dblp.org/rec/journals/tjs/XuSC23"}, "url":"URL#248917" }, { "@score":"1", "@id":"248918", "info":{"authors":{"author":[{"@pid":"177/8572","text":"Heyang Xu"},{"@pid":"73/1259","text":"Sen Xu"},{"@pid":"24/4105","text":"Wei Wei"},{"@pid":"240/3209","text":"Naixuan Guo"}]},"title":"Fault tolerance and quality of service aware virtual machine scheduling algorithm in cloud data centers.","venue":"J. Supercomput.","volume":"79","number":"3","pages":"2603-2625","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/XuXWG23","doi":"10.1007/S11227-022-04760-5","ee":"https://doi.org/10.1007/s11227-022-04760-5","url":"https://dblp.org/rec/journals/tjs/XuXWG23"}, "url":"URL#248918" }, { "@score":"1", "@id":"248919", "info":{"authors":{"author":[{"@pid":"78/5451","text":"Jiuyun Xu"},{"@pid":"341/7662","text":"Xingru Zhao"}]},"title":"FPSA-SMS: first price sealed auction-based service migration strategy in mobile edge computing.","venue":"J. Supercomput.","volume":"79","number":"6","pages":"5920-5938","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/XuZ23","doi":"10.1007/S11227-022-04879-5","ee":"https://doi.org/10.1007/s11227-022-04879-5","url":"https://dblp.org/rec/journals/tjs/XuZ23"}, "url":"URL#248919" }, { "@score":"1", "@id":"248920", "info":{"authors":{"author":[{"@pid":"58/4931","text":"Xiaojie Xu"},{"@pid":"02/6428-25","text":"Yun Zhang 0025"}]},"title":"Regional steel price index forecasts with neural networks: evidence from east, south, north, central south, northeast, southwest, and northwest China.","venue":"J. Supercomput.","volume":"79","number":"12","pages":"13601-13619","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/XuZ23a","doi":"10.1007/S11227-023-05207-1","ee":"https://doi.org/10.1007/s11227-023-05207-1","url":"https://dblp.org/rec/journals/tjs/XuZ23a"}, "url":"URL#248920" }, { "@score":"1", "@id":"248921", "info":{"authors":{"author":[{"@pid":"276/3270","text":"Cho Do Xuan"},{"@pid":"275/9938","text":"Mai Hoang Dao"},{"@pid":"356/1875","text":"Ma Cong Thanh"},{"@pid":"356/2196","text":"Bui Van Cong"}]},"title":"A novel approach for software vulnerability detection based on intelligent cognitive computing.","venue":"J. Supercomput.","volume":"79","number":"15","pages":"17042-17078","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/XuanDTC23","doi":"10.1007/S11227-023-05282-4","ee":"https://doi.org/10.1007/s11227-023-05282-4","url":"https://dblp.org/rec/journals/tjs/XuanDTC23"}, "url":"URL#248921" }, { "@score":"1", "@id":"248922", "info":{"authors":{"author":[{"@pid":"337/5671","text":"Jiankai Xue"},{"@pid":"s/BoShen-1","text":"Bo Shen 0001"}]},"title":"Dung beetle optimizer: a new meta-heuristic algorithm for global optimization.","venue":"J. Supercomput.","volume":"79","number":"7","pages":"7305-7336","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/XueS23","doi":"10.1007/S11227-022-04959-6","ee":"https://doi.org/10.1007/s11227-022-04959-6","url":"https://dblp.org/rec/journals/tjs/XueS23"}, "url":"URL#248922" }, { "@score":"1", "@id":"248923", "info":{"authors":{"author":[{"@pid":"272/4007","text":"Vijay Kumar Yadav 0003"},{"@pid":"223/3819","text":"Nitish Andola"},{"@pid":"39/2285","text":"Shekhar Verma"},{"@pid":"43/5587-2","text":"S. Venkatesan 0002"}]},"title":"PSCLS: provably secure certificateless signature scheme for IoT device on cloud.","venue":"J. Supercomput.","volume":"79","number":"5","pages":"4962-4982","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/YadavAVV23","doi":"10.1007/S11227-022-04795-8","ee":"https://doi.org/10.1007/s11227-022-04795-8","url":"https://dblp.org/rec/journals/tjs/YadavAVV23"}, "url":"URL#248923" }, { "@score":"1", "@id":"248924", "info":{"authors":{"author":[{"@pid":"270/0766","text":"Awaneesh Kumar Yadav"},{"@pid":"10/3184","text":"An Braeken"},{"@pid":"71/3734","text":"Manoj Misra"}]},"title":"Symmetric key-based authentication and key agreement scheme resistant against semi-trusted third party for fog and dew computing.","venue":"J. Supercomput.","volume":"79","number":"10","pages":"11261-11299","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/YadavBM23","doi":"10.1007/S11227-023-05064-Y","ee":"https://doi.org/10.1007/s11227-023-05064-y","url":"https://dblp.org/rec/journals/tjs/YadavBM23"}, "url":"URL#248924" }, { "@score":"1", "@id":"248925", "info":{"authors":{"author":[{"@pid":"138/1096","text":"Sonal Yadav"},{"@pid":"10/3052","text":"Vijay Laxmi"},{"@pid":"75/2282","text":"Hemangee K. Kapoor"},{"@pid":"80/7311","text":"Manoj Singh Gaur"},{"@pid":"141/4293","text":"Amit Kumar"}]},"title":"Adaptive distribution of control messages for improving bandwidth utilization in multiple NoC.","venue":"J. Supercomput.","volume":"79","number":"15","pages":"17208-17246","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/YadavLKGK23","doi":"10.1007/S11227-023-05208-0","ee":"https://doi.org/10.1007/s11227-023-05208-0","url":"https://dblp.org/rec/journals/tjs/YadavLKGK23"}, "url":"URL#248925" }, { "@score":"1", "@id":"248926", "info":{"authors":{"author":[{"@pid":"196/6222","text":"Pooja Yadav"},{"@pid":"217/3310","text":"S. C. Sharma 0001"}]},"title":"HFBO-KSELM: Hybrid Flash Butterfly Optimization-based Kernel Softplus Extreme Learning Machine for Classification of Chronic Kidney Disease.","venue":"J. Supercomput.","volume":"79","number":"15","pages":"17146-17169","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/YadavS23","doi":"10.1007/S11227-023-05337-6","ee":"https://doi.org/10.1007/s11227-023-05337-6","url":"https://dblp.org/rec/journals/tjs/YadavS23"}, "url":"URL#248926" }, { "@score":"1", "@id":"248927", "info":{"authors":{"author":[{"@pid":"158/1578","text":"Selman Yakut"},{"@pid":"345/7083","text":"Furkan Öztemiz"},{"@pid":"17/5011","text":"Ali Karci"}]},"title":"A new robust approach to solve minimum vertex cover problem: Malatya vertex-cover algorithm.","venue":"J. Supercomput.","volume":"79","number":"17","pages":"19746-19769","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/YakutOK23","doi":"10.1007/S11227-023-05397-8","ee":"https://doi.org/10.1007/s11227-023-05397-8","url":"https://dblp.org/rec/journals/tjs/YakutOK23"}, "url":"URL#248927" }, { "@score":"1", "@id":"248928", "info":{"authors":{"author":[{"@pid":"356/2161","text":"Kaixiang Yan"},{"@pid":"326/1275","text":"Jiatian Mei"},{"@pid":"92/2875","text":"Dongming Zhou"},{"@pid":"270/5477","text":"Lifen Zhou"}]},"title":"External-attention dual-modality fusion network for RGBT tracking.","venue":"J. Supercomput.","volume":"79","number":"15","pages":"17020-17041","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/YanMZZ23","doi":"10.1007/S11227-023-05329-6","ee":"https://doi.org/10.1007/s11227-023-05329-6","url":"https://dblp.org/rec/journals/tjs/YanMZZ23"}, "url":"URL#248928" }, { "@score":"1", "@id":"248929", "info":{"authors":{"author":[{"@pid":"133/3384","text":"Surong Yan"},{"@pid":"195/1701","text":"Haosen Wang"},{"@pid":"47/3589","text":"Yixiao Li"},{"@pid":"302/7981","text":"Chunqi Wu"},{"@pid":"18/4158","text":"Long Han"},{"@pid":"99/8843","text":"Chenglong Shi"},{"@pid":"70/7814","text":"Ruilin Guo"}]},"title":"Metapath-guided dual semantic-aware filtering for HIN-based recommendation.","venue":"J. Supercomput.","volume":"79","number":"11","pages":"11934-11964","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/YanWLWHSG23","doi":"10.1007/S11227-023-05113-6","ee":"https://doi.org/10.1007/s11227-023-05113-6","url":"https://dblp.org/rec/journals/tjs/YanWLWHSG23"}, "url":"URL#248929" }, { "@score":"1", "@id":"248930", "info":{"authors":{"author":[{"@pid":"144/0873","text":"Zheping Yan"},{"@pid":"341/6915","text":"Jinyu Yan"},{"@pid":"25/7019","text":"Yifan Wu"},{"@pid":"94/3019","text":"Chao Zhang"}]},"title":"An improved hybrid mayfly algorithm for global optimization.","venue":"J. Supercomput.","volume":"79","number":"6","pages":"5878-5919","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/YanYWZ23","doi":"10.1007/S11227-022-04883-9","ee":"https://doi.org/10.1007/s11227-022-04883-9","url":"https://dblp.org/rec/journals/tjs/YanYWZ23"}, "url":"URL#248930" }, { "@score":"1", "@id":"248931", "info":{"authors":{"author":[{"@pid":"356/1866","text":"Fengru Yan"},{"@pid":"62/1225","text":"Guanghua Zhang"},{"@pid":"76/7485","text":"Dongwen Zhang"},{"@pid":"20/687","text":"Xinghua Sun"},{"@pid":"267/0687","text":"Botao Hou"},{"@pid":"356/2154","text":"Naiwen Yu"}]},"title":"TL-CNN-IDS: transfer learning-based intrusion detection system using convolutional neural network.","venue":"J. Supercomput.","volume":"79","number":"15","pages":"17562-17584","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/YanZZSHY23","doi":"10.1007/S11227-023-05347-4","ee":"https://doi.org/10.1007/s11227-023-05347-4","url":"https://dblp.org/rec/journals/tjs/YanZZSHY23"}, "url":"URL#248931" }, { "@score":"1", "@id":"248932", "info":{"authors":{"author":[{"@pid":"00/5867","text":"Chao Yang"},{"@pid":"296/4522","text":"Zijing Huang"},{"@pid":"40/2895","text":"Bibo Jiang"},{"@pid":"358/1987","text":"Menglian Zhu"},{"@pid":"276/1238","text":"Aoran Luo"},{"@pid":"93/8352","text":"Jianfeng He"}]},"title":"Improved clonal selection algorithm based on the directional update strategy.","venue":"J. Supercomput.","volume":"79","number":"17","pages":"19312-19331","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/YangHJZLH23","doi":"10.1007/S11227-023-05405-X","ee":"https://doi.org/10.1007/s11227-023-05405-x","url":"https://dblp.org/rec/journals/tjs/YangHJZLH23"}, "url":"URL#248932" }, { "@score":"1", "@id":"248933", "info":{"authors":{"author":[{"@pid":"177/9980","text":"Lulu Yang"},{"@pid":"127/0003","text":"Xiaohui Hua"},{"@pid":"99/3034","text":"Yuxing Yang"}]},"title":"On structure and substructure fault tolerance of star networks.","venue":"J. Supercomput.","volume":"79","number":"8","pages":"9157-9179","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/YangHY23","doi":"10.1007/S11227-022-05036-8","ee":"https://doi.org/10.1007/s11227-022-05036-8","url":"https://dblp.org/rec/journals/tjs/YangHY23"}, "url":"URL#248933" }, { "@score":"1", "@id":"248934", "info":{"authors":{"author":[{"@pid":"57/5443-14","text":"Peng Yang 0014"},{"@pid":"341/1111","text":"Juncheng Leng"},{"@pid":"204/8302","text":"Guangzhen Zhao"},{"@pid":"75/5928","text":"Wenjun Li"},{"@pid":"341/0686","text":"Haisheng Fang"}]},"title":"Rumor detection driven by graph attention capsule network on dynamic propagation structures.","venue":"J. Supercomput.","volume":"79","number":"5","pages":"5201-5222","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/YangLZLF23","doi":"10.1007/S11227-022-04831-7","ee":"https://doi.org/10.1007/s11227-022-04831-7","url":"https://dblp.org/rec/journals/tjs/YangLZLF23"}, "url":"URL#248934" }, { "@score":"1", "@id":"248935", "info":{"authors":{"author":[{"@pid":"57/5443","text":"Peng Yang"},{"@pid":"75/5928","text":"Wenjun Li"},{"@pid":"204/8302","text":"Guangzhen Zhao"},{"@pid":"295/9298","text":"Xianyu Zha"}]},"title":"Row-based hierarchical graph network for multi-hop question answering over textual and tabular data.","venue":"J. Supercomput.","volume":"79","number":"9","pages":"9795-9818","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/YangLZZ23","doi":"10.1007/S11227-022-05035-9","ee":"https://doi.org/10.1007/s11227-022-05035-9","url":"https://dblp.org/rec/journals/tjs/YangLZZ23"}, "url":"URL#248935" }, { "@score":"1", "@id":"248936", "info":{"authors":{"author":[{"@pid":"44/1152-19","text":"Xin Yang 0019"},{"@pid":"202/7478","text":"Abla Smahi"},{"@pid":"66/3387-22","text":"Hui Li 0022"},{"@pid":"39/7035-8","text":"Ping Lu 0008"},{"@pid":"44/8309","text":"Huayu Zhang"},{"@pid":"02/5533","text":"Shuo-Yen Robert Li"}]},"title":"Triple methods-based empirical assessment of the effectiveness of adaptive cyber defenses in the cloud.","venue":"J. Supercomput.","volume":"79","number":"8","pages":"8634-8667","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/YangSLLZL23","doi":"10.1007/S11227-022-04984-5","ee":"https://doi.org/10.1007/s11227-022-04984-5","url":"https://dblp.org/rec/journals/tjs/YangSLLZL23"}, "url":"URL#248936" }, { "@score":"1", "@id":"248937", "info":{"authors":{"author":[{"@pid":"244/9322","text":"Qinglin Yang"},{"@pid":"231/4862","text":"Taiyu Wang"},{"@pid":"337/6052","text":"Kaiming Zhu"},{"@pid":"17/5974-1","text":"Junbo Wang 0001"},{"@pid":"67/2976","text":"Yu Han"},{"@pid":"04/4049","text":"Chunhua Su"}]},"title":"Loss-based differentiation strategy for privacy preserving of social robots.","venue":"J. Supercomput.","volume":"79","number":"1","pages":"321-348","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/YangWZWHS23","doi":"10.1007/S11227-022-04660-8","ee":"https://doi.org/10.1007/s11227-022-04660-8","url":"https://dblp.org/rec/journals/tjs/YangWZWHS23"}, "url":"URL#248937" }, { "@score":"1", "@id":"248938", "info":{"authors":{"author":[{"@pid":"244/9322","text":"Qinglin Yang"},{"@pid":"231/4862","text":"Taiyu Wang"},{"@pid":"337/6052","text":"Kaiming Zhu"},{"@pid":"17/5974-1","text":"Junbo Wang 0001"},{"@pid":"67/2976","text":"Yu Han"},{"@pid":"04/4049","text":"Chunhua Su"}]},"title":"Correction to: Loss-based differentiation strategy for privacy preserving of social robots.","venue":"J. Supercomput.","volume":"79","number":"1","pages":"1159-1160","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/YangWZWHS23a","doi":"10.1007/S11227-022-04716-9","ee":"https://doi.org/10.1007/s11227-022-04716-9","url":"https://dblp.org/rec/journals/tjs/YangWZWHS23a"}, "url":"URL#248938" }, { "@score":"1", "@id":"248939", "info":{"authors":{"author":[{"@pid":"54/4089-40","text":"Hao Yang 0040"},{"@pid":"92/2875","text":"Dongming Zhou"},{"@pid":"77/2845","text":"Jinde Cao"},{"@pid":"82/4299","text":"Qian Zhao"},{"@pid":"39/9","text":"Miao Li"}]},"title":"RainFormer: a pyramid transformer for single image deraining.","venue":"J. Supercomput.","volume":"79","number":"6","pages":"6115-6140","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/YangZCZL23","doi":"10.1007/S11227-022-04895-5","ee":"https://doi.org/10.1007/s11227-022-04895-5","url":"https://dblp.org/rec/journals/tjs/YangZCZL23"}, "url":"URL#248939" }, { "@score":"1", "@id":"248940", "info":{"authors":{"author":[{"@pid":"71/3668","text":"Liwei Yang"},{"@pid":"203/3657","text":"Furong Zhu"},{"@pid":"276/9264","text":"Wencong Lai"},{"@pid":"337/6831","text":"Qiulian Zhang"},{"@pid":"232/7883","text":"Xinlai Liu"},{"@pid":"98/5684-3","text":"Wenjie Zhang 0003"}]},"title":"Interference analysis for MIMO-OFDM based indoor visible light communication.","venue":"J. Supercomput.","volume":"79","number":"1","pages":"702-724","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/YangZLZLZ23","doi":"10.1007/S11227-022-04656-4","ee":"https://doi.org/10.1007/s11227-022-04656-4","url":"https://dblp.org/rec/journals/tjs/YangZLZLZ23"}, "url":"URL#248940" }, { "@score":"1", "@id":"248941", "info":{"authors":{"author":[{"@pid":"71/8496","text":"Liang Yao"},{"@pid":"30/6037","text":"Huaguo Liang"},{"@pid":"198/5556","text":"Yingchun Lu"}]},"title":"Low-overhead TRNG based on MUX for cryptographic protection using multiphase sampling.","venue":"J. Supercomput.","volume":"79","number":"15","pages":"17170-17186","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/YaoLL23","doi":"10.1007/S11227-023-05349-2","ee":"https://doi.org/10.1007/s11227-023-05349-2","url":"https://dblp.org/rec/journals/tjs/YaoLL23"}, "url":"URL#248941" }, { "@score":"1", "@id":"248942", "info":{"authors":{"author":[{"@pid":"350/3779","text":"Zongli Ye"},{"@pid":"69/3253","text":"Chin-Ling Chen"},{"@pid":"02/7436-2","text":"Wei Weng 0002"},{"@pid":"33/2079-5","text":"Hongyu Sun 0005"},{"@pid":"64/3782","text":"Woei-Jiunn Tsaur"},{"@pid":"09/8062","text":"Yong-Yuan Deng"}]},"title":"An anonymous and fair auction system based on blockchain.","venue":"J. Supercomput.","volume":"79","number":"13","pages":"13909-13951","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/YeCWSTD23","doi":"10.1007/S11227-023-05155-W","ee":"https://doi.org/10.1007/s11227-023-05155-w","url":"https://dblp.org/rec/journals/tjs/YeCWSTD23"}, "url":"URL#248942" }, { "@score":"1", "@id":"248943", "info":{"authors":{"author":[{"@pid":"09/5394","text":"Wei Ye"},{"@pid":"219/5922","text":"Minggang Dong"},{"@pid":"59/2227","text":"Yan Wang"},{"@pid":"62/7009","text":"Guojun Gan"},{"@pid":"346/0593","text":"Deao Liu"}]},"title":"Similar classes latent distribution modelling-based oversampling method for imbalanced image classification.","venue":"J. Supercomput.","volume":"79","number":"9","pages":"9985-10019","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/YeDWGL23","doi":"10.1007/S11227-022-05037-7","ee":"https://doi.org/10.1007/s11227-022-05037-7","url":"https://dblp.org/rec/journals/tjs/YeDWGL23"}, "url":"URL#248943" }, { "@score":"1", "@id":"248944", "info":{"authors":{"author":[{"@pid":"82/181","text":"Hengzhou Ye"},{"@pid":"357/5060","text":"Bochao Feng"},{"@pid":"73/4803","text":"Xinxiao Li"}]},"title":"A game-based approach for cloudlet resource pricing for cloudlet federation.","venue":"J. Supercomput.","volume":"79","number":"16","pages":"18627-18647","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/YeFL23","doi":"10.1007/S11227-023-05374-1","ee":"https://doi.org/10.1007/s11227-023-05374-1","url":"https://dblp.org/rec/journals/tjs/YeFL23"}, "url":"URL#248944" }, { "@score":"1", "@id":"248945", "info":{"authors":{"author":[{"@pid":"238/2676","text":"Yufan Yi"},{"@pid":"53/2130","text":"Yan Tian"},{"@pid":"65/8042","text":"Cong He"},{"@pid":"344/8609","text":"Yajing Fan"},{"@pid":"99/8064","text":"Xinli Hu"},{"@pid":"11/9482","text":"Yiping Xu"}]},"title":"DBT: multimodal emotion recognition based on dual-branch transformer.","venue":"J. Supercomput.","volume":"79","number":"8","pages":"8611-8633","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/YiTHFHX23","doi":"10.1007/S11227-022-05001-5","ee":"https://doi.org/10.1007/s11227-022-05001-5","url":"https://dblp.org/rec/journals/tjs/YiTHFHX23"}, "url":"URL#248945" }, { "@score":"1", "@id":"248946", "info":{"authors":{"author":[{"@pid":"57/11273","text":"Junqi Yin"},{"@pid":"29/10787","text":"Sajal Dash"},{"@pid":"188/2462","text":"John Gounley"},{"@pid":"89/1110","text":"Feiyi Wang"},{"@pid":"69/4501","text":"Georgia D. Tourassi"}]},"title":"Evaluation of pre-training large language models on leadership-class supercomputers.","venue":"J. Supercomput.","volume":"79","number":"18","pages":"20747-20768","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/YinDGWT23","doi":"10.1007/S11227-023-05479-7","ee":"https://doi.org/10.1007/s11227-023-05479-7","url":"https://dblp.org/rec/journals/tjs/YinDGWT23"}, "url":"URL#248946" }, { "@score":"1", "@id":"248947", "info":{"authors":{"author":[{"@pid":"264/1445","text":"Daegun Yoon"},{"@pid":"230/3437","text":"Minjoong Jeong"},{"@pid":"65/912-1","text":"Sangyoon Oh 0001"}]},"title":"WAVE: designing a heuristics-based three-way breadth-first search on GPUs.","venue":"J. Supercomput.","volume":"79","number":"6","pages":"6889-6917","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/YoonJO23","doi":"10.1007/S11227-022-04934-1","ee":"https://doi.org/10.1007/s11227-022-04934-1","url":"https://dblp.org/rec/journals/tjs/YoonJO23"}, "url":"URL#248947" }, { "@score":"1", "@id":"248948", "info":{"authors":{"author":[{"@pid":"264/1445","text":"Daegun Yoon"},{"@pid":"230/3437","text":"Minjoong Jeong"},{"@pid":"65/912-1","text":"Sangyoon Oh 0001"}]},"title":"SAGE: toward on-the-fly gradient compression ratio scaling.","venue":"J. Supercomput.","volume":"79","number":"10","pages":"11387-11409","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/YoonJO23a","doi":"10.1007/S11227-023-05120-7","ee":"https://doi.org/10.1007/s11227-023-05120-7","url":"https://dblp.org/rec/journals/tjs/YoonJO23a"}, "url":"URL#248948" }, { "@score":"1", "@id":"248949", "info":{"authors":{"author":[{"@pid":"340/2919","text":"Reem N. Yousef"},{"@pid":"244/0890","text":"Abeer Twakol Khalil"},{"@pid":"244/0957","text":"Ahmed Shaban Samrah"},{"@pid":"145/4235","text":"Mohamed Maher Ata"}]},"title":"Model-based and model-free deep features fusion for high performed human gait recognition.","venue":"J. Supercomput.","volume":"79","number":"12","pages":"12815-12852","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/YousefKSA23","doi":"10.1007/S11227-023-05156-9","ee":"https://doi.org/10.1007/s11227-023-05156-9","url":"https://dblp.org/rec/journals/tjs/YousefKSA23"}, "url":"URL#248949" }, { "@score":"1", "@id":"248950", "info":{"authors":{"author":[{"@pid":"366/4152","text":"Youssef Taki"},{"@pid":"141/2038","text":"Elmoukhtar Zemmouri"},{"@pid":"359/5404","text":"Anas Bouzid"}]},"title":"STM-GCN: a spatiotemporal multi-graph convolutional network for pedestrian trajectory prediction.","venue":"J. Supercomput.","volume":"79","number":"18","pages":"20923-20937","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/YoussefZB23","doi":"10.1007/S11227-023-05467-X","ee":"https://doi.org/10.1007/s11227-023-05467-x","url":"https://dblp.org/rec/journals/tjs/YoussefZB23"}, "url":"URL#248950" }, { "@score":"1", "@id":"248951", "info":{"authors":{"author":{"@pid":"17/7088","text":"Xue Yu"}},"title":"The appeal of green advertisements on consumers' consumption intention based on low-resource machine translation.","venue":"J. Supercomput.","volume":"79","number":"5","pages":"5086-5108","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/Yu23","doi":"10.1007/S11227-022-04846-0","ee":"https://doi.org/10.1007/s11227-022-04846-0","url":"https://dblp.org/rec/journals/tjs/Yu23"}, "url":"URL#248951" }, { "@score":"1", "@id":"248952", "info":{"authors":{"author":[{"@pid":"71/6612","text":"Cui Yu"},{"@pid":"16/722","text":"Fei Gao"},{"@pid":"316/6355","text":"Boyong Gao"},{"@pid":"30/2325","text":"Yawen Chen 0001"}]},"title":"h-Restricted H-structure connectivity and h-restricted H-substructure connectivity of hypercube.","venue":"J. Supercomput.","volume":"79","number":"8","pages":"8499-8512","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/YuGGC23","doi":"10.1007/S11227-022-04983-6","ee":"https://doi.org/10.1007/s11227-022-04983-6","url":"https://dblp.org/rec/journals/tjs/YuGGC23"}, "url":"URL#248952" }, { "@score":"1", "@id":"248953", "info":{"authors":{"author":[{"@pid":"94/6965","text":"Changyong Yu"},{"@pid":"34/7628","text":"Huimin Liu"},{"@pid":"142/9698","text":"Fazal Wahab"},{"@pid":"350/4099","text":"Zihan Ling"},{"@pid":"328/8903","text":"Tianmei Ren"},{"@pid":"38/4959","text":"Haitao Ma"},{"@pid":"73/5946","text":"Yuhai Zhao"}]},"title":"Global triangle estimation based on first edge sampling in large graph streams.","venue":"J. Supercomput.","volume":"79","number":"13","pages":"14079-14116","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/YuLWLRMZ23","doi":"10.1007/S11227-023-05205-3","ee":"https://doi.org/10.1007/s11227-023-05205-3","url":"https://dblp.org/rec/journals/tjs/YuLWLRMZ23"}, "url":"URL#248953" }, { "@score":"1", "@id":"248954", "info":{"authors":{"author":[{"@pid":"y/TingYu-2","text":"Ting Yu 0002"},{"@pid":"95/5625","text":"Dongjin Yu"},{"@pid":"121/4337","text":"Dongjing Wang"},{"@pid":"221/3798","text":"Xueyou Hu"}]},"title":"Web service recommendation for mashup creation based on graph network.","venue":"J. Supercomput.","volume":"79","number":"8","pages":"8993-9020","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/YuYWH23","doi":"10.1007/S11227-022-05011-3","ee":"https://doi.org/10.1007/s11227-022-05011-3","url":"https://dblp.org/rec/journals/tjs/YuYWH23"}, "url":"URL#248954" }, { "@score":"1", "@id":"248955", "info":{"authors":{"author":[{"@pid":"225/1550","text":"Bengong Yu"},{"@pid":"50/8194","text":"Shuwen Zhang"}]},"title":"A novel weight-oriented graph convolutional network for aspect-based sentiment analysis.","venue":"J. Supercomput.","volume":"79","number":"1","pages":"947-972","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/YuZ23","doi":"10.1007/S11227-022-04689-9","ee":"https://doi.org/10.1007/s11227-022-04689-9","url":"https://dblp.org/rec/journals/tjs/YuZ23"}, "url":"URL#248955" }, { "@score":"1", "@id":"248956", "info":{"authors":{"author":[{"@pid":"219/5168","text":"Xianrui Yu"},{"@pid":"21/7715","text":"Qiuhong Zhao"},{"@pid":"24/4675","text":"Qi Lin"},{"@pid":"283/1608","text":"Tongyu Wang"}]},"title":"A grey wolf optimizer-based chaotic gravitational search algorithm for global optimization.","venue":"J. Supercomput.","volume":"79","number":"3","pages":"2691-2739","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/YuZLW23","doi":"10.1007/S11227-022-04754-3","ee":"https://doi.org/10.1007/s11227-022-04754-3","url":"https://dblp.org/rec/journals/tjs/YuZLW23"}, "url":"URL#248956" }, { "@score":"1", "@id":"248957", "info":{"authors":{"author":[{"@pid":"336/8476","text":"Zheke Yuan"},{"@pid":"79/6059","text":"Jun Niu"},{"@pid":"353/6916","text":"Xurong Lu"},{"@pid":"357/4701","text":"Fangmeng Yang"}]},"title":"Identify spatio-temporal properties of network traffic by model checking.","venue":"J. Supercomput.","volume":"79","number":"16","pages":"18886-18909","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/YuanNLY23","doi":"10.1007/S11227-023-05388-9","ee":"https://doi.org/10.1007/s11227-023-05388-9","url":"https://dblp.org/rec/journals/tjs/YuanNLY23"}, "url":"URL#248957" }, { "@score":"1", "@id":"248958", "info":{"title":"Retraction Note: Research on data aggregation and transmission planning with Internet of Things technology in WSN multi-channel aware network.","venue":"J. Supercomput.","volume":"79","number":"12","pages":"13908","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/YueJYW23","doi":"10.1007/S11227-023-05353-6","ee":"https://doi.org/10.1007/s11227-023-05353-6","url":"https://dblp.org/rec/journals/tjs/YueJYW23"}, "url":"URL#248958" }, { "@score":"1", "@id":"248959", "info":{"authors":{"author":[{"@pid":"288/2982","text":"Mahe Zabin"},{"@pid":"60/1227","text":"Ho-Jin Choi"},{"@pid":"189/9859","text":"Jia Uddin"}]},"title":"Hybrid deep transfer learning architecture for industrial fault diagnosis using Hilbert transform and DCNN-LSTM.","venue":"J. Supercomput.","volume":"79","number":"5","pages":"5181-5200","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/ZabinCU23","doi":"10.1007/S11227-022-04830-8","ee":"https://doi.org/10.1007/s11227-022-04830-8","url":"https://dblp.org/rec/journals/tjs/ZabinCU23"}, "url":"URL#248959" }, { "@score":"1", "@id":"248960", "info":{"authors":{"author":[{"@pid":"320/4318","text":"Mahmoud Zadehbagheri"},{"@pid":"350/4016","text":"Ali Reza Abbasi"}]},"title":"Energy cost optimization in distribution network considering hybrid electric vehicle and photovoltaic using modified whale optimization algorithm.","venue":"J. Supercomput.","volume":"79","number":"13","pages":"14427-14456","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ZadehbagheriA23","doi":"10.1007/S11227-023-05214-2","ee":"https://doi.org/10.1007/s11227-023-05214-2","url":"https://dblp.org/rec/journals/tjs/ZadehbagheriA23"}, "url":"URL#248960" }, { "@score":"1", "@id":"248961", "info":{"authors":{"author":[{"@pid":"210/3250","text":"Ionel Zagan"},{"@pid":"117/2395","text":"Vasile Gheorghita Gaitan"}]},"title":"FPGA implementation of hardware accelerated RTOS based on real-time event handling.","venue":"J. Supercomput.","volume":"79","number":"11","pages":"12441-12471","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ZaganG23","doi":"10.1007/S11227-023-05151-0","ee":"https://doi.org/10.1007/s11227-023-05151-0","url":"https://dblp.org/rec/journals/tjs/ZaganG23"}, "url":"URL#248961" }, { "@score":"1", "@id":"248962", "info":{"authors":{"author":[{"@pid":"210/3250","text":"Ionel Zagan"},{"@pid":"117/2395","text":"Vasile Gheorghita Gaitan"}]},"title":"Correction to: FPGA implementation of hardware accelerated RTOS based on real-time event handling.","venue":"J. Supercomput.","volume":"79","number":"13","pages":"15213","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ZaganG23a","doi":"10.1007/S11227-023-05229-9","ee":"https://doi.org/10.1007/s11227-023-05229-9","url":"https://dblp.org/rec/journals/tjs/ZaganG23a"}, "url":"URL#248962" }, { "@score":"1", "@id":"248963", "info":{"authors":{"author":[{"@pid":"343/1937","text":"Mansoureh Zare"},{"@pid":"210/8743","text":"Yasser Elmi Sola"},{"@pid":"238/8856","text":"Hesam Hasanpour"}]},"title":"An autonomous planning model for solving IoT service placement problem using the imperialist competitive algorithm.","venue":"J. Supercomput.","volume":"79","number":"11","pages":"12671-12690","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ZareSH23","doi":"10.1007/S11227-023-05172-9","ee":"https://doi.org/10.1007/s11227-023-05172-9","url":"https://dblp.org/rec/journals/tjs/ZareSH23"}, "url":"URL#248963" }, { "@score":"1", "@id":"248964", "info":{"authors":{"author":[{"@pid":"09/2922","text":"Liang Zeng"},{"@pid":"64/377","text":"Yanyan Li"},{"@pid":"55/2270","text":"Hao Zhang"},{"@pid":"181/2821","text":"Ming Li"},{"@pid":"62/3650","text":"Shanshan Wang"}]},"title":"A mixed Harris hawks optimization algorithm based on the pinhole imaging strategy for solving numerical optimization problems.","venue":"J. Supercomput.","volume":"79","number":"14","pages":"15270-15323","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ZengLZLW23","doi":"10.1007/S11227-023-05260-W","ee":"https://doi.org/10.1007/s11227-023-05260-w","url":"https://dblp.org/rec/journals/tjs/ZengLZLW23"}, "url":"URL#248964" }, { "@score":"1", "@id":"248965", "info":{"authors":{"author":[{"@pid":"62/10176","text":"Rui Zhai"},{"@pid":"78/33","text":"Libo Zhang"},{"@pid":"68/11104","text":"Yingqi Wang"},{"@pid":"115/7105","text":"Yalin Song"},{"@pid":"26/3195","text":"Junyang Yu"}]},"title":"A multi-channel attention graph convolutional neural network for node classification.","venue":"J. Supercomput.","volume":"79","number":"4","pages":"3561-3579","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ZhaiZWSY23","doi":"10.1007/S11227-022-04778-9","ee":"https://doi.org/10.1007/s11227-022-04778-9","url":"https://dblp.org/rec/journals/tjs/ZhaiZWSY23"}, "url":"URL#248965" }, { "@score":"1", "@id":"248966", "info":{"authors":{"author":[{"@pid":"40/4731","text":"Jianhui Zhang"},{"@pid":"57/7768","text":"Xuezhen Cheng"},{"@pid":"80/2652","text":"Meng Zhao"},{"@pid":"95/7801","text":"Jiming Li"}]},"title":"ISSWOA: hybrid algorithm for function optimization and engineering problems.","venue":"J. Supercomput.","volume":"79","number":"8","pages":"8789-8842","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ZhangCZL23","doi":"10.1007/S11227-022-04996-1","ee":"https://doi.org/10.1007/s11227-022-04996-1","url":"https://dblp.org/rec/journals/tjs/ZhangCZL23"}, "url":"URL#248966" }, { "@score":"1", "@id":"248967", "info":{"authors":{"author":[{"@pid":"07/314","text":"Jian Zhang"},{"@pid":"75/300","text":"Liang Deng"},{"@pid":"276/5206","text":"Ruitian Li"},{"@pid":"181/2821","text":"Ming Li"},{"@pid":"03/2134","text":"Jie Liu"},{"@pid":"175/8796","text":"Zhe Dai"}]},"title":"Achieving high performance and portable parallel GMRES algorithm for compressible flow simulations on unstructured grids.","venue":"J. Supercomput.","volume":"79","number":"17","pages":"20116-20140","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ZhangDLLLD23","doi":"10.1007/S11227-023-05430-W","ee":"https://doi.org/10.1007/s11227-023-05430-w","url":"https://dblp.org/rec/journals/tjs/ZhangDLLLD23"}, "url":"URL#248967" }, { "@score":"1", "@id":"248968", "info":{"authors":{"author":[{"@pid":"91/2989-4","text":"Xiaohong Zhang 0004"},{"@pid":"350/4520","text":"Wenqi Du"},{"@pid":"129/7318","text":"Ata Jahangir Moshayedi"}]},"title":"A traceable and revocable multi-authority attribute-based access control scheme for mineral industry data secure storage in blockchain.","venue":"J. Supercomput.","volume":"79","number":"13","pages":"14743-14779","year":"2023","type":"Journal Articles","access":"open","key":"journals/tjs/ZhangDM23","doi":"10.1007/S11227-023-05222-2","ee":"https://doi.org/10.1007/s11227-023-05222-2","url":"https://dblp.org/rec/journals/tjs/ZhangDM23"}, "url":"URL#248968" }, { "@score":"1", "@id":"248969", "info":{"authors":{"author":[{"@pid":"90/46","text":"Ziyu Zhang"},{"@pid":"40/4305","text":"Yuelin Gao"},{"@pid":"338/7022","text":"Eryang Guo"}]},"title":"A supercomputing method for large-scale optimization: a feedback biogeography-based optimization with steepest descent method.","venue":"J. Supercomput.","volume":"79","number":"2","pages":"1318-1373","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ZhangGG23","doi":"10.1007/S11227-022-04644-8","ee":"https://doi.org/10.1007/s11227-022-04644-8","url":"https://dblp.org/rec/journals/tjs/ZhangGG23"}, "url":"URL#248969" }, { "@score":"1", "@id":"248970", "info":{"authors":{"author":[{"@pid":"31/966-3","text":"Wenbo Zhang 0003"},{"@pid":"344/8976","text":"Xiaotong Huo"},{"@pid":"178/6427","text":"Zhenshan Bao"}]},"title":"A secure and efficient multi-domain data sharing model on consortium chain.","venue":"J. Supercomput.","volume":"79","number":"8","pages":"8538-8582","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ZhangHB23","doi":"10.1007/S11227-022-05010-4","ee":"https://doi.org/10.1007/s11227-022-05010-4","url":"https://dblp.org/rec/journals/tjs/ZhangHB23"}, "url":"URL#248970" }, { "@score":"1", "@id":"248971", "info":{"authors":{"author":[{"@pid":"05/3499-40","text":"Jing Zhang 0040"},{"@pid":"270/3041","text":"Qihan Huang"},{"@pid":"339/5079","text":"Jian-Yu Hu"},{"@pid":"99/10593","text":"Xiucai Ye"}]},"title":"Dimension-aware under spatiotemporal constraints: an efficient privacy-preserving framework with peak density clustering.","venue":"J. Supercomput.","volume":"79","number":"4","pages":"4164-4191","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ZhangHHY23","doi":"10.1007/S11227-022-04826-4","ee":"https://doi.org/10.1007/s11227-022-04826-4","url":"https://dblp.org/rec/journals/tjs/ZhangHHY23"}, "url":"URL#248971" }, { "@score":"1", "@id":"248972", "info":{"authors":{"author":[{"@pid":"06/5910","text":"Yonghua Zhang"},{"@pid":"85/8167","text":"Hongxu Jiang"},{"@pid":"165/0437","text":"Yuting Zhu"},{"@pid":"249/7886","text":"Runhua Zhang"},{"@pid":"331/7320","text":"Yongxiang Cao"},{"@pid":"226/6108","text":"Chenhui Zhu"},{"@pid":"35/7092","text":"Wei Wang"},{"@pid":"46/4155","text":"Dong Dong"},{"@pid":"91/1888","text":"Xiaobin Li"}]},"title":"LOCP: Latency-optimized channel pruning for CNN inference acceleration on GPUs.","venue":"J. Supercomput.","volume":"79","number":"13","pages":"14313-14341","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ZhangJZZCZWDL23","doi":"10.1007/S11227-023-05212-4","ee":"https://doi.org/10.1007/s11227-023-05212-4","url":"https://dblp.org/rec/journals/tjs/ZhangJZZCZWDL23"}, "url":"URL#248972" }, { "@score":"1", "@id":"248973", "info":{"authors":{"author":[{"@pid":"05/3499","text":"Jing Zhang"},{"@pid":"26/6153","text":"Chuanwen Li"}]},"title":"A practical privacy-preserving nearest neighbor searching method over encrypted spatial data.","venue":"J. Supercomput.","volume":"79","number":"13","pages":"14146-14171","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ZhangL23","doi":"10.1007/S11227-023-05170-X","ee":"https://doi.org/10.1007/s11227-023-05170-x","url":"https://dblp.org/rec/journals/tjs/ZhangL23"}, "url":"URL#248973" }, { "@score":"1", "@id":"248974", "info":{"authors":{"author":[{"@pid":"87/1222","text":"Xi Zhang"},{"@pid":"338/5842","text":"Yongxiong Liu"},{"@pid":"19/1766-3","text":"Ting Chen 0003"},{"@pid":"08/17-1","text":"Tao Gao 0001"}]},"title":"Noise-insensitive image representation via multiple extended LDB and class supervised intelligent coordination feature selection.","venue":"J. Supercomput.","volume":"79","number":"3","pages":"3227-3256","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ZhangLCG23","doi":"10.1007/S11227-022-04658-2","ee":"https://doi.org/10.1007/s11227-022-04658-2","url":"https://dblp.org/rec/journals/tjs/ZhangLCG23"}, "url":"URL#248974" }, { "@score":"1", "@id":"248975", "info":{"authors":{"author":[{"@pid":"52/323","text":"Qi Zhang"},{"@pid":"97/4626","text":"Yi Liu"},{"@pid":"43/656","text":"Tao Liu"},{"@pid":"08/4002","text":"Depei Qian"}]},"title":"CoFB: latency-constrained co-scheduling of flows and batches for deep learning inference service on the CPU-GPU system.","venue":"J. Supercomput.","volume":"79","number":"13","pages":"14172-14199","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ZhangLLQ23","doi":"10.1007/S11227-023-05183-6","ee":"https://doi.org/10.1007/s11227-023-05183-6","url":"https://dblp.org/rec/journals/tjs/ZhangLLQ23"}, "url":"URL#248975" }, { "@score":"1", "@id":"248976", "info":{"authors":{"author":[{"@pid":"12/7968","text":"Maoyuan Zhang"},{"@pid":"20/4646","text":"Lisha Liu"},{"@pid":"248/1176","text":"Jiaxin Mi"},{"@pid":"341/7163","text":"Xianqi Yuan"}]},"title":"Enhanced dual-level dependency parsing for aspect-based sentiment analysis.","venue":"J. Supercomput.","volume":"79","number":"6","pages":"6290-6308","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ZhangLMY23","doi":"10.1007/S11227-022-04898-2","ee":"https://doi.org/10.1007/s11227-022-04898-2","url":"https://dblp.org/rec/journals/tjs/ZhangLMY23"}, "url":"URL#248976" }, { "@score":"1", "@id":"248977", "info":{"authors":{"author":[{"@pid":"12/7968","text":"Maoyuan Zhang"},{"@pid":"40/1491","text":"Xiang Li"},{"@pid":"214/9957","text":"Fei Wu"}]},"title":"Moka-ADA: adversarial domain adaptation with model-oriented knowledge adaptation for cross-domain sentiment analysis.","venue":"J. Supercomput.","volume":"79","number":"12","pages":"13724-13743","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ZhangLW23","doi":"10.1007/S11227-023-05191-6","ee":"https://doi.org/10.1007/s11227-023-05191-6","url":"https://dblp.org/rec/journals/tjs/ZhangLW23"}, "url":"URL#248977" }, { "@score":"1", "@id":"248978", "info":{"authors":{"author":[{"@pid":"86/1274","text":"Yongliang Zhang"},{"@pid":"16/6317-15","text":"Yang Lu 0015"},{"@pid":"315/9846","text":"Wuqiang Zhu"},{"@pid":"14/4301","text":"Xing Wei"},{"@pid":"78/7437","text":"Zhen Wei"}]},"title":"Traffic sign detection based on multi-scale feature extraction and cascade feature fusion.","venue":"J. Supercomput.","volume":"79","number":"2","pages":"2137-2152","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ZhangLZWW23","doi":"10.1007/S11227-022-04670-6","ee":"https://doi.org/10.1007/s11227-022-04670-6","url":"https://dblp.org/rec/journals/tjs/ZhangLZWW23"}, "url":"URL#248978" }, { "@score":"1", "@id":"248979", "info":{"authors":{"author":[{"@pid":"91/195","text":"Chi Zhang"},{"@pid":"180/0989","text":"Shiqiang Nie"},{"@pid":"63/6030","text":"Jinyu Wang"},{"@pid":"80/1141-7","text":"Song Liu 0007"},{"@pid":"78/1632","text":"Weiguo Wu"}]},"title":"MCB: a multidevice cooperative buffer management strategy for boosting the write performance of the SSD-SMR hybrid storage.","venue":"J. Supercomput.","volume":"79","number":"12","pages":"13462-13489","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ZhangNWLW23","doi":"10.1007/S11227-023-05201-7","ee":"https://doi.org/10.1007/s11227-023-05201-7","url":"https://dblp.org/rec/journals/tjs/ZhangNWLW23"}, "url":"URL#248979" }, { "@score":"1", "@id":"248980", "info":{"authors":{"author":[{"@pid":"159/6204","text":"Mengxing Zhang"},{"@pid":"82/3116","text":"Lin Qi"},{"@pid":"196/9328","text":"Yulong Guo"}]},"title":"Construction of feature analysis model for demeanor evidence investigation based on data mining algorithm.","venue":"J. Supercomput.","volume":"79","number":"16","pages":"18605-18626","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ZhangQG23","doi":"10.1007/S11227-023-05370-5","ee":"https://doi.org/10.1007/s11227-023-05370-5","url":"https://dblp.org/rec/journals/tjs/ZhangQG23"}, "url":"URL#248980" }, { "@score":"1", "@id":"248981", "info":{"authors":{"author":[{"@pid":"226/6287","text":"Yaofang Zhang"},{"@pid":"133/7314","text":"Zibo Wang"},{"@pid":"182/0607","text":"Yingzhou Wang"},{"@pid":"153/9817","text":"Kuan Lin"},{"@pid":"32/4638","text":"Tongtong Li"},{"@pid":"216/6127","text":"Hongri Liu"},{"@pid":"66/190","text":"Chao Li"},{"@pid":"31/7938","text":"Bailing Wang"}]},"title":"A risk assessment model for similar attack scenarios in industrial control system.","venue":"J. Supercomput.","volume":"79","number":"14","pages":"15955-15979","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ZhangWWLLLLW23","doi":"10.1007/S11227-023-05269-1","ee":"https://doi.org/10.1007/s11227-023-05269-1","url":"https://dblp.org/rec/journals/tjs/ZhangWWLLLLW23"}, "url":"URL#248981" }, { "@score":"1", "@id":"248982", "info":{"authors":{"author":[{"@pid":"55/2270","text":"Hao Zhang"},{"@pid":"359/5246","text":"Zude Xiao"},{"@pid":"60/955","text":"Jason Gu"},{"@pid":"13/3438","text":"Yanhua Liu"}]},"title":"A network anomaly detection algorithm based on semi-supervised learning and adaptive multiclass balancing.","venue":"J. Supercomput.","volume":"79","number":"18","pages":"20445-20480","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ZhangXGL23","doi":"10.1007/S11227-023-05474-Y","ee":"https://doi.org/10.1007/s11227-023-05474-y","url":"https://dblp.org/rec/journals/tjs/ZhangXGL23"}, "url":"URL#248982" }, { "@score":"1", "@id":"248983", "info":{"authors":{"author":[{"@pid":"97/3709","text":"Qiuyu Zhang"},{"@pid":"26/7695","text":"Zhenyu Zhao"}]},"title":"Distributed storage scheme for encryption speech data based on blockchain and IPFS.","venue":"J. Supercomput.","volume":"79","number":"1","pages":"897-923","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ZhangZ23","doi":"10.1007/S11227-022-04702-1","ee":"https://doi.org/10.1007/s11227-022-04702-1","url":"https://dblp.org/rec/journals/tjs/ZhangZ23"}, "url":"URL#248983" }, { "@score":"1", "@id":"248984", "info":{"authors":{"author":[{"@pid":"75/8471","text":"Junbo Zhang"},{"@pid":"82/6384","text":"Cheng Zhang"}]},"title":"Teaching quality monitoring and evaluation of physical education teaching in ordinary college based on edge computing optimization model.","venue":"J. Supercomput.","volume":"79","number":"15","pages":"16559-16579","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ZhangZ23a","doi":"10.1007/S11227-023-05324-X","ee":"https://doi.org/10.1007/s11227-023-05324-x","url":"https://dblp.org/rec/journals/tjs/ZhangZ23a"}, "url":"URL#248984" }, { "@score":"1", "@id":"248985", "info":{"authors":{"author":[{"@pid":"49/9312","text":"Jinzhong Zhang"},{"@pid":"37/4096","text":"Gang Zhang"},{"@pid":"30/4649","text":"Min Kong"},{"@pid":"44/28","text":"Tan Zhang"}]},"title":"Adaptive infinite impulse response system identification using an enhanced golden jackal optimization.","venue":"J. Supercomput.","volume":"79","number":"10","pages":"10823-10848","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ZhangZKZ23","doi":"10.1007/S11227-023-05086-6","ee":"https://doi.org/10.1007/s11227-023-05086-6","url":"https://dblp.org/rec/journals/tjs/ZhangZKZ23"}, "url":"URL#248985" }, { "@score":"1", "@id":"248986", "info":{"authors":{"author":[{"@pid":"91/1087","text":"Yanjun Zhao"},{"@pid":"b/SaeidBelkasim","text":"Saeid Belkasim"},{"@pid":"339/3908","text":"Guillaume Aubry"}]},"title":"Image compression and denoising using multiresolution region-based image description scheme.","venue":"J. Supercomput.","volume":"79","number":"4","pages":"4243-4265","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ZhaoBA23","doi":"10.1007/S11227-022-04806-8","ee":"https://doi.org/10.1007/s11227-022-04806-8","url":"https://dblp.org/rec/journals/tjs/ZhaoBA23"}, "url":"URL#248986" }, { "@score":"1", "@id":"248987", "info":{"authors":{"author":[{"@pid":"08/3737","text":"Hao Zhao"},{"@pid":"346/0558","text":"Jingwei Geng"},{"@pid":"19/2104","text":"Shunfu Jin"}]},"title":"Performance research on a task offloading strategy in a two-tier edge structure-based MEC system.","venue":"J. Supercomput.","volume":"79","number":"9","pages":"10139-10177","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ZhaoGJ23","doi":"10.1007/S11227-023-05059-9","ee":"https://doi.org/10.1007/s11227-023-05059-9","url":"https://dblp.org/rec/journals/tjs/ZhaoGJ23"}, "url":"URL#248987" }, { "@score":"1", "@id":"248988", "info":{"authors":{"author":[{"@pid":"126/2196","text":"Jianzhe Zhao"},{"@pid":"88/1185-2","text":"Chenxi Huang 0002"},{"@pid":"233/1510","text":"Wenji Wang"},{"@pid":"358/1930","text":"Rulin Xie"},{"@pid":"358/1729","text":"Rongrong Dong"},{"@pid":"m/StanMatwin","text":"Stan Matwin"}]},"title":"Local differentially private federated learning with homomorphic encryption.","venue":"J. Supercomput.","volume":"79","number":"17","pages":"19365-19395","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ZhaoHWXDM23","doi":"10.1007/S11227-023-05378-X","ee":"https://doi.org/10.1007/s11227-023-05378-x","url":"https://dblp.org/rec/journals/tjs/ZhaoHWXDM23"}, "url":"URL#248988" }, { "@score":"1", "@id":"248989", "info":{"authors":{"author":[{"@pid":"224/0454","text":"Yanpu Zhao"},{"@pid":"219/8769","text":"Changsheng Huang"},{"@pid":"285/2380-14","text":"Mengjie Zhang 0014"},{"@pid":"54/1105","text":"Cheng Lv"}]},"title":"COLMA: a chaos-based mayfly algorithm with opposition-based learning and Levy flight for numerical optimization and engineering design.","venue":"J. Supercomput.","volume":"79","number":"17","pages":"19699-19745","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ZhaoHZL23","doi":"10.1007/S11227-023-05400-2","ee":"https://doi.org/10.1007/s11227-023-05400-2","url":"https://dblp.org/rec/journals/tjs/ZhaoHZL23"}, "url":"URL#248989" }, { "@score":"1", "@id":"248990", "info":{"authors":{"author":[{"@pid":"210/0477","text":"Pengjun Zhao"},{"@pid":"52/4629","text":"Sanyang Liu"}]},"title":"An improved symbiotic organisms search algorithm with good point set and memory mechanism.","venue":"J. Supercomput.","volume":"79","number":"10","pages":"11170-11197","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ZhaoL23","doi":"10.1007/S11227-023-05083-9","ee":"https://doi.org/10.1007/s11227-023-05083-9","url":"https://dblp.org/rec/journals/tjs/ZhaoL23"}, "url":"URL#248990" }, { "@score":"1", "@id":"248991", "info":{"authors":{"author":[{"@pid":"254/0579","text":"Kaiyi Zhao"},{"@pid":"53/2189","text":"Li Li"},{"@pid":"253/0876","text":"Zeqiu Chen"},{"@pid":"169/9913","text":"Jiayao Li"},{"@pid":"68/1229","text":"Ruizhi Sun"},{"@pid":"135/9301","text":"Gang Yuan"}]},"title":"An efficient parallelization method of Dempster-Shafer evidence theory based on CUDA.","venue":"J. Supercomput.","volume":"79","number":"4","pages":"4582-4601","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ZhaoLCLSY23","doi":"10.1007/S11227-022-04810-Y","ee":"https://doi.org/10.1007/s11227-022-04810-y","url":"https://dblp.org/rec/journals/tjs/ZhaoLCLSY23"}, "url":"URL#248991" }, { "@score":"1", "@id":"248992", "info":{"authors":{"author":[{"@pid":"47/5689","text":"Lingxiao Zhao"},{"@pid":"254/7385","text":"Zhiyang Li"},{"@pid":"08/6794","text":"Yue Ma"},{"@pid":"49/7774","text":"Leilei Qu"}]},"title":"A novel cryptocurrency price time series hybrid prediction model via machine learning with MATLAB/Simulink.","venue":"J. Supercomput.","volume":"79","number":"14","pages":"15358-15389","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ZhaoLMQ23","doi":"10.1007/S11227-023-05242-Y","ee":"https://doi.org/10.1007/s11227-023-05242-y","url":"https://dblp.org/rec/journals/tjs/ZhaoLMQ23"}, "url":"URL#248992" }, { "@score":"1", "@id":"248993", "info":{"authors":{"author":[{"@pid":"210/0047","text":"Weikang Zhao"},{"@pid":"337/0293","text":"KinTak U"},{"@pid":"337/0062","text":"Huibin Luo"}]},"title":"An image super-resolution method based on polynomial exponential function and non-uniform rectangular partition.","venue":"J. Supercomput.","volume":"79","number":"1","pages":"677-701","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tjs/ZhaoUL23","doi":"10.1007/S11227-022-04691-1","ee":"https://doi.org/10.1007/s11227-022-04691-1","url":"https://dblp.org/rec/journals/tjs/ZhaoUL23"}, "url":"URL#248993" } ] } } } )