


default search action
SmartCloud 2020: Washington, DC, USA
- IEEE International Conference on Smart Cloud, SmartCloud 2020, Washington, DC, USA, November 6-8, 2020. IEEE 2020, ISBN 978-1-7281-6547-9

- Jiahao Sun, Chengrong Wu, Jiawei Ye:

Blockchain-based Automated Container Cloud Security Enhancement System. 1-6 - Awatef Salem Balobaid

, Debatosh Debnath:
An Effective Approach to Cloud Migration for Small and Medium Enterprises (SMEs). 7-12 - PeiYun Zhang, Xuelei Wang, Chenxi Li, Licui Wang, Jiemin Xie:

A Dynamic Pricing Model for Virtual Machines in Cloud Environments. 13-18 - Bin Liu

, Tianke Fang
, Ying-ying Fu:
Research on Optimization of Block chain Security Testing. 19-22 - Fritjof Steinert

, Philipp Kreowsky, Eric L. Wisotzky
, Christian Unger, Benno Stabernack:
A Hardware/Software Framework for the Integration of FPGA-based Accelerators into Cloud Computing Infrastructures. 23-28 - K. M. S. U. Bandaranayake, K. P. N. Jayasena

, Banage T. G. S. Kumara:
An Efficient Task Scheduling Algorithm using Total Resource Execution Time Aware Algorithm in Cloud Computing. 29-34 - Sophoan Sok, Christian Plewnia, Sansiri Tanachutiwat, Horst Lichter:

Optimization of Compute Costs in Hybrid Clouds with Full Rescheduling. 35-40 - Nirmal Kumawat, Nikhil Handa, Avinash Kharbanda:

Cloud Computing Resources Utilization and Cost Optimization for Processing Cloud Assets. 41-48 - Tarek Menouer

, Amina Khedimi, Christophe Cérin:
Smart Network Slices Scheduling in Cloud. 49-54 - Mohamed Mounir Moussa, Lubna K. Alazzawi:

Cyber Attacks Detection based on Deep Learning for Cloud-Dew Computing in Automotive IoT Applications. 55-61 - Peter Cocoros, Matthew Sobocinski, Kyle Steiger, Joel Coffman

:
Evaluating Techniques for Practical Cloud-based Network Intrusion Detection. 62-67 - Art Sedighi, Sujit D'Mello, Gil Isaacs, Doug Jacobson

:
BitemporalDB: A Bitemporal Database in the Cloud for Financial Services Data. 68-73 - Peng Yuan, Lei Jiang, Jianxun Liu, Dong Zhou, Pei Li, Yang Gao:

Dual-Level Attention Based on Heterogeneous Graph Convolution Network for Aspect-Based Sentiment Classification. 74-77 - Jing Wu, Wei Hu, Yonghao Wang

, Yuan Wen:
A Multi-Input CNNs with Attention for Skin Lesion Classification. 78-83 - Fu Chen, Huoyu Jia, Kun Liu, Wenying Tang, Jianming Zhu, Weiyu Guo:

A New Attack Method for Malicious Nodes in Tangle Network. 84-87 - Tao Zhou, Yongxin Zhu, Naifeng Jing, Tianhao Nan, Wanyi Li, Bo Peng:

Reliable SoC Design and Implementation of SHA-3-HMAC Algorithm with Attack Protection. 88-93 - Mingqi Li, Xiaoyang Fu, Chenchen Meng:

The Risk Prediction of Prostate Cancer Based on A Improved Hybrid Algorithm. 94-99 - Geng Zhang, Xinjie Gong, Yanan Wang, Yang Wang, Hao Jiang

:
Multilevel partition algorithm based on weighted label propagation. 100-105 - Weidong Xiao, Nianbin Wan, Alan Hong, Xiaoyan Chen:

A Fast JPEG Image Compression Algorithm Based on DCT. 106-110 - Xiaolei Chang, Shu Yang, Yong Jiang, Xiaonan Xie, Xiaolin Tang:

Research on Key Energy-Saving Technologies in Green Data Centers. 111-115 - Jiajia Duan, Hui Zhao, Qian Zhou, Meikang Qiu, Meiqin Liu:

A Study of Pre-trained Language Models in Natural Language Processing. 116-121 - Geng Zhang, Wang Donghui, Wei Liu, Wang Song:

An Outdoor Installation Protection Plan Based On Ring Network And Reliability Research. 122-127 - Fu Chen, Yujia Huo, Jianming Zhu, Dan Fan:

A Review on the Study on MQTT Security Challenge. 128-133 - Xiaoyu Sun, Huakang Li, Guozi Sun, Ming Zhu:

Fine-grained emoji sentiment analysis based on attributes of Twitter users. 134-139 - Jason McZara, Subash Kafle, Daniel Shin:

Modeling and Analysis of Dependencies between Microservices in DevSecOps. 140-147 - Jeremy Straub:

Modeling Attack, Defense and Threat Trees and the Cyber Kill Chain, ATT&CK and STRIDE Frameworks as Blackboard Architecture Networks. 148-153 - Hua Feng, Wei Hu, Jing Wu:

Bring Your Own Device (BYOD) Based Flipped Classroom in Primary School. 154-158 - Han Deng, Yulian Gao, Xuhui Chen, Yazhen Zhang, Qiaohong Wu, Hui Zhao:

Harmonic Analysis of Power Grid Based on FFT Algorithm. 161-164 - Seungmin Oh, Kyeonglok Kim, Euiseong Seo:

A Dynamic Scaling Scheme of Cloud-based DNN Training Clusters. 165-168 - Chiapin Wang, Yu-Chia Liu, Han-Chi Gao, Tsung-Yi Fan Chiang:

Reinforcement-Learning Based Radio Resources Allocation in Licensed Assisted Access. 169-174 - Qinglin Yang

, Peng Li:
Deep Reinforcement Learning based Energy Scheduling for Edge Computing. 175-180 - Kaiyi Zhang, Nancy Samaan:

Optimized Look-Ahead Offloading Decisions Using Deep Reinforcement Learning for Battery Constrained Mobile IoT Devices. 181-186 - Wei Liu, Jian Su, Lvying Qin, Yu Huang, Xu Huai, Qi Liu, Limei Zhou, Yuwei Shang, Xueyang Liu:

A framework of distribution transformer health early warning system based on EDC-GRU network. 187-192 - Guidong Wu, Hang Li, Xiaoqi Liao, Yuemeng Li, Yu Huang, Xiang Chen, Qi Liu, Xueyang Liu:

An Automatic and Rapid Knowledge Graph Construction Method of SG-CIM Model. 193-198 - Xiaohe Wu, Jianbo Xu, Weihong Huang, Wei Jian:

A new mutual authentication and key agreement protocol in wireless body area network. 199-203 - Zhechong Wang, Jianbo Xu, Jian Ke, Songyou Xie:

A Collaborative Filtering Method for Web Data Service in Cloud Environment. 204-208

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














