Stop the war!
Остановите войну!
for scientists:
default search action
Cluster Computing, Volume 27
Volume 27, Number 2, April 2024
- Nitin Singha, Mahesh K. Singh:
Maximizing utility by optimal capacity division in P2P networks. 1159-1168 - Limin Xia, Xiaoyue Ding:
Human-object interaction recognition based on interactivity detection and multi-feature fusion. 1169-1183 - Saeid Alirezazadeh, Luís A. Alexandre:
Ordered balancing: load balancing for redundant task scheduling in robotic network cloud systems. 1185-1200 - Kemal Akyol:
A comprehensive comparison study of traditional classifiers and deep neural networks for forest fire detection. 1201-1215 - Carlos Fernandez-Basso, M. Dolores Ruiz, María J. Martín-Bautista:
New Spark solutions for distributed frequent itemset and association rule mining algorithms. 1217-1234 - Ming Mao, Peng Yi, Lilong Hou, Wei Zhao:
A controller-based roadside unit plane architecture for software-defined internet of vehicles. 1235-1249 - Shahab Safaee, Meghdad Mirabi, Amir Masoud Rahmani, Ali Asghar Safaei:
A distributed B+Tree indexing method for processing range queries over streaming data. 1251-1274 - Maddila Suresh Kumar, Vadlamani Nagalakshmi:
Secure transfer of robust healthcare data using blockchain-based privacy. 1275-1291 - Raseena M. Haris, Khaled M. Khan, Armstrong Nhlabatsi, Mahmoud Barhamgi:
A machine learning-based optimization approach for pre-copy live virtual machine migration. 1293-1312 - Kimia Abedpour, Mirsaeid Hosseini Shirvani, Elmira Abedpour:
A genetic-based clustering algorithm for efficient resource allocating of IoT applications in layered fog heterogeneous platforms. 1313-1331 - Anisha Kumari, Bibhudatta Sahoo:
ACPM: adaptive container provisioning model to mitigate serverless cold-start. 1333-1360 - Gautam Srivastava, Jerry Chun-Wei Lin, Guo Lin:
Secure itemset hiding in smart city sensor data. 1361-1374 - Rongxin Chen, Guorong Cai, Jie Chen, Yuling Hong:
Integrated method for distributed processing of large XML data. 1375-1399 - Ming Li, Dechang Pi, Shuo Qin:
Knowledge-based multi-objective estimation of distribution algorithm for solving reliability constrained cloud workflow scheduling. 1401-1419 - R. Ghafari, Najme Mansouri:
Improved Harris Hawks Optimizer with chaotic maps and opposition-based learning for task scheduling in cloud environment. 1421-1469 - Praveen Shukla, C. Rama Krishna, Nilesh Vishwasrao Patil:
EIoT-DDoS: embedded classification approach for IoT traffic-based DDoS attacks. 1471-1490 - Haythem Bany Salameh, Mohammad Qasem Samara, Ghaleb A. Elrefae, Ahmad F. Al-Ajlouni:
Profit-maximization spectrum sharing in opportunistic duopoly market under dynamic spectrum pricing and QoS constraints. 1491-1502 - Seyedeh Shabnam Jazaeri, Sam Jabbehdari, Parvaneh Asghari, Hamid Haj Seyyed Javadi:
An efficient edge caching approach for SDN-based IoT environments utilizing the moth flame clustering algorithm. 1503-1525 - Jianing Zhao, Yubiao Pan, Huizhen Zhang, Mingwei Lin, Xin Luo, Zeshui Xu:
InPlaceKV: in-place update scheme for SSD-based KV storage systems under update-intensive Worklaods. 1527-1540 - Liyun Zuo, Jieguang He, Yonghui Xu, Lei Zhang:
CSADE: a delay-sensitive scheduling method based on task admission and delay evaluation on edge-cloud collaboration. 1541-1558 - Shivangi Shukla, Sankita J. Patel:
A design of provably secure multi-factor ECC-based authentication protocol in multi-server cloud architecture. 1559-1580 - Shun Wang, Guosun Zeng:
Two-stage scheduling for a fluctuant big data stream on heterogeneous servers with multicores in a data center. 1581-1597 - Komal Pursharthi, Dheerendra Mishra:
A computationally efficient and randomized RLWE-based key exchange scheme. 1599-1610 - Guangyi Zhao, Simin Kou, Xuesong Yin, Guodao Zhang, Yigang Wang:
Self-supervised deep subspace clustering with entropy-norm. 1611-1623 - Ramesh Vatambeti, E. S. Phalguna Krishna, M. Ganesh Karthik, Vijay Kumar Damera:
Securing the medical data using enhanced privacy preserving based blockchain technology in Internet of Things. 1625-1637 - Yarasu Madhavi Latha, B. Srinivasa Rao:
Product recommendation using enhanced convolutional neural network for e-commerce platform. 1639-1653 - Shorouq Al-Eidi, Omar Darwish, Yuanzhu Chen, Majdi Maabreh, Yahya M. Tashtoush:
A deep learning approach for detecting covert timing channel attacks using sequential data. 1655-1665 - Hongjian Li, Jiaxin Liu, Lankai Yang, Liangjie Liu, Hu Sun:
An improved arithmetic optimization algorithm for task offloading in mobile edge computing. 1667-1682 - Mohammadreza Ipchi Sheshgelani, Saeid Pashazadeh, Pedram Salehpoor:
Framework for wrapping binary swarm optimizers to the hybrid parallel cooperative coevolving version. 1683-1697 - Nairita Sarkar, Pankaj Kumar Keserwani, Mahesh Chandra Govil:
A better and fast cloud intrusion detection system using improved squirrel search algorithm and modified deep belief network. 1699-1718 - Keerthi Kethineni, G. Pradeepini:
Intrusion detection in internet of things-based smart farming using hybrid deep learning framework. 1719-1732 - Selvam Durairaj, Rajeswari Sridhar:
MOM-VMP: multi-objective mayfly optimization algorithm for VM placement supported by principal component analysis (PCA) in cloud data center. 1733-1751 - Jiaxiang Zhang, Linwei Li, Huanlong Zhang, Feng-Xian Wang, Yangyang Tian:
A novel sparrow search algorithm with integrates spawning strategy. 1753-1773 - Masoud Nematollahi, Ali Ghaffari, Abbas Mirzaei:
Task and resource allocation in the internet of things based on an improved version of the moth-flame optimization algorithm. 1775-1797 - Dina A. Amer, Gamal Attiya, Ibrahim Ziedan:
An efficient multi-objective scheduling algorithm based on spider monkey and ant colony optimization in cloud computing. 1799-1819 - William S. Welling, Yanyan Sheng, Michelle M. Zhu:
CUDA-aware MPI implementation of Gibbs sampling for an IRT model. 1821-1830 - Jung-Woong Sung, Seung-Jae Han, Jin-Woo Kim:
Cloning-based virtual machine pre-provisioning for resource-constrained edge cloud server. 1831-1847 - Higinio Mora, Francisco A. Pujol, Tamai Ramírez, Antonio Jimeno-Morenilla, Julian Szymanski:
Network-assisted processing of advanced IoT applications: challenges and proof-of-concept application. 1849-1865 - Xizhen Deng, Mingcan Cen, M. Jiang, Meiqu Lu:
Ransomware early detection using deep reinforcement learning on portable executable header. 1867-1881 - Hao Xu, Chengfeng Jian:
A meta reinforcement learning-based virtual machine placement algorithm in mobile edge computing. 1883-1896 - Zhongguo Yang, Mingzhu Zhang, Han Li, Weilong Ding:
A novel seq2seq-based prediction approach for workflow scheduling. 1897-1910 - Ali Kelkawi, Imtiaz Ahmad, Mohammed El-Abd:
Spark-based cooperative coevolution for large scale global optimization. 1911-1926 - Sohaib Asif, Wenhui Yi, Qurrat Ul Ain, Yi Yueyang, Jinhai Si:
Improving the accuracy of diagnosing and predicting coronary heart disease using ensemble method and feature selection techniques. 1927-1946 - Gyan Singh, Amit K. Chaturvedi:
Hybrid modified particle swarm optimization with genetic algorithm (GA) based workflow scheduling in cloud-fog environment for multi-objective optimization. 1947-1964 - Slokashree Padhi, R. B. V. Subramanyam:
User request-based scheduling algorithms by managing uncertainty of renewable energy. 1965-1982 - Junfeng Tian, Ruxin Bai, Tianfeng Zhang:
Supporting dynamic update scheme for assured deletion based-multi-copy association tree. 1983-2001 - Lei Chen, Changzhou Feng, Yunpeng Ma:
Improved Harris Hawks optimization for global optimization and engineering design. 2003-2027 - Muhammad Akraam, Tabasam Rashid, Sohail Zafar:
A novel and secure image encryption scheme based on two-dimensional logistic and Arnold Cat map. 2029-2048 - Shaohua Wang, Xiaoxiong Xu:
A retrieval method of learners' behavior features based on K-means clustering algorithm. 2049-2058 - Han Yang, Jun Li:
Prototypical contrastive learning for image classification. 2059-2069 - Pablo C. Cañizares, Alberto Núñez, Rosa Filgueira, Juan de Lara:
Parallel mutation testing for large scale systems. 2071-2097 - Chen Duan, Zhengwei Huang, Yiting Tan, Jintao Min, Ribesh Khanal:
Emotion and sentiment analysis for intelligent customer service conversation using a multi-task ensemble framework. 2099-2115 - Ahmed Aleroud, Majd Shariah, Rami Malkawi, Samer Y. Khamaiseh, Abdullah S. Al-Alaj:
A privacy-enhanced human activity recognition using GAN & entropy ranking of microaggregated data. 2117-2132 - Donglin Zhu, Siwei Wang, Zuwei Huang, Changjun Zhou, Lin Zhang:
A JAYA algorithm based on normal clouds for DNA sequence optimization. 2133-2149 - Abid Jamal, Muhammad Umar Javed, Nabil Ali Alrajeh, Safdar Hussain Bouk, Nadeem Javaid:
Blockchain based reputation management, data storage and distributed revocation in vehicular energy networks in smart health care systems. 2151-2163 - Guang Yang, Lidong Han, Jingguo Bi, Fuqun Wang:
A collusion-resistant certificateless provable data possession scheme for shared data with user revocation. 2165-2179 - Sofia Strukova, José A. Ruipérez Valiente, Félix Gómez Mármol:
Computational approaches to detect experts in distributed online communities: a case study on Reddit. 2181-2201 - Jingze Yu, Wenting Shen:
Secure cloud storage auditing with deduplication and efficient data transfer. 2203-2215 - Ahlem Abid, Farah Jemili, Ouajdi Korbaa:
Real-time data fusion for intrusion detection in industrial control systems based on cloud computing and big data techniques. 2217-2238 - Bhaskar Kapoor, Bharti Nagpal:
Hybrid cuckoo finch optimisation based machine learning classifier for seizure prediction using EEG signals in IoT network. 2239-2260 - Guangwei Xing, Yanrong Guo, Xiaoxuan Chen, Hangzai Luo, Sheng Zhong:
Improving UWB ranging accuracy via multiple network model with second order motion prediction. 2261-2272 - Tamara Dancheva, Unai Alonso, Michael Barton:
Cloud benchmarking and performance analysis of an HPC application in Amazon EC2. 2273-2290 - Mohammad Hossein Ghasemian Koochaksaraei, Abolfazl Toroghi Haghighat, Mohammad Hossein Rezvani:
An efficient cloud resource exchange model based on the double auction and evolutionary game theory. 2291-2307 - Safdar Jamil, Abdul Salam, Awais Khan, Bernd Burgstaller, Sung-Soon Park, Youngjae Kim:
Correction: Scalable NUMA-aware persistent B+-tree for non-volatile memory devices. 2309 - Retraction Note: Agricultural product monitoring system supported by cloud computing. 2311
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.