![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Computing, Volume 106
Volume 106, Number 1, January 2024
- K. Dinesh Kumar
, E. Umamaheswari:
An efficient proactive VM consolidation technique with improved LSTM network in a cloud environment. 1-28 - Zhen-Fei Wang, Pei-Yao Yuan, Zhong-Ya Cao, Li-Ying Zhang
:
Feature reduction of unbalanced data classification based on density clustering. 29-55 - Zhenqian Wang
, Huigui Rong:
An energy-efficient multi-stage alternating optimization scheme for UAV-mounted mobile edge computing networks. 57-80 - Gholam Hossein Abdi, Amir Hossein Refahi Sheikhani
, Sohrab Kordrostami
, Armin Ghane, Shahram Babaie:
A novel selfish node detection based on reputation and game theory in Internet of Things. 81-107 - Navid Khaledian
, Keyhan Khamforoosh, Reza Akraminejad
, Laith Abualigah
, Danial Javaheri
:
An energy-efficient and deadline-aware workflow scheduling algorithm in the fog and cloud environment. 109-137 - Kushal Kanwar
, Sakshi Kaushal, Harish Kumar, Gaurav Gupta
, Manju Khari:
An efficient method for node ranking in complex networks by hybrid neighbourhood coreness. 139-161 - David Rodriguez
, José M. del Álamo, Miguel Cozar
, Boni García
:
ROI: a method for identifying organizations receiving personal data. 163-184 - Fatih Saglam
, Mehmet Ali Cengiz:
Local resampling for locally weighted Naïve Bayes in imbalanced data. 185-200 - Zari Shamsa, Ali Rezaee
, Sahar Adabi, Amir Masoud Rahmani:
A decentralized prediction-based workflow load balancing architecture for cloud/fog/IoT environments. 201-239 - Nikos Tsalikidis, Aristeidis Mystakidis
, Christos Tjortjis
, Paraskevas Koukaras
, Dimosthenis Ioannidis:
Energy load forecasting: one-step ahead hybrid model utilizing ensembling. 241-273 - W. M. K. S. Ilmini, T. G. I. Fernando:
Detection and explanation of apparent personality using deep learning: a short review of current approaches and future directions. 275-294
Volume 106, Number 2, February 2024
- Xin Xu, Tao Ye, Jieying Gao, Dongxiao Chu
:
Generalized hurdle count data models based on interpretable machine learning with an application to health care demand. 295-325 - Chencheng Fan, Zhixiao Wang, Jian Zhang, Jiayu Zhao, Xiaobin Rui:
Influence maximization in social networks based on discrete harris hawks optimization algorithm. 327-351 - Kalaichelvi Nallusamy
, K. S. Easwarakumar:
PERMDEC: community deception in weighted networks using permanence. 353-370 - Seyed Danial Alizadeh Javaheri, Reza Ghaemi
, Hossein Monshizadeh Naeen:
An autonomous architecture based on reinforcement deep neural network for resource allocation in cloud computing. 371-403 - Prity Rani, Rohit Kumar Sachan, Sonal Kukreja:
A systematic study on blockchain technology in education: initiatives, products, applications, benefits, challenges and research direction. 405-447 - Asma Bellili, Nadjia Kara:
A graphical deep learning technique-based VNF dependencies for multi resource requirements prediction in virtualized environments. 449-473 - Quintino Francesco Lotito
, Federico Musciotto, Federico Battiston, Alberto Montresor:
Exact and sampling methods for mining higher-order motifs in large hypergraphs. 475-494 - Iman Morovatian, Alireza Basiri, Samira Rezaei:
RUCIB: a novel rule-based classifier based on BRADO algorithm. 495-519 - Min Li, Shuming Zhou
, Dajin Wang, Gaolin Chen:
Missing link prediction using path and community information. 521-555 - Subhash Sagar
, Adnan Mahmood, Quan Z. Sheng
, Munazza Zaib, Farhan Sufyan
:
Can we quantify trust? Towards a trust-based resilient SIoT network. 557-577 - Haoyu Wang, Jianwei An
:
Dynamic game based task offloading and resource pricing in LEO-multi-access edge computing. 579-606 - Abdulqader M. Almars
, Khalid M. Alharbi:
Corporate social responsibility disclosure prediction using LSTM neural network. 607-625 - Weidong Li, Chunbo Shi, Yongbo Yu, Zhe Wang:
A novel optimization approach to topology checking of pipeline vector data in browser side. 627-649
Volume 106, Number 3, March 2024
- Faten Mrabet, Walid Karamti, Adel Mahfoudhi:
Scheduling analysis and correction for dependent real-time tasks upon heterogeneous multiprocessor architectures. 651-712 - Chuandong Qin, Yu Cao:
1-D CNNs with lock-free asynchronous adaptive stochastic gradient descent algorithm for classification of astronomical spectra. 713-739 - Mingxue Liao
, Pin Lv:
On the average time complexity of computation with random partition. 741-758 - Gopinathan Rajeswari
, R. Arthi, Krishnan Murugan:
Nature-inspired donkey and smuggler algorithm for optimal data gathering in partitioned wireless sensor networks for restoring network connectivity. 759-787 - Ting Lyu, Jianwei An, Meng Li, Feifei Liu, Haitao Xu:
UAV-assisted wireless charging and data processing of power IoT devices. 789-819 - Edwin Montes-Orozco
, Román Anselmo Mora Gutiérrez, Sergio Gerardo de-los-Cobos-Silva, Eric Alfredo Rincón García, Miguel Angel Gutiérrez-Ándrade, Pedro Lara-Velázquez:
Quantifying influential nodes in complex networks using optimization and particle dynamics: a comparative study. 821-864 - Hui Du, Cuntao Ma, Depeng Lu, Jingrui Liu:
HHSE: heterogeneous graph neural network via higher-order semantic enhancement. 865-887 - Alejandro Pérez-Vereda
, Carlos Canal
, Ramón Hervás
:
Distributed mobile CEP for collaborative social computing. 889-913 - Xiaochuan Sun, Qi Chen, Mingxiang Hao, Yingqi Li, Bo Sun:
Mconvkgc: a novel multi-channel convolutional model for knowledge graph completion. 915-937 - Hui Xie, Jun Zheng, Zhengyuan Zhang, Shengjun Wei, Changzhen Hu:
TEDA: a trusted execution environment-and-blockchain-based data protection architecture for Internet of Things. 939-960 - Ahmadi Hasan, Ahmad Kamal
:
Community detection of weighted complex networks via transitive closure. 961-979 - Guruprasad Kapilesh, Sridhar Dhanush, Venkatesan Poovazhaki Gokula Kannan, Viswasam Mary Anita Rajam
:
A priority aware local mutual exclusion algorithm for flying ad hoc networks. 981-1012 - Ehsan Heidari
:
A novel energy-aware method for clustering and routing in IoT based on whale optimization algorithm & Harris Hawks optimization. 1013-1045
Volume 106, Number 4, April 2024
- Rajiv Ranjan, Dan Chen, Prem Prakash Jayaraman:
Adaptive machine learning in the IoT-edge-cloud continuum. 1047 - Rajiv Ranjan, Dan Chen, Prem Prakash Jayaraman:
Correction to: Adaptive machine learning in the IoT-edge-cloud continuum. 1049 - Milad Anoushee
, Mehdi Fartash
, Javad Akbari Torkestani:
An intelligent resource management method in SDN based fog computing using reinforcement learning. 1051-1080 - Yuanzhang Li, Tianchi Sha, Thar Baker
, Xiao Yu, Zhiwei Shi, Sikang Hu:
Adaptive vertical federated learning via feature map transferring in mobile edge computing. 1081-1097 - Hamid Reza Ghaffari
, Farzaneh Rafeie:
Reconstructing the training data set based on reducing boundary complexity. 1099-1119 - Ruyi Xu, Jiaxu Han, Jingying Chen:
Ordinal information based facial expression intensity estimation for emotional interaction: a novel semi-supervised deep learning approach. 1121-1138 - Ming Cheng
, Yunbing Yan, Yang Han, Hongjun Lei, Chao Deng
:
Adaptive machine learning algorithm for human target detection in IoT environment. 1139-1150 - Shilpi Mittal
, Rajan Kumar Dudeja, Rasmeet Singh Bali, Gagangeet Singh Aujla
:
A distributed task orchestration scheme in collaborative vehicular cloud edge networks. 1151-1175 - Prateek Chhikara
, Rajkumar Tekchandani, Neeraj Kumar
:
Adaptive federated learning scheme for recognition of malicious attacks in an IoT network. 1177-1192 - Sahil, Sandeep Kumar Sood, Victor I. Chang:
Fog-Cloud-IoT centric collaborative framework for machine learning-based situation-aware traffic management in urban spaces. 1193-1225 - Armin Shoughi, Mohammad Bagher Dowlatshahi, Arefeh Amiri, Marjan Kuchaki Rafsanjani
, Ranbir Singh Batth:
Automatic ECG classification using discrete wavelet transform and one-dimensional convolutional neural network. 1227-1248
- Boualem Benatallah, Hakim Hacid, Eleanna Kafeza, Fabio Martinelli, Athman Bouguettaya:
ICSOC 2020 special issue on service-oriented computing. 1249-1250 - Andreas Metzger, Clément Quinton, Zoltán Ádám Mann
, Luciano Baresi, Klaus Pohl:
Realizing self-adaptive systems via online reinforcement learning and feature-model-guided exploration. 1251-1272 - Gaith Rjoub
, Omar Abdel Wahab, Jamal Bentahar
, Ahmed Saleh Bataineh:
Trust-driven reinforcement selection strategy for federated learning on IoT devices. 1273-1295
Volume 106, Number 5, May 2024
- Malek Yousefi, Seyed Morteza Babamir:
A hybrid energy-aware algorithm for virtual machine placement in cloud computing. 1297-1320 - Péter Battyányi
:
Solving the SAT problem with the string multiset rewriting calculus. 1321-1334 - Tianchi Tong, Qian Dong, Wenying Yuan, Jinsheng Sun
:
Identifying vital spreaders in complex networks based on the interpretative structure model and improved Kshell. 1335-1358 - Yuan-Ko Huang, Chien-Pang Lee:
Efficient processing of all neighboring object group queries with budget range constraint in road networks. 1359-1393 - Weida Song, Shanxin Zhang
, Wenlong Ge, Wei Wang:
An improved indicator-based two-archive algorithm for many-objective optimization problems. 1395-1429 - Jian Wan, Luc Jaulin:
Reducing the wrapping effect of set computation via Delaunay triangulation for guaranteed state estimation of nonlinear discrete-time systems. 1431-1449 - Suguna Paramasivam
, R. Leela Velusamy, J. V. Nishaanth:
Categorical learning for automated network traffic categorization for future generation networks in SDN. 1451-1473 - Lei Chen
, Linyun Ma, Lvjie Li:
Enhancing sine cosine algorithm based on social learning and elite opposition-based learning. 1475-1517 - Ali Riahi, Abdorreza Savadi, Mahmoud Naghibzadeh:
Many-BSP: an analytical performance model for CUDA kernels. 1519-1555 - Xiu Susie Fang
, Xianzhi Wang, Quan Z. Sheng, Lina Yao:
Generalizing truth discovery by incorporating multi-truth features. 1557-1583 - Chinmaya Kumar Swain
, Ravi Shankar, Aryabartta Sahu:
Edge data distribution as a network Steiner tree estimation in edge computing. 1585-1609 - Ekin Ekinci:
A comparative study of LSTM-ED architectures in forecasting day-ahead solar photovoltaic energy using Weather Data. 1611-1632 - Shaifali P. Malukani, C. K. Bhensdadia:
Preference based multi-issue negotiation algorithm (PMINA) for fog resource allocation. 1633-1657 - Jiuyun Xu
, Yinyue Jiang, Hanfei Fan, Qiqi Wang:
SVFLDetector: a decentralized client detection method for Byzantine problem in vertical federated learning. 1659-1679 - Kangning Yin, Zhen Ding, Zhihua Dong, Xinhui Ji, Zhipei Wang, Dongsheng Chen, Ye Li, Guangqiang Yin, Zhiguo Wang:
Person re-identification method based on fine-grained feature fusion and self-attention mechanism. 1681-1705
Volume 106, Number 6, June 2024
- Mandar Subhash Karyakarte
, Aarti Amod Agarkar, Lalit Kulkarni, Milind Patil, Gajanan H. Chavhan, Bipin Sule:
Dynamic opportunistic routing protocol for ad-hoc Internet of Vehicles (IoV). 1707-1728 - Chengcheng Sun, Fanrong Meng, Chenhao Li, Xiaobin Rui, Zhixiao Wang
:
LGAT: a light graph attention network focusing on message passing for semi-supervised node classification. 1729-1747 - Shuang Wang, Yibing Duan, Yamin Lei, Peng Du, Yamin Wang:
Electricity-cost-aware multi-workflow scheduling in heterogeneous cloud. 1749-1775 - Reza Akraminejad
, Navid Khaledian
, Amin Nazari
, Marcus Völp
:
A multi-objective crow search algorithm for optimizing makespan and costs in scientific cloud workflows (CSAMOMC). 1777-1793 - Mohammad Ali Monshizadeh Naeen, Hamid Reza Ghaffari, Hossein Monshizadeh Naeen:
Cloud data center cost management using virtual machine consolidation with an improved artificial feeding birds algorithm. 1795-1823 - Salman Mokhtarzadeh, Behzad Zamani Dehkordi, Mohammad Mosleh, Ali Barati:
Time-sensitive propagation values discount centrality measure. 1825-1843 - Zahoor Ali Khan, Muhammad Awais, Turki Ali Alghamdi, Nadeem Javaid
:
Employing topology modification strategies in scale-free IoT networks for robustness optimization. 1845-1872 - Tamer E. Fahim, Sherif I. Rabia, Ahmed H. Abd El-Malek, Waheed K. Zahra:
Enhancing information freshness in multi-class mobile edge computing systems using a hybrid discipline. 1873-1911 - Zhenyu Xu, Xinxin Zhang, Mingzhi Chen, Li Xu:
Influence maximization in mobile social networks based on RWP-CELF. 1913-1931 - Rajesh Kumar Dhanaraj, Anamika Singh, Anand Nayyar:
Matyas-Meyer Oseas based device profiling for anomaly detection via deep reinforcement learning (MMODPAD-DRL) in zero trust security network. 1933-1962 - Xin Jiang, Hongbo Liu, Liping Yang, Bo Zhang, Tomas E. Ward, Václav Snásel:
Unraveling human social behavior motivations via inverse reinforcement learning-based link prediction. 1963-1986 - Yonghui Lin, Li Xu
, Wei Lin, Jiayin Li:
Community anomaly detection in attribute networks based on refining context. 1987-2006 - Cen Li, Liping Chen:
Optimization for energy-aware design of task scheduling in heterogeneous distributed systems: a meta-heuristic based approach. 2007-2031 - Ezdehar Jawabreh, Adel Taweel:
Qos-based web service selection using time-aware collaborative filtering: a literature review. 2033-2058 - Bráulio Henrique O. U. V. Pinto, Horacio A. B. F. de Oliveira:
Online RSSI selection strategy for indoor positioning in low-effort training scenarios. 2059-2077
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.