Stop the war!
Остановите войну!
for scientists:
default search action
Concurrency and Computation: Practice and Experience, Volume 36
Volume 36, Number 1, 2024
Research Articles
- Luis Benet, Luca Ferranti, Nathalie Revol:
A framework to test interval arithmetic libraries and their IEEE 1788-2015 compliance. - Lei Li, Sheng Lian, Dazhen Lin, Zhiming Luo, Beizhan Wang, Shaozi Li:
Learning multi-organ and tumor segmentation from partially labeled datasets by a conditional dynamic attention network. - Margret Sharmila F, K. Karuppasamy:
An effective cryptanalysis of DES for secure communication using hybrid cryptanalysis and deep neural network. - R. Satheeskumar, Bonam Raghavaiah, S. Geerthik, T. Senthil Kumar:
An efficient VLSI architecture for fast motion estimation by hybridizing parallel spiral and adaptive threshold star diamond search algorithm-based search algorithm in HEVC. - Atefeh Hemmati, Hanieh Mohammadi Arzanagh, Amir Masoud Rahmani:
A taxonomy and survey of big data in social media. - Prabhjot Kaur, Shalini Batra, Prashant Singh Rana:
Border-hunting optimization for mobile agent-based intrusion detection with deep convolutional neural network. - Karthikeyan V, Murugan K:
A novel machine learning-based classification approach to prevent flow table overflow attack in Software-Defined Networking. - Tu Tran, Bharath Ramesh, Benjamin Michalowicz, Mustafa Abduljabbar, Hari Subramoni, Aamir Shafi, Dhabaleswar K. Panda:
Accelerating communication with multi-HCA aware collectives in MPI. - Raouia Bouabdallah, Fairouz Fakhfakh:
Extending OCCI for an autonomous SLA negotiation strategy in federated clouds. - Shahul Hamead Haja Moinudeen, Mirnalinee Thanganadar Thangathai, Kavi Priya Dhandapani:
Selective wakeup for parallel forward engines under variable load towards energy conservation in IP routers. - G. Sakthivel, P. Madhubala:
Advanced set containment deep learned Rabin certificateless signcryption for secured transmission with big data in cloud. - Medha Kirti, Ashish Kumar Maurya, Rama Shankar Yadav:
A Fault-tolerant model for tuple space coordination in distributed environments. - Marc González Tallada, Enric Morancho:
Compute units in OpenMP: Extensions for heterogeneous parallel programming. - Rongqiang Feng, Hongwei Du, Tianchi Du, Xueqiong Wu, Haiping Yu, Kexin Zhang, Chenxi Huang, Lianlian Cao:
Fault diagnosis for wind turbines based on LSTM and feature optimization strategies. - Huanyu Cui, Nianbin Wang, Qilong Han, Ye Wang, Jiahang Li:
A two-stage parallel method on GPU based on hybrid-compression-format for diagonal matrix.
Volume 36, Number 2, 2024
Research Articles
- Khushboo A. Patel, Shivangi Shukla, Sankita J. Patel:
A novel and provably secure mutual authentication protocol for cloud environment using elliptic curve cryptography and fuzzy verifier. - Özcan Dülger, Tansel Dökeroglu:
A new parallel tabu search algorithm for the optimization of the maximum vertex weight clique problem. - Kieran Leach, Philip Cass, Steven Robson, Eimantas Kazakevicius, Martin Lafferty, Andrew Turner, Alan Simpson:
Automated service monitoring in the deployment of ARCHER2. - Anil Kumar, Dinesh Singh, Rama Shankar Yadav:
Entropy and improved k-nearest neighbor search based under-sampling (ENU) method to handle class overlap in imbalanced datasets. - Princy Diwan, Ramgopal Kashyap, Brijesh Khandelwal:
Blockchain assisted encryption scheme for intellectual share estimation using medical research data. - B. Jaishankar, Bharathi Gururaj, Nandam Gayatri:
An effective autism spectrum disorder screening method using machine learning classification techniques. - Deepa Rathi, Sanjeev Kumar, Farhan Musanna, Deepak Singh:
Quantum secret sharing protocol through noisy channel with application in visual cryptography. - Mohd. Aquib Ansari, Dushyant Kumar Singh, Ruchi Jayaswal:
Using postural data and recurrent learning to monitor shoplifting activities in megastores. - Ruizhong Du, Chuan Liu, Yan Gao:
Anonymous federated learning framework in the internet of things. - Imtisenla Longkumer, Dilwar Hussain Mazumder:
Improving cancer prediction using feature selection in spark environment. - Xudong Wang, Weiyi Zhong:
Evolution and innovations in animation: A comprehensive review and future directions. - Bartosz Balis, Tomasz Lelek, Jakub Bodera, Michal Grabowski, Costin Grigoras:
Improving prediction of computational job execution times with machine learning. - Poonam Samir Jadhav, Gautam M. Borkar:
Quasi-identifier recognition with echo chamber optimization-based anonymization for privacy preservation of cloud storage. - Lei Kou, Junhe Wan, Hailin Liu, Wende Ke, Hui Li, Jie Chen, Zhen Yu, Quande Yuan:
Optimized design of patrol path for offshore wind farms based on genetic algorithm and particle swarm optimization with traveling salesman problem. - Nupur Jangu, Zahid Raza:
Smart admission control strategy utilizing volunteer-enabled fog-cloud computing.
Volume 36, Number 3, 2024
Research Articles
- Hirotsugu Kakugawa, Sayaka Kamei:
A self-stabilizing distributed algorithm for the bounded lattice domination problems under the distance-2 model. - Harsh Bhatt, Nilesh Kumar Jadav, Aparna Kumari, Rajesh Gupta, Sudeep Tanwar, Zdzislaw Polkowski, Amr Tolba, Azza S. Hassanein:
Artificial neural network-driven federated learning for heart stroke prediction in healthcare 4.0 underlying 5G. - Amandeep Kaur, C. Rama Krishna, Nilesh Vishwasrao Patil:
K-DDoS-SDN: A distributed DDoS attacks detection approach for protecting SDN environment. - Hatice Vildan Dudukcu, Murat Taskiran, Nihan Kahraman:
UAV instantaneous power consumption prediction using LR-TCN with simple moving average. - Verónica G. Melesse Vergara, Reuben D. Budiardja, Paul Peltz, Jeffery Niles, Christopher Zimmer, Daniel Dietz, Christopher Fuson, Hong Liu, Paul Newman, James Simmons, Christopher Muzyn:
A step towards the final frontier: Lessons learned from acceptance testing of the first HPE/Cray EX 3000 system at ORNL. - M. Chengathir Selvi, J. Maruthupandi, T. Bhuvaneswari, T. Manonmani:
An adaptive gravitational search optimization (AGSO)-based convolutional neural network - long short-term memory (CNN-LSTM) approach for face recognition and classification. - Akash Shah, Sapna Varshney, Monica Mehrotra:
DeepMUI: A novel method to identify malicious users on online social network platforms. - Junfeng Tian, Hongwei Xu, Jin Tian:
SLChain: A secure and low-storage pressure sharding blockchain. - Zhigang Zhang, Zhixia Zhang, Zhihua Cui:
Federated malware detection based on many-objective optimization in cross-architectural IoT. - Alexandre Denis, Emmanuel Jeannot, Philippe Swartvagher, Samuel Thibault:
Tracing task-based runtime systems: Feedbacks from the StarPU case.
Volume 36, Number 4, 2024
Research Articles
- Ankita Srivastava, Pramod Kumar Mishra:
Fuzzy based multi-criteria based cluster head selection for enhancing network lifetime and efficient energy consumption. - Chavit Denninnart, Mohsen Amini Salehi:
SMSE: A serverless platform for multimedia cloud systems. - Yachao Huo, Zongqu Zhao, Panke Qin, Shujing Wang, Chengfu Zheng:
Post-quantum secure two-party computing protocols against malicious adversaries. - Jinglei Guo, Chen Gao, Shouyong Jiang, Wei Xie, Zhijian Wu:
An improved brain storm optimization with chunking-grouping method. - Shveta Verma, Anju Bala:
Efficient Auto-scaling for Host Load Prediction through VM migration in Cloud. - Di Wu, Zhen Yang, Tong Li, Junrui Liu:
JOCP: A jointly optimized clustering protocol for industrial wireless sensor networks using double-layer selection evolutionary algorithm. - Manoj D. Shelar, S. Srinivasa Rao:
Enhanced capsule network-based executable files malware detection and classification - deep learning approach. - Alexander Michels, Anand Padmanabhan, Zhiyu Li, Shaowen Wang:
EasyScienceGateway: A new framework for providing reproducible user environments on science gateways. - Ping Wei, Shou Fa Wang, Yi Ming Wang:
Numerical study on the influence of centroid-to-buoyancy center ratio on the motion stability of supercavitating vehicle. - Michal Antkowiak, Lukasz Kucharski, Romuald Lemanski, Grzegorz Kamieniarz:
Algorithms on low energy spectra of the Hubbard model pertinent to molecular nanomagnets.
Volume 36, Number 5, 2024
Research Articles
- Zuoyong Li, Weice Wang, Taotao Lai, Haiping Xu, Pantea Keikhosrokiani:
Object-aware deep feature extraction for feature matching. - Yunbo Wan, Zhong Zhao, Jie Liu, Laiping Zhang, Yong Zhang, Jianqiang Chen:
Large-scale homo- and heterogeneous parallel paradigm design based on CFD application PHengLEI. - Insozhan Nagasundharamoorthi, Prabhu Venkatesan, Parthasarathy Velusamy:
Hash message authentication codes for securing data in wireless body area networks. - Jiange Zhang, Qing Yi, Christina L. Peterson, Damian Dechev:
Compiler-driven approach for automating nonblocking synchronization in concurrent data abstractions. - Wassim Jerbi, Omar Cheikhrouhou, Abderrahmen Guermazi, Hafedh Trabelsi:
An enhanced MSU-TSCH scheduling algorithms for industrial wireless sensor networks. - Meena Zenith N, R. Radhika:
Examining the impact of social media advertising using ANOVA analysis. - Gang Zhao, Hui He, Bingbing Di, Tong Wu:
ERSChain: Towards secure and flexible educational resource sharing using consortium blockchain and revocable ciphertext-policy attribute-based encryption. - Shuilin Chen, Jianguo Zheng:
Hybrid grey wolf optimizer for solving permutation flow shop scheduling problem. - Parvaz Ahmad Malla, Sophiya Sheikh, Mohammad Shahid, Sheikh Umar Mushtaq:
Energy-efficient sender-initiated threshold-based load balancing (e-STLB) in cloud computing environment. - Felix Wittwer, Nicholas K. Sauter, Derek Mendez, Billy K. Poon, Aaron S. Brewster, James M. Holton, Michael E. Wall, William E. Hart, Deborah Bard, Johannes P. Blaschke:
Accelerating x-ray tracing for exascale systems using Kokkos.
Volume 36, Number 6, 2024
Research Articles
- Sellamuthu Suseela, Ravi Krithiga, Muthusamy Revathi, Sudhakaran Gajendran, Reddipalayam Murugeshan Bhavadharini:
Energy aware optimal routing model for wireless multimedia sensor networks using modified Voronoi assisted prioritized double deep Q-learning. - C. Jackulin, S. Murugavalli, K. Valarmathi:
IFATA-Deep net: Improved invasive feedback artificial tree algorithm with deep quantum neural network for root disease classification. - Haochen Zhao, Jie Wen, Jinqian Yang, Xingjuan Cai, Chunxia Liu:
A many-objective optimization-based local tensor factorization model for skin cancer detection. - Nilesh Rathod, Sunil Wankhade:
Fractional cuckoo search invasive weed optimized neural network for data classification. - Shaiqa Nasreen, Ajaz Hussain Mir:
Cloud forensics: A centralized cloud provenance investigation system using MECC. - Kalimullah Lone, Shabir Ahmad Sofi:
e-TOALB: An efficient task offloading in IoT-fog networks. - Pritam Kumar Nayak, Ravi Shankar Singh, Shweta Kushwaha, Prasanth Kumar Bevara, Vinod Kumar, Rambabu Medara:
Efficient task scheduling on the cloud using artificial neural network and particle swarm optimization. - Fernanda G. O. Passos, Vinod E. F. Rebello:
An autonomic parallel strategy for exhaustive search tree algorithms on shared or heterogeneous systems. - Li Lv, Faying Zhang, Shenyu Qiu, Tanghuai Fan:
Adaptive kernel density estimation weighted twin support vector machine and its sample screening method. - Shadi Doostani, Hamid Barati, Ali Barati:
A lightweight hierarchical method for improving security in the internet of things using fuzzy logic.
Volume 36, Number 7, 2024
Research Articles
- Rafael Sanchez-Lara, José Luis López-Martínez, Joel Antonio Trejo-Sánchez, Herman L. Offerhaus, José A. Álvarez-Chávez:
Implementation and evaluation of two parallel computational models for the simulation of a long-haul DWDM system limited by FWM. - Premalatha Baskar, Prakasam Periasamy:
Minimal channel cost-based energy-efficient resource allocation algorithm for task offloading under FoG computing environment. - Chen Li, Ziniu Lin, Lihua Tian, Bin Zhang:
A scheduling algorithm based on critical factors for heterogeneous multicore processors. - Pichai Subramanian Apirajitha, Godfrey Winster Sathianesan:
On developing Block-Chain based Secure Storage Model (BSSM) with auditing and integrity analysis in the cloud. - Bin Deng:
Aquila optimizer with dynamic group strategy for global optimization tasks. - Ahmed Saidi, Abdelouahab Amira, Omar Nouali:
A secure multi-authority attribute based encryption approach for robust smart grids. - Lei Liu:
Multi-objective Firefly algorithm for enhanced balanced exploitation and exploration capabilities. - Zhen Wei, Jinghuan Nie, Wei Zhang:
Intelligent lighting design of cloud computing platform based on digital twin historic landscape blocks - Take Yu Garden commercial street in Shanghai as an example. - A. Priyadharshini, Suresh Dannana, Arun Sekar Rajasekaran, Maria Azees:
An efficient key agreement and anonymous privacy preserving scheme for vehicular ad-hoc networks with handover authentication. - Man Zhang, Zheng Kou:
Spatio-temporal pattern evolution and driving factors of A-level logistics enterprises in Yangtze River Delta.
Volume 36, Number 8, 2024
RESEARCH ARTICLES
- Rui Zhu, Hang Liu, Xiaolong Xu, Leilei Lin, Yeting Chen, Wenxin Li:
A-PGRD: Attention-based automatic business process model generation from RPA process description. - Madhavarapu Chandan, S. G. Santhi, T. Srinivasa Rao:
Deep ensemble of classifier for intrusion detection in WSN and improved attack mitigation process. - Kazuto Kobori, Chunghan Lee, Toshio Hirotsu:
Performance evaluation of portable time synchronization method using eBPF. - G. Nirmala Priya, K. Suresh Kumar, N. Suganthi, Satish Muppidi:
Squirrel Henry Gas Solubility Optimization driven Deep Maxout Network with multi-texture feature descriptors for digital image forgery detection. - Vanderlei Munhoz, Márcio Castro:
Enabling the execution of HPC applications on public clouds with HPC@Cloud toolkit. - Brett M. Bode, David King, Celso L. Mendes, William T. Kramer, Saurabh Jha, Roger Ford, Justin Davis, Steven Dramstad:
Blue Waters system and component reliability. - Siddharth Katyal, Shashank Gupta, Oshin Rawlley, Debjani Ghosh:
A fog-driven three-factor authentication protocol for secure data sharing in Internet of Vehicles cyber-physical systems. - Zuowen Tan, Jintao Jiao, Yanliang Chen:
Provably secure lightweight certificateless lattice-based authenticated key exchange scheme for IIoT. - Jinchao Li, Yuxuan Tian, Jindong Wang, Jinling Yang, Yinfang Zhu, Xuemin Cheng, Qun Hao:
Design of novel deformable mirror with large displacement.
REVIEW ARTICLE
- Iraq Ahmad Reshi, Sahil Sholla:
The blockchain conundrum: An in-depth examination of challenges, contributing technologies, and alternatives.
Volume 36, Number 9, 2024
RESEARCH ARTICLES
- Ameni Chetouane, Kamel Karoui:
Risk based intrusion detection system in software defined networking. - Fayssal Bendaoud, Marwen Abdennebi:
A machine learning access network selection in a heterogeneous wireless environment. - Saurabh Chandra, Rajeev Arya, Maheshwari Prasad Singh:
Optimal D2D power for secure D2D communication with random eavesdropper in 5G-IoT networks. - Yan Chen, Jiajian Xie, Jiajun Xue, Hui Wang:
A robust transformer GAN for unpaired data makeup transfer. - Beenish Habib, Farida Khursheed:
Time-based DDoS attack detection through hybrid LSTM-CNN model architectures: An investigation of many-to-one and many-to-many approaches.
REVIEW ARTICLE
- Baki Gökgöz, Fatih Gül, Tolga Aydin:
An overview memristor based hardware accelerators for deep neural network.
RESEARCH ARTICLES
- Lúcia Maria de Assumpção Drummond, Luciano Andrade, Pedro de Brito Muniz, Matheus Marotti Pereira, Thiago do Prado Silva, Luan Teylo:
Design and analyses of web scraping on burstable virtual machines. - Kamil Halbiniak, Norbert Meyer, Krzysztof Rojek:
Single- and multi-GPU computing on NVIDIA- and AMD-based server platforms for solidification modeling application. - Hidangmayum Satyajeet Sharma, Khundrakpam Johnson Singh:
A feed forward deep neural network model using feature selection for cloud intrusion detection system. - Juncheng Jia, Ji Liu, Chendi Zhou, Hao Tian, Mianxiong Dong, Dejing Dou:
Efficient asynchronous federated learning with sparsification and quantization.
Volume 36, Number 10, 2024
EDITORIALS
- Carlos Reaño, Federico Silla, Blesson Varghese:
Accelerator virtualization. - Pezhman Gholamnezhad, Ali Broumandnia, Vahid Seydi:
An improved model-based evolutionary algorithm for multi-objective optimization. - Xiaoping Sun, Hai Zhuge:
Semantics, knowledge and advanced cyber-infrastructure for intelligent applications. - Xiao Liu:
Editorial for special issue on "Edge computing accelerated deep learning: Technologies and applications".
SPECIAL ISSUE PAPERS
- Qiguo Huang, Zhengliang Li, Qing Gu:
Multi-task deep neural networks for just-in-time software defect prediction on mobile apps. - Wenhao Song, Wenzhe Zhai, Mingliang Gao, Qilei Li, Abdellah Chehri, Gwanggil Jeon:
Multiscale aggregation and illumination-aware attention network for infrared and visible image fusion. - Yang Gu, Jian Cao, Shiyou Qian, Nengjun Zhu, Wei Guan:
MANSOR: A module alignment method based on neighbor information for scientific workflow. - Jiayan Gu, Yan Wu, Ashiq Anjum, Lu Liu, John Panneerselvam, Yao Lu:
An adaptive key selection method for the multilevel index model for effective service management in the cloud. - Masato Kobayashi, Yusuke Hirota, Shuhei Kudo, Takeo Hoshi, Yusaku Yamamoto:
Automatic performance tuning using the ATMathCoreLib tool: Two experimental studies related to dense symmetric eigensolvers. - Carl Christian Kjelgaard Mikkelsen, Lorién López-Villellas, Pablo García-Risueño:
Newton's method revisited: How accurate do we have to be? - Kai Peng, Chengfang Ling, Bohai Zhao, Victor C. M. Leung:
A fairness-aware task offloading method in edge-enabled IIoT with multi-constraints using AGE-MOEA and weighted MMF. - Oleg Bystrov, Ruslan Pacevic, Arnas Kaceniauskas:
Cost- and performance-aware resource selection for parallel software on heterogeneous cloud. - Rosalba Cacciapuoti, Luisa D'Amore:
Scalability analysis of a two level domain decomposition approach in space and time solving data assimilation models. - Qiong Lu, Huaizhong Lin, Wei Xing, Lei Zhao, Jingjing Chen:
PKD-Net: Distillation of prior knowledge for image completion by multi-level semantic attention. - Tianhong Xiong, Shangqing Feng, Maolin Pan, Yang Yu:
Smart contract generation for inter-organizational process collaboration. - Luisa Carracciuolo, Valeria Mele, Gianluca Sabella:
Toward a new linpack-like benchmark for heterogeneous computing resources. - Liya Ma, Chen Li, Siqi Sun, Shu Guo, Lihong Wang, Jianxin Li:
Privacy-preserving graph publishing with disentangled variational information bottleneck. - Xiaotian Li, Koji Nakano, Yasuaki Ito, Daisuke Takafuji, Takashi Yazane, Junko Yano, Takumi Kato, Shiro Ozaki, Rie Mori, Ryota Katsuki:
Bit duplication technique to generate hard quadratic unconstrained binary optimization problems with adjustable sizes. - Zhijie Shen, Bowen Liu, Wanchun Dou:
An effective data placement strategy for IIoT applications. - Christopher D. Rickett, Kristyn J. Maschhoff, Sreenivas R. Sukumar:
Optimizing the Cray Graph Engine for performant analytics on cluster, SuperDome Flex, Shasta systems and cloud deployment. - Javed Ali Khan, Tahir Ullah, Arif Ali Khan, Affan Yasin, Muhammad Azeem Akbar, Khursheed Aurangzeb:
Can end-user feedback in social media be trusted for software evolution: Exploring and analyzing fake reviews. - Yulin He, Jin Yang, Yingchao Cheng, Xueqin Du, Joshua Zhexue Huang:
A novel member enhancement-based clustering ensemble algorithm. - Wanyu Qiu, Chuanhe Huang, Zhengfa Li, M. Wasim Abbas Ashraf, Danxin Wang:
Traffic offloading for postdisaster rescue in UAV-assisted networks: A coalition formation game approach.
EDITORIAL
- Marco Lapegna, Valeria Mele, Raffaele Montella, Lukasz Szustak:
Special Issue on the pervasive nature of HPC (PN-HPC).
SPECIAL ISSUE PAPER
- Filippos Pantekis, Phillip James, Oliver Kullmann, Liam O'Reilly:
Optimized massively parallel solving of N-Queens on GPGPUs.
RESEARCH ARTICLES
- Ashis Kumar Mishra, Subasish Mohapatra, Pradip Kumar Sahu:
Coalition theory based task scheduling algorithm using DLFC-NN model. - Baoyong Yan, Jialin Tian, Jun Wan, Yu Qiu, Weiming Chen:
Real-time prediction of horizontal drilling pressure based on convolutional Transformer. - Yongwei Tang, Wei Ding, Jun Zhou, Yonghao Yu, Huijuan Hao:
Research on cloud robot security strategy based on chaos encryption.
Volume 36, Number 11, May 2024
RESEARCH ARTICLES
- Ao Gong, Yun Cheng, Jing Su, Li Zhang:
Research on hybrid synchronization methods in multi-user collaborative VR simulation medical surgery training system. - Alavieh Sadat Alavizadeh, Seyed Hossein Erfani, Meghdad Mirabi, Amir Sahafi:
A distributed reliable collusion-free algorithm for selecting multiple coordinators in IOTA using fog computing.
SPECIAL ISSUE PAPER
- Prabha Mahenthiran, Dinakaran Muruganadam:
Handoff performance analysis of PMIPv6-based distributed mobility management protocol-urban scenario.
RESEARCH ARTICLES
- Lanjun Wan, Xueyan Cui, Yuanyuan Li, Weihua Zheng, Xinpan Yuan:
HeteroPP: A directive-based heterogeneous cooperative parallel programming framework. - Natalia Chaudhry, Muhammad Murtaza Yousaf:
Exploiting hashing for concurrent query processing and indexing of current location of moving objects.
SPECIAL ISSUE PAPER
- Jiangwei Shang, Zhan Zhang, Kun Zhang, Chuanyou Li, Lei Qian, Hong-Wei Liu:
An algorithm/hardware co-optimized method to accelerate CNNs with compressed convolutional weights on FPGA.
RESEARCH ARTICLES
- Mandeep Kumar, Amritpal Singh:
Bloom filter empowered smart storage/access in IoMT [edge-fog-cloud] hierarchy for health-care data ingestion. - Soumi Dhar, Shyamosree Pal, Gaurav Bhattacharjee, Abhishek Pandey:
A digital geometric approach for discrete Voronoi diagram construction using GPU. - Yunfeng Ye, Huifang Liu, Wenhui Kuang, Wenxuan Chen:
Virtual reality modeling application based on multi perspective and deep learning in the new media presentation and brand building of Dongguan City memory. - Amol D. Vibhute, Minhaj Khan, Anuradha Kanade, Chandrashekhar H. Patil, Sandeep V. Gaikwad, Kanubhai K. Patel, Jatinderkumar R. Saini:
An LSTM-based novel near-real-time multiclass network intrusion detection system for complex cloud environments.
SPECIAL ISSUE PAPER
- Pankaj Prasad Dwivedi, Dilip Kumar Sharma:
A novel approach for constructing privacy-aware architecture utilizing Shannon's entropy.
RESEARCH ARTICLES
- Pan Pan:
Local feature matching and tracking optimization of machine VSLAM based on AG Sinkhorn. - Zhihao Liang, Huijuan Lu, Zhendong Ming, Zhuijun Chai, Yudong Yao:
DML-OFA: Deep mutual learning with online feature alignment for the detection of COVID-19 from chest x-ray images.
SPECIAL ISSUE PAPER
- Marcos J. Santos-Neto, Jacir Luiz Bordim, Eduardo A. P. Alchieri, Edison Ishikawa:
DDoS attack detection in SDN: Enhancing entropy-based detection with machine learning.
RESEARCH ARTICLES
- Pankaj Kumar, Anurag Singh, Ajay K. Sharma:
Identification of influential vertices in complex networks: A hitting time-based approach. - Vikramjit Singh, Krishna Pal Sharma, Harsh Kumar Verma:
MF-DLB: Multimetric forwarding and directed acyclic graph-based load balancing for geographic routing in FANETs. - Somayyeh Jafari, Nasrin Aghaee-Maybodi:
Detection of phishing addresses and pages with a data set balancing approach by generative adversarial network (GAN) and convolutional neural network (CNN) optimized with swarm intelligence. - Pujasuman Tripathy, Pabitra Mohan Khilar:
Improvement of amorphous localization algorithm in WSN using ALO and GWO. - Khushnaseeb Roshan, Aasim Zafar:
AE-Integrated: Real-time network intrusion detection with Apache Kafka and autoencoder. - Qi Wang:
Research on the application of bilateral collaborative algorithm in hotel tourism consumption preference recommendation.
SPECIAL ISSUE PAPER
- Beibei Wu:
Research on denoising and enhancing methods of medical images based on convolutional neural networks.
RESEARCH ARTICLE
- Guohua Shen, Mengnan Cai, Zhiqiu Huang, Yang Yang, Feifei Guo, Linlin Wei:
LoHDP: Adaptive local differential privacy for high-dimensional data publishing.
EDITORIAL
- Roman Wyrzykowski, Boleslaw K. Szymanski:
Advances into exascale computing.
Volume 36, Number 12, May 2024
RESEARCH ARTICLE
- Muhammet Tay, Arafat Sentürk:
Decision tree-based task offloading in vehicle edge computing.
SPECIAL ISSUE PAPER
- Johannes P. Blaschke, Aaron S. Brewster, Daniel W. Paley, Derek Mendez, Asmit Bhowmick, Nicholas K. Sauter, Wilko Kröger, Murali Shankar, Bjoern Enders, Deborah Bard:
Real-time XFEL data analysis at SLAC and NERSC: A trial run of nascent exascale experimental data analysis.
RESEARCH ARTICLES
- Wei Qin, Hao Wang, Xiangfeng Luo:
Open-domain event schema induction via weighted attentive hypergraph neural network. - Ravil Dorozhinskii, Gonzalo Brito Gadeschi, Michael Bader:
Fused GEMMs towards an efficient GPU implementation of the ADER-DG method in SeisSol. - Yishu Du, Loris Marchal, Guillaume Pallez, Yves Robert:
Improving batch schedulers with node stealing for failed jobs. - B. Mohammed Siyad, Ramasundaram Mohan:
Processing-in-memory based multilateration localization in wireless sensor networks using memristor crossbar arrays. - Ahmad Jalili, Jafar Ahmad Abed Alzubi, Roghayeh Rezaei, Julian L. Webber, Christian Fernández-Campusano, Mehdi Gheisari, Rashid Amin, Abolfazl Mehbodniya:
Markov chain-based analysis and fault tolerance technique for enhancing chain-based routing in WSNs. - Buqing Cao, Hao Huang, Shanpeng Liu, Yizhi Liu, Yiping Wen, Dong Zhou, Mingdong Tang:
Knowledge distillation representation and DCNMIX quality prediction-based Web service recommendation. - Houfu Peng, Xing Lu, Lili Xu, Daoxun Xia, Xiaoyao Xie:
Parameter instance learning with enhanced vision transformers for aerial person re-identification. - Songyi Xiao, Wenjun Wang:
Ranking-based architecture generation for surrogate-assisted neural architecture search. - Paul Immanuel, A. Berin Greeni:
Optimization of layout for embedding half hypercube into conventional tree architectures. - Payal Thakur, Vivek Kumar Sehgal:
Synergizing edge computing and blockchain for cyber-physical systems. - Saravanan Muniswamy, Radhakrishnan Vignesh:
Joint optimization of load balancing and resource allocation in cloud environment using optimal container management strategy. - Tong Zhou, Yaning Yu, Haonan Yuan, Bing Liu, Hongyang Zhao, Ruijin Wang:
CCSFLF: Cloud-edge-terminal collaborative self-adaptive federated learning framework. - Manoj Kumar Patra, Bibhudatta Sahoo, Ashok Kumar Turuk:
FPHO: Fractional Pelican Hawks optimization based container consolidation in CaaS cloud. - Thankaraja Raja Sree, R. Harish, Veni Thangaraj:
FogSec: A secure and effective mutual authentication scheme for fog computing.
SPECIAL ISSUE ARTICLE
- Ethan Gibbons, Ke Qiu:
A recurrence for the surface area of the ( n , k ) $$ \left(n,k\right) $$ -star graph.
RESEARCH ARTICLES
- Li Li, Renjia Su, Xin Zhao:
Neighbor cleaning learning based cost-sensitive ensemble learning approach for software defect prediction. - Farheen Syed, Saeed Hamood Alsamhi, Sachin Kumar Gupta, Abdu Saif:
LSB-XOR technique for securing captured images from disaster by UAVs in B5G networks. - Sahin Aydin, Dieaa Aldara:
Microservices-based databank for Turkish hazelnut cultivars using IoT and semantic web technologies.
REVIEW ARTICLE
- Sangita Baruah, Dhruba Jyoti Borah, Vaskar Deka:
Reviewing various feature selection techniques in machine learning-based botnet detection.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.