![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Journal of Grid Computing, Volume 20
Volume 20, Number 1, March 2022
- Shui-Hua Wang, Suresh Chandra Satapathy, Qinghua Zhou, Xin Zhang, Yu-Dong Zhang
:
Secondary Pulmonary Tuberculosis Identification Via pseudo-Zernike Moment and Deep Stacked Sparse Autoencoder. 1 - Armando Ruggeri
, Antonio Celesti, Maria Fazio, Massimo Villari:
An Innovative Blockchain-Based Orchestrator for Osmotic Computing. 2 - Dinesh Kumar
, Gaurav Baranwal
, Deo Prakash Vidyarthi:
A Survey on Auction based Approaches for Resource Allocation and Pricing in Emerging Edge Technologies. 3 - Wan Shi Low, Chow Khuen Chan, Joon Huang Chuah, Yee-Kai Tee
, Yan Chai Hum, Maheza Irna Mohamad Salim
, Khin Wee Lai
:
A Review of Machine Learning Network in Human Motion Biomechanics. 4 - Kalka Dubey
, S. C. Sharma, Mohit Kumar
:
A Secure IoT Applications Allocation Framework for Integrated Fog-Cloud Environment. 5 - Mohamed Hedi Fourati
, Soumaya Marzouk, Mohamed Jmaiel:
EPMA: Elastic Platform for Microservices-based Applications: Towards Optimal Resource Elasticity. 6 - Eva Sciacca
, Mel Krokos, Cristobal Bordiu
, Carlos Brandt, Fabio Vitello, Filomena Bufano, Ugo Becciani, Mario Raciti
, Giuseppe Tudisco, Simone Riggi, Eugenio Topa, Sami Azzi, Benjamin Kyd, Simone Mantovani, Laura Vettorello, Jiacheng Tan, Josep Quintana
, Ricard Campos, Noela Pina
:
Scientific Visualization on the Cloud: the NEANIAS Services towards EOSC Integration. 7 - Hao Zheng, Jianfang Liu, Xiaogang Ren:
Dim Target Detection Method Based on Deep Learning in Complex Traffic Environment. 8 - Guanghua Xiao
, Huibin Wang, Jie Shen, Zhe Chen, Zhen Zhang:
An Adaptive Hierarchical Concatenated Network With A Robust Loss Function For Image Denoising. 9 - Wei Wei
, Yuying Zhang, Yashuang Mu, Weidong Yang:
Stochastic Demands Oriented General Resource Scheduling With Burstable Resources. 10 - Yaqin Liu, Chubo Liu, Jing Liu, Yikun Hu, Kenli Li, Keqin Li:
Mobility-Aware and Code-Oriented Partitioning Computation Offloading in Multi-Access Edge Computing. 11
Volume 20, Number 2, June 2022
- Defu Zhao, Qunying Zou, Milad Boshkani Zadeh:
A QoS-Aware IoT Service Placement Mechanism in Fog Computing Based on Open-Source Development Model. 12 - Leila Helali
, Mohamed Nazih Omri:
Software License Consolidation and Resource Optimization in Container-based Virtualized Data Centers. 13 - Ruizhong Du, Cui Liu
, Yan Gao, PengNan Hao, ZiYuan Wang:
Collaborative Cloud-Edge-End Task Offloading in NOMA-Enabled Mobile Edge Computing Using Deep Learning. 14 - Abdul Rahman Hummaida
, Norman W. Paton, Rizos Sakellariou
:
Scalable Virtual Machine Migration using Reinforcement Learning. 15 - Mustafa M. Al-Sayed
:
Workload Time Series Cumulative Prediction Mechanism for Cloud Resources Using Neural Machine Translation Technique. 16 - Kanika Saini
, Sheetal Kalra
, Sandeep K. Sood:
An Integrated Framework for Smart Earthquake Prediction: IoT, Fog, and Cloud Computing. 17 - Ehtesham Zahoor
, Asim Ikram, Sabina Akhtar, Olivier Perrin:
A Formal Approach for the Identification of Authorization Policy Conflicts within Multi-Cloud Environments. 18 - Zohreh Esmaeili Bidhendi, Ehsan Mousavi Khaneghah
:
ExaFlooding RD: A Mathematical Model to Support Unstructured Resource Discovery in Distributed Exascale Computing Environments. 19
Volume 20, Number 3, September 2022
- Abhinav Kumar
, Jyoti Prakash Singh, Amit Kumar Singh
:
Randomized Convolutional Neural Network Architecture for Eyewitness Tweet Identification During Disaster. 20 - Jingzhi Tu, Gang Mei
, Francesco Piccialli:
An Efficient Deep Learning Approach Using Improved Generative Adversarial Networks for Incomplete Information Completion of Self-driving Vehicles. 21 - Reza Fotohi
, Masoud Abdan, Sanaz Ghasemi
:
A Self-Adaptive Intrusion Detection System for Securing UAV-to-UAV Communications Based on the Human Immune System in UAV Networks. 22 - Mohammed Habib, Muhammad Ramzan, Sajid Ali Khan:
A Deep Learning and Handcrafted Based Computationally Intelligent Technique for Effective COVID-19 Detection from X-ray/CT-scan Imaging. 23 - Roy Setiawan, Maria Manuel Vianny Devadass, Regin Rajan
, Dilip Kumar Sharma
, Ngangbam Phalguni Singh, K. Amarendra, Rama Koteswara Rao Ganga
, Ramkumar Raja Manoharan, V. Subramaniyaswamy
, Sudhakar Sengan:
IoT Based Virtual E-Learning System for Sustainable Development of Smart Cities. 24 - Jiaojiao Wang, Victor Chang
, Dongjin Yu, Chang Liu, Xiaoyu Ma, Dingguo Yu:
Conformance-oriented Predictive Process Monitoring in BPaaS Based on Combination of Neural Networks. 25 - Haiyang Hu, Jie Chen
, Hanwen Liu, Zhongjin Li, Liguo Huang
:
Natural Language-Based Automatic Programming for Industrial Robots. 26 - Egberto A. R. de Oliveira
, Atslands Rego da Rocha
, Marta Mattoso
, Flávia Coimbra Delicato:
Latency and Energy-Awareness in Data Stream Processing for Edge Based IoT Systems. 27 - Kai Zhang, Xiaohu Zhao, You Peng, Kuncheng Yan, Pengyan Sun:
Analysis of Mobile Communication Network Architecture Based on SDN. 28 - Maryam Ataei Nezhad, Hamid Barati
, Ali Barati
:
An Authentication-Based Secure Data Aggregation Method in Internet of Things. 29 - Samaneh Esmaili, Kamran Kianfar
:
Grid Scheduling Considering Energy Consumption Management and Quality of Service. 30 - Qianjin Ying, Yulei Yu, Donghai Tian
, Xiaoqi Jia, Rui Ma, Changzhen Hu:
CJSpector: A Novel Cryptojacking Detection Method Using Hardware Trace and Deep Learning. 31 - Xiaobin Hong, Jiali Zhang, Yerong Shao, Yeganeh Alizadeh:
An Autonomous Evolutionary Approach to Planning the IoT Services Placement in the Cloud-Fog-IoT Ecosystem. 32 - Quazi Warisha Ahmed, Shruti Garg:
Double Diagonal Puzzle Encryption Standard-512 for Securing Data over Cloud Environment. 33
Volume 20, Number 4, December 2022
- Ping Tian, Huitao Shen, Ahad Abolfathi:
Towards Efficient Ensemble Hierarchical Clustering with MapReduce-based Clusters Clustering Technique and the Innovative Similarity Criterion. 34 - Raiane Coelho, Regina Braga
, José Maria N. David
, Victor Ströele
, Fernanda Campos
, Mario A. R. Dantas
:
A Blockchain-Based Architecture for Trust in Collaborative Scientific Experimentation. 35 - Murilo B. Stockinger, Marcos A. Guerine, Ubiratam de Paula Junior, Filipe Santiago, Yuri Frota, Isabel Rosseti
, Alexandre Plastino, Daniel de Oliveira
:
A Provenance-based Execution Strategy for Variant GPU-accelerated Scientific Workflows in Clouds. 36 - Fikri Aydemir, Fatih Basçiftçi:
Building a Performance Efficient Core Banking System Based on the Microservices Architecture. 37 - Fatemeh Shabestari
, Amir Masoud Rahmani, Nima Jafari Navimipour, Sam Jabbehdari
:
A YARN-based Energy-Aware Scheduling Method for Big Data Applications under Deadline Constraints. 38 - Zhihua Li, Kaiqing Lin, Shunhang Cheng, Lei Yu, Junhao Qian
:
Energy-Efficient and Load-Aware VM Placement in Cloud Data Centers. 39 - Javad Dogani, Farshad Khunjush
, Mehdi Seydali:
K-AGRUED: A Container Autoscaling Technique for Cloud-based Web Applications in Kubernetes Using Attention-based GRU Encoder-Decoder. 40 - Wei Zhang, Jiayu Li, Yuhang Wan, Xu Yao, Maojun Li:
Machine Learning-Based Performance-Efficient MAC Protocol for Single Hop Underwater Acoustic Sensor Networks. 41 - Carmen Carrión
:
Kubernetes as a Standard Container Orchestrator - A Bibliometric Analysis. 42 - Yung Po Tsang
, Chun-Ho Wu
, W. H. Ip
, Carman K. M. Lee
:
Federated-Learning-based Decision Support for Industrial Internet of Things (IIoT)-based Printed Circuit Board Assembly Process. 43 - Wenhu Shi, Hongjian Li, Hang Zeng:
DRL-based and Bsld-Aware Job Scheduling for Apache Spark Cluster in Hybrid Cloud Computing Environments. 44
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.