![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Journal of Cloud Computing, Volume 9
Volume 9, 2020
- Rasha Makhlouf
:
Cloudy transaction costs: a dive into cloud computing economics. 1 - Maria Th. Kotouza
, Fotis E. Psomopoulos, Pericles A. Mitkas:
A dockerized framework for hierarchical frequency-based document clustering on cloud computing infrastructures. 2 - Keisuke Inokuchi, Kenichi Kourai
:
Secure VM management with strong user binding in semi-trusted clouds. 3 - Quanhua Hou, Yaotian Xing, Di Wang
, Jiachen Liu, Xiao-Yang Fan, Ya-Qiong Duan
:
Study on coupling degree of rail transit capacity and land use based on multivariate data from cloud platform. 4 - Zhiping Jiang, Kun Zhao, Rui Li, Jizhong Zhao, Junzhao Du:
PHYAlert: identity spoofing attack detection and prevention for a wireless edge network. 5 - Mahdi Abbasi
, Milad Rafiee
, Mohammad Reza Khosravi, Alireza Jolfaei
, Varun G. Menon
, Javad Mokhtari Koushyar:
An efficient parallel genetic algorithm solution for vehicle routing problem in cloud implementation of the intelligent transportation systems. 6 - Rui Song, Zhiyi Xiao, Jinjiao Lin, Ming Liu:
CIES: Cloud-based Intelligent Evaluation Service for video homework using CNN-LSTM network. 7 - Ibrahim Adel Ibrahim
, Mostafa A. Bassiouni:
Improvement of job completion time in data-intensive cloud computing applications. 8 - Asharul Islam
, Anoop Kumar, Khalid Mohiuddin, Sadaf Yasmin, Mohammed Abdul Khaleel
, Mohammad Rashid Hussain:
Efficient resourceful mobile cloud architecture (mRARSA) for resource demanding applications. 9 - Li Kuang, Shenmei Tu, Yangqi Zhang, Xiaoxian Yang
:
Providing privacy preserving in next POI recommendation for Mobile edge computing. 10 - Liqun Ding:
Multimodal transport information sharing platform with mixed time window constraints based on big data. 11 - Jiawei Huang, Weihe Li, Qi Li, Tao Zhang, Pingping Dong, Jianxin Wang:
Tuning high flow concurrency for MPTCP in data center networks. 13 - Nicola Dimitri
:
Pricing cloud IaaS computing services. 14 - Mohsen Ghorbani, Mahdi Bahaghighat
, Qin Xin, Figen Özen
:
ConvLSTMConv network: a deep learning approach for sentiment analysis in cloud computing. 16 - Tiantian Wang, Kechao Wang, Xiaohong Su:
Fault localization by analyzing failure propagation with samples in cloud computing environment. 17 - Awangku Muhammad Iqbal Yura, S. H. Shah Newaz, Fatin Hamadah Rahman, Thien-Wan Au, Gyu Myoung Lee, Tai-Won Um:
Evaluating TCP performance of routing protocols for traffic exchange in street-parked vehicles based fog computing infrastructure. 18 - Xinxin Du, Zhangbing Zhou, Yuqing Zhang, Taj Rahman:
Energy-efficient sensory data gathering based on compressed sensing in IoT networks. 19 - Xianrui Yang, Yuming Liu, Jiehong Wang, Zhao Yao, Yanping Zhou, Shucun Fu:
Flexible automatic detection for security management of dispatching data network. 20 - Huaming Wu, Xiangyi Li, Yingjun Deng:
Deep learning-driven wireless communication for edge-cloud computing: opportunities and challenges. 21 - Wei Tian, Lei Yi, Wei Liu, Wei Huang, Guangyi Ma, Yonghong Zhang:
Ground radar precipitation estimation with deep learning approaches in meteorological private cloud. 22 - Qianmu Li, XiaoChun Yin, Shunmei Meng, Yaozong Liu, Zijian Ying:
A security event description of intelligent applications in edge-cloud environment. 23 - Changjun Fan, Li Zeng, Yanghe Feng, Baoxin Xiu, Jincai Huang, Zhong Liu:
Revisiting the power of reinsertion for optimal targets of network attack. 24 - Weilong Ding
, Yanqing Xia, Zhe Wang, Zhenyu Chen
, Xingyu Gao
:
An ensemble-learning method for potential traffic hotspots detection on heterogeneous spatio-temporal data in highway domain. 25 - Hao Zhang, Tao Huang, Sanya Liu, Hao Yin, Jia Li, Huali Yang, Yu Xia:
A learning style classification approach based on deep belief network for large-scale online education. 26 - Wei Wang, Hui Lin, Junshu Wang:
CNN based lane detection with instance segmentation in edge-cloud computing. 27 - Salman Raza
, Wei Liu, Manzoor Ahmed, Muhammad Rizwan Anwar
, Muhammad Ayzed Mirza
, Qibo Sun, Shangguang Wang
:
An efficient task offloading scheme in vehicular edge computing. 28 - Wei Gao, Yaojun Chen:
Approximation analysis of ontology learning algorithm in linear combination setting. 29 - Krzysztof Zatwarnicki
:
Two-level fuzzy-neural load distribution strategy in cloud-based web system. 30 - Jingyu Liu, Jing Wu, Linan Sun, Hailong Zhu:
Image data model optimization method based on cloud computing. 31 - Zhanyang Xu, Yanqi Zhang, Haoyuan Li, Weijing Yang, Quan Qi:
Dynamic resource provisioning for cyber-physical systems in cloud-fog-edge computing. 32 - Mu Zhang, Song Wang, Qing Gao:
A joint optimization scheme of content caching and resource allocation for internet of vehicles in mobile edge computing. 33 - Tom Goethals
, Filip De Turck
, Bruno Volckaert:
Near real-time optimization of fog service placement for responsive edge computing. 34 - Chao Liu
, Jianbo Gao, Yue Li, Huihui Wang
, Zhong Chen:
Studying gas exceptions in blockchain-based cloud applications. 35 - Qingren Wang, Chuankai Feng, Yan Xu
, Hong Zhong, Victor S. Sheng:
A novel privacy-preserving speech recognition framework using bidirectional LSTM. 36 - Yi-hua Chen:
Intelligent algorithms for cold chain logistics distribution optimization based on big data cloud computing analysis. 37 - Zeng Zeng, Hang Che, Weiwei Miao, Jin Huang, Hao Tang, Mingxuan Zhang, Shaqian Zhang:
Towards secure and network state aware bitrate adaptation at IoT edge. 38 - Yannian Hu, Hui Wang, Wenge Ma:
Intelligent cloud workflow management and scheduling method for big data applications. 39 - Pan Fan, Jing Liu, Wei Yin, Hui Wang, Xiaohong Chen, Haiying Sun:
2PC*: a distributed transaction concurrency control protocol of multi-microservice based on cloud computing platform. 40 - Zongwei Zhu, Jing Cao
, Tiancheng Hao, Wenjie Zhai, Bin Sun, Gangyong Jia, Ming Li:
Highly secure edge-intelligent electric motorcycle management system for elevators. 41 - Syed Rizvi
, John E. Mitchell
, Abdul Razaque
, Mohammad Rizvi, Iyonna Williams:
A fuzzy inference system (FIS) to evaluate the security readiness of cloud service providers. 42 - Chen Ling, Weizhe Zhang
, Hui He, Yu-Chu Tian
:
Network perception task migration in cloud-edge fusion computing. 43 - Mitchell Nelson, Zachary Sorenson, Joseph M. Myre, Jason Sawin
, David Chiu:
Parallel acceleration of CPU and GPU range queries over large data sets. 44 - David Mytton
:
Assessing the suitability of the Greenhouse Gas Protocol for calculation of emissions from public cloud computing workloads. 45 - Klervie Toczé
, Johan Lindqvist, Simin Nadjm-Tehrani:
Characterization and modeling of an edge computing mixed reality workload. 46 - Geeta C. Mara
, Usharani Rathod, Shreyas Raju R. G., Raghavendra S., Rajkumar Buyya
, K. R. Venugopal, S. Sitharama Iyengar, L. M. Patnaik:
CRUPA: collusion resistant user revocable public auditing of shared data in cloud. 47 - Shun Liu, Guosheng Huang, Jinsong Gui, Tian Wang
, Xiong Li
:
Energy-aware MAC protocol for data differentiated services in sensor-cloud computing. 48 - Orazio Tomarchio, Domenico Calcaterra, Giuseppe Di Modica
:
Cloud resource orchestration in the multi-cloud landscape: a systematic review of existing frameworks. 49 - Jahwan Koo, Nawab Muhammad Faseeh Qureshi
, Isma Farah Siddiqui, Asad Abbas, Ali Kashif Bashir:
IoT-enabled directed acyclic graph in spark cluster. 50 - Wen Mo, Tian Wang
, Shaobo Zhang
, Jinhuan Zhang
:
An active and verifiable trust evaluation approach for edge computing. 51 - Meiyu Pang, Li Wang, Ningsheng Fang:
A collaborative scheduling strategy for IoV computing resources considering location privacy protection in mobile edge computing environment. 52 - Jiankun Sun, Xiong Luo
, Honghao Gao, Weiping Wang, Yang Gao, Xi Yang:
Categorizing Malware via A Word2Vec-based Temporal Convolutional Network Scheme. 53 - Hong Zhong, Yingxue Geng, Jie Cui
, Yan Xu, Lu Liu
:
A weight-based conditional privacy-preserving authentication scheme in software-defined vehicular network. 54 - Wei Sun
, Xiaorui Zhang, Xiaozheng He:
Lightweight image classifier using dilated and depthwise separable convolutions. 55 - Zhi Liu, Bo Qiao, Kui Fang:
Joint optimization strategy for QoE-aware encrypted video caching and content distributing in multi-edge collaborative computing environment. 56 - Liang Jiang, Lu Liu
, Jingjing Yao, Lei-Lei Shi:
A hybrid recommendation model in social media based on deep emotion analysis and multi-source view fusion. 57 - Xiaoping Zhao, Kaiyang Lv, Zhongyang Zhang, Yonghong Zhang, Yifei Wang:
A multi-fault diagnosis method of gear-box running on edge equipment. 58 - Dong Li, Chuanjian Wang, Qilei Wang, Tianying Yan
, Wanlong Bing, Ju Wang:
Grazing trajectory statistics and visualization platform based on cloud GIS. 59 - Xiuqing Lu, Zhenkuan Pan, Hequn Xian:
An efficient and secure data sharing scheme for mobile devices in cloud computing. 60 - Shynu Padinjappurathu Gopalan, Nadesh R. K., Varun G. Menon
, Venu P
, Mahdi Abbasi
, Mohammad Reza Khosravi:
A secure data deduplication system for integrated cloud-edge networks. 61 - Robin Gassais, Naser Ezzati-Jivan
, Jose M. Fernandez, Daniel Aloise, Michel R. Dagenais:
Multi-level host-based intrusion detection system for Internet of things. 62 - Hanan A. Hassan, Aya I. Maiyza
, Walaa M. Sheta:
Integrated resource management pipeline for dynamic resource-effective cloud data center. 63 - S. M. Reza Dibaj
, Ali Miri, Seyedakbar Mostafavi
:
A cloud priority-based dynamic online double auction mechanism (PB-DODAM). 64 - Tengfei Li
, Jing Liu, Haiying Sun, Xiang Chen, Lipeng Zhang, Junfeng Sun:
A spatio-temporal specification language and its completeness & decidability. 65 - Vandung Nguyen
, Tran Trong Khanh, Tri D. T. Nguyen, Choong Seon Hong
, Eui-Nam Huh:
Flexible computation offloading in a fuzzy-based mobile edge orchestrator for IoT applications. 66 - Banu Çalis Uslu, Ertug Okay, Erkan Dursun:
Analysis of factors affecting IoT-based smart hospital design. 67 - Leonel Moyou Metcheka, René Ndoundam
:
Distributed data hiding in multi-cloud storage environment. 68 - Liang Jiang, Lu Liu
, Jingjing Yao, Lei-Lei Shi:
A user interest community evolution model based on subgraph matching for social networking in mobile edge computing environments. 69
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.