default search action
Cluster Computing, Volume 23
Volume 23, Number 1, March 2020
Special Issue: Advances in Cloud Computing, Big Data and the Internet of Things;
Special Issue: Advances in High Performance Computing and its Applications;
Special Issue: AMGCC -2018;
Special Issue: High Performance Computing Conference Latin America
- Sara Khairi, Brahim Raouyane, Mostafa Bellafkih:
Novel QoE monitoring and management architecture with eTOM for SDN-based 5G networks. 1-12 - Abdellatif Serhani, Najib Naja, Abdellah Jamali:
AQ-Routing: mobility-, stability-aware adaptive routing protocol for data routing in MANET-IoT systems. 13-27 - Cheyma Ben Njima, Youssef Gamha, Chirine Ghedira Guégan, Lotfi Ben Romdhane:
Development of a mobile web services discovery and composition model. 29-42 - Muhua Liu, Ying Wu, Rui Xue, Rui Zhang:
Verifiable outsourcing computation for modular exponentiation from shareable functions. 43-55 - Jieun Choi, Geunchul Park, Dukyun Nam:
Interference-aware co-scheduling method based on classification of application characteristics from hardware performance counter using data mining. 57-69 - Seontae Kim, Young-ri Choi:
Constraint-aware VM placement in heterogeneous computing clusters. 71-85 - Yisel Gari, David A. Monge, Cristian Mateos, Carlos García Garino:
Learning budget assignment policies for autoscaling scientific workflows in the cloud. 87-105 - Cristian Galleguillos, Zeynep Kiziltan, Alessio Netti, Ricardo Soto:
AccaSim: a customizable workload management simulator for job dispatching research in HPC systems. 107-122 - Thaylon Guedes, Leonardo Araújo de Jesus, Kary A. C. S. Ocaña, Lúcia M. A. Drummond, Daniel de Oliveira:
Provenance-based fault tolerance technique recommendation for cloud-based scientific workflows: a practical approach. 123-148 - Lucia Damiani, Ariel Ivan Diaz, Javier Iparraguirre, Aníbal M. Blanco:
Accelerated particle swarm optimization with explicit consideration of model constraints. 149-164 - Maximiliano Geier, David A. González Márquez, Esteban E. Mocskos:
SherlockFog: a new tool to support application analysis in Fog and Edge computing. 165-176 - Pablo Carvalho, Rommel Anatoli Quintanilla Cruz, Lúcia M. A. Drummond, Cristiana Bentes, Esteban Clua, Edson Cataldo, Leandro A. J. Marzulo:
Kernel concurrency opportunities based on GPU benchmarks characterization. 177-188 - Ying-xin Chen:
Agent-based research on crowd interaction in emergency evacuation. 189-202 - Ying-xin Chen, Pandu R. Tadikamalla, Jennifer Shang, Yan Song:
Supply allocation: bi-level programming and differential evolution algorithm for Natural Disaster Relief. 203-217 - Evangelos Pournaras, Srivatsan Yadhunathan, Ada Diaconescu:
Holarchic structures for decentralized deep learning: a performance analysis. 219-240 - Mahmood Mortazavi-Dehkordi, Kamran Zamanifar:
Efficient deadline-aware scheduling for the analysis of Big Data streams in public Cloud. 241-263 - Chao-Tung Yang, Shuo-Tsung Chen, Jung-Chun Liu, Ren-Hao Liu, Ching-Lung Chang:
On construction of an energy monitoring service using big data technology for the smart campus. 265-288 - Aadil Zia Khan, Ihsan Ayyub Qazi:
RecFlow: SDN-based receiver-driven flow scheduling in datacenters. 289-306 - Mohammad Sharfoddin Khatib, Mohammad Atique:
FGSA for optimal quality of service based transaction in real-time database systems under different workload condition. 307-319 - Babak Aghaei, Midia Reshadi, Mohammad Masdari, Seyed Hadi Sajadi, Mehdi Hosseinzadeh, Aso Mohammad Darwesh:
Network adapter architectures in network on chip: comprehensive literature review. 321-346 - Jiwoong Park, Yongseok Son, Heon Young Yeom, Yoonhee Kim:
SoftDC: software-based dynamically connected transport. 347-357 - Sandra Catalán, Adrián Castelló, Francisco D. Igual, Rafael Rodríguez-Sánchez, Enrique S. Quintana-Ortí:
Programming parallel dense matrix factorizations with look-ahead and OpenMP. 359-375 - Amrita Jyoti, Manish Shrimali:
Dynamic provisioning of resources based on load balancing and service broker policy in cloud computing. 377-395 - Bilal Iqbal, Waheed Iqbal, Nazar Khan, Arif Mahmood, Abdelkarim Erradi:
Canny edge detection and Hough transform for high resolution video streams using Hadoop and Spark. 397-408
Volume 23, Number 2, June 2020
- Guilan Feng, Zhengnan Li, Wengang Zhou, Shi Dong:
Entropy-based outlier detection using spark. 409-419 - Jean-Marc Pierson, Patricia Stolf, Hongyang Sun, Henri Casanova:
MILP formulations for spatio-temporal thermal-aware scheduling in Cloud and HPC datacenters. 421-439 - Saroja Subbaraj, Revathi Thiagarajan:
Hybrid dual-objective parallel genetic algorithm for heterogeneous multiprocessor scheduling. 441-450 - Rajaputhri Maharaja, Prashant Iyer, Zilong Ye:
A hybrid fog-cloud approach for securing the Internet of Things. 451-459 - Seyed Mehdi Mohtavipour, Morteza Mollajafari, Ali Naseri:
A novel packet exchanging strategy for preventing HoL-blocking in fat-trees. 461-482 - Hong Huang, Latifur Khan, Zhou Shaohua:
Classified enhancement model for big data storage reliability based on Boolean satisfiability problem. 483-492 - Wenjing Ma, Yulong Ao, Chao Yang, Samuel Williams:
Solving a trillion unknowns per second with HPGMG on Sunway TaihuLight. 493-507 - Asmaa H. Rabie, Shereen H. Ali, Ahmed I. Saleh, Hesham A. Ali:
A new outlier rejection methodology for supporting load forecasting in smart grids based on big data. 509-535 - Abhishek Mishra, Prasoon Trivedi:
Benchmarking the contention aware nature inspired metaheuristic task scheduling algorithms. 537-553 - Xiaohui Wei, Yuan Zhuang, Hongliang Li, Zhiliang Liu:
Reliable stream data processing for elastic distributed stream processing systems. 555-574 - Mahmoud Mohammed Badawy, Zainab Hassan Ali, Hesham A. Ali:
QoS provisioning framework for service-oriented internet of things (IoT). 575-591 - Hongjian Li, Huochen Wang, Shuyong Fang, Yang Zou, Wenhong Tian:
An energy-aware scheduling algorithm for big data applications in Spark. 593-609 - Bilal Ahmad, Zaib Maroof, Sally I. McClean, Darryl Charles, Gerard Parr:
Economic impact of energy saving techniques in cloud server. 611-621 - Jianyu Fu, Youyou Lu, Jiwu Shu, Guangming Liu, Ming Zhao:
COWCache: effective flash caching for Copy-on-Write virtual disks. 623-639 - Behrouz Pourghebleh, Vahideh Hayyolalam:
A comprehensive and systematic review of the load balancing mechanisms in the Internet of Things. 641-661 - Sara Tabagchi Milan, Lila Rajabion, Aso Mohammad Darwesh, Mehdi Hosseinzadeh, Nima Jafari Navimipour:
Priority-based task scheduling method over cloudlet using a swarm intelligence algorithm. 663-671 - Fang Huang, Bo Tie, Jian Tao, Xicheng Tan, Yan Ma:
Methodology and optimization for implementing cluster-based parallel geospatial algorithms with a case study. 673-704 - Ting Wu, Xianzhang Chen, Kai Liu, Chunhua Xiao, Zhixiang Liu, Qingfeng Zhuge, Edwin H.-M. Sha:
HydraFS: an efficient NUMA-aware in-memory file system. 705-724 - Monther Aldwairi, Abdulmughni Y. Hamzah, Moath H. A. Jarrah:
KPN-based parallelization of Wu-Manber algorithm on multi-core machines. 725-734 - Amin Shokrzade, Fardin Akhlaghian Tab, Mohsen Ramezani:
ELM-NET, a closer to practice approach for classifying the big data using multiple independent ELMs. 735-757 - Mohammad Hadi Mazidi, Mohammad Eshghi, Mohammad Reza Raoufy:
Detection of premature ventricular contraction (PVC) using linear and nonlinear techniques: an experimental study. 759-774 - Sumedha Arora, Anju Bala:
A survey: ICT enabled energy efficiency techniques for big data applications. 775-796 - Seyedeh Yasaman Rashida, Masoud Sabaei, Mohammad Mehdi Ebadzadeh, Amir Masoud Rahmani:
A memetic grouping genetic algorithm for cost efficient VM placement in multi-cloud environment. 797-836 - Hamid Talebian, Abdullah Gani, Mehdi Sookhak, Ahmed Abdelaziz Abdelatif, Abdullah Yousafzai, Athanasios V. Vasilakos, Fei Richard Yu:
Optimizing virtual machine placement in IaaS data centers: taxonomy, review and open issues. 837-878 - Muhammad Umair Sadiq, Muhammad Murtaza Yousaf, Laeeq Aslam, Muhammad Aleem, Shahzad Sarwar, Syed Waqar Jaffry:
NvPD: novel parallel edit distance algorithm, correctness, and performance evaluation. 879-894 - Hyeongwon Jang, Sang Youp Rhee, Jae Eun Kim, Yoonhee Kim, Hyuck Han, Sooyong Kang, Hyungsoo Jung:
AutoBahn: a concurrency control framework for non-volatile file buffer. 895-910 - Ashish Kumar Maurya, Kashish Modi, Vinay Kumar, Nenavath Srinivas Naik, Anil Kumar Tripathi:
Energy-aware scheduling using slack reclamation for cluster systems. 911-923 - Mouna Ben Said, Yessine Hadj Kacem, Mickaël Kerboeuf, Mohamed Abid:
An MDE-based approach for self-adaptive RTES model generation. 925-951 - Ajeet Ram Pathak, Manjusha Pandey, Siddharth S. Rautaray:
Approaches of enhancing interoperations among high performance computing and big data analytics via augmentation. 953-988 - Surendra Singh, Suvadip Batabyal, Sachin Tripathi:
Security aware dynamic scheduling algorithm (SADSA) for real-time applications on grid. 989-1005 - Hanan Ali, Ghada M. Fathy, Zeinab Fayez, Walaa M. Sheta:
Exploring the parallel capabilities of GPU: Berlekamp-Massey algorithm case study. 1007-1024 - Salma Abdel Magid, Francesco Petrini, Behnam Dezfouli:
Image classification on IoT edge devices: profiling and modeling. 1025-1043 - Ali Shahidinejad, Mostafa Ghobaei-Arani, Leila Esmaeili:
An elastic controller using Colored Petri Nets in cloud computing environment. 1045-1071 - Mokhtar A. Alworafi, Suresha Mallappa:
A collaboration of deadline and budget constraints for task scheduling in cloud computing. 1073-1083 - Rashad Elhabob, Yanan Zhao, Nabeil Eltayieb, Abdeldime M. S. Abdelgader, Hu Xiong:
Identity-based encryption with authorized equivalence test for cloud-assisted IoT. 1085-1101 - Moumita Chatterjee, Anirban Mitra, Sudipta Roy, Sanjit Kumar Setua:
Gossip based fault tolerant protocol in distributed transactional memory using quorum based replication system. 1103-1124 - Shi Dong, Raj Jain:
Energy-efficient scheme based on user task characteristic in virtual cloud platform. 1125-1135 - Xingwang Huang, Chaopeng Li, Hefeng Chen, Dong An:
Task scheduling in cloud computing using particle swarm optimization with time varying inertia weight strategies. 1137-1147 - Harkiran Kaur, Sandeep K. Sood, Munish Bhatia:
Cloud-assisted green IoT-enabled comprehensive framework for wildfire monitoring. 1149-1162 - Yunyan Li, Yuansheng Huang, Meimei Zhang, Lila Rajabion:
Service selection mechanisms in the Internet of Things (IoT): a systematic and comprehensive study. 1163-1183 - Poopak Azad, Nima Jafari Navimipour, Amir Masoud Rahmani, Arash Sharifi:
The role of structured and unstructured data managing mechanisms in the Internet of things. 1185-1198 - Mahdi Sarbazi, Mehdi Sadeghzadeh, Seyyed Javad Mir Abedini:
Improving resource allocation in software-defined networks using clustering. 1199-1210 - Jonas Markussen, Lars Bjørlykke Kristiansen, Rune Johan Borgli, Håkon Kvale Stensland, Friedrich Seifert, Michael Riegler, Carsten Griwodz, Pål Halvorsen:
Flexible device compositions and dynamic resource sharing in PCIe interconnected clusters using Device Lending. 1211-1234 - Chirag Dashora, P. Edwin Sudhagar, J. Marietta:
IoT based framework for the detection of vehicle accident. 1235-1250 - Muhammad Ibrahim, Muhammad Azhar Iqbal, Muhammad Aleem, Muhammad Arshad Islam, Nguyen-Son Vo:
MAHA: Migration-based Adaptive Heuristic Algorithm for Large-scale Network Simulations. 1251-1266 - Asif Nawaz, Ashfaq Ahmed Awan, Tariq Ali, Muhammad Rizwan Rashid Rana:
Product's behaviour recommendations using free text: an aspect based sentiment analysis approach. 1267-1279 - Sumit Badotra, Surya Narayan Panda:
Evaluation and comparison of OpenDayLight and open networking operating system in software-defined networking. 1281-1291 - Behzad Chitsaz, Ahmad Khonsari:
General spin-up time distribution for energy-aware IaaS cloud service models. 1293-1301 - Brahim Hmedna, Ali El Mezouary, Omar Baz:
A predictive model for the identification of learning styles in MOOC environments. 1303-1328 - Rajat Saxena, Somnath Dey:
DDoS attack prevention using collaborative approach for cloud computing. 1329-1344 - Ahmad Alnafessah, Giuliano Casale:
Artificial neural networks based techniques for anomaly detection in Apache Spark. 1345-1360 - Ahmad Alnafessah, Giuliano Casale:
Correction to: Artificial neural networks based techniques for anomaly detection in Apache Spark. 1361-1362 - Jitendra Kumar, Ashutosh Kumar Singh:
Cloud datacenter workload estimation using error preventive time series forecasting models. 1363-1379 - Muhammad Saleem, Yasir Saleem, Muhammad Faisal Hayat:
Stochastic QoE-aware optimization of multisource multimedia content delivery for mobile cloud. 1381-1396 - Vikash Kumar, Ditipriya Sinha, Ayan Kumar Das, Subhash Chandra Pandey, Radha Tamal Goswami:
An integrated rule based intrusion detection system: analysis on UNSW-NB15 data set and the real time online dataset. 1397-1418 - Anum Masood, Saima Gulzar Ahmad, Hikmat Ullah Khan, Ehsan Ullah Munir:
Network Reconfiguration Algorithm (NRA) for scheduling communication-intensive graphs in heterogeneous computing environment. 1419-1438 - Manjit Kaur, Dilbag Singh:
Fusion of medical images using deep belief networks. 1439-1453 - Reyhaneh Rabaninejad, Maryam Rajabzadeh Asaar, Mahmoud Ahmadian-Attari, Mohammad Reza Aref:
An identity-based online/offline secure cloud storage auditing scheme. 1455-1468 - Mahmoud Seifallahi, Hadi Soltanizadeh, Afsoon Hassani Mehraban, Fatemeh Khamseh:
Alzheimer's disease detection using skeleton data recorded with Kinect camera. 1469-1481 - Dharmendra Prasad Mahato, Jasminder Kaur Sandhu, Nagendra Pratap Singh, Vishal Kaushal:
On scheduling transaction in grid computing using cuckoo search-ant colony optimization considering load. 1483-1504 - Mohammad Hossein Shafiabadi, Hossein Pedram, Midia Reshadi, Akram Reza:
Comprehensive regression-based model to predict performance of general-purpose graphics processing unit. 1505-1516
Volume 23, Number 3, September 2020
Special Issue : Big Data Analytics in Urban Computing;
Special Issue : Enhancing security using Blockchain for Cyber-Physical System;
Special Issue : WorldCIST19 conference;
Special Issue : DAAC-2018;
Special Issue : Advances in Intelligent Big Data Analytics for Cloud & Cluster Comp;
Special Issue : Nature-Inspired Design of Par & Dist CI;
Special Issue : Blockchain for IoT;
Special Issue : AMGCC -2018;
Special Issue : Data Warehouse and On-line Analysis (EDA)
- Hania Gadouche, Farah Zoubeyr, Abdelkamel Tari:
A correct-by-construction model for attribute-based access control. 1517-1528 - Houari Mahfoud:
Graph pattern matching with counting quantifiers and label-repetition constraints. 1529-1553 - George Roumelis, Polychronis Velentzas, Michael Vassilakopoulos, Antonio Corral, Athanasios Fevgas, Yannis Manolopoulos:
Parallel processing of spatial batch-queries using xBR+-trees in solid-state drives. 1555-1575 - Foudil Abdessamia, Weizhe Zhang, Yu-Chu Tian:
Energy-efficiency virtual machine placement based on binary gravitational search algorithm. 1577-1588 - Zakaria Maamar, Muhammad Asim, Khouloud Boukadi, Thar Baker, Saad Saeed, Ikbel Guidara, Fadwa Yahya, Emir Ugljanin, Djamal Benslimane:
Towards a Quality-of-Thing based approach for assigning things to federations. 1589-1602 - Khaled Khebbeb, Nabil Hameurlain, Faiza Belala:
Formalizing and simulating cross-layer elasticity strategies in Cloud systems. 1603-1631 - M. Indrasena Reddy, A. P. Siva Kumar:
An efficient data transmission approach using IAES-BE. 1633-1645 - Nourelhoda M. Mahmoud, Hassan Fouad, Omar Alsadon, Ahmed M. Soliman:
Detecting dental problem related brain disease using intelligent bacterial optimized associative deep neural network. 1647-1657 - Xu Chen, Xiaoping Cai, Yangyang Zhou, Zhibin Hao:
Development of data monitoring application based on IoT. 1659-1667 - Mohamed Hashem, Ahmed E. Youssef:
Teeth infection and fatigue prediction using optimized neural networks and big data analytic tool. 1669-1682 - Dilip Venkata Kumar Vengala, D. Kavitha, A. P. Siva Kumar:
Secure data transmission on a distributed cloud server with the help of HMCA and data encryption using optimized CP-ABE-ECC. 1683-1696 - Aarti Jain, Manju Khari, Elena Verdú, Shigeru Omatsu, Rubén González Crespo:
A route selection approach for variable data transmission in wireless sensor networks. 1697-1709 - Vadivel Ramasamy, SudalaiMuthu Thalavai Pillai:
An effective HPSO-MGA optimization algorithm for dynamic resource allocation in cloud environment. 1711-1724 - A. Helen Sharmila, Natarajan Jaisankar:
E-MHMS: enhanced MAC-based secure delay-aware healthcare monitoring system in WBAN. 1725-1740 - M. Sridhar, P. B. Pankajavalli:
An optimization of distributed Voronoi-based collaboration for energy-efficient geographic routing in wireless sensor networks. 1741-1754 - Ayed Alwadain, Mohammad Al-Ma'aitah, Aldosary Saad:
Developing computerized speech therapy system using metaheuristic optimized artificial cuckoo immune system. 1755-1767 - Fayez Alqahtani, Zafer Al-Makhadmeh, Amr Tolba, Wael Said:
Internet of things-based urban waste management system for smart cities using a Cuckoo Search Algorithm. 1769-1780 - Ahed Abugabah, Ahmad Ali AlZubi, Feras N. Al-Obeidat, Abdulaziz Alarifi, Ayed Alwadain:
Data mining techniques for analyzing healthcare conditions of urban space-person lung using meta-heuristic optimized neural networks. 1781-1794 - José Chamadoira González, Vicente García-Díaz, Edward Rolando Núñez-Valdéz, Alberto Gómez Gómez, Rubén González Crespo:
Replacing email protocols with blockchain-based smart contracts. 1795-1801 - Andrea Vázquez-Ingelmo, Francisco José García-Peñalvo, Roberto Therón, Daniel Amo Filvà, David Fonseca Escudero:
Connecting domain-specific features to source code: towards the automatization of dashboard generation. 1803-1816 - Yogesh, Ashwani Kumar Dubey, Rajeev Ratan, Álvaro Rocha:
Computer vision based analysis and detection of defects in fruits causes due to nutrients deficiency. 1817-1826 - Angel Marcelo Rea-Guaman, Jezreel Mejía, Tomás San Feliu, José A. Calvo-Manzano:
AVARCIBER: a framework for assessing cybersecurity risks. 1827-1843 - João Vidal de Carvalho, Sandro Carvalho, Álvaro Rocha:
European strategy and legislation for cybersecurity: implications for Portugal. 1845-1854 - Ahmar Rashid, Muhammad Amir Zeb, Amad Rashid, Sajid Anwar, Fernando Joaquim, Zahid Halim:
Conceptualization of smartphone usage and feature preferences among various demographics. 1855-1873 - Paulo Carlos López-López, Pablo Oñate, Álvaro Rocha:
Social media mining, debate and feelings: digital public opinion's reaction in five presidential elections in Latin America. 1875-1886 - Marco Rosa, João Paulo Barraca, Nelson Pacheco da Rocha:
Blockchain structures to guarantee logging integrity of a digital platform to support community-dwelling older adults. 1887-1898 - Yao Lu, Shuyang An:
Research on sports video detection technology motion 3D reconstruction based on hidden Markov model. 1899-1909 - Natalia G. Miloslavskaya, Alexander I. Tolstoy:
IoTBlockSIEM for information security incident management in the internet of things ecosystem. 1911-1925 - (Withdrawn) Intrusion detection and performance simulation based on improved sequential pattern mining algorithm. 1927-1936
- Darwin Alulema, Javier Criado, Luis Iribarne, Antonio Jesús Fernández-García, Rosa Ayala:
A model-driven engineering approach for the service integration of IoT systems. 1937-1954 - Akalanka Mailewa Dissanayaka, Susan A. Mengel, Lisa Gittner, Hafiz Khan:
Security assurance of MongoDB in singularity LXCs: an elastic and convenient testbed using Linux containers to explore vulnerabilities. 1955-1971 - Hanqian Wu, Siliang Cheng, Zhike Wang, Shangbin Zhang, Feng Yuan:
Multi-task learning based on question-answering style reviews for aspect category classification and aspect term extraction on GPU clusters. 1973-1986 - Zilong Jiang, Shu Gao:
An intelligent recommendation approach for online advertising based on hybrid deep neural network and parallel computing. 1987-2000 - Nagaraj Balakrishnan, Arunkumar Rajendran, K. Nisi, Ponnusamy Vijayakumar:
Enhancement of fraternal K-median algorithm with CNN for high dropout probabilities to evolve optimal time-complexity. 2001-2008 - (Withdrawn) Framework for social tag recommendation using Lion Optimization Algorithm and collaborative filtering techniques. 2009-2019
- Maryam AlJame, Imtiaz Ahmad, Mohammad AlFailakawi:
Apache Spark Implementation of Whale Optimization Algorithm. 2021-2034 - Rajani Singh, Ashutosh Dhar Dwivedi, Gautam Srivastava, Agnieszka Wiszniewska-Matyszkiel, Xiaochun Cheng:
A game theoretic analysis of resource mining in blockchain. 2035-2046 - Yazdan Ahmad Qadri, Rashid Ali, Arslan Musaddiq, Fadi Al-Turjman, Dae Wan Kim, Sung Won Kim:
The limitations in the state-of-the-art counter-measures against the security threats in H-IoT. 2047-2065 - Umair Khalid, Muhammad Asim, Thar Baker, Patrick C. K. Hung, Muhammad Adnan Tariq, Laura Rafferty:
A decentralized lightweight blockchain-based authentication mechanism for IoT systems. 2067-2087 - Deepa Pavithran, Khaled Shaalan, Jamal N. Al-Karaki, Amjad Gawanmeh:
Towards building a blockchain framework for IoT. 2089-2103 - Ray Neiheiser, Gustavo Inácio, Luciana Rech, Joni da Silva Fraga:
HRM smart contracts on the blockchain: emulated vs native. 2105-2122 - Syed Muhammad Danish, Marios Lestas, Hassaan Khaliq Qureshi, Kaiwen Zhang, Waqar Asif, Muttukrishnan Rajarajan:
Securing the LoRaWAN join procedure using blockchains. 2123-2138 - Razi Iqbal, Talal Ashraf Butt:
Safe farming as a service of blockchain-based supply chain management for improved transparency. 2139-2150 - Lewis Tseng, Xinyu Yao, Safa Otoum, Moayad Aloqaily, Yaser Jararweh:
Blockchain-based database in an IoT environment: challenges, opportunities, and analysis. 2151-2165 - Minwoo Gu, Younghun Park, Youngjae Kim, Sungyong Park:
Low-overhead dynamic sharing of graphics memory space in GPU virtualization environments. 2167-2178 - Qichen Chen, Jisun Oh, Seoyoung Kim, Yoonhee Kim:
Design of an adaptive GPU sharing and scheduling scheme in container-based cluster. 2179-2191 - Youngrang Kim, Jaehwan Lee, Jik-Soo Kim, Hyunseung Jei, Hongchan Roh:
Comprehensive techniques of multi-GPU memory optimization for deep learning acceleration. 2193-2204 - Neungsoo Park, Soeun Park, Myungho Lee:
High performance parallel KMP algorithm on a heterogeneous architecture. 2205-2217 - Jisun Oh, Yoonhee Kim:
Job placement using reinforcement learning in GPU virtualization environment. 2219-2234 - Sangyeon Woo, Jeho Song, Sanghyeok Kim, Youngjae Kim, Sungyong Park:
GARET: improving throughput using gas consumption-aware relocation in Ethereum sharding environments. 2235-2247 - Jeongchul Kim, Kyungyong Lee:
I/O resource isolation of public cloud serverless function runtimes for data-intensive applications. 2249-2259 - Sunggon Kim, Dongwhan Kim, Yongseok Son, Hyeonsang Eom:
Towards predicting GPGPU performance for concurrent workloads in Multi-GPGPU environment. 2261-2272 - Yunjae Lee, Yoonhee Kim, Heon Y. Yeom:
Lightweight memory tracing for hot data identification. 2273-2285 - Youngrang Kim, Hyeonseong Choi, Jaehwan Lee, Jik-Soo Kim, Hyunseung Jei, Hongchan Roh:
Towards an optimized distributed deep learning framework for a heterogeneous multi-GPU cluster. 2287-2300 - Hwajung Kim, Heon Young Yeom, Yongseok Son:
Design and implementation of an I/O isolation scheme for key-value store on multiple solid-state drives. 2301-2313 - Ahmed Rabhi, Rachida Fissoune:
WODII: a solution to process SPARQL queries over distributed data sources. 2315-2322 - Simon Pierre Dembele, Ladjel Bellatreche, Carlos Ordonez, Amine Roukh:
Think big, start small: a good initiative to design green query optimizers. 2323-2345 - Maha Ben Kraiem, Mohamed Alqarni, Jamel Feki, Franck Ravat:
OLAP operators for social network analysis. 2347-2374 - Sami Belkacem, Kamel Boukhalfa, Omar Boussaid:
Expertise-aware news feed updates recommendation: a random forest approach. 2375-2388 - Mohamed Amine Boudia, Reda Mohamed Hamou, Abdelmalek Amine, Ahmed Chaouki Lokbani:
An adaptation of a F-measure for automatic text summarization by extraction. 2389-2398
Volume 23, Number 4, December 2020
- Mohammad Masdari, Afsane Khoshnevis:
A survey and classification of the workload forecasting methods in cloud computing. 2399-2424 - Sepideh Adabi, Zahra Hossein-Haje, Sahar Adabi:
A new cost-effective mechanism for VM-to-user mapping in cloud data centers. 2425-2451 - Alireza Souri, Amir Masoud Rahmani, Nima Jafari Navimipour, Reza Rezaei:
A hybrid formal verification approach for QoS-aware multi-cloud service composition. 2453-2470 - Nourchène Ouerhani, Ahmed Maalel, Henda Ben Ghézela:
SPeCECA: a smart pervasive chatbot for emergency case assistance based on cloud computing. 2471-2482 - Jun-qing Li, Yun-qi Han:
A hybrid multi-objective artificial bee colony algorithm for flexible task scheduling problems in cloud computing system. 2483-2499 - Yubo Liu, Hongbo Li, Yutong Lu, Zhiguang Chen, Nong Xiao, Ming Zhao:
HasFS: optimizing file system consistency mechanism on NVM-based hybrid storage architecture. 2501-2515 - Vijay Kumar Yadav, Anshu S. Anand, Shekhar Verma, S. Venkatesan:
Private computation of the Schulze voting method over the cloud. 2517-2531 - Mohammad Masdari, Sasan Gharehpasha, Mostafa Ghobaei-Arani, Vafa Ghasemi:
Bio-inspired virtual machine placement schemes in cloud computing environment: taxonomy, review, and future research directions. 2533-2563 - Mehmet Tahir Sandikkaya, Yusuf Yaslan, Cemile Diler Özdemir:
DeMETER in clouds: detection of malicious external thread execution in runtime with machine learning in PaaS clouds. 2565-2578 - Rayapati Venkata Sudhakar, T. Ch. Malleswara Rao:
Security aware index based quasi-identifier approach for privacy preservation of data sets for cloud applications. 2579-2589 - Guohua You, Xuejing Wang:
A server-side accelerator framework for multi-core CPUs and Intel Xeon Phi co-processor systems. 2591-2608 - Sasha Mahdavi Hezavehi, Rouhollah Rahmani:
An anomaly-based framework for mitigating effects of DDoS attacks using a third party auditor in cloud computing environments. 2609-2627 - Mohammad Masdari, Hemn Khezri:
Efficient VM migrations using forecasting techniques in cloud computing: a comprehensive review. 2629-2658 - Nitin Khanna, Monika Sachdeva:
OFFM-ANFIS analysis for flood prediction using mobile IoS, fog and cloud computing. 2659-2676 - Luay Alawneh, Mohammed A. Shehab, Mahmoud Al-Ayyoub, Yaser Jararweh, Ziad A. Al-Sharif:
A scalable multiple pairwise protein sequence alignment acceleration using hybrid CPU-GPU approach. 2677-2688 - Xin Geng, Haitao Zhang, Zhengyang Zhao, Huadong Ma:
Interference-aware parallelization for deep learning workload in GPU cluster. 2689-2702 - Mohammed Alweshah, Maria Al-Sendah, Osama M. Dorgham, Ammar Almomani, Sara Tedmori:
Improved water cycle algorithm with probabilistic neural network to solve classification problems. 2703-2718 - Alireza Abdollahpouri, Chiman Salavati, Jamal Arkat, Fardin Akhlaghian Tab, Zhaleh Manbari:
A multi-objective model for identifying valuable nodes in complex networks with minimum cost. 2719-2733 - Jerzy Proficz:
Process arrival pattern aware algorithms for acceleration of scatter and gather operations. 2735-2751 - Zhiping Peng, Jianpeng Lin, Delong Cui, Qirui Li, Jieguang He:
A multi-objective trade-off framework for cloud resource scheduling based on the Deep Q-network algorithm. 2753-2767 - Carlos Juiz, Belén Bermejo:
The CiS2: a new metric for performance and energy trade-off in consolidated servers. 2769-2788 - A. Ananya, A. Aswathy, T. R. Amal, P. G. Swathy, Vinod P, Mohammad Shojafar:
SysDroid: a dynamic ML-based android malware analyzer using system call traces. 2789-2808 - Bo Wang, Changhai Wang, Ying Song, Jie Cao, Xiao Cui, Ling Zhang:
A survey and taxonomy on workload scheduling and resource provisioning in hybrid clouds. 2809-2834 - Fatemeh Erfan, Hamid Mala:
Secure and efficient publicly verifiable outsourcing of matrix multiplication in online mode. 2835-2845 - Tayyip Özcan, Alper Bastürk:
Human action recognition with deep learning and structural optimization using a hybrid heuristic algorithm. 2847-2860 - Rashmi Shrivastava, Manju Pandey:
Real time fall detection in fog computing scenario. 2861-2870 - Ali Belgacem, Kadda Beghdad Bey, Hassina Nacer, Sofiane Bouznad:
Efficient dynamic resource allocation method for cloud computing environment. 2871-2889 - P. Neelima, A. Rama Mohan Reddy:
An efficient load balancing system using adaptive dragonfly algorithm in cloud computing. 2891-2899 - Zi-xian Liu, De-gan Zhang, Gu-zhao Luo, Ming Lian, Bing Liu:
A new method of emotional analysis based on CNN-BiLSTM hybrid neural network. 2901-2913 - Upasna Joshi, Rajiv Kumar:
A novel deep neural networks based path prediction. 2915-2924 - Yuncheng Jiang:
Semantically-enhanced information retrieval using multiple knowledge sources. 2925-2944 - Elnaz Parvizi, Mohammad Hossein Rezvani:
Utilization-aware energy-efficient virtual machine placement in cloud networks using NSGA-III meta-heuristic approach. 2945-2967 - Ashima Yadav, Dinesh Kumar Vishwakarma:
A comparative study on bio-inspired algorithms for sentiment analysis. 2969-2989 - Neeraj, Major Singh Goraya, Damanpreet Singh:
Satisfaction aware QoS-based bidirectional service mapping in cloud environment. 2991-3011 - Nayereh Rasouli, Ramin Razavi, Hamid Reza Faragardi:
EPBLA: energy-efficient consolidation of virtual machines using learning automata in cloud data centers. 3013-3027 - Marjan Jalali Moghaddam, Akram Esmaeilzadeh, Mina Ghavipour, Ahmad Khadem Zadeh:
Minimizing virtual machine migration probability in cloud computing environments. 3029-3038 - Azlan B. Ismail:
Energy-driven cloud simulation: existing surveys, simulation supports, impacts and challenges. 3039-3055 - E. K. Subramanian, Latha Tamilselvan:
Elliptic curve Diffie-Hellman cryptosystem in big data cloud security. 3057-3067 - Jinsong Wang, Jiping Liao, Wei Huang:
A density-based maximum margin machine classifier. 3069-3078 - Shashank Kumar Mishra, R. Manjula:
A meta-heuristic based multi objective optimization for load distribution in cloud data center under varying workloads. 3079-3093 - Amjad Ullah, Jingpeng Li, Amir Hussain:
Design and evaluation of a biologically-inspired cloud elasticity framework. 3095-3117 - Gopi Bhatt, Madhuri D. Bhavsar:
Performance consequence of user space file systems due to extensive CPU sharing in virtual environment. 3119-3137 - Min Xiang, Yuzhou Jiang, Zhong Xia, Chunmei Huang:
Consistent hashing with bounded loads and virtual nodes-based load balancing strategy for proxy cache cluster. 3139-3155 - Sumedha Arora, Anju Bala:
PAP: power aware prediction based framework to reduce disk energy consumption. 3157-3174 - Eswaraiah Rayachoti, Sudhir Tirumalasetty, Silpa Chaitanya Prathipati:
SLT based watermarking system for secure telemedicine. 3175-3184 - Naela Rizvi, Dharavath Ramesh:
Fair budget constrained workflow scheduling approach for heterogeneous clouds. 3185-3201 - Mahdi Abbasi, Aazad Shokrollahi:
Enhancing the performance of decision tree-based packet classification algorithms using CPU cluster. 3203-3219 - Aws Naser Jaber, Shafiq Ul Rehman:
FCM-SVM based intrusion detection system for cloud computing environment. 3221-3231 - Rahim Taheri, Reza Javidan, Mohammad Shojafar, P. Vinod, Mauro Conti:
Can machine learning model with static features be fooled: an adversarial machine learning approach. 3233-3253 - Tarun Biswas, Pratyay Kuila, Anjan Kumar Ray:
A novel workflow scheduling with multi-criteria using particle swarm optimization for heterogeneous computing systems. 3255-3271 - Suzanne Elashri, Akramul Azim:
Energy-efficient offloading of real-time tasks using cloud computing. 3273-3288 - Ajay Kumar, Seema Bawa:
DAIS: dynamic access and integration services framework for cloud-oriented storage systems. 3289-3308 - Fatma M. Talaat, Shereen H. Ali, Ahmed I. Saleh, Hesham A. Ali:
Effective cache replacement strategy (ECRS) for real-time fog computing environment. 3309-3333 - Mouna Afif, Yahia F. Said, Mohamed Atri:
Computer vision algorithms acceleration using graphic processors NVIDIA CUDA. 3335-3347 - Elham Adibi, Ehsan Mousavi Khaneghah:
ExaRD: introducing a framework for empowerment of resource discovery to support distributed exascale computing systems with high consistency. 3349-3369 - Gregorius Satia Budhi, Raymond Chiong, Sandeep Dhakal:
Multi-level particle swarm optimisation and its parallel version for parameter optimisation of ensemble models: a case of sentiment polarity prediction. 3371-3386 - Damián Fernández-Cerero, Francisco Javier Ortega Irizo, Alejandro Fernández-Montes, Francisco Velasco Morente:
Bullfighting extreme scenarios in efficient hyper-scale cluster computing. 3387-3403 - Koneti Kalyan Chakravarthi, L. Shyamala, Vaidehi V.:
Budget aware scheduling algorithm for workflow applications in IaaS clouds. 3405-3419 - Sadoon Azizi, Maz'har Zandsalimi, Dawei Li:
An energy-efficient algorithm for virtual machine placement optimization in cloud data centers. 3421-3434 - Seyedeh Yasaman Rashida, Masoud Sabaei, Mohammad Mehdi Ebadzadeh, Amir Masoud Rahmani:
An intelligent approach for predicting resource usage by combining decomposition techniques with NFTS network. 3435-3460
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.