


Остановите войну!
for scientists:


default search action
Cluster Computing, Volume 24
Volume 24, Number 1, March 2021
- Rana M. Amir Latif, Muhammad Farhan
, Osama Rizwan, Majid Hussain, Sohail Jabbar, Shahzad Khalid:
Retail level Blockchain transformation for product supply chain using truffle development platform. 1-16 - Abdul Jabbar Siddiqui
, Azzedine Boukerche:
TempoCode-IoT: temporal codebook-based encoding of flow features for intrusion detection in Internet of Things. 17-35 - Omar Alfandi, Salam Ismail Rasheed Khanji, Liza Ahmad, Asad Masood Khattak:
A survey on boosting IoT security and privacy through blockchain. 37-55 - Pantaleone Nespoli
, Félix Gómez Mármol, Jorge Maestre Vidal:
Battling against cyberattacks: towards pre-standardization of countermeasures. 57-81 - Moutaz Alazab
, Salah Alhyari
, Albara W. Awajan
, Ayman Bahjat Abdallah:
Blockchain technology in supply chain management: an empirical study of the factors affecting user adoption/acceptance. 83-101 - Jin Liu
, Dejiao Zeng, Rui Guo, Mingming Lu, Fang-Xiang Wu
, Jianxin Wang:
MMHGE: detecting mild cognitive impairment based on multi-atlas multi-view hybrid graph convolutional networks and ensemble learning. 103-113 - Emmanuel Bugingo, Defu Zhang, Zhaobin Chen, Wei Zheng
:
Towards decomposition based multi-objective workflow scheduling for big data processing in clouds. 115-139 - Tantan Shi
, Genlin Ji, Zhaoyuan Yu, Bin Zhao:
Collective periodic pattern discovery for understanding human mobility. 141-157 - Seungwoo Rho, Geunchul Park, Jieun Choi, Chan-Yeol Park:
Development of benchmark automation suite and evaluation of various high-performance computing systems. 159-179 - Hanul Sung, Jeesoo Min, Donghun Koo, Hyeonsang Eom:
OMBM-ML: efficient memory bandwidth management for ensuring QoS and improving server utilization. 181-193 - Xiujuan Jiang, Nan Zhang, Jinchuan Huang, Ping Zhang, Hui Liu:
Analysis of prediction algorithm for forest land spatial evolution trend in rural planning. 195-203 - Laith Mohammad Abualigah
, Ali Diabat:
A novel hybrid antlion optimization algorithm for multi-objective task scheduling problems in cloud computing environments. 205-223 - Yuanfei Tu, Geng Yang, Jing Wang, Qingjian Su:
A secure, efficient and verifiable multimedia data sharing scheme in fog networking system. 225-247 - Wakar Ahmad
, Bashir Alam, Sanchit Ahuja, Sahil Malik:
A dynamic VM provisioning and de-provisioning based cost-efficient deadline-aware scheduling algorithm for Big Data workflow applications in a cloud environment. 249-278 - Junru Lei, Shuhua Deng, Zebin Lu, Yihao He, Xieping Gao:
Energy-saving traffic scheduling in backbone networks with software-defined networks. 279-292 - Tehsin Kanwal, Adeel Anjum, Abid Khan
:
Privacy preservation in e-health cloud: taxonomy, privacy requirements, feasibility analysis, and opportunities. 293-317 - Ali Shahidinejad
, Mostafa Ghobaei-Arani
, Mohammad Masdari:
Resource provisioning using workload clustering in cloud computing environment: a hybrid approach. 319-342 - Samaneh Sadat Mousavi Nik, Mahmoud Naghibzadeh, Yasser Sedaghat:
Task replication to improve the reliability of running workflows on the cloud. 343-359 - Sarra Slimani, Tarek Hamrouni, Faouzi Ben Charrada:
Service-oriented replication strategies for improving quality-of-service in cloud computing: a survey. 361-392 - N. G. Bhuvaneswari Amma
, S. Selvakumar
:
A statistical class center based triangle area vector method for detection of denial of service attacks. 393-415 - Asif Muhammad, Muhammad Aleem
, Muhammad Arshad Islam:
TOP-Storm: A topology-based resource-aware scheduler for Stream Processing Engine. 417-431 - Ouafae Kasmi, Amine Baïna, Mostafa Bellafkih
:
Fuzzy logic based clustering algorithm for management in critical infrastructure. 433-458 - Hui Li, Lishuang Pei, Dan Liao
, Xiong Wang, Du Xu, Jian Sun:
BDDT: use blockchain to facilitate IoT data transactions. 459-473 - Yan He, Liang Feng Zhang
:
Multi-matrix verifiable computation. 475-488 - Mesmin J. Mbyamm Kiki, Jianbiao Zhang, Bonzou Adolphe Kouassi:
MapReduce FCM clustering set algorithm. 489-500 - Sumit Badotra, Surya Narayan Panda
:
SNORT based early DDoS detection system using Opendaylight and open networking operating system in software defined networking. 501-513 - Zhihui He, Hu Peng
, Jianqiang Chen, Changshou Deng, Zhijian Wu:
A Spark-based differential evolution with grouping topology model for large-scale global optimization. 515-535 - Mei-Ling Chiang
, Hui-Sheng Cheng, Hsien-Yi Liu, Ching-Yi Chiang:
SDN-based server clusters with dynamic load balancing and performance improvement. 537-558 - Saima Majeed, Ammar Ul Hassan, Jaeyoung Choi
:
Rendering high-quality PK bitmap font in Linux environment. 559-568 - Abdul Wahid
, Annavarapu Chandra Sekhara Rao:
ODRA: an outlier detection algorithm based on relevant attribute analysis method. 569-585 - Retraction Note to: A FCM cluster: cloud networking model for intelligent transportation in the city of Macau. 587
- Retraction Note to: Mobile network intrusion detection for IoT system based on transfer learning algorithm. 589
Volume 24, Number 2, June 2021
- Ahmadreza Montazerolghaem
:
Software-defined load-balanced data center: design, implementation and performance analysis. 591-610 - Félix García Carballeira, Alejandro Calderón, Jesús Carretero
:
Enhancing the power of two choices load balancing algorithm using round robin policy. 611-624 - Zoltan Juhasz
:
Quantitative cost comparison of on-premise and cloud infrastructure based EEG data processing. 625-641 - Neetesh Kumar, Deo Prakash Vidyarthi
:
A novel energy-efficient scheduling model for multi-core systems. 643-666 - Amir Iranmanesh, Hamid Reza Naji:
DCHG-TS: a deadline-constrained and cost-effective hybrid genetic algorithm for scientific workflow scheduling in cloud computing. 667-681 - Vaibhav Pandey
, Poonam Saini:
A heuristic method towards deadline-aware energy-efficient mapreduce scheduling problem in Hadoop YARN. 683-699 - Weihong Chen, Guoqi Xie
, Renfa Li, Keqin Li:
Execution cost minimization scheduling algorithms for deadline-constrained parallel applications on heterogeneous clouds. 701-715 - Parminder Singh
, Avinash Kaur
, Pooja Gupta
, Sukhpal Singh Gill
, Kiran Jyoti:
RHAS: robust hybrid auto-scaling for web applications in cloud computing. 717-737 - Muhammad Tahir, Muhammad Sardaraz
, Zahid Mehmood
, Shakoor Muhammad:
CryptoGA: a cryptosystem based on genetic algorithm for cloud data security. 739-752 - Hamidreza Koohi
, Kourosh Kiani:
Two new collaborative filtering approaches to solve the sparsity problem. 753-765 - Neha Garg
, Damanpreet Singh
, Major Singh Goraya:
Energy and resource efficient workflow scheduling in a virtualized cloud environment. 767-797 - Stefan Kehrer, Dominik Zietlow, Jochen Scheffold, Wolfgang Blochinger:
Self-tuning serverless task farming using proactive elasticity control. 799-817 - Reza Sookhtsaraei
, Marzieh Iraji, Javad Artin
, Mohammad Saber Iraji:
Increasing the quality of services and resource utilization in vehicular cloud computing using best host selection methods. 819-835 - Yosef Ashibani
, Qusay H. Mahmoud
:
Design and evaluation of a user authentication model for IoT networks based on app event patterns. 837-850 - Nikita Singh
, Tarun Kumar, Manu Vardhan:
Blockchain-based e-cheque clearing framework with trust based consensus mechanism. 851-865 - Rakesh Ranjan Kumar
, Binita Kumari, Chiranjeev Kumar:
CCS-OSSR: A framework based on Hybrid MCDM for Optimal Service Selection and Ranking of Cloud Computing Services. 867-883 - Amit Chhabra
, Gurvinder Singh, Karanjeet Singh Kahlon:
Multi-criteria HPC task scheduling on IaaS cloud infrastructures using meta-heuristics. 885-918 - Mehran Tarahomi, Mohammad Izadi, Mostafa Ghobaei-Arani
:
An efficient power-aware VM allocation mechanism in cloud data centers: a micro genetic-based approach. 919-934 - Peng Zhang, Chao Yang
, Yulong Ao:
AutoWM: a novel domain-specific tool for universal multi-/many-core accelerations of the WRF cloud microphysics. 935-951 - Likhesh Kolhe, Ashok Kumar Jetawat, Vaishali Khairnar:
Robust product recommendation system using modified grey wolf optimizer and quantum inspired possibilistic fuzzy C-means. 953-968 - Pramod Yelmewad
, Basavaraj Talawar:
Parallel deterministic local search heuristic for minimum latency problem. 969-995 - Sara Nasirian
, Farhad Faghani
:
Platonica: an efficient and high-performance dual-centric data center network architecture. 997-1032 - Viviana Elizabeth Cajas, Matias Urbieta
, Gustavo Rossi, Yves Rybarczyk:
Migrating legacy Web applications. 1033-1049 - Luan Teylo
, Luciana Arantes, Pierre Sens, Lúcia M. A. Drummond
:
A dynamic task scheduler tolerant to multiple hibernations in cloud environments. 1051-1073 - Fatemeh Ebadifard, Seyed Morteza Babamir
:
Autonomic task scheduling algorithm for dynamic workloads through a load balancing technique for the cloud-computing environment. 1075-1101 - Sarah Maroc
, Jian Biao Zhang:
Cloud services security-driven evaluation for multiple tenants. 1103-1121 - Prathibha Soma
, B. Latha
:
Response Surface Modelling for Performance Analysis of Scientific Workflow Application in Cloud. 1123-1134 - Emad Mirsadeghi, Salman Khodayifar:
Hybridizing particle swarm optimization with simulated annealing and differential evolution. 1135-1163 - Jia Hao
, Kun Yue, Liang Duan, Binbin Zhang, Xiaodong Fu:
Predicting QoS of virtual machines via Bayesian network with XGboost-induced classes. 1165-1184 - Farhad Rad
, Midia Reshadi
, Ahmad Khademzadeh:
A novel arbitration mechanism for crossbar switch in wireless network-on-chip. 1185-1198 - Soodeh Hosseini:
Defense against malware propagation in complex heterogeneous networks. 1199-1215 - Yatheendraprakash Govindaraju, Hector A. Duran-Limon, Efrén Mezura-Montes
:
A regression tree predictive model for virtual machine startup time in IaaS clouds. 1217-1233 - Tohid Jafarian, Mohammad Masdari, Ali Ghaffari
, Kambiz Majidzadeh
:
A survey and classification of the security anomaly detection mechanisms in software defined networks. 1235-1253 - Fares Alharbi, Yu-Chu Tian
, Maolin Tang, Md Hasanul Ferdaus, Weizhe Zhang, Zu-Guo Yu:
Simultaneous application assignment and virtual machine placement via ant colony optimization for energy-efficient enterprise data centers. 1255-1275 - Sumit Kumar
, Rajeev Tiwari
:
An efficient content placement scheme based on normalized node degree in content centric networking. 1277-1291 - Sasan Gharehpasha, Mohammad Masdari, Ahmad Jafarian:
Power efficient virtual machine placement in cloud data centers with a discrete and chaotic hybrid optimization algorithm. 1293-1315 - Song Jin, Songwei Pei, Yu Wang, Yincheng Qi:
A parallel sparse triangular solve algorithm based on dependency elimination of the solution vector. 1317-1330 - Yanhui Liu
, Jianbiao Zhang, Jing Zhan:
Privacy protection for fog computing and the internet of things data based on blockchain. 1331-1345 - Amir Masoud Rahmani, Zahra Babaei, Alireza Souri
:
Event-driven IoT architecture for data analysis of reliable healthcare application using complex event processing. 1347-1360 - Rahul Mishra
, Dharavath Ramesh
, Damodar Reddy Edla:
Dynamic large branching hash tree based secure and efficient dynamic auditing protocol for cloud environment. 1361-1379 - R. Sridharan, S. Domnic:
Network policy aware placement of tasks for elastic applications in IaaS-cloud environment. 1381-1396 - Guijun Wang, Weiming Xiao, Yujie Tao:
Interpolation neural network constructed by the step path and its approximation performance. 1397-1411 - Saima Mehraj
, M. Tariq Banday
:
A flexible fine-grained dynamic access control approach for cloud computing environment. 1413-1434 - Benamar Bouyeddou, Fouzi Harrou
, Benamar Kadri, Ying Sun:
Detecting network cyber-attacks using an integrated statistical approach. 1435-1453 - Sabitha S
, M. S. Rajasree:
Multi-level on-demand access control for flexible data sharing in cloud. 1455-1478 - Ali Mohammadzadeh
, Mohammad Masdari, Farhad Soleimanian Gharehchopogh
, Ahmad Jafarian:
A hybrid multi-objective metaheuristic optimization algorithm for scientific workflow scheduling. 1479-1503 - Fan Deng, Zhenhua Yu
, Houbing Song
, Rongyi Zhao, Qi Zheng, Zhenyu Li, Huansheng He, Yixin Zhang, Fangzhi Guo:
An efficient policy evaluation engine with locomotive algorithm. 1505-1524 - Kamalakanta Sethi, Ankit Pradhan
, Padmalochan Bera:
PMTER-ABE: a practical multi-authority CP-ABE with traceability, revocation and outsourcing decryption for secure access control in cloud systems. 1525-1550 - Messaouda Ayachi
, Hassina Nacer, Hachem Slimani
:
Cooperative game approach to form overlapping cloud federation based on inter-cloud architecture. 1551-1577 - Messaouda Ayachi
, Hassina Nacer, Hachem Slimani
:
Correction to: Cooperative game approach to form overlapping cloud federation based on inter-cloud architecture. 1579-1582
Volume 24, Number 3, September 2021
- Jin-Bang Hsu, Chi-Fang Lin, Yang-Cheng Chang, Ren-Hao Pan
:
Using independent resource allocation strategies to solve conflicts of Hadoop distributed architecture in virtualization. 1583-1603 - Prateek Agrawal
, Anatoliy Zabrovskiy, Adithyan Ilangovan, Christian Timmerer, Radu Prodan:
FastTTPS: fast approach for video transcoding time prediction and scheduling for HTTP adaptive streaming videos. 1605-1621 - A. Justin Gopinath, Nithya Balasubramanian:
Performance evaluation of grouping and regrouping scheme for mitigating hidden station problem in IEEE 802.11ah network. 1623-1642 - Sunakshi Singh
, Vijay Kumar Chaurasiya:
Mutual authentication scheme of IoT devices in fog computing environment. 1643-1657 - Eduardo Viegas
, Altair O. Santin
, Juliana Bachtold, Darlan Segalin, Maicon Stihler, Arlindo L. Marcon Jr., Carlos Maziero:
Enhancing service maintainability by monitoring and auditing SLA in cloud computing. 1659-1674 - Vikram Puri, Ishaani Priyadarshini, Raghvendra Kumar, Chung Van Le:
Smart contract based policies for the Internet of Things. 1675-1694 - Mattia Zago
, Manuel Gil Pérez
, Gregorio Martínez Pérez:
Early DGA-based botnet identification: pushing detection to the edges. 1695-1710 - Ghazaleh Khojasteh Toussi, Mahmoud Naghibzadeh
:
A divide and conquer approach to deadline constrained cost-optimization workflow scheduling for the cloud. 1711-1733 - Dimitrios Tychalas
, Helen D. Karatza:
SaMW: a probabilistic meta-heuristic algorithm for job scheduling in heterogeneous distributed systems powered by microservices. 1735-1759 - Jasleen Kaur, Supreet Kaur:
Novel trust evaluation using NSGA-III based adaptive neuro-fuzzy inference system. 1781-1792 - Yashwant Singh Patel
, Manoj Reddy, Rajiv Misra
:
Energy and cost trade-off for computational tasks offloading in mobile multi-tenant clouds. 1793-1824 - Maryam Keshavarznejad, Mohammad Hossein Rezvani
, Sepideh Adabi
:
Delay-aware optimization of energy consumption for task offloading in fog environments using metaheuristic algorithms. 1825-1853 - Yashwant Singh Patel
, Zahra Malwi, Animesh Nighojkar, Rajiv Misra
:
Truthful online double auction based dynamic resource provisioning for multi-objective trade-offs in IaaS clouds. 1855-1879 - Shubhra Dwivedi, Manu Vardhan, Sarsij Tripathi
:
Building an efficient intrusion detection system using grasshopper optimization algorithm for anomaly detection. 1881-1900 - Xiao-huan Liu
, Degan Zhang, Jie Zhang, Ting Zhang, Haoli Zhu:
A path planning method based on the particle swarm optimization trained fuzzy neural network algorithm. 1901-1915 - Priyanka Verma
, Shashikala Tapaswi, W. Wilfred Godfrey:
A request aware module using CS-IDR to reduce VM level collateral damages caused by DDoS attack in cloud environment. 1917-1933 - Haythem Bany Salameh
, Ayat Shamekh:
Adaptive Packet-size Control for Improved Throughput in Dynamic Access Networks. 1935-1944 - Houda Guesmi
, Anwar Kalghoum, Cherif Ghazel, Leïla Azouz Saïdane:
FFED: a novel strategy based on fast entropy to detect attacks against trust computing in cloud. 1945-1954 - Gurleen Kaur
, Anju Bala:
OPSA: an optimized prediction based scheduling approach for scientific applications in cloud environment. 1955-1974 - Minho Ryu, Geonseok Lee, Kichun Lee
:
Online sequential extreme studentized deviate tests for anomaly detection in streaming data with varying patterns. 1975-1987 - Bilin Shao, Yanyan Ji
:
Efficient TPA-based auditing scheme for secure cloud storage. 1989-2000 - Rahul Yadav
, Weizhe Zhang, Keqin Li, Chuanyi Liu, Asif Ali Laghari
:
Managing overloaded hosts for energy-efficiency in cloud data centers. 2001-2015 - Radwa El Shawi, Abdul Wahab, Ahmed Barnawi, Sherif Sakr
:
DLBench: a comprehensive experimental evaluation of deep learning frameworks. 2017-2038 - Liwei Fu, Shunfu Jin
:
Nash equilibrium and social optimization in cloud service systems with diverse users. 2039-2050 - Ahmed Elkhalil
, Jiashu Zhang, Rashad Elhabob:
An efficient heterogeneous blockchain-based online/offline signcryption systems for internet of vehicles. 2051-2068 - Kahlessenane Fares, Amine Khaldi
, Redouane Kafi
, Salah Euschi
:
A robust blind medical image watermarking approach for telemedicine applications. 2069-2082 - Jeng-Shyang Pan
, Jie Shan, Shiguang Zheng, Shu-Chuan Chu
, Cheng-Kuo Chang
:
Wind power prediction based on neural network with optimization of adaptive multi-group salp swarm algorithm. 2083-2098 - Meenal Jain
, Gagandeep Kaur:
Distributed anomaly detection using concept drift detection based hybrid ensemble techniques in streamed network data. 2099-2114 - Wei Luo
, Wenping Ma, Juntao Gao:
MHB*T based dynamic data integrity auditing in cloud storage. 2115-2132 - Mohammad Asad Abbasi, Zulfiqar Ali Memon
, Nouman M. Durrani, Waleej Haider, Kashif Laeeq, Ghulam Ali Mallah:
A multi-layer trust-based middleware framework for handling interoperability issues in heterogeneous IOTs. 2133-2160 - Laith Mohammad Abualigah
, Akram Jamal Dulaimi:
A novel feature selection method for data mining tasks using hybrid Sine Cosine Algorithm and Genetic Algorithm. 2161-2176 - K. C. Lalropuia, Vandana Khaitan nee Gupta
:
Availability and reliability analysis of cloud computing under economic denial of sustainability (EDoS) attack: a semi-Markov approach. 2177-2191