default search action
Computing, Volume 106
Volume 106, Number 1, January 2024
- K. Dinesh Kumar, E. Umamaheswari:
An efficient proactive VM consolidation technique with improved LSTM network in a cloud environment. 1-28 - Zhen-Fei Wang, Pei-Yao Yuan, Zhong-Ya Cao, Li-Ying Zhang:
Feature reduction of unbalanced data classification based on density clustering. 29-55 - Zhenqian Wang, Huigui Rong:
An energy-efficient multi-stage alternating optimization scheme for UAV-mounted mobile edge computing networks. 57-80 - Gholam Hossein Abdi, Amir Hossein Refahi Sheikhani, Sohrab Kordrostami, Armin Ghane, Shahram Babaie:
A novel selfish node detection based on reputation and game theory in Internet of Things. 81-107 - Navid Khaledian, Keyhan Khamforoosh, Reza Akraminejad, Laith Abualigah, Danial Javaheri:
An energy-efficient and deadline-aware workflow scheduling algorithm in the fog and cloud environment. 109-137 - Kushal Kanwar, Sakshi Kaushal, Harish Kumar, Gaurav Gupta, Manju Khari:
An efficient method for node ranking in complex networks by hybrid neighbourhood coreness. 139-161 - David Rodríguez Torrado, José M. del Álamo, Miguel Cozar, Boni García:
ROI: a method for identifying organizations receiving personal data. 163-184 - Fatih Saglam, Mehmet Ali Cengiz:
Local resampling for locally weighted Naïve Bayes in imbalanced data. 185-200 - Zari Shamsa, Ali Rezaee, Sahar Adabi, Amir Masoud Rahmani:
A decentralized prediction-based workflow load balancing architecture for cloud/fog/IoT environments. 201-239 - Nikos Tsalikidis, Aristeidis Mystakidis, Christos Tjortjis, Paraskevas Koukaras, Dimosthenis Ioannidis:
Energy load forecasting: one-step ahead hybrid model utilizing ensembling. 241-273 - W. M. K. S. Ilmini, T. G. I. Fernando:
Detection and explanation of apparent personality using deep learning: a short review of current approaches and future directions. 275-294
Volume 106, Number 2, February 2024
- Xin Xu, Tao Ye, Jieying Gao, Dongxiao Chu:
Generalized hurdle count data models based on interpretable machine learning with an application to health care demand. 295-325 - Chencheng Fan, Zhixiao Wang, Jian Zhang, Jiayu Zhao, Xiaobin Rui:
Influence maximization in social networks based on discrete harris hawks optimization algorithm. 327-351 - Kalaichelvi Nallusamy, K. S. Easwarakumar:
PERMDEC: community deception in weighted networks using permanence. 353-370 - Seyed Danial Alizadeh Javaheri, Reza Ghaemi, Hossein Monshizadeh Naeen:
An autonomous architecture based on reinforcement deep neural network for resource allocation in cloud computing. 371-403 - Prity Rani, Rohit Kumar Sachan, Sonal Kukreja:
A systematic study on blockchain technology in education: initiatives, products, applications, benefits, challenges and research direction. 405-447 - Asma Bellili, Nadjia Kara:
A graphical deep learning technique-based VNF dependencies for multi resource requirements prediction in virtualized environments. 449-473 - Quintino Francesco Lotito, Federico Musciotto, Federico Battiston, Alberto Montresor:
Exact and sampling methods for mining higher-order motifs in large hypergraphs. 475-494 - Iman Morovatian, Alireza Basiri, Samira Rezaei:
RUCIB: a novel rule-based classifier based on BRADO algorithm. 495-519 - Min Li, Shuming Zhou, Dajin Wang, Gaolin Chen:
Missing link prediction using path and community information. 521-555 - Subhash Sagar, Adnan Mahmood, Quan Z. Sheng, Munazza Zaib, Farhan Sufyan:
Can we quantify trust? Towards a trust-based resilient SIoT network. 557-577 - Haoyu Wang, Jianwei An:
Dynamic game based task offloading and resource pricing in LEO-multi-access edge computing. 579-606 - Abdulqader M. Almars, Khalid M. Alharbi:
Corporate social responsibility disclosure prediction using LSTM neural network. 607-625 - Weidong Li, Chunbo Shi, Yongbo Yu, Zhe Wang:
A novel optimization approach to topology checking of pipeline vector data in browser side. 627-649
Volume 106, Number 3, March 2024
- Faten Mrabet, Walid Karamti, Adel Mahfoudhi:
Scheduling analysis and correction for dependent real-time tasks upon heterogeneous multiprocessor architectures. 651-712 - Chuandong Qin, Yu Cao:
1-D CNNs with lock-free asynchronous adaptive stochastic gradient descent algorithm for classification of astronomical spectra. 713-739 - Mingxue Liao, Pin Lv:
On the average time complexity of computation with random partition. 741-758 - Gopinathan Rajeswari, R. Arthi, Krishnan Murugan:
Nature-inspired donkey and smuggler algorithm for optimal data gathering in partitioned wireless sensor networks for restoring network connectivity. 759-787 - Ting Lyu, Jianwei An, Meng Li, Feifei Liu, Haitao Xu:
UAV-assisted wireless charging and data processing of power IoT devices. 789-819 - Edwin Montes-Orozco, Román Anselmo Mora Gutiérrez, Sergio Gerardo de-los-Cobos-Silva, Eric Alfredo Rincón García, Miguel Angel Gutiérrez-Ándrade, Pedro Lara-Velázquez:
Quantifying influential nodes in complex networks using optimization and particle dynamics: a comparative study. 821-864 - Hui Du, Cuntao Ma, Depeng Lu, Jingrui Liu:
HHSE: heterogeneous graph neural network via higher-order semantic enhancement. 865-887 - Alejandro Pérez-Vereda, Carlos Canal, Ramón Hervás:
Distributed mobile CEP for collaborative social computing. 889-913 - Xiaochuan Sun, Qi Chen, Mingxiang Hao, Yingqi Li, Bo Sun:
Mconvkgc: a novel multi-channel convolutional model for knowledge graph completion. 915-937 - Hui Xie, Jun Zheng, Zhengyuan Zhang, Shengjun Wei, Changzhen Hu:
TEDA: a trusted execution environment-and-blockchain-based data protection architecture for Internet of Things. 939-960 - Ahmadi Hasan, Ahmad Kamal:
Community detection of weighted complex networks via transitive closure. 961-979 - Guruprasad Kapilesh, Sridhar Dhanush, Venkatesan Poovazhaki Gokula Kannan, Viswasam Mary Anita Rajam:
A priority aware local mutual exclusion algorithm for flying ad hoc networks. 981-1012 - Ehsan Heidari:
A novel energy-aware method for clustering and routing in IoT based on whale optimization algorithm & Harris Hawks optimization. 1013-1045
Volume 106, Number 4, April 2024
- Rajiv Ranjan, Dan Chen, Prem Prakash Jayaraman:
Adaptive machine learning in the IoT-edge-cloud continuum. 1047 - Rajiv Ranjan, Dan Chen, Prem Prakash Jayaraman:
Correction to: Adaptive machine learning in the IoT-edge-cloud continuum. 1049 - Milad Anoushee, Mehdi Fartash, Javad Akbari Torkestani:
An intelligent resource management method in SDN based fog computing using reinforcement learning. 1051-1080 - Yuanzhang Li, Tianchi Sha, Thar Baker, Xiao Yu, Zhiwei Shi, Sikang Hu:
Adaptive vertical federated learning via feature map transferring in mobile edge computing. 1081-1097 - Hamidreza Ghaffari, Farzaneh Rafeie:
Reconstructing the training data set based on reducing boundary complexity. 1099-1119 - Ruyi Xu, Jiaxu Han, Jingying Chen:
Ordinal information based facial expression intensity estimation for emotional interaction: a novel semi-supervised deep learning approach. 1121-1138 - Ming Cheng, Yunbing Yan, Yang Han, Hongjun Lei, Chao Deng:
Adaptive machine learning algorithm for human target detection in IoT environment. 1139-1150 - Shilpi Mittal, Rajan Kumar Dudeja, Rasmeet Singh Bali, Gagangeet Singh Aujla:
A distributed task orchestration scheme in collaborative vehicular cloud edge networks. 1151-1175 - Prateek Chhikara, Rajkumar Tekchandani, Neeraj Kumar:
Adaptive federated learning scheme for recognition of malicious attacks in an IoT network. 1177-1192 - Sahil, Sandeep Kumar Sood, Victor I. Chang:
Fog-Cloud-IoT centric collaborative framework for machine learning-based situation-aware traffic management in urban spaces. 1193-1225 - Armin Shoughi, Mohammad Bagher Dowlatshahi, Arefeh Amiri, Marjan Kuchaki Rafsanjani, Ranbir Singh Batth:
Automatic ECG classification using discrete wavelet transform and one-dimensional convolutional neural network. 1227-1248
- Boualem Benatallah, Hakim Hacid, Eleanna Kafeza, Fabio Martinelli, Athman Bouguettaya:
ICSOC 2020 special issue on service-oriented computing. 1249-1250 - Andreas Metzger, Clément Quinton, Zoltán Ádám Mann, Luciano Baresi, Klaus Pohl:
Realizing self-adaptive systems via online reinforcement learning and feature-model-guided exploration. 1251-1272 - Gaith Rjoub, Omar Abdel Wahab, Jamal Bentahar, Ahmed Saleh Bataineh:
Trust-driven reinforcement selection strategy for federated learning on IoT devices. 1273-1295
Volume 106, Number 5, May 2024
- Malek Yousefi, Seyed Morteza Babamir:
A hybrid energy-aware algorithm for virtual machine placement in cloud computing. 1297-1320 - Péter Battyányi:
Solving the SAT problem with the string multiset rewriting calculus. 1321-1334 - Tianchi Tong, Qian Dong, Wenying Yuan, Jinsheng Sun:
Identifying vital spreaders in complex networks based on the interpretative structure model and improved Kshell. 1335-1358 - Yuan-Ko Huang, Chien-Pang Lee:
Efficient processing of all neighboring object group queries with budget range constraint in road networks. 1359-1393 - Weida Song, Shanxin Zhang, Wenlong Ge, Wei Wang:
An improved indicator-based two-archive algorithm for many-objective optimization problems. 1395-1429 - Jian Wan, Luc Jaulin:
Reducing the wrapping effect of set computation via Delaunay triangulation for guaranteed state estimation of nonlinear discrete-time systems. 1431-1449 - Suguna Paramasivam, R. Leela Velusamy, J. V. Nishaanth:
Categorical learning for automated network traffic categorization for future generation networks in SDN. 1451-1473 - Lei Chen, Linyun Ma, Lvjie Li:
Enhancing sine cosine algorithm based on social learning and elite opposition-based learning. 1475-1517 - Ali Riahi, Abdorreza Savadi, Mahmoud Naghibzadeh:
Many-BSP: an analytical performance model for CUDA kernels. 1519-1555 - Xiu Susie Fang, Xianzhi Wang, Quan Z. Sheng, Lina Yao:
Generalizing truth discovery by incorporating multi-truth features. 1557-1583 - Chinmaya Kumar Swain, Ravi Shankar, Aryabartta Sahu:
Edge data distribution as a network Steiner tree estimation in edge computing. 1585-1609 - Ekin Ekinci:
A comparative study of LSTM-ED architectures in forecasting day-ahead solar photovoltaic energy using Weather Data. 1611-1632 - Shaifali P. Malukani, C. K. Bhensdadia:
Preference based multi-issue negotiation algorithm (PMINA) for fog resource allocation. 1633-1657 - Jiuyun Xu, Yinyue Jiang, Hanfei Fan, Qiqi Wang:
SVFLDetector: a decentralized client detection method for Byzantine problem in vertical federated learning. 1659-1679 - Kangning Yin, Zhen Ding, Zhihua Dong, Xinhui Ji, Zhipei Wang, Dongsheng Chen, Ye Li, Guangqiang Yin, Zhiguo Wang:
Person re-identification method based on fine-grained feature fusion and self-attention mechanism. 1681-1705
Volume 106, Number 6, June 2024
- Mandar Subhash Karyakarte, Aarti Amod Agarkar, Lalit Kulkarni, Milind Patil, Gajanan H. Chavhan, Bipin Sule:
Dynamic opportunistic routing protocol for ad-hoc Internet of Vehicles (IoV). 1707-1728 - Chengcheng Sun, Fanrong Meng, Chenhao Li, Xiaobin Rui, Zhixiao Wang:
LGAT: a light graph attention network focusing on message passing for semi-supervised node classification. 1729-1747 - Shuang Wang, Yibing Duan, Yamin Lei, Peng Du, Yamin Wang:
Electricity-cost-aware multi-workflow scheduling in heterogeneous cloud. 1749-1775 - Reza Akraminejad, Navid Khaledian, Amin Nazari, Marcus Völp:
A multi-objective crow search algorithm for optimizing makespan and costs in scientific cloud workflows (CSAMOMC). 1777-1793 - Mohammad Ali Monshizadeh Naeen, Hamidreza Ghaffari, Hossein Monshizadeh Naeen:
Cloud data center cost management using virtual machine consolidation with an improved artificial feeding birds algorithm. 1795-1823 - Salman Mokhtarzadeh, Behzad Zamani Dehkordi, Mohammad Mosleh, Ali Barati:
Time-sensitive propagation values discount centrality measure. 1825-1843 - Zahoor Ali Khan, Muhammad Awais, Turki Ali Alghamdi, Nadeem Javaid:
Employing topology modification strategies in scale-free IoT networks for robustness optimization. 1845-1872 - Tamer E. Fahim, Sherif I. Rabia, Ahmed H. Abd El-Malek, Waheed K. Zahra:
Enhancing information freshness in multi-class mobile edge computing systems using a hybrid discipline. 1873-1911 - Zhenyu Xu, Xinxin Zhang, Mingzhi Chen, Li Xu:
Influence maximization in mobile social networks based on RWP-CELF. 1913-1931 - Rajesh Kumar Dhanaraj, Anamika Singh, Anand Nayyar:
Matyas-Meyer Oseas based device profiling for anomaly detection via deep reinforcement learning (MMODPAD-DRL) in zero trust security network. 1933-1962 - Xin Jiang, Hongbo Liu, Liping Yang, Bo Zhang, Tomas E. Ward, Václav Snásel:
Unraveling human social behavior motivations via inverse reinforcement learning-based link prediction. 1963-1986 - Yonghui Lin, Li Xu, Wei Lin, Jiayin Li:
Community anomaly detection in attribute networks based on refining context. 1987-2006 - Cen Li, Liping Chen:
Optimization for energy-aware design of task scheduling in heterogeneous distributed systems: a meta-heuristic based approach. 2007-2031 - Ezdehar Jawabreh, Adel Taweel:
Qos-based web service selection using time-aware collaborative filtering: a literature review. 2033-2058 - Bráulio Henrique O. U. V. Pinto, Horacio A. B. F. de Oliveira:
Online RSSI selection strategy for indoor positioning in low-effort training scenarios. 2059-2077
Volume 106, Number 7, July 2024
- Michael Sheng, Taotao Cai, Adnan Mahmood:
Special issue on link prediction in complex networks. 2079 - Linlin Ding, Sisi Li, Ji Ma, Mo Li:
Multi-example query over ontology-label knowledge graphs. 2081-2106 - Fatimah Faraji, Amir Javadpour, Arun Kumar Sangaiah, Hadi Zavieh:
A solution for resource allocation through complex systems in fog computing for the internet of things. 2107-2131 - Andrea Morales-Garzón, Karel Gutiérrez-Batista, María J. Martín-Bautista:
Link prediction in food heterogeneous graphs for personalised recipe recommendation based on user interactions and dietary restrictions. 2133-2155 - T. Jaya Lakshmi, S. Durga Bhavani:
Link prediction approach to recommender systems. 2157-2183 - Vishnu Kumar, P. Radha Krishna:
An effective representation learning model for link prediction in heterogeneous information networks. 2185-2210 - Zhuo Zeng, Chengliang Wang, Fei Ma, Xusheng Li, Xinrun Chen:
Incorporating self-attentions into robust spatial-temporal graph representation learning against dynamic graph perturbations. 2211-2237 - Monachary Kammari, S. Durga Bhavani:
Citation recommendation using modified HITS algorithm. 2239-2259 - Qiang Hu, Haoquan Qi, Yanzhe Jia, Lianen Qu:
A two-phase method to optimize service composition in cloud manufacturing. 2261-2291 - Chen Ding, GuangYu Zhu:
Improved optimal foraging algorithm for global optimization. 2293-2319 - Hussam N. Fakhouri, Feras M. Awaysheh, Sadi Alawadi, Mohannad Alkhalaileh, Faten Hamad:
Four vector intelligent metaheuristic for data optimization. 2321-2359 - Haijun Gu, Yingyu Ma, Siqi Wang, Xincheng Chen, Weihua Su:
Semantically realizing discovery and composition for RESTful web services. 2361-2387 - Amro Al-Said Ahmad, Lamis F. Al-Qora'n, Ahmad Zayed:
Exploring the impact of chaos engineering with various user loads on cloud native applications: an exploratory empirical study. 2389-2425 - Sriramulu Bojjagani, D. R. Denslin Brabin, Kalai Kumar, Neeraj Kumar Sharma, Umamaheswararao Batta:
Secure privacy-enhanced fast authentication and key management for IoMT-enabled smart healthcare systems. 2427-2458 - Shuyan Cheng, Peng Li, Ruchuan Wang, He Xu:
Differentially private federated learning with non-IID data. 2459-2488 - Jiaxing Chen, Xiaoqian Liu, Chao Wu, Jiahui Ma, Zhiyuan Cui, Zhihua Liu:
An ant colony path planning optimization based on opposition-based learning for AUV in irregular regions. 2489-2520
Volume 106, Number 8, August 2024
- Lu Cai, Yongcai Yan, Zhongming Tang, Aijun Liu:
Collaborative distribution optimization model and algorithm for an intelligent supply chain based on green computing energy management. 2521-2539 - Yuvaraja Teekaraman, Ramya Kuppusamy, V. Indragandhi:
Investigations on the effect of micro-grid using improved NFIS-PID with hybrid algorithms. 2541-2559 - Dimitrios Papathanasiou, Kostas Kolomvatsos:
Data management and selectivity in collaborative pervasive edge computing. 2561-2584 - Mouna Hadj-Kacem, Nadia Bouassida:
Multi-label learning for identifying co-occurring class code smells. 2585-2612 - G. Sri vidhya, R. Nagarajan:
A novel bidirectional LSTM model for network intrusion detection in SDN-IoT network. 2613-2642 - Habib Un Nisa, Saif Ur Rehman Khan, Shahid Hussain, Wen-Li Wang:
An association rule mining-oriented approach for prioritizing functional requirements. 2643-2674 - Francisco Plana, Andrés Abeliuk, Jorge Pérez:
Quickcent: a fast and frugal heuristic for harmonic centrality estimation on scale-free networks. 2675-2705 - Xiaofei Zhao, Kam-Yiu Lam, Tei-Wei Kuo:
Indexing spatiotemporal trajectory data streams on key-value storage. 2707-2735 - Iure Fé, Tuan Anh Nguyen, Mario Di Mauro, Fabio Postiglione, Alex Ramos, André Soares, Eunmi Choi, Dugki Min, Jae-Woo Lee, Francisco Airton Silva:
Energy-aware dynamic response and efficient consolidation strategies for disaster survivability of cloud microservices architecture. 2737-2783 - Jorge F. Herculano, Willians de P. Pereira, Marcelo Guimarães, Reinaldo Cotrim, Alirio Santos de Sá, Flávio Assis, Raimundo A. Macêdo, Sérgio Gorender:
MAC approaches to communication efficiency and reliability under dynamic network traffic in wireless body area networks: a review. 2785-2809 - Selcuk Aslan:
Back-and-Forth (BaF): a new greedy algorithm for geometric path planning of unmanned aerial vehicles. 2811-2849 - Fahim Niaz, Jian Zhang, Muhammad Khalid, Kashif Naseer Qureshi, Yang Zheng, Muhammad Younas, Naveed Imran:
AI enabled: a novel IoT-based fake currency detection using millimeter wave (mmWave) sensor. 2851-2873 - Jiangang Hou, Xin Li, Hongji Xu, Chun Wang, Lizhen Cui, Zhi Liu, Changzhen Hu:
Packet header-based reweight-long short term memory (Rew-LSTM) method for encrypted network traffic classification. 2875-2896
Volume 106, Number 9, September 2024
- Arezoo Ghasemi, Abolfazl Toroghi Haghighat, Amin Keshavarzi:
Enhancing virtual machine placement efficiency in cloud data centers: a hybrid approach using multi-objective reinforcement learning and clustering strategies. 2897-2922 - Yevhenii Shudrenko, Andreas Timm-Giel:
Modeling end-to-end delays in TSCH wireless sensor networks using queuing theory and combinatorics. 2923-2947 - Atiyeh Javaheri, Ali Bohlooli, Kamal Jamshidi:
Enhancing computation reuse efficiency in ICN-based edge computing by modifying content store table structure. 2949-2969