Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             59 results found
no title author magazine year volume issue page(s) type
1 Adaptive Packet-size Control for Improved Throughput in Dynamic Access Networks Bany Salameh, Haythem

24 3 p. 1935-1944
article
2 A divide and conquer approach to deadline constrained cost-optimization workflow scheduling for the cloud Khojasteh Toussi, Ghazaleh

24 3 p. 1711-1733
article
3 A fault tolerant routing scheme for advanced metering infrastructure: an approach towards smart grid Mohapatra, Hitesh

24 3 p. 2193-2211
article
4 A hybrid block-based ensemble framework for the multi-class problem to react to different types of drifts Mahdi, Osama A.

24 3 p. 2327-2340
article
5 A microservices persistence technique for cloud-based online social data analysis Al-Obeidat, Feras

24 3 p. 2341-2353
article
6 A multi-layer trust-based middleware framework for handling interoperability issues in heterogeneous IOTs Abbasi, Mohammad Asad

24 3 p. 2133-2160
article
7 An effective meta-heuristic based multi-objective hybrid optimization method for workflow scheduling in cloud computing environment Kakkottakath Valappil Thekkepuryil, Jabir

24 3 p. 2367-2384
article
8 An efficient heterogeneous blockchain-based online/offline signcryption systems for internet of vehicles Elkhalil, Ahmed

24 3 p. 2051-2068
article
9 A new cloud-based classification methodology (CBCM) for efficient semantic web service discovery Alshafaey, Mohamed S.

24 3 p. 2269-2292
article
10 A novel controller placement algorithm based on network portioning concept and a hybrid discrete optimization algorithm for multi-controller software-defined networks Firouz, Nasrin

24 3 p. 2511-2544
article
11 A novel feature selection method for data mining tasks using hybrid Sine Cosine Algorithm and Genetic Algorithm Abualigah, Laith

24 3 p. 2161-2176
article
12 A path planning method based on the particle swarm optimization trained fuzzy neural network algorithm Liu, Xiao-huan

24 3 p. 1901-1915
article
13 A power and thermal-aware virtual machine management framework based on machine learning Xiao, Peng

24 3 p. 2231-2248
article
14 A request aware module using CS-IDR to reduce VM level collateral damages caused by DDoS attack in cloud environment Verma, Priyanka

24 3 p. 1917-1933
article
15 A robust blind medical image watermarking approach for telemedicine applications Kahlessenane, Fares

24 3 p. 2069-2082
article
16 Auto-scaling techniques for IoT-based cloud applications: a review Verma, Shveta

24 3 p. 2425-2459
article
17 Availability and reliability analysis of cloud computing under economic denial of sustainability (EDoS) attack: a semi-Markov approach Lalropuia, K. C.

24 3 p. 2177-2191
article
18 Building an efficient intrusion detection system using grasshopper optimization algorithm for anomaly detection Dwivedi, Shubhra

24 3 p. 1881-1900
article
19 Cloud-based intrusion detection using kernel fuzzy clustering and optimal type-2 fuzzy neural network Srilatha, Doddi

24 3 p. 2657-2672
article
20 CUDAQuat: new parallel framework for fast computation of quaternion moments for color images applications Hosny, Khalid M.

24 3 p. 2385-2406
article
21 Data replication schemes in cloud computing: a survey Shakarami, Ali

24 3 p. 2545-2579
article
22 Delay-aware optimization of energy consumption for task offloading in fog environments using metaheuristic algorithms Keshavarznejad, Maryam

24 3 p. 1825-1853
article
23 Distributed anomaly detection using concept drift detection based hybrid ensemble techniques in streamed network data Jain, Meenal

24 3 p. 2099-2114
article
24 DLBench: a comprehensive experimental evaluation of deep learning frameworks Elshawi, Radwa

24 3 p. 2017-2038
article
25 Dynamic provisioning with structure inspired selection and limitation of VMs based cost-time efficient workflow scheduling in the cloud Ndamlabin Mboula, Jean Etienne

24 3 p. 2697-2721
article
26 Early DGA-based botnet identification: pushing detection to the edges Zago, Mattia

24 3 p. 1695-1710
article
27 Efficient feature selection and classification through ensemble method for network intrusion detection on cloud computing Krishnaveni, S.

24 3 p. 1761-1779
article
28 Efficient TPA-based auditing scheme for secure cloud storage Shao, Bilin

24 3 p. 1989-2000
article
29 Energy and cost trade-off for computational tasks offloading in mobile multi-tenant clouds Patel, Yashwant Singh

24 3 p. 1793-1824
article
30 Energy-aware routing considering load balancing for SDN: a minimum graph-based Ant Colony Optimization Torkzadeh, Samaneh

24 3 p. 2293-2312
article
31 Enhancing service maintainability by monitoring and auditing SLA in cloud computing Viegas, Eduardo

24 3 p. 1659-1674
article
32 Fair hop-by-hop interest rate control to mitigate congestion in named data networks Touati, Haifa

24 3 p. 2213-2230
article
33 FastTTPS: fast approach for video transcoding time prediction and scheduling for HTTP adaptive streaming videos Agrawal, Prateek

24 3 p. 1605-1621
article
34 FFED: a novel strategy based on fast entropy to detect attacks against trust computing in cloud Guesmi, Houda

24 3 p. 1945-1954
article
35 Flow based anomaly intrusion detection system using ensemble classifier with Feature Impact Scale Jyothsna, V.

24 3 p. 2461-2478
article
36 Improving the fault-tolerance of software-defined networks with dynamic overlay agreement Hsieh, Hui-Ching

24 3 p. 2597-2614
article
37 Managing overloaded hosts for energy-efficiency in cloud data centers Yadav, Rahul

24 3 p. 2001-2015
article
38 MHB*T based dynamic data integrity auditing in cloud storage Luo, Wei

24 3 p. 2115-2132
article
39 Middleware-based multi-agent development environment for building and testing distributed intelligent systems Aguayo-Canela, Francisco José

24 3 p. 2313-2325
article
40 Mutual authentication scheme of IoT devices in fog computing environment Singh, Sunakshi

24 3 p. 1643-1657
article
41 Nash equilibrium and social optimization in cloud service systems with diverse users Fu, Liwei

24 3 p. 2039-2050
article
42 Novel trust evaluation using NSGA-III based adaptive neuro-fuzzy inference system Kaur, Jasleen

24 3 p. 1781-1792
article
43 Online sequential extreme studentized deviate tests for anomaly detection in streaming data with varying patterns Ryu, Minho

24 3 p. 1975-1987
article
44 OPSA: an optimized prediction based scheduling approach for scientific applications in cloud environment Kaur, Gurleen

24 3 p. 1955-1974
article
45 Performance evaluation of grouping and regrouping scheme for mitigating hidden station problem in IEEE 802.11ah network Gopinath, A. Justin

24 3 p. 1623-1642
article
46 PLB: a resilient and adaptive task scheduling scheme based on multi-queues for cloud environment Sharma, Gaurav

24 3 p. 2615-2637
article
47 Principal component based support vector machine (PC-SVM): a hybrid technique for software defect detection Mustaqeem, Mohd.

24 3 p. 2581-2595
article
48 Real time UAV path planning by parallel grey wolf optimization with align coefficient on CAN bus Jamshidi, Vahid

24 3 p. 2495-2509
article
49 Resource allocation mechanisms for maximizing provider’s revenue in infrastructure as a service (IaaS) cloud Shokri Habashi, Fateme

24 3 p. 2407-2423
article
50 SaMW: a probabilistic meta-heuristic algorithm for job scheduling in heterogeneous distributed systems powered by microservices Tychalas, Dimitrios

24 3 p. 1735-1759
article
51 ScalaParBiBit: scaling the binary biclustering in distributed-memory systems Fraguela, Basilio B.

24 3 p. 2249-2268
article
52 Security-SLA-guaranteed service function chain deployment in cloud-fog computing networks Zhao, Dongcheng

24 3 p. 2479-2494
article
53 Smart contract based policies for the Internet of Things Puri, Vikram

24 3 p. 1675-1694
article
54 TC3PoP: a time-cost compromised workflow scheduling heuristic customized for cloud environments Mollajafari, Morteza

24 3 p. 2639-2656
article
55 The importance of nature-inspired meta-heuristic algorithms for solving virtual machine consolidation problem in cloud environments Pourghebleh, Behrouz

24 3 p. 2673-2696
article
56 Truthful online double auction based dynamic resource provisioning for multi-objective trade-offs in IaaS clouds Patel, Yashwant Singh

24 3 p. 1855-1879
article
57 Using independent resource allocation strategies to solve conflicts of Hadoop distributed architecture in virtualization Hsu, Jin-Bang

24 3 p. 1583-1603
article
58 Virtual network function placement with bounded migrations Xie, Yanghao

24 3 p. 2355-2366
article
59 Wind power prediction based on neural network with optimization of adaptive multi-group salp swarm algorithm Pan, Jeng-Shyang

24 3 p. 2083-2098
article
                             59 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands