Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             40 results found
no title author magazine year volume issue page(s) type
1 A cost-efficient scheduling algorithm for streaming processing applications on cloud Li, Hongjian

25 2 p. 781-803
article
2 A hierarchical laplacian TWSVM using similarity clustering for leaf classification Goyal, Neha

25 2 p. 1541-1560
article
3 An enhanced multi-objective fireworks algorithm for task scheduling in fog computing environment Yadav, Ashish Mohan

25 2 p. 983-998
article
4 An improved chaotic image encryption algorithm using Hadoop-based MapReduce framework for massive remote sensed images in parallel IoT applications Al-Khasawneh, Mahmoud Ahmad

25 2 p. 999-1013
article
5 A novel LDoS attack detection method based on reconstruction anomaly Tang, Dan

25 2 p. 1373-1392
article
6 A novel method of spectral clustering in attributed networks by constructing parameter-free affinity matrix Berahmand, Kamal

25 2 p. 869-888
article
7 A novel privacy protection of permissioned blockchains with conditionally anonymous ring signature Zhang, Xuewang

25 2 p. 1221-1235
article
8 A quorum-based data consistency approach for non-relational database Naseri Seyedi Noudoust, Nasim

25 2 p. 1515-1540
article
9 A Spark-based high utility itemset mining with multiple external utilities Sethi, Krishan Kumar

25 2 p. 889-909
article
10 A thermal-aware energy-efficient virtual machine placement algorithm based on fuzzy controlled binary gravitational search algorithm (FC-BGSA) Aghasi, Ali

25 2 p. 1015-1033
article
11 A truthful online mechanism for virtual machine provisioning and allocation in clouds Liu, Xi

25 2 p. 1095-1109
article
12 Computing flow pipe of embedded hybrid systems using deep group preserving scheme Xu, Zhenxing

25 2 p. 1207-1220
article
13 Correlation-based wireless sensor networks performance: the compressed sensing paradigm Xifilidis, Theofanis

25 2 p. 965-981
article
14 cuConv: CUDA implementation of convolution for CNN inference Jordà, Marc

25 2 p. 1459-1473
article
15 Dynamic data replacement and adaptive scheduling policies in spark Li, Chunlin

25 2 p. 1421-1439
article
16 Energy-efficient speed tuning for real-time applications Duan, Lin-Tao

25 2 p. 769-779
article
17 Enhancing collaborative detection of cyberbullying behavior in Twitter data Mangaonkar, Amrita

25 2 p. 1263-1277
article
18 Fast recovery for online service function chaining interruption using adaptive migration Xie, Jingzhao

25 2 p. 1321-1339
article
19 Fog computing in enabling 5G-driven emerging technologies for development of sustainable smart city infrastructures Jain, Siddhant

25 2 p. 1111-1154
article
20 Framework for prediction and classification of non functional requirements: a novel vision Handa, Naina

25 2 p. 1155-1173
article
21 Incremental mining of high utility sequential patterns using MapReduce paradigm Saleti, Sumalatha

25 2 p. 805-825
article
22 Intelligent transmission control layer for efficient node management in SDN Aldabbas, Hamza

25 2 p. 735-750
article
23 Janus: a framework to boost HPC applications in the cloud based on SDN path provisioning Pretto, Guilherme R.

25 2 p. 947-964
article
24 Mitigating the worst parent attack in RPL based internet of things Sahay, Rashmi

25 2 p. 1303-1320
article
25 Multi-modal biometric fusion based continuous user authentication for E-proctoring using hybrid LCNN-Salp swarm optimization Purohit, Himanshu

25 2 p. 827-846
article
26 Multi objective-based incremental clustering by fast search technique for dynamically creating and updating clusters in large data Balakrishna, Sivadi

25 2 p. 1441-1457
article
27 Partial offloading with stable equilibrium in fog-cloud environments using replicator dynamics of evolutionary game theory Khoobkar, Mohammad Hassan

25 2 p. 1393-1420
article
28 Performance and isolation analysis of RunC, gVisor and Kata Containers runtimes Wang, Xingyu

25 2 p. 1497-1513
article
29 Performance characterization of containerization for HPC workloads on InfiniBand clusters: an empirical study Liu, Peini

25 2 p. 847-868
article
30 Performance prediction of deep learning applications training in GPU as a service systems Lattuada, Marco

25 2 p. 1279-1302
article
31 Priority based data gathering using multiple mobile sinks in cluster based UWSNs for oil pipeline leakage detection Goyal, Nitin

25 2 p. 1341-1354
article
32 Reliable budget aware workflow scheduling strategy on multi-cloud environment Chakravarthi, K. Kalyana

25 2 p. 1189-1205
article
33 Resource scheduling methods in cloud and fog computing environments: a systematic literature review Rahimikhanghah, Aryan

25 2 p. 911-945
article
34 Retraction Note to: A fuzzy multi-objective immune genetic algorithm for the strategic location planning problem Zhao, Xiao

25 2 p. 1561
article
35 SDN-DVFS: an enhanced QoS-aware load-balancing method in software defined networks Mahmoudi, Marjan

25 2 p. 1237-1262
article
36 Sidechain: storage land registry data using blockchain improve performance of search records Yadav, Amrendra Singh

25 2 p. 1475-1495
article
37 SSK-DDoS: distributed stream processing framework based classification system for DDoS attacks Patil, Nilesh Vishwasrao

25 2 p. 1355-1372
article
38 Task offloading method of edge computing in internet of vehicles based on deep reinforcement learning Zhang, Degan

25 2 p. 1175-1187
article
39 Task scheduling algorithms for energy optimization in cloud environment: a comprehensive review Ghafari, R.

25 2 p. 1035-1093
article
40 Weighted double deep Q-network based reinforcement learning for bi-objective multi-workflow scheduling in the cloud Li, Huifang

25 2 p. 751-768
article
                             40 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands