default search action
Cluster Computing, Volume 24
Volume 24, Number 1, March 2021
- Rana M. Amir Latif, Muhammad Farhan, Osama Rizwan, Majid Hussain, Sohail Jabbar, Shahzad Khalid:
Retail level Blockchain transformation for product supply chain using truffle development platform. 1-16 - Abdul Jabbar Siddiqui, Azzedine Boukerche:
TempoCode-IoT: temporal codebook-based encoding of flow features for intrusion detection in Internet of Things. 17-35 - Omar Alfandi, Salam Ismail Rasheed Khanji, Liza Ahmad, Asad Masood Khattak:
A survey on boosting IoT security and privacy through blockchain. 37-55 - Pantaleone Nespoli, Félix Gómez Mármol, Jorge Maestre Vidal:
Battling against cyberattacks: towards pre-standardization of countermeasures. 57-81 - Moutaz Alazab, Salah Alhyari, Albara W. Awajan, Ayman Bahjat Abdallah:
Blockchain technology in supply chain management: an empirical study of the factors affecting user adoption/acceptance. 83-101 - Jin Liu, Dejiao Zeng, Rui Guo, Mingming Lu, Fang-Xiang Wu, Jianxin Wang:
MMHGE: detecting mild cognitive impairment based on multi-atlas multi-view hybrid graph convolutional networks and ensemble learning. 103-113 - Emmanuel Bugingo, Defu Zhang, Zhaobin Chen, Wei Zheng:
Towards decomposition based multi-objective workflow scheduling for big data processing in clouds. 115-139 - Tantan Shi, Genlin Ji, Zhaoyuan Yu, Bin Zhao:
Collective periodic pattern discovery for understanding human mobility. 141-157 - Seungwoo Rho, Geunchul Park, Jieun Choi, Chan-Yeol Park:
Development of benchmark automation suite and evaluation of various high-performance computing systems. 159-179 - Hanul Sung, Jeesoo Min, Donghun Koo, Hyeonsang Eom:
OMBM-ML: efficient memory bandwidth management for ensuring QoS and improving server utilization. 181-193 - Xiujuan Jiang, Nan Zhang, Jinchuan Huang, Ping Zhang, Hui Liu:
Analysis of prediction algorithm for forest land spatial evolution trend in rural planning. 195-203 - Laith Mohammad Abualigah, Ali Diabat:
A novel hybrid antlion optimization algorithm for multi-objective task scheduling problems in cloud computing environments. 205-223 - Yuanfei Tu, Geng Yang, Jing Wang, Qingjian Su:
A secure, efficient and verifiable multimedia data sharing scheme in fog networking system. 225-247 - Wakar Ahmad, Bashir Alam, Sanchit Ahuja, Sahil Malik:
A dynamic VM provisioning and de-provisioning based cost-efficient deadline-aware scheduling algorithm for Big Data workflow applications in a cloud environment. 249-278 - Junru Lei, Shuhua Deng, Zebin Lu, Yihao He, Xieping Gao:
Energy-saving traffic scheduling in backbone networks with software-defined networks. 279-292 - Tehsin Kanwal, Adeel Anjum, Abid Khan:
Privacy preservation in e-health cloud: taxonomy, privacy requirements, feasibility analysis, and opportunities. 293-317 - Ali Shahidinejad, Mostafa Ghobaei-Arani, Mohammad Masdari:
Resource provisioning using workload clustering in cloud computing environment: a hybrid approach. 319-342 - Samaneh Sadat Mousavi Nik, Mahmoud Naghibzadeh, Yasser Sedaghat:
Task replication to improve the reliability of running workflows on the cloud. 343-359 - Sarra Slimani, Tarek Hamrouni, Faouzi Ben Charrada:
Service-oriented replication strategies for improving quality-of-service in cloud computing: a survey. 361-392 - N. G. Bhuvaneswari Amma, S. Selvakumar:
A statistical class center based triangle area vector method for detection of denial of service attacks. 393-415 - Asif Muhammad, Muhammad Aleem, Muhammad Arshad Islam:
TOP-Storm: A topology-based resource-aware scheduler for Stream Processing Engine. 417-431 - Ouafae Kasmi, Amine Baïna, Mostafa Bellafkih:
Fuzzy logic based clustering algorithm for management in critical infrastructure. 433-458 - Hui Li, Lishuang Pei, Dan Liao, Xiong Wang, Du Xu, Jian Sun:
BDDT: use blockchain to facilitate IoT data transactions. 459-473 - Yan He, Liang Feng Zhang:
Multi-matrix verifiable computation. 475-488 - Mesmin J. Mbyamm Kiki, Jianbiao Zhang, Bonzou Adolphe Kouassi:
MapReduce FCM clustering set algorithm. 489-500 - Sumit Badotra, Surya Narayan Panda:
SNORT based early DDoS detection system using Opendaylight and open networking operating system in software defined networking. 501-513 - Zhihui He, Hu Peng, Jianqiang Chen, Changshou Deng, Zhijian Wu:
A Spark-based differential evolution with grouping topology model for large-scale global optimization. 515-535 - Mei-Ling Chiang, Hui-Sheng Cheng, Hsien-Yi Liu, Ching-Yi Chiang:
SDN-based server clusters with dynamic load balancing and performance improvement. 537-558 - Saima Majeed, Ammar Ul Hassan, Jaeyoung Choi:
Rendering high-quality PK bitmap font in Linux environment. 559-568 - Abdul Wahid, Annavarapu Chandra Sekhara Rao:
ODRA: an outlier detection algorithm based on relevant attribute analysis method. 569-585 - Retraction Note to: A FCM cluster: cloud networking model for intelligent transportation in the city of Macau. 587
- Retraction Note to: Mobile network intrusion detection for IoT system based on transfer learning algorithm. 589
Volume 24, Number 2, June 2021
- Ahmadreza Montazerolghaem:
Software-defined load-balanced data center: design, implementation and performance analysis. 591-610 - Félix García Carballeira, Alejandro Calderón, Jesús Carretero:
Enhancing the power of two choices load balancing algorithm using round robin policy. 611-624 - Zoltan Juhasz:
Quantitative cost comparison of on-premise and cloud infrastructure based EEG data processing. 625-641 - Neetesh Kumar, Deo Prakash Vidyarthi:
A novel energy-efficient scheduling model for multi-core systems. 643-666 - Amir Iranmanesh, Hamid Reza Naji:
DCHG-TS: a deadline-constrained and cost-effective hybrid genetic algorithm for scientific workflow scheduling in cloud computing. 667-681 - Vaibhav Pandey, Poonam Saini:
A heuristic method towards deadline-aware energy-efficient mapreduce scheduling problem in Hadoop YARN. 683-699 - Weihong Chen, Guoqi Xie, Renfa Li, Keqin Li:
Execution cost minimization scheduling algorithms for deadline-constrained parallel applications on heterogeneous clouds. 701-715 - Parminder Singh, Avinash Kaur, Pooja Gupta, Sukhpal Singh Gill, Kiran Jyoti:
RHAS: robust hybrid auto-scaling for web applications in cloud computing. 717-737 - Muhammad Tahir, Muhammad Sardaraz, Zahid Mehmood, Shakoor Muhammad:
CryptoGA: a cryptosystem based on genetic algorithm for cloud data security. 739-752 - Hamidreza Koohi, Kourosh Kiani:
Two new collaborative filtering approaches to solve the sparsity problem. 753-765 - Neha Garg, Damanpreet Singh, Major Singh Goraya:
Energy and resource efficient workflow scheduling in a virtualized cloud environment. 767-797 - Stefan Kehrer, Dominik Zietlow, Jochen Scheffold, Wolfgang Blochinger:
Self-tuning serverless task farming using proactive elasticity control. 799-817 - Reza Sookhtsaraei, Marzieh Iraji, Javad Artin, Mohammad Saber Iraji:
Increasing the quality of services and resource utilization in vehicular cloud computing using best host selection methods. 819-835 - Yosef Ashibani, Qusay H. Mahmoud:
Design and evaluation of a user authentication model for IoT networks based on app event patterns. 837-850 - Nikita Singh, Tarun Kumar, Manu Vardhan:
Blockchain-based e-cheque clearing framework with trust based consensus mechanism. 851-865 - Rakesh Ranjan Kumar, Binita Kumari, Chiranjeev Kumar:
CCS-OSSR: A framework based on Hybrid MCDM for Optimal Service Selection and Ranking of Cloud Computing Services. 867-883 - Amit Chhabra, Gurvinder Singh, Karanjeet Singh Kahlon:
Multi-criteria HPC task scheduling on IaaS cloud infrastructures using meta-heuristics. 885-918 - Mehran Tarahomi, Mohammad Izadi, Mostafa Ghobaei-Arani:
An efficient power-aware VM allocation mechanism in cloud data centers: a micro genetic-based approach. 919-934 - Peng Zhang, Chao Yang, Yulong Ao:
AutoWM: a novel domain-specific tool for universal multi-/many-core accelerations of the WRF cloud microphysics. 935-951 - Likhesh Kolhe, Ashok Kumar Jetawat, Vaishali Khairnar:
Robust product recommendation system using modified grey wolf optimizer and quantum inspired possibilistic fuzzy C-means. 953-968 - Pramod Yelmewad, Basavaraj Talawar:
Parallel deterministic local search heuristic for minimum latency problem. 969-995 - Sara Nasirian, Farhad Faghani:
Platonica: an efficient and high-performance dual-centric data center network architecture. 997-1032 - Viviana Elizabeth Cajas, Matias Urbieta, Gustavo Rossi, Yves Rybarczyk:
Migrating legacy Web applications. 1033-1049 - Luan Teylo, Luciana Arantes, Pierre Sens, Lúcia M. A. Drummond:
A dynamic task scheduler tolerant to multiple hibernations in cloud environments. 1051-1073 - Fatemeh Ebadifard, Seyed Morteza Babamir:
Autonomic task scheduling algorithm for dynamic workloads through a load balancing technique for the cloud-computing environment. 1075-1101 - Sarah Maroc, Jian Biao Zhang:
Cloud services security-driven evaluation for multiple tenants. 1103-1121 - Prathibha Soma, B. Latha:
Response Surface Modelling for Performance Analysis of Scientific Workflow Application in Cloud. 1123-1134 - Emad Mirsadeghi, Salman Khodayifar:
Hybridizing particle swarm optimization with simulated annealing and differential evolution. 1135-1163 - Jia Hao, Kun Yue, Liang Duan, Binbin Zhang, Xiaodong Fu:
Predicting QoS of virtual machines via Bayesian network with XGboost-induced classes. 1165-1184 - Farhad Rad, Midia Reshadi, Ahmad Khademzadeh:
A novel arbitration mechanism for crossbar switch in wireless network-on-chip. 1185-1198 - Soodeh Hosseini:
Defense against malware propagation in complex heterogeneous networks. 1199-1215 - Yatheendraprakash Govindaraju, Hector A. Duran-Limon, Efrén Mezura-Montes:
A regression tree predictive model for virtual machine startup time in IaaS clouds. 1217-1233 - Tohid Jafarian, Mohammad Masdari, Ali Ghaffari, Kambiz Majidzadeh:
A survey and classification of the security anomaly detection mechanisms in software defined networks. 1235-1253 - Fares Alharbi, Yu-Chu Tian, Maolin Tang, Md Hasanul Ferdaus, Weizhe Zhang, Zu-Guo Yu:
Simultaneous application assignment and virtual machine placement via ant colony optimization for energy-efficient enterprise data centers. 1255-1275 - Sumit Kumar, Rajeev Tiwari:
An efficient content placement scheme based on normalized node degree in content centric networking. 1277-1291 - Sasan Gharehpasha, Mohammad Masdari, Ahmad Jafarian:
Power efficient virtual machine placement in cloud data centers with a discrete and chaotic hybrid optimization algorithm. 1293-1315 - Song Jin, Songwei Pei, Yu Wang, Yincheng Qi:
A parallel sparse triangular solve algorithm based on dependency elimination of the solution vector. 1317-1330 - Yanhui Liu, Jianbiao Zhang, Jing Zhan:
Privacy protection for fog computing and the internet of things data based on blockchain. 1331-1345 - Amir Masoud Rahmani, Zahra Babaei, Alireza Souri:
Event-driven IoT architecture for data analysis of reliable healthcare application using complex event processing. 1347-1360 - Rahul Mishra, Dharavath Ramesh, Damodar Reddy Edla:
Dynamic large branching hash tree based secure and efficient dynamic auditing protocol for cloud environment. 1361-1379 - R. Sridharan, S. Domnic:
Network policy aware placement of tasks for elastic applications in IaaS-cloud environment. 1381-1396 - Guijun Wang, Weiming Xiao, Yujie Tao:
Interpolation neural network constructed by the step path and its approximation performance. 1397-1411 - Saima Mehraj, M. Tariq Banday:
A flexible fine-grained dynamic access control approach for cloud computing environment. 1413-1434 - Benamar Bouyeddou, Fouzi Harrou, Benamar Kadri, Ying Sun:
Detecting network cyber-attacks using an integrated statistical approach. 1435-1453 - Sabitha S, M. S. Rajasree:
Multi-level on-demand access control for flexible data sharing in cloud. 1455-1478 - Ali Mohammadzadeh, Mohammad Masdari, Farhad Soleimanian Gharehchopogh, Ahmad Jafarian:
A hybrid multi-objective metaheuristic optimization algorithm for scientific workflow scheduling. 1479-1503 - Fan Deng, Zhenhua Yu, Houbing Song, Rongyi Zhao, Qi Zheng, Zhenyu Li, Huansheng He, Yixin Zhang, Fangzhi Guo:
An efficient policy evaluation engine with locomotive algorithm. 1505-1524 - Kamalakanta Sethi, Ankit Pradhan, Padmalochan Bera:
PMTER-ABE: a practical multi-authority CP-ABE with traceability, revocation and outsourcing decryption for secure access control in cloud systems. 1525-1550 - Messaouda Ayachi, Hassina Nacer, Hachem Slimani:
Cooperative game approach to form overlapping cloud federation based on inter-cloud architecture. 1551-1577 - Messaouda Ayachi, Hassina Nacer, Hachem Slimani:
Correction to: Cooperative game approach to form overlapping cloud federation based on inter-cloud architecture. 1579-1582
Volume 24, Number 3, September 2021
- Jin-Bang Hsu, Chi-Fang Lin, Yang-Cheng Chang, Ren-Hao Pan:
Using independent resource allocation strategies to solve conflicts of Hadoop distributed architecture in virtualization. 1583-1603 - Prateek Agrawal, Anatoliy Zabrovskiy, Adithyan Ilangovan, Christian Timmerer, Radu Prodan:
FastTTPS: fast approach for video transcoding time prediction and scheduling for HTTP adaptive streaming videos. 1605-1621 - A. Justin Gopinath, Nithya Balasubramanian:
Performance evaluation of grouping and regrouping scheme for mitigating hidden station problem in IEEE 802.11ah network. 1623-1642 - Sunakshi Singh, Vijay Kumar Chaurasiya:
Mutual authentication scheme of IoT devices in fog computing environment. 1643-1657 - Eduardo Viegas, Altair O. Santin, Juliana Bachtold, Darlan Segalin, Maicon Stihler, Arlindo L. Marcon Jr., Carlos Maziero:
Enhancing service maintainability by monitoring and auditing SLA in cloud computing. 1659-1674 - Vikram Puri, Ishaani Priyadarshini, Raghvendra Kumar, Chung Van Le:
Smart contract based policies for the Internet of Things. 1675-1694 - Mattia Zago, Manuel Gil Pérez, Gregorio Martínez Pérez:
Early DGA-based botnet identification: pushing detection to the edges. 1695-1710 - Ghazaleh Khojasteh Toussi, Mahmoud Naghibzadeh:
A divide and conquer approach to deadline constrained cost-optimization workflow scheduling for the cloud. 1711-1733 - Dimitrios Tychalas, Helen D. Karatza:
SaMW: a probabilistic meta-heuristic algorithm for job scheduling in heterogeneous distributed systems powered by microservices. 1735-1759 - Jasleen Kaur, Supreet Kaur:
Novel trust evaluation using NSGA-III based adaptive neuro-fuzzy inference system. 1781-1792 - Yashwant Singh Patel, Manoj Reddy, Rajiv Misra:
Energy and cost trade-off for computational tasks offloading in mobile multi-tenant clouds. 1793-1824 - Maryam Keshavarznejad, Mohammad Hossein Rezvani, Sepideh Adabi:
Delay-aware optimization of energy consumption for task offloading in fog environments using metaheuristic algorithms. 1825-1853 - Yashwant Singh Patel, Zahra Malwi, Animesh Nighojkar, Rajiv Misra:
Truthful online double auction based dynamic resource provisioning for multi-objective trade-offs in IaaS clouds. 1855-1879 - Shubhra Dwivedi, Manu Vardhan, Sarsij Tripathi:
Building an efficient intrusion detection system using grasshopper optimization algorithm for anomaly detection. 1881-1900 - Xiao-huan Liu, Degan Zhang, Jie Zhang, Ting Zhang, Haoli Zhu:
A path planning method based on the particle swarm optimization trained fuzzy neural network algorithm. 1901-1915 - Priyanka Verma, Shashikala Tapaswi, W. Wilfred Godfrey:
A request aware module using CS-IDR to reduce VM level collateral damages caused by DDoS attack in cloud environment. 1917-1933 - Haythem Bany Salameh, Ayat Shamekh:
Adaptive Packet-size Control for Improved Throughput in Dynamic Access Networks. 1935-1944 - Houda Guesmi, Anwar Kalghoum, Cherif Ghazel, Leïla Azouz Saïdane:
FFED: a novel strategy based on fast entropy to detect attacks against trust computing in cloud. 1945-1954 - Gurleen Kaur, Anju Bala:
OPSA: an optimized prediction based scheduling approach for scientific applications in cloud environment. 1955-1974 - Minho Ryu, Geonseok Lee, Kichun Lee:
Online sequential extreme studentized deviate tests for anomaly detection in streaming data with varying patterns. 1975-1987 - Bilin Shao, Yanyan Ji:
Efficient TPA-based auditing scheme for secure cloud storage. 1989-2000 - Rahul Yadav, Weizhe Zhang, Keqin Li, Chuanyi Liu, Asif Ali Laghari:
Managing overloaded hosts for energy-efficiency in cloud data centers. 2001-2015 - Radwa El Shawi, Abdul Wahab, Ahmed Barnawi, Sherif Sakr:
DLBench: a comprehensive experimental evaluation of deep learning frameworks. 2017-2038 - Liwei Fu, Shunfu Jin:
Nash equilibrium and social optimization in cloud service systems with diverse users. 2039-2050 - Ahmed Elkhalil, Jiashu Zhang, Rashad Elhabob:
An efficient heterogeneous blockchain-based online/offline signcryption systems for internet of vehicles. 2051-2068 - Kahlessenane Fares, Amine Khaldi, Redouane Kafi, Salah Euschi:
A robust blind medical image watermarking approach for telemedicine applications. 2069-2082 - Jeng-Shyang Pan, Jie Shan, Shiguang Zheng, Shu-Chuan Chu, Cheng-Kuo Chang:
Wind power prediction based on neural network with optimization of adaptive multi-group salp swarm algorithm. 2083-2098 - Meenal Jain, Gagandeep Kaur:
Distributed anomaly detection using concept drift detection based hybrid ensemble techniques in streamed network data. 2099-2114 - Wei Luo, Wenping Ma, Juntao Gao:
MHB*T based dynamic data integrity auditing in cloud storage. 2115-2132 - Mohammad Asad Abbasi, Zulfiqar Ali Memon, Nouman M. Durrani, Waleej Haider, Kashif Laeeq, Ghulam Ali Mallah:
A multi-layer trust-based middleware framework for handling interoperability issues in heterogeneous IOTs. 2133-2160 - Laith Mohammad Abualigah, Akram Jamal Dulaimi:
A novel feature selection method for data mining tasks using hybrid Sine Cosine Algorithm and Genetic Algorithm. 2161-2176 - K. C. Lalropuia, Vandana Khaitan nee Gupta:
Availability and reliability analysis of cloud computing under economic denial of sustainability (EDoS) attack: a semi-Markov approach. 2177-2191 - Hitesh Mohapatra, Amiya Kumar Rath:
A fault tolerant routing scheme for advanced metering infrastructure: an approach towards smart grid. 2193-2211 - Haifa Touati, Safa Mejri, Naceur Malouch, Farouk Kamoun:
Fair hop-by-hop interest rate control to mitigate congestion in named data networks. 2213-2230 - Peng Xiao, Zhenyu Ni, Dongbo Liu, Zhigang Hu:
A power and thermal-aware virtual machine management framework based on machine learning. 2231-2248 - Basilio B. Fraguela, Diego Andrade, Jorge González-Domínguez:
ScalaParBiBit: scaling the binary biclustering in distributed-memory systems. 2249-2268 - Mohamed S. Alshafaey, Ahmed I. Saleh, Mohamed F. Alrahamawy:
A new cloud-based classification methodology (CBCM) for efficient semantic web service discovery. 2269-2292 - Samaneh Torkzadeh, Hadi Soltanizadeh, Ali A. Orouji:
Energy-aware routing considering load balancing for SDN: a minimum graph-based Ant Colony Optimization. 2293-2312 - Francisco J. Aguayo-Canela, Héctor Alaiz-Moretón, María Teresa García-Ordás, José Alberto Benítez-Andrades, Carmen Benavides, Paulo Novais, Isaías García-Rodríguez:
Middleware-based multi-agent development environment for building and testing distributed intelligent systems. 2313-2325 - Osama A. Mahdi, Eric Pardede, Nawfal Ali:
A hybrid block-based ensemble framework for the multi-class problem to react to different types of drifts. 2327-2340 - Feras N. Al-Obeidat, Anoud Bani-Hani, Oluwasegun A. Adedugbe, Munir Majdalawieh, Elhadj Benkhelifa:
A microservices persistence technique for cloud-based online social data analysis. 2341-2353 - Yanghao Xie, Sheng Wang, Binbin Wang:
Virtual network function placement with bounded migrations. 2355-2366 - Jabir Kakkottakath Valappil Thekkepuryil, David Peter Suseelan, Preetha Mathew Keerikkattil:
An effective meta-heuristic based multi-objective hybrid optimization method for workflow scheduling in cloud computing environment. 2367-2384 - Khalid M. Hosny, Mohamed M. Darwish, Ahmad Salah, Kenli Li, Amr M. Abdelatif:
CUDAQuat: new parallel framework for fast computation of quaternion moments for color images applications. 2385-2406 - Fateme Shokri Habashi, Saleh Yousefi, Babak Ghalebsaz-Jeddi:
Resource allocation mechanisms for maximizing provider's revenue in infrastructure as a service (IaaS) cloud. 2407-2423 - Shveta Verma, Anju Bala:
Auto-scaling techniques for IoT-based cloud applications: a review. 2425-2459 - V. Jyothsna, K. Munivara Prasad, K. Rajiv, G. Ramesh Chandra:
Flow based anomaly intrusion detection system using ensemble classifier with Feature Impact Scale. 2461-2478 - Dongcheng Zhao, Long Luo, Hongfang Yu, Victor Chang, Rajkumar Buyya, Gang Sun:
Security-SLA-guaranteed service function chain deployment in cloud-fog computing networks. 2479-2494 - Vahid Jamshidi, Vahab Nekoukar, Mohammad Hossein Refan:
Real time UAV path planning by parallel grey wolf optimization with align coefficient on CAN bus. 2495-2509 - Nasrin Firouz, Mohammad Masdari, Amin Babazadeh Sangar, Kambiz Majidzadeh:
A novel controller placement algorithm based on network portioning concept and a hybrid discrete optimization algorithm for multi-controller software-defined networks. 2511-2544 - Ali Shakarami, Mostafa Ghobaei-Arani, Ali Shahidinejad, Mohammad Masdari, Hamid Shakarami:
Data replication schemes in cloud computing: a survey. 2545-2579 - Mohd Mustaqeem, Mohd Saqib:
Principal component based support vector machine (PC-SVM): a hybrid technique for software defect detection. 2581-2595 - Hui-Ching Hsieh, Mao-Lun Chiang, Tzu-Yang Chang:
Improving the fault-tolerance of software-defined networks with dynamic overlay agreement. 2597-2614 - Gaurav Sharma, Neha Miglani, Ajay Kumar:
PLB: a resilient and adaptive task scheduling scheme based on multi-queues for cloud environment. 2615-2637 - Morteza Mollajafari, Mohammad H. Shojaeefard:
TC3PoP: a time-cost compromised workflow scheduling heuristic customized for cloud environments. 2639-2656 - Doddi Srilatha, Gopal Krishna Shyam:
Cloud-based intrusion detection using kernel fuzzy clustering and optimal type-2 fuzzy neural network. 2657-2672 - Behrouz Pourghebleh, Amir Aghaei Anvigh, Amir Reza Ramtin, Behnaz Mohammadi:
The importance of nature-inspired meta-heuristic algorithms for solving virtual machine consolidation problem in cloud environments. 2673-2696 - Jean Etienne Ndamlabin Mboula, Vivient Corneille Kamla, Clémentin Tayou Djamégni:
Dynamic provisioning with structure inspired selection and limitation of VMs based cost-time efficient workflow scheduling in the cloud. 2697-2721
Volume 24, Number 4, December 2021
- Antonio Libri, Andrea Bartolini, Luca Benini:
DiG: enabling out-of-band scalable high-resolution monitoring for data-center analytics, automation and control (extended). 2723-2734 - Sardar Khaliq uz Zaman, Ali Imran Jehangiri, Tahir Maqsood, Zulfiqar Ahmad, Arif Iqbal Umar, Junaid Shuja, Eisa Alanazi, Waleed Alasmary:
Mobility-aware computational offloading in mobile edge networks: a survey. 2735-2756 - Ghofrane Fersi:
Fog computing and Internet of Things in one building block: a survey and an overview of interacting technologies. 2757-2787 - Mahnaz Rafie, Akram Reza:
Online multi-job mapping for photonic network on a chip design using partial migrations. 2789-2805 - Weijin Jiang, Sijian Lv:
Hierarchical deployment of deep neural networks based on fog computing inferred acceleration model. 2807-2817 - Mahendra Pratap Yadav, Nisha Pal, Dharmendra Kumar Yadav:
Resource provisioning for containerized applications. 2819-2840 - Javad Zarrin, Phang Hao Wen, Lakshmi Babu Saheer, Bahram Zarrin:
Blockchain for decentralization of internet: prospects, trends, and challenges. 2841-2866 - Sami Dhahbi, Mouhebeddine Berrima, Fuad Ali Mohammed Al-Yarimi:
Load balancing in cloud computing using worst-fit bin-stretching. 2867-2881 - Dharmendra Prasad Mahato, Van Huy Pham:
Reliability analysis in grid system considering load. 2883-2896 - Faiz Al Faisal, M. M. Hafizur Rahman, Yasushi Inoguchi:
3D-TTN: a power efficient cost effective high performance hierarchical interconnection network for next generation green supercomputer. 2897-2908 - Walid K. Ghamry, Suzan Shukry:
Spectrum access in cognitive IoT using reinforcement learning. 2909-2925 - Esra Celik, Deniz Dal:
A novel simulated annealing-based optimization approach for cluster-based task scheduling. 2927-2956 - Laith Mohammad Abualigah, Ali Diabat, Mohamed Abd El Aziz:
Intelligent workflow scheduling for Big Data applications in IoT cloud computing environments. 2957-2976 - Imene Ben Hafaiedh, Roua Ben Hamouda, Riadh Robbana:
A model-based approach for formal verification and performance analysis of dynamic load-balancing protocols in cloud environment. 2977-2994 - Susmitha Alamuru, Sanjay Jain:
Video event detection, classification and retrieval using ensemble feature selection. 2995-3010 - Hamza Aldabbas, Rashid Amin:
A novel mechanism to handle address spoofing attacks in SDN based IoT. 3011-3026 - Qingqing Gan, Xiaoming Wang, Jianwei Li, Jiajun Yan, Suyu Li:
Enabling online/offline remote data auditing for secure cloud storage. 3027-3041 - Frank Yeong-Sung Lin, Chiu-Han Hsiao, Si-Yuan Zhang, Yi-Ping Rung, Yu-Xuan Chen:
Cross-device matching approaches: word embedding and supervised learning. 3043-3053 - Mustapha Bouakkaz, Youcef Ouinten, Sabine Loudcher, Philippe Fournier-Viger:
Enhancing link prediction in dynamic networks using content aggregation. 3055-3063 - Sa'ed Abed, Reem Jaffal, Bassam Jamil Mohd, Mohammad H. Al Shayeji:
An analysis and evaluation of lightweight hash functions for blockchain-based IoT devices. 3065-3084 - Muhammad Imran, Valentin Kuznetsov, Katarzyna Maria Dziedziniewicz-Wojcik, Andreas Pfeiffer, Panos Paparrigopoulos, Spyridon Trigazis, Tommaso Tedeschi, Diego Ciangottini:
Migration of CMSWEB cluster at CERN to Kubernetes: a comprehensive study. 3085-3099 - Nitish Das, Aruna Priya P.:
KD-LBA: a Kernighan Lin-driven logarithmic barrier approach to solve the many-to-many assignment problem and its application in CPU/FPGA scheduling. 3101-3122 - Behzad Naderalvojoud, Adnan Ozsoy:
A non-sequential refinement approach to improve word embeddings using GPU-based string matching algorithms. 3123-3134 - Arfa Muteeh, Muhammad Sardaraz, Muhammad Tahir:
MrLBA: multi-resource load balancing algorithm for cloud computing using ant colony optimization. 3135-3145 - Anil Kumar Rangisetti, Rishabh Dwivedi, Prabhdeep Singh:
Denial of ARP spoofing in SDN and NFV enabled cloud-fog-edge platforms. 3147-3172 - Guillaume Ruty, Hana Baccouch, Victor Nguyen, Andre Surcouf, Jean-Louis Rougier, Nadia Boukhatem:
Popularity-based full replica caching for erasure-coded distributed storage systems. 3173-3186 - Seyedeh Shabnam Jazaeri, Sam Jabbehdari, Parvaneh Asghari, Hamid Haj Seyyed Javadi:
Edge computing in SDN-IoT networks: a systematic review of issues, challenges and solutions. 3187-3228 - Pouria Khanzadi, Sepideh Adabi, Babak Majidi, Ali Movaghar:
Optimal VM-to-user mapping in cloud environment based on sustainable strategy space theory. 3229-3247 - Keyvan RahimiZadeh, Abbas Dehghani:
Design and evaluation of a joint profit and interference-aware VMs consolidation in IaaS cloud datacenter. 3249-3275 - Masoumeh Etemadi, Mostafa Ghobaei-Arani, Ali Shahidinejad:
A cost-efficient auto-scaling mechanism for IoT applications in fog computing environment: a deep learning-based approach. 3277-3292 - Minhaj Ahmad Khan:
An efficient energy-aware approach for dynamic VM consolidation on cloud platforms. 3293-3310 - Mokhtar Sellami, Haithem Mezni, Mohand-Said Hacid, Mohamed Moshen Gammoudi:
Clustering-based data placement in cloud computing: a predictive approach. 3311-3336 - Ming-Jeng Yang:
Energy-efficient cloud data center with fair service level agreement for green computing. 3337-3349 - Reem Alshahrani, Hassan Peyravi:
Modeling and analysis of distributed schedulers in data center cluster networks. 3351-3366 - Saloua El Motaki, Ali Yahyaouy, Hamid Gualous, Jalal Sabor:
A new weighted fuzzy C-means clustering for workload monitoring in cloud datacenter platforms. 3367-3379 - Rana Ghazali, Sahar Adabi, Douglas G. Down, Ali Movaghar:
A classification of hadoop job schedulers based on performance optimization approaches. 3381-3403 - Hadeer Mahmoud, Mostafa Thabet, Mohamed Helmy Khafagy, Fatma A. Omara:
An efficient load balancing technique for task scheduling in heterogeneous cloud environment. 3405-3419 - Wen-Chung Shih, Chao-Tung Yang, Rajiv Ranjan, Chun-I Chiang:
Implementation and evaluation of a container management platform on Docker: Hadoop deployment as an example. 3421-3430 - Haodong Bian, Jianqiang Huang, Runting Dong, Yuluo Guo, Lingbin Liu, Dongqiang Huang, Xiaoying Wang:
A simple and efficient storage format for SIMD-accelerated SpMV. 3431-3448 - Ahmad Taghinezhad-Niar, Saeid Pashazadeh, Javid Taheri:
Workflow scheduling of scientific workflows under simultaneous deadline and budget constraints. 3449-3467 - Alireza Mahini, Reza Berangi, Amir Masoud Rahmani, Hamidreza Navidi:
Bankruptcy approach to integrity aware resource management in a cloud federation. 3469-3494 - Chengpeng Huang, Xiaoming Wang, Qingqing Gan, Daxin Huang, Mengting Yao, Yijian Lin:
A lightweight and fault-tolerable data aggregation scheme for privacy-friendly smart grids environment. 3495-3514 - Limin Xia, Wentao Ma, Lu Feng:
Semantic features and high-order physical features fusion for action recognition. 3515-3529 - Kashav Ajmera, Tribhuwan Kumar Tewari:
VMS-MCSA: virtual machine scheduling using modified clonal selection algorithm. 3531-3549 - Aqsa Rashid, Asif Masood, Atta ur Rehman Khan:
RC-AAM: blockchain-enabled decentralized role-centric authentication and access management for distributed organizations. 3551-3571 - Woong Sul, Heon Y. Yeom, Hyuck Han:
montage: NVM-based scalable synchronization framework for crash-consistent file systems. 3573-3590 - Somayeh Sobati Moghadam:
Efficient information-theoretically secure schemes for cloud data outsourcing. 3591-3606 - Saeed Doostali, Seyed Morteza Babamir, Maryam Eini:
CP-PGWO: multi-objective workflow scheduling for cloud computing using critical path. 3607-3627 - Georgios L. Stavrinides, Helen D. Karatza:
Orchestrating real-time IoT workflows in a fog computing environment utilizing partial computations with end-to-end error propagation. 3629-3650 - Seyedeh Yasaman Hosseini Mirmahaleh, Midia Reshadi, Nader Bagherzadeh, Ahmad Khademzadeh:
Data scheduling and placement in deep learning accelerator. 3651-3669 - Pramod Yelmewad, Basavaraj Talawar:
Parallel Version of Local Search Heuristic Algorithm to Solve Capacitated Vehicle Routing Problem. 3671-3692 - Farhoud Jafari Kaleibar, Maghsoud Abbaspour:
SLA-based service provisioning approach in vehicular cloud network. 3693-3708 - Jixian Zhang, Ning Xie, Xutao Yang, Xuejie Zhang, Weidong Li:
Strategy-proof mechanism for time-varying batch virtual machine allocation in clouds. 3709-3724 - Mahendra Pratap Yadav, Rohit, Dharmendra Kumar Yadav:
Maintaining container sustainability through machine learning. 3725-3750 - Lokendra Vishwakarma, Debasis Das:
BlockTree: a nonlinear structured, scalable and distributed ledger scheme for processing digital transactions. 3751-3765 - Ali Abbas Zoraghchian, Mohammad Karim Sohrabi, Farzin Yaghmaee:
Exploiting parallel graphics processing units to improve association rule mining in transactional databases using butterfly optimization algorithm. 3767-3778 - Eishvak Sengupta, Renuka Nagpal, Deepti Mehrotra, Gautam Srivastava:
ProBlock: a novel approach for fake news detection. 3779-3795 - Adrián Castelló, Enrique S. Quintana-Ortí, José Duato:
Accelerating distributed deep neural network training with pipelined MPI allreduce. 3797-3813 - Zhu Yuan, Xindong You, Xueqiang Lv, Muyuan Li, Ping Xie:
HDS: optimizing data migration and parity update to realize RAID-6 scaling for HDP. 3815-3835 - Naveen Chauhan, Haider Banka, Rajeev Agrawal:
Adaptive bandwidth adjustment for resource constrained services in fog queueing system. 3837-3850 - Sardar Khaliq uz Zaman, Ali Imran Jehangiri, Tahir Maqsood, Zulfiqar Ahmad, Arif Iqbal Umar, Junaid Shuja, Eisa Alanazi, Waleed Alasmary:
Correction to: Mobility-aware computational offloading in mobile edge networks: a survey. 3851 - Esra Celik, Deniz Dal:
Correction to: A novel simulated annealing-based optimization approach for cluster-based task scheduling. 3853 - Stefan Kehrer, Dominik Zietlow, Jochen Scheffold, Wolfgang Blochinger:
Correction to: Self-tuning serverless task farming using proactive elasticity control. 3855
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.