


default search action
Cluster Computing, Volume 23
Volume 23, Number 1, March 2020
Special Issue: Advances in Cloud Computing, Big Data and the Internet of Things;
Special Issue: Advances in High Performance Computing and its Applications;
Special Issue: AMGCC -2018;
Special Issue: High Performance Computing Conference Latin America
- Sara Khairi

, Brahim Raouyane, Mostafa Bellafkih
:
Novel QoE monitoring and management architecture with eTOM for SDN-based 5G networks. 1-12 - Abdellatif Serhani, Najib Naja, Abdellah Jamali:

AQ-Routing: mobility-, stability-aware adaptive routing protocol for data routing in MANET-IoT systems. 13-27 - Cheyma Ben Njima

, Youssef Gamha, Chirine Ghedira Guegan
, Lotfi Ben Romdhane
:
Development of a mobile web services discovery and composition model. 29-42 - Muhua Liu

, Ying Wu, Rui Xue, Rui Zhang:
Verifiable outsourcing computation for modular exponentiation from shareable functions. 43-55 - Jieun Choi, Geunchul Park, Dukyun Nam

:
Interference-aware co-scheduling method based on classification of application characteristics from hardware performance counter using data mining. 57-69 - Seontae Kim, Young-ri Choi

:
Constraint-aware VM placement in heterogeneous computing clusters. 71-85 - Yisel Gari

, David A. Monge
, Cristian Mateos, Carlos García Garino:
Learning budget assignment policies for autoscaling scientific workflows in the cloud. 87-105 - Cristian Galleguillos

, Zeynep Kiziltan, Alessio Netti, Ricardo Soto:
AccaSim: a customizable workload management simulator for job dispatching research in HPC systems. 107-122 - Thaylon Guedes, Leonardo Araújo de Jesus, Kary A. C. S. Ocaña

, Lúcia M. A. Drummond
, Daniel de Oliveira
:
Provenance-based fault tolerance technique recommendation for cloud-based scientific workflows: a practical approach. 123-148 - Lucia Damiani, Ariel Ivan Diaz, Javier Iparraguirre

, Aníbal M. Blanco:
Accelerated particle swarm optimization with explicit consideration of model constraints. 149-164 - Maximiliano Geier, David A. González Márquez, Esteban E. Mocskos

:
SherlockFog: a new tool to support application analysis in Fog and Edge computing. 165-176 - Pablo Carvalho, Rommel Anatoli Quintanilla Cruz

, Lúcia M. A. Drummond
, Cristiana Bentes
, Esteban Clua, Edson Cataldo, Leandro A. J. Marzulo:
Kernel concurrency opportunities based on GPU benchmarks characterization. 177-188 - Ying-xin Chen:

Agent-based research on crowd interaction in emergency evacuation. 189-202 - Ying-xin Chen, Pandu R. Tadikamalla, Jennifer Shang, Yan Song

:
Supply allocation: bi-level programming and differential evolution algorithm for Natural Disaster Relief. 203-217 - Evangelos Pournaras

, Srivatsan Yadhunathan, Ada Diaconescu:
Holarchic structures for decentralized deep learning: a performance analysis. 219-240 - Mahmood Mortazavi-Dehkordi, Kamran Zamanifar

:
Efficient deadline-aware scheduling for the analysis of Big Data streams in public Cloud. 241-263 - Chao-Tung Yang

, Shuo-Tsung Chen, Jung-Chun Liu, Ren-Hao Liu, Ching-Lung Chang:
On construction of an energy monitoring service using big data technology for the smart campus. 265-288 - Aadil Zia Khan

, Ihsan Ayyub Qazi
:
RecFlow: SDN-based receiver-driven flow scheduling in datacenters. 289-306 - Mohammad Sharfoddin Khatib, Mohammad Atique:

FGSA for optimal quality of service based transaction in real-time database systems under different workload condition. 307-319 - Babak Aghaei

, Midia Reshadi, Mohammad Masdari, Seyed Hadi Sajadi, Mehdi Hosseinzadeh
, Aso Mohammad Darwesh:
Network adapter architectures in network on chip: comprehensive literature review. 321-346 - Jiwoong Park, Yongseok Son, Heon Young Yeom, Yoonhee Kim

:
SoftDC: software-based dynamically connected transport. 347-357 - Sandra Catalán

, Adrián Castelló
, Francisco D. Igual
, Rafael Rodríguez-Sánchez
, Enrique S. Quintana-Ortí:
Programming parallel dense matrix factorizations with look-ahead and OpenMP. 359-375 - Amrita Jyoti

, Manish Shrimali
:
Dynamic provisioning of resources based on load balancing and service broker policy in cloud computing. 377-395 - Bilal Iqbal, Waheed Iqbal

, Nazar Khan, Arif Mahmood
, Abdelkarim Erradi:
Canny edge detection and Hough transform for high resolution video streams using Hadoop and Spark. 397-408
Volume 23, Number 2, June 2020
- Guilan Feng, Zhengnan Li, Wengang Zhou, Shi Dong

:
Entropy-based outlier detection using spark. 409-419 - Jean-Marc Pierson

, Patricia Stolf
, Hongyang Sun
, Henri Casanova:
MILP formulations for spatio-temporal thermal-aware scheduling in Cloud and HPC datacenters. 421-439 - Saroja Subbaraj

, Revathi Thiagarajan
:
Hybrid dual-objective parallel genetic algorithm for heterogeneous multiprocessor scheduling. 441-450 - Rajaputhri Maharaja, Prashant Iyer, Zilong Ye

:
A hybrid fog-cloud approach for securing the Internet of Things. 451-459 - Seyed Mehdi Mohtavipour

, Morteza Mollajafari
, Ali Naseri:
A novel packet exchanging strategy for preventing HoL-blocking in fat-trees. 461-482 - Hong Huang, Latifur Khan

, Zhou Shaohua:
Classified enhancement model for big data storage reliability based on Boolean satisfiability problem. 483-492 - Wenjing Ma, Yulong Ao, Chao Yang

, Samuel Williams
:
Solving a trillion unknowns per second with HPGMG on Sunway TaihuLight. 493-507 - Asmaa H. Rabie, Shereen H. Ali

, Ahmed I. Saleh, Hesham A. Ali:
A new outlier rejection methodology for supporting load forecasting in smart grids based on big data. 509-535 - Abhishek Mishra

, Prasoon Trivedi:
Benchmarking the contention aware nature inspired metaheuristic task scheduling algorithms. 537-553 - Xiaohui Wei, Yuan Zhuang, Hongliang Li

, Zhiliang Liu:
Reliable stream data processing for elastic distributed stream processing systems. 555-574 - Mahmoud Mohammed Badawy

, Zainab Hassan Ali
, Hesham A. Ali:
QoS provisioning framework for service-oriented internet of things (IoT). 575-591 - Hongjian Li

, Huochen Wang, Shuyong Fang, Yang Zou, Wenhong Tian:
An energy-aware scheduling algorithm for big data applications in Spark. 593-609 - Bilal Ahmad

, Zaib Maroof, Sally I. McClean, Darryl Charles
, Gerard Parr:
Economic impact of energy saving techniques in cloud server. 611-621 - Jianyu Fu

, Youyou Lu, Jiwu Shu, Guangming Liu, Ming Zhao:
COWCache: effective flash caching for Copy-on-Write virtual disks. 623-639 - Behrouz Pourghebleh

, Vahideh Hayyolalam:
A comprehensive and systematic review of the load balancing mechanisms in the Internet of Things. 641-661 - Sara Tabagchi Milan, Lila Rajabion, Aso Mohammad Darwesh, Mehdi Hosseinzadeh

, Nima Jafari Navimipour:
Priority-based task scheduling method over cloudlet using a swarm intelligence algorithm. 663-671 - Fang Huang

, Bo Tie, Jian Tao
, Xicheng Tan, Yan Ma:
Methodology and optimization for implementing cluster-based parallel geospatial algorithms with a case study. 673-704 - Ting Wu

, Xianzhang Chen
, Kai Liu
, Chunhua Xiao, Zhixiang Liu, Qingfeng Zhuge, Edwin H.-M. Sha:
HydraFS: an efficient NUMA-aware in-memory file system. 705-724 - Monther Aldwairi

, Abdulmughni Y. Hamzah, Moath H. A. Jarrah
:
KPN-based parallelization of Wu-Manber algorithm on multi-core machines. 725-734 - Amin Shokrzade

, Fardin Akhlaghian Tab
, Mohsen Ramezani:
ELM-NET, a closer to practice approach for classifying the big data using multiple independent ELMs. 735-757 - Mohammad Hadi Mazidi, Mohammad Eshghi, Mohammad Reza Raoufy:

Detection of premature ventricular contraction (PVC) using linear and nonlinear techniques: an experimental study. 759-774 - Sumedha Arora

, Anju Bala:
A survey: ICT enabled energy efficiency techniques for big data applications. 775-796 - Seyedeh Yasaman Rashida, Masoud Sabaei, Mohammad Mehdi Ebadzadeh, Amir Masoud Rahmani

:
A memetic grouping genetic algorithm for cost efficient VM placement in multi-cloud environment. 797-836 - Hamid Talebian, Abdullah Gani

, Mehdi Sookhak
, Ahmed Abdelaziz Abdelatif, Abdullah Yousafzai
, Athanasios V. Vasilakos
, Fei Richard Yu:
Optimizing virtual machine placement in IaaS data centers: taxonomy, review and open issues. 837-878 - Muhammad Umair Sadiq

, Muhammad Murtaza Yousaf, Laeeq Aslam, Muhammad Aleem
, Shahzad Sarwar, Syed Waqar Jaffry
:
NvPD: novel parallel edit distance algorithm, correctness, and performance evaluation. 879-894 - Hyeongwon Jang, Sang Youp Rhee, Jae Eun Kim, Yoonhee Kim

, Hyuck Han, Sooyong Kang, Hyungsoo Jung:
AutoBahn: a concurrency control framework for non-volatile file buffer. 895-910 - Ashish Kumar Maurya

, Kashish Modi, Vinay Kumar
, Nenavath Srinivas Naik
, Anil Kumar Tripathi:
Energy-aware scheduling using slack reclamation for cluster systems. 911-923 - Mouna Ben Said, Yessine Hadj Kacem

, Mickaël Kerboeuf, Mohamed Abid:
An MDE-based approach for self-adaptive RTES model generation. 925-951 - Ajeet Ram Pathak

, Manjusha Pandey, Siddharth S. Rautaray
:
Approaches of enhancing interoperations among high performance computing and big data analytics via augmentation. 953-988 - Surendra Singh, Suvadip Batabyal

, Sachin Tripathi:
Security aware dynamic scheduling algorithm (SADSA) for real-time applications on grid. 989-1005 - Hanan Ali, Ghada M. Fathy

, Zeinab Fayez, Walaa M. Sheta:
Exploring the parallel capabilities of GPU: Berlekamp-Massey algorithm case study. 1007-1024 - Salma Abdel Magid, Francesco Petrini, Behnam Dezfouli

:
Image classification on IoT edge devices: profiling and modeling. 1025-1043 - Ali Shahidinejad

, Mostafa Ghobaei-Arani
, Leila Esmaeili
:
An elastic controller using Colored Petri Nets in cloud computing environment. 1045-1071 - Mokhtar A. Alworafi

, Suresha Mallappa:
A collaboration of deadline and budget constraints for task scheduling in cloud computing. 1073-1083 - Rashad Elhabob

, Yanan Zhao, Nabeil Eltayieb
, Abdeldime M. S. Abdelgader, Hu Xiong:
Identity-based encryption with authorized equivalence test for cloud-assisted IoT. 1085-1101 - Moumita Chatterjee

, Anirban Mitra, Sudipta Roy
, Sanjit Kumar Setua:
Gossip based fault tolerant protocol in distributed transactional memory using quorum based replication system. 1103-1124 - Shi Dong

, Raj Jain:
Energy-efficient scheme based on user task characteristic in virtual cloud platform. 1125-1135 - Xingwang Huang

, Chaopeng Li, Hefeng Chen, Dong An:
Task scheduling in cloud computing using particle swarm optimization with time varying inertia weight strategies. 1137-1147 - Harkiran Kaur

, Sandeep K. Sood
, Munish Bhatia
:
Cloud-assisted green IoT-enabled comprehensive framework for wildfire monitoring. 1149-1162 - Yunyan Li, Yuansheng Huang, Meimei Zhang, Lila Rajabion

:
Service selection mechanisms in the Internet of Things (IoT): a systematic and comprehensive study. 1163-1183 - Poopak Azad, Nima Jafari Navimipour

, Amir Masoud Rahmani, Arash Sharifi
:
The role of structured and unstructured data managing mechanisms in the Internet of things. 1185-1198 - Mahdi Sarbazi, Mehdi Sadeghzadeh, Seyyed Javad Mir Abedini:

Improving resource allocation in software-defined networks using clustering. 1199-1210 - Jonas Markussen

, Lars Bjørlykke Kristiansen, Rune Johan Borgli, Håkon Kvale Stensland, Friedrich Seifert, Michael Riegler, Carsten Griwodz, Pål Halvorsen:
Flexible device compositions and dynamic resource sharing in PCIe interconnected clusters using Device Lending. 1211-1234 - Chirag Dashora, P. Edwin Sudhagar

, J. Marietta
:
IoT based framework for the detection of vehicle accident. 1235-1250 - Muhammad Ibrahim

, Muhammad Azhar Iqbal, Muhammad Aleem
, Muhammad Arshad Islam, Nguyen-Son Vo
:
MAHA: Migration-based Adaptive Heuristic Algorithm for Large-scale Network Simulations. 1251-1266 - Asif Nawaz, Ashfaq Ahmed Awan, Tariq Ali, Muhammad Rizwan Rashid Rana:

Product's behaviour recommendations using free text: an aspect based sentiment analysis approach. 1267-1279 - Sumit Badotra

, Surya Narayan Panda
:
Evaluation and comparison of OpenDayLight and open networking operating system in software-defined networking. 1281-1291 - Behzad Chitsaz

, Ahmad Khonsari
:
General spin-up time distribution for energy-aware IaaS cloud service models. 1293-1301 - Brahim Hmedna

, Ali El Mezouary, Omar Baz:
A predictive model for the identification of learning styles in MOOC environments. 1303-1328 - Rajat Saxena

, Somnath Dey:
DDoS attack prevention using collaborative approach for cloud computing. 1329-1344 - Ahmad Alnafessah

, Giuliano Casale
:
Artificial neural networks based techniques for anomaly detection in Apache Spark. 1345-1360 - Ahmad Alnafessah

, Giuliano Casale
:
Correction to: Artificial neural networks based techniques for anomaly detection in Apache Spark. 1361-1362 - Jitendra Kumar

, Ashutosh Kumar Singh
:
Cloud datacenter workload estimation using error preventive time series forecasting models. 1363-1379 - Muhammad Saleem

, Yasir Saleem, Muhammad Faisal Hayat:
Stochastic QoE-aware optimization of multisource multimedia content delivery for mobile cloud. 1381-1396 - Vikash Kumar

, Ditipriya Sinha
, Ayan Kumar Das, Subhash Chandra Pandey, Radha Tamal Goswami:
An integrated rule based intrusion detection system: analysis on UNSW-NB15 data set and the real time online dataset. 1397-1418 - Anum Masood

, Saima Gulzar Ahmad
, Hikmat Ullah Khan
, Ehsan Ullah Munir:
Network Reconfiguration Algorithm (NRA) for scheduling communication-intensive graphs in heterogeneous computing environment. 1419-1438 - Manjit Kaur, Dilbag Singh

:
Fusion of medical images using deep belief networks. 1439-1453 - Reyhaneh Rabaninejad

, Maryam Rajabzadeh Asaar, Mahmoud Ahmadian-Attari, Mohammad Reza Aref:
An identity-based online/offline secure cloud storage auditing scheme. 1455-1468 - Mahmoud Seifallahi, Hadi Soltanizadeh

, Afsoon Hassani Mehraban
, Fatemeh Khamseh:
Alzheimer's disease detection using skeleton data recorded with Kinect camera. 1469-1481 - Dharmendra Prasad Mahato

, Jasminder Kaur Sandhu
, Nagendra Pratap Singh
, Vishal Kaushal
:
On scheduling transaction in grid computing using cuckoo search-ant colony optimization considering load. 1483-1504 - Mohammad Hossein Shafiabadi, Hossein Pedram

, Midia Reshadi, Akram Reza
:
Comprehensive regression-based model to predict performance of general-purpose graphics processing unit. 1505-1516
Volume 23, Number 3, September 2020
Special Issue : Big Data Analytics in Urban Computing;
Special Issue : Enhancing security using Blockchain for Cyber-Physical System;
Special Issue : WorldCIST19 conference;
Special Issue : DAAC-2018;
Special Issue : Advances in Intelligent Big Data Analytics for Cloud & Cluster Comp;
Special Issue : Nature-Inspired Design of Par & Dist CI;
Special Issue : Blockchain for IoT;
Special Issue : AMGCC -2018;
Special Issue : Data Warehouse and On-line Analysis (EDA)
- Hania Gadouche

, Farah Zoubeyr
, Abdelkamel Tari:
A correct-by-construction model for attribute-based access control. 1517-1528 - Houari Mahfoud

:
Graph pattern matching with counting quantifiers and label-repetition constraints. 1529-1553 - George Roumelis, Polychronis Velentzas, Michael Vassilakopoulos

, Antonio Corral
, Athanasios Fevgas, Yannis Manolopoulos:
Parallel processing of spatial batch-queries using xBR+-trees in solid-state drives. 1555-1575 - Foudil Abdessamia, Weizhe Zhang

, Yu-Chu Tian
:
Energy-efficiency virtual machine placement based on binary gravitational search algorithm. 1577-1588 - Zakaria Maamar

, Muhammad Asim
, Khouloud Boukadi
, Thar Baker
, Saad Saeed, Ikbel Guidara, Fadwa Yahya
, Emir Ugljanin, Djamal Benslimane:
Towards a Quality-of-Thing based approach for assigning things to federations. 1589-1602 - Khaled Khebbeb, Nabil Hameurlain, Faiza Belala:

Formalizing and simulating cross-layer elasticity strategies in Cloud systems. 1603-1631 - M. Indrasena Reddy

, A. P. Siva Kumar
:
An efficient data transmission approach using IAES-BE. 1633-1645 - Nourelhoda M. Mahmoud

, Hassan Fouad
, Omar Alsadon
, Ahmed M. Soliman
:
Detecting dental problem related brain disease using intelligent bacterial optimized associative deep neural network. 1647-1657 - Xu Chen, Xiaoping Cai, Yangyang Zhou, Zhibin Hao

:
Development of data monitoring application based on IoT. 1659-1667 - Mohamed Hashem, Ahmed E. Youssef

:
Teeth infection and fatigue prediction using optimized neural networks and big data analytic tool. 1669-1682 - Dilip Venkata Kumar Vengala

, D. Kavitha, A. P. Siva Kumar
:
Secure data transmission on a distributed cloud server with the help of HMCA and data encryption using optimized CP-ABE-ECC. 1683-1696 - Aarti Jain

, Manju Khari, Elena Verdú
, Shigeru Omatsu, Rubén González Crespo
:
A route selection approach for variable data transmission in wireless sensor networks. 1697-1709 - Vadivel Ramasamy

, SudalaiMuthu Thalavai Pillai:
An effective HPSO-MGA optimization algorithm for dynamic resource allocation in cloud environment. 1711-1724 - A. Helen Sharmila

, Natarajan Jaisankar
:
E-MHMS: enhanced MAC-based secure delay-aware healthcare monitoring system in WBAN. 1725-1740 - M. Sridhar

, P. B. Pankajavalli
:
An optimization of distributed Voronoi-based collaboration for energy-efficient geographic routing in wireless sensor networks. 1741-1754 - Ayed Alwadain, Mohammad Al-Ma'aitah, Aldosary Saad

:
Developing computerized speech therapy system using metaheuristic optimized artificial cuckoo immune system. 1755-1767 - Fayez Alqahtani, Zafer Al-Makhadmeh, Amr Tolba

, Wael Said
:
Internet of things-based urban waste management system for smart cities using a Cuckoo Search Algorithm. 1769-1780 - Ahed Abugabah, Ahmad Ali AlZubi, Feras N. Al-Obeidat

, Abdulaziz Alarifi, Ayed Alwadain:
Data mining techniques for analyzing healthcare conditions of urban space-person lung using meta-heuristic optimized neural networks. 1781-1794 - José Chamadoira González, Vicente García-Díaz

, Edward Rolando Núñez-Valdéz
, Alberto Gómez Gómez
, Rubén González Crespo
:
Replacing email protocols with blockchain-based smart contracts. 1795-1801 - Andrea Vázquez-Ingelmo

, Francisco José García-Peñalvo
, Roberto Therón
, Daniel Amo Filvà
, David Fonseca Escudero:
Connecting domain-specific features to source code: towards the automatization of dashboard generation. 1803-1816 - Yogesh

, Ashwani Kumar Dubey, Rajeev Ratan
, Álvaro Rocha
:
Computer vision based analysis and detection of defects in fruits causes due to nutrients deficiency. 1817-1826 - Angel Marcelo Rea-Guaman, Jezreel Mejía

, Tomás San Feliu, José A. Calvo-Manzano
:
AVARCIBER: a framework for assessing cybersecurity risks. 1827-1843 - João Vidal de Carvalho

, Sandro Carvalho
, Álvaro Rocha
:
European strategy and legislation for cybersecurity: implications for Portugal. 1845-1854 - Ahmar Rashid, Muhammad Amir Zeb, Amad Rashid, Sajid Anwar

, Fernando Joaquim, Zahid Halim
:
Conceptualization of smartphone usage and feature preferences among various demographics. 1855-1873 - Paulo Carlos López-López

, Pablo Oñate, Álvaro Rocha
:
Social media mining, debate and feelings: digital public opinion's reaction in five presidential elections in Latin America. 1875-1886 - Marco Rosa, João Paulo Barraca

, Nelson Pacheco da Rocha:
Blockchain structures to guarantee logging integrity of a digital platform to support community-dwelling older adults. 1887-1898 - Yao Lu, Shuyang An:

Research on sports video detection technology motion 3D reconstruction based on hidden Markov model. 1899-1909 - Natalia G. Miloslavskaya, Alexander I. Tolstoy:

IoTBlockSIEM for information security incident management in the internet of things ecosystem. 1911-1925 - (Withdrawn) Intrusion detection and performance simulation based on improved sequential pattern mining algorithm. 1927-1936

- Darwin Alulema

, Javier Criado
, Luis Iribarne
, Antonio Jesús Fernández-García
, Rosa Ayala
:
A model-driven engineering approach for the service integration of IoT systems. 1937-1954 - Akalanka Mailewa Dissanayaka

, Susan A. Mengel, Lisa Gittner
, Hafiz Khan:
Security assurance of MongoDB in singularity LXCs: an elastic and convenient testbed using Linux containers to explore vulnerabilities. 1955-1971 - Hanqian Wu

, Siliang Cheng, Zhike Wang, Shangbin Zhang, Feng Yuan:
Multi-task learning based on question-answering style reviews for aspect category classification and aspect term extraction on GPU clusters. 1973-1986 - Zilong Jiang, Shu Gao:

An intelligent recommendation approach for online advertising based on hybrid deep neural network and parallel computing. 1987-2000 - Nagaraj Balakrishnan

, Arunkumar Rajendran
, K. Nisi, Ponnusamy Vijayakumar
:
Enhancement of fraternal K-median algorithm with CNN for high dropout probabilities to evolve optimal time-complexity. 2001-2008 - (Withdrawn) Framework for social tag recommendation using Lion Optimization Algorithm and collaborative filtering techniques. 2009-2019

- Maryam AlJame, Imtiaz Ahmad, Mohammad AlFailakawi

:
Apache Spark Implementation of Whale Optimization Algorithm. 2021-2034 - Rajani Singh

, Ashutosh Dhar Dwivedi
, Gautam Srivastava
, Agnieszka Wiszniewska-Matyszkiel, Xiaochun Cheng
:
A game theoretic analysis of resource mining in blockchain. 2035-2046 - Yazdan Ahmad Qadri

, Rashid Ali, Arslan Musaddiq
, Fadi Al-Turjman
, Dae Wan Kim, Sung Won Kim
:
The limitations in the state-of-the-art counter-measures against the security threats in H-IoT. 2047-2065 - Umair Khalid, Muhammad Asim

, Thar Baker
, Patrick C. K. Hung, Muhammad Adnan Tariq, Laura Rafferty:
A decentralized lightweight blockchain-based authentication mechanism for IoT systems. 2067-2087 - Deepa Pavithran

, Khaled Shaalan, Jamal N. Al-Karaki, Amjad Gawanmeh
:
Towards building a blockchain framework for IoT. 2089-2103 - Ray Neiheiser

, Gustavo Inácio, Luciana Rech
, Joni da Silva Fraga:
HRM smart contracts on the blockchain: emulated vs native. 2105-2122 - Syed Muhammad Danish, Marios Lestas, Hassaan Khaliq Qureshi, Kaiwen Zhang, Waqar Asif, Muttukrishnan Rajarajan:

Securing the LoRaWAN join procedure using blockchains. 2123-2138 - Razi Iqbal, Talal Ashraf Butt

:
Safe farming as a service of blockchain-based supply chain management for improved transparency. 2139-2150 - Lewis Tseng, Xinyu Yao

, Safa Otoum
, Moayad Aloqaily
, Yaser Jararweh:
Blockchain-based database in an IoT environment: challenges, opportunities, and analysis. 2151-2165 - Minwoo Gu, Younghun Park, Youngjae Kim, Sungyong Park

:
Low-overhead dynamic sharing of graphics memory space in GPU virtualization environments. 2167-2178 - Qichen Chen, Jisun Oh, Seoyoung Kim, Yoonhee Kim

:
Design of an adaptive GPU sharing and scheduling scheme in container-based cluster. 2179-2191 - Youngrang Kim, Jaehwan Lee

, Jik-Soo Kim, Hyunseung Jei, Hongchan Roh:
Comprehensive techniques of multi-GPU memory optimization for deep learning acceleration. 2193-2204 - Neungsoo Park, Soeun Park, Myungho Lee

:
High performance parallel KMP algorithm on a heterogeneous architecture. 2205-2217 - Jisun Oh, Yoonhee Kim

:
Job placement using reinforcement learning in GPU virtualization environment. 2219-2234 - Sangyeon Woo, Jeho Song, Sanghyeok Kim, Youngjae Kim, Sungyong Park

:
GARET: improving throughput using gas consumption-aware relocation in Ethereum sharding environments. 2235-2247 - Jeongchul Kim, Kyungyong Lee:

I/O resource isolation of public cloud serverless function runtimes for data-intensive applications. 2249-2259 - Sunggon Kim

, Dongwhan Kim, Yongseok Son
, Hyeonsang Eom:
Towards predicting GPGPU performance for concurrent workloads in Multi-GPGPU environment. 2261-2272 - Yunjae Lee, Yoonhee Kim

, Heon Y. Yeom:
Lightweight memory tracing for hot data identification. 2273-2285 - Youngrang Kim, Hyeonseong Choi

, Jaehwan Lee
, Jik-Soo Kim, Hyunseung Jei, Hongchan Roh:
Towards an optimized distributed deep learning framework for a heterogeneous multi-GPU cluster. 2287-2300 - Hwajung Kim, Heon Young Yeom, Yongseok Son

:
Design and implementation of an I/O isolation scheme for key-value store on multiple solid-state drives. 2301-2313 - Ahmed Rabhi

, Rachida Fissoune:
WODII: a solution to process SPARQL queries over distributed data sources. 2315-2322 - Simon Pierre Dembele

, Ladjel Bellatreche, Carlos Ordonez, Amine Roukh:
Think big, start small: a good initiative to design green query optimizers. 2323-2345 - Maha Ben Kraiem

, Mohammed A. Alqarni
, Jamel Feki, Franck Ravat
:
OLAP operators for social network analysis. 2347-2374 - Sami Belkacem

, Kamel Boukhalfa
, Omar Boussaid:
Expertise-aware news feed updates recommendation: a random forest approach. 2375-2388 - Mohamed Amine Boudia

, Reda Mohamed Hamou, Abdelmalek Amine, Ahmed Chaouki Lokbani:
An adaptation of a F-measure for automatic text summarization by extraction. 2389-2398
Volume 23, Number 4, December 2020
- Mohammad Masdari, Afsane Khoshnevis:

A survey and classification of the workload forecasting methods in cloud computing. 2399-2424 - Sepideh Adabi

, Zahra Hossein-Haje, Sahar Adabi
:
A new cost-effective mechanism for VM-to-user mapping in cloud data centers. 2425-2451 - Alireza Souri

, Amir Masoud Rahmani, Nima Jafari Navimipour, Reza Rezaei:
A hybrid formal verification approach for QoS-aware multi-cloud service composition. 2453-2470 - Nourchène Ouerhani, Ahmed Maalel

, Henda Ben Ghézela
:
SPeCECA: a smart pervasive chatbot for emergency case assistance based on cloud computing. 2471-2482 - Jun-qing Li

, Yun-qi Han:
A hybrid multi-objective artificial bee colony algorithm for flexible task scheduling problems in cloud computing system. 2483-2499 - Yubo Liu

, Hongbo Li
, Yutong Lu, Zhiguang Chen, Nong Xiao, Ming Zhao:
HasFS: optimizing file system consistency mechanism on NVM-based hybrid storage architecture. 2501-2515 - Vijay Kumar Yadav, Anshu S. Anand, Shekhar Verma

, S. Venkatesan:
Private computation of the Schulze voting method over the cloud. 2517-2531 - Mohammad Masdari, Sasan Gharehpasha, Mostafa Ghobaei-Arani

, Vafa Ghasemi:
Bio-inspired virtual machine placement schemes in cloud computing environment: taxonomy, review, and future research directions. 2533-2563 - Mehmet Tahir Sandikkaya

, Yusuf Yaslan
, Cemile Diler Özdemir:
DeMETER in clouds: detection of malicious external thread execution in runtime with machine learning in PaaS clouds. 2565-2578 - Rayapati Venkata Sudhakar

, T. Ch. Malleswara Rao:
Security aware index based quasi-identifier approach for privacy preservation of data sets for cloud applications. 2579-2589 - Guohua You, Xuejing Wang:

A server-side accelerator framework for multi-core CPUs and Intel Xeon Phi co-processor systems. 2591-2608 - Sasha Mahdavi Hezavehi

, Rouhollah Rahmani:
An anomaly-based framework for mitigating effects of DDoS attacks using a third party auditor in cloud computing environments. 2609-2627 - Mohammad Masdari, Hemn Khezri:

Efficient VM migrations using forecasting techniques in cloud computing: a comprehensive review. 2629-2658 - Nitin Khanna

, Monika Sachdeva
:
OFFM-ANFIS analysis for flood prediction using mobile IoS, fog and cloud computing. 2659-2676 - Luay Alawneh

, Mohammed A. Shehab
, Mahmoud Al-Ayyoub, Yaser Jararweh, Ziad A. Al-Sharif
:
A scalable multiple pairwise protein sequence alignment acceleration using hybrid CPU-GPU approach. 2677-2688 - Xin Geng, Haitao Zhang

, Zhengyang Zhao, Huadong Ma:
Interference-aware parallelization for deep learning workload in GPU cluster. 2689-2702 - Mohammed Alweshah

, Maria Al-Sendah, Osama M. Dorgham
, Ammar Almomani
, Sara Tedmori:
Improved water cycle algorithm with probabilistic neural network to solve classification problems. 2703-2718 - Alireza Abdollahpouri

, Chiman Salavati, Jamal Arkat, Fardin Akhlaghian Tab, Zhaleh Manbari:
A multi-objective model for identifying valuable nodes in complex networks with minimum cost. 2719-2733 - Jerzy Proficz

:
Process arrival pattern aware algorithms for acceleration of scatter and gather operations. 2735-2751 - Zhiping Peng, Jianpeng Lin

, Delong Cui
, Qirui Li, Jieguang He:
A multi-objective trade-off framework for cloud resource scheduling based on the Deep Q-network algorithm. 2753-2767 - Carlos Juiz, Belén Bermejo

:
The CiS2: a new metric for performance and energy trade-off in consolidated servers. 2769-2788 - A. Ananya, A. Aswathy, T. R. Amal, P. G. Swathy, Vinod P, Mohammad Shojafar

:
SysDroid: a dynamic ML-based android malware analyzer using system call traces. 2789-2808 - Bo Wang

, Changhai Wang
, Ying Song, Jie Cao, Xiao Cui, Ling Zhang:
A survey and taxonomy on workload scheduling and resource provisioning in hybrid clouds. 2809-2834 - Fatemeh Erfan, Hamid Mala

:
Secure and efficient publicly verifiable outsourcing of matrix multiplication in online mode. 2835-2845 - Tayyip Özcan

, Alper Bastürk
:
Human action recognition with deep learning and structural optimization using a hybrid heuristic algorithm. 2847-2860 - Rashmi Shrivastava, Manju Pandey:

Real time fall detection in fog computing scenario. 2861-2870 - Ali Belgacem

, Kadda Beghdad Bey, Hassina Nacer
, Sofiane Bouznad:
Efficient dynamic resource allocation method for cloud computing environment. 2871-2889 - P. Neelima, A. Rama Mohan Reddy:

An efficient load balancing system using adaptive dragonfly algorithm in cloud computing. 2891-2899 - Zi-xian Liu

, De-gan Zhang, Gu-zhao Luo, Ming Lian, Bing Liu
:
A new method of emotional analysis based on CNN-BiLSTM hybrid neural network. 2901-2913 - Upasna Joshi

, Rajiv Kumar:
A novel deep neural networks based path prediction. 2915-2924 - Yuncheng Jiang:

Semantically-enhanced information retrieval using multiple knowledge sources. 2925-2944 - Elnaz Parvizi, Mohammad Hossein Rezvani

:
Utilization-aware energy-efficient virtual machine placement in cloud networks using NSGA-III meta-heuristic approach. 2945-2967 - Ashima Yadav, Dinesh Kumar Vishwakarma

:
A comparative study on bio-inspired algorithms for sentiment analysis. 2969-2989 - Neeraj

, Major Singh Goraya
, Damanpreet Singh
:
Satisfaction aware QoS-based bidirectional service mapping in cloud environment. 2991-3011 - Nayereh Rasouli

, Ramin Razavi, Hamid Reza Faragardi:
EPBLA: energy-efficient consolidation of virtual machines using learning automata in cloud data centers. 3013-3027 - Marjan Jalali Moghaddam

, Akram Esmaeilzadeh, Mina Ghavipour
, Ahmad Khadem Zadeh:
Minimizing virtual machine migration probability in cloud computing environments. 3029-3038 - Azlan B. Ismail

:
Energy-driven cloud simulation: existing surveys, simulation supports, impacts and challenges. 3039-3055 - E. K. Subramanian

, Latha Tamilselvan
:
Elliptic curve Diffie-Hellman cryptosystem in big data cloud security. 3057-3067 - Jinsong Wang, Jiping Liao, Wei Huang

:
A density-based maximum margin machine classifier. 3069-3078 - Shashank Kumar Mishra, R. Manjula:

A meta-heuristic based multi objective optimization for load distribution in cloud data center under varying workloads. 3079-3093 - Amjad Ullah, Jingpeng Li, Amir Hussain:

Design and evaluation of a biologically-inspired cloud elasticity framework. 3095-3117 - Gopi Bhatt

, Madhuri D. Bhavsar:
Performance consequence of user space file systems due to extensive CPU sharing in virtual environment. 3119-3137 - Min Xiang, Yuzhou Jiang, Zhong Xia, Chunmei Huang:

Consistent hashing with bounded loads and virtual nodes-based load balancing strategy for proxy cache cluster. 3139-3155 - Sumedha Arora, Anju Bala:

PAP: power aware prediction based framework to reduce disk energy consumption. 3157-3174 - Eswaraiah Rayachoti

, Sudhir Tirumalasetty
, Silpa Chaitanya Prathipati:
SLT based watermarking system for secure telemedicine. 3175-3184 - Naela Rizvi

, Dharavath Ramesh
:
Fair budget constrained workflow scheduling approach for heterogeneous clouds. 3185-3201 - Mahdi Abbasi

, Aazad Shokrollahi
:
Enhancing the performance of decision tree-based packet classification algorithms using CPU cluster. 3203-3219 - Aws Naser Jaber

, Shafiq Ul Rehman
:
FCM-SVM based intrusion detection system for cloud computing environment. 3221-3231 - Rahim Taheri

, Reza Javidan, Mohammad Shojafar
, P. Vinod, Mauro Conti
:
Can machine learning model with static features be fooled: an adversarial machine learning approach. 3233-3253 - Tarun Biswas

, Pratyay Kuila
, Anjan Kumar Ray:
A novel workflow scheduling with multi-criteria using particle swarm optimization for heterogeneous computing systems. 3255-3271 - Suzanne Elashri, Akramul Azim:

Energy-efficient offloading of real-time tasks using cloud computing. 3273-3288 - Ajay Kumar

, Seema Bawa:
DAIS: dynamic access and integration services framework for cloud-oriented storage systems. 3289-3308 - Fatma M. Talaat

, Shereen H. Ali
, Ahmed I. Saleh, Hesham A. Ali:
Effective cache replacement strategy (ECRS) for real-time fog computing environment. 3309-3333 - Mouna Afif, Yahia F. Said

, Mohamed Atri
:
Computer vision algorithms acceleration using graphic processors NVIDIA CUDA. 3335-3347 - Elham Adibi, Ehsan Mousavi Khaneghah

:
ExaRD: introducing a framework for empowerment of resource discovery to support distributed exascale computing systems with high consistency. 3349-3369 - Gregorius Satia Budhi

, Raymond Chiong
, Sandeep Dhakal
:
Multi-level particle swarm optimisation and its parallel version for parameter optimisation of ensemble models: a case of sentiment polarity prediction. 3371-3386 - Damián Fernández-Cerero, Francisco Javier Ortega Irizo

, Alejandro Fernández-Montes
, Francisco Velasco Morente
:
Bullfighting extreme scenarios in efficient hyper-scale cluster computing. 3387-3403 - Koneti Kalyan Chakravarthi, L. Shyamala, Vaidehi V.:

Budget aware scheduling algorithm for workflow applications in IaaS clouds. 3405-3419 - Sadoon Azizi

, Maz'har Zandsalimi, Dawei Li
:
An energy-efficient algorithm for virtual machine placement optimization in cloud data centers. 3421-3434 - Seyedeh Yasaman Rashida, Masoud Sabaei, Mohammad Mehdi Ebadzadeh, Amir Masoud Rahmani:

An intelligent approach for predicting resource usage by combining decomposition techniques with NFTS network. 3435-3460

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














