Stop the war!
Остановите войну!
for scientists:
default search action
Concurrency and Computation: Practice and Experience, Volume 36
Volume 36, Number 1, 2024
Research Articles
- Luis Benet, Luca Ferranti, Nathalie Revol:
A framework to test interval arithmetic libraries and their IEEE 1788-2015 compliance. - Lei Li, Sheng Lian, Dazhen Lin, Zhiming Luo, Beizhan Wang, Shaozi Li:
Learning multi-organ and tumor segmentation from partially labeled datasets by a conditional dynamic attention network. - Margret Sharmila F, K. Karuppasamy:
An effective cryptanalysis of DES for secure communication using hybrid cryptanalysis and deep neural network. - R. Satheeskumar, Bonam Raghavaiah, S. Geerthik, T. Senthil Kumar:
An efficient VLSI architecture for fast motion estimation by hybridizing parallel spiral and adaptive threshold star diamond search algorithm-based search algorithm in HEVC. - Atefeh Hemmati, Hanieh Mohammadi Arzanagh, Amir Masoud Rahmani:
A taxonomy and survey of big data in social media. - Prabhjot Kaur, Shalini Batra, Prashant Singh Rana:
Border-hunting optimization for mobile agent-based intrusion detection with deep convolutional neural network. - Karthikeyan V, Murugan K:
A novel machine learning-based classification approach to prevent flow table overflow attack in Software-Defined Networking. - Tu Tran, Bharath Ramesh, Benjamin Michalowicz, Mustafa Abduljabbar, Hari Subramoni, Aamir Shafi, Dhabaleswar K. Panda:
Accelerating communication with multi-HCA aware collectives in MPI. - Raouia Bouabdallah, Fairouz Fakhfakh:
Extending OCCI for an autonomous SLA negotiation strategy in federated clouds. - Shahul Hamead Haja Moinudeen, Mirnalinee Thanganadar Thangathai, Kavi Priya Dhandapani:
Selective wakeup for parallel forward engines under variable load towards energy conservation in IP routers. - G. Sakthivel, P. Madhubala:
Advanced set containment deep learned Rabin certificateless signcryption for secured transmission with big data in cloud. - Medha Kirti, Ashish Kumar Maurya, Rama Shankar Yadav:
A Fault-tolerant model for tuple space coordination in distributed environments. - Marc González Tallada, Enric Morancho:
Compute units in OpenMP: Extensions for heterogeneous parallel programming. - Rongqiang Feng, Hongwei Du, Tianchi Du, Xueqiong Wu, Haiping Yu, Kexin Zhang, Chenxi Huang, Lianlian Cao:
Fault diagnosis for wind turbines based on LSTM and feature optimization strategies. - Huanyu Cui, Nianbin Wang, Qilong Han, Ye Wang, Jiahang Li:
A two-stage parallel method on GPU based on hybrid-compression-format for diagonal matrix.
Volume 36, Number 2, 2024
Research Articles
- Khushboo A. Patel, Shivangi Shukla, Sankita J. Patel:
A novel and provably secure mutual authentication protocol for cloud environment using elliptic curve cryptography and fuzzy verifier. - Özcan Dülger, Tansel Dökeroglu:
A new parallel tabu search algorithm for the optimization of the maximum vertex weight clique problem. - Kieran Leach, Philip Cass, Steven Robson, Eimantas Kazakevicius, Martin Lafferty, Andrew Turner, Alan Simpson:
Automated service monitoring in the deployment of ARCHER2. - Anil Kumar, Dinesh Singh, Rama Shankar Yadav:
Entropy and improved k-nearest neighbor search based under-sampling (ENU) method to handle class overlap in imbalanced datasets. - Princy Diwan, Ramgopal Kashyap, Brijesh Khandelwal:
Blockchain assisted encryption scheme for intellectual share estimation using medical research data. - B. Jaishankar, Bharathi Gururaj, Nandam Gayatri:
An effective autism spectrum disorder screening method using machine learning classification techniques. - Deepa Rathi, Sanjeev Kumar, Farhan Musanna, Deepak Singh:
Quantum secret sharing protocol through noisy channel with application in visual cryptography. - Mohd. Aquib Ansari, Dushyant Kumar Singh, Ruchi Jayaswal:
Using postural data and recurrent learning to monitor shoplifting activities in megastores. - Ruizhong Du, Chuan Liu, Yan Gao:
Anonymous federated learning framework in the internet of things. - Imtisenla Longkumer, Dilwar Hussain Mazumder:
Improving cancer prediction using feature selection in spark environment. - Xudong Wang, Weiyi Zhong:
Evolution and innovations in animation: A comprehensive review and future directions. - Bartosz Balis, Tomasz Lelek, Jakub Bodera, Michal Grabowski, Costin Grigoras:
Improving prediction of computational job execution times with machine learning. - Poonam Samir Jadhav, Gautam M. Borkar:
Quasi-identifier recognition with echo chamber optimization-based anonymization for privacy preservation of cloud storage. - Lei Kou, Junhe Wan, Hailin Liu, Wende Ke, Hui Li, Jie Chen, Zhen Yu, Quande Yuan:
Optimized design of patrol path for offshore wind farms based on genetic algorithm and particle swarm optimization with traveling salesman problem. - Nupur Jangu, Zahid Raza:
Smart admission control strategy utilizing volunteer-enabled fog-cloud computing.
Volume 36, Number 3, 2024
Research Articles
- Hirotsugu Kakugawa, Sayaka Kamei:
A self-stabilizing distributed algorithm for the bounded lattice domination problems under the distance-2 model. - Harsh Bhatt, Nilesh Kumar Jadav, Aparna Kumari, Rajesh Gupta, Sudeep Tanwar, Zdzislaw Polkowski, Amr Tolba, Azza S. Hassanein:
Artificial neural network-driven federated learning for heart stroke prediction in healthcare 4.0 underlying 5G. - Amandeep Kaur, C. Rama Krishna, Nilesh Vishwasrao Patil:
K-DDoS-SDN: A distributed DDoS attacks detection approach for protecting SDN environment. - Hatice Vildan Dudukcu, Murat Taskiran, Nihan Kahraman:
UAV instantaneous power consumption prediction using LR-TCN with simple moving average. - Verónica G. Melesse Vergara, Reuben D. Budiardja, Paul Peltz, Jeffery Niles, Christopher Zimmer, Daniel Dietz, Christopher Fuson, Hong Liu, Paul Newman, James Simmons, Christopher Muzyn:
A step towards the final frontier: Lessons learned from acceptance testing of the first HPE/Cray EX 3000 system at ORNL. - M. Chengathir Selvi, J. Maruthupandi, T. Bhuvaneswari, T. Manonmani:
An adaptive gravitational search optimization (AGSO)-based convolutional neural network - long short-term memory (CNN-LSTM) approach for face recognition and classification. - Akash Shah, Sapna Varshney, Monica Mehrotra:
DeepMUI: A novel method to identify malicious users on online social network platforms. - Junfeng Tian, Hongwei Xu, Jin Tian:
SLChain: A secure and low-storage pressure sharding blockchain. - Zhigang Zhang, Zhixia Zhang, Zhihua Cui:
Federated malware detection based on many-objective optimization in cross-architectural IoT. - Alexandre Denis, Emmanuel Jeannot, Philippe Swartvagher, Samuel Thibault:
Tracing task-based runtime systems: Feedbacks from the StarPU case.
Volume 36, Number 4, 2024
Research Articles
- Ankita Srivastava, Pramod Kumar Mishra:
Fuzzy based multi-criteria based cluster head selection for enhancing network lifetime and efficient energy consumption. - Chavit Denninnart, Mohsen Amini Salehi:
SMSE: A serverless platform for multimedia cloud systems. - Yachao Huo, Zongqu Zhao, Panke Qin, Shujing Wang, Chengfu Zheng:
Post-quantum secure two-party computing protocols against malicious adversaries. - Jinglei Guo, Chen Gao, Shouyong Jiang, Wei Xie, Zhijian Wu:
An improved brain storm optimization with chunking-grouping method. - Shveta Verma, Anju Bala:
Efficient Auto-scaling for Host Load Prediction through VM migration in Cloud. - Di Wu, Zhen Yang, Tong Li, Junrui Liu:
JOCP: A jointly optimized clustering protocol for industrial wireless sensor networks using double-layer selection evolutionary algorithm. - Manoj D. Shelar, S. Srinivasa Rao:
Enhanced capsule network-based executable files malware detection and classification - deep learning approach. - Alexander Michels, Anand Padmanabhan, Zhiyu Li, Shaowen Wang:
EasyScienceGateway: A new framework for providing reproducible user environments on science gateways. - Ping Wei, Shou Fa Wang, Yi Ming Wang:
Numerical study on the influence of centroid-to-buoyancy center ratio on the motion stability of supercavitating vehicle. - Michal Antkowiak, Lukasz Kucharski, Romuald Lemanski, Grzegorz Kamieniarz:
Algorithms on low energy spectra of the Hubbard model pertinent to molecular nanomagnets.
Volume 36, Number 5, 2024
Research Articles
- Zuoyong Li, Weice Wang, Taotao Lai, Haiping Xu, Pantea Keikhosrokiani:
Object-aware deep feature extraction for feature matching. - YunBo Wan, Zhong Zhao, Jie Liu, Laiping Zhang, Yong Zhang, Jianqiang Chen:
Large-scale homo- and heterogeneous parallel paradigm design based on CFD application PHengLEI. - Insozhan Nagasundharamoorthi, Prabhu Venkatesan, Parthasarathy Velusamy:
Hash message authentication codes for securing data in wireless body area networks. - Jiange Zhang, Qing Yi, Christina L. Peterson, Damian Dechev:
Compiler-driven approach for automating nonblocking synchronization in concurrent data abstractions. - Wassim Jerbi, Omar Cheikhrouhou, Abderrahmen Guermazi, Hafedh Trabelsi:
An enhanced MSU-TSCH scheduling algorithms for industrial wireless sensor networks. - Meena Zenith N, R. Radhika:
Examining the impact of social media advertising using ANOVA analysis. - Gang Zhao, Hui He, Bingbing Di, Tong Wu:
ERSChain: Towards secure and flexible educational resource sharing using consortium blockchain and revocable ciphertext-policy attribute-based encryption. - Shuilin Chen, Jianguo Zheng:
Hybrid grey wolf optimizer for solving permutation flow shop scheduling problem. - Parvaz Ahmad Malla, Sophiya Sheikh, Mohammad Shahid, Sheikh Umar Mushtaq:
Energy-efficient sender-initiated threshold-based load balancing (e-STLB) in cloud computing environment. - Felix Wittwer, Nicholas K. Sauter, Derek Mendez, Billy K. Poon, Aaron S. Brewster, James M. Holton, Michael E. Wall, William E. Hart, Deborah Bard, Johannes P. Blaschke:
Accelerating x-ray tracing for exascale systems using Kokkos.
Volume 36, Number 6, 2024
Research Articles
- Sellamuthu Suseela, Ravi Krithiga, Muthusamy Revathi, Sudhakaran Gajendran, Reddipalayam Murugeshan Bhavadharini:
Energy aware optimal routing model for wireless multimedia sensor networks using modified Voronoi assisted prioritized double deep Q-learning. - C. Jackulin, S. Murugavalli, K. Valarmathi:
IFATA-Deep net: Improved invasive feedback artificial tree algorithm with deep quantum neural network for root disease classification. - Haochen Zhao, Jie Wen, Jinqian Yang, Xingjuan Cai, Chunxia Liu:
A many-objective optimization-based local tensor factorization model for skin cancer detection. - Nilesh Rathod, Sunil Wankhade:
Fractional cuckoo search invasive weed optimized neural network for data classification. - Shaiqa Nasreen, Ajaz Hussain Mir:
Cloud forensics: A centralized cloud provenance investigation system using MECC. - Kalimullah Lone, Shabir Ahmad Sofi:
e-TOALB: An efficient task offloading in IoT-fog networks. - Pritam Kumar Nayak, Ravi Shankar Singh, Shweta Kushwaha, Prasanth Kumar Bevara, Vinod Kumar, Rambabu Medara:
Efficient task scheduling on the cloud using artificial neural network and particle swarm optimization. - Fernanda G. O. Passos, Vinod E. F. Rebello:
An autonomic parallel strategy for exhaustive search tree algorithms on shared or heterogeneous systems. - Li Lv, Faying Zhang, Shenyu Qiu, Tanghuai Fan:
Adaptive kernel density estimation weighted twin support vector machine and its sample screening method. - Shadi Doostani, Hamid Barati, Ali Barati:
A lightweight hierarchical method for improving security in the internet of things using fuzzy logic.
Volume 36, Number 7, 2024
Research Articles
- Rafael Sanchez-Lara, José Luis López-Martínez, Joel Antonio Trejo-Sánchez, Herman L. Offerhaus, José A. Álvarez-Chávez:
Implementation and evaluation of two parallel computational models for the simulation of a long-haul DWDM system limited by FWM. - Premalatha Baskar, Prakasam Periasamy:
Minimal channel cost-based energy-efficient resource allocation algorithm for task offloading under FoG computing environment. - Chen Li, Ziniu Lin, Lihua Tian, Bin Zhang:
A scheduling algorithm based on critical factors for heterogeneous multicore processors. - Pichai Subramanian Apirajitha, Godfrey Winster Sathianesan:
On developing Block-Chain based Secure Storage Model (BSSM) with auditing and integrity analysis in the cloud. - Bin Deng:
Aquila optimizer with dynamic group strategy for global optimization tasks. - Ahmed Saidi, Abdelouahab Amira, Omar Nouali:
A secure multi-authority attribute based encryption approach for robust smart grids. - Lei Liu:
Multi-objective Firefly algorithm for enhanced balanced exploitation and exploration capabilities. - Zhen Wei, Jinghuan Nie, Wei Zhang:
Intelligent lighting design of cloud computing platform based on digital twin historic landscape blocks - Take Yu Garden commercial street in Shanghai as an example. - A. Priyadharshini, Suresh Dannana, Arun Sekar Rajasekaran, Maria Azees:
An efficient key agreement and anonymous privacy preserving scheme for vehicular ad-hoc networks with handover authentication. - Man Zhang, Zheng Kou:
Spatio-temporal pattern evolution and driving factors of A-level logistics enterprises in Yangtze River Delta.
Volume 36, Number 8, 2024
RESEARCH ARTICLES
- Rui Zhu, Hang Liu, Xiaolong Xu, Leilei Lin, Yeting Chen, Wenxin Li:
A-PGRD: Attention-based automatic business process model generation from RPA process description. - Madhavarapu Chandan, S. G. Santhi, T. Srinivasa Rao:
Deep ensemble of classifier for intrusion detection in WSN and improved attack mitigation process. - Kazuto Kobori, Chunghan Lee, Toshio Hirotsu:
Performance evaluation of portable time synchronization method using eBPF. - G. Nirmala Priya, K. Suresh Kumar, N. Suganthi, Satish Muppidi:
Squirrel Henry Gas Solubility Optimization driven Deep Maxout Network with multi-texture feature descriptors for digital image forgery detection. - Vanderlei Munhoz, Márcio Castro:
Enabling the execution of HPC applications on public clouds with HPC@Cloud toolkit. - Brett M. Bode, David King, Celso L. Mendes, William T. Kramer, Saurabh Jha, Roger Ford, Justin Davis, Steven Dramstad:
Blue Waters system and component reliability. - Siddharth Katyal, Shashank Gupta, Oshin Rawlley, Debjani Ghosh:
A fog-driven three-factor authentication protocol for secure data sharing in Internet of Vehicles cyber-physical systems. - Zuowen Tan, Jintao Jiao, Yanliang Chen:
Provably secure lightweight certificateless lattice-based authenticated key exchange scheme for IIoT. - Jinchao Li, Yuxuan Tian, Jindong Wang, Jinling Yang, Yinfang Zhu, Xuemin Cheng, Qun Hao:
Design of novel deformable mirror with large displacement.
REVIEW ARTICLE
- Iraq Ahmad Reshi, Sahil Sholla:
The blockchain conundrum: An in-depth examination of challenges, contributing technologies, and alternatives.
Volume 36, Number 9, 2024
RESEARCH ARTICLES
- Ameni Chetouane, Kamel Karoui:
Risk based intrusion detection system in software defined networking. - Fayssal Bendaoud, Marwen Abdennebi:
A machine learning access network selection in a heterogeneous wireless environment. - Saurabh Chandra, Rajeev Arya, Maheshwari Prasad Singh:
Optimal D2D power for secure D2D communication with random eavesdropper in 5G-IoT networks. - Yan Chen, Jiajian Xie, Jiajun Xue, Hui Wang:
A robust transformer GAN for unpaired data makeup transfer. - Beenish Habib, Farida Khursheed:
Time-based DDoS attack detection through hybrid LSTM-CNN model architectures: An investigation of many-to-one and many-to-many approaches.
REVIEW ARTICLE
- Baki Gökgöz, Fatih Gül, Tolga Aydin:
An overview memristor based hardware accelerators for deep neural network.
RESEARCH ARTICLES
- Lúcia Maria de Assumpção Drummond, Luciano Andrade, Pedro de Brito Muniz, Matheus Marotti Pereira, Thiago do Prado Silva, Luan Teylo:
Design and analyses of web scraping on burstable virtual machines. - Kamil Halbiniak, Norbert Meyer, Krzysztof Rojek:
Single- and multi-GPU computing on NVIDIA- and AMD-based server platforms for solidification modeling application. - Hidangmayum Satyajeet Sharma, Khundrakpam Johnson Singh:
A feed forward deep neural network model using feature selection for cloud intrusion detection system. - Juncheng Jia, Ji Liu, Chendi Zhou, Hao Tian, Mianxiong Dong, Dejing Dou:
Efficient asynchronous federated learning with sparsification and quantization.
Volume 36, Number 10, 2024
EDITORIALS
- Carlos Reaño, Federico Silla, Blesson Varghese:
Accelerator virtualization. - Pezhman Gholamnezhad, Ali Broumandnia, Vahid Seydi:
An improved model-based evolutionary algorithm for multi-objective optimization. - Xiaoping Sun, Hai Zhuge:
Semantics, knowledge and advanced cyber-infrastructure for intelligent applications. - Xiao Liu:
Editorial for special issue on "Edge computing accelerated deep learning: Technologies and applications".
SPECIAL ISSUE PAPERS
- Qiguo Huang, Zhengliang Li, Qing Gu:
Multi-task deep neural networks for just-in-time software defect prediction on mobile apps. - Wenhao Song, Wenzhe Zhai, Mingliang Gao, Qilei Li, Abdellah Chehri, Gwanggil Jeon:
Multiscale aggregation and illumination-aware attention network for infrared and visible image fusion. - Yang Gu, Jian Cao, Shiyou Qian, Nengjun Zhu, Wei Guan:
MANSOR: A module alignment method based on neighbor information for scientific workflow. - Jiayan Gu, Yan Wu, Ashiq Anjum, Lu Liu, John Panneerselvam, Yao Lu:
An adaptive key selection method for the multilevel index model for effective service management in the cloud. - Masato Kobayashi, Yusuke Hirota, Shuhei Kudo, Takeo Hoshi, Yusaku Yamamoto:
Automatic performance tuning using the ATMathCoreLib tool: Two experimental studies related to dense symmetric eigensolvers. - Carl Christian Kjelgaard Mikkelsen, Lorién López-Villellas, Pablo García-Risueño:
Newton's method revisited: How accurate do we have to be? - Kai Peng, Chengfang Ling, Bohai Zhao, Victor C. M. Leung:
A fairness-aware task offloading method in edge-enabled IIoT with multi-constraints using AGE-MOEA and weighted MMF. - Oleg Bystrov, Ruslan Pacevic, Arnas Kaceniauskas:
Cost- and performance-aware resource selection for parallel software on heterogeneous cloud. - Rosalba Cacciapuoti, Luisa D'Amore:
Scalability analysis of a two level domain decomposition approach in space and time solving data assimilation models. - Qiong Lu, Huaizhong Lin, Wei Xing, Lei Zhao, Jingjing Chen:
PKD-Net: Distillation of prior knowledge for image completion by multi-level semantic attention. - Tianhong Xiong, Shangqing Feng, Maolin Pan, Yang Yu:
Smart contract generation for inter-organizational process collaboration. - Luisa Carracciuolo, Valeria Mele, Gianluca Sabella:
Toward a new linpack-like benchmark for heterogeneous computing resources. - Liya Ma, Chen Li, Siqi Sun, Shu Guo, Lihong Wang, Jianxin Li:
Privacy-preserving graph publishing with disentangled variational information bottleneck. - Xiaotian Li, Koji Nakano, Yasuaki Ito, Daisuke Takafuji, Takashi Yazane, Junko Yano, Takumi Kato, Shiro Ozaki, Rie Mori, Ryota Katsuki:
Bit duplication technique to generate hard quadratic unconstrained binary optimization problems with adjustable sizes. - Zhijie Shen, Bowen Liu, Wanchun Dou:
An effective data placement strategy for IIoT applications. - Christopher D. Rickett, Kristyn J. Maschhoff, Sreenivas R. Sukumar:
Optimizing the Cray Graph Engine for performant analytics on cluster, SuperDome Flex, Shasta systems and cloud deployment. - Javed Ali Khan, Tahir Ullah, Arif Ali Khan, Affan Yasin, Muhammad Azeem Akbar, Khursheed Aurangzeb:
Can end-user feedback in social media be trusted for software evolution: Exploring and analyzing fake reviews. - Yulin He, Jin Yang, Yingchao Cheng, Xueqin Du, Joshua Zhexue Huang:
A novel member enhancement-based clustering ensemble algorithm. - Wanyu Qiu, Chuanhe Huang, Zhengfa Li, M. Wasim Abbas Ashraf, Danxin Wang:
Traffic offloading for postdisaster rescue in UAV-assisted networks: A coalition formation game approach.
EDITORIAL
- Marco Lapegna, Valeria Mele, Raffaele Montella, Lukasz Szustak:
Special Issue on the pervasive nature of HPC (PN-HPC).
SPECIAL ISSUE PAPER
- Filippos Pantekis, Phillip James, Oliver Kullmann, Liam O'Reilly:
Optimized massively parallel solving of N-Queens on GPGPUs.
RESEARCH ARTICLES
- Ashis Kumar Mishra, Subasish Mohapatra, Pradip Kumar Sahu:
Coalition theory based task scheduling algorithm using DLFC-NN model. - Baoyong Yan, Jialin Tian, Jun Wan, Yu Qiu, Weiming Chen:
Real-time prediction of horizontal drilling pressure based on convolutional Transformer. - Yongwei Tang, Wei Ding, Jun Zhou, Yonghao Yu, Huijuan Hao:
Research on cloud robot security strategy based on chaos encryption.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.