dblp: Cluster Computing, Volume 23 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches



- > Home > Journals > Cluster Computing
SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Volume 23, Number 1, March 2020
Special Issue: Software Defined Technologies for Computing Systems and Networking;
Special Issue: Advances in Cloud Computing, Big Data and the Internet of Things;
Special Issue: Advances in High Performance Computing and its Applications;
Special Issue: AMGCC -2018;
Special Issue: High Performance Computing Conference Latin America

Sara Khairi
, Brahim Raouyane, Mostafa Bellafkih
:
Novel QoE monitoring and management architecture with eTOM for SDN-based 5G networks. 1-12

Abdellatif Serhani, Najib Naja, Abdellah Jamali:
AQ-Routing: mobility-, stability-aware adaptive routing protocol for data routing in MANET-IoT systems. 13-27

Cheyma Ben Njima
, Youssef Gamha, Chirine Ghedira Guegan
, Lotfi Ben Romdhane
:
Development of a mobile web services discovery and composition model. 29-42

Jieun Choi, Geunchul Park, Dukyun Nam
:
Interference-aware co-scheduling method based on classification of application characteristics from hardware performance counter using data mining. 57-69

Seontae Kim, Young-ri Choi
:
Constraint-aware VM placement in heterogeneous computing clusters. 71-85

Yisel Gari
, David A. Monge
, Cristian Mateos, Carlos García Garino:
Learning budget assignment policies for autoscaling scientific workflows in the cloud. 87-105

Cristian Galleguillos
, Zeynep Kiziltan, Alessio Netti, Ricardo Soto
:
AccaSim: a customizable workload management simulator for job dispatching research in HPC systems. 107-122

Thaylon Guedes, Leonardo Araújo de Jesus, Kary A. C. S. Ocaña
, Lúcia M. A. Drummond
, Daniel de Oliveira
:
Provenance-based fault tolerance technique recommendation for cloud-based scientific workflows: a practical approach. 123-148

Lucia Damiani, Ariel Ivan Diaz, Javier Iparraguirre
, Aníbal M. Blanco:
Accelerated particle swarm optimization with explicit consideration of model constraints. 149-164

Maximiliano Geier, David A. González Márquez, Esteban E. Mocskos
:
SherlockFog: a new tool to support application analysis in Fog and Edge computing. 165-176

Pablo Carvalho, Rommel Anatoli Quintanilla Cruz
, Lúcia M. A. Drummond
, Cristiana Bentes
, Esteban Clua, Edson Cataldo, Leandro A. J. Marzulo:
Kernel concurrency opportunities based on GPU benchmarks characterization. 177-188

Ying-xin Chen:
Agent-based research on crowd interaction in emergency evacuation. 189-202

Ying-xin Chen, Pandu R. Tadikamalla, Jennifer Shang, Yan Song
:
Supply allocation: bi-level programming and differential evolution algorithm for Natural Disaster Relief. 203-217

Evangelos Pournaras
, Srivatsan Yadhunathan, Ada Diaconescu:
Holarchic structures for decentralized deep learning: a performance analysis. 219-240

Mahmood Mortazavi-Dehkordi, Kamran Zamanifar
:
Efficient deadline-aware scheduling for the analysis of Big Data streams in public Cloud. 241-263

Chao-Tung Yang
, Shuo-Tsung Chen, Jung-Chun Liu, Ren-Hao Liu, Ching-Lung Chang:
On construction of an energy monitoring service using big data technology for the smart campus. 265-288

Aadil Zia Khan
, Ihsan Ayyub Qazi
:
RecFlow: SDN-based receiver-driven flow scheduling in datacenters. 289-306

Mohammad Sharfoddin Khatib
, Mohammad Atique:
FGSA for optimal quality of service based transaction in real-time database systems under different workload condition. 307-319

Babak Aghaei
, Midia Reshadi, Mohammad Masdari, Seyed Hadi Sajadi, Mehdi Hosseinzadeh
, Aso Mohammad Darwesh:
Network adapter architectures in network on chip: comprehensive literature review. 321-346

Jiwoong Park, Yongseok Son, Heon Young Yeom, Yoonhee Kim
:
SoftDC: software-based dynamically connected transport. 347-357

Sandra Catalán
, Adrián Castelló
, Francisco D. Igual
, Rafael Rodríguez-Sánchez
, Enrique S. Quintana-Ortí:
Programming parallel dense matrix factorizations with look-ahead and OpenMP. 359-375

Amrita Jyoti
, Manish Shrimali
:
Dynamic provisioning of resources based on load balancing and service broker policy in cloud computing. 377-395

Bilal Iqbal, Waheed Iqbal
, Nazar Khan, Arif Mahmood
, Abdelkarim Erradi:
Canny edge detection and Hough transform for high resolution video streams using Hadoop and Spark. 397-408
Volume 23, Number 2, June 2020

Guilan Feng, Zhengnan Li, Wengang Zhou, Shi Dong
:
Entropy-based outlier detection using spark. 409-419

Jean-Marc Pierson
, Patricia Stolf
, Hongyang Sun
, Henri Casanova:
MILP formulations for spatio-temporal thermal-aware scheduling in Cloud and HPC datacenters. 421-439

Saroja Subbaraj
, Revathi Thiagarajan
:
Hybrid dual-objective parallel genetic algorithm for heterogeneous multiprocessor scheduling. 441-450

Rajaputhri Maharaja, Prashant Iyer, Zilong Ye
:
A hybrid fog-cloud approach for securing the Internet of Things. 451-459

Seyed Mehdi Mohtavipour
, Morteza Mollajafari
, Ali Naseri:
A novel packet exchanging strategy for preventing HoL-blocking in fat-trees. 461-482

Hong Huang, Latifur Khan
, Zhou Shaohua:
Classified enhancement model for big data storage reliability based on Boolean satisfiability problem. 483-492

Wenjing Ma, Yulong Ao, Chao Yang
, Samuel Williams
:
Solving a trillion unknowns per second with HPGMG on Sunway TaihuLight. 493-507

Asmaa H. Rabie, Shereen H. Ali
, Ahmed I. Saleh, Hesham A. Ali:
A new outlier rejection methodology for supporting load forecasting in smart grids based on big data. 509-535

Abhishek Mishra
, Prasoon Trivedi:
Benchmarking the contention aware nature inspired metaheuristic task scheduling algorithms. 537-553

Xiaohui Wei, Yuan Zhuang, Hongliang Li
, Zhiliang Liu:
Reliable stream data processing for elastic distributed stream processing systems. 555-574

Mahmoud Mohammed Badawy
, Zainab Hassan Ali
, Hesham A. Ali:
QoS provisioning framework for service-oriented internet of things (IoT). 575-591

Hongjian Li
, Huochen Wang, Shuyong Fang, Yang Zou, Wenhong Tian:
An energy-aware scheduling algorithm for big data applications in Spark. 593-609

Bilal Ahmad
, Zaib Maroof, Sally I. McClean, Darryl Charles
, Gerard Parr:
Economic impact of energy saving techniques in cloud server. 611-621

Jianyu Fu
, Youyou Lu, Jiwu Shu, Guangming Liu, Ming Zhao:
COWCache: effective flash caching for Copy-on-Write virtual disks. 623-639

Behrouz Pourghebleh
, Vahideh Hayyolalam
:
A comprehensive and systematic review of the load balancing mechanisms in the Internet of Things. 641-661

Sara Tabagchi Milan, Lila Rajabion, Aso Mohammad Darwesh, Mehdi Hosseinzadeh
, Nima Jafari Navimipour:
Priority-based task scheduling method over cloudlet using a swarm intelligence algorithm. 663-671

Fang Huang
, Bo Tie, Jian Tao
, Xicheng Tan, Yan Ma:
Methodology and optimization for implementing cluster-based parallel geospatial algorithms with a case study. 673-704

Ting Wu
, Xianzhang Chen
, Kai Liu
, Chunhua Xiao, Zhixiang Liu, Qingfeng Zhuge, Edwin H.-M. Sha:
HydraFS: an efficient NUMA-aware in-memory file system. 705-724

Monther Aldwairi
, Abdulmughni Y. Hamzah, Moath H. A. Jarrah
:
KPN-based parallelization of Wu-Manber algorithm on multi-core machines. 725-734

Amin Shokrzade
, Fardin Akhlaghian Tab
, Mohsen Ramezani:
ELM-NET, a closer to practice approach for classifying the big data using multiple independent ELMs. 735-757

Mohammad Hadi Mazidi, Mohammad Eshghi, Mohammad Reza Raoufy:
Detection of premature ventricular contraction (PVC) using linear and nonlinear techniques: an experimental study. 759-774

Sumedha Arora
, Anju Bala:
A survey: ICT enabled energy efficiency techniques for big data applications. 775-796

Seyedeh Yasaman Rashida, Masoud Sabaei, Mohammad Mehdi Ebadzadeh, Amir Masoud Rahmani
:
A memetic grouping genetic algorithm for cost efficient VM placement in multi-cloud environment. 797-836

Hamid Talebian, Abdullah Gani
, Mehdi Sookhak
, Ahmed Abdelaziz Abdelatif, Abdullah Yousafzai
, Athanasios V. Vasilakos
, Fei Richard Yu:
Optimizing virtual machine placement in IaaS data centers: taxonomy, review and open issues. 837-878

Muhammad Umair Sadiq
, Muhammad Murtaza Yousaf, Laeeq Aslam
, Muhammad Aleem
, Shahzad Sarwar, Syed Waqar Jaffry
:
NvPD: novel parallel edit distance algorithm, correctness, and performance evaluation. 879-894

Hyeongwon Jang, Sang Youp Rhee, Jae Eun Kim, Yoonhee Kim
, Hyuck Han, Sooyong Kang, Hyungsoo Jung:
AutoBahn: a concurrency control framework for non-volatile file buffer. 895-910

Ashish Kumar Maurya
, Kashish Modi, Vinay Kumar
, Nenavath Srinivas Naik
, Anil Kumar Tripathi:
Energy-aware scheduling using slack reclamation for cluster systems. 911-923

Mouna Ben Said
, Yessine Hadj Kacem
, Mickaël Kerboeuf, Mohamed Abid:
An MDE-based approach for self-adaptive RTES model generation. 925-951

Ajeet Ram Pathak
, Manjusha Pandey, Siddharth S. Rautaray
:
Approaches of enhancing interoperations among high performance computing and big data analytics via augmentation. 953-988

Surendra Singh, Suvadip Batabyal
, Sachin Tripathi:
Security aware dynamic scheduling algorithm (SADSA) for real-time applications on grid. 989-1005

Hanan Ali, Ghada M. Fathy
, Zeinab Fayez, Walaa M. Sheta:
Exploring the parallel capabilities of GPU: Berlekamp-Massey algorithm case study. 1007-1024

Salma Abdel Magid, Francesco Petrini, Behnam Dezfouli
:
Image classification on IoT edge devices: profiling and modeling. 1025-1043

Ali Shahidinejad
, Mostafa Ghobaei-Arani
, Leila Esmaeili
:
An elastic controller using Colored Petri Nets in cloud computing environment. 1045-1071

Mokhtar A. Alworafi
, Suresha Mallappa:
A collaboration of deadline and budget constraints for task scheduling in cloud computing. 1073-1083

Rashad Elhabob
, Yanan Zhao, Nabeil Eltayieb
, Abdeldime M. S. Abdelgader, Hu Xiong:
Identity-based encryption with authorized equivalence test for cloud-assisted IoT. 1085-1101

Moumita Chatterjee
, Anirban Mitra, Sudipta Roy
, Sanjit Kumar Setua:
Gossip based fault tolerant protocol in distributed transactional memory using quorum based replication system. 1103-1124

Xingwang Huang
, Chaopeng Li, Hefeng Chen, Dong An:
Task scheduling in cloud computing using particle swarm optimization with time varying inertia weight strategies. 1137-1147

Harkiran Kaur
, Sandeep K. Sood
, Munish Bhatia
:
Cloud-assisted green IoT-enabled comprehensive framework for wildfire monitoring. 1149-1162

Yunyan Li, Yuansheng Huang, Meimei Zhang, Lila Rajabion
:
Service selection mechanisms in the Internet of Things (IoT): a systematic and comprehensive study. 1163-1183

Poopak Azad, Nima Jafari Navimipour
, Amir Masoud Rahmani, Arash Sharifi
:
The role of structured and unstructured data managing mechanisms in the Internet of things. 1185-1198

Mahdi Sarbazi, Mehdi Sadeghzadeh, Seyyed Javad Mir Abedini:
Improving resource allocation in software-defined networks using clustering. 1199-1210

Jonas Markussen
, Lars Bjørlykke Kristiansen, Rune Johan Borgli, Håkon Kvale Stensland, Friedrich Seifert, Michael Riegler, Carsten Griwodz, Pål Halvorsen:
Flexible device compositions and dynamic resource sharing in PCIe interconnected clusters using Device Lending. 1211-1234

Chirag Dashora, P. Edwin Sudhagar
, J. Marietta
:
IoT based framework for the detection of vehicle accident. 1235-1250

Muhammad Ibrahim
, Muhammad Azhar Iqbal, Muhammad Aleem
, Muhammad Arshad Islam, Nguyen-Son Vo
:
MAHA: Migration-based Adaptive Heuristic Algorithm for Large-scale Network Simulations. 1251-1266

Asif Nawaz
, Ashfaq Ahmed Awan, Tariq Ali, Muhammad Rizwan Rashid Rana:
Product's behaviour recommendations using free text: an aspect based sentiment analysis approach. 1267-1279

Sumit Badotra
, Surya Narayan Panda
:
Evaluation and comparison of OpenDayLight and open networking operating system in software-defined networking. 1281-1291

Behzad Chitsaz
, Ahmad Khonsari
:
General spin-up time distribution for energy-aware IaaS cloud service models. 1293-1301

Brahim Hmedna
, Ali El Mezouary, Omar Baz:
A predictive model for the identification of learning styles in MOOC environments. 1303-1328

Rajat Saxena
, Somnath Dey:
DDoS attack prevention using collaborative approach for cloud computing. 1329-1344

Ahmad Alnafessah
, Giuliano Casale
:
Artificial neural networks based techniques for anomaly detection in Apache Spark. 1345-1360

Ahmad Alnafessah
, Giuliano Casale
:
Correction to: Artificial neural networks based techniques for anomaly detection in Apache Spark. 1361-1362

Jitendra Kumar
, Ashutosh Kumar Singh
:
Cloud datacenter workload estimation using error preventive time series forecasting models. 1363-1379

Muhammad Saleem
, Yasir Saleem, Muhammad Faisal Hayat:
Stochastic QoE-aware optimization of multisource multimedia content delivery for mobile cloud. 1381-1396

Vikash Kumar
, Ditipriya Sinha
, Ayan Kumar Das, Subhash Chandra Pandey, Radha Tamal Goswami:
An integrated rule based intrusion detection system: analysis on UNSW-NB15 data set and the real time online dataset. 1397-1418

Anum Masood
, Saima Gulzar Ahmad
, Hikmat Ullah Khan
, Ehsan Ullah Munir:
Network Reconfiguration Algorithm (NRA) for scheduling communication-intensive graphs in heterogeneous computing environment. 1419-1438

Manjit Kaur, Dilbag Singh
:
Fusion of medical images using deep belief networks. 1439-1453

Reyhaneh Rabaninejad
, Maryam Rajabzadeh Asaar, Mahmoud Ahmadian-Attari, Mohammad Reza Aref:
An identity-based online/offline secure cloud storage auditing scheme. 1455-1468

Mahmoud Seifallahi, Hadi Soltanizadeh
, Afsoon Hassani Mehraban
, Fatemeh Khamseh:
Alzheimer's disease detection using skeleton data recorded with Kinect camera. 1469-1481

Dharmendra Prasad Mahato
, Jasminder Kaur Sandhu
, Nagendra Pratap Singh
, Vishal Kaushal
:
On scheduling transaction in grid computing using cuckoo search-ant colony optimization considering load. 1483-1504

Mohammad Hossein Shafiabadi, Hossein Pedram
, Midia Reshadi, Akram Reza
:
Comprehensive regression-based model to predict performance of general-purpose graphics processing unit. 1505-1516
Volume 23, Number 3, September 2020
Special Issue : Model and Data Engineering (MEDI 2018);
Special Issue : Big Data Analytics in Urban Computing;
Special Issue : Enhancing security using Blockchain for Cyber-Physical System;
Special Issue : WorldCIST19 conference;
Special Issue : DAAC-2018;
Special Issue : Advances in Intelligent Big Data Analytics for Cloud & Cluster Comp;
Special Issue : Nature-Inspired Design of Par & Dist CI;
Special Issue : Blockchain for IoT;
Special Issue : AMGCC -2018;
Special Issue : Data Warehouse and On-line Analysis (EDA)

Hania Gadouche
, Zoubeyr Farah
, Abdelkamel Tari:
A correct-by-construction model for attribute-based access control. 1517-1528

Houari Mahfoud
:
Graph pattern matching with counting quantifiers and label-repetition constraints. 1529-1553

George Roumelis, Polychronis Velentzas, Michael Vassilakopoulos
, Antonio Corral
, Athanasios Fevgas, Yannis Manolopoulos:
Parallel processing of spatial batch-queries using xBR+-trees in solid-state drives. 1555-1575

Foudil Abdessamia, Weizhe Zhang
, Yu-Chu Tian
:
Energy-efficiency virtual machine placement based on binary gravitational search algorithm. 1577-1588

Zakaria Maamar
, Muhammad Asim
, Khouloud Boukadi
, Thar Baker
, Saad Saeed, Ikbel Guidara, Fadwa Yahya
, Emir Ugljanin, Djamal Benslimane:
Towards a Quality-of-Thing based approach for assigning things to federations. 1589-1602

Khaled Khebbeb, Nabil Hameurlain, Faiza Belala:
Formalizing and simulating cross-layer elasticity strategies in Cloud systems. 1603-1631

M. Indrasena Reddy
, A. P. Siva Kumar
:
An efficient data transmission approach using IAES-BE. 1633-1645

Nourelhoda M. Mahmoud
, Hassan Fouad
, Omar Alsadon
, Ahmed M. Soliman
:
Detecting dental problem related brain disease using intelligent bacterial optimized associative deep neural network. 1647-1657

Xu Chen, Xiaoping Cai, Yangyang Zhou, Zhibin Hao
:
Development of data monitoring application based on IoT. 1659-1667

Mohamed Hashem, Ahmed E. Youssef
:
Teeth infection and fatigue prediction using optimized neural networks and big data analytic tool. 1669-1682

Dilip Venkata Kumar Vengala
, D. Kavitha, A. P. Siva Kumar
:
Secure data transmission on a distributed cloud server with the help of HMCA and data encryption using optimized CP-ABE-ECC. 1683-1696

Aarti Jain
, Manju Khari, Elena Verdú
, Shigeru Omatsu, Rubén González Crespo
:
A route selection approach for variable data transmission in wireless sensor networks. 1697-1709

Vadivel Ramasamy
, SudalaiMuthu Thalavai Pillai:
An effective HPSO-MGA optimization algorithm for dynamic resource allocation in cloud environment. 1711-1724

A. Helen Sharmila
, Natarajan Jaisankar
:
E-MHMS: enhanced MAC-based secure delay-aware healthcare monitoring system in WBAN. 1725-1740

M. Sridhar
, P. B. Pankajavalli
:
An optimization of distributed Voronoi-based collaboration for energy-efficient geographic routing in wireless sensor networks. 1741-1754

Ayed Alwadain, Mohammad Al-Ma'aitah, Aldosary Saad
:
Developing computerized speech therapy system using metaheuristic optimized artificial cuckoo immune system. 1755-1767

Fayez Alqahtani, Zafer Al-Makhadmeh, Amr Tolba
, Wael Said
:
Internet of things-based urban waste management system for smart cities using a Cuckoo Search Algorithm. 1769-1780

Ahed Abugabah, Ahmad Ali AlZubi, Feras N. Al-Obeidat
, Abdulaziz Alarifi, Ayed Alwadain:
Data mining techniques for analyzing healthcare conditions of urban space-person lung using meta-heuristic optimized neural networks. 1781-1794

José Chamadoira González, Vicente García-Díaz
, Edward Rolando Núñez-Valdéz
, Alberto Gómez Gómez
, Rubén González Crespo
:
Replacing email protocols with blockchain-based smart contracts. 1795-1801

Andrea Vázquez-Ingelmo
, Francisco José García-Peñalvo
, Roberto Therón
, Daniel Amo Filvà
, David Fonseca Escudero:
Connecting domain-specific features to source code: towards the automatization of dashboard generation. 1803-1816

Yogesh
, Ashwani Kumar Dubey, Rajeev Ratan
, Álvaro Rocha
:
Computer vision based analysis and detection of defects in fruits causes due to nutrients deficiency. 1817-1826

Angel Marcelo Rea-Guaman, Jezreel Mejía
, Tomás San Feliu, José A. Calvo-Manzano
:
AVARCIBER: a framework for assessing cybersecurity risks. 1827-1843

João Vidal de Carvalho
, Sandro Carvalho
, Álvaro Rocha
:
European strategy and legislation for cybersecurity: implications for Portugal. 1845-1854

Ahmar Rashid, Muhammad Amir Zeb, Amad Rashid
, Sajid Anwar
, Fernando Joaquim, Zahid Halim
:
Conceptualization of smartphone usage and feature preferences among various demographics. 1855-1873

Paulo Carlos López-López
, Pablo Oñate, Álvaro Rocha
:
Social media mining, debate and feelings: digital public opinion's reaction in five presidential elections in Latin America. 1875-1886

Marco Rosa, João Paulo Barraca
, Nelson Pacheco da Rocha:
Blockchain structures to guarantee logging integrity of a digital platform to support community-dwelling older adults. 1887-1898

Yao Lu, Shuyang An:
Research on sports video detection technology motion 3D reconstruction based on hidden Markov model. 1899-1909

Natalia G. Miloslavskaya, Alexander I. Tolstoy:
IoTBlockSIEM for information security incident management in the internet of things ecosystem. 1911-1925

Darwin Alulema
, Javier Criado
, Luis Iribarne
, Antonio Jesús Fernández-García
, Rosa Ayala
:
A model-driven engineering approach for the service integration of IoT systems. 1937-1954

Akalanka Mailewa Dissanayaka
, Susan A. Mengel, Lisa Gittner
, Hafiz Khan:
Security assurance of MongoDB in singularity LXCs: an elastic and convenient testbed using Linux containers to explore vulnerabilities. 1955-1971

Hanqian Wu
, Siliang Cheng, Zhike Wang, Shangbin Zhang, Feng Yuan:
Multi-task learning based on question-answering style reviews for aspect category classification and aspect term extraction on GPU clusters. 1973-1986

Zilong Jiang, Shu Gao:
An intelligent recommendation approach for online advertising based on hybrid deep neural network and parallel computing. 1987-2000

Nagaraj Balakrishnan
, Arunkumar Rajendran
, K. Nisi, Ponnusamy Vijayakumar
:
Enhancement of fraternal K-median algorithm with CNN for high dropout probabilities to evolve optimal time-complexity. 2001-2008

Maryam AlJame, Imtiaz Ahmad, Mohammad AlFailakawi
:
Apache Spark Implementation of Whale Optimization Algorithm. 2021-2034

Rajani Singh
, Ashutosh Dhar Dwivedi
, Gautam Srivastava
, Agnieszka Wiszniewska-Matyszkiel, Xiaochun Cheng
:
A game theoretic analysis of resource mining in blockchain. 2035-2046

Yazdan Ahmad Qadri
, Rashid Ali, Arslan Musaddiq
, Fadi Al-Turjman
, Dae Wan Kim, Sung Won Kim
:
The limitations in the state-of-the-art counter-measures against the security threats in H-IoT. 2047-2065

Umair Khalid, Muhammad Asim
, Thar Baker
, Patrick C. K. Hung, Muhammad Adnan Tariq, Laura Rafferty:
A decentralized lightweight blockchain-based authentication mechanism for IoT systems. 2067-2087

Deepa Pavithran
, Khaled Shaalan, Jamal N. Al-Karaki, Amjad Gawanmeh
:
Towards building a blockchain framework for IoT. 2089-2103

Ray Neiheiser
, Gustavo Inácio, Luciana Rech
, Joni da Silva Fraga:
HRM smart contracts on the blockchain: emulated vs native. 2105-2122

Syed Muhammad Danish, Marios Lestas, Hassaan Khaliq Qureshi, Kaiwen Zhang, Waqar Asif, Muttukrishnan Rajarajan:
Securing the LoRaWAN join procedure using blockchains. 2123-2138

Razi Iqbal
, Talal Ashraf Butt
:
Safe farming as a service of blockchain-based supply chain management for improved transparency. 2139-2150

Lewis Tseng, Xinyu Yao
, Safa Otoum
, Moayad Aloqaily
, Yaser Jararweh:
Blockchain-based database in an IoT environment: challenges, opportunities, and analysis. 2151-2165

Minwoo Gu, Younghun Park, Youngjae Kim, Sungyong Park
:
Low-overhead dynamic sharing of graphics memory space in GPU virtualization environments. 2167-2178

Qichen Chen, Jisun Oh, Seoyoung Kim, Yoonhee Kim
:
Design of an adaptive GPU sharing and scheduling scheme in container-based cluster. 2179-2191

Youngrang Kim, Jaehwan Lee
, Jik-Soo Kim, Hyunseung Jei, Hongchan Roh:
Comprehensive techniques of multi-GPU memory optimization for deep learning acceleration. 2193-2204

Neungsoo Park, Soeun Park, Myungho Lee
:
High performance parallel KMP algorithm on a heterogeneous architecture. 2205-2217

Jisun Oh, Yoonhee Kim
:
Job placement using reinforcement learning in GPU virtualization environment. 2219-2234

Sangyeon Woo, Jeho Song, Sanghyeok Kim, Youngjae Kim, Sungyong Park
:
GARET: improving throughput using gas consumption-aware relocation in Ethereum sharding environments. 2235-2247

Jeongchul Kim, Kyungyong Lee:
I/O resource isolation of public cloud serverless function runtimes for data-intensive applications. 2249-2259

Sunggon Kim
, Dongwhan Kim, Yongseok Son
, Hyeonsang Eom:
Towards predicting GPGPU performance for concurrent workloads in Multi-GPGPU environment. 2261-2272

Yunjae Lee, Yoonhee Kim
, Heon Y. Yeom:
Lightweight memory tracing for hot data identification. 2273-2285

Youngrang Kim, Hyeonseong Choi
, Jaehwan Lee
, Jik-Soo Kim, Hyunseung Jei, Hongchan Roh:
Towards an optimized distributed deep learning framework for a heterogeneous multi-GPU cluster. 2287-2300

Hwajung Kim, Heon Young Yeom, Yongseok Son
:
Design and implementation of an I/O isolation scheme for key-value store on multiple solid-state drives. 2301-2313

Ahmed Rabhi
, Rachida Fissoune
:
WODII: a solution to process SPARQL queries over distributed data sources. 2315-2322

Simon Pierre Dembele
, Ladjel Bellatreche, Carlos Ordonez, Amine Roukh:
Think big, start small: a good initiative to design green query optimizers. 2323-2345

Maha Ben Kraiem
, Mohammed A. Alqarni
, Jamel Feki, Franck Ravat
:
OLAP operators for social network analysis. 2347-2374

Sami Belkacem
, Kamel Boukhalfa
, Omar Boussaid:
Expertise-aware news feed updates recommendation: a random forest approach. 2375-2388

Mohamed Amine Boudia
, Reda Mohamed Hamou, Abdelmalek Amine, Ahmed Chaouki Lokbani:
An adaptation of a F-measure for automatic text summarization by extraction. 2389-2398
Volume 23, Number 4, December 2020

Mohammad Masdari, Afsane Khoshnevis:
A survey and classification of the workload forecasting methods in cloud computing. 2399-2424

Sepideh Adabi
, Zahra Hossein-Haje, Sahar Adabi
:
A new cost-effective mechanism for VM-to-user mapping in cloud data centers. 2425-2451

Alireza Souri
, Amir Masoud Rahmani, Nima Jafari Navimipour, Reza Rezaei:
A hybrid formal verification approach for QoS-aware multi-cloud service composition. 2453-2470

Nourchène Ouerhani, Ahmed Maalel
, Henda Ben Ghézela
:
SPeCECA: a smart pervasive chatbot for emergency case assistance based on cloud computing. 2471-2482

Jun-qing Li
, Yun-qi Han:
A hybrid multi-objective artificial bee colony algorithm for flexible task scheduling problems in cloud computing system. 2483-2499

Vijay Kumar Yadav, Anshu S. Anand, Shekhar Verma
, S. Venkatesan:
Private computation of the Schulze voting method over the cloud. 2517-2531

Mohammad Masdari, Sasan Gharehpasha, Mostafa Ghobaei-Arani
, Vafa Ghasemi:
Bio-inspired virtual machine placement schemes in cloud computing environment: taxonomy, review, and future research directions. 2533-2563

Mehmet Tahir Sandikkaya
, Yusuf Yaslan
, Cemile Diler Özdemir:
DeMETER in clouds: detection of malicious external thread execution in runtime with machine learning in PaaS clouds. 2565-2578

Rayapati Venkata Sudhakar
, T. Ch. Malleswara Rao:
Security aware index based quasi-identifier approach for privacy preservation of data sets for cloud applications. 2579-2589

Guohua You, Xuejing Wang:
A server-side accelerator framework for multi-core CPUs and Intel Xeon Phi co-processor systems. 2591-2608

Sasha Mahdavi Hezavehi
, Rouhollah Rahmani:
An anomaly-based framework for mitigating effects of DDoS attacks using a third party auditor in cloud computing environments. 2609-2627

Mohammad Masdari, Hemn Khezri:
Efficient VM migrations using forecasting techniques in cloud computing: a comprehensive review. 2629-2658

Nitin Khanna
, Monika Sachdeva
:
OFFM-ANFIS analysis for flood prediction using mobile IoS, fog and cloud computing. 2659-2676

Luay Alawneh
, Mohammed A. Shehab
, Mahmoud Al-Ayyoub, Yaser Jararweh, Ziad A. Al-Sharif
:
A scalable multiple pairwise protein sequence alignment acceleration using hybrid CPU-GPU approach. 2677-2688

Xin Geng, Haitao Zhang
, Zhengyang Zhao, Huadong Ma:
Interference-aware parallelization for deep learning workload in GPU cluster. 2689-2702

Mohammed Alweshah
, Maria Al-Sendah, Osama M. Dorgham
, Ammar Almomani
, Sara Tedmori:
Improved water cycle algorithm with probabilistic neural network to solve classification problems. 2703-2718

Alireza Abdollahpouri
, Chiman Salavati, Jamal Arkat, Fardin Akhlaghian Tab, Zhaleh Manbari:
A multi-objective model for identifying valuable nodes in complex networks with minimum cost. 2719-2733

Jerzy Proficz
:
Process arrival pattern aware algorithms for acceleration of scatter and gather operations. 2735-2751

Zhiping Peng, Jianpeng Lin
, Delong Cui
, Qirui Li, Jieguang He:
A multi-objective trade-off framework for cloud resource scheduling based on the Deep Q-network algorithm. 2753-2767

Carlos Juiz, Belén Bermejo
:
The CiS2: a new metric for performance and energy trade-off in consolidated servers. 2769-2788

A. Ananya, A. Aswathy, T. R. Amal, P. G. Swathy, Vinod P, Mohammad Shojafar
:
SysDroid: a dynamic ML-based android malware analyzer using system call traces. 2789-2808

Bo Wang
, Changhai Wang
, Ying Song, Jie Cao, Xiao Cui, Ling Zhang:
A survey and taxonomy on workload scheduling and resource provisioning in hybrid clouds. 2809-2834

Fatemeh Erfan, Hamid Mala
:
Secure and efficient publicly verifiable outsourcing of matrix multiplication in online mode. 2835-2845

Tayyip Özcan
, Alper Bastürk
:
Human action recognition with deep learning and structural optimization using a hybrid heuristic algorithm. 2847-2860

Rashmi Shrivastava, Manju Pandey:
Real time fall detection in fog computing scenario. 2861-2870

Ali Belgacem
, Kadda Beghdad Bey, Hassina Nacer
, Sofiane Bouznad:
Efficient dynamic resource allocation method for cloud computing environment. 2871-2889

P. Neelima, A. Rama Mohan Reddy:
An efficient load balancing system using adaptive dragonfly algorithm in cloud computing. 2891-2899

Zi-xian Liu
, De-gan Zhang, Gu-zhao Luo, Ming Lian, Bing Liu
:
A new method of emotional analysis based on CNN-BiLSTM hybrid neural network. 2901-2913

Upasna Joshi
, Rajiv Kumar:
A novel deep neural networks based path prediction. 2915-2924

Yuncheng Jiang:
Semantically-enhanced information retrieval using multiple knowledge sources. 2925-2944

Elnaz Parvizi, Mohammad Hossein Rezvani
:
Utilization-aware energy-efficient virtual machine placement in cloud networks using NSGA-III meta-heuristic approach. 2945-2967

Ashima Yadav, Dinesh Kumar Vishwakarma
:
A comparative study on bio-inspired algorithms for sentiment analysis. 2969-2989

Neeraj
, Major Singh Goraya
, Damanpreet Singh
:
Satisfaction aware QoS-based bidirectional service mapping in cloud environment. 2991-3011

Nayereh Rasouli
, Ramin Razavi, Hamid Reza Faragardi:
EPBLA: energy-efficient consolidation of virtual machines using learning automata in cloud data centers. 3013-3027

Marjan Jalali Moghaddam
, Akram Esmaeilzadeh, Mina Ghavipour
, Ahmad Khadem Zadeh:
Minimizing virtual machine migration probability in cloud computing environments. 3029-3038

Azlan B. Ismail
:
Energy-driven cloud simulation: existing surveys, simulation supports, impacts and challenges. 3039-3055

E. K. Subramanian
, Latha Tamilselvan
:
Elliptic curve Diffie-Hellman cryptosystem in big data cloud security. 3057-3067

Jinsong Wang, Jiping Liao, Wei Huang
:
A density-based maximum margin machine classifier. 3069-3078

Shashank Kumar Mishra, R. Manjula:
A meta-heuristic based multi objective optimization for load distribution in cloud data center under varying workloads. 3079-3093

Amjad Ullah, Jingpeng Li, Amir Hussain
:
Design and evaluation of a biologically-inspired cloud elasticity framework. 3095-3117

Gopi Bhatt
, Madhuri D. Bhavsar:
Performance consequence of user space file systems due to extensive CPU sharing in virtual environment. 3119-3137

Min Xiang, Yuzhou Jiang, Zhong Xia, Chunmei Huang:
Consistent hashing with bounded loads and virtual nodes-based load balancing strategy for proxy cache cluster. 3139-3155

Sumedha Arora, Anju Bala:
PAP: power aware prediction based framework to reduce disk energy consumption. 3157-3174

Eswaraiah Rayachoti
, Sudhir Tirumalasetty
, Silpa Chaitanya Prathipati:
SLT based watermarking system for secure telemedicine. 3175-3184

Naela Rizvi
, Dharavath Ramesh
:
Fair budget constrained workflow scheduling approach for heterogeneous clouds. 3185-3201

Mahdi Abbasi
, Aazad Shokrollahi
:
Enhancing the performance of decision tree-based packet classification algorithms using CPU cluster. 3203-3219

Aws Naser Jaber
, Shafiq Ul Rehman
:
FCM-SVM based intrusion detection system for cloud computing environment. 3221-3231

Rahim Taheri
, Reza Javidan, Mohammad Shojafar
, P. Vinod, Mauro Conti
:
Can machine learning model with static features be fooled: an adversarial machine learning approach. 3233-3253

Tarun Biswas
, Pratyay Kuila
, Anjan Kumar Ray:
A novel workflow scheduling with multi-criteria using particle swarm optimization for heterogeneous computing systems. 3255-3271

Suzanne Elashri, Akramul Azim:
Energy-efficient offloading of real-time tasks using cloud computing. 3273-3288

Ajay Kumar
, Seema Bawa:
DAIS: dynamic access and integration services framework for cloud-oriented storage systems. 3289-3308

Fatma M. Talaat
, Shereen H. Ali
, Ahmed I. Saleh, Hesham A. Ali:
Effective cache replacement strategy (ECRS) for real-time fog computing environment. 3309-3333

Mouna Afif, Yahia F. Said
, Mohamed Atri
:
Computer vision algorithms acceleration using graphic processors NVIDIA CUDA. 3335-3347

Elham Adibi, Ehsan Mousavi Khaneghah
:
ExaRD: introducing a framework for empowerment of resource discovery to support distributed exascale computing systems with high consistency. 3349-3369

Gregorius Satia Budhi
, Raymond Chiong
, Sandeep Dhakal
:
Multi-level particle swarm optimisation and its parallel version for parameter optimisation of ensemble models: a case of sentiment polarity prediction. 3371-3386

Damián Fernández-Cerero, Francisco Javier Ortega Irizo
, Alejandro Fernández-Montes
, Francisco Velasco Morente
:
Bullfighting extreme scenarios in efficient hyper-scale cluster computing. 3387-3403

Koneti Kalyan Chakravarthi, L. Shyamala, Vaidehi V.:
Budget aware scheduling algorithm for workflow applications in IaaS clouds. 3405-3419

Sadoon Azizi
, Maz'har Zandsalimi, Dawei Li
:
An energy-efficient algorithm for virtual machine placement optimization in cloud data centers. 3421-3434

Seyedeh Yasaman Rashida, Masoud Sabaei, Mohammad Mehdi Ebadzadeh, Amir Masoud Rahmani:
An intelligent approach for predicting resource usage by combining decomposition techniques with NFTS network. 3435-3460

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:







