3767 | -- | 3784 | Ahmad Taghinezhad-Niar, Saeid Pashazadeh, Javid Taheri. QoS-aware online scheduling of multiple workflows under task execution time uncertainty in clouds |
3785 | -- | 3797 | Xiaobing Guo, Zhili Du, Shunfu Jin. Nash equilibrium and social optimization of a task offloading strategy with real-time virtual machine repair in an edge computing system |
3799 | -- | 3817 | Tajinder Singh, Madhu Kumari, Daya Sagar Gupta. Real-time event detection and classification in social text steam using embedding |
3819 | -- | 3828 | Ala Mughaid, Shadi AlZu'bi, Adnan Hnaif, Salah Taamneh, Asma Alnajjar, Esraa Abu Elsoud. An intelligent cyber security phishing detection system using deep learning techniques |
3829 | -- | 3843 | Gordhan Jethava, Udai Pratap Rao. A novel trust prediction approach for online social networks based on multifaceted feature similarity |
3845 | -- | 3874 | Anita Choudhary, Mahesh Chandra Govil, Girdhari Singh, Lalit Kumar Awasthi, Emmanuel S. Pilli. Energy-aware scientific workflow scheduling in cloud environment |
3875 | -- | 3898 | Meriem Amel Guessoum, Rahma Djiroun, Kamel Boukhalfa, Elhadj Benkhelifa. Natural language why-question in Business Intelligence applications: model and recommendation approach |
3899 | -- | 3913 | Zhiwei Wu, Runhua Shi, Kunchang Li, Yifan Yang. Attribute-based data access control scheme with secure revocation in fog computing for smart grid |
3915 | -- | 3936 | Shanmukha Makani, Rachitha Pittala, Eitaa Alsayed, Moayad Aloqaily, Yaser Jararweh. A survey of blockchain applications in sustainable and smart cities |
3937 | -- | 3959 | Rajni Jindal, Indu Singh. Detecting malicious transactions in database using hybrid metaheuristic clustering and frequent sequential pattern mining |
3961 | -- | 3976 | Linh Manh Pham, Nguyen-Tuan-Thanh Le, Xuan Truong Nguyen. Multi-level just-enough elasticity for MQTT brokers of Internet of Things applications |
3977 | -- | 3992 | Xin Yang 0002, Hengrui Li, Xiaochuan Li. Lightweight image super-resolution with feature cheap convolution and attention mechanism |
3993 | -- | 4008 | Fadi Wedyan, Reema Freihat, Maen Hammad. Visualization of aspect-oriented programs using city transportation metaphor |
4009 | -- | 4025 | V. S. Prakash, V. Vinothina, K. Kalaiselvi, K. Velusamy. An improved bacterial colony optimization using opposition-based learning for data clustering |
4027 | -- | 4049 | Ridhima Rani, Meenu Khurana, Ajay Kumar, Neeraj Kumar 0001. Big data dimensionality reduction techniques in IoT: review, applications and open research challenges |
4051 | -- | 4071 | Linda Ouchaou, Hassina Nacer, Chahrazed Labba. Towards a distributed SaaS management system in a multi-cloud environment |
4073 | -- | 0 | Linda Ouchaou, Hassina Nacer, Chahrazed Labba. Correction: Towards a distributed SaaS management system in a multi-cloud environment |
4075 | -- | 4096 | Zareen Alamgir, Farwa K. Khan, Saira Karim. Federated recommenders: methods, challenges and future |
4097 | -- | 4127 | Mehdi Hosseinzadeh 0001, Atefeh Hemmati, Amir Masoud Rahmani. Clustering for smart cities in the internet of things: a review |
4129 | -- | 4149 | Sujith Samuel Mathew, Kadhim Hayawi, Nahom Aron Dawit, Ikbal Taleb, Zouheir Trabelsi. Integration of blockchain and collaborative intrusion detection for secure data transactions in industrial IoT: a survey |
4151 | -- | 4169 | Syed Zaffar Qasim, Muhammad Ali Ismail. DOCEA/D: Dual-Operator-based Constrained many-objective Evolutionary Algorithm based on Decomposition |
4171 | -- | 4188 | K. Siddesha, G. V. Jayaramaiah, Chandrapal Singh. A novel deep reinforcement learning scheme for task scheduling in cloud computing |
4189 | -- | 4201 | Monika, Rajesh Bhatia, Arnav Jain, Baljeet Singh. Hash time locked contract based asset exchange solution for probabilistic public blockchains |
4203 | -- | 4219 | Jie Zhang 0077, Mingjie Piao, De-gan Zhang, Ting Zhang 0009, Wen-miao Dong. An approach of multi-objective computing task offloading scheduling based NSGS for IOV in 5G |
4221 | -- | 4232 | Mohammed Otair, Areej Alhmoud, Heming Jia, Maryam Altalhi, Ahmad MohdAziz Hussein, Laith Abualigah. Optimized task scheduling in cloud computing using improved multi-verse optimizer |
4233 | -- | 4255 | Madhu Sudan Kumar, Anubhav Choudhary, Indrajeet Gupta, Prasanta K. Jana. An efficient resource provisioning algorithm for workflow execution in cloud platform |
4257 | -- | 4273 | Navjeet Kaur, Ashok Kumar 0003, Rajesh Kumar. TRAP: task-resource adaptive pairing for efficient scheduling in fog computing |
4275 | -- | 4287 | Hemanta Kumar Bhuyan, Vinayakumar Ravi, M. Srikanth Yadav. Multi-objective optimization-based privacy in data mining |
4289 | -- | 4302 | Isabel Herrera Montano, José J. García-Aranda, Juan Ramos-Díaz, Sergio Molina-Cardín, Isabel de la Torre Díez, Joel J. P. C. Rodrigues. Survey of Techniques on Data Leakage Protection and Methods to address the Insider threat |
4303 | -- | 4323 | Niveditta Thakur, Nafis uddin Khan, Sunil Datt Sharma. An efficient fuzzy inference system based approximated anisotropic diffusion for image de-noising |
4325 | -- | 4337 | Zhanyou Ma, Qiannan Si, Yilin Liu, Shunzhi Wang. Performance analysis of P2P networks with malicious nodes |
4339 | -- | 4354 | Asal Ramezani, Maryam Rajabzadeh Asaar. An identity-based public auditing protocol in cloud-assisted IoT |
4355 | -- | 4382 | Sharif Naser Makhadmeh, Ammar Kamal Abasi, Mohammed Azmi Al-Betar, Mohammed A. Awadallah 0001, Iyad Abu Doush, Zaid Abdi Alkareem Alyasseri, Osama Ahmad Alomari. A novel link-based Multi-objective Grey Wolf Optimizer for Appliances Energy Scheduling Problem |
4383 | -- | 4396 | Monika, Om Prakash Sangwan. A framework for evaluating cloud computing services using AHP and TOPSIS approaches with interval valued spherical fuzzy sets |
4397 | -- | 4412 | Jing Chen, Hongbo Yang, Nana Wei, Mingxin Liu. User behavior analysis based on edge evolutionary game model in social network |
4413 | -- | 4422 | Qi Wang, Yinsheng Luo. Research on a new power distribution control strategy of hybrid energy storage system for hybrid electric vehicles based on the subtractive clustering and adaptive fuzzy neural network |
4423 | -- | 4438 | Sunggon Kim, Alex Sim, Kesheng Wu, Suren Byna, Yongseok Son. Design and implementation of dynamic I/O control scheme for large scale distributed file systems |
4439 | -- | 4461 | Guilherme Galante, Rodrigo Da Rosa Righi. Adaptive parallel applications: from shared memory architectures to fog computing (2002-2022) |
4463 | -- | 4480 | Shashi Raj, Dharavath Ramesh. PartEclat: an improved Eclat-based frequent itemset mining algorithm on spark clusters using partition technique |
4481 | -- | 4494 | Supriya Agrahari, Anil Kumar Singh. Adaptive PCA-based feature drift detection using statistical measure |
4495 | -- | 4514 | Abdul Razzaq. Blockchain-based secure data transmission for internet of underwater things |
4515 | -- | 4542 | Mirko Zichichi, Stefano Ferretti, Gabriele D'Angelo, Víctor Rodríguez-Doncel. Data governance through a multi-DLT architecture in view of the GDPR |
4543 | -- | 4572 | Rakesh Salam, Ansuman Bhattacharya. Efficient greedy heuristic approach for fault-tolerant distributed controller placement in scalable SDN architecture |
4573 | -- | 4600 | Sushmita Sharma, Apu Kumar Saha, Susmita Roy, Seyedali Mirjalili, Sukanta Nama. A mixed sine cosine butterfly optimization algorithm for global optimization and its application |
4601 | -- | 4615 | V. Anandhi, P. Vinod 0001, Varun G. Menon, Korankotte Manoj Aditya. Performance evaluation of deep neural network on malware detection: visual feature approach |
4617 | -- | 4632 | Yungui Chen, Li Feng, Hong Liang, Shumin Yao, Liwei Tian, Xiaochen Yuan. RS-chain: a decentralized reputation-sharing framework for group-buying industry via hybrid blockchain |
4633 | -- | 4652 | Wenbing Zhang, Li Xu, Zhenzhong Shen, Baotai Ma. A new approach for mechanical parameter inversion analysis of roller compacted concrete dams using modified PSO and RBFNN |
4653 | -- | 4672 | Mohammad Reza Alizadeh, Vahid Khajehvand, Amir Masoud Rahmani, Ebrahim Akbari. TPEL: Task possible execution level for effective scheduling in fog-cloud environment |