Journal: Cluster Computing

Volume 24, Issue 4

2723 -- 2734Antonio Libri, Andrea Bartolini, Luca Benini. DiG: enabling out-of-band scalable high-resolution monitoring for data-center analytics, automation and control (extended)
2735 -- 2756Sardar Khaliq uz Zaman, Ali Imran Jehangiri, Tahir Maqsood, Zulfiqar Ahmad, Arif Iqbal Umar, Junaid Shuja, Eisa Alanazi, Waleed Alasmary. Mobility-aware computational offloading in mobile edge networks: a survey
2757 -- 2787Ghofrane Fersi. Fog computing and Internet of Things in one building block: a survey and an overview of interacting technologies
2789 -- 2805Mahnaz Rafie, Akram Reza. Online multi-job mapping for photonic network on a chip design using partial migrations
2807 -- 2817Weijin Jiang, Sijian Lv. Hierarchical deployment of deep neural networks based on fog computing inferred acceleration model
2819 -- 2840Mahendra Pratap Yadav, Nisha Pal, Dharmendra Kumar-Yadav. Resource provisioning for containerized applications
2841 -- 2866Javad Zarrin, Phang Hao Wen, Lakshmi Babu Saheer, Bahram Zarrin. Blockchain for decentralization of internet: prospects, trends, and challenges
2867 -- 2881Sami Dhahbi, Mouhebeddine Berrima, Fuad Ali Mohammed Al-Yarimi. Load balancing in cloud computing using worst-fit bin-stretching
2883 -- 2896Dharmendra Prasad Mahato, Van-Huy Pham 0001. Reliability analysis in grid system considering load
2897 -- 2908Faiz Al Faisal, M. M. Hafizur Rahman, Yasushi Inoguchi. 3D-TTN: a power efficient cost effective high performance hierarchical interconnection network for next generation green supercomputer
2909 -- 2925Walid K. Ghamry, Suzan Shukry. Spectrum access in cognitive IoT using reinforcement learning
2927 -- 2956Esra Celik, Deniz Dal. A novel simulated annealing-based optimization approach for cluster-based task scheduling
2957 -- 2976Laith Mohammad Abualigah, Ali Diabat, Mohamed Abd El-Aziz 0001. Intelligent workflow scheduling for Big Data applications in IoT cloud computing environments
2977 -- 2994Imene Ben Hafaiedh, Roua Ben Hamouda, Riadh Robbana. A model-based approach for formal verification and performance analysis of dynamic load-balancing protocols in cloud environment
2995 -- 3010Susmitha Alamuru, Sanjay Jain. Video event detection, classification and retrieval using ensemble feature selection
3011 -- 3026Hamza Aldabbas, Rashid Amin. A novel mechanism to handle address spoofing attacks in SDN based IoT
3027 -- 3041Qingqing Gan, Xiaoming Wang 0004, Jianwei Li, Jiajun Yan, Suyu Li. Enabling online/offline remote data auditing for secure cloud storage
3043 -- 3053Frank Yeong-Sung Lin, Chiu-Han Hsiao, Si-yuan Zhang, Yi-Ping Rung, Yu-Xuan Chen. Cross-device matching approaches: word embedding and supervised learning
3055 -- 3063Mustapha Bouakkaz, Youcef Ouinten, Sabine Loudcher, Philippe Fournier-Viger. Enhancing link prediction in dynamic networks using content aggregation
3065 -- 3084Sa'ed Abed, Reem Jaffal, Bassam Jamil Mohd, Mohammad H. Al Shayeji. An analysis and evaluation of lightweight hash functions for blockchain-based IoT devices
3085 -- 3099Muhammad Imran, Valentin Kuznetsov, Katarzyna Maria Dziedziniewicz-Wojcik, Andreas Pfeiffer, Panos Paparrigopoulos, Spyridon Trigazis, Tommaso Tedeschi, Diego Ciangottini. Migration of CMSWEB cluster at CERN to Kubernetes: a comprehensive study
3101 -- 3122Nitish Das, Aruna Priya P.. KD-LBA: a Kernighan Lin-driven logarithmic barrier approach to solve the many-to-many assignment problem and its application in CPU/FPGA scheduling
3123 -- 3134Behzad Naderalvojoud, Adnan Ozsoy. A non-sequential refinement approach to improve word embeddings using GPU-based string matching algorithms
3135 -- 3145Arfa Muteeh, Muhammad Sardaraz, Muhammad Tahir 0004. MrLBA: multi-resource load balancing algorithm for cloud computing using ant colony optimization
3147 -- 3172Anil Kumar Rangisetti, Rishabh Dwivedi, Prabhdeep Singh. Denial of ARP spoofing in SDN and NFV enabled cloud-fog-edge platforms
3173 -- 3186Guillaume Ruty, Hana Baccouch, Victor Nguyen, Andre Surcouf, Jean-Louis Rougier, Nadia Boukhatem. Popularity-based full replica caching for erasure-coded distributed storage systems
3187 -- 3228Seyedeh Shabnam Jazaeri, Sam Jabbehdari, Parvaneh Asghari, Hamid Haj Seyyed Javadi. Edge computing in SDN-IoT networks: a systematic review of issues, challenges and solutions
3229 -- 3247Pouria Khanzadi, Sepideh Adabi, Babak Majidi, Ali Movaghar 0001. Optimal VM-to-user mapping in cloud environment based on sustainable strategy space theory
3249 -- 3275Keyvan RahimiZadeh, Abbas Dehghani 0002. Design and evaluation of a joint profit and interference-aware VMs consolidation in IaaS cloud datacenter
3277 -- 3292Masoumeh Etemadi, Mostafa Ghobaei Arani, Ali Shahidinejad. A cost-efficient auto-scaling mechanism for IoT applications in fog computing environment: a deep learning-based approach
3293 -- 3310Minhaj Ahmad Khan. An efficient energy-aware approach for dynamic VM consolidation on cloud platforms
3311 -- 3336Mokhtar Sellami 0002, Haithem Mezni, Mohand-Said Hacid, Mohamed Moshen Gammoudi. Clustering-based data placement in cloud computing: a predictive approach
3337 -- 3349Ming-Jeng Yang. Energy-efficient cloud data center with fair service level agreement for green computing
3351 -- 3366Reem Alshahrani, Hassan Peyravi. Modeling and analysis of distributed schedulers in data center cluster networks
3367 -- 3379Saloua El Motaki, Ali Yahyaouy, Hamid Gualous, Jalal Sabor. A new weighted fuzzy C-means clustering for workload monitoring in cloud datacenter platforms
3381 -- 3403Rana Ghazali, Sahar Adabi, Douglas G. Down, Ali Movaghar 0001. A classification of hadoop job schedulers based on performance optimization approaches
3405 -- 3419Hadeer Mahmoud, Mostafa Thabet, Mohamed Helmy Khafagy, Fatma A. Omara. An efficient load balancing technique for task scheduling in heterogeneous cloud environment
3421 -- 3430Wen-Chung Shih, Chao-Tung Yang, Rajiv Ranjan, Chun-I Chiang. Implementation and evaluation of a container management platform on Docker: Hadoop deployment as an example
3431 -- 3448Haodong Bian, Jianqiang Huang, Runting Dong, Yuluo Guo, Lingbin Liu, Dongqiang Huang, Xiaoying Wang. A simple and efficient storage format for SIMD-accelerated SpMV
3449 -- 3467Ahmad Taghinezhad-Niar, Saeid Pashazadeh, Javid Taheri. Workflow scheduling of scientific workflows under simultaneous deadline and budget constraints
3469 -- 3494Alireza Mahini, Reza Berangi, Amir Masoud Rahmani, Hamidreza Navidi. Bankruptcy approach to integrity aware resource management in a cloud federation
3495 -- 3514Chengpeng Huang, Xiaoming Wang 0004, Qingqing Gan, Daxin Huang, Mengting Yao, Yijian Lin. A lightweight and fault-tolerable data aggregation scheme for privacy-friendly smart grids environment
3515 -- 3529Limin Xia, Wentao Ma, Lu Feng. Semantic features and high-order physical features fusion for action recognition
3531 -- 3549Kashav Ajmera, Tribhuwan Kumar Tewari. VMS-MCSA: virtual machine scheduling using modified clonal selection algorithm
3551 -- 3571Aqsa Rashid, Asif Masood, Atta ur Rehman Khan. RC-AAM: blockchain-enabled decentralized role-centric authentication and access management for distributed organizations
3573 -- 3590Woong Sul, Heon Y. Yeom, Hyuck Han. montage: NVM-based scalable synchronization framework for crash-consistent file systems
3591 -- 3606Somayeh Sobati Moghadam. Efficient information-theoretically secure schemes for cloud data outsourcing
3607 -- 3627Saeed Doostali, Seyed Morteza Babamir, Maryam Eini. CP-PGWO: multi-objective workflow scheduling for cloud computing using critical path
3629 -- 3650Georgios L. Stavrinides, Helen D. Karatza. Orchestrating real-time IoT workflows in a fog computing environment utilizing partial computations with end-to-end error propagation
3651 -- 3669Seyedeh Yasaman Hosseini Mirmahaleh, Midia Reshadi, Nader Bagherzadeh, Ahmad Khademzadeh. Data scheduling and placement in deep learning accelerator
3671 -- 3692Pramod Yelmewad, Basavaraj Talawar. Parallel Version of Local Search Heuristic Algorithm to Solve Capacitated Vehicle Routing Problem
3693 -- 3708Farhoud Jafari Kaleibar, Maghsoud Abbaspour. SLA-based service provisioning approach in vehicular cloud network
3709 -- 3724Jixian Zhang, Ning Xie, Xutao Yang, Xuejie Zhang 0002, Weidong Li 0002. Strategy-proof mechanism for time-varying batch virtual machine allocation in clouds
3725 -- 3750Mahendra Pratap Yadav, Rohit, Dharmendra Kumar-Yadav. Maintaining container sustainability through machine learning
3751 -- 3765Lokendra Vishwakarma, Debasis Das 0001. BlockTree: a nonlinear structured, scalable and distributed ledger scheme for processing digital transactions
3767 -- 3778Ali Abbas Zoraghchian, Mohammad Karim Sohrabi, Farzin Yaghmaee. Exploiting parallel graphics processing units to improve association rule mining in transactional databases using butterfly optimization algorithm
3779 -- 3795Eishvak Sengupta, Renuka Nagpal, Deepti Mehrotra, Gautam Srivastava. ProBlock: a novel approach for fake news detection
3797 -- 3813Adrián Castelló, Enrique S. Quintana-Ortí, José Duato. Accelerating distributed deep neural network training with pipelined MPI allreduce
3815 -- 3835Zhu Yuan, Xindong You, Xueqiang Lv, Muyuan Li, Ping Xie. HDS: optimizing data migration and parity update to realize RAID-6 scaling for HDP
3837 -- 3850Naveen Chauhan, Haider Banka, Rajeev Agrawal. Adaptive bandwidth adjustment for resource constrained services in fog queueing system
3851 -- 0Sardar Khaliq uz Zaman, Ali Imran Jehangiri, Tahir Maqsood, Zulfiqar Ahmad, Arif Iqbal Umar, Junaid Shuja, Eisa Alanazi, Waleed Alasmary. Correction to: Mobility-aware computational offloading in mobile edge networks: a survey
3853 -- 0Esra Celik, Deniz Dal. Correction to: A novel simulated annealing-based optimization approach for cluster-based task scheduling
3855 -- 0Stefan Kehrer, Dominik Zietlow, Jochen Scheffold, Wolfgang Blochinger. Correction to: Self-tuning serverless task farming using proactive elasticity control

Volume 24, Issue 3

1583 -- 1603Jin-Bang Hsu, Chi-Fang Lin, Yang-Cheng Chang, Ren-Hao Pan. Using independent resource allocation strategies to solve conflicts of Hadoop distributed architecture in virtualization
1605 -- 1621Prateek Agrawal, Anatoliy Zabrovskiy, Adithyan Ilangovan, Christian Timmerer, Radu Prodan. FastTTPS: fast approach for video transcoding time prediction and scheduling for HTTP adaptive streaming videos
1623 -- 1642A. Justin Gopinath, Nithya Balasubramanian. Performance evaluation of grouping and regrouping scheme for mitigating hidden station problem in IEEE 802.11ah network
1643 -- 1657Sunakshi Singh, Vijay Kumar Chaurasiya. Mutual authentication scheme of IoT devices in fog computing environment
1659 -- 1674Eduardo Viegas 0001, Altair O. Santin, Juliana Bachtold, Darlan Segalin, Maicon Stihler, Arlindo L. Marcon Jr., Carlos Maziero. Enhancing service maintainability by monitoring and auditing SLA in cloud computing
1675 -- 1694Vikram Puri, Ishaani Priyadarshini, Raghvendra Kumar 0001, Chung Van Le. Smart contract based policies for the Internet of Things
1695 -- 1710Mattia Zago, Manuel Gil Pérez, Gregorio Martínez Pérez. Early DGA-based botnet identification: pushing detection to the edges
1711 -- 1733Ghazaleh Khojasteh Toussi, Mahmoud Naghibzadeh. A divide and conquer approach to deadline constrained cost-optimization workflow scheduling for the cloud
1735 -- 1759Dimitrios Tychalas, Helen D. Karatza. SaMW: a probabilistic meta-heuristic algorithm for job scheduling in heterogeneous distributed systems powered by microservices
1761 -- 1779S. Krishnaveni, S. Sivamohan, S. S. Sridhar, S. Prabakaran. Efficient feature selection and classification through ensemble method for network intrusion detection on cloud computing
1781 -- 1792Jasleen Kaur, Supreet Kaur. Novel trust evaluation using NSGA-III based adaptive neuro-fuzzy inference system
1793 -- 1824Yashwant Singh Patel, Manoj Reddy, Rajiv Misra. Energy and cost trade-off for computational tasks offloading in mobile multi-tenant clouds
1825 -- 1853Maryam Keshavarznejad, Mohammad Hossein Rezvani, Sepideh Adabi. Delay-aware optimization of energy consumption for task offloading in fog environments using metaheuristic algorithms
1855 -- 1879Yashwant Singh Patel, Zahra Malwi, Animesh Nighojkar, Rajiv Misra. Truthful online double auction based dynamic resource provisioning for multi-objective trade-offs in IaaS clouds
1881 -- 1900Shubhra Dwivedi, Manu Vardhan, Sarsij Tripathi. Building an efficient intrusion detection system using grasshopper optimization algorithm for anomaly detection
1901 -- 1915Xiao Huan Liu, Degan Zhang 0001, Jie Zhang, Ting Zhang 0009, Haoli Zhu. A path planning method based on the particle swarm optimization trained fuzzy neural network algorithm
1917 -- 1933Priyanka Verma, Shashikala Tapaswi, W. Wilfred Godfrey. A request aware module using CS-IDR to reduce VM level collateral damages caused by DDoS attack in cloud environment
1935 -- 1944Haythem Bany Salameh, Ayat Shamekh. Adaptive Packet-size Control for Improved Throughput in Dynamic Access Networks
1945 -- 1954Houda Guesmi, Anwar Kalghoum, Cherif Ghazel, Leïla Azouz Saïdane. FFED: a novel strategy based on fast entropy to detect attacks against trust computing in cloud
1955 -- 1974Gurleen Kaur, Anju Bala. OPSA: an optimized prediction based scheduling approach for scientific applications in cloud environment
1975 -- 1987Minho Ryu, Geonseok Lee, Kichun Lee. Online sequential extreme studentized deviate tests for anomaly detection in streaming data with varying patterns
1989 -- 2000Bilin Shao, Yanyan Ji. Efficient TPA-based auditing scheme for secure cloud storage
2001 -- 2015Rahul Yadav, Weizhe Zhang, Keqin Li, Chuanyi Liu, Asif Ali Laghari. Managing overloaded hosts for energy-efficiency in cloud data centers
2017 -- 2038Radwa El Shawi, Abdul Wahab, Ahmed Barnawi, Sherif Sakr. DLBench: a comprehensive experimental evaluation of deep learning frameworks
2039 -- 2050Liwei Fu, Shunfu Jin. Nash equilibrium and social optimization in cloud service systems with diverse users
2051 -- 2068Ahmed Elkhalil, Jiashu Zhang, Rashad Elhabob. An efficient heterogeneous blockchain-based online/offline signcryption systems for internet of vehicles
2069 -- 2082Kahlessenane Fares, Amine Khaldi, Redouane Kafi, Salah Euschi. A robust blind medical image watermarking approach for telemedicine applications
2083 -- 2098Jeng-Shyang Pan 0001, Jie Shan, Shiguang Zheng, Shu-Chuan Chu, Cheng-Kuo Chang. Wind power prediction based on neural network with optimization of adaptive multi-group salp swarm algorithm
2099 -- 2114Meenal Jain, Gagandeep Kaur. Distributed anomaly detection using concept drift detection based hybrid ensemble techniques in streamed network data
2115 -- 2132Wei Luo 0003, Wenping Ma 0002, Juntao Gao. MHB*T based dynamic data integrity auditing in cloud storage
2133 -- 2160Mohammad Asad Abbasi, Zulfiqar Ali Memon, Nouman M. Durrani, Waleej Haider, Kashif Laeeq, Ghulam Ali Mallah. A multi-layer trust-based middleware framework for handling interoperability issues in heterogeneous IOTs
2161 -- 2176Laith Mohammad Abualigah, Akram Jamal Dulaimi. A novel feature selection method for data mining tasks using hybrid Sine Cosine Algorithm and Genetic Algorithm
2177 -- 2191K. C. Lalropuia, Vandana Khaitan (nee Gupta). Availability and reliability analysis of cloud computing under economic denial of sustainability (EDoS) attack: a semi-Markov approach
2193 -- 2211Hitesh Mohapatra, Amiya Kumar Rath. A fault tolerant routing scheme for advanced metering infrastructure: an approach towards smart grid
2213 -- 2230Haifa Touati, Safa Mejri, Naceur Malouch, Farouk Kamoun. Fair hop-by-hop interest rate control to mitigate congestion in named data networks
2231 -- 2248Peng Xiao 0006, Zhenyu Ni, Dongbo Liu, Zhigang Hu. A power and thermal-aware virtual machine management framework based on machine learning
2249 -- 2268Basilio B. Fraguela, Diego Andrade, Jorge González-Domínguez. ScalaParBiBit: scaling the binary biclustering in distributed-memory systems
2269 -- 2292Mohamed S. Alshafaey, Ahmed I. Saleh, Mohamed F. Alrahamawy. A new cloud-based classification methodology (CBCM) for efficient semantic web service discovery
2293 -- 2312Samaneh Torkzadeh, Hadi Soltanizadeh, Ali A. Orouji. Energy-aware routing considering load balancing for SDN: a minimum graph-based Ant Colony Optimization
2313 -- 2325Francisco J. Aguayo-Canela, Héctor Alaiz-Moretón, María Teresa García-Ordás, José Alberto Benítez-Andrades, Carmen Benavides, Paulo Novais, Isaías García-Rodríguez. Middleware-based multi-agent development environment for building and testing distributed intelligent systems
2327 -- 2340Osama A. Mahdi, Eric Pardede, Nawfal Ali. A hybrid block-based ensemble framework for the multi-class problem to react to different types of drifts
2341 -- 2353Feras N. Al-Obeidat, Anoud Bani-Hani, Oluwasegun A. Adedugbe, Munir Majdalawieh, Elhadj Benkhelifa. A microservices persistence technique for cloud-based online social data analysis
2355 -- 2366Yanghao Xie, Sheng Wang, Binbin Wang. Virtual network function placement with bounded migrations
2367 -- 2384Jabir Kakkottakath Valappil Thekkepuryil, David Peter Suseelan, Preetha Mathew Keerikkattil. An effective meta-heuristic based multi-objective hybrid optimization method for workflow scheduling in cloud computing environment
2385 -- 2406Khalid M. Hosny, Mohamed M. Darwish, Ahmad Salah, Kenli Li 0001, Amr M. Abdelatif. CUDAQuat: new parallel framework for fast computation of quaternion moments for color images applications
2407 -- 2423Fateme Shokri Habashi, Saleh Yousefi, Babak Ghalebsaz-Jeddi. Resource allocation mechanisms for maximizing provider's revenue in infrastructure as a service (IaaS) cloud
2425 -- 2459Shveta Verma, Anju Bala. Auto-scaling techniques for IoT-based cloud applications: a review
2461 -- 2478V. Jyothsna, K. Munivara Prasad, K. Rajiv, G. Ramesh Chandra. Flow based anomaly intrusion detection system using ensemble classifier with Feature Impact Scale
2479 -- 2494Dongcheng Zhao, Long Luo, Hongfang Yu, Victor Chang 0001, Rajkumar Buyya, Gang Sun. Security-SLA-guaranteed service function chain deployment in cloud-fog computing networks
2495 -- 2509Vahid Jamshidi, Vahab Nekoukar, Mohammad Hossein Refan. Real time UAV path planning by parallel grey wolf optimization with align coefficient on CAN bus
2511 -- 2544Nasrin Firouz, Mohammad Masdari, Amin Babazadeh Sangar, Kambiz Majidzadeh. A novel controller placement algorithm based on network portioning concept and a hybrid discrete optimization algorithm for multi-controller software-defined networks
2545 -- 2579Ali Shakarami, Mostafa Ghobaei Arani, Ali Shahidinejad, Mohammad Masdari, Hamid Shakarami. Data replication schemes in cloud computing: a survey
2581 -- 2595Mohd Mustaqeem, Mohd Saqib. Principal component based support vector machine (PC-SVM): a hybrid technique for software defect detection
2597 -- 2614Hui-Ching Hsieh, Mao-Lun Chiang, Tzu-Yang Chang. Improving the fault-tolerance of software-defined networks with dynamic overlay agreement
2615 -- 2637Gaurav Sharma, Neha Miglani, Ajay Kumar. PLB: a resilient and adaptive task scheduling scheme based on multi-queues for cloud environment
2639 -- 2656Morteza Mollajafari, Mohammad H. Shojaeefard. TC3PoP: a time-cost compromised workflow scheduling heuristic customized for cloud environments
2657 -- 2672Doddi Srilatha, Gopal K. Shyam. Cloud-based intrusion detection using kernel fuzzy clustering and optimal type-2 fuzzy neural network
2673 -- 2696Behrouz Pourghebleh, Amir Aghaei Anvigh, Amir Reza Ramtin, Behnaz Mohammadi. The importance of nature-inspired meta-heuristic algorithms for solving virtual machine consolidation problem in cloud environments
2697 -- 2721Jean Etienne Ndamlabin Mboula, Vivient Corneille Kamla, Clémentin Tayou Djamégni. Dynamic provisioning with structure inspired selection and limitation of VMs based cost-time efficient workflow scheduling in the cloud

Volume 24, Issue 2

591 -- 610Ahmadreza Montazerolghaem. Software-defined load-balanced data center: design, implementation and performance analysis
611 -- 624Félix García Carballeira, Alejandro Calderón 0001, Jesús Carretero 0001. Enhancing the power of two choices load balancing algorithm using round robin policy
625 -- 641Zoltan Juhasz. Quantitative cost comparison of on-premise and cloud infrastructure based EEG data processing
643 -- 666Neetesh Kumar, Deo Prakash Vidyarthi. A novel energy-efficient scheduling model for multi-core systems
667 -- 681Amir Iranmanesh, Hamid Reza Naji. DCHG-TS: a deadline-constrained and cost-effective hybrid genetic algorithm for scientific workflow scheduling in cloud computing
683 -- 699Vaibhav Pandey, Poonam Saini. A heuristic method towards deadline-aware energy-efficient mapreduce scheduling problem in Hadoop YARN
701 -- 715Weihong Chen, Guoqi Xie, Renfa Li, Keqin Li 0001. Execution cost minimization scheduling algorithms for deadline-constrained parallel applications on heterogeneous clouds
717 -- 737Parminder Singh, Avinash Kaur, Pooja Gupta, Sukhpal Singh Gill, Kiran Jyoti. RHAS: robust hybrid auto-scaling for web applications in cloud computing
739 -- 752Muhammad Tahir 0004, Muhammad Sardaraz, Zahid Mehmood, Shakoor Muhammad. CryptoGA: a cryptosystem based on genetic algorithm for cloud data security
753 -- 765Hamidreza Koohi, Kourosh Kiani. Two new collaborative filtering approaches to solve the sparsity problem
767 -- 797Neha Garg, Damanpreet Singh, Major Singh Goraya. Energy and resource efficient workflow scheduling in a virtualized cloud environment
799 -- 817Stefan Kehrer, Dominik Zietlow, Jochen Scheffold, Wolfgang Blochinger. Self-tuning serverless task farming using proactive elasticity control
819 -- 835Reza Sookhtsaraei, Marzieh Iraji, Javad Artin, Mohammad Saber Iraji. Increasing the quality of services and resource utilization in vehicular cloud computing using best host selection methods
837 -- 850Yosef Ashibani, Qusay H. Mahmoud. Design and evaluation of a user authentication model for IoT networks based on app event patterns
851 -- 865Nikita Singh, Tarun Kumar, Manu Vardhan. Blockchain-based e-cheque clearing framework with trust based consensus mechanism
867 -- 883Rakesh Ranjan Kumar, Binita Kumari, Chiranjeev Kumar. CCS-OSSR: A framework based on Hybrid MCDM for Optimal Service Selection and Ranking of Cloud Computing Services
885 -- 918Amit Chhabra, Gurvinder Singh, Karanjeet Singh Kahlon. Multi-criteria HPC task scheduling on IaaS cloud infrastructures using meta-heuristics
919 -- 934Mehran Tarahomi, Mohammad Izadi, Mostafa Ghobaei Arani. An efficient power-aware VM allocation mechanism in cloud data centers: a micro genetic-based approach
935 -- 951Peng Zhang, Chao Yang 0002, Yulong Ao. AutoWM: a novel domain-specific tool for universal multi-/many-core accelerations of the WRF cloud microphysics
953 -- 968Likhesh Kolhe, Ashok Kumar Jetawat, Vaishali Khairnar. Robust product recommendation system using modified grey wolf optimizer and quantum inspired possibilistic fuzzy C-means
969 -- 995Pramod Yelmewad, Basavaraj Talawar. Parallel deterministic local search heuristic for minimum latency problem
997 -- 1032Sara Nasirian, Farhad Faghani. Platonica: an efficient and high-performance dual-centric data center network architecture
1033 -- 1049Viviana Elizabeth Cajas, Matias Urbieta, Gustavo Rossi, Yves Rybarczyk. Migrating legacy Web applications
1051 -- 1073Luan Teylo, Luciana Arantes, Pierre Sens 0001, Lúcia Maria de A. Drummond. A dynamic task scheduler tolerant to multiple hibernations in cloud environments
1075 -- 1101Fatemeh Ebadifard, Seyed Morteza Babamir. Autonomic task scheduling algorithm for dynamic workloads through a load balancing technique for the cloud-computing environment
1103 -- 1121Sarah Maroc, Jian-biao Zhang. Cloud services security-driven evaluation for multiple tenants
1123 -- 1134Prathibha Soma, B. Latha. Response Surface Modelling for Performance Analysis of Scientific Workflow Application in Cloud
1135 -- 1163Emad Mirsadeghi, Salman Khodayifar. Hybridizing particle swarm optimization with simulated annealing and differential evolution
1165 -- 1184Jia Hao, Kun Yue, Liang Duan, Binbin Zhang, Xiaodong Fu. Predicting QoS of virtual machines via Bayesian network with XGboost-induced classes
1185 -- 1198Farhad Rad, Midia Reshadi, Ahmad Khademzadeh. A novel arbitration mechanism for crossbar switch in wireless network-on-chip
1199 -- 1215Soodeh Hosseini. Defense against malware propagation in complex heterogeneous networks
1217 -- 1233Yatheendraprakash Govindaraju, Hector A. Duran-Limon, Efrén Mezura-Montes. A regression tree predictive model for virtual machine startup time in IaaS clouds
1235 -- 1253Tohid Jafarian, Mohammad Masdari, Ali Ghaffari, Kambiz Majidzadeh. A survey and classification of the security anomaly detection mechanisms in software defined networks
1255 -- 1275Fares Alharbi, Yu-Chu Tian, Maolin Tang, Md Hasanul Ferdaus, Weizhe Zhang, Zu-Guo Yu. Simultaneous application assignment and virtual machine placement via ant colony optimization for energy-efficient enterprise data centers
1277 -- 1291Sumit Kumar, Rajeev Tiwari. An efficient content placement scheme based on normalized node degree in content centric networking
1293 -- 1315Sasan Gharehpasha, Mohammad Masdari, Ahmad Jafarian. Power efficient virtual machine placement in cloud data centers with a discrete and chaotic hybrid optimization algorithm
1317 -- 1330Song Jin, Songwei Pei, Yu Wang, Yincheng Qi. A parallel sparse triangular solve algorithm based on dependency elimination of the solution vector
1331 -- 1345Yanhui Liu, Jianbiao Zhang, Jing Zhan. Privacy protection for fog computing and the internet of things data based on blockchain
1347 -- 1360Amir Masoud Rahmani, Zahra Babaei, Alireza Souri. Event-driven IoT architecture for data analysis of reliable healthcare application using complex event processing
1361 -- 1379Rahul Mishra, Dharavath Ramesh, Damodar Reddy Edla. Dynamic large branching hash tree based secure and efficient dynamic auditing protocol for cloud environment
1381 -- 1396R. Sridharan, S. Domnic. Network policy aware placement of tasks for elastic applications in IaaS-cloud environment
1397 -- 1411Guijun Wang, Weiming Xiao, Yujie Tao. Interpolation neural network constructed by the step path and its approximation performance
1413 -- 1434Saima Mehraj, M. Tariq Banday. A flexible fine-grained dynamic access control approach for cloud computing environment
1435 -- 1453Benamar Bouyeddou, Fouzi Harrou, Benamar Kadri, Ying Sun 0002. Detecting network cyber-attacks using an integrated statistical approach
1455 -- 1478S. Sabitha, M. S. Rajasree. Multi-level on-demand access control for flexible data sharing in cloud
1479 -- 1503Ali Mohammadzadeh, Mohammad Masdari, Farhad Soleimanian Gharehchopogh, Ahmad Jafarian. A hybrid multi-objective metaheuristic optimization algorithm for scientific workflow scheduling
1505 -- 1524Fan Deng, Zhenhua Yu, Houbing Song, Rongyi Zhao, Qi Zheng, Zhenyu Li, Huansheng He, Yixin Zhang, Fangzhi Guo. An efficient policy evaluation engine with locomotive algorithm
1525 -- 1550Kamalakanta Sethi, Ankit Pradhan, Padmalochan Bera. PMTER-ABE: a practical multi-authority CP-ABE with traceability, revocation and outsourcing decryption for secure access control in cloud systems
1551 -- 1577Messaouda Ayachi, Hassina Nacer, Hachem Slimani. Cooperative game approach to form overlapping cloud federation based on inter-cloud architecture
1579 -- 1582Messaouda Ayachi, Hassina Nacer, Hachem Slimani. Correction to: Cooperative game approach to form overlapping cloud federation based on inter-cloud architecture

Volume 24, Issue 1

1 -- 16Rana M. Amir Latif, Muhammad Farhan, Osama Rizwan, Majid Hussain, Sohail Jabbar, Shahzad Khalid. Retail level Blockchain transformation for product supply chain using truffle development platform
17 -- 35Abdul Jabbar Siddiqui, Azzedine Boukerche. TempoCode-IoT: temporal codebook-based encoding of flow features for intrusion detection in Internet of Things
37 -- 55Omar Alfandi, Salam Ismail Rasheed Khanji, Liza Ahmad, Asad Masood Khattak. A survey on boosting IoT security and privacy through blockchain
57 -- 81Pantaleone Nespoli, Félix Gómez Mármol, Jorge Maestre Vidal. Battling against cyberattacks: towards pre-standardization of countermeasures
83 -- 101Moutaz Alazab, Salah Alhyari, Albara W. Awajan, Ayman Bahjat Abdallah. Blockchain technology in supply chain management: an empirical study of the factors affecting user adoption/acceptance
103 -- 113Jin Liu 0012, Dejiao Zeng, Rui Guo, Mingming Lu, Fang-Xiang Wu, Jianxin Wang 0001. MMHGE: detecting mild cognitive impairment based on multi-atlas multi-view hybrid graph convolutional networks and ensemble learning
115 -- 139Emmanuel Bugingo, Defu Zhang, Zhaobin Chen, Wei Zheng 0002. Towards decomposition based multi-objective workflow scheduling for big data processing in clouds
141 -- 157Tantan Shi, Genlin Ji, Zhaoyuan Yu, Bin Zhao 0002. Collective periodic pattern discovery for understanding human mobility
159 -- 179Seungwoo Rho, Geunchul Park, Jieun Choi, Chan Yeol Park. Development of benchmark automation suite and evaluation of various high-performance computing systems
181 -- 193Hanul Sung, Jeesoo Min, Donghun Koo, Hyeonsang Eom. OMBM-ML: efficient memory bandwidth management for ensuring QoS and improving server utilization
195 -- 203Xiujuan Jiang, Nan Zhang, Jinchuan Huang, Ping Zhang, Hui Liu. Analysis of prediction algorithm for forest land spatial evolution trend in rural planning
205 -- 223Laith Mohammad Abualigah, Ali Diabat. A novel hybrid antlion optimization algorithm for multi-objective task scheduling problems in cloud computing environments
225 -- 247Yuanfei Tu, Geng Yang, Jing Wang, Qingjian Su. A secure, efficient and verifiable multimedia data sharing scheme in fog networking system
249 -- 278Wakar Ahmad, Bashir Alam, Sanchit Ahuja, Sahil Malik. A dynamic VM provisioning and de-provisioning based cost-efficient deadline-aware scheduling algorithm for Big Data workflow applications in a cloud environment
279 -- 292Junru Lei, Shuhua Deng, Zebin Lu, Yihao He, Xieping Gao. Energy-saving traffic scheduling in backbone networks with software-defined networks
293 -- 317Tehsin Kanwal, Adeel Anjum, Abid Khan. Privacy preservation in e-health cloud: taxonomy, privacy requirements, feasibility analysis, and opportunities
319 -- 342Ali Shahidinejad, Mostafa Ghobaei Arani, Mohammad Masdari. Resource provisioning using workload clustering in cloud computing environment: a hybrid approach
343 -- 359Samaneh Sadat Mousavi Nik, Mahmoud Naghibzadeh, Yasser Sedaghat. Task replication to improve the reliability of running workflows on the cloud
361 -- 392Sarra Slimani, Tarek Hamrouni, Faouzi Ben Charrada. Service-oriented replication strategies for improving quality-of-service in cloud computing: a survey
393 -- 415N. G. Bhuvaneswari Amma, S. Selvakumar 0001. A statistical class center based triangle area vector method for detection of denial of service attacks
417 -- 431Asif Muhammad, Muhammad Aleem, Muhammad Arshad Islam. TOP-Storm: A topology-based resource-aware scheduler for Stream Processing Engine
433 -- 458Ouafae Kasmi, Amine Baïna, Mostafa Bellafkih. Fuzzy logic based clustering algorithm for management in critical infrastructure
459 -- 473Hui Li, Lishuang Pei, Dan Liao, Xiong Wang 0001, Du Xu, Jian Sun. BDDT: use blockchain to facilitate IoT data transactions
475 -- 488Yan He, Liang Feng Zhang. Multi-matrix verifiable computation
489 -- 500Mesmin J. Mbyamm Kiki, Jianbiao Zhang, Bonzou Adolphe Kouassi. MapReduce FCM clustering set algorithm
501 -- 513Sumit Badotra, Surya Narayan Panda. SNORT based early DDoS detection system using Opendaylight and open networking operating system in software defined networking
515 -- 535Zhihui He, Hu Peng, Jianqiang Chen, Changshou Deng, Zhijian Wu. A Spark-based differential evolution with grouping topology model for large-scale global optimization
537 -- 558Mei-Ling Chiang, Hui-Sheng Cheng, Hsien-Yi Liu, Ching-Yi Chiang. SDN-based server clusters with dynamic load balancing and performance improvement
559 -- 568Saima Majeed, Ammar Ul Hassan, Jaeyoung Choi. Rendering high-quality PK bitmap font in Linux environment
569 -- 585Abdul Wahid, Annavarapu Chandra Sekhara Rao. ODRA: an outlier detection algorithm based on relevant attribute analysis method
587 -- 0Zhiming Cai, Lianbing Deng, Daming Li 0001, Xiang Yao, Haoxiang Wang. Retraction Note to: A FCM cluster: cloud networking model for intelligent transportation in the city of Macau
589 -- 0Lianbing Deng, Daming Li 0001, Xiang Yao, Haoxiang Wang. Retraction Note to: Mobile network intrusion detection for IoT system based on transfer learning algorithm