Journal: Computing

Volume 106, Issue 9

2897 -- 2922Arezoo Ghasemi, Abolfazl Toroghi Haghighat, Amin Keshavarzi. Enhancing virtual machine placement efficiency in cloud data centers: a hybrid approach using multi-objective reinforcement learning and clustering strategies
2923 -- 2947Yevhenii Shudrenko, Andreas Timm-Giel. Modeling end-to-end delays in TSCH wireless sensor networks using queuing theory and combinatorics
2949 -- 2969Atiyeh Javaheri, Ali Bohlooli, Kamal Jamshidi. Enhancing computation reuse efficiency in ICN-based edge computing by modifying content store table structure
2971 -- 3003Samia El Haddouti, Mohammed Khaldoune, Meryeme Ayache, Mohamed Dâfir Ech-Cherif El Kettani. Smart contracts auditing and multi-classification using machine learning algorithms: an efficient vulnerability detection in ethereum blockchain
3005 -- 3030Seyyed Javad Bozorg Zadeh Razavi, Haleh Amintoosi, Mohammad Allahbakhsh. A clarity and fairness aware framework for selecting workers in competitive crowdsourcing tasks
3031 -- 3062Raseena M. Haris, Mahmoud Barhamgi, Armstrong Nhlabatsi, Khaled M. Khan. Optimizing pre-copy live virtual machine migration in cloud computing using machine learning-based prediction model
3063 -- 3084Yifu Zhang, Qian Sun, Ji Chen, Huini Zhou. Deep learning-based classification and application test of multiple crop leaf diseases using transfer learning and the attention mechanism
3085 -- 3111Efrén Rama-Maneiro, Juan Carlos Vidal, Manuel Lama, Pablo Monteagudo-Lago. Exploiting recurrent graph neural networks for suffix prediction in predictive monitoring
3113 -- 3150D. N. Sachin, B. Annappa, Sateesh Ambesange. Federated learning for digital healthcare: concepts, applications, frameworks, and challenges

Volume 106, Issue 8

2521 -- 2539Lu Cai, Yongcai Yan, Zhongming Tang, Aijun Liu. Collaborative distribution optimization model and algorithm for an intelligent supply chain based on green computing energy management
2541 -- 2559Yuvaraja Teekaraman, Ramya Kuppusamy, V. Indragandhi. Investigations on the effect of micro-grid using improved NFIS-PID with hybrid algorithms
2561 -- 2584Dimitrios Papathanasiou, Kostas Kolomvatsos. Data management and selectivity in collaborative pervasive edge computing
2585 -- 2612Mouna Hadj-Kacem, Nadia Bouassida. Multi-label learning for identifying co-occurring class code smells
2613 -- 2642G. Sri vidhya, R. Nagarajan. A novel bidirectional LSTM model for network intrusion detection in SDN-IoT network
2643 -- 2674Habib Un Nisa, Saif Ur Rehman Khan 0001, Shahid Hussain, Wen-Li Wang. An association rule mining-oriented approach for prioritizing functional requirements
2675 -- 2705Francisco Plana, Andrés Abeliuk, Jorge Pérez 0001. Quickcent: a fast and frugal heuristic for harmonic centrality estimation on scale-free networks
2707 -- 2735Xiaofei Zhao, Kam-yiu Lam, Tei-Wei Kuo. Indexing spatiotemporal trajectory data streams on key-value storage
2737 -- 2783Iure Fé, Tuan Anh Nguyen 0002, Mario Di Mauro, Fabio Postiglione, Alex Ramos, André Soares 0001, Eunmi Choi, Dugki Min, Jae-Woo Lee, Francisco Airton Silva. Energy-aware dynamic response and efficient consolidation strategies for disaster survivability of cloud microservices architecture
2785 -- 2809Jorge F. Herculano, Willians de P. Pereira, Marcelo Guimarães, Reinaldo Cotrim, Alirio Santos de Sá, Flávio Assis 0001, Raimundo A. Macêdo 0001, Sérgio Gorender. MAC approaches to communication efficiency and reliability under dynamic network traffic in wireless body area networks: a review
2811 -- 2849Selcuk Aslan. Back-and-Forth (BaF): a new greedy algorithm for geometric path planning of unmanned aerial vehicles
2851 -- 2873Fahim Niaz, Jian Zhang 0010, Muhammad Khalid, Kashif Naseer Qureshi, Yang Zheng, Muhammad Younas, Naveed Imran. AI enabled: a novel IoT-based fake currency detection using millimeter wave (mmWave) sensor
2875 -- 2896Jiangang Hou, Xin Li, Hongji Xu, Chun Wang, LiZhen Cui, Zhi Liu 0004, Changzhen Hu. Packet header-based reweight-long short term memory (Rew-LSTM) method for encrypted network traffic classification

Volume 106, Issue 7

2079 -- 0Michael Sheng 0001, Taotao Cai, Adnan Mahmood. Special issue on link prediction in complex networks
2081 -- 2106LinLin Ding, Sisi Li, Ji Ma, Mo Li 0004. Multi-example query over ontology-label knowledge graphs
2107 -- 2131Fatimah Faraji, Amir Javadpour, Arun Kumar Sangaiah, Hadi Zavieh. A solution for resource allocation through complex systems in fog computing for the internet of things
2133 -- 2155Andrea Morales-Garzón, Karel Gutiérrez-Batista, María J. Martín-Bautista. Link prediction in food heterogeneous graphs for personalised recipe recommendation based on user interactions and dietary restrictions
2157 -- 2183T. Jaya Lakshmi, S. Durga Bhavani. Link prediction approach to recommender systems
2185 -- 2210Vishnu Kumar, P. Radha Krishna 0001. An effective representation learning model for link prediction in heterogeneous information networks
2211 -- 2237Zhuo Zeng, Chengliang Wang, Fei Ma, Xusheng Li, Xinrun Chen. Incorporating self-attentions into robust spatial-temporal graph representation learning against dynamic graph perturbations
2239 -- 2259Monachary Kammari, S. Durga Bhavani. Citation recommendation using modified HITS algorithm
2261 -- 2291Qiang Hu, Haoquan Qi, Yanzhe Jia, Lianen Qu. A two-phase method to optimize service composition in cloud manufacturing
2293 -- 2319Chen Ding, Guang-Yu Zhu. Improved optimal foraging algorithm for global optimization
2361 -- 2387Haijun Gu, Yingyu Ma, Siqi Wang, Xincheng Chen, Weihua Su. Semantically realizing discovery and composition for RESTful web services
2389 -- 2425Amro Al-Said Ahmad, Lamis F. Al-Qora'n, Ahmad Zayed. Exploring the impact of chaos engineering with various user loads on cloud native applications: an exploratory empirical study
2427 -- 2458Sriramulu Bojjagani, D. R. Denslin Brabin, Kalai Kumar, Neeraj Kumar Sharma 0003, Umamaheswararao Batta. Secure privacy-enhanced fast authentication and key management for IoMT-enabled smart healthcare systems
2459 -- 2488Shuyan Cheng, Peng Li 0011, Ruchuan Wang, He Xu. Differentially private federated learning with non-IID data

Volume 106, Issue 6

1707 -- 1728Mandar Subhash Karyakarte, Aarti Amod Agarkar, Lalit Kulkarni, Milind Patil, Gajanan H. Chavhan, Bipin Sule. Dynamic opportunistic routing protocol for ad-hoc Internet of Vehicles (IoV)
1729 -- 1747Chengcheng Sun, Fanrong Meng, Chenhao Li, Xiaobin Rui, Zhixiao Wang. LGAT: a light graph attention network focusing on message passing for semi-supervised node classification
1749 -- 1775Shuang Wang, Yibing Duan, Yamin Lei, Peng Du, Yamin Wang. Electricity-cost-aware multi-workflow scheduling in heterogeneous cloud
1777 -- 1793Reza Akraminejad, Navid Khaledian, Amin Nazari, Marcus Völp. A multi-objective crow search algorithm for optimizing makespan and costs in scientific cloud workflows (CSAMOMC)
1795 -- 1823Mohammad Ali Monshizadeh Naeen, Hamid Reza Ghaffari, Hossein Monshizadeh Naeen. Cloud data center cost management using virtual machine consolidation with an improved artificial feeding birds algorithm
1825 -- 1843Salman Mokhtarzadeh, Behzad Zamani Dehkordi, Mohammad Mosleh, Ali Barati. Time-sensitive propagation values discount centrality measure
1845 -- 1872Zahoor Ali Khan, Muhammad Awais 0002, Turki Ali Alghamdi, Nadeem Javaid. Employing topology modification strategies in scale-free IoT networks for robustness optimization
1873 -- 1911Tamer E. Fahim, Sherif I. Rabia, Ahmed H. Abd El-Malek, Waheed K. Zahra. Enhancing information freshness in multi-class mobile edge computing systems using a hybrid discipline
1913 -- 1931Zhenyu Xu, Xinxin Zhang, Mingzhi Chen, Li Xu 0002. Influence maximization in mobile social networks based on RWP-CELF
1933 -- 1962Rajesh Kumar Dhanaraj, Anamika Singh, Anand Nayyar. Matyas-Meyer Oseas based device profiling for anomaly detection via deep reinforcement learning (MMODPAD-DRL) in zero trust security network
1963 -- 1986Xin Jiang, Hongbo Liu 0001, Liping Yang, Bo Zhang 0045, Tomas E. Ward, Václav Snásel. Unraveling human social behavior motivations via inverse reinforcement learning-based link prediction
1987 -- 2006Yonghui Lin, Li Xu 0002, Wei Lin, Jiayin Li. Community anomaly detection in attribute networks based on refining context
2007 -- 2031Cen Li, Liping Chen. Optimization for energy-aware design of task scheduling in heterogeneous distributed systems: a meta-heuristic based approach
2033 -- 2058Ezdehar Jawabreh, Adel Taweel. Qos-based web service selection using time-aware collaborative filtering: a literature review
2059 -- 2077Bráulio Henrique O. U. V. Pinto, Horacio A. B. F. de Oliveira. Online RSSI selection strategy for indoor positioning in low-effort training scenarios

Volume 106, Issue 5

1297 -- 1320Malek Yousefi, Seyed Morteza Babamir. A hybrid energy-aware algorithm for virtual machine placement in cloud computing
1321 -- 1334Péter Battyányi. Solving the SAT problem with the string multiset rewriting calculus
1335 -- 1358Tianchi Tong, Qian Dong, Wenying Yuan, Jinsheng Sun. Identifying vital spreaders in complex networks based on the interpretative structure model and improved Kshell
1359 -- 1393Yuan-Ko Huang, Chien-Pang Lee. Efficient processing of all neighboring object group queries with budget range constraint in road networks
1395 -- 1429Weida Song, Shanxin Zhang, Wenlong Ge, Wei Wang 0285. An improved indicator-based two-archive algorithm for many-objective optimization problems
1431 -- 1449Jian Wan 0002, Luc Jaulin. Reducing the wrapping effect of set computation via Delaunay triangulation for guaranteed state estimation of nonlinear discrete-time systems
1451 -- 1473Suguna Paramasivam, R. Leela Velusamy, J. V. Nishaanth. Categorical learning for automated network traffic categorization for future generation networks in SDN
1475 -- 1517Lei Chen, Linyun Ma, Lvjie Li. Enhancing sine cosine algorithm based on social learning and elite opposition-based learning
1519 -- 1555Ali Riahi, Abdorreza Savadi, Mahmoud Naghibzadeh. Many-BSP: an analytical performance model for CUDA kernels
1557 -- 1583Xiu Susie Fang, Xianzhi Wang 0001, Quan Z. Sheng, Lina Yao 0001. Generalizing truth discovery by incorporating multi-truth features
1585 -- 1609Chinmaya Kumar Swain, Ravi Shankar, Aryabartta Sahu. Edge data distribution as a network Steiner tree estimation in edge computing
1611 -- 1632Ekin Ekinci. A comparative study of LSTM-ED architectures in forecasting day-ahead solar photovoltaic energy using Weather Data
1633 -- 1657Shaifali P. Malukani, C. K. Bhensdadia. Preference based multi-issue negotiation algorithm (PMINA) for fog resource allocation
1659 -- 1679Jiuyun Xu, Yinyue Jiang, Hanfei Fan, Qiqi Wang 0012. SVFLDetector: a decentralized client detection method for Byzantine problem in vertical federated learning
1681 -- 1705Kangning Yin, Zhen Ding, Zhihua Dong, Xinhui Ji, Zhipei Wang, Dongsheng Chen, Ye Li, Guangqiang Yin, Zhiguo Wang. Person re-identification method based on fine-grained feature fusion and self-attention mechanism

Volume 106, Issue 4

1047 -- 0Rajiv Ranjan 0001, Dan Chen 0001, Prem Prakash Jayaraman. Adaptive machine learning in the IoT-edge-cloud continuum
1049 -- 0Rajiv Ranjan 0001, Dan Chen, Prem Prakash Jayaraman. Correction to: Adaptive machine learning in the IoT-edge-cloud continuum
1051 -- 1080Milad Anoushee, Mehdi Fartash, Javad Akbari Torkestani. An intelligent resource management method in SDN based fog computing using reinforcement learning
1081 -- 1097Yuanzhang Li, Tianchi Sha, Thar Baker, Xiao Yu, Zhiwei Shi, Sikang Hu. Adaptive vertical federated learning via feature map transferring in mobile edge computing
1099 -- 1119Hamid Reza Ghaffari, Farzaneh Rafeie. Reconstructing the training data set based on reducing boundary complexity
1121 -- 1138Ruyi Xu, Jiaxu Han, Jingying Chen. Ordinal information based facial expression intensity estimation for emotional interaction: a novel semi-supervised deep learning approach
1139 -- 1150Ming Cheng, Yunbing Yan, Yang Han, Hongjun Lei, Chao Deng. Adaptive machine learning algorithm for human target detection in IoT environment
1151 -- 1175Shilpi Mittal, Rajan Kumar Dudeja, Rasmeet Singh Bali, Gagangeet Singh Aujla. A distributed task orchestration scheme in collaborative vehicular cloud edge networks
1177 -- 1192Prateek Chhikara, Rajkumar Tekchandani, Neeraj Kumar 0001. Adaptive federated learning scheme for recognition of malicious attacks in an IoT network
1193 -- 1225Sahil 0001, Sandeep Kumar Sood, Victor I. Chang 0001. Fog-Cloud-IoT centric collaborative framework for machine learning-based situation-aware traffic management in urban spaces
1227 -- 1248Armin Shoughi, Mohammad Bagher Dowlatshahi, Arefeh Amiri, Marjan Kuchaki Rafsanjani, Ranbir Singh Batth. Automatic ECG classification using discrete wavelet transform and one-dimensional convolutional neural network
1249 -- 1250Boualem Benatallah, Hakim Hacid, Eleanna Kafeza, Fabio Martinelli, Athman Bouguettaya. ICSOC 2020 special issue on service-oriented computing
1251 -- 1272Andreas Metzger, Clément Quinton, Zoltán Ádám Mann, Luciano Baresi, Klaus Pohl. Realizing self-adaptive systems via online reinforcement learning and feature-model-guided exploration
1273 -- 1295Gaith Rjoub, Omar Abdel Wahab 0001, Jamal Bentahar, Ahmed Saleh Bataineh. Trust-driven reinforcement selection strategy for federated learning on IoT devices

Volume 106, Issue 3

651 -- 712Faten Mrabet, Walid Karamti, Adel Mahfoudhi. Scheduling analysis and correction for dependent real-time tasks upon heterogeneous multiprocessor architectures
713 -- 739Chuandong Qin, Yu Cao. 1-D CNNs with lock-free asynchronous adaptive stochastic gradient descent algorithm for classification of astronomical spectra
741 -- 758Mingxue Liao, Pin Lv. On the average time complexity of computation with random partition
759 -- 787Gopinathan Rajeswari, R. Arthi, Krishnan Murugan. Nature-inspired donkey and smuggler algorithm for optimal data gathering in partitioned wireless sensor networks for restoring network connectivity
789 -- 819Ting Lyu, Jianwei An, Meng Li, Feifei Liu, Haitao Xu 0001. UAV-assisted wireless charging and data processing of power IoT devices
821 -- 864Edwin Montes-Orozco, Román Anselmo Mora Gutiérrez, Sergio Gerardo de-los-Cobos-Silva, Eric Alfredo Rincón García, Miguel Angel Gutiérrez-Ándrade, Pedro Lara Velázquez. Quantifying influential nodes in complex networks using optimization and particle dynamics: a comparative study
865 -- 887Hui Du, Cuntao Ma, Depeng Lu, Jingrui Liu. HHSE: heterogeneous graph neural network via higher-order semantic enhancement
889 -- 913Alejandro Pérez-Vereda, Carlos Canal, Ramón Hervás. Distributed mobile CEP for collaborative social computing
915 -- 937Xiaochuan Sun, Qi Chen, Mingxiang Hao, Yingqi Li, Bo Sun. Mconvkgc: a novel multi-channel convolutional model for knowledge graph completion
939 -- 960Hui Xie, Jun Zheng 0007, Zhengyuan Zhang, Shengjun Wei, Changzhen Hu. TEDA: a trusted execution environment-and-blockchain-based data protection architecture for Internet of Things
961 -- 979Ahmadi Hasan, Ahmad Kamal. Community detection of weighted complex networks via transitive closure
981 -- 1012Guruprasad Kapilesh, Sridhar Dhanush, Venkatesan Poovazhaki Gokula Kannan, Viswasam Mary Anita Rajam. A priority aware local mutual exclusion algorithm for flying ad hoc networks
1013 -- 1045Ehsan Heidari. A novel energy-aware method for clustering and routing in IoT based on whale optimization algorithm & Harris Hawks optimization

Volume 106, Issue 2

295 -- 325Xin Xu, Tao Ye, Jieying Gao, Dongxiao Chu. Generalized hurdle count data models based on interpretable machine learning with an application to health care demand
327 -- 351Chencheng Fan, Zhixiao Wang, Jian Zhang, Jiayu Zhao, Xiaobin Rui. Influence maximization in social networks based on discrete harris hawks optimization algorithm
353 -- 370Kalaichelvi Nallusamy, K. S. Easwarakumar. PERMDEC: community deception in weighted networks using permanence
371 -- 403Seyed Danial Alizadeh Javaheri, Reza Ghaemi, Hossein Monshizadeh Naeen. An autonomous architecture based on reinforcement deep neural network for resource allocation in cloud computing
405 -- 447Prity Rani, Rohit Kumar Sachan, Sonal Kukreja. A systematic study on blockchain technology in education: initiatives, products, applications, benefits, challenges and research direction
449 -- 473Asma Bellili, Nadjia Kara. A graphical deep learning technique-based VNF dependencies for multi resource requirements prediction in virtualized environments
475 -- 494Quintino Francesco Lotito, Federico Musciotto, Federico Battiston, Alberto Montresor. Exact and sampling methods for mining higher-order motifs in large hypergraphs
495 -- 519Iman Morovatian, Alireza Basiri, Samira Rezaei. RUCIB: a novel rule-based classifier based on BRADO algorithm
521 -- 555Min Li, Shuming Zhou, Dajin Wang, Gaolin Chen. Missing link prediction using path and community information
557 -- 577Subhash Sagar, Adnan Mahmood, Quan Z. Sheng, Munazza Zaib, Farhan Sufyan. Can we quantify trust? Towards a trust-based resilient SIoT network
579 -- 606Haoyu Wang, Jianwei An. Dynamic game based task offloading and resource pricing in LEO-multi-access edge computing
607 -- 625Abdulqader M. Almars, Khalid M. Alharbi. Corporate social responsibility disclosure prediction using LSTM neural network
627 -- 649Weidong Li, Chunbo Shi, Yongbo Yu, Zhe Wang. A novel optimization approach to topology checking of pipeline vector data in browser side

Volume 106, Issue 12

3837 -- 3878Ragi Krishnan, Selvam Durairaj. Reliability and performance of resource efficiency in dynamic optimization scheduling using multi-agent microservice cloud-fog on IoT applications
3879 -- 3903David Rodríguez Torrado, Ian Yang, José M. del Álamo, Norman Sadeh 0001. Large language models: a new approach for privacy policy analysis at scale
3905 -- 3944Tassawar Ali, Hikmat Ullah Khan, Fawaz Khaled Alarfaj, Mohammed Alreshoodi. Hybrid deep learning and evolutionary algorithms for accurate cloud workload prediction
3945 -- 3965Santiago Mejía-Dugand, José Aguilar 0001. A demand forecasting system of product categories defined by their time series using a hybrid approach of ensemble learning with feature engineering
3967 -- 3986Hyejin Cha, In Kee Kim, Taeseok Kim. Using a random forest to predict quantized reuse distance in an SSD write buffer
3987 -- 4014Mandeep Kumar, Gagandeep Kaur, Prashant Singh Rana. Robust evaluation of GPU compute instances for HPC and AI in the cloud: a TOPSIS approach with sensitivity, bootstrapping, and non-parametric analysis
4015 -- 4038Yingze Liu, Yuanbo Guo, Rajiv Ranjan 0001, Dan Chen 0001. Optimization of mitigation deployment using deep reinforcement learning over an enhanced ATT &CK
4039 -- 4056Shalini Sharma, Bhupendra Kumar Pathak, Rajiv Kumar 0001. Multi-objective service composition optimization problem in IoT for agriculture 4.0
4057 -- 4082J. Angela Jennifa Sujana, R. Venitta Raj, V. K. Raja Priya. Fog intelligence for energy efficient management in smart street lamps
4083 -- 4107Divyans Mahansaria, Uttam Kumar Roy. Contextual authentication of users and devices using machine learning
4109 -- 4130Syed Ali Haider, Junaid Ahmed Zubairi, Sahar Idwan. Mapping and just-in-time traffic congestion mitigation for emergency vehicles in smart cities
4131 -- 4165M. Prithi, K. Tamizharasi. Facial recognition and classification for customer information systems: a feature fusion deep learning approach with FFDMLC algorithm
4167 -- 4192Faris A. Almalki, Marios C. Angelides. A synthesis of machine learning and internet of things in developing autonomous fleets of heterogeneous unmanned aerial vehicles for enhancing the regenerative farming cycle
4193 -- 4207Ashutosh Kumar, Garima Verma. Securing cloud access with enhanced attribute-based cryptography
4209 -- 4229Feng Wu, Hongwei Lv, Tongrang Fan, Wenbin Zhao, Jiaqi Wang. A data reuse strategy based on deep learning for high dimensional data's pattern and instance similarity
4231 -- 4248Xiaofeng Weng, Jinghua Zhao 0001, Chenxi Jiang, Yiying Ji. Research on sentiment classification of futures predictive texts based on BERT
4249 -- 0Raseena M. Haris, Mahmoud Barhamgi, Armstrong Nhlabatsi, Khaled M. Khan. Correction to: Optimizing pre‑copy live virtual machine migration in cloud computing using machine learning‑based prediction model

Volume 106, Issue 11

3387 -- 0Jacopo Soldani, George A. Papadopoulos, Florian Rademacher. Service-oriented and cloud computing
3389 -- 3418Akif Quddus Khan, Mihhail Matskin, Radu Prodan, Christoph Bussler, Dumitru Roman, Ahmet Soylu. Cloud storage tier optimization through storage object classification
3419 -- 3445Luís Cruz-Filipe, Sofia Kostopoulou, Fabrizio Montesi, Jonas Vistrup. μXL: explainable lead generation with microservices and hypothetical answers
3447 -- 3478Brototi Mondal, Avishek Choudhury. Multi-objective cuckoo optimizer for task scheduling to balance workload in cloud computing
3479 -- 3501Antonios Makris, Evangelos Psomakelis, Ioannis Korontanis, Theodoros Theodoropoulos, Ioannis Kontopoulos, Maria Pateraki, Christos Diou, Konstantinos Tserpes. Edge-driven Docker registry: facilitating XR application deployment
3503 -- 3535Lei Zhang, Ke Pang, Jiangtao Xu. High-performance microservice differentiated domain communication technology
3537 -- 3572Sayed Mohsen Hashemi, Amir Sahafi, Amir Masoud Rahmani, Mahdi Bohlouli. A new approach for service activation management in fog computing using Cat Swarm Optimization algorithm
3573 -- 3602Ole Delzer, Richard Hobeck, Ingo Weber, Dominik Kaaser, Michael Sober, Stefan Schulte 0002. Analysis of strategies for scalable transaction creation in blockchains
3603 -- 3625Hector A. de la Fuente-Anaya, Heidy Marisol Marín Castro, Miguel Morales-Sandoval, Jose Juan Garcia Hernandez. Business process discovery as a service with event log privacy and access control over discovered models
3627 -- 3655Asma A. Alhussayen, Kamal Mansur Jambi, Fathy Eassa, Maher Khemakhem. Performance evaluation of an oracle-based interoperability for permissioned blockchain
3657 -- 3690Yi Yue, Shiding Sun, Xuebei Zhang, Ruihua Li, Wencong Yang, Chang Cao, Xiongyan Tang. VNF placement in NFV-enabled networks: considering time-varying workloads and multi-tenancy with a throughput optimization heuristic
3691 -- 3709Kavitha Nagarathinam, K. Ruba Soundar, R. Karthick, J. Kohila. Automatic video captioning using tree hierarchical deep convolutional neural network and ASRNN-bi-directional LSTM
3711 -- 3725Abir El Haj. Community detection in multiplex continous weighted nodes networks using an extension of the stochastic block model
3727 -- 3753Thanasis Moustakas, Athanasios Tziouvaras, Kostas Kolomvatsos. Data and resource aware incremental ML training in support of pervasive applications
3755 -- 3809Mohsen Ghorbian, Mostafa Ghobaei Arani. A survey on the cold start latency approaches in serverless computing: an optimization-based perspective
3811 -- 3836C. Venkata Subbaiah, Govinda Kannayaram. Energy-aware and trust-based cluster head selection in healthcare WBANs with enhanced GWO optimization

Volume 106, Issue 10

3151 -- 3174Agyemang Paul, Yuxuan Wan, Zhefu Wu, Boyu Chen, Shufeng Gong. Deep recommendation with iteration directional adversarial training
3175 -- 3193Anumukonda Naga Seshu Kumar, Rajesh Kumar Yadav, Nallanthighal Srinivasa Raghava. Efficient hashing technique for malicious profile detection at hypervisor environment
3195 -- 3227Nermin Kartli, Erkan Bostanci, Mehmet Serdar Güzel. Heuristic algorithm for an optimal solution of fully fuzzy transportation problem
3229 -- 3254Yishan Chen, Xiansong Luo, Peng Liang, Junxiao Han, Zhonghui Xu. Priority-based DAG task offloading and secondary resource allocation in IoT edge computing environments
3255 -- 3277Chunguang Yue, Jinbao Li, Qichen Wang, Donghuan Zhang. Dynamic attention guider network
3279 -- 3308Gyan Singh, Amit K. Chaturvedi. A cost, time, energy-aware workflow scheduling using adaptive PSO algorithm in a cloud-fog environment
3309 -- 3333Riyanka Jena, Priyanka Singh, Manoranjan Mohanty, Manik Lal Das. PP-PRNU: PRNU-based source camera attribution with privacy-preserving applications
3335 -- 3352Jiahao Li, Tianhan Gao, Qingwei Mi. Phasic parallel-network policy: a deep reinforcement learning framework based on action correlation
3353 -- 3385Vijay Kumar Damera, G. Vanitha, B. Indira, G. Sirisha, Ramesh Vatambeti. Improved snake optimization-based task scheduling in cloud computing

Volume 106, Issue 1

1 -- 28K. Dinesh Kumar, E. Umamaheswari. An efficient proactive VM consolidation technique with improved LSTM network in a cloud environment
29 -- 55Zhen-Fei Wang, Pei-Yao Yuan, Zhong-Ya Cao, Li-Ying Zhang. Feature reduction of unbalanced data classification based on density clustering
57 -- 80Zhenqian Wang, Huigui Rong. An energy-efficient multi-stage alternating optimization scheme for UAV-mounted mobile edge computing networks
81 -- 107Gholam Hossein Abdi, Amir Hossein Refahi Sheikhani, Sohrab Kordrostami, Armin Ghane, Shahram Babaie. A novel selfish node detection based on reputation and game theory in Internet of Things
109 -- 137Navid Khaledian, Keyhan Khamforoosh, Reza Akraminejad, Laith Abualigah, Danial Javaheri. An energy-efficient and deadline-aware workflow scheduling algorithm in the fog and cloud environment
139 -- 161Kushal Kanwar, Sakshi Kaushal, Harish Kumar, Gaurav Gupta, Manju Khari. An efficient method for node ranking in complex networks by hybrid neighbourhood coreness
163 -- 184David Rodriguez, José M. del Álamo, Miguel Cozar, Boni García. ROI: a method for identifying organizations receiving personal data
185 -- 200Fatih Saglam, Mehmet Ali Cengiz. Local resampling for locally weighted Naïve Bayes in imbalanced data
201 -- 239Zari Shamsa, Ali Rezaee, Sahar Adabi, Amir Masoud Rahmani. A decentralized prediction-based workflow load balancing architecture for cloud/fog/IoT environments
241 -- 273Nikos Tsalikidis, Aristeidis Mystakidis, Christos Tjortjis, Paraskevas Koukaras, Dimosthenis Ioannidis. Energy load forecasting: one-step ahead hybrid model utilizing ensembling
275 -- 294W. M. K. S. Ilmini, T. G. I. Fernando. Detection and explanation of apparent personality using deep learning: a short review of current approaches and future directions