1 | -- | 0 | Hui Du, Shihao Ji, Xing Zhang, Dongsheng Ma, Yimeng Zhang, Xiaoli Wang. Mpbs:research on mini-batch partitioning algorithm based on self-organizing map network |
2 | -- | 0 | Ijaz Ahmed, Miswar Akhtar Syed, Muhammad Maaruf, Muhammad Khalid. Distributed computing in multi-agent systems: a survey of decentralized machine learning approaches |
3 | -- | 0 | Jose M. Rivas, Carlos Fernandez-Basso, Roberto Morcillo-Jiménez, Juan Paños-Basterra, M. Dolores Ruiz, María J. Martín-Bautista. Simulafed: an enhanced federated simulated environment for privacy and security in health |
4 | -- | 0 | Ahmad Siavashi, Mahmoud Momtazpour. GPU cluster dynamics: insights from Alibaba's 2023 trace release |
5 | -- | 0 | Ziran Zuo, Yifa Huang, Zenghui Li, Ying Jiang, Chunhong Liu. Mixed contrastive transfer learning for few-shot workload prediction in the cloud |
6 | -- | 0 | Shouliang Lai, Peiling Zhou, Xiyu Yi, Cong Luo. Towards improving context-aware applications using link quality induction and self-calibrated ultra-wide band localization systems |
7 | -- | 0 | Arash Deldari, Alireza Holghinezhad. An IoT-based bag-of-tasks scheduling framework for deadline-sensitive applications in fog-cloud environment |
8 | -- | 0 | Wael Issa, Nour Moustafa, Benjamin P. Turnbull, Nasrin Sohrabi, Zahir Tari, Albert Y. Zomaya. VIFL: vulnerability identification using federated learning in the internet of things systems |
9 | -- | 0 | Jetty Benjamin, Juby Mathew. Enhancing continuous integration predictions: a hybrid LSTM-GRU deep learning framework with evolved DBSO algorithm |
10 | -- | 0 | M. R. Naveen Kumar, B. Annappa, Vishwas Yadav. Efficient Kalman filter based deep learning approaches for workload prediction in cloud and edge environments |
11 | -- | 0 | Alison Silva, Gustavo Callou. Models for availability evaluation of file servers in private clouds |
12 | -- | 0 | Miaolei Deng, Umer Nauman, Yuhong Zhang. NS-OWACC: nature-inspired strategies for optimizing workload allocation in cloud computing |
13 | -- | 0 | Mohammad Amin Zare Soltani, Seyed-Amin Hosseini-Seno, Amir Hossein Mohajerzadeh. Optimizing SDN resource allocation using fuzzy logic and VM mapping technique |
14 | -- | 0 | Ankur Kumar Singhal, Shriansh Manhas, Anurag Singh 0001. Beyond the traditional models: a network reconstruction based model for predicting and analysing individual health status |
15 | -- | 0 | Omid Bushehrian, Amir Moazeni. Deep reinforcement learning-based optimal deployment of IoT machine learning jobs in fog computing architecture |
16 | -- | 0 | Zhong-Min Wang 0001, Hanchen Dong, Xiaomin Jin, Yanping Chen 0006. A profit-aware server deployment approach for edge computing |
17 | -- | 0 | Binazir Ganji, Ali Rezaee, Sahar Adabi, Ali Movaghar 0001. Model verification of real-time and distributed stream processing architecture |
18 | -- | 0 | Zhen Chen, Jia Huang, Shengzheng Liu, Haixia Long. A blockchain and A-DCNN integrated framework for privacy protection and intrusion detection of industrial IoT |
19 | -- | 0 | Cleunio França, Eduardo Tavares. Stochastic modeling of smart street lighting systems: maintenance models assessment |
20 | -- | 0 | Muhammad Mohsin Zafar, Nadeem Javaid, Ifra Shaheen, Nabil Ali Alrajeh, Sheraz Aslam. Enhancing clinical decision support with explainable deep learning framework for C-section forecasting |
21 | -- | 0 | Yuan Yao, Hui Zhan, Ali Noorian, Mehdi Hazratifard. Enhancing POI recommendations on social media: a sequential approach incorporating LSTM and user feedback |
22 | -- | 0 | Long Chen, Guangrui Liu, Jinquan Zhang, Xiaodong Zhang. Scheduling ensemble workflows on hybrid resources in IaaS clouds |
23 | -- | 0 | Lei Zhang, Mingzeng Cao, Jing Li, Chenglin Zhang, Lili He. A novel collaborative privacy protection scheme based on verifiable secret sharing and trust mechanism |
24 | -- | 0 | Nirmalya Mukhopadhyay, Babul P. Tewari. Cost and energy aware migration through dependency analysis of VM components in virtual cloud infrastructure |
25 | -- | 0 | Sicheng Wang, Gang Li, Bin He, Bin Cheng, Yulong Ding, Wei Li. LUMF-YOLO: a lightweight object detection network integrating UAV motion features |
26 | -- | 0 | Yan Wan, Yujia Zhai, Can Cui, Dexuan Song. Indoor energy-saving strategy optimization based on deep reinforcement learning and DDPG algorithm |
27 | -- | 0 | Qingmiao Hu, Hongwei Li, Elaheh Nikougoftar. Mitigating cold start problem in serverless computing using predictive pre-warming with machine learning |
28 | -- | 0 | Tariq Emad Ali, Faten Imad Ali, Pavle Dakic, Alwahab Dhulfiqar Zoltán. Trends, prospects, challenges, and security in the healthcare internet of things |
29 | -- | 0 | Khadijeh Nemati, Amir Hosein Refahi Sheikhani, Sohrab Kordrostami, Kamrad Khoshhal Roudposhti. The embedded feature selection method using ANT colony optimization with structured sparsity norms |
30 | -- | 0 | Yuri Assayag, Eduardo Souto, Raimundo S. Barreto, Moises Carvalho, Richard Werner Nelem Pazzi, Horacio A. B. F. de Oliveira. Efficient exploration of indoor localization using genetic algorithm and signal propagation model |
31 | -- | 0 | Zhijing Liu. Optimized cooperative data transmission in two-tier NB-IoT networks |
32 | -- | 0 | Hui Xie, Teng He, Shengjun Wei, Changzhen Hu. Blockchain-based entity access control scheme for ubiquitous UAV swarm tasks |
33 | -- | 0 | Fatemeh Yousefinejad, Saeed Jalili. 3 formalism |
34 | -- | 0 | Mehdi Ghorbani, Navid Khaledian, Setareh Moazzami. ALBLA: an adaptive load balancing approach in edge-cloud networks utilizing learning automata |
35 | -- | 0 | Issa Qiqieh, Jafar Ahmad Abed Alzubi, Omar A. Alzubi. DNA cryptography based security framework for health-cloud data |
36 | -- | 0 | Junjie Lin, Xiaogang Wang, Mingrui Chang, Zhiwei Yin, Liuhong Zhang. A cosine similarity-based maximal clique point cloud registration algorithm |
37 | -- | 0 | Blessa Binolin Pepsi M, Senthil Kumar N, S. Jeyashree, M. Subitcha. IoT based human activity recognition on drifted data stream using arbitrary width convolution neural network |
38 | -- | 0 | Hao Li, Zhaoning Tian, Xiaohui Li, Peyman Arebi. Identifying effective nodes in term of the influence maximization on the social IoT networks using deep learning-based node embedding |
39 | -- | 0 | Ying Jiang, Yifa Huang, Zenghui Li, Ziran Zuo, Chunhong Liu. TimesLap: Mutability workload sequence prediction based on Laplacian Kernel in the cloud |
40 | -- | 0 | Abhinav Khanna, Gandikota Anjali, Nilesh Kumar Verma, Jairam Naik Khetavath. A GRL-aided federated graph reinforcement learning approach for enhanced file caching in mobile edge computing |
41 | -- | 0 | Habib Larian, Faramarz Safi Esfahani. InTec: integrated things-edge computing: a framework for distributing machine learning pipelines in edge AI systems |
42 | -- | 0 | Mohammad Azad, Tasnemul Hasan Nehal, Mikhail Moshkov. A novel ensemble learning method using majority based voting of multiple selective decision trees |
43 | -- | 0 | Somayeh Rahmani, Vahid Khajehvand, Mohsen Torabian. SPP: stochastic process-based placement for VM consolidation in cloud environments |
44 | -- | 0 | Shuhai Jiang, Xunan Cao, Cun Li, Kangqian Zhou, Ming Hu. Courier information recognition based on an improved YOLOv8 visual servoing system |
45 | -- | 0 | Qiao Zhou, Xingpeng Lin, Li Xu, Yan Sun. Bi-directional temporal graph attention networks for rumor detection in online social networks |
46 | -- | 0 | Min Li, Zhiying Tu, Hanchuan Xu, Xiaofei Xu, Zhongjie Wang 0003. Towards multi-stakeholder value/quality conflict detection, measurement and resolution in composite services |
47 | -- | 0 | Akram Aslani, Mostafa Ghobaei Arani. Machine learning inference serving models in serverless computing: a survey |
48 | -- | 0 | Zhijie Tang, Ke Meng. Efficient multi-scale 3D point cloud registration |
49 | -- | 0 | Hong Zhang, Gang Yang, Hailiang Yu, Zan Zheng. Traffic flow prediction based on the RETGCN model |
50 | -- | 0 | Yan Du, Teng Wu, Zifeng Dai, Hui Xie, Changzhen Hu, Shengjun Wei. F-yolov7: fast and robust real-time UAV detection |
51 | -- | 0 | Shahla Havas, Sadoon Azizi, Alireza Abdollahpouri. SG-MOACO: a semi-greedy multi-objective ACO method for edge server placement in mobile edge computing |
52 | -- | 0 | Suhaib Kh. Hamed, Mohd Juzaiddin Ab Aziz, Mohd Ridzwan Yaakub. A data augmentation approach based on various GAN models to address class imbalance in fine-grained multimodal fake news datasets |