Abstract is missing.
- Blockchain-based Automated Container Cloud Security Enhancement SystemJiahao Sun, Chengrong Wu, Jiawei Ye. 1-6 [doi]
- An Effective Approach to Cloud Migration for Small and Medium Enterprises (SMEs)Awatef Balobaid, Debatosh Debnath. 7-12 [doi]
- A Dynamic Pricing Model for Virtual Machines in Cloud EnvironmentsPeiyun Zhang, Xuelei Wang, Chenxi Li, Licui Wang, Jiemin Xie. 13-18 [doi]
- Research on Optimization of Block chain Security TestingBin Liu, Tianke Fang, Ying-Ying Fu. 19-22 [doi]
- A Hardware/Software Framework for the Integration of FPGA-based Accelerators into Cloud Computing InfrastructuresFritjof Steinert, Philipp Kreowsky, Eric L. Wisotzky, Christian Unger, Benno Stabernack. 23-28 [doi]
- An Efficient Task Scheduling Algorithm using Total Resource Execution Time Aware Algorithm in Cloud ComputingK. M. S. U. Bandaranayake, K. P. N. Jayasena, B. T. G. S. Kumara. 29-34 [doi]
- Optimization of Compute Costs in Hybrid Clouds with Full ReschedulingSophoan Sok, Christian Plewnia, Sansiri Tanachutiwat, Horst Lichter. 35-40 [doi]
- Cloud Computing Resources Utilization and Cost Optimization for Processing Cloud AssetsNirmal Kumawat, Nikhil Handa, Avinash Kharbanda. 41-48 [doi]
- Smart Network Slices Scheduling in CloudTarek Menouer, Amina Khedimi, Christophe Cérin. 49-54 [doi]
- Cyber Attacks Detection based on Deep Learning for Cloud-Dew Computing in Automotive IoT ApplicationsMohamed Mounir Moussa, Lubna Alazzawi. 55-61 [doi]
- Evaluating Techniques for Practical Cloud-based Network Intrusion DetectionPeter Cocoros, Matthew Sobocinski, Kyle Steiger, Joel Coffman. 62-67 [doi]
- BitemporalDB: A Bitemporal Database in the Cloud for Financial Services DataArt Sedighi, Sujit D'Mello, Gil Isaacs, Doug Jacobson. 68-73 [doi]
- Dual-Level Attention Based on Heterogeneous Graph Convolution Network for Aspect-Based Sentiment ClassificationPeng Yuan, Lei Jiang 0007, Jianxun Liu, Dong Zhou, Pei Li, Yang Gao. 74-77 [doi]
- A Multi-Input CNNs with Attention for Skin Lesion ClassificationJing Wu, Wei Hu, Yonghao Wang, Yuan Wen. 78-83 [doi]
- A New Attack Method for Malicious Nodes in Tangle NetworkFu Chen, Huoyu Jia, Kun Liu, Wenying Tang, Jianming Zhu, Weiyu Guo. 84-87 [doi]
- Reliable SoC Design and Implementation of SHA-3-HMAC Algorithm with Attack ProtectionTao Zhou, Yongxin Zhu 0001, Naifeng Jing, Tianhao Nan, Wanyi Li, Bo Peng. 88-93 [doi]
- The Risk Prediction of Prostate Cancer Based on A Improved Hybrid AlgorithmMingqi Li, Xiaoyang Fu, Chenchen Meng. 94-99 [doi]
- Multilevel partition algorithm based on weighted label propagationGeng Zhang, Xinjie Gong, Yanan Wang, Yang Wang, Hao Jiang. 100-105 [doi]
- A Fast JPEG Image Compression Algorithm Based on DCTWeidong Xiao, Nianbin Wan, Alan Hong, Xiaoyan Chen. 106-110 [doi]
- Research on Key Energy-Saving Technologies in Green Data CentersXiaolei Chang, Shu Yang, Yong Jiang, Xiaonan Xie, Xiaolin Tang. 111-115 [doi]
- A Study of Pre-trained Language Models in Natural Language ProcessingJiajia Duan, Hui Zhao 0002, Qian Zhou, Meikang Qiu, Meiqin Liu. 116-121 [doi]
- An Outdoor Installation Protection Plan Based On Ring Network And Reliability ResearchGeng Zhang, Wang Donghui, Wei Liu, Wang Song. 122-127 [doi]
- A Review on the Study on MQTT Security ChallengeFu Chen, Yujia Huo, Jianming Zhu, Dan Fan. 128-133 [doi]
- Fine-grained emoji sentiment analysis based on attributes of Twitter usersXiaoyu Sun, Huakang Li, Guozi Sun, Ming Zhu. 134-139 [doi]
- Modeling and Analysis of Dependencies between Microservices in DevSecOpsJason McZara, Subash Kafle, Daniel Shin. 140-147 [doi]
- Modeling Attack, Defense and Threat Trees and the Cyber Kill Chain, ATT&CK and STRIDE Frameworks as Blackboard Architecture NetworksJeremy Straub. 148-153 [doi]
- Bring Your Own Device (BYOD) Based Flipped Classroom in Primary SchoolHua Feng, Wei Hu, Jing Wu. 154-158 [doi]
- Harmonic Analysis of Power Grid Based on FFT AlgorithmHan Deng, Yulian Gao, Xuhui Chen, Yazhen Zhang, Qiaohong Wu, Hui Zhao. 161-164 [doi]
- A Dynamic Scaling Scheme of Cloud-based DNN Training ClustersSeungmin Oh, Kyeonglok Kim, Euiseong Seo. 165-168 [doi]
- Reinforcement-Learning Based Radio Resources Allocation in Licensed Assisted AccessChiapin Wang, Yu-Chia Liu, Han-Chi Gao, Tsung-Yi Fan Chiang. 169-174 [doi]
- Deep Reinforcement Learning based Energy Scheduling for Edge ComputingQinglin Yang, Peng Li. 175-180 [doi]
- Optimized Look-Ahead Offloading Decisions Using Deep Reinforcement Learning for Battery Constrained Mobile IoT DevicesKaiyi Zhang, Nancy Samaan. 181-186 [doi]
- A framework of distribution transformer health early warning system based on EDC-GRU networkWei Liu, Jian Su, Lvying Qin, Yu Huang, Xu-Huai, Qi Liu, Limei Zhou, Yuwei Shang, Xueyang Liu. 187-192 [doi]
- An Automatic and Rapid Knowledge Graph Construction Method of SG-CIM ModelGuidong Wu, Hang Li, Xiaoqi Liao, Yuemeng Li, Yu Huang, Xiang Chen, Qi Liu, Xueyang Liu. 193-198 [doi]
- A new mutual authentication and key agreement protocol in wireless body area networkXiaohe Wu, Jianbo Xu, Weihong Huang, Wei Jian. 199-203 [doi]
- A Collaborative Filtering Method for Web Data Service in Cloud EnvironmentZhechong Wang, Jianbo Xu, Jian Ke, Songyou Xie. 204-208 [doi]