Search
Search Results
-
An empirical study on cross-component dependent changes: A case study on the components of OpenStack
Modern software systems are composed of several loosely coupled components. Typical examples of such systems are plugin-based systems, microservices,...
-
Research on satellite link allocation algorithm for Earth-Moon space information network
With ongoing advancements in space exploration and communication technology, the realization of an Earth-Moon space information network is gradually...
-
An exploratory evaluation of code smell agglomerations
Code smell is a symptom of decisions about the system design or code that may degrade its modularity. For example, they may indicate inheritance...
-
Machine learning-driven performance assessment of network-on-chip architectures
System-on-chip designs for high-performance computing systems widely use network-on-chip (NoC) technology. The critical metrics such as latency,...
-
Systematizing modeler experience (MX) in model-driven engineering success stories
Modeling is often associated with complex and heavy tooling, leading to a negative perception among practitioners. However, alternative paradigms,...
-
Exploring recent advances in random grid visual cryptography algorithms
Visual cryptography scheme is initiated to securely encode a secret image into multiple shares. The secret can be reconstructed by overlaying the...
-
A new integrated steganography scheme for quantum color images
In this paper, we propose a quantum steganography scheme with a color image as the cover image. In order to enhance the security of the embedded...
-
Cost-aware workflow offloading in edge-cloud computing using a genetic algorithm
The edge-cloud computing continuum effectively uses fog and cloud servers to meet the quality of service (QoS) requirements of tasks when edge...
-
An adaptive service deployment algorithm for cloud-edge collaborative system based on speedup weights
In the contemporary landscape of edge computing, the deployment of services with stringent real-time requirements on edge devices is increasingly...
-
iDOCEM
In the business process lifecycle, models can be approached from two perspectives: on the one hand, models are used to create systems in the design...
-
Exploring the potential of Wav2vec 2.0 for speech emotion recognition using classifier combination and attention-based feature fusion
AbstractSelf-supervised learning models, such as Wav2vec 2.0, extract efficient features for speech processing applications including speech emotion...
-
Cost-effective clonal selection and AIS-based load balancing in cloud computing environment
Cloud computing faces challenges in increasing efficiency through task scheduling and load balancing. Various load-balancing methods, including the...
-
Requirements for modelling tools for teaching
Modelling is an important activity in software development and it is essential that students learn the relevant skills. Modelling relies on dedicated...
-
ASDMG: business topic clustering-based architecture smell detection for microservice granularity
Microservices architecture smells can significantly affect the quality of microservices due to poor design decisions, especially the granularity...
-
Hyper star structure fault tolerance of half hypercube
The reliability of interconnection networks ordinarily is measured by all kinds of connectivities. The qualitative and quantitative analysis relies...
-
Natural noise management in collaborative recommender systems over time-related information
Recommender systems are currently a suitable alternative for providing easy and appropriate access to information for users in today’s digital...
-
Centrality-based and similarity-based neighborhood extension in graph neural networks
In recent years, Graph Neural Networks (GNNs) have become a key technique to address various graph-based machine learning tasks. Most of existing...
-
DEKGCI: A double-ended recommendation model for integrating knowledge graph and user–item interaction graph
User–item bipartite graphs and knowledge graphs are frequently employed in recommender systems due to their ability to provide rich information for...
-
Efficient MST-based clustering with leader node selection and outlier edge cutting
The clustering algorithm based on the minimum spanning tree (MST) can identify clusters of different shapes. However, the minimum spanning tree...
-
Analysis of blockchain system based on \(BMAP/PH^{[b]}/1\) queueing model
In this modern era, the security and safety of financial and personal digital data are crucial considerations. Blockchain technology offers a secure...