We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. Hierarchical multi-granularity classification based on bidirectional knowledge transfer

    Hierarchical multi-granularity classification is the task of classifying objects according to multiple levels or granularities. The class hierarchy...

    Juan Jiang, **gmin Yang, ... Hongbin Zhang in Multimedia Systems
    Article 15 July 2024
  2. Exploiting beam search confidence for energy-efficient speech recognition

    With mobile and embedded devices getting more integrated in our daily lives, the focus is increasingly shifting toward human-friendly interfaces,...

    Dennis Pinto, José-María Arnau, ... Antonio González in The Journal of Supercomputing
    Article Open access 15 July 2024
  3. Retraction Note: Adoption of human metabolic processes as Data Quality Based Models

    Alladoumbaye Ngueilbaye, Hongzhi Wang, ... Daouda Ahmat Mahamat in The Journal of Supercomputing
    Article 15 July 2024
  4. Parallel implementation of discrete cosine transform and its inverse for image compression applications

    This paper presents the graphics processing unit (GPU) implementation of two-dimensional discrete cosine transform (2D DCT) and inverse discrete...

    Debasish Mukherjee in The Journal of Supercomputing
    Article 15 July 2024
  5. Secure query processing for smart grid data using searchable symmetric encryption

    In the last decade, the smart grid has utilized many modern technologies and applications compared with the conventional grid. Cloud computing offers...

    Samia Souror, Mohammed Badawy, Nawal El-Fishawy in The Journal of Supercomputing
    Article Open access 15 July 2024
  6. Lattice-based ring signcryption scheme for smart healthcare management

    Conventional signcryption schemes that depend on discrete logarithm problem, big integer prime factorization, and bilinear pairing are at risk in the...

    Sourav, Rifaqat Ali in Cluster Computing
    Article 15 July 2024
  7. Energy-efficient virtual machine placement in heterogeneous cloud data centers: a clustering-enhanced multi-objective, multi-reward reinforcement learning approach

    Efficient virtual machine (VM) placement is vital for optimizing the performance of cloud data centers. While recent studies have addressed this...

    Arezoo Ghasemi, Amin Keshavarzi in Cluster Computing
    Article 15 July 2024
  8. Conscious points and patterns extraction: a high-performance computing model for knowledge discovery in cognitive IoT

    Incorporating cognition into the design and architecture of the Internet of Things (IoT) has recently been the subject of much research, giving rise...

    Vidyapati Jha, Priyanka Tripathi in The Journal of Supercomputing
    Article 15 July 2024
  9. Information flow control for comparative privacy analyses

    The prevalence of web tracking and its key characteristics have been extensively investigated by the research community by means of large-scale web...

    Zubair Ahmad, Stefano Calzavara, ... Ben Stock in International Journal of Information Security
    Article 14 July 2024
  10. A quantitative analysis of the security of PoW-based blockchains

    This study analyzes the security implications of Proof-of-Work blockchains with respect to the stale block rate and the lack of a block verification...

    Maher Alharby, Ali Alssaiari, ... Aad van Moorsel in Cluster Computing
    Article Open access 14 July 2024
  11. An empirical study on cross-component dependent changes: A case study on the components of OpenStack

    Modern software systems are composed of several loosely coupled components. Typical examples of such systems are plugin-based systems, microservices,...

    Ali Arabat, Mohammed Sayagh in Empirical Software Engineering
    Article 13 July 2024
  12. A network intrusion detection system based on deep learning in the IoT

    As industrial and everyday devices become increasingly interconnected, the data volume within the Internet of Things (IoT) has experienced a...

    **ao Wang, Lie Dai, Guang Yang in The Journal of Supercomputing
    Article 13 July 2024
  13. Intelligent and efficient task caching for mobile edge computing

    Given the problems with a centralized cloud and the emergence of ultra-low latency applications, and the needs of the Internet of Things (IoT), it...

    Amir Moradi, Fatemeh Rezaei in Cluster Computing
    Article 13 July 2024
  14. A fuzzy ontology-based context-aware encryption approach in IoT through device and information classification

    IoT devices produce a vast amount of data ranging from personal to sensitive information. Usually, these devices remain connected to the internet so...

    Furkh Zeshan, Zaineb dar, ... Tariq Malik in The Journal of Supercomputing
    Article 13 July 2024
  15. Trust attack prevention based on Spark-blockchain in social IoT: a survey

    Integrating the Internet of Things (IoT) with Social Networks (SN) has given rise to a new paradigm called Social IoT, which allows users and objects...

    Mariam Masmoudi, Ikram Amous, ... Florence Sèdes in International Journal of Information Security
    Article 13 July 2024
  16. Hierarchical adaptive evolution framework for privacy-preserving data publishing

    The growing need for data publication and the escalating concerns regarding data privacy have led to a surge in interest in Privacy-Preserving Data...

    Mingshan You, Yong-Feng Ge, ... Georgios Kambourakis in World Wide Web
    Article Open access 12 July 2024
  17. Research on satellite link allocation algorithm for Earth-Moon space information network

    With ongoing advancements in space exploration and communication technology, the realization of an Earth-Moon space information network is gradually...

    Weiwu Ren, Yuan Gao, ... Hongbing Chen in The Journal of Supercomputing
    Article 12 July 2024
  18. M2AST:MLP-mixer-based adaptive spatial-temporal graph learning for human motion prediction

    Human motion prediction is a challenging task in human-centric computer vision, involving forecasting future poses based on historical sequences....

    Junyi Tang, Simin An, ... ** Chen in Multimedia Systems
    Article 12 July 2024
  19. An exploratory evaluation of code smell agglomerations

    Code smell is a symptom of decisions about the system design or code that may degrade its modularity. For example, they may indicate inheritance...

    Amanda Santana, Eduardo Figueiredo, ... Alessandro Garcia in Software Quality Journal
    Article 11 July 2024
Did you find what you were looking for? Share feedback.