Skip to main content

and
  1. No Access

    Article

    A tolerance-based memetic algorithm for constrained covering array generation

    The research focus in the field of combinatorial testing has shifted from unconstrained covering array generation (CAG) to constrained covering array generation (CCAG). Most heuristic search algorithms exclude...

    Xu Guo, **aoyu Song, Jian-tao Zhou, Feiyu Wang in Memetic Computing (2023)

  2. No Access

    Chapter and Conference Paper

    A Contextual Information-Augmented Probabilistic Case-Based Reasoning Model for Knowledge Graph Reasoning

    Knowledge Graph Reasoning (KGR) is one effective method to improve incompleteness and sparsity problems, which infers new knowledge based on existing knowledge. Although the probabilistic case-based reasoning ...

    Yuejia Wu, Jian-tao Zhou in Case-Based Reasoning Research and Development (2023)

  3. No Access

    Chapter and Conference Paper

    A Stepwise Path Selection Scheme Based on Multiple QoS Parameters Evaluation in SDN

    Nowadays, the best-effort service can not guarantee the quality of service (QoS) for all kinds of services. QoS routing is an important method to guarantee QoS requirements. It involves path selection for flow...

    Lin Liu, Jian-Tao Zhou, Hai-Feng **ng in Collaborative Computing: Networking, Appli… (2021)

  4. No Access

    Chapter and Conference Paper

    ELVMC: A Predictive Energy-Aware Algorithm for Virtual Machine Consolidation in Cloud Computing

    Virtual machine consolidation (VMC) is a technology that aggregates virtual machines distributed on multiple physical machines into a small number of physical machines to improve resource utilization and energ...

    Da-ming Zhao, Jian-tao Zhou, Shucheng Yu in Algorithms and Architectures for Parallel … (2020)

  5. No Access

    Chapter and Conference Paper

    GRAMI-Based Multi-target Delay Monitoring Node Selection Algorithm in SDN

    Delay is a representation of the link state information in the network. Therefore, the real-time acquisition of the link delay data is the basis for effective network activity. Using the characteristics of SDN...

    Zhi-Qi Wang, Jian-Tao Zhou, Lin Liu in Web Information Systems and Applications (2019)

  6. No Access

    Chapter and Conference Paper

    A Generic Arrival Process Model for Generating Hybrid Cloud Workload

    In cloud computing, the arrival process of user requests is becoming more diversiform with the globalization of users and the popularization of mobile technology. Moreover, the workloads in cloud computing are...

    Chunyan An, Jian-tao Zhou, Zefeng Mou in Computer Supported Cooperative Work and So… (2019)

  7. No Access

    Chapter and Conference Paper

    A Method of Component Discovery in Cloud Migration

    Cloud migration is an important means of software development on the cloud. The identification of reusable components of legacy systems directly determines the quality of cloud migration. The existed clusterin...

    Jian-tao Zhou, Ting Wu, Yan Chen, Jun-feng Zhao in Web Information Systems and Applications (2018)

  8. Article

    Strategies and Methods for Cloud Migration

    Legacy system migration to the cloud brings both great challenges and benefits, so there exist various academic research and industrial applications on legacy system migration to the cloud. By analyzing the re...

    Jun-Feng Zhao, Jian-Tao Zhou in International Journal of Automation and Computing (2014)