We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 21-40 of 10,000 results
  1. Density estimation-based method to determine sample size for random sample partition of big data

    Random sample partition (RSP) is a newly developed big data representation and management model to deal with big data approximate computation...

    Yulin He, Jiaqi Chen, ... Joshua Zhexue Huang in Frontiers of Computer Science
    Article 16 December 2023
  2. A user requirements-oriented privacy policy self-adaption scheme in cloud computing

    In an ever-changing environment, Software as a Service (SaaS) can rarely protect users’ privacy. Being able to manage and control the privacy is...

    Changbo Ke, Fu **ao, ... Fangxiong **ao in Frontiers of Computer Science
    Article 08 August 2022
  3. NfvInsight: A Framework for Automatically Deploying and Benchmarking VNF Chains

    With the advent of virtualization techniques and software-defined networking (SDN), network function virtualization (NFV) shifts network functions...

    Tian-Ni Xu, Hai-Feng Sun, ... Yun-Gang Bao in Journal of Computer Science and Technology
    Article 31 May 2022
  4. A multipath routing algorithm for satellite networks based on service demand and traffic awareness

    With the reduction in manufacturing and launch costs of low Earth orbit satellites and the advantages of large coverage and high data transmission...

    Ziyang **ng, Hui Qi, ... Ligang Cong in Frontiers of Information Technology & Electronic Engineering
    Article 01 June 2023
  5. Indexing dynamic encrypted database in cloud for efficient secure k-nearest neighbor query

    Secure k -Nearest Neighbor ( k -NN) query aims to find k nearest data of a given query from an encrypted database in a cloud server without revealing...

    **ngxin Li, Youwen Zhu, ... Yushu Zhang in Frontiers of Computer Science
    Article 12 August 2023
  6. Dynamic Resource Management in MEC Powered by Edge Intelligence for Smart City Internet of Things

    The Internet of Things (IoT) has become an infrastructure that makes smart cities possible. is both accurate and efficient. The intelligent...

    Xucheng Wan in Journal of Grid Computing
    Article 13 February 2024
  7. Certificateless broadcast multi-signature for network coding

    Network coding can save wireless network resources and is very fast in comparison with traditional routing. In real application scenarios, network...

    Article 24 September 2022
  8. Nonlinear Instabilities in TCP-RED

    With the growing size and popularity of the Internet, congestion control has emerged as an important problem. Poor management of congestion can...
    Priya Ranjan, Eyad H. Abed, Richard J. La in Complex Dynamics in Communication Networks
    Chapter
  9. Minimizing the cost of periodically replicated systems via model and quantitative analysis

    Geographically replicating objects across multiple data centers improves the performance and reliability of cloud storage systems. Maintaining...

    Chenhao Zhang, Liang Wang, ... Guangjun Qin in Frontiers of Computer Science
    Article 16 December 2023
  10. CJSpector: A Novel Cryptojacking Detection Method Using Hardware Trace and Deep Learning

    With the increasing value of digital cryptocurrency in recent years, the digital cryptocurrency mining industry is becoming prosperous. However, this...

    Qian** Ying, Yulei Yu, ... Changzhen Hu in Journal of Grid Computing
    Article 12 September 2022
  11. Region-adaptive Concept Aggregation for Few-shot Visual Recognition

    Few-shot learning (FSL) aims to learn novel concepts from very limited examples. However, most FSL methods suffer from the issue of lacking...

    Mengya Han, Yibing Zhan, ... Dacheng Tao in Machine Intelligence Research
    Article 02 March 2023
  12. Joint Participant Selection and Learning Optimization for Federated Learning of Multiple Models in Edge Cloud

    To overcome the limitations of long latency and privacy concerns from cloud computing, edge computing along with distributed machine learning such as...

    **nliang Wei, Jiyao Liu, Yu Wang in Journal of Computer Science and Technology
    Article 31 July 2023
  13. A Market-based Framework for Resource Management in Cloud Federation

    A federated cloud is a form of the inter-cloud environment in which cloud service providers cooperate for better scalability and service...

    Faeze Ramezani, Saeid Abrishami, Mehdi Feizi in Journal of Grid Computing
    Article 22 December 2022
  14. Enhancing Service Offloading for Dense Networks Based on Optimal Stop** Theory in Virtual Mobile Edge Computing

    The present and next-generation networks of service offloading present exciting issues. The traditional network optimisation techniques still require...

    Qiang Fu, Tao Yang in Journal of Grid Computing
    Article 24 April 2024
  15. Automation and Orchestration of Zero Trust Architecture: Potential Solutions and Challenges

    Zero trust architecture (ZTA) is a paradigm shift in how we protect data, stay connected and access resources. ZTA is non-perimeter-based defence,...

    Yang Cao, Shiva Raj Pokhrel, ... Gang Li in Machine Intelligence Research
    Article Open access 25 January 2024
  16. Towards real-time ML-based DDoS detection via cost-efficient window-based feature extraction

    Distributed denial of service (DDoS) detection is still an open and challenging problem. In particular, sophisticated attacks, e.g., attacks that...

    Haibin Li, Yi Zhao, ... Qi Li in Science China Information Sciences
    Article 17 April 2023
  17. Approximation Designs for Energy Harvesting Relay Deployment in Wireless Sensor Networks

    Energy harvesting technologies allow wireless devices to be recharged by the surrounding environment, providing wireless sensor networks (WSNs) with...

    Yi Wang, Yi-Xue Liu, ... Chen Tian in Journal of Computer Science and Technology
    Article 30 July 2022
  18. Accelerating DAG-Style Job Execution via Optimizing Resource Pipeline Scheduling

    The volume of information that needs to be processed in big data clusters increases rapidly nowadays. It is critical to execute the data analysis in...

    Yubin Duan, Ning Wang, Jie Wu in Journal of Computer Science and Technology
    Article 30 July 2022
  19. Federated learning-outcome prediction with multi-layer privacy protection

    Learning-outcome prediction (LOP) is a longstanding and critical problem in educational routes. Many studies have contributed to develo** effective...

    Yupei Zhang, Yuxin Li, ... Xuequn Shang in Frontiers of Computer Science
    Article 28 December 2023
  20. Combining graph neural network with deep reinforcement learning for resource allocation in computing force networks

    Fueled by the explosive growth of ultra-low-latency and real-time applications with specific computing and network performance requirements, the...

    Xueying Han, Mingxi **e, ... Huijuan Yao in Frontiers of Information Technology & Electronic Engineering
    Article 01 May 2024
Did you find what you were looking for? Share feedback.