We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 81-100 of 10,000 results
  1. DMFNet: deep matrix factorization network for image compressed sensing

    Due to its outstanding performance in image processing, deep learning (DL) is successfully utilized in compressed sensing (CS) reconstruction....

    Hengyou Wang, Haocheng Li, **ang Jiang in Multimedia Systems
    Article 26 June 2024
  2. Acnn: arbitrary trace attacks based on leakage area detection

    Deep Learning-based Side-Channel Analysis (DL-SCA) has emerged as a powerful method in the field of side-channel analysis. Current works on DL-SCA...

    Article 26 June 2024
  3. A revolutionary approach to use convolutional spiking neural networks for robust intrusion detection

    In an era dominated by network connectivity, the reliance on robust and secure networks has become paramount. With the advent of 5G and the Internet...

    Yongxing Lin, **aoyan Xu, Hongyun Xu in Cluster Computing
    Article 26 June 2024
  4. A novel real-time object detection method for complex road scenes based on YOLOv7-tiny

    Road object detection is a key technology in intelligent transportation systems, playing a crucial role in ensuring driving safety and enhancing...

    Yunfa Li, Hui Li in Cluster Computing
    Article 26 June 2024
  5. Progressive secret image sharing based on Boolean operations and polynomial interpolations

    With the expansion of network bandwidth and the rise of social networks, image sharing on open networks has become a trend. The ensuing privacy...

    Hao Chen, Lizhi **ong, Ching-Nung Yang in Multimedia Systems
    Article 26 June 2024
  6. Catch fish optimization algorithm: a new human behavior algorithm for solving clustering problems

    This paper is inspired by traditional rural fishing methods and proposes a new metaheuristic optimization algorithm based on human behavior: Catch...

    Heming Jia, Qixian Wen, ... Seyedali Mirjalili in Cluster Computing
    Article 25 June 2024
  7. HOGWO: a fog inspired optimized load balancing approach using hybridized grey wolf algorithm

    A distributed archetype, the concept of fog computing relocates the storage, computation, and services closer to the network’s edge, where the data...

    Debashreet Das, Sayak Sengupta, ... Deepanshu Saini in Cluster Computing
    Article 25 June 2024
  8. Unraveling the code: an in-depth empirical study on the impact of development practices in auxiliary functions implementation

    Auxiliary functions in software systems, often overlooked due to their perceived simplicity, play a crucial role in overall system reliability. This...

    Otávio Lemos, Fábio Silveira, ... Alessandro Garcia in Software Quality Journal
    Article 25 June 2024
  9. Adaptive spatio-temporal graph convolutional network with attention mechanism for mobile edge network traffic prediction

    In the current era of mobile edge networks, a significant challenge lies in overcoming the limitations posed by limited edge storage and...

    Ning Sha, **aochun Wu, ... Chuanhuang Li in Cluster Computing
    Article 25 June 2024
  10. An authentication mechanism based on blockchain for IoT environment

    The Internet of Things (IoT) is a network where physical objects with unique addresses can connect and communicate with each other through the...

    Gholam Reza Zargar, Hamid Barati, Ali Barati in Cluster Computing
    Article 24 June 2024
  11. Attention-guided LiDAR segmentation and odometry using image-to-point cloud saliency transfer

    LiDAR odometry estimation and 3D semantic segmentation are crucial for autonomous driving, which has achieved remarkable advances recently. However,...

    Guanqun Ding, Nevrez İmamoğlu, ... Ryosuke Nakamura in Multimedia Systems
    Article Open access 24 June 2024
  12. A hybrid northern goshawk optimization algorithm based on cluster collaboration

    To address the problems that the northern goshawk optimization algorithm (NGO) has a slow convergence speed and is highly susceptible to fall into...

    Changjun Wu, Qingzhen Li, ... **aohui Song in Cluster Computing
    Article 23 June 2024
  13. A two-way trust routing scheme to improve security in fog computing environment

    Compliance with security requirements in the fog computing environment is known as an important phenomenon in maintaining the quality of service due...

    Jun Wang, Ze Luo, Chenglong Wang in Cluster Computing
    Article 23 June 2024
  14. Unmanned aerial vehicle assisted communication: applications, challenges, and future outlook

    With the advancement of wireless communication technology, the number of wireless network terminals has exploded, and various new business scenarios...

    Yilin Li, Yanxian Bi, ... Peiying Zhang in Cluster Computing
    Article 23 June 2024
  15. Energy-efficient communication-aware VM placement in cloud datacenter using hybrid ACO–GWO

    Virtual machine placement (VMP) is the process of map** virtual machines to physical machines, which is very important for resource utilization in...

    Rashmi Keshri, Deo Prakash Vidyarthi in Cluster Computing
    Article 22 June 2024
  16. A comprehensive survey on DDoS detection, mitigation, and defense strategies in software-defined networks

    Software Defined Networking (SDN) has become increasingly prevalent in cloud computing, Internet of Things (IoT), and various environments to...

    Ankit Kumar Jain, Hariom Shukla, Diksha Goel in Cluster Computing
    Article 22 June 2024
  17. DPHM-Net:de-redundant multi-period hybrid modeling network for long-term series forecasting

    Deep learning models have been widely applied in the field of long-term forecasting has achieved significant success, with the incorporation of...

    Chengdong Zheng, Yuliang Shi, ... Fanyu Kong in World Wide Web
    Article 22 June 2024
  18. A novel hybrid Artificial Gorilla Troops Optimizer with Honey Badger Algorithm for solving cloud scheduling problem

    Cloud computing has revolutionized the way a variety of ubiquitous computing resources are provided to users with ease and on a pay-per-usage basis....

    Abdelazim G. Hussien, Amit Chhabra, ... Adrian Pop in Cluster Computing
    Article Open access 22 June 2024
  19. Designing quantum-secure attribute-based encryption

    In the last couple of decades, Attribute-Based Encryption (ABE) has been a promising encryption technique to realize fine-grained access control over...

    Y. Sreenivasa Rao, Vikas Srivastava, ... Sumit Kumar Debnath in Cluster Computing
    Article 22 June 2024
  20. Generalized Welsch penalty for edge-aware image decomposition

    Edge-aware image decomposition is an essential topic in the field of multimedia signal processing. In this paper, we propose a novel non-convex...

    Yang Yang, Shunli Ji, ... Yongzhao Zhan in Multimedia Systems
    Article 21 June 2024
Did you find what you were looking for? Share feedback.