We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. Federated learning for digital healthcare: concepts, applications, frameworks, and challenges

    Various hospitals have adopted digital technologies in the healthcare sector for various healthcare-related applications. Due to the effect of the...

    D. N. Sachin, B. Annappa, Sateesh Ambesange in Computing
    Article 10 July 2024
  2. Exploiting recurrent graph neural networks for suffix prediction in predictive monitoring

    Predictive monitoring is a subfield of process mining that aims to predict how a running case will unfold in the future. One of its main challenges...

    Efrén Rama-Maneiro, Juan C. Vidal, ... Pablo Monteagudo-Lago in Computing
    Article 09 July 2024
  3. Deep learning-based classification and application test of multiple crop leaf diseases using transfer learning and the attention mechanism

    Crop diseases are among the major natural disasters in agricultural production that seriously restrict the growth and development of crops,...

    Yifu Zhang, Qian Sun, ... Huini Zhou in Computing
    Article 08 July 2024
  4. Optimizing pre-copy live virtual machine migration in cloud computing using machine learning-based prediction model

    One of the preconditions for efficient cloud computing services is the continuous availability of services to clients. However, there are various...

    Raseena M. Haris, Mahmoud Barhamgi, ... Khaled M. Khan in Computing
    Article Open access 08 July 2024
  5. A clarity and fairness aware framework for selecting workers in competitive crowdsourcing tasks

    Crowdsourcing is a powerful technique for accomplishing tasks that are difficult for machines but easy for humans. However, ensuring the quality of...

    Seyyed Javad Bozorg Zadeh Razavi, Haleh Amintoosi, Mohammad Allahbakhsh in Computing
    Article 06 July 2024
  6. A new approach for service activation management in fog computing using Cat Swarm Optimization algorithm

    Today, with the increasing expansion of IoT devices and the growing number of user requests, processing their demands in computational environments...

    Sayed Mohsen Hashemi, Amir Sahafi, ... Mahdi Bohlouli in Computing
    Article 04 July 2024
  7. Enhancing computation reuse efficiency in ICN-based edge computing by modifying content store table structure

    In edge computing, repetitive computations are a common occurrence. However, the traditional TCP/IP architecture used in edge computing fails to...

    Atiyeh Javaheri, Ali Bohlooli, Kamal Jamshidi in Computing
    Article 03 July 2024
  8. Smart contracts auditing and multi-classification using machine learning algorithms: an efficient vulnerability detection in ethereum blockchain

    The adoption of Smart Contracts has revolutionized industries like DeFi and supply chain management, streamlining processes and enhancing...

    Samia El Haddouti, Mohammed Khaldoune, ... Mohamed Dafir Ech-Cherif El Kettani in Computing
    Article 03 July 2024
  9. Enhancing virtual machine placement efficiency in cloud data centers: a hybrid approach using multi-objective reinforcement learning and clustering strategies

    Deploying virtual machines poses a significant challenge for cloud data centers, requiring careful consideration of various objectives such as...

    Arezoo Ghasemi, Abolfazl Toroghi Haghighat, Amin Keshavarzi in Computing
    Article 02 July 2024
  10. Modeling end-to-end delays in TSCH wireless sensor networks using queuing theory and combinatorics

    Wireless communication offers significant advantages in terms of flexibility, coverage and maintenance compared to wired solutions and is being...

    Yevhenii Shudrenko, Andreas Timm-Giel in Computing
    Article Open access 02 July 2024
  11. Packet header-based reweight-long short term memory (Rew-LSTM) method for encrypted network traffic classification

    With the development of Internet technology, cyberspace security has become a research hotspot. Network traffic classification is closely related to...

    Jiangang Hou, **n Li, ... Changzhen Hu in Computing
    Article 02 July 2024
  12. REDQT: a method for automated mobile application GUI testing based on deep reinforcement learning algorithms

    As mobile applications become increasingly prevalent in daily life, the demand for their functionality and reliability continues to grow. Traditional...

    Fengyu Wang, Chuanqi Tao, Jerry Gao in Service Oriented Computing and Applications
    Article 01 July 2024
  13. Back-and-Forth (BaF): a new greedy algorithm for geometric path planning of unmanned aerial vehicles

    The autonomous task success of an unmanned aerial vehiclel (UAV) or its military specialization called the unmanned combat aerial vehicle (UCAV) has...

    Selcuk Aslan in Computing
    Article Open access 01 July 2024
  14. AI enabled: a novel IoT-based fake currency detection using millimeter wave (mmWave) sensor

    In recent years, the significance of millimeter wave sensors has achieved a paramount role, especially in the non-invasive and ubiquitous analysis of...

    Fahim Niaz, Jian Zhang, ... Naveed Imran in Computing
    Article 27 June 2024
  15. Residual attention UNet GAN Model for enhancing the intelligent agents in retinal image analysis

    A unique method for improving the intelligent agents in retinal image processing is the proposed RAUGAN (Residual Attention UNet GAN) model....

    Anuj Kumar Pandey, Satya Prakash Singh, Chinmay Chakraborty in Service Oriented Computing and Applications
    Article 25 June 2024
  16. Edge-driven Docker registry: facilitating XR application deployment

    In recent years, containerization is becoming more and more popular for deploying applications and services and it has significantly contributed to...

    Antonios Makris, Evangelos Psomakelis, ... Konstantinos Tserpes in Computing
    Article 24 June 2024
  17. Inductive reasoning for significant concept and pattern discovery in cognitive IoT

    Recent research on the Internet of Things (IoT) focuses on the insertion of cognition into its system architecture and design, which introduces a new...

    Vidyapati Jha, Priyanka Tripathi in Service Oriented Computing and Applications
    Article 20 June 2024
  18. MAC approaches to communication efficiency and reliability under dynamic network traffic in wireless body area networks: a review

    Wireless Body Area Networks (WBANs) are wireless sensor networks that monitor the physiological and contextual data of the human body. Nodes in a...

    Jorge Herculano, Willians Pereira, ... Sérgio Gorender in Computing
    Article Open access 20 June 2024
  19. Energy-aware dynamic response and efficient consolidation strategies for disaster survivability of cloud microservices architecture

    Computer system resilience refers to the ability of a computer system to continue functioning even in the face of unexpected events or disruptions....

    Iure Fé, Tuan Anh Nguyen, ... Francisco Airton Silva in Computing
    Article 17 June 2024
  20. Business process discovery as a service with event log privacy and access control over discovered models

    The information systems supporting business processes of organizations generate and collect a large number of records in event logs that are...

    Hector A. de la Fuente-Anaya, Heidy M. Marin-Castro, ... Jose Juan Garcia-Hernandez in Computing
    Article 15 June 2024
Did you find what you were looking for? Share feedback.