We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. A quantitative analysis of the security of PoW-based blockchains

    This study analyzes the security implications of Proof-of-Work blockchains with respect to the stale block rate and the lack of a block verification...

    Maher Alharby, Ali Alssaiari, ... Aad van Moorsel in Cluster Computing
    Article Open access 14 July 2024
  2. A network intrusion detection system based on deep learning in the IoT

    As industrial and everyday devices become increasingly interconnected, the data volume within the Internet of Things (IoT) has experienced a...

    **ao Wang, Lie Dai, Guang Yang in The Journal of Supercomputing
    Article 13 July 2024
  3. Intelligent and efficient task caching for mobile edge computing

    Given the problems with a centralized cloud and the emergence of ultra-low latency applications, and the needs of the Internet of Things (IoT), it...

    Amir Moradi, Fatemeh Rezaei in Cluster Computing
    Article 13 July 2024
  4. A fuzzy ontology-based context-aware encryption approach in IoT through device and information classification

    IoT devices produce a vast amount of data ranging from personal to sensitive information. Usually, these devices remain connected to the internet so...

    Furkh Zeshan, Zaineb dar, ... Tariq Malik in The Journal of Supercomputing
    Article 13 July 2024
  5. Research on satellite link allocation algorithm for Earth-Moon space information network

    With ongoing advancements in space exploration and communication technology, the realization of an Earth-Moon space information network is gradually...

    Weiwu Ren, Yuan Gao, ... Hongbing Chen in The Journal of Supercomputing
    Article 12 July 2024
  6. Machine learning-driven performance assessment of network-on-chip architectures

    System-on-chip designs for high-performance computing systems widely use network-on-chip (NoC) technology. The critical metrics such as latency,...

    Ramapati Patra, Prasenjit Maji, ... Hemanta Kumar Mondal in The Journal of Supercomputing
    Article 11 July 2024
  7. A new integrated steganography scheme for quantum color images

    In this paper, we propose a quantum steganography scheme with a color image as the cover image. In order to enhance the security of the embedded...

    Yumin Dong, Rui Yan in The Journal of Supercomputing
    Article 10 July 2024
  8. Exploring recent advances in random grid visual cryptography algorithms

    Visual cryptography scheme is initiated to securely encode a secret image into multiple shares. The secret can be reconstructed by overlaying the...

    Neetha Francis, A. Lisha, Thomas Monoth in The Journal of Supercomputing
    Article 10 July 2024
  9. Cost-aware workflow offloading in edge-cloud computing using a genetic algorithm

    The edge-cloud computing continuum effectively uses fog and cloud servers to meet the quality of service (QoS) requirements of tasks when edge...

    Somayeh Abdi, Mohammad Ashjaei, Saad Mubeen in The Journal of Supercomputing
    Article Open access 10 July 2024
  10. A principal label space transformation and ridge regression-based hybrid gorilla troops optimization and jellyfish search algorithm for multi-label classification

    Classification as an essential part of Machine Learning and Data Mining has significant roles in engineering, medicine, agriculture, military, etc....

    Seyed Hossein Seyed Ebrahimi, Kambiz Majidzadeh, Farhad Soleimanian Gharehchopogh in Cluster Computing
    Article 09 July 2024
  11. An adaptive service deployment algorithm for cloud-edge collaborative system based on speedup weights

    In the contemporary landscape of edge computing, the deployment of services with stringent real-time requirements on edge devices is increasingly...

    Zhichao Hu, Sheng Chen, ... Gangyong Jia in The Journal of Supercomputing
    Article 09 July 2024
  12. Exploring the potential of Wav2vec 2.0 for speech emotion recognition using classifier combination and attention-based feature fusion

    Abstract

    Self-supervised learning models, such as Wav2vec 2.0, extract efficient features for speech processing applications including speech emotion...

    Babak Nasersharif, Mohammad Namvarpour in The Journal of Supercomputing
    Article 09 July 2024
  13. Cost-effective clonal selection and AIS-based load balancing in cloud computing environment

    Cloud computing faces challenges in increasing efficiency through task scheduling and load balancing. Various load-balancing methods, including the...

    Melika Mosayebi, Reza Azmi in The Journal of Supercomputing
    Article 09 July 2024
  14. Hyper star structure fault tolerance of half hypercube

    The reliability of interconnection networks ordinarily is measured by all kinds of connectivities. The qualitative and quantitative analysis relies...

    Lulu Yang, Shuming Zhou in The Journal of Supercomputing
    Article 08 July 2024
  15. Natural noise management in collaborative recommender systems over time-related information

    Recommender systems are currently a suitable alternative for providing easy and appropriate access to information for users in today’s digital...

    Francisco J. Baldán, Raciel Yera, Luis Martínez in The Journal of Supercomputing
    Article Open access 08 July 2024
  16. An efficient quantum oblivious transfer protocol

    Oblivious transfer (OT) is a significant two party privacy preserving cryptographic primitive. OT involves a sender having several pieces of...

    Sushmita Sarkar, Vikas Srivastava, ... Sihem Mesnager in Cluster Computing
    Article 08 July 2024
  17. Centrality-based and similarity-based neighborhood extension in graph neural networks

    In recent years, Graph Neural Networks (GNNs) have become a key technique to address various graph-based machine learning tasks. Most of existing...

    Mohammadjavad Zohrabi, Saeed Saravani, Mostafa Haghir Chehreghani in The Journal of Supercomputing
    Article 08 July 2024
  18. DEKGCI: A double-ended recommendation model for integrating knowledge graph and user–item interaction graph

    User–item bipartite graphs and knowledge graphs are frequently employed in recommender systems due to their ability to provide rich information for...

    Ya**g Yang, Zeyu Zeng, ... Ruirui Shang in The Journal of Supercomputing
    Article 08 July 2024
  19. Efficient MST-based clustering with leader node selection and outlier edge cutting

    The clustering algorithm based on the minimum spanning tree (MST) can identify clusters of different shapes. However, the minimum spanning tree...

    Yuzhuo Yao, Yong Zheng, Wei Li in The Journal of Supercomputing
    Article 08 July 2024
  20. Multi-strategy improved sparrow search algorithm based on first definition of ellipse and group co-evolutionary mechanism for engineering optimization problems

    The Sparrow Search Algorithm (SSA) is recognized for its rapid convergence and precision in engineering optimization, yet it faces the challenge of...

    Gang Chen, Hu Sun in Cluster Computing
    Article 07 July 2024
Did you find what you were looking for? Share feedback.