We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 41-60 of 10,000 results
  1. LATA: learning automata-based task assignment on heterogeneous cloud computing platform

    A cloud computing environment is a distributed system where idle resources are accessible across a wide area network, such as the Internet. Due to...

    Soulmaz Gheisari, Hamid ShokrZadeh in The Journal of Supercomputing
    Article Open access 03 July 2024
  2. Exploring low-level statistical features of n-grams in phishing URLs: a comparative analysis with high-level features

    Phishing attacks are the biggest cybersecurity threats in the digital world. Attackers exploit users by impersonating real, authentic websites to...

    Yahya Tashtoush, Moayyad Alajlouni, ... Omar Darwish in Cluster Computing
    Article 03 July 2024
  3. A cloud-fog distributed trust service for wireless sensor networks

    In wireless sensor networks (WSNs), data aggregation techniques are used to reduce energy consumption of the sensors and extend the network lifetime....

    Bader A. Ali, Hanady M. Abdulsalam, ... Eman Alroumi in The Journal of Supercomputing
    Article 03 July 2024
  4. Empowering e-learning approach by the use of federated edge computing

    Federated learning (FL) is a decentralized approach to training machine learning model. In the traditional architecture, the training requires...

    Nouha Arfaoui, Amel Ksibi, ... Ridha Ejbali in Cluster Computing
    Article 03 July 2024
  5. Hardware architecture and memristor-crossbar implementation of type-2 fuzzy system with type reduction and in-situ training

    The Type-2 fuzzy set is a fuzzy set with fuzzy membership degrees. This set is used when accurately determining the membership degree of a fuzzy set...

    Sajad Haghzad Klidbary, Mohammad Javadian in The Journal of Supercomputing
    Article 02 July 2024
  6. IoV security and privacy survey: issues, countermeasures, and challenges

    As a growing up-and-coming branch of the Internet of Things and traditional vehicular ad hoc networks, the Internet of Vehicles (IoV) is intended to...

    Achref Haddaji, Samiha Ayed, Lamia Chaari Fourati in The Journal of Supercomputing
    Article 02 July 2024
  7. Proteo: a framework for the generation and evaluation of malleable MPI applications

    Applying malleability to HPC systems can increase their productivity without degrading or even improving the performance of running applications....

    Iker Martín-Álvarez, José I. Aliaga, ... Sergio Iserte in The Journal of Supercomputing
    Article Open access 02 July 2024
  8. Metaheuristic algorithms and their applications in wireless sensor networks: review, open issues, and challenges

    Metaheuristic algorithms have wide applicability, particularly in wireless sensor networks (WSNs), due to their superior skill in solving and...

    Essam H. Houssein, Mohammed R. Saad, ... Hassan Shaban in Cluster Computing
    Article Open access 02 July 2024
  9. Blockchain enabled secure pharmaceutical supply chain framework with traceability: an efficient searchable pharmachain approach

    The complex networks of manufacturers, suppliers, retailers, and customers that make up today’s pharmaceutical supply chain span worldwide. As it is,...

    Rahul Mishra, Dharavath Ramesh, ... Bhaskar Mondal in Cluster Computing
    Article 02 July 2024
  10. Enhancing 3D localization in wireless sensor network: a differential evolution method for the DV-Hop algorithm

    Wireless sensor network is large-scale, self-organizing and reliable. It is widely used in the military, disaster management, environmental...

    Zhihua Liu, Ran Zhang, ... Jiaxing Chen in The Journal of Supercomputing
    Article 02 July 2024
  11. Service selection based on blockchain smart contracts in cloud-edge environment

    The rapid integration of cloud computing and edge computing has brought the cloud-edge environment into the spotlight in information technology....

    Yingying Ning, **g Li, ... Chuanxi Liu in Cluster Computing
    Article 02 July 2024
  12. Energy-Constrained DAG Scheduling on Edge and Cloud Servers with Overlapped Communication and Computation

    Mobile edge computing (MEC) has been widely applied to numerous areas and aspects of human life and modern society. Many such applications can be...

    Article 02 July 2024
  13. An anonymous authentication with blockchain assisted ring-based homomorphic encryption for enhancing security in cloud computing

    Nowadays, the need for cloud computing has increased due to the exponential growth in information transmission. Cybercriminals are persistent in...

    Pranav Shrivastava, Bashir Alam, Mansaf Alam in Cluster Computing
    Article 02 July 2024
  14. Convolutional neural network (CNN) and federated learning-based privacy preserving approach for skin disease classification

    This research displays inspect a study on the classification of human skin diseases using medical imaging, with a focus on data privacy preservation....

    Divya, Niharika Anand, Gaurav Sharma in The Journal of Supercomputing
    Article 02 July 2024
  15. SDESA: secure cloud computing with gradient deep belief network and congruential advanced encryption

    With the aim to enhance cloud security with higher data confidentiality rate and integrity, we propose a novel technique called Stochastic Deep...

    Sheeja Rani, P. V. Pravija Raj, Ahmed M. Khedr in The Journal of Supercomputing
    Article 02 July 2024
  16. A hybrid deep learning based enhanced and reliable approach for VANET intrusion detection system

    Advances in autonomous transportation technologies have profoundly influenced the evolution of daily commuting and travel. These innovations rely...

    Atul Barve, Pushpinder Singh Patheja in Cluster Computing
    Article 01 July 2024
  17. A survey on privacy-preserving federated learning against poisoning attacks

    Federated learning (FL) is designed to protect privacy of participants by not allowing direct access to the participants’ local datasets and training...

    Feng **a, Wenhao Cheng in Cluster Computing
    Article 01 July 2024
  18. Saver: a proactive microservice resource scheduling strategy based on STGCN

    As container technology and microservices mature, applications increasingly shift to microservices and cloud deployment. Growing microservices scale...

    Yi Jiang, ** Xue, ... Tong Wu in Cluster Computing
    Article 01 July 2024
  19. An encrypted deduplication scheme based on files diversity

    In order to improve the efficiency of cloud storage, deduplication technology has been widely used. In personal cloud storage, files are diverse....

    **nfeng He, Yifan Zhu in The Journal of Supercomputing
    Article 01 July 2024
Did you find what you were looking for? Share feedback.