We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 41-60 of 10,000 results
  1. DBOS_US: a density-based graph under-sampling method to handle class imbalance and class overlap issues in software fault prediction

    Improving software quality by predicting faults during the early stages of software development is a primary goal of software fault prediction (SFP)....

    Kirti Bhandari, Kuldeep Kumar, Amrit Lal Sangal in The Journal of Supercomputing
    Article 27 June 2024
  2. Research and optimization of task scheduling algorithm based on heterogeneous multi-core processor

    Heterogeneous multi-core processor has the ability to switch between different types of cores to perform tasks, which provides more space and...

    Junnan Liu, Yifan Liu, Yongkang Ding in Cluster Computing
    Article 27 June 2024
  3. Advanced cost-aware Max–Min workflow tasks allocation and scheduling in cloud computing systems

    Cloud computing has emerged as an efficient distribution platform in modern distributed computing offering scalability and flexibility. Task...

    Mostafa Raeisi-Varzaneh, Omar Dakkak, ... Mohammed Golam Kaosar in Cluster Computing
    Article Open access 27 June 2024
  4. Privacy-preserving algorithm based on vulnerable nodes for social relationships

    In the contemporary era, online social networks have become the prevalent medium for interpersonal interactions, encompassing a multitude of virtual...

    Jiawei Shen, Junfeng Tian, Ziyuan Wang in The Journal of Supercomputing
    Article 27 June 2024
  5. Connecting the dots between stance and fake news detection with blockchain, proof of reputation, and the Hoeffding bound

    Combating fake news is a crucial endeavor, yet the complexity of the task requires multifaceted approaches that transcend singular technological...

    Ilhem Salah, Khaled Jouini, ... Ouajdi Korbaa in Cluster Computing
    Article 27 June 2024
  6. Resource Allocation Using Deep Deterministic Policy Gradient-Based Federated Learning for Multi-Access Edge Computing

    The study focuses on utilizing the computational resources present in vehicles to enhance the performance of multi-access edge computing (MEC)...

    Zheyu Zhou, Qi Wang, ... Ziyuan Li in Journal of Grid Computing
    Article 27 June 2024
  7. RAPTS: resource aware prioritized task scheduling technique in heterogeneous fog computing environment

    The Internet of Things (IoT) is an emerging technology incorporating various hardware devices and software applications to exchange, analyze, and...

    Mazhar Hussain, Said Nabi, Mushtaq Hussain in Cluster Computing
    Article 26 June 2024
  8. A revolutionary approach to use convolutional spiking neural networks for robust intrusion detection

    In an era dominated by network connectivity, the reliance on robust and secure networks has become paramount. With the advent of 5G and the Internet...

    Yongxing Lin, **aoyan Xu, Hongyun Xu in Cluster Computing
    Article 26 June 2024
  9. A novel real-time object detection method for complex road scenes based on YOLOv7-tiny

    Road object detection is a key technology in intelligent transportation systems, playing a crucial role in ensuring driving safety and enhancing...

    Yunfa Li, Hui Li in Cluster Computing
    Article 26 June 2024
  10. Semantic difference-based feature extraction technique for fake news detection

    The rise of fake news presents a critical challenge to societal stability, emphasizing the urgent need for efficient detection systems. This study...

    Joy Gorai, Dilip Kumar Shaw in The Journal of Supercomputing
    Article 26 June 2024
  11. Catch fish optimization algorithm: a new human behavior algorithm for solving clustering problems

    This paper is inspired by traditional rural fishing methods and proposes a new metaheuristic optimization algorithm based on human behavior: Catch...

    Heming Jia, Qixian Wen, ... Seyedali Mirjalili in Cluster Computing
    Article 25 June 2024
  12. Optimization of containerized application deployment in virtualized environments: a novel mathematical framework for resource-efficient and energy-aware server infrastructure

    This study addresses the critical need for effective resource management through software container migration in cloud data centers. It emphasizes...

    Reza Rabieyan, Ramin Yahyapour, Patrick Jahnke in The Journal of Supercomputing
    Article Open access 25 June 2024
  13. HOGWO: a fog inspired optimized load balancing approach using hybridized grey wolf algorithm

    A distributed archetype, the concept of fog computing relocates the storage, computation, and services closer to the network’s edge, where the data...

    Debashreet Das, Sayak Sengupta, ... Deepanshu Saini in Cluster Computing
    Article 25 June 2024
  14. Adaptive spatio-temporal graph convolutional network with attention mechanism for mobile edge network traffic prediction

    In the current era of mobile edge networks, a significant challenge lies in overcoming the limitations posed by limited edge storage and...

    Ning Sha, **aochun Wu, ... Chuanhuang Li in Cluster Computing
    Article 25 June 2024
  15. A cognitive effective framework for analysis, monitoring and identifying variant of coronavirus disease

    Airborne diseases have contributed in an incredible way to increase worldwide morbidity and disability during the last few years. The omicron is an...

    Sapna Kumari, Harpreet Kaur, Prabal Gupta in The Journal of Supercomputing
    Article 24 June 2024
  16. Palindromes in involutive Fibonacci arrays

    The combinatorial properties of Fibonacci words and arrays are now a popularly studied concept in formal language theory. One such property is the...

    Hannah Blasiyus, D. K. Sheena Christy in The Journal of Supercomputing
    Article 24 June 2024
  17. An authentication mechanism based on blockchain for IoT environment

    The Internet of Things (IoT) is a network where physical objects with unique addresses can connect and communicate with each other through the...

    Gholam Reza Zargar, Hamid Barati, Ali Barati in Cluster Computing
    Article 24 June 2024
  18. On a model-free meta-heuristic approach for unconstrained optimization

    The efficacy of meta-heuristic algorithms has been demonstrated in solving unconstrained optimization problems. Inspired by the food foraging...

    Wei **a, Deming He in The Journal of Supercomputing
    Article 24 June 2024
  19. A hybrid northern goshawk optimization algorithm based on cluster collaboration

    To address the problems that the northern goshawk optimization algorithm (NGO) has a slow convergence speed and is highly susceptible to fall into...

    Changjun Wu, Qingzhen Li, ... **aohui Song in Cluster Computing
    Article 23 June 2024
  20. Transforming future technology with quantum-based IoT

    With the advent of internet-enabled and hybrid technologies, information is becoming increasingly accessible to the general public. Smartphones and...

    Habib Ullah Khan, Nasir Ali, ... Shah Nazir in The Journal of Supercomputing
    Article 23 June 2024
Did you find what you were looking for? Share feedback.