Search

Showing total 7,015 results

Search Constraints

Start Over You searched for: Journal cluster computing Remove constraint Journal: cluster computing Publisher springer nature Remove constraint Publisher: springer nature
7,015 results

Search Results

1. Concepts recommendation for searching scientific papers.

2. Edge computing-enabled green multisource fusion indoor positioning algorithm based on adaptive particle filter.

3. Data breaches in healthcare: security mechanisms for attack mitigation.

4. Research trend analysis on convergence and joint research of Korea using scientific papers.

5. RSM analysis based cloud access security broker: a systematic literature review.

6. Dmaf: data-model anti-forgetting for federated incremental learning.

7. Application effect analysis of the test system of track and field web course based on software programming method.

8. Scalability of blockchain: a comprehensive review and future research direction.

9. Reinforcement learning based task offloading of IoT applications in fog computing: algorithms and optimization techniques.

10. AI-based & heuristic workflow scheduling in cloud and fog computing: a systematic review.

11. Slam loop closure detection algorithm based on MSA-SG.

12. Examining deep learning's capability to spot code smells: a systematic literature review.

13. A vehicular edge computing content caching solution based on content prediction and D4PG.

14. DELIGHT: a willingness-aware collaborative edge service offloading utilizing deep reinforcement learning.

15. Dynamic step opposition-based learning sparrow search algorithm for UAV path planning.

16. Region of interest encryption algorithm for images based on lifting scheme and object detection.

17. Blockchain cross-chain protocol based on improved hashed time-locked contract.

18. Sg: Automated tuning algorithm for storage systems based on simulated environments and group climbing.

19. A taxonomy of load balancing algorithms and approaches in fog computing: a survey.

20. High performance feature selection algorithms using filter method for cloud-based recommendation system.

21. Deep variability modeling to enhance reproducibility of database performance testing.

22. AAPF*: a safer autonomous vehicle path planning algorithm based on the improved A* algorithm and APF algorithm.

23. Advances in deep learning intrusion detection over encrypted data with privacy preservation: a systematic review.

24. A systematic mapping on software testing for blockchains.

25. Construction and application of barrel finishing underlying database platform.

26. Optimizing edge server placement and allocation for enhanced energy efficiency: a multi-objective approach based on decision space and elitism.

27. A novel niching genetic algorithm with heterosis for edge server placement.

28. PSO-ACO-based bi-phase lightweight intrusion detection system combined with GA optimized ensemble classifiers.

29. Exploring low-level statistical features of n-grams in phishing URLs: a comparative analysis with high-level features.

30. Leveraging large language model to generate a novel metaheuristic algorithm with CRISPE framework.

31. Revolutionizing agri-food supply chain management with blockchain-based traceability and navigation integration.

32. Catch fish optimization algorithm: a new human behavior algorithm for solving clustering problems.

33. Improved aquila optimizer with mRMR for feature selection of high-dimensional gene expression data.

34. A novel hybrid Artificial Gorilla Troops Optimizer with Honey Badger Algorithm for solving cloud scheduling problem.

35. A revolutionary approach to use convolutional spiking neural networks for robust intrusion detection.

36. Advanced cost-aware Max–Min workflow tasks allocation and scheduling in cloud computing systems.

37. An improved density peaks clustering algorithm using similarity assignment strategy with K-nearest neighbors.

38. Black eagle optimizer: a metaheuristic optimization method for solving engineering optimization problems.

39. SCRUB: a novel energy-efficient virtual machines selection and migration scheme in cloud data centers.

40. Soft computing approaches for dynamic multi-objective evaluation of computational offloading: a literature review.

41. EMR sharing system with lightweight searchable encryption and rights management.

42. Transforming online voting: a novel system utilizing blockchain and biometric verification for enhanced security, privacy, and transparency.

43. Streaming traffic classification: a hybrid deep learning and big data approach.

44. Secure electronic medical records sharing scheme based on blockchain and quantum key.

45. YOLO-CEA: a real-time industrial defect detection method based on contextual enhancement and attention.

46. Research on the teaching management of track and field web course based on software programming method.

47. A machine learning framework for security and privacy issues in building trust for social networking.

48. Numerical simulation of the land subsidence induced by groundwater mining.

49. Metaheuristic-based task scheduling for latency-sensitive IoT applications in edge computing.

50. A hybrid PSO and GA algorithm with rescheduling for task offloading in device–edge–cloud collaborative computing.