46 results on '"Ashtiani, Mehrdad"'
Search Results
2. A consensus-based approach to improve the accuracy of machine learning models
3. An approach for reaching consensus in large-scale group decision-making focusing on dimension reduction
4. Automatic software code repair using deep learning techniques
5. FaasFlows: an approach for reducing vendor lock-in and response time in serverless workflows
6. Multi-type requirements traceability prediction by code data augmentation and fine-tuning MS-CodeBERT
7. An Auto-Scaling Approach for Microservices in Cloud Computing Environments
8. Reducing the cost of cold start time in serverless function executions using granularity trees
9. A heuristic-based package-aware function scheduling approach for creating a trade-off between cold start time and cost in FaaS computing environments
10. A Package-Aware Approach for Function Scheduling in Serverless Computing Environments
11. A probabilistic-based approach for automatic identification and refactoring of software code smells
12. A computational trust model for social IoT based on interval neutrosophic numbers
13. A DQN-based agent for automatic software refactoring
14. DDBWS: a dynamic deadline and budget-aware workflow scheduling algorithm in workflow-as-a-service environments
15. Proactive auto-scaling for cloud environments using temporal convolutional neural networks
16. A security-aware virtual machine placement in the cloud using hesitant fuzzy decision-making processes
17. A propagation trust model in social networks based on the A* algorithm and multi-criteria decision making
18. A fuzzy genetic automatic refactoring approach to improve software maintainability and flexibility
19. An uncertainty-aware computational trust model considering the co-existence of trust and distrust in social networks
20. A novel trust evolution algorithm based on a quantum-like model of computational trust
21. An auto-scaling approach for microservices in cloud computing environments
22. An approach based on the transferrable belief model for trust evaluation in web services
23. A hesitant fuzzy model of computational trust considering hesitancy, vagueness and uncertainty
24. A survey of quantum-like approaches to decision making and cognition
25. A community-based distrust-aware computational trust model for online social networks
26. A formulation of computational trust based on quantum decision theory
27. Trust modeling based on a combination of fuzzy analytic hierarchy process and fuzzy VIKOR
28. A heuristic-based package-aware function scheduling approach for creating a trade-off between cold-start time and cost in FaaS computing environments
29. A multi-criteria decision-making formulation of trust using fuzzy analytic hierarchy process
30. An automated extract method refactoring approach to correct the long method code smell
31. Automatic Software Code Repair Using Deep Learning Techniques
32. An Approach for Reaching Consensus in Large-Scale Group Decision Makings in Social Networks
33. An approach based on multiplex networks for modeling cascading trust failures in social networks
34. Approach for the Evaluation and Correction of Manually Designed Video Game Levels Using Deep Neural Networks.
35. A fuzzy genetic automatic refactoring approach to improve software maintainability and flexibility
36. A security-aware virtual machine placement in the cloud using hesitant fuzzy decision-making processes
37. An Approach for the Evaluation and Correction of Manually Designed Video Game Levels Using Deep Neural Networks
38. A mitigation strategy for the prevention of cascading trust failures in social networks
39. A novel trust evolution algorithm based on a quantum-like model of computational trust
40. A Model of Trust Based on Uncertainty Theory
41. An approach based on the transferrable belief model for trust evaluation in web services
42. A formulation of computational trust based on quantum decision theory
43. Trust modeling based on a combination of fuzzy analytic hierarchy process and fuzzy VIKOR
44. A multi-criteria decision-making formulation of trust using fuzzy analytic hierarchy process
45. CONTEXTUALITY, INCOMPATIBILITY AND BIASED INFERENCE IN A QUANTUM-LIKE FORMULATION OF COMPUTATIONAL TRUST
46. A distributed simulation framework for modeling cyber attacks and the evaluation of security measures
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.