


default search action
Computing, Volume 104
Volume 104, Number 1, January 2022
- Daoqu Geng
, HanWen He, XingChuan Lan, Chang Liu:
Bearing fault diagnosis based on improved federated learning algorithm. 1-19 - Saeid Aghaalizadeh, Saeid Taghavi Afshord
, Asgarali Bouyer
, Babak Anari:
Improving the stability of label propagation algorithm by propagating from low-significance nodes for community detection in social networks. 21-42 - M. Marimuthu
, J. Akilandeswari, P. R. Chelliah:
Identification of trustworthy cloud services: solution approaches and research directions to build an automated cloud broker. 43-72 - Kjell Jørgen Hole
:
Tutorial on systems with antifragility to downtime. 73-93 - Manjari Gupta, Lava Bhargava
, S. Indu
:
Deep neural network learning for power limited heterogeneous system with workload classification. 95-122 - Zheng Li
, Pedro Pinacho Davidson, Monserrat Martínez-Marin
, Guillermo Cabrera-Vives
, Yiqun Chen, María Andrea Rodríguez, Albert Y. Zomaya
, Rajiv Ranjan:
Bonus computing: towards free-of-charge metacomputing in the public cloud. 123-147 - Selvaraj Srinivasan
:
An incremental approach for detecting distributed deadlocks in the generalized model. 149-168 - Fatemeh Davami, Sahar Adabi
, Ali Rezaee
, Amir Masoud Rahmani:
Fog-based architecture for scheduling multiple workflows with high availability requirement. 169-208 - Paraskevas Koukaras
, Christos Tjortjis
, Paschalis Gkaidatzis
, Napoleon A. Bezas
, Dimosthenis Ioannidis
, Dimitrios Tzovaras
:
An interdisciplinary approach on efficient virtual microgrid to virtual microgrid energy balancing incorporating data preprocessing techniques. 209-250
Volume 104, Number 2, February 2022
- S. S. Vinod Chandra
, Hareendran S. Anand:
Nature inspired meta heuristic algorithms for optimization problems. 251-269 - Praveen Lalwani
, Manas Kumar Mishra, Jasroop Singh Chadha
, Pratyush Sethi:
Customer churn prediction system: a machine learning approach. 271-294 - Khawla Asmi
, Dounia Lotfi
, Abdallah Abarda
:
The greedy coupled-seeds expansion method for the overlapping community detection in social networks. 295-313 - Carlos Melo
, Jean Araujo
, Jamilson Dantas, Paulo Pereira, Paulo Maciel:
A model-based approach for planning blockchain service provisioning. 315-337 - Jia Hou Chin
, Kuru Ratnavelu:
Community detection using constrained label propagation algorithm with nodes exemption. 339-358 - Sanjay Kumar
, Dipti Lohia, Darsh Pratap, Ashutosh Krishna, B. S. Panda:
MDER: modified degree with exclusion ratio algorithm for influence maximisation in social networks. 359-382 - Jixian Zhang
, Laixin Chi, Ning Xie, Xutao Yang, Xuejie Zhang, Weidong Li
:
Strategy-proof mechanism for online resource allocation in cloud and edge collaboration. 383-412 - Hongjian Li
, Hongxi Dai, Zengyan Liu, Hao Fu, Yang Zou:
Dynamic energy-efficient scheduling for streaming applications in storm. 413-432 - Israr Ullah, Muhammad Fayaz, Muhammad Aman, DoHyeun Kim:
An optimization scheme for IoT based smart greenhouse climate control with efficient energy consumption. 433-457
Volume 104, Number 3, March 2022
- Ozcan Ozturk, Sabri Pllana, Smaïl Niar, Kaoutar El Maghraoui
:
Special issue on recent advances in autonomous vehicle solutions in the digital continuum. 459-460 - Augusto Vega
, Alper Buyuktosunoglu, Davide Callegaro, Marco Levorato, Pradip Bose:
Cloud-backed mobile cognition. 461-479 - Hamid Tabani
, Roger Pujol
, Miguel Alcon
, Joan Moya, Jaume Abella
, Francisco J. Cazorla
:
ADBench: benchmarking autonomous driving systems. 481-502 - Hind Bangui
, Mouzhi Ge, Barbora Buhnova
:
A hybrid machine learning model for intrusion detection in VANET. 503-531 - Djamila Zamouche, Mohamed Mohammedi, Sofiane Aissani
, Mawloud Omar:
Ultra-safe and reliable enhanced train-centric communication-based train control system. 533-552
- Partha Ghosh
, Zaid Alam, Ritu Raj Sharma, Santanu Phadikar:
An efficient SGM based IDS in cloud environment. 553-576 - Lalatendu Behera:
A fault-tolerant time-triggered scheduling algorithm of mixed-criticality systems. 577-599 - Ahmad Taghinezhad-Niar
, Saeid Pashazadeh
, Javid Taheri:
Energy-efficient workflow scheduling with budget-deadline constraints for cloud. 601-625 - Hong Yu
, Zhao Fu, Guoyin Wang, Yongfang Xie, Jie Li:
A Multi-objective optimization algorithm based on dynamic user-preference information. 627-656 - Suman Banerjee, Mamata Jenamani, Dilip Kumar Pratihar:
An approximate marginal spread computation approach for the budgeted influence maximization with delay. 657-680 - Ali Belgacem
:
Dynamic resource allocation in cloud computing: analysis and taxonomies. 681-710
Volume 104, Number 4, April 2022
- Ladjel Bellatreche, A Min Tjoa:
Special issue on advances in data, information and knowledge engineering in data science era. 711-715 - Orestis Lampridis, Dimitra Karanatsiou
, Athena Vakali:
MANIFESTO: a huMAN-centric explaInable approach for FakE news spreaders deTectiOn. 717-739 - Mohamed Ali Ben Hassine
, Safa Abdellatif, Sadok Ben Yahia
:
A novel imbalanced data classification approach for suicidal ideation detection on social media. 741-765 - Carlos Sáenz-Adán
, Francisco J. García Izquierdo, Beatriz Pérez
, Trung Dong Huynh
, Luc Moreau
:
Automated and non-intrusive provenance capture with UML2PROV. 767-788 - Nayera Tarek, Mariam Abo Mandour, Nada El-Madah, Reem Ali, Sara Yahia, Bassant Mohamed, Dina Mostafa, Sara El-Metwally
:
Morse glasses: an IoT communication system based on Morse code for users with speech impairments. 789-808 - Antonio Brogi
, Jose Carrasco, Francisco Durán, Ernesto Pimentel, Jacopo Soldani
:
Self-healing trans-cloud applications. 809-833 - Roberto Reda
, Filippo Piccinini
, Giovanni Martinelli
, Antonella Carbonaro
:
Heterogeneous self-tracked health and fitness data integration and sharing according to a linked open data approach. 835-857 - Soraya Touloum
, Louiza Bouallouche-Medjkoune
, Mohand Yazid, Mohand Moktefi, Djamil Aïssani:
Performance modeling of the IEEE 802.15.4e TSCH enabling both shared and dedicated links in industrial WSNs. 859-891 - Diwakar Tripathi, B. Ramachandra Reddy, Alok Kumar Shukla:
CFR: collaborative feature ranking for improving the performance of credit scoring data classification. 893-923 - Chinmaya Kumar Swain
, Aryabartta Sahu:
Interference Aware Workload Scheduling for Latency Sensitive Tasks in Cloud Environment. 925-950 - Somayeh Bahramnejad
, Naser Movahhedinia
:
A fuzzy arithmetic-based analytical reliability assessment framework (FAARAF): case study, cognitive radio vehicular networks with drivers. 951-979
Volume 104, Number 5, May 2022
- Lei Chen, Yu Tian, Yunpeng Ma:
An improved grasshopper optimization algorithm based on dynamic dual elite learning and sinusoidal mutation. 981-1015 - Xiulei Liu
, Ruoyu Chen
, Qiang Tong, Zhihui Qin, Qinfu Shi, Li Duan:
An ontology-based deep belief network model. 1017-1032 - Faris A. Almalki
, Abdullah Alhumaidi Alotaibi
, Marios C. Angelides
:
Coupling multifunction drones with AI in the fight against the coronavirus pandemic. 1033-1059 - Muhammad U. Ilyas
, Soltan Abed Alharbi
:
Machine learning approaches to network intrusion detection for contemporary internet traffic. 1061-1076 - Anisha Kumari, Ranjan Kumar Behera
, Bibudatta Sahoo, Satya Prakash Sahoo
:
Prediction of link evolution using community detection in social network. 1077-1098 - Elmira Pourabbasi, Vahid Majidnezhad
, Saeid Taghavi Afshord, Yasser Jafari:
A novel memorizing single chromosome evolutionary algorithm for detecting communities in complex networks. 1099-1122 - Sahar Samsam Shariat, Behrang Barekatain
:
HATMOG: an enhanced hybrid task assignment algorithm based on AHP-TOPSIS and multi-objective genetic in cloud computing. 1123-1154 - Na Bai, Fanrong Meng, Xiaobin Rui
, Zhixiao Wang:
Rumor detection based on a Source-Replies conversation Tree Convolutional Neural Net. 1155-1171 - Shivangi Shukla
, Sankita J. Patel:
A novel ECC-based provably secure and privacy-preserving multi-factor authentication protocol for cloud computing. 1173-1202 - Hameed Khan
, Kamal K. Kushwah, Muni Raj Maurya
, Saurabh Singh, Prashant Jha, Sujeet K. Mahobia, Sanjay Soni, Subham Sahu
, Kishor Kumar Sadasivuni
:
Machine learning driven intelligent and self adaptive system for traffic management in smart cities. 1203-1217 - Luis Antonio Leite Francisco da Costa
, Rafael Kunst
, Edison Pignaton de Freitas
:
Intelligent resource sharing to enable quality of service for network clients: the trade-off between accuracy and complexity. 1219-1231
Volume 104, Number 6, June 2022
- Hrudaya Kumar Tripathy
, Sushruta Mishra
, Shubham Suman, Anand Nayyar
, Kshira Sagar Sahoo
:
Smart COVID-shield: an IoT driven reliable and automated prototype model for COVID-19 symptoms tracking. 1233-1254 - Behrouz Samieiyan
, Poorya MohammadiNasab
, Mostafa Abbas Mollaei
, Fahimeh Hajizadeh
, Mohammadreza Kangavari:
Solving dimension reduction problems for classification using Promoted Crow Search Algorithm (PCSA). 1255-1284 - Hung Cong Tran, Khiet Thanh Bui
, Tran Vu Pham:
Virtual machine migration policy for multi-tier application in cloud computing based on Q-learning algorithm. 1285-1306 - Mohammad Reza Akbari
, Hamid Barati
, Ali Barati
:
An efficient gray system theory-based routing protocol for energy consumption management in the Internet of Things using fog and cloud computing. 1307-1335 - Adnan Mahmood
, Sarah Ali Siddiqui, Quan Z. Sheng
, Wei Emma Zhang
, Hajime Suzuki
, Wei Ni
:
Trust on wheels: Towards secure and resource efficient IoV networks. 1337-1358 - Uddalak Chatterjee, Sangram Ray
, Muhammad Khurram Khan
, Mou Dasgupta, Chien-Ming Chen
:
An ECC-based lightweight remote user authentication and key management scheme for IoT communication in context of fog computing. 1359-1395 - Sven Smolka
, Zoltán Ádám Mann
:
Evaluation of fog application placement algorithms: a survey. 1397-1423 - Yuegang Li, Dongyang Ou, Xin Zhou, Congfeng Jiang, Christophe Cérin:
Scalability and performance analysis of BDPS in clouds. 1425-1460 - Wei Du, Gang Li, Xiaochen He
:
Network structure optimization for social networks by minimizing the average path length. 1461-1480 - Abdulqader M. Almars
, El-Sayed Atlam, Talal H. Noor
, Elmarhomy Ghada, Rasha M. Al-Makhlasawy, Ibrahim Gad
:
Users opinion and emotion understanding in social media regarding COVID-19 vaccine. 1481-1496 - Xing Fan, Baoning Niu
, Zhenliang Liu:
Scalable blockchain storage systems: research progress and models. 1497-1524
Volume 104, Number 7, July 2022
- Ahmed Mostefaoui:
QoS and QoE in large Scale Wireless IoT Networks. 1525 - Mandan Naresh, Vikramjeet Das
, Paresh Saxena
, Manik Gupta
:
Deep reinforcement learning based QoE-aware actor-learner architectures for video streaming in IoT environments. 1527-1550 - Noura Aljeri
, Azzedine Boukerche:
Mobility management in space-ground-integrated networks. 1551-1564 - Elio Mansour
, Faisal Shahzad, Joe Tekli, Richard Chbeir:
Data redundancy management for leaf-edges in connected environments. 1565-1588 - Maninderpal Singh, Gagangeet Singh Aujla
, Rasmeet Singh Bali, Ranbir Singh Batth
, Amritpal Singh, Sahil Vashisht, Anish Jindal
:
CovaDel: a blockchain-enabled secure and QoS-aware drone delivery framework for COVID-like pandemics. 1589-1613 - Moustafa Fayad
, Ahmed Mostefaoui, Samir Chouali, Salima Benbernou:
Toward a design model-oriented methodology to ensure QoS of a cyber-physical healthcare system. 1615-1641 - Mahboubeh Afzali, Hamid Pourmohammadi, Amin Mohammad Vali Samani:
An efficient framework for trust evaluation of secure service selection in fog computing based on QoS, reputation, and social criteria. 1643-1675 - Souhila Kettouche, Moufida Maimour
, Lakhdar Derdouri:
Disjoint multipath RPL for QoE/QoS provision in the Internet of Multimedia Things. 1677-1699 - Heqi Cui, Peng Sun
, Azzedine Boukerche:
A novel cloud-based traffic aware data routing protocol for smart connected vehicles. 1701-1720
Volume 104, Number 8, August 2022
- Yongfeng Kong, Zhenhui Huang, Wanjie Xiong
:
Parallelism of the finite-time dynamics method based on GPU. 1721-1738 - Jianghui Liu, Shengxiang Wang
:
All-dummy k-anonymous privacy protection algorithm based on location offset. 1739-1751 - Taha Shojarazavi, Hamid Barati
, Ali Barati
:
A wrapper method based on a modified two-step league championship algorithm for detecting botnets in IoT environments. 1753-1774 - Salim El Khediri
:
Wireless sensor networks: a survey, categorization, main issues, and future orientations for clustering protocols. 1775-1837 - Mohamed A. El-Zawawy
, Parvez Faruki, Mauro Conti
:
Formal model for inter-component communication and its security in android. 1839-1865 - Laércio Pioli
, Carina F. Dorneles, Douglas D. J. de Macedo, Mario A. R. Dantas:
An overview of data reduction solutions at the edge of IoT systems: a systematic mapping of the literature. 1867-1889 - Lynda Alkama
, Louiza Bouallouche-Medjkoune, Mouloud Atmani, Lina Bachiri:
Performance analysis of the unslotted IEEE 802.15.4k MAC protocols under saturated traffic and fading channel conditions. 1891-1922 - Somayeh Bahramnejad
, Naser Movahhedinia
:
A reliability estimation framework for cognitive radio V2V communications and an ANN-based model for automating estimations. 1923-1947
Volume 104, Number 9, September 2022
- Hao Dai, Yang Wang, Chengzhong Xu
:
Osprey: a heterogeneous search framework for spatial-temporal similarity. 1949-1975 - Tianhua Li, Yongcheng Yin
, Bo Yang, Jialin Hou, Kai Zhou:
A self-learning bee colony and genetic algorithm hybrid for cloud manufacturing services. 1977-2003 - Pranitha Sanda
, Digambar Pawar
, V. Radha:
An insight into cloud forensic readiness by leading cloud service providers: a survey. 2005-2030 - Jun Li, Hao Ren, Chenyang Li, Huiling Chen:
A novel and efficient salp swarm algorithm for large-scale QoS-aware service composition selection. 2031-2051 - José M. del Álamo, Danny S. Guamán, Boni García, Ana Diez:
A systematic mapping study on automated analysis of privacy policies. 2053-2076 - S. Subaselvi
, K. Gunaseelan:
Energy efficient UAV enabled harvesting with beamforming for clustered SDWSN. 2077-2100 - Somayeh Kalantari, Eslam Nazemi
, Behrooz Masoumi
:
Guided self-organization through an entropy-based self-advising approach. 2101-2136 - Somaye Pirzadi
, Mohammad Ali Pourmina, Seyed Mostafa Safavi Hemami:
A novel routing method in hybrid DTN-MANET networks in the critical situations. 2137-2156
Volume 104, Number 10, October 2022
- Mohamed Faouzi Atig:
The Computing Journal gratefully acknowledges the editorial work of the scientists listed below on the special issue entitled "S.I. : NETYS 2019". 2157 - Ved Prakash Chaudhary, Chirag Juyal, Sandeep S. Kulkarni, Sweta Kumari
, Sathya Peri:
Achieving starvation-freedom in multi-version transactional memory systems. 2159-2179 - Rachid Zennou
, Ranadeep Biswas, Ahmed Bouajjani, Constantin Enea, Mohammed Erradi:
Checking causal consistency of distributed databases. 2181-2201 - Peter Chini, Roland Meyer, Prakash Saivasan:
Liveness in broadcast networks. 2203-2223 - Prasad Jayanti, Anup Joshi
:
Recoverable mutual exclusion with abortability. 2225-2252
- Bin Yu
, Xiaofeng Li, He Zhao
, Tong Zhou:
A scalable blockchain network model with transmission paths and neighbor node subareas. 2253-2277 - Miguel Areias
, Ricardo Rocha
:
On the correctness of a lock-free compression-based elastic mechanism for a hash trie design. 2279-2305 - Anass Sedrati
, Aafaf Ouaddah
, Abdellatif Mezrioui, Badr Bellaj:
IoT-Gov: an IoT governance framework using the blockchain. 2307-2345
Volume 104, Number 11, November 2022
- Tian Bai
, Zhijie Li, Bo Fan, Jun Liao:
Maintaining temporal validity of real-time data in component-based systems. 2347-2374 - Ricardo Pérez-Castillo
, Mario Piattini:
Design of classical-quantum systems with UML. 2375-2403 - Sven Ihde
, Luise Pufahl, Maximilian Völker
, Asvin Goel
, Mathias Weske:
A framework for modeling and executing task-Specific resource allocations in business processes. 2405-2429 - Danyang Xiao
, Chengang Yang, Weigang Wu:
Efficient DNN training based on backpropagation parallelization. 2431-2451 - Ali Walid Daher
, Enrico Ferrari
, Marco Muselli, Hussein Chible, Daniele D. Caviglia:
VAMPIRE: vectorized automated ML pre-processing and post-processing framework for edge applications. 2453-2487 - Hong Jin, Cheng Jiang, Shengping Lv, Haiping He, Xinting Liao:
A hybrid teaching-learning-based optimization algorithm for QoS-aware manufacturing cloud service composition. 2489-2509 - Yasir Afaq, Ankush Manocha
:
Dew computing-assisted cognitive Intelligence-inspired smart environment for diarrhea prediction. 2511-2540
Volume 104, Number 12, December 2022
- Haichi Huang, Xuan Tian, Sisi Luo, Yanli Shi:
Item enhanced graph collaborative network for collaborative filtering recommendation. 2541-2556 - Reza Shojaee
, Nasser Yazdani:
Stochastic model-driven capacity planning framework for multi-access edge computing. 2557-2579 - Nazeef Ul Haq, M. M. Fraz
, Tufail Sajjad Shah Hashmi, Muhammad Shahzad:
Orientation aware weapons detection in visual data: a benchmark dataset. 2581-2604 - Thirumoorthy Karpagalingam
, J. Jerold John Britto:
A clustering approach for software defect prediction using hybrid social mimic optimization algorithm. 2605-2633 - Chintoo Kumar
, C. Ravindranath Chowdary
:
OPHAencoder: An unsupervised approach to identify groups in group recommendations. 2635-2657 - Theodoros Toliopoulos
, Anastasios Gounaris:
Adaptivity in continuous massively parallel distance-based outlier detection. 2659-2684 - Mohamed Salah Kettouch
, Cristina Luca
:
LinkD: element-based data interlinking of RDF datasets in linked data. 2685-2709 - Jorge Pérez, Jessica Díaz
, Javier Berrocal, Ramón López-Viana, Ángel González-Prieto:
Edge computing. 2711-2747 - Leila Helali, Mohamed Nazih Omri:
Intelligent and compliant dynamic software license consolidation in cloud environment. 2749-2783

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.