Sign in
Clust. Comput.
1998
2006
2015
2023
1998
2023
Keyphrases
Publications
volume 26, number 6, 2023
Neeta Alange
,
P. Vidya Sagar
Small files access efficiency in hadoop distributed file system a case study performed on British library text files.
Clust. Comput.
26 (6) (2023)
Mohammadreza Ipchi Sheshgelani
,
Saeid Pashazadeh
,
Pedram Salehpoor
Cooperative hybrid consensus with function optimization for blockchain.
Clust. Comput.
26 (6) (2023)
Farah Jemili
Intelligent intrusion detection based on fuzzy Big Data classification.
Clust. Comput.
26 (6) (2023)
Zhao Deng
,
Guoming Lu
Intelligent control method of main road traffic flow based on multi-sensor information fusion.
Clust. Comput.
26 (6) (2023)
Jian Yu
,
Zhixing Lin
,
Qiong Yu
,
Xiangmei Xiao
QoS correlation-based service composition algorithm for multi-constraint optimal path selection.
Clust. Comput.
26 (6) (2023)
Robin Singh Bhadoria
,
Naman Bhoj
,
Manoj Kumar Srivastav
,
Rahul Kumar
,
Balasubramanian Raman
A machine learning framework for security and privacy issues in building trust for social networking.
Clust. Comput.
26 (6) (2023)
Sudheer Mangalampalli
,
Ganesh Reddy Karri
,
Mohit Kumar
Multi objective task scheduling algorithm in cloud computing using grey wolf optimization.
Clust. Comput.
26 (6) (2023)
Retraction Note: Unsaturated dynamic constitutive model under cyclic loading.
Clust. Comput.
26 (6) (2023)
Serhan Gener
,
Parker Dattilo
,
Dhruv Gajaria
,
Alexander Fusco
,
Ali Akoglu
Gpu-based and streaming-enabled implementation of pre-processing flow towards enhancing optical character recognition accuracy and efficiency.
Clust. Comput.
26 (6) (2023)
Arezoo Ghasemi
,
Abolfazl Toroghi Haghighat
,
Amin Keshavarzi
Enhanced multi-objective virtual machine replacement in cloud data centers: combinations of fuzzy logic with reinforcement learning and biogeography-based optimization algorithms.
Clust. Comput.
26 (6) (2023)
Zainab Iftikhar
,
Adeel Anjum
,
Abid Khan
,
Munam Ali Shah
,
Gwanggil Jeon
Correction: Privacy preservation in the internet of vehicles using local differential privacy and IOTA ledger.
Clust. Comput.
26 (6) (2023)
Mehdi Boulaiche
,
Mohamed F. Younis
A multi-illusive voids approach for increasing base station anonymity.
Clust. Comput.
26 (6) (2023)
Zahra Katebi
,
Mohammad Nassiri
,
Mohsen Rezvani
XACSim: a new tool for measuring similarity of XACML security policies.
Clust. Comput.
26 (6) (2023)
Ruchika Malhotra
,
Bhawna Jain
,
Marouane Kessentini
Examining deep learning's capability to spot code smells: a systematic literature review.
Clust. Comput.
26 (6) (2023)
Zainab Iftikhar
,
Adeel Anjum
,
Abid Khan
,
Munam Ali Shah
,
Gwanggil Jeon
Privacy preservation in the internet of vehicles using local differential privacy and IOTA ledger.
Clust. Comput.
26 (6) (2023)
Qi Tao
,
Xiaohui Cui
B-FLACS: blockchain-based flexible lightweight access control scheme for data sharing in cloud.
Clust. Comput.
26 (6) (2023)
Richa Jain
,
Neelam Sharma
A quantum inspired hybrid SSA-GWO algorithm for SLA based task scheduling to improve QoS parameter in cloud computing.
Clust. Comput.
26 (6) (2023)
Jinjiang Wang
,
Junyang Yu
,
Yixin Song
,
Xin He
,
Yalin Song
An efficient energy-aware and service quality improvement strategy applied in cloud computing.
Clust. Comput.
26 (6) (2023)
Jan Bielecki
,
Michal Smialek
Estimation of execution time for computing tasks.
Clust. Comput.
26 (6) (2023)
Abbas Yazdinejad
,
Elnaz Rabieinejad
,
Tahereh Hasani
,
Gautam Srivastava
A BERT-based recommender system for secure blockchain-based cyber physical drug supply chain management.
Clust. Comput.
26 (6) (2023)
Shikha Rastogi
,
Jaspreet Singh
Performance enhancement of vision based fall detection using ensemble of machine learning model.
Clust. Comput.
26 (6) (2023)
Ambidi Naveena
,
Maddala Vijayalakshmi
,
Meeniga Vijaya Lakshmi
An optimized deep networks for securing 5g communication system.
Clust. Comput.
26 (6) (2023)
Bing Tang
,
Jincheng Luo
,
Mohammad S. Obaidat
,
Pandi Vijayakumar
Container-based task scheduling in cloud-edge collaborative environment using priority-aware greedy strategy.
Clust. Comput.
26 (6) (2023)
Linya Cai
Decision-making of transportation vehicle routing based on particle swarm optimization algorithm in logistics distribution management.
Clust. Comput.
26 (6) (2023)
Hongjian Li
,
Peng Zheng
,
Tiantian Wang
,
Jingjing Wang
,
Tongming Liu
A multi-objective task offloading based on BBO algorithm under deadline constrain in mobile edge computing.
Clust. Comput.
26 (6) (2023)
Hong Chen
,
Yiguo Xue
,
Daohong Qiu
Numerical simulation of the land subsidence induced by groundwater mining.
Clust. Comput.
26 (6) (2023)
Gagandeep Kaur
,
Sindhu Hak Gupta
,
Harleen Kaur
Performance evaluation and optimization of long range IoT network using whale optimization algorithm.
Clust. Comput.
26 (6) (2023)
Muna Al-Hawawreh
,
Ahamed Aljuhani
,
Yaser Jararweh
Chatgpt for cybersecurity: practical applications, challenges, and future directions.
Clust. Comput.
26 (6) (2023)
Danial Bakhshayeshi Avval
,
Pouria Ouni Heris
,
Nima Jafari Navimipour
,
Behnaz Mohammadi
,
Senay Yalçin
A new QoS-aware method for production scheduling in the industrial internet of things using elephant herding optimization algorithm.
Clust. Comput.
26 (6) (2023)
Sheetal Garg
,
Rohit Ahuja
,
Raman Singh
,
Ivan Perl
GMM-LSTM: a component driven resource utilization prediction model leveraging LSTM and gaussian mixture model.
Clust. Comput.
26 (6) (2023)
Saad Ahmad Khan
,
Muhammad Abdullah
,
Waheed Iqbal
,
Muhammad Arif Butt
Efficient job placement using two-way offloading technique over fog-cloud architectures.
Clust. Comput.
26 (6) (2023)
Zhiqiang Wang
,
Wenjing Gao
,
Ming Yang
,
Rong Hao
Enabling Secure Data sharing with data deduplication and sensitive information hiding in cloud-assisted Electronic Medical Systems.
Clust. Comput.
26 (6) (2023)
Retraction Note: Discrete Noetherian ring variational pattern feature sets for space-air-ground network protocol monitoring.
Clust. Comput.
26 (6) (2023)
Zaid Albataineh
,
Nebal Al-Zoubi
,
Ahmed Musa
Channel estimation for massive MIMO system using the shannon entropy function.
Clust. Comput.
26 (6) (2023)
Fatma Altuntas
,
Mehmet Sahin Gök
A data-driven analysis of renewable energy management: a case study of wind energy technology.
Clust. Comput.
26 (6) (2023)
An Chi Huang
,
Sheng Hui Meng
,
Tian Jiun Huang
A survey on machine and deep learning in semiconductor industry: methods, opportunities, and challenges.
Clust. Comput.
26 (6) (2023)
Abhinav Tomar
,
Rakesh Ranjan Kumar
,
Indrajeet Gupta
Decision making for cloud service selection: a novel and hybrid MCDM approach.
Clust. Comput.
26 (6) (2023)
Chunlin Li
,
Yong Zhang
,
Youlong Luo
Controller deployment based on network partition and collaborative scheduling on MEC.
Clust. Comput.
26 (6) (2023)
Madhusudan G. Lanjewar
,
Jivan Parab
,
Arman Yusuf Shaikh
,
Marlon Sequeira
CNN with machine learning approaches using ExtraTreesClassifier and MRMR feature selection techniques to detect liver diseases on cloud.
Clust. Comput.
26 (6) (2023)
Mengqi Liu
,
Kunshu Wang
,
Tiegang Gao
High-capacity reversible data hiding in encrypted images based on adaptive arithmetic coding and static Huffman coding.
Clust. Comput.
26 (6) (2023)
Hengxiang Yang
,
Lumin Li
,
Kai Li
Real-time progressive compression method of massive data based on improved clustering algorithm.
Clust. Comput.
26 (6) (2023)
Pranav Shrivastava
,
Bashir Alam
,
Mansaf Alam
Security enhancement using blockchain based modified infinite chaotic elliptic cryptography in cloud.
Clust. Comput.
26 (6) (2023)
Arash Heidari
,
Mohammad Ali Jabraeil Jamali
Internet of Things intrusion detection systems: a comprehensive review and future directions.
Clust. Comput.
26 (6) (2023)
Chaimae Hazman
,
Azidine Guezzaz
,
Said Benkirane
,
Mourade Azrour
lIDS-SIoEL: intrusion detection framework for IoT-based smart environments security using ensemble learning.
Clust. Comput.
26 (6) (2023)
Abbas Yazdinejad
,
Elnaz Rabieinejad
,
Tahereh Hasani
,
Gautam Srivastava
Correction: A BERT-based recommender system for secure blockchain-based cyber physical drug supply chain management.
Clust. Comput.
26 (6) (2023)
Michael Sober
,
Giulia Scaffino
,
Stefan Schulte
,
Salil S. Kanhere
A blockchain-based IoT data marketplace.
Clust. Comput.
26 (6) (2023)
N. Sheena
,
Shelbi Joseph
,
Shailesh Sivan
,
Bharat Bhushan
Light-weight privacy enabled topology establishment and communication protocol for swarm IoT networks.
Clust. Comput.
26 (6) (2023)
Natheer Khasawneh
,
Mohammad Fraiwan
,
Luay Fraiwan
Detection of K-complexes in EEG signals using deep transfer learning and YOLOv3.
Clust. Comput.
26 (6) (2023)
Yifeng Liu
,
Eyhab Al-Masri
Slow Subscribers: a novel IoT-MQTT based denial of service attack.
Clust. Comput.
26 (6) (2023)
Farid Bavifard
,
Mohammad Kheyrandish
,
Mohammad Mosleh
A new approach based on game theory to reflect meta-cluster dependencies into VoIP attack detection using ensemble clustering.
Clust. Comput.
26 (6) (2023)