International Journal of Cloud Computing最新文献

筛选
英文 中文
Resource allocation and network pricing based on double auction in mobile edge computing 移动边缘计算中基于双拍卖的资源分配与网络定价
International Journal of Cloud Computing Pub Date : 2023-04-13 DOI: 10.1186/s13677-023-00421-x
Xiao Zheng, Syed Bilal Hussain Shah, S. Usman, S. Mahfoudh, KS FathimaShemim, P. Shukla
{"title":"Resource allocation and network pricing based on double auction in mobile edge computing","authors":"Xiao Zheng, Syed Bilal Hussain Shah, S. Usman, S. Mahfoudh, KS FathimaShemim, P. Shukla","doi":"10.1186/s13677-023-00421-x","DOIUrl":"https://doi.org/10.1186/s13677-023-00421-x","url":null,"abstract":"","PeriodicalId":37423,"journal":{"name":"International Journal of Cloud Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82855064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Correction: Improved wild horse optimization with levy fight algorithm for effective task scheduling in cloud computing 修正:改进野马优化与征费战斗算法在云计算中有效的任务调度
International Journal of Cloud Computing Pub Date : 2023-04-12 DOI: 10.1186/s13677-023-00432-8
G. Saravanan, Neelakandan Subramani, P. Ezhumalai, Dr Sudhanshu Maurya
{"title":"Correction: Improved wild horse optimization with levy fight algorithm for effective task scheduling in cloud computing","authors":"G. Saravanan, Neelakandan Subramani, P. Ezhumalai, Dr Sudhanshu Maurya","doi":"10.1186/s13677-023-00432-8","DOIUrl":"https://doi.org/10.1186/s13677-023-00432-8","url":null,"abstract":"","PeriodicalId":37423,"journal":{"name":"International Journal of Cloud Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90307126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
NPR-LBN: next point of interest recommendation using large bipartite networks with edge and cloud computing NPR-LBN:下一个兴趣点推荐使用边缘和云计算的大型二部网络
International Journal of Cloud Computing Pub Date : 2023-04-11 DOI: 10.1186/s13677-023-00427-5
Inayat Khan, Anwar Sadad, Gauhar Ali, M. El-Affendi, Razaullah Khan, Tariq Sadad
{"title":"NPR-LBN: next point of interest recommendation using large bipartite networks with edge and cloud computing","authors":"Inayat Khan, Anwar Sadad, Gauhar Ali, M. El-Affendi, Razaullah Khan, Tariq Sadad","doi":"10.1186/s13677-023-00427-5","DOIUrl":"https://doi.org/10.1186/s13677-023-00427-5","url":null,"abstract":"","PeriodicalId":37423,"journal":{"name":"International Journal of Cloud Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86139101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identification of encrypted and malicious network traffic based on one-dimensional convolutional neural network 基于一维卷积神经网络的加密和恶意网络流量识别
International Journal of Cloud Computing Pub Date : 2023-04-10 DOI: 10.1186/s13677-023-00430-w
Yan Zhou, Huiling Shi, Yanling Zhao, W. Ding, Jing Han, Hongyang Sun, Xian-hua Zhang, Chang Tang, Wei Zhang
{"title":"Identification of encrypted and malicious network traffic based on one-dimensional convolutional neural network","authors":"Yan Zhou, Huiling Shi, Yanling Zhao, W. Ding, Jing Han, Hongyang Sun, Xian-hua Zhang, Chang Tang, Wei Zhang","doi":"10.1186/s13677-023-00430-w","DOIUrl":"https://doi.org/10.1186/s13677-023-00430-w","url":null,"abstract":"","PeriodicalId":37423,"journal":{"name":"International Journal of Cloud Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85796818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient online migration mechanism for memory write-intensive virtual machines 针对内存写密集型虚拟机的高效在线迁移机制
International Journal of Cloud Computing Pub Date : 2023-04-06 DOI: 10.1186/s13677-023-00433-7
Pingping Li, Jiuxin Cao
{"title":"Efficient online migration mechanism for memory write-intensive virtual machines","authors":"Pingping Li, Jiuxin Cao","doi":"10.1186/s13677-023-00433-7","DOIUrl":"https://doi.org/10.1186/s13677-023-00433-7","url":null,"abstract":"","PeriodicalId":37423,"journal":{"name":"International Journal of Cloud Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73675889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A cloud-oriented siamese network object tracking algorithm with attention network and adaptive loss function 一种基于注意力网络和自适应损失函数的面向云的连体网络目标跟踪算法
International Journal of Cloud Computing Pub Date : 2023-04-04 DOI: 10.1186/s13677-023-00431-9
Jin-ping Sun, Dan Li
{"title":"A cloud-oriented siamese network object tracking algorithm with attention network and adaptive loss function","authors":"Jin-ping Sun, Dan Li","doi":"10.1186/s13677-023-00431-9","DOIUrl":"https://doi.org/10.1186/s13677-023-00431-9","url":null,"abstract":"","PeriodicalId":37423,"journal":{"name":"International Journal of Cloud Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73317220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A blockchain-based SLA monitoring and compliance assessment for IoT ecosystems 基于区块链的物联网生态系统SLA监控和合规性评估
International Journal of Cloud Computing Pub Date : 2023-03-31 DOI: 10.1186/s13677-023-00409-7
Ali Alzubaidi, Karan Mitra, E. Solaiman
{"title":"A blockchain-based SLA monitoring and compliance assessment for IoT ecosystems","authors":"Ali Alzubaidi, Karan Mitra, E. Solaiman","doi":"10.1186/s13677-023-00409-7","DOIUrl":"https://doi.org/10.1186/s13677-023-00409-7","url":null,"abstract":"","PeriodicalId":37423,"journal":{"name":"International Journal of Cloud Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86591719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Novel secure data protection scheme using Martino homomorphic encryption 采用Martino同态加密的新型安全数据保护方案
International Journal of Cloud Computing Pub Date : 2023-03-27 DOI: 10.1186/s13677-023-00425-7
C. Rupa, Greeshmanth, Mohd Asif Shah
{"title":"Novel secure data protection scheme using Martino homomorphic encryption","authors":"C. Rupa, Greeshmanth, Mohd Asif Shah","doi":"10.1186/s13677-023-00425-7","DOIUrl":"https://doi.org/10.1186/s13677-023-00425-7","url":null,"abstract":"","PeriodicalId":37423,"journal":{"name":"International Journal of Cloud Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91306634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Dynamic data collection algorithm based on mobile edge computing in underwater internet of things 水下物联网中基于移动边缘计算的动态数据采集算法
International Journal of Cloud Computing Pub Date : 2023-03-24 DOI: 10.1186/s13677-023-00413-x
Xiaoyun Guang, Chunfeng Liu, W. Qu, Zhao Zhao
{"title":"Dynamic data collection algorithm based on mobile edge computing in underwater internet of things","authors":"Xiaoyun Guang, Chunfeng Liu, W. Qu, Zhao Zhao","doi":"10.1186/s13677-023-00413-x","DOIUrl":"https://doi.org/10.1186/s13677-023-00413-x","url":null,"abstract":"","PeriodicalId":37423,"journal":{"name":"International Journal of Cloud Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85268051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Artificial intelligence and edge computing for teaching quality evaluation based on 5G-enabled wireless communication technology 基于5g无线通信技术的人工智能和边缘计算教学质量评估
International Journal of Cloud Computing Pub Date : 2023-03-23 DOI: 10.1186/s13677-023-00418-6
Feng Li, Caohui Wang
{"title":"Artificial intelligence and edge computing for teaching quality evaluation based on 5G-enabled wireless communication technology","authors":"Feng Li, Caohui Wang","doi":"10.1186/s13677-023-00418-6","DOIUrl":"https://doi.org/10.1186/s13677-023-00418-6","url":null,"abstract":"","PeriodicalId":37423,"journal":{"name":"International Journal of Cloud Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74591398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信