D. Balakrishnan, T. Rajkumar, S. Dhanasekaran, B. Murugan
{"title":"Secure and energy-efficient data transmission framework for IoT-based healthcare applications using EMCQLR and EKECC","authors":"D. Balakrishnan, T. Rajkumar, S. Dhanasekaran, B. Murugan","doi":"10.1007/s10586-023-04130-7","DOIUrl":"https://doi.org/10.1007/s10586-023-04130-7","url":null,"abstract":"","PeriodicalId":50674,"journal":{"name":"Cluster Computing-The Journal of Networks Software Tools and Applications","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2023-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46315777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CPOCEDS-concept preserving online clustering for evolving data streams","authors":"K. T. Jafseer, S. Shailesh, A. Sreekumar","doi":"10.1007/s10586-023-04121-8","DOIUrl":"https://doi.org/10.1007/s10586-023-04121-8","url":null,"abstract":"","PeriodicalId":50674,"journal":{"name":"Cluster Computing-The Journal of Networks Software Tools and Applications","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2023-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42703999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparative analysis between a pixel-wise image encryption scheme and AES in a web application context","authors":"Abdelaziz Mokhnache, Lahcene Ziet, Fayçal Radjah","doi":"10.1007/s10586-023-04126-3","DOIUrl":"https://doi.org/10.1007/s10586-023-04126-3","url":null,"abstract":"","PeriodicalId":50674,"journal":{"name":"Cluster Computing-The Journal of Networks Software Tools and Applications","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2023-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46481451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Liang, Mohammad Salem Atoum, Xin Xing, I. Alsmadi
{"title":"Benchmark assessment for the DeepSpeed acceleration library on image classification","authors":"G. Liang, Mohammad Salem Atoum, Xin Xing, I. Alsmadi","doi":"10.1007/s10586-023-04117-4","DOIUrl":"https://doi.org/10.1007/s10586-023-04117-4","url":null,"abstract":"","PeriodicalId":50674,"journal":{"name":"Cluster Computing-The Journal of Networks Software Tools and Applications","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2023-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48474044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The balance of utility, privacy, and trust in network services","authors":"Yi Wan","doi":"10.1007/s10586-023-04112-9","DOIUrl":"https://doi.org/10.1007/s10586-023-04112-9","url":null,"abstract":"","PeriodicalId":50674,"journal":{"name":"Cluster Computing-The Journal of Networks Software Tools and Applications","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2023-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47936353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel revocation management for distributed environment: a detailed study","authors":"G. Santhosh, T. Reshmi","doi":"10.1007/s10586-023-04120-9","DOIUrl":"https://doi.org/10.1007/s10586-023-04120-9","url":null,"abstract":"","PeriodicalId":50674,"journal":{"name":"Cluster Computing-The Journal of Networks Software Tools and Applications","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2023-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41843554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance analysis of P2p network content delivery based on queueing model","authors":"Zhanyou Ma, Miao Yan, Rong Wang, Shunzhi Wang","doi":"10.1007/s10586-023-04111-w","DOIUrl":"https://doi.org/10.1007/s10586-023-04111-w","url":null,"abstract":"","PeriodicalId":50674,"journal":{"name":"Cluster Computing-The Journal of Networks Software Tools and Applications","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2023-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46657812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cluster based similarity extraction upon distributed datasets","authors":"Thanasis Moustakas, Kostas Kolomvatsos","doi":"10.1007/s10586-023-04116-5","DOIUrl":"https://doi.org/10.1007/s10586-023-04116-5","url":null,"abstract":"","PeriodicalId":50674,"journal":{"name":"Cluster Computing-The Journal of Networks Software Tools and Applications","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2023-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45041377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A security framework to enhance IoT device identity and data access through blockchain consensus model","authors":"Kariyappa Janani, Sriramulu Ramamoorthy","doi":"10.1007/s10586-023-04113-8","DOIUrl":"https://doi.org/10.1007/s10586-023-04113-8","url":null,"abstract":"","PeriodicalId":50674,"journal":{"name":"Cluster Computing-The Journal of Networks Software Tools and Applications","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2023-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49014315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}