1. | Enhancing Performance and Energy Efficiency for Hybrid Workloads in Virtualized Cloud Environment | |
2. | Aggregation-Based Co- location Datacenter Energy Management in Wholesale Markets | |
3. | Improving Privacy and Security in Decentralizing Multi-Authority Attribute-Based Encryption in Cloud Computing | |
4. | Secured outsourcing towards a cloud computing environment based on DNA cryptography
| |
5. | CLASS: Cloud Log Assuring Soundness and Secrecy Scheme for Cloud Forensics | |
6. | Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage Efficient Retrieval over Documents Encrypted by Attributes in Cloud Computing
| |
7. | Data security in cloud computing using AES | |
8. | Efficient Client-Side Deduplication of Encrypted Data With Public Auditing in Cloud Storage | |
9. | An Efficient Multi-User Searchable Encryption Scheme without Query Transformation Over Outsourced | |
10. | Efficient Traceable Authorization Search system cloud storage | |
11. | A Key-Policy Attribute-Based Temporary Keyword Search scheme for Secure Cloud Storage | |
12. | Dynamic VM Scaling: Provisioning and Pricing through an Online Auction | |
13. | Efficient Algorithm for Secure Outsourcing of Modular Exponentiation with Single Server | |
14. | Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Data Dynamics in Cloud Storage | |
15. | SeSPHR: A Methodology for Secure Sharing of Personal Health Records in the Cloud | |
16. | Energy Efficient Scheduling of Servers with Multi-Sleep Modes for Cloud Data Center | |
17. | Aggregation-Based Colocation Datacenter Energy Management in Wholesale Markets | |
18. | Provably secure and lightweight identity based authenticated data sharing protocol for the cyber-physical cloud environment | |
19. | Disaggregated Cloud Memory with Elastic Block Management | |
20. | A New Lightweight Symmetric Searchable Encryption Scheme for String Identification | |
21. | Security Analysis of Smartphone and Cloud Computing Authentication Frameworks and Protocols | |
22. | Hierarchical Cloud Computing Architecture for Context-Aware IoT Services
| |
23. | Data security in cloud computing using AES under HEROKU cloud
| |
24. | Impacts of public transportation fare reduction policy on urban public transport sharing rate based on big data analysis
| |
25. | Ensemble learning methods for power system cyber-attack detection | |
26. | Secure and Efficient Privacy-Preserving Cipher text Retrieval in Connected Vehicular Cloud Computing | |
27. | Security and QoS guarantee-based resource allocation within cloud computing environment | |
28. | Designing and evaluating hybrid storage for high performance cloud computing | |
29. | Energy Efficient and Deadline Satisfied Task Scheduling in Mobile Cloud Computing
| |
30. | Reliability Enhancement in Cloud Computing Via Optimized Job Scheduling Implementing Reinforcement Learning Algorithm and Queuing Theory | |
31. | A VHO scheme for supporting healthcare services in 5G vehicular cloud computing systems | |
32. | TZ-KMS: A Secure Key Management Service for Joint Cloud Computing with ARM TrustZone | |
33. | An Efficient Parallel Implicit Solver for LOD-FDTD Algorithm in Cloud Computing Environment | |
34. | Design and implementation of vsStor: A large-scale video surveillance storage system/a> | |
35. | DwarfGC: A Space-Efficient and Crash-Consistent Garbage Collector in NVM for Cloud Computing | |
36. | A Novel Forwarding Policy under Cloud Radio Access Network with Mobile Edge Computing Architecture | |
37. | Prediction Based Mobile Data Offloading in Mobile Cloud Computing | |
38. | Transparency service model for data security in cloud computing | |
39. | Secured outsourcing towards a cloud computing environment based on DNA cryptography | |
40. | Multi-user Multi-task Computation Offloading in Green Mobile Edge Cloud Computing | |
41. | Intelligent Health Vessel ABC-DE: An Electrocardiogram Cloud Computing Service | |
42. | Reducing Energy Consumption With Cost Budget Using Available Budget Preassignment in Heterogeneous Cloud Computing Systems | |
43. | Efficient Retrieval Over Documents Encrypted by Attributes in Cloud Computing | |
44. | Competitions Among Service Providers in Cloud Computing: A New Economic Model | |
45. | Provably Secure Fine-Grained Data Access Control over Multiple Cloud Servers in Mobile Cloud Computing Based Healthcare Applications | |
46. | Context-aware reinforcement learning-based mobile cloud computing for Telemonitoring | |
47. | Scene text detection based on enhanced multi-channels MSER and a fast text grouping process | |
48. | SMDP-Based Coordinated Virtual Machine Allocations in Cloud-Fog Computing Systems | |
49. | Component Importance Analysis of Mobile Cloud Computing System in the Presence of Common-Cause Failures | |
50. | Improving Privacy and Security in Decentralizing Multi-Authority Attribute-Based Encryption in Cloud Computing | |
51. | Impacts of public transportation fare reduction policy on urban public transport sharing rate based on big data analysis
| |
52. | System design for predictive road-traffic information delivery using edge-cloud computing | |
53. | Secure and Efficient Product Information Retrieval in Cloud Computing | |
54. | A Distributed Truthful Auction Mechanism for Task Allocation in Mobile Cloud Computing | |
55. | Semantic-Aware Searching Over Encrypted Data for Cloud Computing | |
56. | An Efficient and Privacy-Preserving Biometric Identification Scheme in Cloud Computing | |
57. | An Offloading Strategy in Mobile Cloud Computing Considering Energy and Delay Constraints | |
58. | Security analysis of homomorphic encryption scheme for cloud computing: Known-plaintext attack | |
59. | Providing Healthcare-as-a-Service Using Fuzzy Rule-Based Big Data Analytics in Cloud Computing | |
60. | Empirical analysis on key influential factors on cultural hegemony construction based on big data | |
61. | Box office forecasting for a cinema with movie and cinema attributes | |
62. | Text sentiment analysis based on multi-granularity joint solution | |
63. | Community detection based on unified Bayesian nonnegative matrix factorization | |
64. | Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services | |
65. | On the Security of a Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services | |
66. | Fair Resource Allocation for Data-Intensive Computing in the Cloud | |
67. | Towards Privacy-Preserving Content-Based Image Retrieval in Cloud Computing | |
68. | Catch You if You Misbehave: Ranked Keyword Search Results Verification in Cloud Computing | |
69. | MapReduce Scheduling for Deadline-Constrained Jobs in Heterogeneous Cloud Computing Systems | |
70. | Data Transfer Scheduling for Maximizing Throughput of Big-Data Computing in Cloud Systems | |
71. | Adaptive Resource Management for Analyzing Video Streams from Globally Distributed Network Cameras | |
72. | Privacy-Preserving Image Processing in the Cloud | |
73. | A Key-Policy Attribute-Based Temporary Keyword Search scheme for Secure Cloud Storage | |
74. | Provably secure and lightweight identity-based authenticated data sharing protocol for cyber-physical cloud environment | |
75. | Message integration and optimization based on substation monitoring information source-side maintenance | |
76. | On the Security of a Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services | |
77. | Automatic Segmentation of Dynamic Network Sequences with Node Labels | |
78. | Complementary Aspect-Based Opinion Mining | |
79. | Frog Asynchronous Graph Processing on GPU with Hybrid Coloring Model | |
80. | Local and Global Structure Preservation for Robust Unsupervised Spectral Feature Selection | |
81. | Mining Precise Positioning Episode Rules from Event Sequences | |
82. | THINKER Entity Linking System for the Turkish Language | |
83. | Topic Models for Unsupervised Cluster Matching | |
84. | UniWalk Unidirectional Random Walk Based Scalable SimRank Computation over Large Graph | |
85. | Weakly Supervised Deep Embedding for Product Review Sentiment Analysis | |
86. | Provably secure and lightweight identity based authenticated data sharing protocol for the cyber-physical cloud environment | |
87. |
Combining web data extraction and data mining techniques to discover knowledge | |
88. |
Data stream mining in fog computing environment with feature selection using ensemble of swarm search algorithms | |
89. | A brief analysis of the key technologies and applications of educational data mining on online learning platform
| |
90. |
Association rules mining analysis of app usage based on mobile traffic flow data | |
91. | Using data mining technique to improve billing system performance in semiconductor industry | |
92. | A technique to aggregate classes of analog fault diagnostic data based on association rule mining | |
93. | Data mining technique with cluster anaysis use K-means algorithm for LQ45 index on Indonesia stock exchange | |
94. | Algorithm Optimization of Anomaly Detection Based on Data Mining | |
95. | Corporate Communication Network and Stock Price Movements: Insights From Data Mining | |
96. | Evaluation of predictive data mining algorithms in soil data classification for optimized crop recommendation | |
97. | Using Data Mining to Predict Hospital Admissions From the Emergency Department | |
98. | Privacy preserving big data mining: association rule hiding using fuzzy logic approach | |
99. | Event detection and identification of influential spreaders in social media data streams | |
100. | Online Internet traffic monitoring system using spark streaming | |
101. | Location prediction on trajectory data: A review | |
102. | Get To The Point: Summarization with Pointer-Generator Networks | |
103. | Security Using Image Processing And Deep Convolutional Neural Networks | |
104. | Research of Image Processing Methods in Publishing Output Systems | |
105. | Privacy-preserving Image Processing in the Cloud | |
106. | Measuring Scour Level using Image Processing | |
107. | Image Processing Based Proposed Drone for Detecting and Controlling Street Crimes | |
108. | Efficient image steganography using graph signal processing | |
109. | A Design Tool for High Performance Image Processing on Multi core Platforms | |
110. | Separable and Reversible Data Hiding in Encrypted Images using Parametric Binary Tree Labeling | |
111. | Spatial and Motion Saliency Prediction Method Using Eye Tracker Data for Video Summarization | |
112. | Robust Foreground Estimation via Structured Gaussian Scale Mixture Modeling | |
113. | Robust Coverless Image Steganography Based on DCT and LDA Topic Classification | |
114. | Robust and Fast Decoding of High Capacity Color QR Codes for Mobile Applications | |
115. | A service migration strategy based on multiple attribute decision in mobile edge computing | |
116. | SaW: Video Analysis in Social Media with Web-Based Mobile Grid Computing | |
117. | MAGA: A Mobility-Aware Computation Offloading Decision for Distributed Mobile Cloud Computing | |
118. | Fair Resource Allocation for System Throughput Maximization in Mobile Edge Computing | |
119. | Classification and Mapping of Adaptive Security for Mobile Computing | |
120. | COAST: A Cooperative Storage Framework for Mobile Transparent Computing Using Device-to-Device Data Sharing | |
121. | Energy Efficient and Deadline Satisfied Task Scheduling in Mobile Cloud Computing | |
122. | A framework for efficient and secured mobility of IoT devices in mobile edge computing | |
123. | Task offloading and resource allocation in mobile-edge computing system | |
124. | Decentralized and Optimal Resource Cooperation in Geo-Distributed Mobile Cloud Computing | |
125. | Auction-Based Resource Allocation for Sharing Cloudlets in Mobile Cloud Computing | |
126. | Protecting Location Privacy for Task Allocation in Ad Hoc Mobile Cloud Computing | |
127. | On the Security of a Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services | |
128. | Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services | |
129. | Throughput-Optimal Broadcast in Wireless Networks with Dynamic Topology | |
130. | Efficiency network construction of advanced metering infrastructure using Zigbee | |
131. | Differentially Private Mechanisms for Budget Limited Mobile Crowdsourcing | |
132. | Reward or Penalty: Aligning Incentives of Stakeholders in Crowdsourcing | |
133. | Providing Task Allocation and Secure Deduplication for Mobile Crowdsensing via Fog Computing | |
134. | A Distributed Truthful Auction Mechanism for Task Allocation in Mobile Cloud Computing | |
135. | Joint latent dirichlet allocation for social tags | |
136. | Mobile multimedia health applications and their potential impacton the human population | |