default search action
SmartCloud 2020: Washington, DC, USA
- IEEE International Conference on Smart Cloud, SmartCloud 2020, Washington, DC, USA, November 6-8, 2020. IEEE 2020, ISBN 978-1-7281-6547-9
- Jiahao Sun, Chengrong Wu, Jiawei Ye:
Blockchain-based Automated Container Cloud Security Enhancement System. 1-6 - Awatef Salem Balobaid, Debatosh Debnath:
An Effective Approach to Cloud Migration for Small and Medium Enterprises (SMEs). 7-12 - PeiYun Zhang, Xuelei Wang, Chenxi Li, Licui Wang, Jiemin Xie:
A Dynamic Pricing Model for Virtual Machines in Cloud Environments. 13-18 - Bin Liu, Tianke Fang, Ying-ying Fu:
Research on Optimization of Block chain Security Testing. 19-22 - Fritjof Steinert, Philipp Kreowsky, Eric L. Wisotzky, Christian Unger, Benno Stabernack:
A Hardware/Software Framework for the Integration of FPGA-based Accelerators into Cloud Computing Infrastructures. 23-28 - K. M. S. U. Bandaranayake, K. P. N. Jayasena, Banage T. G. S. Kumara:
An Efficient Task Scheduling Algorithm using Total Resource Execution Time Aware Algorithm in Cloud Computing. 29-34 - Sophoan Sok, Christian Plewnia, Sansiri Tanachutiwat, Horst Lichter:
Optimization of Compute Costs in Hybrid Clouds with Full Rescheduling. 35-40 - Nirmal Kumawat, Nikhil Handa, Avinash Kharbanda:
Cloud Computing Resources Utilization and Cost Optimization for Processing Cloud Assets. 41-48 - Tarek Menouer, Amina Khedimi, Christophe Cérin:
Smart Network Slices Scheduling in Cloud. 49-54 - Mohamed Mounir Moussa, Lubna K. Alazzawi:
Cyber Attacks Detection based on Deep Learning for Cloud-Dew Computing in Automotive IoT Applications. 55-61 - Peter Cocoros, Matthew Sobocinski, Kyle Steiger, Joel Coffman:
Evaluating Techniques for Practical Cloud-based Network Intrusion Detection. 62-67 - Art Sedighi, Sujit D'Mello, Gil Isaacs, Doug Jacobson:
BitemporalDB: A Bitemporal Database in the Cloud for Financial Services Data. 68-73 - Peng Yuan, Lei Jiang, Jianxun Liu, Dong Zhou, Pei Li, Yang Gao:
Dual-Level Attention Based on Heterogeneous Graph Convolution Network for Aspect-Based Sentiment Classification. 74-77 - Jing Wu, Wei Hu, Yonghao Wang, Yuan Wen:
A Multi-Input CNNs with Attention for Skin Lesion Classification. 78-83 - Fu Chen, Huoyu Jia, Kun Liu, Wenying Tang, Jianming Zhu, Weiyu Guo:
A New Attack Method for Malicious Nodes in Tangle Network. 84-87 - Tao Zhou, Yongxin Zhu, Naifeng Jing, Tianhao Nan, Wanyi Li, Bo Peng:
Reliable SoC Design and Implementation of SHA-3-HMAC Algorithm with Attack Protection. 88-93 - Mingqi Li, Xiaoyang Fu, Chenchen Meng:
The Risk Prediction of Prostate Cancer Based on A Improved Hybrid Algorithm. 94-99 - Geng Zhang, Xinjie Gong, Yanan Wang, Yang Wang, Hao Jiang:
Multilevel partition algorithm based on weighted label propagation. 100-105 - Weidong Xiao, Nianbin Wan, Alan Hong, Xiaoyan Chen:
A Fast JPEG Image Compression Algorithm Based on DCT. 106-110 - Xiaolei Chang, Shu Yang, Yong Jiang, Xiaonan Xie, Xiaolin Tang:
Research on Key Energy-Saving Technologies in Green Data Centers. 111-115 - Jiajia Duan, Hui Zhao, Qian Zhou, Meikang Qiu, Meiqin Liu:
A Study of Pre-trained Language Models in Natural Language Processing. 116-121 - Geng Zhang, Wang Donghui, Wei Liu, Wang Song:
An Outdoor Installation Protection Plan Based On Ring Network And Reliability Research. 122-127 - Fu Chen, Yujia Huo, Jianming Zhu, Dan Fan:
A Review on the Study on MQTT Security Challenge. 128-133 - Xiaoyu Sun, Huakang Li, Guozi Sun, Ming Zhu:
Fine-grained emoji sentiment analysis based on attributes of Twitter users. 134-139 - Jason McZara, Subash Kafle, Daniel Shin:
Modeling and Analysis of Dependencies between Microservices in DevSecOps. 140-147 - Jeremy Straub:
Modeling Attack, Defense and Threat Trees and the Cyber Kill Chain, ATT&CK and STRIDE Frameworks as Blackboard Architecture Networks. 148-153 - Hua Feng, Wei Hu, Jing Wu:
Bring Your Own Device (BYOD) Based Flipped Classroom in Primary School. 154-158 - Han Deng, Yulian Gao, Xuhui Chen, Yazhen Zhang, Qiaohong Wu, Hui Zhao:
Harmonic Analysis of Power Grid Based on FFT Algorithm. 161-164 - Seungmin Oh, Kyeonglok Kim, Euiseong Seo:
A Dynamic Scaling Scheme of Cloud-based DNN Training Clusters. 165-168 - Chiapin Wang, Yu-Chia Liu, Han-Chi Gao, Tsung-Yi Fan Chiang:
Reinforcement-Learning Based Radio Resources Allocation in Licensed Assisted Access. 169-174 - Qinglin Yang, Peng Li:
Deep Reinforcement Learning based Energy Scheduling for Edge Computing. 175-180 - Kaiyi Zhang, Nancy Samaan:
Optimized Look-Ahead Offloading Decisions Using Deep Reinforcement Learning for Battery Constrained Mobile IoT Devices. 181-186 - Wei Liu, Jian Su, Lvying Qin, Yu Huang, Xu Huai, Qi Liu, Limei Zhou, Yuwei Shang, Xueyang Liu:
A framework of distribution transformer health early warning system based on EDC-GRU network. 187-192 - Guidong Wu, Hang Li, Xiaoqi Liao, Yuemeng Li, Yu Huang, Xiang Chen, Qi Liu, Xueyang Liu:
An Automatic and Rapid Knowledge Graph Construction Method of SG-CIM Model. 193-198 - Xiaohe Wu, Jianbo Xu, Weihong Huang, Wei Jian:
A new mutual authentication and key agreement protocol in wireless body area network. 199-203 - Zhechong Wang, Jianbo Xu, Jian Ke, Songyou Xie:
A Collaborative Filtering Method for Web Data Service in Cloud Environment. 204-208
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.