Computing

Papers
(The median citation count of Computing is 2. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-04-01 to 2024-04-01.)
ArticleCitations
Multi-input CNN-GRU based human activity recognition using wearable sensors199
Customer churn prediction system: a machine learning approach101
Future directions for chatbot research: an interdisciplinary research agenda74
A modified DeepWalk method for link prediction in attributed social network65
Smart COVID-shield: an IoT driven reliable and automated prototype model for COVID-19 symptoms tracking61
Edge computing: current trends, research challenges and future directions49
Nature inspired meta heuristic algorithms for optimization problems48
An improved YOLO-based road traffic monitoring system46
Energy-makespan optimization of workflow scheduling in fog–cloud computing40
A hybrid machine learning model for intrusion detection in VANET39
A multi-objective load balancing algorithm for virtual machine placement in cloud data centers based on machine learning38
Enhanced Harris Hawks optimization as a feature selection for the prediction of student performance36
An energy-aware clustering and two-level routing method in wireless sensor networks35
AI-enabled remote monitoring of vital signs for COVID-19: methods, prospects and challenges34
An optimized feature selection using bio-geography optimization technique for human walking activities recognition33
An optimization scheme for IoT based smart greenhouse climate control with efficient energy consumption33
EELRP: energy efficient layered routing protocol in wireless sensor networks32
A novel blockchain based framework to secure IoT-LLNs against routing attacks32
A survey on meta-heuristic algorithms for the influence maximization problem in the social networks30
VLDNet: Vision-based lane region detection network for intelligent vehicle system using semantic segmentation28
An improved list-based task scheduling algorithm for fog computing environment25
Air pollution prediction based on factory-aware attentional LSTM neural network25
Ubiquitous Health Profile (UHPr): a big data curation platform for supporting health data interoperability25
Trust-driven reinforcement selection strategy for federated learning on IoT devices24
A scheme for intelligent blockchain-based manufacturing industry supply chain management24
Efficient federated learning for fault diagnosis in industrial cloud-edge computing23
Combined oversampling and undersampling method based on slow-start algorithm for imbalanced network traffic23
LSTM based link quality confidence interval boundary prediction for wireless communication in smart grid23
Bearing fault diagnosis based on improved federated learning algorithm23
Feature selection and evaluation for software usability model using modified moth-flame optimization23
K-predictions based data reduction approach in WSN for smart agriculture22
IoT-cloud based healthcare model for COVID-19 detection: an enhanced k-Nearest Neighbour classifier based approach22
Optimal rendezvous points selection to reliably acquire data from wireless sensor networks using mobile sink21
Quality of service provisioning in network function virtualization: a survey21
An overview of queuing delay and various delay based algorithms in networks21
VNE solution for network differentiated QoS and security requirements: from the perspective of deep reinforcement learning21
Strategy-proof mechanism for online resource allocation in cloud and edge collaboration21
Dynamic resource allocation in cloud computing: analysis and taxonomies20
Adaptive ensembles of autoencoders for unsupervised IoT network intrusion detection20
Notions of architecture in fog computing20
The greedy coupled-seeds expansion method for the overlapping community detection in social networks20
On opportunistic software reuse19
GPU-based matrix-free finite element solver exploiting symmetry of elemental matrices19
Towards 5G-based IoT security analysis against Vo5G eavesdropping19
An IoT-enabled smart health care system for screening of COVID-19 with multi layers features fusion and selection19
A framework for Model-Driven Engineering of resilient software-controlled systems18
Optimized SAT encoding of conformance checking artefacts18
Improving healthcare services using source anonymous scheme with privacy preserving distributed healthcare data collection and mining16
Evaluation of fog application placement algorithms: a survey16
Energy-efficient approach to lower the carbon emissions of data centers16
Bio-signal data sharing security through watermarking: a technical survey16
Wireless sensor networks: a survey, categorization, main issues, and future orientations for clustering protocols15
IoT streaming data integration from multiple sources15
A multi-attribute decision making approach for on-demand charging scheduling in wireless rechargeable sensor networks15
Virtual machine migration policy for multi-tier application in cloud computing based on Q-learning algorithm15
A Prior-mask-guided Few-shot Learning for Skin Lesion Segmentation15
Allocation of applications to Fog resources via semantic clustering techniques: with scenarios from intelligent transportation systems14
MDER: modified degree with exclusion ratio algorithm for influence maximisation in social networks14
Anomaly detection in cloud environment using artificial intelligence techniques14
Prediction of link evolution using community detection in social network14
Trust on wheels: Towards secure and resource efficient IoV networks14
Fuzzy logic-based VANET routing method to increase the QoS by considering the dynamic nature of vehicles14
An intelligent healthcare system for predicting and preventing dengue virus infection14
An interdisciplinary approach on efficient virtual microgrid to virtual microgrid energy balancing incorporating data preprocessing techniques13
An efficient gray system theory-based routing protocol for energy consumption management in the Internet of Things using fog and cloud computing13
An overview of data reduction solutions at the edge of IoT systems: a systematic mapping of the literature13
Machine learning-based IoT system for COVID-19 epidemics13
Jointly Optimizing Offloading Decision and Bandwidth Allocation with Energy Constraint in Mobile Edge Computing Environment13
An ECC-based lightweight remote user authentication and key management scheme for IoT communication in context of fog computing12
Time series-based workload prediction using the statistical hybrid model for the cloud environment12
Edge computing12
Coupling multifunction drones with AI in the fight against the coronavirus pandemic12
Machine learning approaches to network intrusion detection for contemporary internet traffic12
Lightweight edge authentication for software defined networks12
Scalable blockchain storage systems: research progress and models12
Road surface type classification based on inertial sensors and machine learning12
Combined use of coral reefs optimization and reinforcement learning for improving resource utilization and load balancing in cloud environments12
The evolution of distributed computing systems: from fundamental to new frontiers11
A weighted K-member clustering algorithm for K-anonymization11
Efficient offloading schemes using Markovian models: a literature review11
A systematic mapping study on automated analysis of privacy policies11
A novel ECC-based provably secure and privacy-preserving multi-factor authentication protocol for cloud computing11
Blockchain-based secure multi-resource trading model for smart marketplace11
Heterogeneous self-tracked health and fitness data integration and sharing according to a linked open data approach11
An approach to dynamically assigning cloud resource considering user demand and benefit of cloud platform11
Performance and availability evaluation of an smart hospital architecture10
Improved label propagation algorithm for overlapping community detection10
Secure FaaS orchestration in the fog: how far are we?10
The impact of biased sampling of event logs on the performance of process discovery10
QoS evaluation model based on intelligent fuzzy system for vehicular ad hoc networks10
Detector-based component model abstraction for microservice-based systems10
A hierarchical formal method for performance evaluation of WSNs protocol10
Multi-objective optimization for VM placement in homogeneous and heterogeneous cloud service provider data centers9
Implementation of an energy saving cloud infrastructure with virtual machine power usage monitoring and live migration on OpenStack9
A self-learning bee colony and genetic algorithm hybrid for cloud manufacturing services9
Task scheduling in edge-fog-cloud architecture: a multi-objective load balancing approach using reinforcement learning algorithm9
Fog-based architecture for scheduling multiple workflows with high availability requirement9
An approach to evaluate trust and reputation of things in a Multi-IoTs scenario9
A prediction-based model for virtual machine live migration monitoring in a cloud datacenter9
Context-aware recommender system using trust network9
IoT-enabled stacked ensemble of deep neural networks for the diagnosis of COVID-19 using chest CT scans9
Special issue on intelligent Edge, Fog, Cloud and Internet of Things (IoT)-based services8
An improved firefly algorithm based on personalized step strategy8
Realizing self-adaptive systems via online reinforcement learning and feature-model-guided exploration8
Novel self-adjusted particle swarm optimization algorithm for feature selection8
A job scheduling algorithm based on rock hyrax optimization in cloud computing8
Users opinion and emotion understanding in social media regarding COVID-19 vaccine8
Rumor detection based on a Source-Replies conversation Tree Convolutional Neural Net8
Internet network location privacy protection with multi-access edge computing8
Energy generation forecasting: elevating performance with machine and deep learning8
Prediction based task scheduling approach for floodplain application in cloud environment8
Sensor network sensing coverage optimization with improved artificial bee colony algorithm using teaching strategy8
Morse glasses: an IoT communication system based on Morse code for users with speech impairments8
Improved approaches for density-based outlier detection in wireless sensor networks8
AwARE: a framework for adaptive recommendation of educational resources7
A novel indoor localization system using machine learning based on bluetooth low energy with cloud computing7
A scalable blockchain network model with transmission paths and neighbor node subareas7
Towards big services: a synergy between service computing and parallel programming7
Enhanced hybrid multi-objective workflow scheduling approach based artificial bee colony in cloud computing7
HPMaX: heterogeneous parallel matrix multiplication using CPUs and GPUs7
Artificial intelligence to automate the systematic review of scientific literature7
RNe2Vec: information diffusion popularity prediction based on repost network embedding7
The impact of copycat attack on RPL based 6LoWPAN networks in Internet of Things7
Machine learning driven intelligent and self adaptive system for traffic management in smart cities7
IEEE 802.15.4 historical revolution versions: A survey7
A conceptual framework for resilience: fundamental definitions, strategies and metrics7
SADM-SDNC: security anomaly detection and mitigation in software-defined networking using C-support vector classification7
A data fusion based data aggregation and sensing technique for fault detection in wireless sensor networks7
Dynamic workload-aware DVFS for multicore systems using machine learning7
Emerging applications of internet of things, big data, security, and complexity: special issue on collaboration opportunity for IoTBDS and COMPLEXIS7
Exploring and optimizing partitioning of large designs for multi-FPGA based prototyping platforms7
HATMOG: an enhanced hybrid task assignment algorithm based on AHP-TOPSIS and multi-objective genetic in cloud computing7
Social characteristics-based routing algorithm for a mobile social network6
FPGA friendly NoC simulation acceleration framework employing the hard blocks6
CovaDel: a blockchain-enabled secure and QoS-aware drone delivery framework for COVID-like pandemics6
A symbiosis between population based incremental learning and LP-relaxation based parallel genetic algorithm for solving integer linear programming models6
Identification of trustworthy cloud services: solution approaches and research directions to build an automated cloud broker6
Energy-efficient workflow scheduling with budget-deadline constraints for cloud6
Constraint aware profit maximization scheduling of tasks in heterogeneous datacenters6
A novel routing method in hybrid DTN–MANET networks in the critical situations6
A BBR-based congestion control for delay-sensitive real-time applications6
An IoT-based contribution to improve mobility of the visually impaired in Smart Cities6
Supervised ensemble sentiment-based framework to measure chatbot quality of services6
Interference Aware Workload Scheduling for Latency Sensitive Tasks in Cloud Environment6
Enhancing knowledge graph embedding by composite neighbors for link prediction6
Smart connected parking lots based on secured multimedia IoT devices6
Deep reinforcement learning based QoE-aware actor-learner architectures for video streaming in IoT environments6
From GPS to semantic data: how and why—a framework for enriching smartphone trajectories6
Seamless computation offloading for mobile applications using an online learning algorithm6
An intelligent resource management method in SDN based fog computing using reinforcement learning5
Modelling resilient collaborative multi-agent systems5
Improving the stability of label propagation algorithm by propagating from low-significance nodes for community detection in social networks5
Ultra-safe and reliable enhanced train-centric communication-based train control system5
A hybrid teaching-learning-based optimization algorithm for QoS-aware manufacturing cloud service composition5
A clustering approach for software defect prediction using hybrid social mimic optimization algorithm5
Analysing environmental impact of large-scale events in public spaces with cross-domain multimodal data fusion5
A reliability estimation framework for cognitive radio V2V communications and an ANN-based model for automating estimations5
Handover authentication latency reduction using mobile edge computing and mobility patterns5
An energy-efficient power management for heterogeneous servers in data centers5
Passive social sensing with smartphones: a systematic review5
Formal model for inter-component communication and its security in android5
An energy efficient multi-mobile agent itinerary planning approach in wireless sensor networks5
A robust tracking system for COVID-19 like pandemic using advanced hybrid technologies5
Exact and sampling methods for mining higher-order motifs in large hypergraphs4
A propagation trust model in social networks based on the A* algorithm and multi-criteria decision making4
Dynamic energy-efficient scheduling for streaming applications in storm4
Detection of data anomalies at the edge of pervasive IoT systems4
Context recognition and ubiquitous computing in smart cities: a systematic mapping4
A novel approach for CPU load prediction of cloud server combining denoising and error correction4
Gravitational search algorithm based on multiple adaptive constraint strategy4
Tutorial on systems with antifragility to downtime4
A framework for modeling and executing task-Specific resource allocations in business processes4
Design of classical-quantum systems with UML4
An energy-efficient and deadline-aware workflow scheduling algorithm in the fog and cloud environment4
Algorithms for path optimizations: a short survey4
Blockchain-based public ecosystem for auditing security of software applications4
Community detection using constrained label propagation algorithm with nodes exemption4
Screening hardware and volume factors in distributed machine learning algorithms on spark4
An efficient framework for trust evaluation of secure service selection in fog computing based on QoS, reputation, and social criteria4
Energy-efficient virtual machine placement algorithm based on power usage4
Optimization of heterogeneous systems with AI planning heuristics and machine learning: a performance and energy aware approach4
A systematic literature review of blockchain-based e-KYC systems4
An efficient SGM based IDS in cloud environment4
A fuzzy arithmetic-based analytical reliability assessment framework (FAARAF): case study, cognitive radio vehicular networks with drivers4
FusionCL: a machine-learning based approach for OpenCL kernel fusion to increase system performance4
How well did it recover? Impact-aware conformance checking4
A model-based approach for planning blockchain service provisioning4
MOHBA:multi-objective workflow scheduling in cloud computing using hybrid BAT algorithm4
Data redundancy management for leaf-edges in connected environments4
POF-SVLM: pareto optimized framework for seamless VM live migration4
Community detection algorithms for recommendation systems: techniques and metrics4
Congestion avoidance in wireless sensor network using software defined network4
Assessment of physiological states from contactless face video: a sparse representation approach4
Toward a design model-oriented methodology to ensure QoS of a cyber-physical healthcare system4
A novel and efficient salp swarm algorithm for large-scale QoS-aware service composition selection4
A method of chained recommendation for charging piles in internet of vehicles4
A novel imbalanced data classification approach for suicidal ideation detection on social media4
Differential privacy distributed learning under chaotic quantum particle swarm optimization4
Hybrid MPI/OpenMP parallel asynchronous distributed alternating direction method of multipliers3
Composing WoT services with uncertain and correlated data3
A context-aware monitoring architecture for supporting system adaptation and reconfiguration3
Prediction of resource contention in cloud using second order Markov model3
Influence ranking of road segments in urban road traffic networks3
Energy-efficient scheduling based on task prioritization in mobile fog computing3
The missing piece: a distributed system-level diagnosis model for the implementation of unreliable failure detectors3
MANIFESTO: a huMAN-centric explaInable approach for FakE news spreaders deTectiOn3
A solution for resource allocation through complex systems in fog computing for the internet of things3
A wrapper method based on a modified two-step league championship algorithm for detecting botnets in IoT environments3
A model-based approach for specifying changes in replications of empirical studies in computer Science3
CMCSF: a collaborative service framework for mobile web augmented reality base on mobile edge computing3
Solving dimension reduction problems for classification using Promoted Crow Search Algorithm (PCSA)3
Ethereum fraud behavior detection based on graph neural networks3
Optimizing security and cost of workflow execution using task annotation and genetic-based algorithm3
Attacks and failures prediction framework for a collaborative 5G mobile network3
SPBench: a framework for creating benchmarks of stream processing applications3
A fault-tolerant time-triggered scheduling algorithm of mixed-criticality systems3
Machine learning using context vectors for object coreference resolution3
Deep neural network learning for power limited heterogeneous system with workload classification3
An adaptive workload-aware power consumption measuring method for servers in cloud data centers3
A parallel text clustering method using Spark and hashing3
An improved grasshopper optimization algorithm based on dynamic dual elite learning and sinusoidal mutation3
Dew computing-assisted cognitive Intelligence-inspired smart environment for diarrhea prediction2
Designing and implementing a Big Data benchmark in a financial context: application to a cash management use case2
A Multi-objective optimization algorithm based on dynamic user-preference information2
Data management in connected environments2
Sensitivity of computational fluid dynamics simulations against soft errors2
A cache-based method to improve query performance of linked Open Data cloud2
Energy load forecasting: one-step ahead hybrid model utilizing ensembling2
Special issue on ‘‘artificial intelligence in cloud computing’’2
Link prediction approach to recommender systems2
Performance modeling of the IEEE 802.15.4e TSCH enabling both shared and dedicated links in industrial WSNs2
Disjoint multipath RPL for QoE/QoS provision in the Internet of Multimedia Things2
A distributed task orchestration scheme in collaborative vehicular cloud edge networks2
A model-based infrastructure for the specification and runtime execution of self-adaptive IoT architectures2
Practical heterogeneous signcryption system for vehicular communication in VANETs2
Cloud services cost comparison: a clustering analysis framework2
A Docker-based federated learning framework design and deployment for multi-modal data stream classification2
Cloud-backed mobile cognition2
Adaptive configuration of IoT applications in the fog infrastructure2
A systematic study on blockchain technology in education: initiatives, products, applications, benefits, challenges and research direction2
Energy efficient UAV enabled harvesting with beamforming for clustered SDWSN2
Research on sentiment classification of futures predictive texts based on BERT2
Illumination-robust feature detection based on adaptive threshold function2
Investigations on the effect of micro-grid using improved NFIS-PID with hybrid algorithms2
Identification of best social media influencers using ICIRS model2
OPHAencoder: An unsupervised approach to identify groups in group recommendations2
Multi-agent system-based fuzzy constraints offer negotiation of workflow scheduling in Fog-Cloud environment2
Checking causal consistency of distributed databases2
Intelligent resource sharing to enable quality of service for network clients: the trade-off between accuracy and complexity2
Disjoint multipath closeness centrality2
0.031373977661133