| 1. |
Enhancing Performance and Energy Efficiency for Hybrid Workloads in Virtualized Cloud Environment |
 |
| 2. |
Aggregation-Based Co- location Datacenter Energy Management in Wholesale Markets |
 |
| 3. |
Improving Privacy and Security in Decentralizing Multi-Authority Attribute-Based Encryption in Cloud Computing |
 |
| 4. |
Secured outsourcing towards a cloud computing environment based on DNA cryptography
|
 |
| 5. |
CLASS: Cloud Log Assuring Soundness and Secrecy Scheme for Cloud Forensics |
 |
| 6. |
Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage Efficient Retrieval over Documents Encrypted by Attributes in Cloud Computing
|
 |
| 7. |
Data security in cloud computing using AES |
 |
| 8. |
Efficient Client-Side Deduplication of Encrypted Data With Public Auditing in Cloud Storage |
 |
| 9. |
An Efficient Multi-User Searchable Encryption Scheme without Query Transformation Over Outsourced |
 |
| 10. |
Efficient Traceable Authorization Search system cloud storage |
 |
| 11. |
A Key-Policy Attribute-Based Temporary Keyword Search scheme for Secure Cloud Storage |
 |
| 12. |
Dynamic VM Scaling: Provisioning and Pricing through an Online Auction |
 |
| 13. |
Efficient Algorithm for Secure Outsourcing of Modular Exponentiation with Single Server |
 |
| 14. |
Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Data Dynamics in Cloud Storage |
 |
| 15. |
SeSPHR: A Methodology for Secure Sharing of Personal Health Records in the Cloud |
 |
| 16. |
Energy Efficient Scheduling of Servers with Multi-Sleep Modes for Cloud Data Center |
 |
| 17. |
Aggregation-Based Colocation Datacenter Energy Management in Wholesale Markets |
 |
| 18. |
Provably secure and lightweight identity based authenticated data sharing protocol for the cyber-physical cloud environment |
 |
| 19. |
Disaggregated Cloud Memory with Elastic Block Management |
 |
| 20. |
A New Lightweight Symmetric Searchable Encryption Scheme for String Identification |
 |
| 21. |
Security Analysis of Smartphone and Cloud Computing Authentication Frameworks and Protocols |
 |
| 22. |
Hierarchical Cloud Computing Architecture for Context-Aware IoT Services
|
 |
| 23. |
Data security in cloud computing using AES under HEROKU cloud
|
 |
| 24. |
Impacts of public transportation fare reduction policy on urban public transport sharing rate based on big data analysis
|
 |
| 25. |
Ensemble learning methods for power system cyber-attack detection |
 |
| 26. |
Secure and Efficient Privacy-Preserving Cipher text Retrieval in Connected Vehicular Cloud Computing |
 |
| 27. |
Security and QoS guarantee-based resource allocation within cloud computing environment |
 |
| 28. |
Designing and evaluating hybrid storage for high performance cloud computing |
 |
| 29. |
Energy Efficient and Deadline Satisfied Task Scheduling in Mobile Cloud Computing
|
 |
| 30. |
Reliability Enhancement in Cloud Computing Via Optimized Job Scheduling Implementing Reinforcement Learning Algorithm and Queuing Theory |
 |
| 31. |
A VHO scheme for supporting healthcare services in 5G vehicular cloud computing systems |
 |
| 32. |
TZ-KMS: A Secure Key Management Service for Joint Cloud Computing with ARM TrustZone |
 |
| 33. |
An Efficient Parallel Implicit Solver for LOD-FDTD Algorithm in Cloud Computing Environment |
 |
| 34. |
Design and implementation of vsStor: A large-scale video surveillance storage system/a> |
 |
| 35. |
DwarfGC: A Space-Efficient and Crash-Consistent Garbage Collector in NVM for Cloud Computing |
 |
| 36. |
A Novel Forwarding Policy under Cloud Radio Access Network with Mobile Edge Computing Architecture |
 |
| 37. |
Prediction Based Mobile Data Offloading in Mobile Cloud Computing |
 |
| 38. |
Transparency service model for data security in cloud computing |
 |
| 39. |
Secured outsourcing towards a cloud computing environment based on DNA cryptography |
 |
| 40. |
Multi-user Multi-task Computation Offloading in Green Mobile Edge Cloud Computing |
 |
| 41. |
Intelligent Health Vessel ABC-DE: An Electrocardiogram Cloud Computing Service |
 |
| 42. |
Reducing Energy Consumption With Cost Budget Using Available Budget Preassignment in Heterogeneous Cloud Computing Systems |
 |
| 43. |
Efficient Retrieval Over Documents Encrypted by Attributes in Cloud Computing |
 |
| 44. |
Competitions Among Service Providers in Cloud Computing: A New Economic Model |
 |
| 45. |
Provably Secure Fine-Grained Data Access Control over Multiple Cloud Servers in Mobile Cloud Computing Based Healthcare Applications |
 |
| 46. |
Context-aware reinforcement learning-based mobile cloud computing for Telemonitoring |
 |
| 47. |
Scene text detection based on enhanced multi-channels MSER and a fast text grouping process |
 |
| 48. |
SMDP-Based Coordinated Virtual Machine Allocations in Cloud-Fog Computing Systems |
 |
| 49. |
Component Importance Analysis of Mobile Cloud Computing System in the Presence of Common-Cause Failures |
 |
| 50. |
Improving Privacy and Security in Decentralizing Multi-Authority Attribute-Based Encryption in Cloud Computing |
 |
| 51. |
Impacts of public transportation fare reduction policy on urban public transport sharing rate based on big data analysis
|
 |
| 52. |
System design for predictive road-traffic information delivery using edge-cloud computing |
 |
| 53. |
Secure and Efficient Product Information Retrieval in Cloud Computing |
 |
| 54. |
A Distributed Truthful Auction Mechanism for Task Allocation in Mobile Cloud Computing |
 |
| 55. |
Semantic-Aware Searching Over Encrypted Data for Cloud Computing |
 |
| 56. |
An Efficient and Privacy-Preserving Biometric Identification Scheme in Cloud Computing |
 |
| 57. |
An Offloading Strategy in Mobile Cloud Computing Considering Energy and Delay Constraints |
 |
| 58. |
Security analysis of homomorphic encryption scheme for cloud computing: Known-plaintext attack |
 |
| 59. |
Providing Healthcare-as-a-Service Using Fuzzy Rule-Based Big Data Analytics in Cloud Computing |
 |
| 60. |
Empirical analysis on key influential factors on cultural hegemony construction based on big data |
 |
| 61. |
Box office forecasting for a cinema with movie and cinema attributes |
 |
| 62. |
Text sentiment analysis based on multi-granularity joint solution |
 |
| 63. |
Community detection based on unified Bayesian nonnegative matrix factorization |
 |
| 64. |
Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services |
 |
| 65. |
On the Security of a Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services |
 |
| 66. |
Fair Resource Allocation for Data-Intensive Computing in the Cloud |
 |
| 67. |
Towards Privacy-Preserving Content-Based Image Retrieval in Cloud Computing |
 |
| 68. |
Catch You if You Misbehave: Ranked Keyword Search Results Verification in Cloud Computing |
 |
| 69. |
MapReduce Scheduling for Deadline-Constrained Jobs in Heterogeneous Cloud Computing Systems |
 |
| 70. |
Data Transfer Scheduling for Maximizing Throughput of Big-Data Computing in Cloud Systems |
 |
| 71. |
Adaptive Resource Management for Analyzing Video Streams from Globally Distributed Network Cameras |
 |
| 72. |
Privacy-Preserving Image Processing in the Cloud |
 |
| 73. |
A Key-Policy Attribute-Based Temporary Keyword Search scheme for Secure Cloud Storage |
 |
| 74. |
Provably secure and lightweight identity-based authenticated data sharing protocol for cyber-physical cloud environment |
 |
| 75. |
Message integration and optimization based on substation monitoring information source-side maintenance |
 |
| 76. |
On the Security of a Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services |
 |
| 77. |
Automatic Segmentation of Dynamic Network Sequences with Node Labels |
 |
| 78. |
Complementary Aspect-Based Opinion Mining |
 |
| 79. |
Frog Asynchronous Graph Processing on GPU with Hybrid Coloring Model |
 |
| 80. |
Local and Global Structure Preservation for Robust Unsupervised Spectral Feature Selection |
 |
| 81. |
Mining Precise Positioning Episode Rules from Event Sequences |
 |
| 82. |
THINKER Entity Linking System for the Turkish Language |
 |
| 83. |
Topic Models for Unsupervised Cluster Matching |
 |
| 84. |
UniWalk Unidirectional Random Walk Based Scalable SimRank Computation over Large Graph |
 |
| 85. |
Weakly Supervised Deep Embedding for Product Review Sentiment Analysis |
 |
| 86. |
Provably secure and lightweight identity based authenticated data sharing protocol for the cyber-physical cloud environment |
 |
| 87. |
Combining web data extraction and data mining techniques to discover knowledge |
 |
| 88. |
Data stream mining in fog computing environment with feature selection using ensemble of swarm search algorithms |
 |
| 89. |
A brief analysis of the key technologies and applications of educational data mining on online learning platform
|
 |
| 90. |
Association rules mining analysis of app usage based on mobile traffic flow data |
 |
| 91. |
Using data mining technique to improve billing system performance in semiconductor industry |
 |
| 92. |
A technique to aggregate classes of analog fault diagnostic data based on association rule mining |
 |
| 93. |
Data mining technique with cluster anaysis use K-means algorithm for LQ45 index on Indonesia stock exchange |
 |
| 94. |
Algorithm Optimization of Anomaly Detection Based on Data Mining |
 |
| 95. |
Corporate Communication Network and Stock Price Movements: Insights From Data Mining |
 |
| 96. |
Evaluation of predictive data mining algorithms in soil data classification for optimized crop recommendation |
 |
| 97. |
Using Data Mining to Predict Hospital Admissions From the Emergency Department |
 |
| 98. |
Privacy preserving big data mining: association rule hiding using fuzzy logic approach |
 |
| 99. |
Event detection and identification of influential spreaders in social media data streams |
 |
| 100. |
Online Internet traffic monitoring system using spark streaming |
 |
| 101. |
Location prediction on trajectory data: A review |
 |
| 102. |
Get To The Point: Summarization with Pointer-Generator Networks |
 |
| 103. |
Security Using Image Processing And Deep Convolutional Neural Networks |
 |
| 104. |
Research of Image Processing Methods in Publishing Output Systems |
 |
| 105. |
Privacy-preserving Image Processing in the Cloud |
 |
| 106. |
Measuring Scour Level using Image Processing |
 |
| 107. |
Image Processing Based Proposed Drone for Detecting and Controlling Street Crimes |
 |
| 108. |
Efficient image steganography using graph signal processing |
 |
| 109. |
A Design Tool for High Performance Image Processing on Multi core Platforms |
 |
| 110. |
Separable and Reversible Data Hiding in Encrypted Images using Parametric Binary Tree Labeling |
 |
| 111. |
Spatial and Motion Saliency Prediction Method Using Eye Tracker Data for Video Summarization |
 |
| 112. |
Robust Foreground Estimation via Structured Gaussian Scale Mixture Modeling |
 |
| 113. |
Robust Coverless Image Steganography Based on DCT and LDA Topic Classification |
 |
| 114. |
Robust and Fast Decoding of High Capacity Color QR Codes for Mobile Applications |
 |
| 115. |
A service migration strategy based on multiple attribute decision in mobile edge computing |
 |
| 116. |
SaW: Video Analysis in Social Media with Web-Based Mobile Grid Computing |
 |
| 117. |
MAGA: A Mobility-Aware Computation Offloading Decision for Distributed Mobile Cloud Computing |
 |
| 118. |
Fair Resource Allocation for System Throughput Maximization in Mobile Edge Computing |
 |
| 119. |
Classification and Mapping of Adaptive Security for Mobile Computing |
 |
| 120. |
COAST: A Cooperative Storage Framework for Mobile Transparent Computing Using Device-to-Device Data Sharing |
 |
| 121. |
Energy Efficient and Deadline Satisfied Task Scheduling in Mobile Cloud Computing |
 |
| 122. |
A framework for efficient and secured mobility of IoT devices in mobile edge computing |
 |
| 123. |
Task offloading and resource allocation in mobile-edge computing system |
 |
| 124. |
Decentralized and Optimal Resource Cooperation in Geo-Distributed Mobile Cloud Computing |
 |
| 125. |
Auction-Based Resource Allocation for Sharing Cloudlets in Mobile Cloud Computing |
 |
| 126. |
Protecting Location Privacy for Task Allocation in Ad Hoc Mobile Cloud Computing |
 |
| 127. |
On the Security of a Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services |
 |
| 128. |
Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services |
 |
| 129. |
Throughput-Optimal Broadcast in Wireless Networks with Dynamic Topology |
 |
| 130. |
Efficiency network construction of advanced metering infrastructure using Zigbee |
 |
| 131. |
Differentially Private Mechanisms for Budget Limited Mobile Crowdsourcing |
 |
| 132. |
Reward or Penalty: Aligning Incentives of Stakeholders in Crowdsourcing |
 |
| 133. |
Providing Task Allocation and Secure Deduplication for Mobile Crowdsensing via Fog Computing |
 |
| 134. |
A Distributed Truthful Auction Mechanism for Task Allocation in Mobile Cloud Computing |
 |
| 135. |
Joint latent dirichlet allocation for social tags |
 |
| 136. |
Mobile multimedia health applications and their potential impacton the human population |
 |