Search

Current filters:
Add Filter:

Results

Customise results display
Item hits:
Issue DateTitleAuthor(s)
2018-12-01Comparing time series with machine learning-based prediction approaches for violation management in cloud SLAsHussain, W; Hussain, FK; Saberi, M; Hussain, OK; Chang, E
-Tensor mutual information and its applicationsLu, L; Ren, X; Cui, C; Luo, Y; Huang, M
2019-10-10Static malware clustering using enhanced deep embedding methodNg, CK; Jiang, F; Zhang, LY; Zhou, W
2019-11-01Edge-based stochastic network model reveals structural complexity of edgesZhai, X; Zhou, W; Fei, G; Lu, C; Wen, S; Hu, G
2019-12-10Targeting malware discrimination based on reversed association taskHan, L; Zhou, M; Han, S; Jia, W; Sun, C; Fu, C
2018-01-01Privacy-preserving matrix product based static mutual exclusive roles constraints violation detection in interoperable role-based access controlLiu, M; Luo, Y; Yang, C; Pang, S; Puthal, D; Ren, K; Zhang, X
2019-11-01Stackelberg model based game theory approach for assortment and selling price planning for small scale online retailersSaberi, Z; Saberi, M; Hussain, O; Chang, E
2018-05-01Cost optimization for deadline-aware scheduling of big-data processing jobs on cloudsZheng, W; Qin, Y; Bugingo, E; Zhang, D; Chen, J
2019-02-01Energy-efficient and traffic-aware service function chaining orchestration in multi-domain networksSun, G; Li, Y; Yu, H; Vasilakos, AV; Du, X; Guizani, M
2017-05-01A novel oriented cuckoo search algorithm to improve DV-Hop performance for cyber–physical systemsCui, Z; Sun, B; Wang, G; Xue, Y; Chen, J
Results 51-60 of 166 (Search time: 0.147 seconds).