Zum Inhalt

Cluster Computing

Ausgabe 16/2025

Inhalt (73 Artikel)

MBST: a bad smells testbed for microservice systems

Yongchao Xing, Weipan Yang, Jiaxuan Yin, Dianhui Chu, Zhiying Tu

TBAC-IDS: enhancing intrusion detection with transformer-based alerts correlation

Abdelkader Bouguessa, Sid Ahmed Mokhtar Mostefaoui, Mohamed Amine Daoud, Abdelkader Alem, Said Mekroussi, Moustafa Maasakri, Ahmed Hasan

Orbit-aware task scheduling in satellite edge computing

  • Open Access

Danilo Magliarisi, Emiliano Casalicchio, Vincenzo Salvatore

Ensemble multi-label machine learning solidity smart contract vulnerability detection model

  • Open Access

Rashed Alnuman, Tayyab Sajid, Wesam Almobaideen, Qusai Hasan

A three-tier generative AI workflow for metaverse asset creation

  • Open Access

Rio Mukhtarom Paweroi, Mutawally Syarawy, Mario Köppen

Unique explainable federated learning approach for detecting model poisoning attacks to secure systems

Muhmmad Fizan, Alaa Awad Abdellatif, Muhammad Asad, Muhammad Zubair, Bin Ni, Bin Xu, Xuefeng Liu, Jichuan Xiong, Muhammad Qasim Mehmood

Multi-threaded SIMD strategies and frequency scaling for sustainable evolutionary biology

  • Open Access

Sergio Santander-Jiménez, Miguel A. Vega-Rodríguez

A secure and reliable distributed storage system with multi-factor trust-aware workflow scheduling

Zeeshan Hameed, Claus Pahl, Mohammad Hajian Berenjestanaki, Ibe Van Thillo

AHIBCS: an adaptive historical-information-based client selection algorithm for Non-IID data

Wei Liu, Xu Wang, Bin Wang, Wentao Cui, Zhao Tian, Guangjun Zai

Musk ox optimizer (MO): a novel optimization algorithm and its application

Yongliang Yuan, Guangya Chong, Jianji Ren, Wu Zhao, Yanan Li, Zhenxi Wang, Seyedali Mirjalili

An SGX-based key protection scheme for Hyperledger Fabric

Zhengwei Ren, He Li, Guangxin He, Rongwei Yu, Yan Tong, Shiwei Xu, Li Deng

Resilient automatic model selection for mobility prediction

  • Open Access

Syafiq Al Atiiq, Christian Gehrmann, Karim Khalil, Jakob Sternby, Yachao Yuan

Popularity-based data placement in erasure-coded Edge Storage Systems

  • Open Access

Cosimo Anglano, Massimo Canonico, Rossano Gaeta, Marco Guazzone

EdenDID: an edge computing and blockchain-based decentralized identity system for Web3 applications and DePIN

  • Open Access

Hongbo Liu, Jiannong Cao, Yinfeng Cao, Dongbin Bai, Jinwen Liang, Ruidong Li

Lightweight and hybrid image encryption approach: dynamic anchor blocks selection

Mohammad Alnabhan, Saleem Alsaraireh, Yousef AbuHour, Hatem Mosa, Laith Alshaggah

Study on reliable federated learning model in IoV environments

Xu Wu, Jie Tian, Yuanpeng Li, Guoqiang Zhang, Bin Wen

Research on optimization of brain-controlled typing recognition based on imaginary handwriting

Jiaofen Nan, Panpan Xu, Kaifan Zhang, Qian Xu, Siyuan Zhang, Yongquan Xia, Chuang Han, Duan Li, Yinghui Meng

Combining client-based anomaly detection and federated learning for energy forecasting in smart buildings

Bouchra Fakher, Mohamed el Amine Brahmia, Ismail Bennis, Abdelhafid Abouaissa

Integrated A* and DWA algorithms for emergency rescue path planning

Xingna Hou, Yulan Zhao, Jinshuo Zhang, Shouhong Chen

A write leveling scheme for synchronizing garbage collection in RAID-enabled SSDs

Cheng Zhang, Peixuan Li, Jinkang Lu, Zhu Yuan, Ping Xie

JORAS: joint offloading and resource auto-scaling in edge computing environment

Milad Ghahari-Bidgoli, Mostafa Ghobaei Arani, Ahmad Sharif

Integrating deep learning and statistical models for traffic prediction and accident prevention in smart cities

Yousef O. Sharrab, Basma M. Irtahi, Mohammad Ali H. Eljinini, Izzat Alsmadi

TRCA with sparrow-optimized adaptive filter banks for SSVEP recognition

Jiaofen Nan, Siyuan Zhang, Panpan Xu, Kaifan Zhang, Duan Li, Fubao Zhu, Yanting Li, Yongquan Xia, Yinghui Meng

Beyond the hype: exploring the impact, challenges, and potential of large language models in healthcare

Hafiz Farooq Ahmad, Junaid Sajid, Raihan Ur Rasool, Asad Waqar Malik

Digital twins enabled privacy preserving remote vital signs monitoring

Maemoona Kayani, Abdul Ghafoor, M. Mohsin Riaz, Fawad Khan

AdaptFedDS: adaptive federated learning edge devices selection by using a light-dual reinforcement learning approach

Fazeleh Tavassolian, Mahdi Abbasi, Abbas Ramezani, Atefeh Salimi, Amir Taherkordi, M. Reza Khosravi

    Bildnachweise
    AvePoint Deutschland GmbH/© AvePoint Deutschland GmbH, ams.solutions GmbH/© ams.solutions GmbH, Wildix/© Wildix, arvato Systems GmbH/© arvato Systems GmbH, Ninox Software GmbH/© Ninox Software GmbH, Nagarro GmbH/© Nagarro GmbH, GWS mbH/© GWS mbH, CELONIS Labs GmbH, USU GmbH/© USU GmbH, G Data CyberDefense/© G Data CyberDefense, Vendosoft/© Vendosoft, Kumavision/© Kumavision, Noriis Network AG/© Noriis Network AG, WSW Software GmbH/© WSW Software GmbH, tts GmbH/© tts GmbH, Asseco Solutions AG/© Asseco Solutions AG, AFB Gemeinnützige GmbH/© AFB Gemeinnützige GmbH, Ferrari electronic AG/© Ferrari electronic AG, Doxee AT GmbH/© Doxee AT GmbH , Haufe Group SE/© Haufe Group SE, NTT Data/© NTT Data