Ausgabe 2/2021
Inhalt (18 Artikel)
Migration of existing software systems to mobile computing platforms: a systematic mapping study
Ibrahim Alseadoon, Aakash Ahmad, Adel Alkhalil, Khalid Sultan
Evolutionary selection for regression test cases based on diversity
Baoying Ma, Li Wan, Nianmin Yao, Shuping Fan, Yan Zhang
Integrating heterogeneous thesauruses for Chinese synonyms
Jianbing Zhang, Peng Wu, Yingjie Zhang, Shujian Huang, Xinyu Dai, Jiajun Chen
An automated framework for advertisement detection and removal from sports videos using audio-visual cues
Abeer Toheed, Ali Javed, Aun Irtaza, Hassan Dawood, Hussain Dawood, Ahmed S. Alfakeeh
iMass: an approximate adaptive clustering algorithm for dynamic data using probability based dissimilarity
Panthadeep Bhattacharjee, Pinaki Mitra
Task assignment for social-oriented crowdsourcing
Gang Wu, Zhiyong Chen, Jia Liu, Donghong Han, Baiyou Qiao
Attention based simplified deep residual network for citywide crowd flows prediction
Genan Dai, Xiaoyang Hu, Youming Ge, Zhiqing Ning, Yubao Liu
Hierarchical data replication strategy to improve performance in cloud computing
Najme Mansouri, Mohammad Masoud Javidi, Behnam Mohammad Hasani Zade
An evaluation and query algorithm for the influence of spatial location based on RkNN
Jingke Xu, Yidan Zhao, Ge Yu
Accurate and efficient follower log repair for Raft-replicated database systems
Jinwei Guo, Peng Cai, Weining Qian, Aoying Zhou
Optimal location query based on k nearest neighbours
Yubao Liu, Zitong Chen, Ada Wai-Chee Fu, Raymond Chi-Wing Wong, Genan Dai
DFD-Net: lung cancer detection from denoised CT scan image using deep learning
Worku J. Sori, Jiang Feng, Arero W. Godana, Shaohui Liu, Demissie J. Gelmecha
A proactive secret sharing scheme based on Chinese remainder theorem
Keju Meng, Fuyou Miao, Yu Ning, Wenchao Huang, Yan Xiong, Chin-Chen Chang
Ethereum smart contract security research: survey and future research opportunities
Zeli Wang, Hai Jin, Weiqi Dai, Kim-Kwang Raymond Choo, Deqing Zou
On designing an unaided authentication service with threat detection and leakage control for defeating opportunistic adversaries
Nilesh Chakraborty, Samrat Mondal
Simple index based symmetric searchable encryption with result verifiability
Dhruti Sharma, Devesh Jinwala
Predicting protein subchloroplast locations: the 10th anniversary
Jian Sun, Pu-Feng Du