An adaptive and deadline-constrained workflow scheduling algorithm in infrastructure as a service clouds | 0 | 0.34 | 2022 |
Robust Fuzzy Rough Set Based Dimensionality Reduction For Big Multimedia Data Hashing And Unsupervised Generative Learning | 0 | 0.34 | 2021 |
Processor Sharing Queues With Impatient Customers and State-Dependent Rates | 0 | 0.34 | 2021 |
Dynamic Vnf Placement, Resource Allocation And Traffic Routing In 5g | 3 | 0.43 | 2021 |
Availability Modeling In Redundant Openstack Private Clouds | 0 | 0.34 | 2021 |
A Framework For Protecting Privacy On Mobile Social Networks | 0 | 0.34 | 2021 |
Secure data aggregation methods and countermeasures against various attacks in wireless sensor networks: A comprehensive review | 2 | 0.37 | 2021 |
Network and Application-Aware Cloud Service Selection in Peer-Assisted Environments | 0 | 0.34 | 2021 |
Web Service Quality Of Service Prediction Via Regional Reputation-Based Matrix Factorization | 0 | 0.34 | 2021 |
Modeling and Evaluation of Multi-Hop Wireless Networks Using SRNs | 0 | 0.34 | 2021 |
Verivanca Framework: Verification Of Vanets By Property-Based Message Passing Of Actors In Rebeca With Inheritance | 0 | 0.34 | 2020 |
Lightweight Formal Method for Robust Routing in Track-based Traffic Control Systems | 0 | 0.34 | 2020 |
Modeling and Evaluation of Service Composition in Commercial Multiclouds Using Timed Colored Petri Nets | 1 | 0.36 | 2020 |
Designing a MapReduce performance model in distributed heterogeneous platforms based on benchmarking approach | 0 | 0.34 | 2020 |
A lightweight signcryption scheme for defense against fragment duplication attack in the 6LoWPAN networks. | 0 | 0.34 | 2019 |
Correction to: A lightweight signcryption scheme for defense against fragment duplication attack in the 6LoWPAN networks. | 0 | 0.34 | 2019 |
A budget constrained scheduling algorithm for executing workflow application in infrastructure as a service clouds. | 3 | 0.37 | 2019 |
Symbolic checking of Fuzzy CTL on Fuzzy Program Graph | 0 | 0.34 | 2019 |
VeriVANca: An Actor-Based Framework for Formal Verification of Warning Message Dissemination Schemes in VANETs. | 0 | 0.34 | 2019 |
Analytical composite performance models for Big Data applications. | 2 | 0.38 | 2019 |
A uniformization-based algorithm for continuous-time stochastic games model checking. | 0 | 0.34 | 2019 |
Performance Evaluation of Epidemic Content Retrieval in DTNs with Restricted Mobility | 1 | 0.35 | 2019 |
Efficient distribution of requests in federated cloud computing environments utilizing statistical multiplexing. | 1 | 0.36 | 2019 |
Poster: Impact of traffic characteristics on request aggregation in an NDN router | 0 | 0.34 | 2019 |
Hierarchical Stochastic Models for Performance, Availability, and Power Consumption Analysis of IaaS Clouds | 9 | 0.48 | 2019 |
Semantic Data Gathering Of Physical Entities In Semantic Sensor Networks Using Software Agents | 0 | 0.34 | 2018 |
TSRN: A Tabu Search-Based Routing Protocol for Named Data Networking | 0 | 0.34 | 2018 |
Power-aware performance analysis of self-adaptive resource management in IaaS clouds. | 4 | 0.43 | 2018 |
Throughput Analysis of IEEE 802.11 Multi-hop Wireless Networks with Routing Consideration: A General Framework. | 2 | 0.37 | 2018 |
Time-Cost Efficient Scheduling Algorithms for Executing Workflow in Infrastructure as a Service Clouds. | 0 | 0.34 | 2018 |
Fully distributed ECC-based key management for mobile ad hoc networks. | 3 | 0.39 | 2017 |
Pancyclicity of OTIS (swapped) networks based on properties of the factor graph | 2 | 0.36 | 2011 |
On pancyclicity properties of OTIS-mesh | 5 | 0.40 | 2011 |
Analysis of a dynamic assignment of impatient customers to parallel queues | 0 | 0.34 | 2011 |
Failure-based equivalence of constraint automata | 1 | 0.35 | 2010 |
Mobility Aware Distributed Topology Control in Mobile Ad-Hoc Networks Using Mobility Pattern Matching | 1 | 0.39 | 2009 |
Performance Modeling of Fault Tolerant Fully Adaptive Wormhole Switching 2-D Meshes in Presence of Virtual Channels | 1 | 0.35 | 2008 |
Anonymous authentication protocol for GSM networks | 13 | 0.53 | 2008 |
Intrusion Detection: A Survey | 17 | 0.80 | 2008 |
Efficient symmetry reduction for an actor-based model | 11 | 0.53 | 2005 |
Simulation in Rebeca | 2 | 0.55 | 2002 |
Stochastic Activity Networks: Structure, Behavior, and Application | 113 | 16.63 | 1985 |