Li, Keqin On the profits of competing cloud service providers: a game theoretic approach. (English) Zbl 07304644 J. Comput. Syst. Sci. 117, 130-153 (2021). MSC: 68 PDF BibTeX XML Cite \textit{K. Li}, J. Comput. Syst. Sci. 117, 130--153 (2021; Zbl 07304644) Full Text: DOI
Rb, Madhumala; Tiwari, Harshvardhan; Devarajaverma, C. A reliable frame work for virtual machine selection in cloud datacenter using particle swarm optimization. (English) Zbl 07293318 Int. J. Math. Comput. Sci. 16, No. 2, 677-685 (2021). MSC: 68W50 PDF BibTeX XML Cite \textit{M. Rb} et al., Int. J. Math. Comput. Sci. 16, No. 2, 677--685 (2021; Zbl 07293318) Full Text: Link
Hu, Zhigang; Xiao, Hui; Li, Keqin Virtual machine consolidation algorithm based on multi-objective optimization in cloud computing. (Chinese. English summary) Zbl 07295344 J. Hunan Univ., Nat. Sci. 47, No. 2, 116-124 (2020). MSC: 68W99 90C29 PDF BibTeX XML Cite \textit{Z. Hu} et al., J. Hunan Univ., Nat. Sci. 47, No. 2, 116--124 (2020; Zbl 07295344) Full Text: DOI
Wu, Zhengbin; Peng, Yeping; Cao, Guangzhong; Cao, Shupeng Object three-dimensional reconstruction based on KLT multi-view feature tracking. (Chinese. English summary) Zbl 07295321 J. Hefei Univ. Technol., Nat. Sci. 43, No. 7, 901-906 (2020). MSC: 94A08 68U10 PDF BibTeX XML Cite \textit{Z. Wu} et al., J. Hefei Univ. Technol., Nat. Sci. 43, No. 7, 901--906 (2020; Zbl 07295321) Full Text: DOI
Ivashko, E. E.; Ivashko, A. A.; Safonov, G. R.; Tchernykh, A. Cost-efficient strategy in clouds with spot price uncertainty. (English. Russian original) Zbl 07294447 Autom. Remote Control 81, No. 4, 731-745 (2020); translation from Mat. Teor. Igr Prilozh. 11, No. 3, 5-30 (2019). MSC: 91B26 91B24 PDF BibTeX XML Cite \textit{E. E. Ivashko} et al., Autom. Remote Control 81, No. 4, 731--745 (2020; Zbl 07294447); translation from Mat. Teor. Igr Prilozh. 11, No. 3, 5--30 (2019) Full Text: DOI
Dong, Bin; Ju, Haocheng; Lu, Yiping; Shi, Zuoqiang CURE: curvature regularization for missing data recovery. (English) Zbl 07292252 SIAM J. Imaging Sci. 13, No. 4, 2169-2188 (2020). MSC: 62H35 62D10 65D18 68U10 58C40 58J50 PDF BibTeX XML Cite \textit{B. Dong} et al., SIAM J. Imaging Sci. 13, No. 4, 2169--2188 (2020; Zbl 07292252) Full Text: DOI
Guo, Zhiling; Li, Jin; Ramesh, Ram Scalable, adaptable, and fast estimation of transient downtime in virtual infrastructures using convex decomposition and sample path randomization. (English) Zbl 1451.90039 INFORMS J. Comput. 32, No. 2, 321-345 (2020). MSC: 90B18 60J80 93A14 PDF BibTeX XML Cite \textit{Z. Guo} et al., INFORMS J. Comput. 32, No. 2, 321--345 (2020; Zbl 1451.90039) Full Text: DOI
Swain, Chinmaya Kumar; Gupta, Bhawana; Sahu, Aryabartta Constraint aware profit maximization scheduling of tasks in heterogeneous datacenters. (English) Zbl 07276794 Computing 102, No. 10, 2229-2255 (2020). MSC: 68M20 68W40 90B35 PDF BibTeX XML Cite \textit{C. K. Swain} et al., Computing 102, No. 10, 2229--2255 (2020; Zbl 07276794) Full Text: DOI
Avin, Chen; Bienkowski, Marcin; Loukas, Andreas; Pacut, Maciej; Schmid, Stefan Dynamic balanced graph partitioning. (English) Zbl 07267908 SIAM J. Discrete Math. 34, No. 3, 1791-1812 (2020). MSC: 68R10 68W05 68W40 68Q25 PDF BibTeX XML Cite \textit{C. Avin} et al., SIAM J. Discrete Math. 34, No. 3, 1791--1812 (2020; Zbl 07267908) Full Text: DOI
Zhao, Yi; Qian, Yurong; Yang, Xingyao; Wang, Lijuan Spatio-temporal data query based on quadtree and R+Tree composite index. (Chinese. English summary) Zbl 07267204 J. Xinjiang Univ., Nat. Sci. 37, No. 1, 49-54, 74 (2020). MSC: 68P20 PDF BibTeX XML Cite \textit{Y. Zhao} et al., J. Xinjiang Univ., Nat. Sci. 37, No. 1, 49--54, 74 (2020; Zbl 07267204) Full Text: DOI
Su, Mang; Wu, Bin; Fu, Anmin; Yu, Yan; Zhang, Gongxuan Assured update scheme of authorization for cloud data access based on proxy re-encryption. (Chinese. English summary) Zbl 07267137 J. Softw. 31, No. 5, 1563-1572 (2020). MSC: 68P25 68M11 PDF BibTeX XML Cite \textit{M. Su} et al., J. Softw. 31, No. 5, 1563--1572 (2020; Zbl 07267137) Full Text: DOI
Wang, Han; Wang, Xu’an; Zhou, Neng; Liu, Yudong Blockchain based public verifiable scheme for sharing data. (Chinese. English summary) Zbl 07266758 J. Guangxi Norm. Univ., Nat. Sci. 38, No. 2, 1-7 (2020). MSC: 68P20 68P25 PDF BibTeX XML Cite \textit{H. Wang} et al., J. Guangxi Norm. Univ., Nat. Sci. 38, No. 2, 1--7 (2020; Zbl 07266758) Full Text: DOI
Breschi, Valentina; Bemporad, Alberto; Kolmanovsky, Ilya V. Cooperative constrained parameter estimation by ADMM-RLS. (English) Zbl 1448.93290 Automatica 121, Article ID 109175, 14 p. (2020). MSC: 93D50 93E24 93C83 93B70 68M11 PDF BibTeX XML Cite \textit{V. Breschi} et al., Automatica 121, Article ID 109175, 14 p. (2020; Zbl 1448.93290) Full Text: DOI
Alavizadeh, Hooman; Alavizadeh, Hootan; Kim, Dong Seong; Jang-Jaccard, Julian; Torshiz, Masood Niazi An automated security analysis framework and implementation for MTD techniques on cloud. (English) Zbl 1446.68024 Seo, Jae Hong (ed.), Information security and cryptology – ICISC 2019. 22nd international conference, Seoul, South Korea, December 4–6, 2019. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11975, 150-164 (2020). MSC: 68M25 PDF BibTeX XML Cite \textit{H. Alavizadeh} et al., Lect. Notes Comput. Sci. 11975, 150--164 (2020; Zbl 1446.68024) Full Text: DOI
Gorbunova, A. V.; Lebedev, A. V. Bivariate distributions of maximum remaining service times in fork-join infinite-server queues. (English. Russian original) Zbl 1447.60135 Probl. Inf. Transm. 56, No. 1, 73-90 (2020); translation from Probl. Peredachi Inf. 56, No. 1, 80-98 (2020). MSC: 60K25 68M20 PDF BibTeX XML Cite \textit{A. V. Gorbunova} and \textit{A. V. Lebedev}, Probl. Inf. Transm. 56, No. 1, 73--90 (2020; Zbl 1447.60135); translation from Probl. Peredachi Inf. 56, No. 1, 80--98 (2020) Full Text: DOI
Ergün, Serap; Kırlar, Bariş Bülent; Alparslan Gök, Sırma Zeynep; Weber, Gerhard-Wilhelm An application of crypto cloud computing in social networks by cooperative game theory. (English) Zbl 1449.91077 J. Ind. Manag. Optim. 16, No. 4, 1927-1941 (2020). MSC: 91D30 68M11 68P25 94A60 91A12 91A80 PDF BibTeX XML Cite \textit{S. Ergün} et al., J. Ind. Manag. Optim. 16, No. 4, 1927--1941 (2020; Zbl 1449.91077) Full Text: DOI
Rybakin, Boris; Goryachev, Valery Shape morphing in molecular cloud-cloud collision affected by coherent instabilities. (English) Zbl 07211842 Comput. Fluids 205, Article ID 104549, 7 p. (2020). MSC: 76 PDF BibTeX XML Cite \textit{B. Rybakin} and \textit{V. Goryachev}, Comput. Fluids 205, Article ID 104549, 7 p. (2020; Zbl 07211842) Full Text: DOI
Ali, Mohammad; Mohajeri, Javad; Sadeghi, Mohammad-Reza; Liu, Ximeng A fully distributed hierarchical attribute-based encryption scheme. (English) Zbl 1436.68094 Theor. Comput. Sci. 815, 25-46 (2020). Reviewer: Ion Iancu (Craiova) MSC: 68P25 68M11 68M25 94A60 PDF BibTeX XML Cite \textit{M. Ali} et al., Theor. Comput. Sci. 815, 25--46 (2020; Zbl 1436.68094) Full Text: DOI
Sun, Yinxia; Mu, Yi; Susilo, Willy; Zhang, Futai; Fu, Anmin Revocable identity-based encryption with server-aided ciphertext evolution. (English) Zbl 1436.68098 Theor. Comput. Sci. 815, 11-24 (2020). Reviewer: Ion Iancu (Craiova) MSC: 68P25 14G50 68M11 68M25 94A60 PDF BibTeX XML Cite \textit{Y. Sun} et al., Theor. Comput. Sci. 815, 11--24 (2020; Zbl 1436.68098) Full Text: DOI
Lavi, Nadav; Levy, Hanoch Admit or preserve? Addressing server failures in cloud computing task management. (English) Zbl 1433.90184 Queueing Syst. 94, No. 3-4, 279-325 (2020). MSC: 90C40 90B22 93E03 PDF BibTeX XML Cite \textit{N. Lavi} and \textit{H. Levy}, Queueing Syst. 94, No. 3--4, 279--325 (2020; Zbl 1433.90184) Full Text: DOI
Liu, Gang; Xiao, Zheng; Tan, GuangHua; Li, Kenli; Chronopoulos, Anthony Theodore Game theory-based optimization of distributed idle computing resources in cloud environments. (English) Zbl 1436.68045 Theor. Comput. Sci. 806, 468-488 (2020). MSC: 68M14 68M20 91A06 91A10 91A30 91A80 PDF BibTeX XML Cite \textit{G. Liu} et al., Theor. Comput. Sci. 806, 468--488 (2020; Zbl 1436.68045) Full Text: DOI
Doan, Xuan Vinh; Lei, Xiao; Shen, Siqian Pricing of reusable resources under ambiguous distributions of demand and service time with emerging applications. (English) Zbl 1430.90014 Eur. J. Oper. Res. 282, No. 1, 235-251 (2020). MSC: 90B05 91B24 PDF BibTeX XML Cite \textit{X. V. Doan} et al., Eur. J. Oper. Res. 282, No. 1, 235--251 (2020; Zbl 1430.90014) Full Text: DOI
Yang, Hongjiu; Ju, Shuang; Zhang, Jinhui; Yuan, Huanhuan Model predictive control for cloud-integrated networked multiagent systems under bandwidth allocation. (English) Zbl 07284162 Inf. Sci. 500, 156-172 (2019). MSC: 93B45 93A16 93B70 PDF BibTeX XML Cite \textit{H. Yang} et al., Inf. Sci. 500, 156--172 (2019; Zbl 07284162) Full Text: DOI
Miao, Meixia; Wang, Jianfeng; Wen, Sheng; Ma, Jianfeng Publicly verifiable database scheme with efficient keyword search. (English) Zbl 1442.68047 Inf. Sci. 475, 18-28 (2019). MSC: 68P15 68M11 68P25 PDF BibTeX XML Cite \textit{M. Miao} et al., Inf. Sci. 475, 18--28 (2019; Zbl 1442.68047) Full Text: DOI
Zhang, Na; Niu, Cuiping Bipolar 2-tuple linguistic decision-making model based on cloud computing and its application. (Chinese. English summary) Zbl 1449.90235 Math. Pract. Theory 49, No. 20, 223-234 (2019). MSC: 90B50 PDF BibTeX XML Cite \textit{N. Zhang} and \textit{C. Niu}, Math. Pract. Theory 49, No. 20, 223--234 (2019; Zbl 1449.90235)
Huang, Lili; Chen, Donglin; Lin, Wenjian; Yao, Mengdi Multi-instance combined cloud resource procurement optimization decision based on complex enterprise requirements. (Chinese. English summary) Zbl 1449.90158 Math. Pract. Theory 49, No. 20, 112-121 (2019). MSC: 90B50 PDF BibTeX XML Cite \textit{L. Huang} et al., Math. Pract. Theory 49, No. 20, 112--121 (2019; Zbl 1449.90158)
Wang, Hanpin; Zhang, Lei A survey on formal methods in cloud computing. (Chinese. English summary) Zbl 1449.68007 J. Guangzhou Univ., Nat. Sci. 18, No. 4, 69-74 (2019). MSC: 68M11 68Q01 68Q60 68-02 PDF BibTeX XML Cite \textit{H. Wang} and \textit{L. Zhang}, J. Guangzhou Univ., Nat. Sci. 18, No. 4, 69--74 (2019; Zbl 1449.68007)
Zheng, Jingzhu; Yang, Haining; Su, Ye; Qin, Jing A blindly public verifiable outsourcing scheme for matrix multiplication. (Chinese. English summary) Zbl 1449.68042 J. Shandong Univ., Nat. Sci. 54, No. 11, 1-11 (2019). MSC: 68P27 65F99 68M11 PDF BibTeX XML Cite \textit{J. Zheng} et al., J. Shandong Univ., Nat. Sci. 54, No. 11, 1--11 (2019; Zbl 1449.68042) Full Text: DOI
Ivashko, Evgeniĭ E.; Ivashko, Anna A.; Safonov, Georgiĭ R.; Tchernykh, Andreĭ Cost-efficient strategy in clouds with spot price uncertainty. (Russian. English summary) Zbl 1444.91105 Mat. Teor. Igr Prilozh. 11, No. 3, 5-30 (2019); translation in Autom. Remote Control 81, No. 4, 731-745 (2020). MSC: 91B26 91B24 PDF BibTeX XML Cite \textit{E. E. Ivashko} et al., Mat. Teor. Igr Prilozh. 11, No. 3, 5--30 (2019; Zbl 1444.91105); translation in Autom. Remote Control 81, No. 4, 731--745 (2020) Full Text: MNR
Chen, Hongjie; Liao, Yongjian Improvement of an outsourced attribute-based encryption scheme. (English) Zbl 1437.94056 Soft Comput. 23, No. 22, 11409-11417 (2019). MSC: 94A60 PDF BibTeX XML Cite \textit{H. Chen} and \textit{Y. Liao}, Soft Comput. 23, No. 22, 11409--11417 (2019; Zbl 1437.94056) Full Text: DOI
Yan, Xuena; Jin, Shunfu; Yue, Wuyi; Takahashi, Yutaka A MAP-based performance analysis on an energy-saving mechanism in cloud computing. (English) Zbl 1434.68059 Phung-Duc, Tuan (ed.) et al., Queueing theory and network applications. 14th international conference, QTNA 2019, Ghent, Belgium, August 27–29, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11688, 369-378 (2019). MSC: 68M20 PDF BibTeX XML Cite \textit{X. Yan} et al., Lect. Notes Comput. Sci. 11688, 369--378 (2019; Zbl 1434.68059) Full Text: DOI
Madankan, Ali; Delavarkhalafi, Ali; Karbassi, S. M.; Adibnia, F. Resource allocation in cloud computing via optimal control to queuing systems. (English) Zbl 1439.49049 Vestn. Yuzhno-Ural. Gos. Univ., Ser. Mat. Model. Program. 12, No. 4, 67-81 (2019). MSC: 49K45 49J20 93E20 68M20 90B22 68Q85 PDF BibTeX XML Cite \textit{A. Madankan} et al., Vestn. Yuzhno-Ural. Gos. Univ., Ser. Mat. Model. Program. 12, No. 4, 67--81 (2019; Zbl 1439.49049) Full Text: DOI MNR
Shi, Chaochen; Yu, Jiangshan A hidden Markov model-based method for virtual machine anomaly detection. (English) Zbl 1428.68045 Steinfeld, Ron (ed.) et al., Provable security. 13th international conference, ProvSec 2019, Cairns, QLD, Australia, October 1–4, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11821, 372-380 (2019). MSC: 68M11 PDF BibTeX XML Cite \textit{C. Shi} and \textit{J. Yu}, Lect. Notes Comput. Sci. 11821, 372--380 (2019; Zbl 1428.68045) Full Text: DOI
Sardar, Laltu; Ruj, Sushmita FSPVDsse: a forward secure publicly verifiable dynamic SSE scheme. (English) Zbl 1426.94121 Steinfeld, Ron (ed.) et al., Provable security. 13th international conference, ProvSec 2019, Cairns, QLD, Australia, October 1–4, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11821, 355-371 (2019). MSC: 94A60 94A62 68M11 PDF BibTeX XML Cite \textit{L. Sardar} and \textit{S. Ruj}, Lect. Notes Comput. Sci. 11821, 355--371 (2019; Zbl 1426.94121) Full Text: DOI
Li, Xiang; Tian, Hui; Ning, Jianting Secure online/offline attribute-based encryption for IoT users in cloud computing. (English) Zbl 1426.94113 Steinfeld, Ron (ed.) et al., Provable security. 13th international conference, ProvSec 2019, Cairns, QLD, Australia, October 1–4, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11821, 347-354 (2019). MSC: 94A60 68M11 PDF BibTeX XML Cite \textit{X. Li} et al., Lect. Notes Comput. Sci. 11821, 347--354 (2019; Zbl 1426.94113) Full Text: DOI
Pham, Xuan-Qui; Nguyen, Tien-Dung; Nguyen, VanDung; Huh, Eui-Nam Joint node selection and resource allocation for task offloading in scalable vehicle-assisted multi-access edge computing. (English) Zbl 1423.90097 Symmetry 11, No. 1, Paper No. 58, 17 p. (2019). MSC: 90B35 90C11 PDF BibTeX XML Cite \textit{X.-Q. Pham} et al., Symmetry 11, No. 1, Paper No. 58, 17 p. (2019; Zbl 1423.90097) Full Text: DOI
Mazalov, Vladimir; Lukyanenko, Andrey; Gurtov, Andrei Location-price competition in mobile operator market. (English) Zbl 1426.91127 Int. Game Theory Rev. 21, No. 3, Article ID 1850015, 15 p. (2019). MSC: 91B24 91A20 91A10 91A06 PDF BibTeX XML Cite \textit{V. Mazalov} et al., Int. Game Theory Rev. 21, No. 3, Article ID 1850015, 15 p. (2019; Zbl 1426.91127) Full Text: DOI
Stefanello, Fernando; Aggarwal, Vaneet; Buriol, Luciana S.; Resende, Mauricio G. C. Hybrid algorithms for placement of virtual machines across geo-separated data centers. (English) Zbl 1430.90500 J. Comb. Optim. 38, No. 3, 748-793 (2019). MSC: 90C27 PDF BibTeX XML Cite \textit{F. Stefanello} et al., J. Comb. Optim. 38, No. 3, 748--793 (2019; Zbl 1430.90500) Full Text: DOI
Nguyen, Thieu; Nguyen, Binh Minh; Nguyen, Giang Building resource auto-scaler with functional-link neural network and adaptive bacterial foraging optimization. (English) Zbl 07117296 Gopal, T. V. (ed.) et al., Theory and applications of models of computation. 15th annual conference, TAMC 2019, Kitakyushu, Japan, April 13–16, 2019. Proceedings. Cham: Springer (ISBN 978-3-030-14811-9/pbk; 978-3-030-14812-6/ebook). Lecture Notes in Computer Science 11436, 501-517 (2019). MSC: 68Q05 PDF BibTeX XML Cite \textit{T. Nguyen} et al., Lect. Notes Comput. Sci. 11436, 501--517 (2019; Zbl 07117296) Full Text: DOI
Lu, Congdong; Qian, Gang; Chen, Tao A cloud computing security model based on noninterference. (English) Zbl 1438.68012 Wuhan Univ. J. Nat. Sci. 24, No. 3, 194-200 (2019). MSC: 68M11 68M25 PDF BibTeX XML Cite \textit{C. Lu} et al., Wuhan Univ. J. Nat. Sci. 24, No. 3, 194--200 (2019; Zbl 1438.68012) Full Text: DOI
Zhao, Guosheng; Qu, Xiaofeng; Liao, Yuting; Wang, Tiantian; Zhang, Jingting Cloud service security adaptive target detection algorithm based on bio-inspired performance evaluation process algebra. (English) Zbl 1438.68016 Wuhan Univ. J. Nat. Sci. 24, No. 3, 185-193 (2019). MSC: 68M11 68M25 68Q85 PDF BibTeX XML Cite \textit{G. Zhao} et al., Wuhan Univ. J. Nat. Sci. 24, No. 3, 185--193 (2019; Zbl 1438.68016) Full Text: DOI
Yang, Yanyan; Hu, Mingsheng; Kong, Shan; Gong, Bei; Liu, Xinxin Scheme on cross-domain identity authentication based on group signature for cloud computing. (English) Zbl 1438.94063 Wuhan Univ. J. Nat. Sci. 24, No. 2, 134-140 (2019). MSC: 94A62 68P25 68M11 PDF BibTeX XML Cite \textit{Y. Yang} et al., Wuhan Univ. J. Nat. Sci. 24, No. 2, 134--140 (2019; Zbl 1438.94063) Full Text: DOI
Xiong, Ling; Peng, Daiyuan; Peng, Tu; Liang, Hongbin Efficient privacy-preserving authentication protocol for mobile cloud computing services. (Chinese. English summary) Zbl 1438.68015 J. Southwest Jiaotong Univ. 54, No. 1, 202-210 (2019). MSC: 68M11 68M12 68P25 94A62 PDF BibTeX XML Cite \textit{L. Xiong} et al., J. Southwest Jiaotong Univ. 54, No. 1, 202--210 (2019; Zbl 1438.68015) Full Text: DOI
Qi, Ping; Wang, Fucheng; Wang, Biqing; Liang, Changyong Dynamic level scheduling algorithm for cloud computing based on failure regularity-aware. (Chinese. English summary) Zbl 1438.68013 J. Shandong Univ., Nat. Sci. 54, No. 1, 103-115 (2019). MSC: 68M11 68M15 68M20 PDF BibTeX XML Cite \textit{P. Qi} et al., J. Shandong Univ., Nat. Sci. 54, No. 1, 103--115 (2019; Zbl 1438.68013) Full Text: DOI
Wu, Xi; Yu, Nenghai; Zhang, Weiming An improved multi-keyword fuzzy search scheme based on BloomFilter over encrypted text. (Chinese. English summary) Zbl 1438.68034 Control Decis. 34, No. 1, 97-104 (2019). MSC: 68P10 68P05 68P25 68P27 PDF BibTeX XML Cite \textit{X. Wu} et al., Control Decis. 34, No. 1, 97--104 (2019; Zbl 1438.68034) Full Text: DOI
Sardar, Laltu; Ruj, Sushmita The secure link prediction problem. (English) Zbl 1419.94058 Adv. Math. Commun. 13, No. 4, 733-757 (2019). MSC: 94A62 94A60 PDF BibTeX XML Cite \textit{L. Sardar} and \textit{S. Ruj}, Adv. Math. Commun. 13, No. 4, 733--757 (2019; Zbl 1419.94058) Full Text: DOI
Zhang, Min; Li, Gang Multi-objective optimization algorithm based on improved particle swarm in cloud computing environment. (English) Zbl 1437.90146 Discrete Contin. Dyn. Syst., Ser. S 12, No. 4-5, 1413-1426 (2019). MSC: 90C29 90C59 68T20 PDF BibTeX XML Cite \textit{M. Zhang} and \textit{G. Li}, Discrete Contin. Dyn. Syst., Ser. S 12, No. 4--5, 1413--1426 (2019; Zbl 1437.90146) Full Text: DOI
Xu, Jinsong Reversible hidden data access algorithm in cloud computing environment. (English) Zbl 1422.68010 Discrete Contin. Dyn. Syst., Ser. S 12, No. 4-5, 1219-1232 (2019). MSC: 68M11 68P20 68P25 68T05 68T20 94A62 PDF BibTeX XML Cite \textit{J. Xu}, Discrete Contin. Dyn. Syst., Ser. S 12, No. 4--5, 1219--1232 (2019; Zbl 1422.68010) Full Text: DOI
Wu, Guangwei; Chen, Jianer; Wang, Jianxin On scheduling inclined jobs on multiple two-stage flowshops. (English) Zbl 1429.90032 Theor. Comput. Sci. 786, 67-77 (2019). MSC: 90B35 68W25 68W27 PDF BibTeX XML Cite \textit{G. Wu} et al., Theor. Comput. Sci. 786, 67--77 (2019; Zbl 1429.90032) Full Text: DOI
Petrášková, Vladimíra; Rosa, Přemysl Using Maple cloud computing in financial education of pre-service teachers. (English) Zbl 07095841 Math. Comput. Sci. 13, No. 1-2, 237-245 (2019). MSC: 97M30 97U70 PDF BibTeX XML Cite \textit{V. Petrášková} and \textit{P. Rosa}, Math. Comput. Sci. 13, No. 1--2, 237--245 (2019; Zbl 07095841) Full Text: DOI
Tabaghchi Milan, Sara; Rajabion, Lila; Ranjbar, Hamideh; Navimipour, Nima Jafari Nature inspired meta-heuristic algorithms for solving the load-balancing problem in cloud environments. (English) Zbl 07080347 Comput. Oper. Res. 110, 159-187 (2019). MSC: 90B PDF BibTeX XML Cite \textit{S. Tabaghchi Milan} et al., Comput. Oper. Res. 110, 159--187 (2019; Zbl 07080347) Full Text: DOI
Zhu, Binrui; Sun, Jiameng; Qin, Jing; Ma, Jixin Fuzzy matching: multi-authority attribute searchable encryption without central authority. (English) Zbl 1415.68068 Soft Comput. 23, No. 2, 527-536 (2019). MSC: 68P25 68M11 PDF BibTeX XML Cite \textit{B. Zhu} et al., Soft Comput. 23, No. 2, 527--536 (2019; Zbl 1415.68068) Full Text: DOI
Katz, Dmitriy; Schieber, Baruch; Shachnai, Hadas Flexible resource allocation to interval jobs. (English) Zbl 1425.90045 Algorithmica 81, No. 8, 3217-3244 (2019). MSC: 90B35 68Q17 68W25 PDF BibTeX XML Cite \textit{D. Katz} et al., Algorithmica 81, No. 8, 3217--3244 (2019; Zbl 1425.90045) Full Text: DOI
Wu, Guangwei; Chen, Jianer; Wang, Jianxin Scheduling two-stage jobs on multiple flowshops. (English) Zbl 1422.68019 Theor. Comput. Sci. 776, 117-124 (2019). MSC: 68M20 68Q25 90B35 PDF BibTeX XML Cite \textit{G. Wu} et al., Theor. Comput. Sci. 776, 117--124 (2019; Zbl 1422.68019) Full Text: DOI
Mazalov, Vladimir V.; Chirkova, Julia V. Networking games. Network forming games and games on networks. (English) Zbl 1417.91004 Amsterdam: Elsevier/Academic Press (ISBN 978-0-12-816551-5/pbk; 978-0-12-816552-2/ebook). xiii, 308 p. (2019). Reviewer: Frank Viola (Berlin) MSC: 91-01 91A43 91A05 91A06 05C57 91D30 68M11 90B10 90B20 PDF BibTeX XML Cite \textit{V. V. Mazalov} and \textit{J. V. Chirkova}, Networking games. Network forming games and games on networks. Amsterdam: Elsevier/Academic Press (2019; Zbl 1417.91004) Full Text: DOI
Soleimanian, Azam; Khazaei, Shahram Publicly verifiable searchable symmetric encryption based on efficient cryptographic components. (English) Zbl 1403.94079 Des. Codes Cryptography 87, No. 1, 123-147 (2019). MSC: 94A60 68P25 PDF BibTeX XML Cite \textit{A. Soleimanian} and \textit{S. Khazaei}, Des. Codes Cryptography 87, No. 1, 123--147 (2019; Zbl 1403.94079) Full Text: DOI
Niño-Mora, José Resource allocation and routing in parallel multi-server queues with abandonments for cloud profit maximization. (English) Zbl 06994278 Comput. Oper. Res. 103, 221-236 (2019). MSC: 90B22 90B15 90C40 90B18 PDF BibTeX XML Cite \textit{J. Niño-Mora}, Comput. Oper. Res. 103, 221--236 (2019; Zbl 06994278) Full Text: DOI
Huang, Changqin; Wang, Xizhe; Wang, Dianhui Type theory based semantic verification for service composition in cloud computing environments. (English) Zbl 1441.68133 Inf. Sci. 469, 101-118 (2018). MSC: 68Q60 03B70 68M11 68Q55 PDF BibTeX XML Cite \textit{C. Huang} et al., Inf. Sci. 469, 101--118 (2018; Zbl 1441.68133) Full Text: DOI
Ma, Xu; Zhang, Fangguo; Chen, Xiaofeng; Shen, Jian Privacy preserving multi-party computation delegation for deep learning in cloud computing. (English) Zbl 1440.68248 Inf. Sci. 459, 103-116 (2018). MSC: 68T07 68M14 68P27 94A60 PDF BibTeX XML Cite \textit{X. Ma} et al., Inf. Sci. 459, 103--116 (2018; Zbl 1440.68248) Full Text: DOI
Domingo-Ferrer, Josep; Ricci, Sara; Domingo-Enrich, Carles Outsourcing scalar products and matrix products on privacy-protected unencrypted data stored in untrusted clouds. (English) Zbl 1440.68068 Inf. Sci. 436-437, 320-342 (2018). MSC: 68P27 PDF BibTeX XML Cite \textit{J. Domingo-Ferrer} et al., Inf. Sci. 436--437, 320--342 (2018; Zbl 1440.68068) Full Text: DOI
Lin, Xi-Jun; Sun, Lin; Qu, Haipeng Generic construction of public key encryption, identity-based encryption and signcryption with equality test. (English) Zbl 1446.94150 Inf. Sci. 453, 111-126 (2018). MSC: 94A60 68P25 PDF BibTeX XML Cite \textit{X.-J. Lin} et al., Inf. Sci. 453, 111--126 (2018; Zbl 1446.94150) Full Text: DOI
Huang, Zhehuang Frame-groups based fractal video compression and its parallel implementation in Hadoop cloud computing environment. (English) Zbl 1448.94017 Multidimensional Syst. Signal Process. 29, No. 3, 961-978 (2018). MSC: 94A08 PDF BibTeX XML Cite \textit{Z. Huang}, Multidimensional Syst. Signal Process. 29, No. 3, 961--978 (2018; Zbl 1448.94017) Full Text: DOI
Fakhrolmobasheri, Sharifeh; Ataie, Ehsan; Movaghar, Ali Modeling and evaluation of power-aware software rejuvenation in cloud systems. (English) Zbl 07150354 Algorithms (Basel) 11, No. 10, Paper No. 160, 15 p. (2018). MSC: 68 90 PDF BibTeX XML Cite \textit{S. Fakhrolmobasheri} et al., Algorithms (Basel) 11, No. 10, Paper No. 160, 15 p. (2018; Zbl 07150354) Full Text: DOI
Guo, Jiale; Yang, Wenzhuo; Lam, Kwok-Yan; Yi, Xun Using blockchain to control access to cloud data. (English) Zbl 07124884 Guo, Fuchun (ed.) et al., Information security and cryptology. 14th international conference, Inscrypt 2018, Fuzhou, China, December 14–17, 2018, Revised selected papers. Cham: Springer (ISBN 978-3-030-14233-9/pbk; 978-3-030-14234-6/ebook). Lecture Notes in Computer Science 11449, 274-288 (2018). MSC: 94A60 PDF BibTeX XML Cite \textit{J. Guo} et al., Lect. Notes Comput. Sci. 11449, 274--288 (2018; Zbl 07124884) Full Text: DOI
Liu, Dengzhi; Shen, Jian; Chen, Yuling; Wang, Chen; Zhou, Tianqi; Wang, Anxi Privacy-preserving data outsourcing with integrity auditing for lightweight devices in cloud computing. (English) Zbl 07124881 Guo, Fuchun (ed.) et al., Information security and cryptology. 14th international conference, Inscrypt 2018, Fuzhou, China, December 14–17, 2018, Revised selected papers. Cham: Springer (ISBN 978-3-030-14233-9/pbk; 978-3-030-14234-6/ebook). Lecture Notes in Computer Science 11449, 223-239 (2018). MSC: 94A60 PDF BibTeX XML Cite \textit{D. Liu} et al., Lect. Notes Comput. Sci. 11449, 223--239 (2018; Zbl 07124881) Full Text: DOI
Wang, Hu; Lei, Jianjun; Wan, Runze An improved computing resource scheduling model of cloud computing based on particle swarm optimization. (Chinese. English summary) Zbl 1438.68014 J. Cent. China Norm. Univ., Nat. Sci. 52, No. 6, 788-791 (2018). MSC: 68M11 68M20 68W50 PDF BibTeX XML Cite \textit{H. Wang} et al., J. Cent. China Norm. Univ., Nat. Sci. 52, No. 6, 788--791 (2018; Zbl 1438.68014) Full Text: DOI
Gomes, Diogo A.; Saúde, João Costeira; Saúde, João Three-dimensional registration and shape reconstruction from depth data without matching: a PDE approach. (English) Zbl 1416.65065 Port. Math. (N.S.) 75, No. 3-4, 285-311 (2018). MSC: 65D18 68U10 94A08 PDF BibTeX XML Cite \textit{D. A. Gomes} et al., Port. Math. (N.S.) 75, No. 3--4, 285--311 (2018; Zbl 1416.65065) Full Text: DOI
Xu, Hua; Li, Jing A scheduling algorithm towards bandwidth guarantee for virtual cluster in the cloud. (Chinese. English summary) Zbl 1424.68022 J. Univ. Sci. Technol. China 48, No. 6, 495-503 (2018). MSC: 68M20 68M11 PDF BibTeX XML Cite \textit{H. Xu} and \textit{J. Li}, J. Univ. Sci. Technol. China 48, No. 6, 495--503 (2018; Zbl 1424.68022) Full Text: DOI
Zhou, Yemao; Li, Zhongjin; Ge, Jidong; Li, Chuanyi; Zhou, Xiaoyu; Luo, Bin Multi-objective workflow scheduling based on delay transmission in mobile cloud computing. (Chinese. English summary) Zbl 1424.68025 J. Softw. 29, No. 11, 3306-3325 (2018). MSC: 68M20 68M11 90B35 90C29 PDF BibTeX XML Cite \textit{Y. Zhou} et al., J. Softw. 29, No. 11, 3306--3325 (2018; Zbl 1424.68025) Full Text: DOI
Zhang, Wei; Bai, Ping; Li, Zhenlin; Li, Cong Paillier type outsourcing the decryption ciphertexts via predicate encryption. (Chinese. English summary) Zbl 1424.68071 J. Zhengzhou Univ., Nat. Sci. Ed. 50, No. 3, 7-14 (2018). MSC: 68P25 68M11 PDF BibTeX XML Cite \textit{W. Zhang} et al., J. Zhengzhou Univ., Nat. Sci. Ed. 50, No. 3, 7--14 (2018; Zbl 1424.68071) Full Text: DOI
Li, Yu I/O scheduling algorithm for data servers in cloud storage environments. (Chinese. English summary) Zbl 1424.68019 J. Southwest Jiaotong Univ. 53, No. 4, 857-864 (2018). MSC: 68M20 68M11 68P20 PDF BibTeX XML Cite \textit{Y. Li}, J. Southwest Jiaotong Univ. 53, No. 4, 857--864 (2018; Zbl 1424.68019) Full Text: DOI
Zhang, Xiaoli; Yang, Jiahai; Sun, Xiaoqing; Wu, Jianping Survey of geo-distributed cloud research progress. (Chinese. English summary) Zbl 1424.68009 J. Softw. 29, No. 7, 2116-2132 (2018). MSC: 68M11 68M20 PDF BibTeX XML Cite \textit{X. Zhang} et al., J. Softw. 29, No. 7, 2116--2132 (2018; Zbl 1424.68009) Full Text: DOI
Ren, Jinxia; Zhong, Xiaokang; Jiang, Mengqian Research of cloud task scheduling algorithm with QoS performance constraint. (Chinese. English summary) Zbl 1424.68020 J. Henan Norm. Univ., Nat. Sci. 46, No. 4, 113-119 (2018). MSC: 68M20 68M11 PDF BibTeX XML Cite \textit{J. Ren} et al., J. Henan Norm. Univ., Nat. Sci. 46, No. 4, 113--119 (2018; Zbl 1424.68020) Full Text: DOI
Han, Jingti; Wu, Xiaohong; Liu, Jian-Guo An online sequential procurement mechanism under uncertain demands in multi-cloud environment. (English) Zbl 07025885 Int. J. Approx. Reasoning 103, 152-167 (2018). MSC: 91B32 91B26 68M11 PDF BibTeX XML Cite \textit{J. Han} et al., Int. J. Approx. Reasoning 103, 152--167 (2018; Zbl 07025885) Full Text: DOI
Tchernykh, Andrei; Babenko, Mikhail; Chervyakov, Nikolay; Miranda-López, Vanessa; Kuchukov, Viktor; Cortés-Mendoza, Jorge M.; Deryabin, Maxim; Kucherov, Nikolay; Radchenko, Gleb; Avetisyan, Arutyun AC-RRNS: anti-collusion secured data sharing scheme for cloud storage. (English) Zbl 1448.94249 Int. J. Approx. Reasoning 102, 60-73 (2018). MSC: 94A62 68M11 PDF BibTeX XML Cite \textit{A. Tchernykh} et al., Int. J. Approx. Reasoning 102, 60--73 (2018; Zbl 1448.94249) Full Text: DOI
Vázquez, Luis; Pilar Velasco, M.; Vázquez-Poletti, José Luis; Llorente, Ignacio M.; Usero, David; Jiménez, Salvador Modeling and simulation of the atmospheric dust dynamics: fractional calculus and cloud computing. (English) Zbl 1407.35220 Int. J. Numer. Anal. Model. 15, No. 1-2, 74-85 (2018). MSC: 35R11 76T15 65M06 PDF BibTeX XML Cite \textit{L. Vázquez} et al., Int. J. Numer. Anal. Model. 15, No. 1--2, 74--85 (2018; Zbl 1407.35220) Full Text: Link
Chuprikov, Pavel; Davydow, Alex; Kogan, Kirill; Nikolenko, Sergey; Sirotkin, Alexander Formalizing compute-aggregate problems in cloud computing. (English) Zbl 07008469 Lotker, Zvi (ed.) et al., Structural information and communication complexity. 25th international colloquium, SIROCCO 2018, Ma’ale HaHamisha, Israel, June 18–21, 2018. Revised selected papers. Cham: Springer (ISBN 978-3-030-01324-0/pbk; 978-3-030-01325-7/ebook). Lecture Notes in Computer Science 11085, 377-391 (2018). MSC: 68Mxx 68R10 PDF BibTeX XML Cite \textit{P. Chuprikov} et al., Lect. Notes Comput. Sci. 11085, 377--391 (2018; Zbl 07008469) Full Text: DOI
Ardagna, Danilo (ed.); Canali, Claudia (ed.); Lancellotti, Riccardo (ed.) Editorial: Special issue on algorithms for the resource management of large scale infrastructures. (English) Zbl 07003851 Algorithms (Basel) 11, No. 12, Paper No. 200, 3 p. (2018). MSC: 68 90 PDF BibTeX XML Cite \textit{D. Ardagna} (ed.) et al., Algorithms (Basel) 11, No. 12, Paper No. 200, 3 p. (2018; Zbl 07003851) Full Text: DOI
Guillemin, Fabrice; Quintuna Rodriguez, Veronika Karina; Simonian, Alain Sojourn time in a \(M^{[X]}/M/1\) processor sharing queue with batch arrivals. (English) Zbl 1403.60077 Stoch. Models 34, No. 3, 322-361 (2018). MSC: 60K25 90B22 68M20 PDF BibTeX XML Cite \textit{F. Guillemin} et al., Stoch. Models 34, No. 3, 322--361 (2018; Zbl 1403.60077) Full Text: DOI
Zhang, Yinghui; Yang, Menglei; Zheng, Dong; Lang, Pengzhen; Wu, Axin; Chen, Chen Efficient and secure big data storage system with leakage resilience in cloud computing. (English) Zbl 1402.68057 Soft Comput. 22, No. 23, 7763-7772 (2018). MSC: 68P25 68M11 68P20 PDF BibTeX XML Cite \textit{Y. Zhang} et al., Soft Comput. 22, No. 23, 7763--7772 (2018; Zbl 1402.68057) Full Text: DOI
Antoniadis, Antonios; Cristi, Andrés A near optimal mechanism for energy aware scheduling. (English) Zbl 1415.91078 Deng, Xiaotie (ed.), Algorithmic game theory. 11th international symposium, SAGT 2018, Beijing, China, September 11–14, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11059, 31-42 (2018). MSC: 91A80 90B35 68M11 PDF BibTeX XML Cite \textit{A. Antoniadis} and \textit{A. Cristi}, Lect. Notes Comput. Sci. 11059, 31--42 (2018; Zbl 1415.91078) Full Text: DOI
Singh, Prem Kumar Cloud data processing using granular based weighted concept lattice and Hamming distance. (English) Zbl 1402.68030 Computing 100, No. 10, 1109-1132 (2018). MSC: 68M14 68T30 PDF BibTeX XML Cite \textit{P. K. Singh}, Computing 100, No. 10, 1109--1132 (2018; Zbl 1402.68030) Full Text: DOI
Han, Jinguang; Yang, Ye; Liu, Joseph K.; Li, Jiguo; Liang, Kaitai; Shen, Jian Expressive attribute-based keyword search with constant-size ciphertext. (English) Zbl 1398.68115 Soft Comput. 22, No. 15, 5163-5177 (2018). MSC: 68P10 68P25 PDF BibTeX XML Cite \textit{J. Han} et al., Soft Comput. 22, No. 15, 5163--5177 (2018; Zbl 1398.68115) Full Text: DOI
Ma, Zhenfeng; Li, Songsong A cloud computing scheduling method based on deadline aware. (Chinese. English summary) Zbl 1413.68013 Nat. Sci. J. Xiangtan Univ. 40, No. 2, 89-92 (2018). MSC: 68M20 90B35 90C59 PDF BibTeX XML Cite \textit{Z. Ma} and \textit{S. Li}, Nat. Sci. J. Xiangtan Univ. 40, No. 2, 89--92 (2018; Zbl 1413.68013)
Xiang, Shijun; Yang, Le Robust and reversible image watermarking algorithm in homomorphic encrypted domain. (Chinese. English summary) Zbl 1413.68050 J. Softw. 29, No. 4, 957-972 (2018). MSC: 68P25 68P30 68U10 PDF BibTeX XML Cite \textit{S. Xiang} and \textit{L. Yang}, J. Softw. 29, No. 4, 957--972 (2018; Zbl 1413.68050) Full Text: DOI
Li, Dazhi; Li, Minglu; Liu, Jianhua Evolutionary trust scheme of certificate game in mobile cloud computing. (English) Zbl 1398.94200 Soft Comput. 22, No. 7, 2245-2255 (2018). MSC: 94A62 68M11 68P25 PDF BibTeX XML Cite \textit{D. Li} et al., Soft Comput. 22, No. 7, 2245--2255 (2018; Zbl 1398.94200) Full Text: DOI
Šukys, Jonas; Rasthofer, Ursula; Wermelinger, Fabian; Hadjidoukas, Panagiotis; Koumoutsakos, Petros Multilevel control variates for uncertainty quantification in simulations of cloud cavitation. (English) Zbl 1401.76033 SIAM J. Sci. Comput. 40, No. 5, B1361-B1390 (2018). MSC: 76B10 68W10 65C05 65C60 68M15 PDF BibTeX XML Cite \textit{J. Šukys} et al., SIAM J. Sci. Comput. 40, No. 5, B1361--B1390 (2018; Zbl 1401.76033) Full Text: DOI
Mrozek, Dariusz Scalable big data analytics for protein bioinformatics. Efficient computational solutions for protein structures. (English) Zbl 1411.92002 Computational Biology 28. Cham: Springer (ISBN 978-3-319-98838-2/hbk; 978-3-319-98839-9/ebook). xxvi, 315 p. (2018). Reviewer: Jasbir Kaur (Chennai) MSC: 92-02 92D20 62P10 68M11 PDF BibTeX XML Cite \textit{D. Mrozek}, Scalable big data analytics for protein bioinformatics. Efficient computational solutions for protein structures. Cham: Springer (2018; Zbl 1411.92002) Full Text: DOI
Abbas, M. M.; Varnovskiy, N. P.; Zakharov, V. A.; Shokurov, A. V. On the deductive security of queries to databases with multi-bit records. (English. Russian original) Zbl 1397.68040 Mosc. Univ. Comput. Math. Cybern. 42, No. 1, 39-43 (2018); translation from Vestn. Mosk. Univ., Ser. XV 2018, No. 1, 40-45 (2018). MSC: 68P15 68P25 PDF BibTeX XML Cite \textit{M. M. Abbas} et al., Mosc. Univ. Comput. Math. Cybern. 42, No. 1, 39--43 (2018; Zbl 1397.68040); translation from Vestn. Mosk. Univ., Ser. XV 2018, No. 1, 40--45 (2018) Full Text: DOI
Meng, Weizhi; Wang, Yu; Li, Wenjuan; Liu, Zhe; Li, Jin; Probst, Christian W. Enhancing intelligent alarm reduction for distributed intrusion detection systems via edge computing. (English) Zbl 06944277 Susilo, Willy (ed.) et al., Information security and privacy. 23rd Australasian conference, ACISP 2018, Wollongong, NSW, Australia, July 11–13, 2018. Proceedings. Cham: Springer (ISBN 978-3-319-93637-6/pbk; 978-3-319-93638-3/ebook). Lecture Notes in Computer Science 10946, 759-767 (2018). MSC: 68P25 PDF BibTeX XML Cite \textit{W. Meng} et al., Lect. Notes Comput. Sci. 10946, 759--767 (2018; Zbl 06944277) Full Text: DOI
Liu, Lin; Su, Jinshu; Chen, Rongmao; Liu, Ximeng; Wang, Xiaofeng; Chen, Shuhui; Leung, Hofung Privacy-preserving mining of association rule on outsourced cloud data from multiple parties. (English) Zbl 06944258 Susilo, Willy (ed.) et al., Information security and privacy. 23rd Australasian conference, ACISP 2018, Wollongong, NSW, Australia, July 11–13, 2018. Proceedings. Cham: Springer (ISBN 978-3-319-93637-6/pbk; 978-3-319-93638-3/ebook). Lecture Notes in Computer Science 10946, 431-451 (2018). MSC: 68P27 PDF BibTeX XML Cite \textit{L. Liu} et al., Lect. Notes Comput. Sci. 10946, 431--451 (2018; Zbl 06944258) Full Text: DOI
Xu, Yan; Ding, Ran; Cui, Jie; Zhong, Hong Intrusion-resilient public auditing protocol for data storage in cloud computing. (English) Zbl 06944256 Susilo, Willy (ed.) et al., Information security and privacy. 23rd Australasian conference, ACISP 2018, Wollongong, NSW, Australia, July 11–13, 2018. Proceedings. Cham: Springer (ISBN 978-3-319-93637-6/pbk; 978-3-319-93638-3/ebook). Lecture Notes in Computer Science 10946, 399-416 (2018). MSC: 68P25 94A60 PDF BibTeX XML Cite \textit{Y. Xu} et al., Lect. Notes Comput. Sci. 10946, 399--416 (2018; Zbl 06944256) Full Text: DOI
Wu, Haixing; Jin, Shunfu; Yue, Wuyi; Takahashi, Yutaka Performance evaluation for a registration service with an energy efficient cloud architecture. (English) Zbl 1397.90147 Takahashi, Yutaka (ed.) et al., Queueing theory and network applications. 13th international conference, QTNA 2018, Tsukuba, Japan, July 25–27, 2018. Proceedings. Cham: Springer (ISBN 978-3-319-93735-9/pbk; 978-3-319-93736-6/ebook). Lecture Notes in Computer Science 10932, 133-141 (2018). MSC: 90B22 60K25 60J10 PDF BibTeX XML Cite \textit{H. Wu} et al., Lect. Notes Comput. Sci. 10932, 133--141 (2018; Zbl 1397.90147) Full Text: DOI
Jin, Shunfu; Wang, Xiushuang; Yue, Wuyi A task scheduling strategy with a sleep-delay timer and a waking-up threshold in cloud computing. (English) Zbl 1397.90115 Takahashi, Yutaka (ed.) et al., Queueing theory and network applications. 13th international conference, QTNA 2018, Tsukuba, Japan, July 25–27, 2018. Proceedings. Cham: Springer (ISBN 978-3-319-93735-9/pbk; 978-3-319-93736-6/ebook). Lecture Notes in Computer Science 10932, 115-123 (2018). MSC: 90B22 60K25 90B35 PDF BibTeX XML Cite \textit{S. Jin} et al., Lect. Notes Comput. Sci. 10932, 115--123 (2018; Zbl 1397.90115) Full Text: DOI
Shahdi-Pashaki, S.; Teymourian, Ehsan; Tavakkoli-Moghaddam, Reza New approach based on group technology for the consolidation problem in cloud computing-mathematical model and genetic algorithm. (English) Zbl 1414.68018 Comput. Appl. Math. 37, No. 1, 693-718 (2018). MSC: 68M20 68T20 90B30 90C59 PDF BibTeX XML Cite \textit{S. Shahdi-Pashaki} et al., Comput. Appl. Math. 37, No. 1, 693--718 (2018; Zbl 1414.68018) Full Text: DOI
Ibrahim, Rabha W.; Gani, Abdullah A mathematical model of cloud computing in the economic fractional dynamic system. (English) Zbl 1391.35393 Iran. J. Sci. Technol., Trans. A, Sci. 42, No. 1, 65-72 (2018). MSC: 35R11 35Q68 68M07 PDF BibTeX XML Cite \textit{R. W. Ibrahim} and \textit{A. Gani}, Iran. J. Sci. Technol., Trans. A, Sci. 42, No. 1, 65--72 (2018; Zbl 1391.35393) Full Text: DOI
Levitin, Gregory; Xing, Liudong; Dai, Yuanshun Co-residence based data vulnerability vs. security in cloud computing system with random server assignment. (English) Zbl 1403.68017 Eur. J. Oper. Res. 267, No. 2, 676-686 (2018). MSC: 68M11 68M14 68P99 PDF BibTeX XML Cite \textit{G. Levitin} et al., Eur. J. Oper. Res. 267, No. 2, 676--686 (2018; Zbl 1403.68017) Full Text: DOI
Traverso, Giulia; Demirel, Denise; Buchmann, Johannes Performing computations on hierarchically shared secrets. (English) Zbl 1423.94110 Joux, Antoine (ed.) et al., Progress in cryptology – AFRICACRYPT 2018. 10th international conference on cryptology in Africa, Marrakesh, Morocco, May 7–9, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10831, 141-161 (2018). MSC: 94A60 94A62 81P94 PDF BibTeX XML Cite \textit{G. Traverso} et al., Lect. Notes Comput. Sci. 10831, 141--161 (2018; Zbl 1423.94110) Full Text: DOI
Halácsy, Gergely; Z. Á. Mann, Zoltán Ádám Optimal energy-efficient placement of virtual machines with divisible sizes. (English) Zbl 06904568 Inf. Process. Lett. 138, 51-56 (2018). MSC: 68Q PDF BibTeX XML Cite \textit{G. Halácsy} and \textit{Z. Á. Z. Á. Mann}, Inf. Process. Lett. 138, 51--56 (2018; Zbl 06904568) Full Text: DOI
Biskup, Joachim; Preuß, Marcel Inferences from attribute-disjoint and duplicate-preserving relational fragmentations. (English) Zbl 06894594 Ferrarotti, Flavio (ed.) et al., Foundations of information and knowledge systems. 10th international symposium, FoIKS 2018, Budapest, Hungary, May 14–18, 2018. Proceedings. Cham: Springer (ISBN 978-3-319-90049-0/pbk; 978-3-319-90050-6/ebook). Lecture Notes in Computer Science 10833, 77-96 (2018). MSC: 68P15 68T27 68T35 68U35 PDF BibTeX XML Cite \textit{J. Biskup} and \textit{M. Preuß}, Lect. Notes Comput. Sci. 10833, 77--96 (2018; Zbl 06894594) Full Text: DOI