1
2021 IEEE 14th International Conference on Cloud Computing
2
An Adaptive Neuro-Fuzzy Inference System and Black Widow Optimization Approach for Optimal Resource Utilization and Task Scheduling in a Cloud Environment
3
Framework and deployment of a cloud-based advanced planning and scheduling system
4
Task Scheduling for Multi-Cloud Computing Subject to Security and Reliability Constraints
5
A generalized petri net-based modeling framework for service reliability evaluation and management of cloud data centers
6
Deep neural network-based application partitioning and scheduling for hospitals and medical enterprises using IoT assisted mobile fog cloud
7
Reliability-Aware Cost-Efficient Scientific Workflows Scheduling Strategy on Multi-Cloud Systems
8
Developing Mapping and allotment in Volunteer Cloud systems using Reliability Profile algorithms in a virtual machine
9
Image Steganography by Deep CNN Auto-Encoder Networks
10
The Implementation of a Cloud-Edge Computing Architecture Using OpenStack and Kubernetes for Air Quality Monitoring Application
11
Digital transformation of everyday life – How COVID-19 pandemic transformed the basic education of the young generation and why information management research should care?
12
A Cloud-Based Collaboration Platform for Model-Based Design of Cyber-Physical Systems
13
A Network Cost-aware Geo-distributed Data Analytics System
14
A New High Capacity Image Steganography Method Combined With Image Elliptic Curve Cryptography and Deep Neural Network
15
An Empirical Analysis on Load Balancing and Service Broker Techniques using Cloud Analyst Simulator
16
A Survey on Ad-hoc Cloud Computing Challenges
17
Towards fairer datasets: filtering and balancing the distribution of the people subtree in the ImageNet hierarchy
18
Multi-Dimensional Regression Host Utilization algorithm (MDRHU) for Host Overload Detection in Cloud Computing
19
A convolutional neural network-based linguistic steganalysis for synonym substitution steganography.
20
Point cloud ridge-valley feature enhancement based on position and normal guidance
21
Invisible Backdoor Attacks on Deep Neural Networks Via Steganography and Regularization
22
Cloud manufacturing: key issues and future perspectives
23
Survey and Taxonomy of Volunteer Computing
24
Multi-Dimensional Regression Host Utilization algorithm (MDRHU) for Host Overload Detection in Cloud Computing
25
Light Field Messaging With Deep Photographic Steganography
26
BOINC: A Platform for Volunteer Computing
27
Cloud Programming Simplified: A Berkeley View on Serverless Computing
28
Task scheduling techniques in cloud computing: A literature survey
29
Adaptive Multivariable Control for Multiple Resource Allocation of Service-Based Systems in Cloud Computing
30
Scalable Software Infrastructure for Integrating Supercomputing with Volunteer Computing and Cloud Computing
31
SSteGAN: Self-learning Steganography Based on Generative Adversarial Networks
32
Major Vulnerabilities and Their Prevention Methods in Cloud Computing
33
Image Sentiment Analysis Using Deep Learning
34
FPGA Virtualization in Cloud-Based Infrastructures Over Virtio
35
A Secured Steganography Algorithm for Hiding an Image in an Image
36
ReMot Reputation and Resource-Based Model to Estimate the Reliability of the Host Machines in Volunteer Cloud Environment
37
Robust Machine Learning Systems: Reliability and Security for Deep Neural Networks
38
SaRa: A Stochastic Model to Estimate Reliability of Edge Resources in Volunteer Cloud
39
cuCloud: Volunteer Computing as a Service (VCaaS) System
40
StegNet: Mega Image Steganography Capacity with Deep Convolutional Network
41
Improved Adam Optimizer for Deep Neural Networks
42
2018 IEEE/ACM 26th International Symposium on Quality of Service (IWQoS)
43
Threats and Vulnerabilities of Cloud Computing: A Review
44
A two-level secure data hiding algorithm for video steganography
45
Robust Image Watermarking Algorithm Based on ASIFT against Geometric Attacks
46
Deep Learning-Based Steganalysis Against Spatial Domain Steganography
47
MiCADO - Microservice-based Cloud Application-level Dynamic Orchestrator
48
Managing a fleet of autonomous mobile robots (AMR) using cloud robotics platform
49
Deep Learning Hierarchical Representations for Image Steganalysis
50
Security and privacy challenges in mobile cloud computing: Survey and way ahead
51
Energy efficient strategy for task allocation and VM placement in cloud environment
52
AMCloud: Toward a Secure Autonomic Mobile Ad Hoc Cloud Computing System
53
Cropping-resilient 3D mesh watermarking based on consistent segmentation and mesh steganalysis
54
Mobile Edge Computing: Survey and Research Outlook
55
A novel membership cloud model-based trust evaluation model for vehicular ad hoc network of T-CPS
56
Mobile ad hoc cloud: A survey
57
A comparative analysis of image steganography based on DCT algorithm and steganography tool to hide nuclear reactors confidential information
58
Enabling BOINC in infrastructure as a service cloud system
59
New Approaches to Encrypt and Decrypt Data in Image using Cryptography and Steganography Algorithm
60
An Analysis of Deep Neural Network Models for Practical Applications
61
Performance evaluation parameters of image steganography techniques
62
A Cloud-Focused Mobile Forensics Methodology
63
Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes
65
An open ecosystem for mobile-cloud convergence
66
An analysis of LSB based image steganography techniques
67
A survey of Cloud monitoring tools: Taxonomy, capabilities and objectives
68
Energy-credit scheduler: An energy-aware virtual machine scheduler for cloud systems
69
Productivity and carbon allocation in a tropical montane cloud forest in the Peruvian Andes
70
A Review of Comparison Techniques of Image Steganography
71
A simple, adaptable and efficient heterogeneous multi-tenant database architecture for ad hoc cloud
72
Let me in the cloud: analysis of the benefit and risk assessment of cloud platform
73
SpACCE: a sophisticated ad hoc cloud computing environment built by server migration to facilitate distributed collaboration
74
Deployment of Cloud Computing into VANET to Create Ad Hoc Cloud Network Architecture
75
Steganography and steganalysis based on digital image
76
Private Cloud System Based on BOINC with Support for Parallel and Distributed Simulation
77
Deconstructing Amazon EC2 Spot Instance Pricing
78
Early experience with the distributed nebula cloud
79
Evaluation of user behavior trust in cloud computing
80
Visual cryptographic steganography in images
81
Reducing Costs of Spot Instances via Checkpointing in the Amazon Elastic Compute Cloud
82
Energy-Efficient Management of Data Center Resources for Cloud Computing: A Vision, Architectural Elements, and Open Challenges
83
Digital image steganography: Survey and analysis of current methods
84
A new steganography approach for image encryption exchange by using the least significant bit insertion
85
An Approach to Ad hoc Cloud Computing
86
The Creative Task Creator: A tool for the generation of customized, Web-based creativity tasks
87
Attack LSB Matching Steganography by Counting Alteration Rate of the Number of Neighbourhood Gray Levels
88
Statistically undetectable jpeg steganography: dead ends challenges, and opportunities
89
Maximum battery life routing to support ubiquitous mobile computing in wireless ad hoc networks
90
The History of Steganography
92
CentOS 7.2 linux‐atm rpm i386 – CentOS
93
Steganography adaptation model for data security enhancement in ad ‐ hoc cloud based V ‐ BOINC through deep learning
94
edu. 2022. Windows client 7.16.20 released
95
VAE-Stega: Linguistic Steganography Based on Variational Auto-Encoder
96
QoS Optimization for Mobile Ad Hoc Cloud: A Multi-agent Independent Learning Approach
97
Machine Learning and Deep Learning in Steganography and Steganalysis
98
Supplementary for UDH: Universal Deep Hiding for Steganography, Watermarking, and Light Field Messaging
99
QoS provi‐ sion for controlling energy consumption in ad‐hoc wireless sensor networks
100
Internet of things monitor‐ ing system of modern eco‐agriculture based on cloud computing
101
TCloud: Cloud SDI Model for Tourism Information Infrastructure Management
102
An Overhead-Optimizing Task Scheduling Strategy for Ad-hoc Based Mobile Edge Computing
103
Nebula: dis‐ tributed edge cloud for data intensive computing
104
V‐boinc: the virtu‐ alization of boinc
105
Monitoring with ganglia: tracking dynamic host and application metrics at scale
106
Cloud‐ Net: dynamic pooling of cloud resources by live WAN migration of virtual machines
108
Grid com‐ puting implementation in ad hoc networks. In: Advances in computer and information sciences and engineering
109
Grid Computing Implementation in Ad Hoc Networks
111
Information hiding: steganogra‑ phy and watermarking‑attacks and countermeasures: steganography and watermarking: attacks and countermeasures, vol 1
113
Future Generation Computer Systems
114
Republic of Gamers Global. 2022. strix gl702 | ROG -Republic of Gamers Global
115
multiple computing platforms, integrating ’WS-PGRADE/ gUSE’ using an ad hoc approach
117
Available at: https:// docs. vmware. com/ en/ VMware-Works tation-Pro/ 15.5/ rn/ VMware-Works tation-1552-Pro-Relea se-Notes
118
more libraries and packages (i.e., Liferay portal project [66])
119
c) The VM is installed at a time it has work to achieve
120
The ad-hoc host gets a VM in addition to the decompression script
121
The ‘DepDisk’ is attached in this state and the new VM disk is established and connected in case one could not exist
122
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations