SOTAVerified

Cloud Computing

to study

Papers

Showing 151200 of 581 papers

TitleStatusHype
Challenges of Privacy-Preserving Machine Learning in IoT0
Survey on Deep Neural Networks in Speech and Vision Systems0
Assessing wildfire susceptibility in Iran: Leveraging machine learning for geospatial analysis of climatic and anthropogenic factors0
A smart resource management mechanism with trust access control for cloud computing environment0
Allocating Duplicate Copies for IoT Data in Cloud Computing Based on Harmony Search Algorithm0
Deep Learning for Secure Mobile Edge Computing0
A Semantic Approach for Big Data Exploration in Industry 4.00
A Deep Learning Approach for Mobility-Aware and Energy-Efficient Resource Allocation in MEC0
A Schedule of Duties in the Cloud Space Using a Modified Salp Swarm Algorithm0
Artificial life, complex systems and cloud computing: a short review0
A Lightweight and Privacy-Preserving Authentication Protocol for Mobile Edge Computing0
Artificial Intelligence enhanced Security Problems in Real-Time Scenario using Blowfish Algorithm0
Artificial Intelligence as a Services (AI-aaS) on Software-Defined Infrastructure0
AI-Powered Non-Contact In-Home Gait Monitoring and Activity Recognition System Based on mm-Wave FMCW Radar and Cloud Computing0
Adaptive Fault Tolerance Mechanisms of Large Language Models in Cloud Computing Environments0
A2CI: A Cloud-based, Service-oriented Geospatial Cyberinfrastructure to Support Atmospheric Research0
Cross-Cloud Data Privacy Protection: Optimizing Collaborative Mechanisms of AI Systems by Integrating Federated Learning and LLMs0
A Review on Computational Intelligence Techniques in Cloud and Edge Computing0
AI Horizon Scanning, White Paper p3395, IEEE-SA. Part I: Areas of Attention0
Controlling Chaos Using Edge Computing Hardware0
Continuous Invariance Learning0
A Review of Machine Learning-based Security in Cloud Computing0
Continental-scale land cover mapping at 10 m resolution over Europe (ELC10)0
Crowd Counting on Heavily Compressed Images with Curriculum Pre-Training0
Cyberattack Detection in Mobile Cloud Computing: A Deep Learning Approach0
Darknet Traffic Big-Data Analysis and Network Management to Real-Time Automating the Malicious Intent Detection Process by a Weight Agnostic Neural Networks Framework0
Data Aggregation Techniques for Internet of Things0
Data-Intensive Supercomputing in the Cloud: Global Analytics for Satellite Imagery0
Data Lakes, Clouds and Commons: A Review of Platforms for Analyzing and Sharing Genomic Data0
Context-aware deep model compression for edge cloud computing0
Data Mining with Big Data in Intrusion Detection Systems: A Systematic Literature Review0
Decoding the Molecular Universe -- Workshop Report0
A Review of High-Performance Computing and Parallel Techniques Applied to Power Systems Optimization0
AI-Driven Security in Cloud Computing: Enhancing Threat Detection, Automated Response, and Cyber Resilience0
Adaptive-Aggressive Traders Don't Dominate0
Confused Modulo Projection based Somewhat Homomorphic Encryption -- Cryptosystem, Library and Applications on Secure Smart Cities0
Conditionally Deep Hybrid Neural Networks Across Edge and Cloud0
Deep Reinforcement Learning-Aided RAN Slicing Enforcement for B5G Latency Sensitive Services0
Deep Reinforcement Learning Based Resource Allocation for Cloud Native Wireless Network0
Deep Reinforcement Learning for Job Scheduling and Resource Management in Cloud Computing: An Algorithm-Level Review0
ArchNet: Data Hiding Model in Distributed Machine Learning System0
DeF-DReL: Systematic Deployment of Serverless Functions in Fog and Cloud environments using Deep Reinforcement Learning0
Delay-Tolerant Constrained OCO with Application to Network Resource Allocation0
Demonstration of effective UCB-based routing in skill-based queues on real-world data0
Dependency-Aware Computation Offloading in Mobile Edge Computing: A Reinforcement Learning Approach0
Deployment of an IoT System for Adaptive In-Situ Soundscape Augmentation0
Design and Implementation of Data-driven Predictive Cloud Control System0
Design and implementation of smart cooking based on amazon echo0
Computational Offloading in Semantic-Aware Cloud-Edge-End Collaborative Networks0
Edge Computing for IoT: Novel Insights from a Comparative Analysis of Access Control Models0
Show:102550
← PrevPage 4 of 12Next →

No leaderboard results yet.