Java Projects
A Dynamic Optimization Algorithm for Task Scheduling in Cloud Environment
Cloud computing has emerged as a popular computing model to support on demand services. It is a styl..
A Dynamical and Load-Balanced Flow Scheduling Approach for Big Data Centers in Clouds
Load-balanced flow scheduling for big data centers in clouds, in which a large amount of data need..
A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data
Feature selection involves identifying a subset of the most useful features that produces compatible..
A FAULT-TOLERANT SCHEDULING SYSTEM FOR COMPUTATIONAL GRIDS
Abstract: Fault-tolerant scheduling is an important issue for computational grid systems, as gri..
A Feature Reduction Fuzzy Clustering Algorithm Based on Feature Weighted Entropy
Fuzzy clustering algorithms generally treat data points with feature components under equal importan..
A Feature Selection Handle Classification Algorithm Based on Randomized Extraction of Model Population
We here introduce a novel classification approach adopted from the nonlinear model identification f..
A flexible approach to improving system reliability with virtual Lockstep
—There is an increasing need for fault tolerance capabilities in logic devices brought about by the ..
A FRAMEWORK FOR CONSUMER-CENTRIC SLA MANAGEMENT OF CLOUD-HOSTED DATABASES
ABSTRACT The specifications of existing service level agreements (SLA) for cloud services aren't..
A Framework for learning comprehensible Theories in Xml Document Classification
The increasing amount of XML datasets available to casual users increases the necessity of investiga..
A framework for processing large scale geospatial and remote sensing data in Map Reduce environment
Every day a large number of Earth observation (E O) space borne and airborne sensors from many diffe..
A FRAMEWORK FOR QOE ANALYSIS OF ENCRYPTED VIDEO
Today most internet traffic is generated by video streaming. YouTube and other video streaming plat..
A Framework to Eliminate Backdoors from Response-Computable Authentication
A malicious developer can plant backdoors by hiding logic in source code, by planting delicate vulne..
A Fuzzy Preference Tree-Based Recommender System for Personalized Business-to-Business E-Services
In real world applications, Internet plays a vital role on B2B e-services. B..
A Game-Theoretic Approach to the Formation of Clustered Overlay Networks
In many large-scale content sharing applications, participants or nodes are connected with each othe..
A General Scalable and Elastic Content based Publish Subscribe Service
The big data era is characterized by the emergence of live content with increasing complexities of d..