All Stories

  1. A New Collection of Indian Court Case Summaries to Help Computers Understand Legal Documents
  2. Harnessing Genome Representation Learning for Decoding Phage-Host Interactions
  3. A Pontryagin Principle-Based Frequency Governor for Constrained Computing Systems
  4. Using Psychology and Machine Learning to Improve Human-Robot Interaction
  5. Computational Challenges and Approaches for Electric Vehicles
  6. Modeling Influencer Marketing Campaigns in Social Networks
  7. A Communication-Efficient Local Differentially Private Algorithm in Federated Optimization
  8. Safe deployment of a reinforcement learning robot using self stabilization
  9. A Hybrid Cooperative Method With Lévy Flights for Electric Vehicle Charge Scheduling
  10. Modelling prejudice and its effect on societal prosperity
  11. Cooperative solutions to exploration tasks under speed and budget constraints
  12. Charging Station Planning for Electric Vehicles
  13. Market Dynamics and Regulation of a Crowd-Sourced AI Marketplace
  14. Firm dynamics and employee performance management in duopoly markets
  15. Scheduling computing loads for improved utilization of solar energy
  16. Modeling the Spread and Control of COVID-19
  17. Matrix multiplication by neuromorphic computing
  18. Energy-efficient scheduling: classification, bounds, and algorithms
  19. Service provider strategies in telecommunications markets: analytical and simulation analysis
  20. Analyzing the effects of memory biases and mood disorders on social performance
  21. Incorporating Autonomous Bargaining Capabilities into E-Commerce Systems
  22. Computational Sustainability: A Socio-technical Perspective
  23. Understanding the effects of data localization policies
  24. Modeling the Spread and Control of COVID-19
  25. Deep Learning Moves Cancer Vaccines Toward Reality
  26. Understanding Ethics via Artificial Intelligence and Game Theory
  27. Distributed Elections Using Site-Push Majority Winner Monitoring
  28. Lockdowns to Contain COVID-19 Increase Risk and Severity of Mosquito-Borne Disease Outbreaks
  29. WITHDRAWN: Lockdowns to Contain COVID-19 Increase Risk and Severity of Mosquito-Borne Disease Outbreaks
  30. A Trusted Agent Strategy in Decentralized Network Environments
  31. Modeling Pedestrian Behavior Under Panic During a Fire Emergency
  32. Lockdowns to Contain COVID-19 Increase Risk and Severity of Mosquito-Borne Disease Outbreaks
  33. IEEE 754 floating-point addition for neuromorphic architecture
  34. A Predictive Model for Drug-Drug Interaction Using a Similarity Measure
  35. A Scalable Clustering Algorithm for Serendipity in Recommender Systems
  36. Adaptive Human-Agent Multi-Issue Bilateral Negotiation Using the Thomas- Kilmann Conflict Mode Instrument
  37. Distributed and Efficient Resource Balancing Among Many Suppliers and Consumers
  38. Modeling Confirmation Bias Through Egoism and Trust in a Multi Agent System
  39. Theory and Agent-Based Modeling of Taxpayer Preference and Behavior
  40. A Combinatorial Auction Mechanism for Multiple Resource Procurement in Cloud Computing
  41. Analytics on the Cloud
  42. Classification of SDSS Photometric Data Using Machine Learning on A Cloud
  43. Agent-Based Modeling of Emergency Evacuations Considering Human Panic Behavior
  44. ASD: A Framework for Generation of Task Hierarchies for Transfer in Reinforcement Learning
  45. A Distance Function for Comparing Straight-Edge Geometric Figures
  46. Online scheduling of a fleet of autonomous vehicles using agent-based procurement auctions
  47. Tier-Centric Resource Allocation in Multi-Tier Cloud Systems
  48. 3HAN: A Deep Neural Network for Fake News Detection
  49. Neural Machine Translation of Indian Languages
  50. Automatic prediction of fluency in interface-based interviews
  51. EEQuest
  52. Erratum to: A novel revenue optimization model to address the operation and maintenance cost of a data center
  53. Agent-based modelling of biofilm formation and inhibition in Escherichia coli
  54. Agent-based modelling of biofilm formation and inhibition in Escherichia coli
  55. System of Systems for Quality-of-Service Observation and Response in Cloud Computing Environments
  56. Energy-Aware Scheduling of Distributed Systems
  57. A self-governing, decentralized, extensible Internet of Things to share electrical power efficiently
  58. Pricing/billing model to account for the electricity cost in charging consumers for cloud services
  59. DEGRADATION ANALYSIS OF PROBABILISTIC PARALLEL CHOICE SYSTEMS
  60. Air Cargo Demand Modeling and Prediction
  61. Cloud-based Mission Observation, Response, Exploitation (CMORE) System
  62. A Mechanism Design Approach to Resource Procurement in Cloud Computing
  63. Implementing a Publish-Subscribe Distributed Notification System on Hadoop
  64. A resource allocation mechanism using coalition formation and the uncertainty principle of game theory
  65. (m,n)-Semirings and a Generalized Fault-Tolerance Algebra of Systems
  66. Meta-learning based architectural and algorithmic optimization for achieving green-ness in predictive workload analytics
  67. Cloudlet-Based Multi-lingual Dictionaries
  68. Enhancement of Hadoop Clusters with Virtualization Using the Capacity Scheduler
  69. Hadoop Compatible Framework for Discovering Network Topology and Detecting Hardware Failures
  70. Online Ensemble Learning Approach for Server Workload Prediction in Large Datacenters
  71. A Combinatorial Auction mechanism for multiple resource procurement in cloud computing
  72. Notification of data-stream events in Publish/Subscribe systems using fuzzy matching
  73. Sensor Network Design for Smart Highways
  74. System of Systems to provide Quality of Service monitoring, management and response in cloud computing environments
  75. Reducing Variation in Solar Energy Supply Through Frequency Domain Analysis
  76. Deduplication and compression techniques in cloud design
  77. Energy-aware scheduling of distributed systems using cellular automata
  78. Improving resource allocation in multi-tier cloud systems
  79. Modeling a publish/subscribe system as a multi-commodity transportation problem
  80. Smart metering of cloud services
  81. Insertion and querying mechanism for a distributed XML database system
  82. Detecting and diagnosing application misbehaviors in ‘on-demand’ virtual computing infrastructures
  83. A P2P approach for automating seamless connectivity given intermittent bandwidth constraints
  84. Fail-Stop Distributed Combinatorial Auctioning Systems with fair resource allocation
  85. CloudSpider: Combining Replication with Scheduling for Optimizing Live Migration of Virtual Machines across Wide Area Networks
  86. Anticipatory retrieval and caching of data for mobile devices in variable-bandwidth environments
  87. Optimizing live migration of virtual machines across wide area networks using integrated replication and scheduling
  88. Energy conservation in cloud infrastructures
  89. Operating cost aware scheduling model for distributed servers based on global power pricing policies
  90. Towards 'integrated' monitoring and management of DataCenters using complex event processing techniques
  91. Failover in Cellular Automata
  92. Comparative performance evaluation of TCP Hybla and TCP Cubic for satellite communication under low error conditions
  93. Simulation and Pricing Mechanism Analysis of a Solar-Powered Electrical Microgrid
  94. Energy optimization policies for server clusters
  95. The Potluck Problem
  96. A modified and effective system-engineering life cycle for critical systems
  97. Modeling and reducing power consumption in large IT systems
  98. Citation Matching in Sanskrit Corpora Using Local Alignment
  99. A Foundation of Demand-Side Resource Management in Distributed Systems
  100. Lothlorien: Mandatory Access Control using Linux Security Modules
  101. Sensor network design for smart highways
  102. An efficient algorithm for RFID reader positioning for coverage of irregularly-shaped areas
  103. The Potluck Problem with consumers' choice behavior
  104. Content-Split Based Effective String-Matching for Multi-Core Based Intrusion Detection Systems
  105. Topology Control in Wireless Sensor Networks
  106. Air cargo demand prediction
  107. A formal method approach to analyze the design of aircraft Flight Control Systems
  108. A foundation for system safety using predicate logic
  109. A Systems Algebra and Its Applications
  110. Cluster Performance Forecasting Using Predictive Modeling for Virtual Beowulf Clusters
  111. A Threat-Aware Anomaly-Based Intrusion-Detection Approach for Obtaining Network-Specific Useful Alarms
  112. Fair Resource Allocation in Distributed Combinatorial Auctioning Systems
  113. A Threat-Aware Signature Based Intrusion-Detection Approach for Obtaining Network-Specific Useful Alarms
  114. Novel validation algorithms for safety critical embedded software
  115. The n-queens problem in higher dimensions
  116. Explaining the St. Petersburg Paradox