Jinjun Chen
#156,656
Most Influential Person Now
Jinjun Chen's AcademicInfluence.com Rankings
Jinjun Chencomputer-science Degrees
Computer Science
#8663
World Rank
#9108
Historical Rank
Cloud Computing
#38
World Rank
#38
Historical Rank
Database
#5658
World Rank
#5872
Historical Rank

Download Badge
Computer Science
Jinjun Chen's Degrees
- PhD Computer Science University of California, Riverside
- Masters Computer Science University of California, Riverside
- Bachelors Computer Science University of Science and Technology of China
Similar Degrees You Can Earn
Why Is Jinjun Chen Influential?
(Suggest an Edit or Addition)Jinjun Chen's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- A data placement strategy in scientific cloud workflows (2010) (335)
- Privacy preservation in blockchain based IoT systems: Integration issues, prospects, challenges, and future research directions (2019) (303)
- Differential Privacy Techniques for Cyber Physical Systems: A Survey (2018) (292)
- Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates (2014) (220)
- External integrity verification for outsourced big data in cloud and IoT: A big picture (2015) (198)
- MuR-DPA: Top-Down Levelled Multi-Replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud (2015) (196)
- A Compromised-Time-Cost Scheduling Algorithm in SwinDeW-C for Instance-Intensive Cost-Constrained Workflows on a Cloud Computing Platform (2010) (192)
- DEAL: Differentially Private Auction for Blockchain-Based Microgrids Energy Trading (2020) (181)
- KASR: A Keyword-Aware Service Recommendation Method on MapReduce for Big Data Applications (2014) (178)
- A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud (2013) (168)
- A two-stage locality-sensitive hashing based approach for privacy-preserving mobile service recommendation in cross-platform edge environment (2018) (166)
- Threats to Networking Cloud and Edge Datacenters in the Internet of Things (2016) (155)
- A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using MapReduce on Cloud (2014) (146)
- HireSome-II: Towards Privacy-Aware Cross-Cloud Service Composition for Big Data Applications (2015) (145)
- EnReal: An Energy-Aware Resource Allocation Method for Scientific Workflow Executions in Cloud Environment (2016) (145)
- Towards a trust evaluation middleware for cloud service selection (2017) (129)
- A security framework in G-Hadoop for big data computing across distributed Cloud data centres (2014) (128)
- On-demand minimum cost benchmarking for intermediate dataset storage in scientific cloud workflow systems (2011) (127)
- A cost-effective strategy for intermediate data storage in scientific cloud workflow systems (2010) (108)
- Proximity-Aware Local-Recoding Anonymization with MapReduce for Scalable Big Data Privacy Preservation in Cloud (2015) (104)
- A confidence-based filtering method for DDoS attack defense in cloud environment (2013) (103)
- A hybrid approach for scalable sub-tree anonymization over big data using MapReduce on cloud (2014) (100)
- A Highly Practical Approach toward Achieving Minimum Data Sets Storage Cost in the Cloud (2013) (94)
- Adaptive selection of necessary and sufficient checkpoints for dynamic verification of temporal constraints in grid workflow systems (2007) (93)
- A New Subspace Clustering Strategy for AI-Based Data Analysis in IoT System (2021) (93)
- Combining Local Optimization and Enumeration for QoS-aware Web Service Composition (2010) (91)
- An efficient quasi-identifier index based approach for privacy preservation over incremental data sets on cloud (2013) (89)
- A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud (2015) (88)
- A spatiotemporal compression based approach for efficient big data processing on Cloud (2014) (87)
- An Algorithm in SwinDeW-C for Scheduling Transaction-Intensive Cost-Constrained Cloud Workflows (2008) (86)
- Weighted principal component analysis-based service selection method for multimedia services in cloud (2014) (85)
- Image encryption based on a single‐round dictionary and chaotic sequences in cloud computing (2019) (85)
- CloudGenius: A Hybrid Decision Support Method for Automating the Migration of Web Application Clusters to Public Clouds (2015) (81)
- A dynamic prime number based efficient security mechanism for big sensing data streams (2017) (78)
- Multiple states based temporal consistency for dynamic verification of fixed‐time constraints in Grid workflow systems (2007) (77)
- A data dependency based strategy for intermediate data storage in scientific cloud workflow systems (2010) (76)
- Host-Based Intrusion Detection System with System Calls (2018) (75)
- Public Auditing for Big Data Storage in Cloud Computing -- A Survey (2013) (72)
- A taxonomy of grid workflow verification and validation (2008) (72)
- A novel statistical time-series pattern based interval forecasting strategy for activity durations in workflow systems (2011) (71)
- DLSeF: A Dynamic Key-Length-Based Efficient Real-Time Security Verification Model for Big Data Stream (2017) (69)
- A Cost-Effective Mechanism for Cloud Data Reliability Management Based on Proactive Replica Checking (2012) (68)
- Temporal dependency-based checkpoint selection for dynamic verification of temporal constraints in scientific workflow systems (2011) (68)
- Cloud Computing: Methodology, Systems, and Applications (2011) (67)
- A Dynamic Key Length Based Approach for Real-Time Security Verification of Big Sensing Data Stream (2015) (67)
- The Design of Cloud Workflow Systems (2011) (67)
- A historical probability based noise generation strategy for privacy protection in cloud computing (2012) (65)
- Do we need to handle every temporal violation in scientific workflow systems? (2014) (65)
- SwinDeW-C: A Peer-to-Peer Based Cloud Workflow System (2010) (64)
- Peer-to-Peer Based Grid Workflow Runtime Environment of SwinDeW-G (2007) (64)
- A QoS-aware composition method supporting cross-platform service invocation in cloud environment (2012) (63)
- Grid Computing: Infrastructure, Service, and Applications (2009) (60)
- Data fusion in cyber-physical-social systems: State-of-the-art and perspectives (2019) (59)
- Preventing Temporal Violations in Scientific Workflows: Where and How (2011) (59)
- Temporal dependency based checkpoint selection for dynamic verification of fixed-time constraints in grid workflow systems (2008) (57)
- QoS-aware service recommendation based on relational topic model and factorization machines for IoT Mashup applications (2019) (56)
- Trust‐based robust scheduling and runtime adaptation of scientific workflow (2009) (55)
- Scheduling workflows with privacy protection constraints for big data applications on cloud (2020) (51)
- A throughput maximization strategy for scheduling transaction‐intensive workflows on SwinDeW‐G (2008) (51)
- Quantitative Quality of Service for Grid Computing: Applications for Heterogeneity, Large-scale Distribution, and Dynamic Environments (2009) (49)
- Differential privacy for renewable energy resources based smart metering (2019) (48)
- SEEN: A Selective Encryption Method to Ensure Confidentiality for Big Sensing Data Streams (2019) (45)
- Cost optimization for deadline-aware scheduling of big-data processing jobs on clouds (2017) (45)
- Differential Privacy in Blockhain Technology: A Futuristic Approach (2019) (44)
- DPBSV -- An Efficient and Secure Scheme for Big Sensing Data Stream (2015) (44)
- CPU load prediction for cloud environment based on a dynamic ensemble model (2014) (43)
- Building enterprise mashups (2011) (43)
- A QoS-Aware Service Evaluation Method for Co-selecting a Shared Service (2011) (42)
- P2DCA: A Privacy-Preserving-Based Data Collection and Analysis Framework for IoMT Applications (2019) (41)
- A History Record-Based Service Optimization Method for QoS-Aware Service Composition (2011) (40)
- A MapReduce Based Approach of Scalable Multidimensional Anonymization for Big Data Privacy Preservation on Cloud (2013) (39)
- A Sharding Scheme-Based Many-Objective Optimization Algorithm for Enhancing Security in Blockchain-Enabled Industrial Internet of Things (2021) (39)
- A Secure Big Data Stream Analytics Framework for Disaster Management on the Cloud (2016) (39)
- An Association Probability Based Noise Generation Strategy for Privacy Protection in Cloud Computing (2012) (39)
- Dynamic verification of temporal constraints on-the-fly for workflow systems (2004) (38)
- CCBKE - Session key negotiation for fast and secure scheduling of scientific applications in cloud computing (2013) (37)
- Building Quick Service Query List Using WordNet and Multiple Heterogeneous Ontologies toward More Realistic Service Composition (2011) (36)
- Service Mining for Trusted Service Composition in Cross-Cloud Environment (2017) (35)
- A Probabilistic Strategy for Setting Temporal Constraints in Scientific Workflows (2008) (34)
- Cloud service QoS prediction via exploiting collaborative filtering and location‐based data smoothing (2015) (33)
- Combining Top-Down and Bottom-Up: Scalable Sub-tree Anonymization over Big Data Using MapReduce on Cloud (2013) (32)
- An Optimized Computational Model for Multi-Community-Cloud Social Collaboration (2014) (32)
- A novel general framework for automatic and cost-effective handling of recoverable temporal violations in scientific workflow systems (2011) (31)
- Activity Completion Duration Based Checkpoint Selection for Dynamic Verification of Temporal Constraints in Grid Workflow Systems (2008) (30)
- Privacy Preservation over Big Data in Cloud Systems (2014) (30)
- A Min-Min average algorithm for scheduling transaction-intensive grid workflows (2009) (30)
- An evaluation method of outsourcing services for developing an elastic cloud platform (2010) (30)
- Robust Hashing Based on Quaternion Zernike Moments for Image Authentication (2016) (29)
- A Scalable Data Chunk Similarity Based Compression Approach for Efficient Big Sensing Data Processing on Cloud (2017) (28)
- Handling Recoverable Temporal Violations in Scientific Workflow Systems: A Workflow Rescheduling Based Strategy (2010) (28)
- Privacy Computing: Concept, Computing Framework And Future Development Trends (2019) (28)
- Process-Oriented Enterprise Mashups (2009) (28)
- Energy and cost aware scheduling with batch processing for instance-intensive IoT workflows in clouds (2019) (28)
- Privacy Preserving High-Order Bi-Lanczos in Cloud–Fog Computing for Industrial Applications (2022) (27)
- Trust-based robust scheduling and runtime adaptation of scientific workflow (2009) (27)
- Cybermatics: A Holistic Field for Systematic Study of Cyber-Enabled New Worlds (2015) (27)
- SaC‐FRAPP: a scalable and cost‐effective framework for privacy preservation over big data on cloud (2013) (26)
- A Holistic Approach for Distributed Dimensionality Reduction of Big Data (2018) (26)
- A QSQL-based Efficient Planning Algorithm for Fully-automated Service Composition in Dynamic Service Environments (2008) (26)
- Selecting Top-k Composite Web Services Using Preference-Aware Dominance Relationship (2013) (25)
- Efficient searchable symmetric encryption for storing multiple source dynamic social data on cloud (2017) (25)
- A Mobile Multimedia Data Collection Scheme for Secured Wireless Multimedia Sensor Networks (2020) (25)
- A throughput maximization strategy for scheduling transaction-intensive workflows on SwinDeW-G (2008) (25)
- A policy-based authorization model for workflow-enabled dynamic process management (2009) (24)
- A Survey on Big Multimedia Data Processing and Management in Smart Cities (2019) (24)
- Scalable Local-Recoding Anonymization using Locality Sensitive Hashing for Big Data Privacy Preservation (2016) (24)
- A probabilistic strategy for temporal constraint management in scientific workflow systems (2011) (24)
- Anomaly Detection in Blockchain Networks: A Comprehensive Survey (2021) (24)
- Forecasting Duration Intervals of Scientific Workflow Activities Based on Time-Series Patterns (2008) (24)
- A Synchronized Shared Key Generation Method for Maintaining End-to-End Security of Big Data Streams (2017) (24)
- An Iterative Hierarchical Key Exchange Scheme for Secure Scheduling of Big Data Applications in Cloud Computing (2013) (23)
- A QoS-aware Web Service Selection Method Based on Credibility Evaluation (2010) (23)
- A Local-Optimisation Based Strategy for Cost-Effective Datasets Storage of Scientific Applications in the Cloud (2011) (23)
- A clustering based coscheduling strategy for efficient scientific workflow execution in cloud computing (2013) (22)
- Dual Workflow Nets: Mixed Control/Data-Flow Representation for Workflow Modeling and Verification (2007) (21)
- A Survey on Representation Learning Efforts in Cybersecurity Domain (2019) (20)
- Privacy-Preserving Layer over MapReduce on Cloud (2012) (20)
- Multivariate Multi-Order Markov Multi-Modal Prediction With Its Applications in Network Traffic Management (2019) (20)
- An Upper-Bound Control Approach for Cost-Effective Privacy Protection of Intermediate Dataset Storage in Cloud (2011) (20)
- Achieving On-Time Delivery: A Two-Stage Probabilistic Scheduling Strategy for Software Projects (2009) (18)
- A QoS‐aware service discovery method for elastic cloud computing in an unstructured peer‐to‐peer network (2013) (18)
- Geographical Data Analysis (2009) (18)
- A trust‐based noise injection strategy for privacy protection in cloud (2012) (18)
- Temporal QOS Management in Scientific Cloud Workflow Systems (2012) (18)
- A Time-Series Pattern Based Noise Generation Strategy for Privacy Protection in Cloud Computing (2012) (18)
- Key research issues in grid workflow verification and validation (2006) (17)
- Enabling Privacy-Preserving Shortest Distance Queries on Encrypted Graph Data (2021) (16)
- A traffic hotline discovery method over cloud of things using big taxi GPS data (2017) (16)
- A Distributed and Anonymous Data Collection Framework Based on Multilevel Edge Computing Architecture (2020) (16)
- Temporal Dependency for Dynamic Verification of Fixed-Date Constraints in Grid Workflow Systems (2005) (16)
- A minimum proportional time redundancy based checkpoint selection strategy for dynamic verification of fixed-time constraints in grid workflow systems (2005) (15)
- Graph-Cut Based Coscheduling Strategy Towards Efficient Execution of Scientific Workflows in Collaborative Cloud Environments (2011) (15)
- HKE‐BC: hierarchical key exchange for secure scheduling and auditing of big data in cloud computing (2016) (15)
- Key Research Issues for Privacy Protection and Preservation in Cloud Computing (2012) (15)
- Graph Encryption for Top-K Nearest Keyword Search Queries on Cloud (2017) (15)
- Mining batch processing workflow models from event logs (2013) (14)
- Selecting Necessary and Sufficient Checkpoints for Dynamic Verification of Fixed-Time Constraints in Grid Workflow Systems (2006) (14)
- An Activity Completion Duration based Checkpoint Selection Strategy for Dynamic Verification of Fixed-time Constraints in Grid Workflow Systems (2005) (14)
- On scientific workflow (2007) (14)
- IoT and Big Data: An Architecture with Data Flow and Security Issues (2017) (14)
- Efficient Searchable Symmetric Encryption for Storing Multiple Source Data on Cloud (2015) (13)
- Temporal Dependency for Dynamic Verification of Temporal Constraints in Workflow Systems (2004) (13)
- A Privacy Leakage Upper-bound Constraint based Approach for Cost-effective Privacy Preserving of Intermediate Datasets in Cloud ( Supplementary File ) (2012) (13)
- Collaborative deep learning framework on IoT data with bidirectional NLSTM neural networks for energy consumption forecasting (2022) (13)
- An Authenticated Key Exchange Scheme for Efficient Security-Aware Scheduling of Scientific Applications in Cloud Computing (2011) (13)
- DLSeF (2016) (13)
- A Collaborative QoS-Aware Service Evaluation Method Among Multi-Users for a Shared Service (2012) (12)
- A Hybrid Genetic Algorithm for Privacy and Cost Aware Scheduling of Data Intensive Workflow in Cloud (2015) (12)
- Efficiently Predicting Trustworthiness of Mobile Services Based on Trust Propagation in Social Networks (2015) (11)
- Research on Workflow Scheduling Algorithms in the Cloud (2014) (11)
- Research trends in cloud, cluster and grid computing (2013) (11)
- Efficient Algorithms for Social Network Coverage and Reach (2015) (11)
- Managing large numbers of business processes with cloud workflow systems (2012) (11)
- QoS-Aware Service Selection Using QDG for B2B Collaboration (2008) (10)
- A QoS‐aware exception handling method in scientific workflow execution (2011) (10)
- Localising temporal constraints in scientific workflows (2010) (10)
- A Tensor-Based Forensics Framework for Virtualized Network Functions in the Internet of Things: Utilizing Tensor Algebra in Facilitating More Efficient Network Forensic Investigations (2019) (10)
- On design, verification, and dynamic modification of the problem-based scientific workflow model (2007) (10)
- Flexible Temporal Consistency for Fixed-Time Constraint Verification in Grid Workflow Systems (2005) (10)
- A polynomial‐time algorithm for simple undirected graph isomorphism (2019) (10)
- A Privacy-Leakage-Tolerance Based Noise Enhancing Strategy for Privacy Protection in Cloud Computing (2013) (10)
- Multiple temporal consistency states for dynamical verification of upper bound constraints in grid workflow systems (2005) (10)
- Optimizing Blockchain Based Smart Grid Auctions: A Green Revolution (2021) (10)
- Grid-Based Semantic Web Service Discovery Model with QoS Constraints (2007) (9)
- Building Quick Service Query list (QSQL) to support automated service discovery for scientific workflow (2009) (8)
- Cloud-Assisted Key Distribution in Batch for Secure Real-Time Mobile Services (2018) (8)
- A Workflow Engine-Driven SOA-Based Cooperative Computing Paradigm in Grid Environments (2008) (8)
- A QSQL-Based Service Collaboration Method for Automatic Service Composition, and Optimized Execution (2009) (7)
- A Big Picture of Integrity Verification of Big Data in Cloud Computing (2015) (7)
- Computation and Storage in the Cloud: Understanding the Trade-Offs (2012) (7)
- An Improved Secure High-Order-Lanczos Based Orthogonal Tensor SVD for Outsourced Cyber-Physical-Social Big Data Reduction (2018) (7)
- A Deployment Optimization Scheme Over Multimedia Big Data for Large-Scale Media Streaming Application (2016) (6)
- Robust Scheduling and Runtime Adaptation of Multi-agent Plan Execution (2008) (6)
- Secure Tensor Decomposition for Big Data Using Transparent Computing Paradigm (2019) (6)
- An Effective Framework of Light-Weight Handling for Three-Level Fine-Grained Recoverable Temporal Violations in Scientific Workflows (2010) (6)
- A Task Scheduling Method for Energy-Performance Trade-Off in Clouds (2016) (6)
- WdCM: a workday calendar model for workflows in service grid environments (2008) (6)
- A QSQL-Based Collaboration Framework to Support Automatic Service Composition and Workflow Execution (2008) (6)
- Gradual Removal of QoS Constraint Violations by Employing Recursive Bargaining Strategy for Optimizing Service Composition Execution Path (2009) (6)
- Scientific workflow scheduling with time-related QoS evaluation (2010) (6)
- Reasoning intra-dependency in commitments for robust scheduling (2009) (6)
- A Fuzzy Theory Based Topological Distance Measurement for Undirected Multigraphs (2020) (6)
- Services for Knowledge Sharing in Dynamic Business Networks (2014) (6)
- Introduction: Social Computing and Social Networks (2014) (6)
- Cloud Workflow System Quality of Service (2012) (6)
- Social Sentiment Detection of Event via Microblog (2013) (6)
- Computation and Storage Trade-Off for Cost-Effectively Storing Scientific Datasets in the Cloud (2011) (5)
- Risk-Aware Checkpoint Selection in Cloud-Based Scientific Workflow (2012) (5)
- Differentially Private Dynamic Pricing for Efficient Demand Response in Smart Grid (2020) (5)
- A User Demand Uncertainty Based Approach for Cloud Resource Management (2013) (5)
- A context- and role-driven scientific workflow development pattern (2008) (5)
- A Pre-reasoning Based Method for Service Discovery and Service Instance Selection in Service Grid Environments (2007) (5)
- Managing Email Overload with an Automatic Nonparametric Clustering Approach (2007) (5)
- Cloud Workflow System Architecture (2012) (5)
- Special Issue on Scalable Computing for Big Data (2014) (5)
- A Scalable Multi-Data Sources Based Recursive Approximation Approach for Fast Error Recovery in Big Sensing Data on Cloud (2020) (5)
- Guest Editorial: Big Data Infrastructure I (2018) (5)
- Dependency-based Risk Evaluation for Robust Workflow Scheduling (2012) (4)
- Dynamic Setting, Verification and Adjustment of Upper Bound Constraints in Grid Workflow Systems (2006) (4)
- Building Quick Service Query List Using Wordnet for Automated Service Composition (2008) (4)
- Optimizing execution path of scientific workflow by gradual removal of QoS constraint violations in Reverse Order (2009) (4)
- Workflow Systems in the Cloud (2012) (4)
- Integrating Collaborative Filtering and Association Rule Mining for Market Basket Recommendation (2018) (4)
- An enhanced priority-based scheduling heuristic for DAG applications with temporal unpredictability in task execution and data transmission (2019) (4)
- A benchmark approach and its toolkit for online scheduling of multiple deadline-constrained workflows in big-data processing systems (2018) (4)
- Differential Privacy-based Permissioned Blockchain for Private Data Sharing in Industrial IoT (2021) (4)
- Dual incremental fuzzy schemes for frequent itemsets discovery in streaming numeric data (2020) (4)
- Towards Energy-Efficient Scheduling with Batch Processing for Instance-Intensive Cloud Workflows (2018) (4)
- Personalized Commodity Recommendations of Retail Business Using User Feature Based Collaborative Filtering (2018) (4)
- Graph Embedding (2021) (4)
- Differential Privacy in Cognitive Radio Networks: A Comprehensive Survey (2021) (4)
- Querying Streaming XML Big Data with Multiple Filters on Cloud (2013) (4)
- Grid Computing (2018) (4)
- VPT: Privacy Preserving Energy Trading and Block Mining Mechanism for Blockchain based Virtual Power Plants (2021) (3)
- Assigning Local Fixed-time Constraints in Grid Workflow Systems (2006) (3)
- Special Issue: First International Workshop on Workflow Systems in Grid Environments (WSGE2006) (2008) (3)
- Big Data Stream Security Classification for IoT Applications (2019) (3)
- Reputation rating modeling for open environment lack of communication by using online social cognition (2012) (3)
- Towards Effective and Efficient Temporal Verification in Grid Workflow Systems (2007) (3)
- An Adaptive Priority-Based Heuristic Approach for Scheduling DAG Applications with Uncertainties (2017) (3)
- A Job Scheduling Optimization Model based on Time Difference in Service Grid Environments (2007) (3)
- A context‐ and role‐driven scientific workflow development pattern (2008) (3)
- Secure Outsourced Principal Eigentensor Computation for Cyber-Physical-Social Systems (2018) (3)
- Grid and Workflows (2009) (2)
- Computation and Storage in the Cloud (2013) (2)
- A Scientific Cloud Workflow System (2012) (2)
- Case Study: SwinDeW-C Cloud Workflow System (2012) (2)
- Special Issue: 3rd International Workshop on Workflow Management and Applications in Grid Environments (WaGe2008) (2009) (2)
- Cloud Workflow System Functionality (2012) (2)
- Dynamic Virtual Machine Number Selection for Processing-Capacity Constrained Workflow Scheduling in Cloud Computing Environments (2019) (2)
- Guest Editorial: Big Data Infrastructure II (2018) (2)
- An Improved DVFS Algorithm for Energy-Efficient Real-time Task Scheduling (2020) (2)
- A Reverse Order-Based QoS Constraint Correction Approach for Optimizing Execution Path for Service Composition (2008) (2)
- A data stream view for scientific workflow (2009) (2)
- A Method for Optimizing Top-k Composite Services towards Preference-Aware Service Dominance (2013) (2)
- Cost Model of Data Set Storage in the Cloud (2013) (2)
- A Resource Provisioning Strategy for Elastic Analytical Workflows in the Cloud (2016) (2)
- Grid computing: technology, service, and applications (2009) (2)
- Performance Evaluation of Differential Privacy Mechanisms in Blockchain based Smart Metering (2020) (2)
- 2 – Literature Review (2013) (2)
- A service evaluation method for cross‐cloud service choreography (2015) (2)
- A Knowledge Map Based Composite Services Model and its Application in WSG-Based Services Discovery (2007) (1)
- Special Issue: Dependable and Secure Computing (2014) (1)
- Implementation of a Visual Modeling Tool for Defining Instance Aspect in Workflow (2009) (1)
- Multiple states based temporal consistency for dynamic verification of fixed-time constraints in Grid workflow systems: Research Articles (2007) (1)
- Efficient Nonlinear Regression-Based Compression of Big Sensing Data on Cloud (2017) (1)
- Network and parallel computing: proceedings of the IFIP International Conference (NPC 2008), Shanghai, China, 18-20 October 2008 (2008) (1)
- Guest editorial: Special issue on data intensive cloud computing (2015) (1)
- MultiScan: A Private Online Virus Detection System (2019) (1)
- Special issue: Second International Workshop on Workflow Management and Applications in Grid Environments (WaGe2007) (2008) (1)
- Securely Reinforcing Synchronization for Embedded Online Contests (2017) (1)
- A Resource Usage Prediction-Based Energy-Aware Scheduling Algorithm for Instance-Intensive Cloud Workflows (2018) (1)
- Image encryption based on a single-round dictionary and chaotic sequences in cloud computing: Image Encryption in Cloud Computing (2019) (1)
- Special Issue: Cloud Computing 2011 (2012) (1)
- A DBN-Based Ensemble Method for Resource Usage Prediction in Clouds (2019) (1)
- Evaluating DAG Scheduling Algorithms for Maximum Parallelism (2020) (1)
- Special issue: second international workshop on workflow management in service and cloud computing (WMSC2010) (2013) (1)
- Effective and Efficient Temporal Verification in Grid Workflow: Enabling timely completion of grid workflow (2011) (1)
- Risk evaluation-based selection approach for transactional services composition (2011) (1)
- A Comprehensive Evaluation Method for Cross-Organizational Service Selection (2010) (1)
- Multiple Consistency States of Fixed-time Constraints in Grid Workflow Systems (2005) (1)
- 1 Necessary and Sufficient Checkpoint Selection in Grid Workflow Systems (2006) (1)
- Special Issue: Fourth International Workshop on Workflow Management (ICWM2009) (2011) (1)
- Literature Review and Problem Analysis (2012) (0)
- Minimum Cost Benchmarking for Intermediate Data Storage in Scientific Cloud Workflow Systems (2010) (0)
- Grid computing and web services (2004) (0)
- Proceedings of the Eighth Australasian Symposium on Parallel and Distributed Computing - Volume 107 (2010) (0)
- Message from the CGC2012 Chairs (2012) (0)
- Temporal verification in grid workflows (2006) (0)
- Checkpoint selection for temporal verification in grid workflows (2007) (0)
- Special issue: Scientific workflow 2009 (2010) (0)
- Forecasting Scientific Cloud Workflow Activity Duration Intervals (2012) (0)
- Temporal Constraint Setting (2012) (0)
- Databases Theory and Applications (2018) (0)
- Special issue: 2016 International Conference on Information Technology in Medicine and Education (ITME2016) (2019) (0)
- Orchestrating e-Science with the Workflow Paradigm: Task-Based Scientific Workflow Modeling and Executing (2011) (0)
- Grid workflow vs business workflow (2006) (0)
- DASC 2011: message from the chairs (2011) (0)
- Transaction / Regular Paper Title (2012) (0)
- Safety Analysis and Performance Evaluation of Time WF-nets (2007) (0)
- 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing : (DASC 2011) : Sydney, Australia, 12-14 December 2011 (2011) (0)
- International Conference on Network and Parallel Computing: Preface (2009) (0)
- Temporal Violation Handling (2012) (0)
- Special Section on Privacy Computing: Principles and Applications (2020) (0)
- Cost-Effective Data Set Storage Strategies (2013) (0)
- Workflow Refactoring for Concurrent Task Execution (2012) (0)
- WMSC 2011: message from the program co-chairs (2011) (0)
- Motivating Example and Research Issues (2013) (0)
- Differential privacy for edge computing-based smart grid operating over blockchain (2020) (0)
- Message from BDCloud Chairs (2014) (0)
- Minimum Cost Benchmarking Approaches (2013) (0)
- 7 – Experiments and Evaluations (2013) (0)
- 2012 Second International Conference on Cloud and Green Computing, CGC 2012, Xiangtan, Hunan, China, November 1-3, 2012 (2012) (0)
- Conclusions and Contributions (2013) (0)
- SPECIAL ISSUE PAPER HKE-BC: hierarchical key exchange for secure scheduling and auditing of big data in cloud computing (2014) (0)
- Message from the AHPCN-10 Symposium Chairs (2010) (0)
- End-to-end security framework for big sensing data streams (2017) (0)
- Guest editorial: special issue on data science in cyberspace 2019 (2020) (0)
- Multiple-Step Backtracking of Exception Handling in Autonomous Business Process Management (2010) (0)
- Temporal Violation Handling Point Selection (2012) (0)
- A Secure Big Data Streams Analytics Farmework for Disater Management on Cloud (2016) (0)
- Temporal Checkpoint Selection and Temporal Verification (2012) (0)
- Preface: 6th IFIP International Conference on Network and Parallel Computing (2009) (0)
- Message from the ISPA 2009 Workshop Chairs (2009) (0)
- Grid, scientific and business workflow management systems and grid workflow verification and validation (2007) (0)
- Grid Infrastructure and Middleware (2009) (0)
- Special issue: 2011 international conference on cloud and green computing (CGC2011) (2013) (0)
- LSDSS Introduction (2012) (0)
- Security, Privacy, and Anonymity in Computation, Communication, and Storage (2018) (0)
- 10 – Conclusions and Contribution (2012) (0)
- Message from the Workshop Chairs: WMSC 2010 (2010) (0)
- Novel Probabilistic Temporal Framework (2012) (0)
- An Extensible Toolkit for Resource Usage Prediction in Clouds (2019) (0)
- Message from the PriSecCSN2012 workshop chairs (2012) (0)
- Workshop on Large Scale Distributed Service-oriented Systems (LSDSS-2012) (2012) (0)
- IoT Sensors and Devices Area Editor (2014) (0)
This paper list is powered by the following services: