Concurrency Computation Practice and Experience

短名Concurrency Computat Pract Exper
Journal Impact1.63
国际分区COMPUTER SCIENCE, THEORY & METHODS(Q2)
期刊索引SCI Q3中科院 4 区
ISSN1532-0626, 1532-0634
h-index80
国内分区计算机科学(4区)计算机科学计算机软件工程(4区)计算机科学计算机理论方法(4区)

CONCURRENCY AND COMPUTATION: PRACTICE AND EXPERIENCE (CCPE) 在以下交叉领域发表高质量的原创研究论文和权威研究评论论文:并行和分布式计算;高性能计算;计算和数据科学;人工智能和机器学习;大数据应用、算法与系统;网络科学;本体与语义;安全与隐私;云/边缘/雾计算;绿色计算;和量子计算。

期刊主页投稿网址
涉及主题计算机科学操作系统数学工程类程序设计语言人工智能物理计算机网络经济分布式计算地理
出版信息出版商: John Wiley and Sons Ltd出版周期: Semimonthly期刊类型: journal
基本数据创刊年份: 2001原创研究文献占比97.73%自引率:6.70%Gold OA占比: 3.51%
平均审稿周期 网友分享经验:一般,3-8周
平均录用比例网友分享经验:容易

期刊引文格式

这些示例是对学术期刊文章的引用,以及它们应该如何出现在您的参考文献中。

并非所有期刊都按卷和期组织其已发表的文章,因此这些字段是可选的。有些电子期刊不提供页面范围,而是列出文章标识符。在这种情况下,使用文章标识符而不是页面范围是安全的。

只有1位作者的期刊

有2位作者的期刊

有3位作者的期刊

有5位以上作者的期刊

书籍引用格式

以下是创作和编辑的书籍的参考文献的示例。

学位论文引用格式

网页引用格式

这些示例是对网页的引用,以及它们应该如何出现在您的参考文献中。

专利引用格式

最新文章

<scp>PEBS</scp>: An efficient patient‐enabled blockchain system

2024-9-16

QoS prediction of cloud services by selective ensemble learning on prefilling‐based matrix factorizations

2024-9-14

Federated learning based multi‐head attention framework for medical image classification

2024-9-13

FRC‐SGAN based anomaly event recognition for computer night vision in edge and cloud environment

2024-9-13

Issue Information

2024-9-12

Obstacle avoidance planning for industrial robots based on singular manifold splitting configuration space

2024-9-11

Inverse design of a novel multiport power divider based on hybrid neural network

2024-9-11

Applications of blockchain technology in privacy preserving and data security for real time (data) applications

2024-9-10

A self‐stabilizing distributed algorithm for the 1‐MIS problem under the distance‐3 model

2024-9-9

Improved deep network‐based load predictor and optimal load balancing in cloud‐fog services

2024-9-4

Large language model evaluation for high‐performance computing software development

2024-9-4

Detection and mitigation of few control plane attacks in software defined network environments using deep learning algorithm

2024-9-3

Novel hawk swarm‐optimized deep learning classification with K‐nearest neighbor based decision making for autonomous vehicle movement controller

2024-8-31

To secure an e‐commerce system using epidemic mathematical modeling with neural network

2024-8-29

Secure access technology for industrial internet of things

2024-8-29

A distributed memory parallel randomized Kaczmarz for sparse system of equations

2024-8-27

Noise‐robust neural networks for medical image segmentation by dual‐strategy sample selection

2024-8-26

Fair XIDS: Ensuring fairness and transparency in intrusion detection models

2024-8-26

Building an intrusion detection system on <scp>UNSW</scp>‐<scp>NB15</scp>: Reducing the margin of error to deal with data overlap and imbalance

2024-8-22

Enhanced multi‐key privacy‐preserving distributed deep learning protocol with application to diabetic retinopathy diagnosis

2024-8-22

Image encryption algorithm based on a novel <scp>2D</scp> logistic‐sine‐coupling chaos map and bit‐level dynamic scrambling

2024-8-21

Dual‐task enhanced global–local temporal–spatial network for depression recognition from facial videos

2024-8-21

Research on insulator image segmentation and defect recognition technology based on U‐Net and YOLOv7

2024-8-21

Recommending cloud services based on social trust: An overview

2024-8-20

An archive‐based method for efficiently handling small file problems in HDFS

2024-8-20

<scp>Hybrid energy‐Efficient distributed aided frog leaping dynamic A* with reinforcement learning for enhanced trajectory planning in UAV swarms large‐scale networks</scp>

2024-8-20

The blockchain‐based privacy‐preserving searchable attribute‐based encryption scheme for federated learning model in IoMT

2024-8-20

VoWiFi cell capacity improvement using A‐MPDU frame aggregation technique for VBR traffic

2024-8-20

Proactive self‐healing techniques for cloud computing: A systematic review

2024-8-19

HybGBS: A hybrid neural network and grey wolf optimizer for intrusion detection in a cloud computing environment

2024-8-19

Issue Information

2024-8-19

An improved federated transfer learning model for intrusion detection in edge computing empowered wireless sensor networks

2024-8-15

Intelligent botnet detection in IoT networks using parallel CNN‐LSTM fusion

2024-8-15

Metaheuristic algorithms for capacitated controller placement in software defined networks considering failure resilience

2024-8-13

A smart surveillance system utilizing modified federated machine learning: Gossip‐verifiable and quantum‐safe approach

2024-8-13

Adam‐Ladybug Beetle Optimization enabled multi‐objective service placement strategy in fog computing

2024-8-13

M‐DFCPP: A runtime library for multi‐machine dataflow computing

2024-8-7

Runtime performance of a GAMESS quantum chemistry application offloaded to GPUs

2024-8-6

A study of online academic risk prediction based on neural network multivariate time series features

2024-8-6

Ab‐HIDS: An anomaly‐based host intrusion detection system using frequency of N‐gram system call features and ensemble learning for containerized environment

2024-8-6

Issue Information

2024-8-5

SIoT identity management with the ability to preserve owner privacy and built‐in resistance to Sybil attacks

2024-8-4

A provably secure authenticated key agreement protocol for industrial sensor network system

2024-8-4

Enhancing mobile data security using red panda optimized approach with chaotic fuzzy encryption in mobile cloud computing

2024-7-30

Queuing‐based energy‐efficient processing algorithm for smart transportation through <scp>V2V</scp> communication

2024-7-29

<scp>Updated delegated proof of stake and Nash equilibrium</scp>: A mining pool game model for blockchain network

2024-7-28

Optimization design of supply chain network based on BP neural network performance evaluation and feedback mechanism

2024-7-27

帮你贴心管理全部的文献

研飞ivySCI,高效的论文管理

投稿经验分享

分享我的经验,帮你走得更远

Built withby Ivy Science
Copyright © 2020-2024
版权所有:南京青藤格致信息科技有限公司