Concurrency Computation Practice and Experience
短名 | Concurrency Computat Pract Exper |
Journal Impact | 1.63 |
国际分区 | COMPUTER SCIENCE, THEORY & METHODS(Q2) |
期刊索引 | SCI Q3中科院 4 区 |
ISSN | 1532-0626, 1532-0634 |
h-index | 80 |
国内分区 | 计算机科学(4区)计算机科学计算机软件工程(4区)计算机科学计算机理论方法(4区) |
CONCURRENCY AND COMPUTATION: PRACTICE AND EXPERIENCE (CCPE) 在以下交叉领域发表高质量的原创研究论文和权威研究评论论文:并行和分布式计算;高性能计算;计算和数据科学;人工智能和机器学习;大数据应用、算法与系统;网络科学;本体与语义;安全与隐私;云/边缘/雾计算;绿色计算;和量子计算。
期刊主页投稿网址涉及主题 | 计算机科学操作系统数学工程类程序设计语言人工智能物理计算机网络经济分布式计算地理 |
出版信息 | 出版商: John Wiley and Sons Ltd,出版周期: Semimonthly,期刊类型: journal |
基本数据 | 创刊年份: 2001,原创研究文献占比: 97.73%,自引率:6.70%, Gold OA占比: 3.51% |
平均审稿周期 | 网友分享经验:一般,3-8周 |
平均录用比例 | 网友分享经验:容易 |
期刊引文格式
这些示例是对学术期刊文章的引用,以及它们应该如何出现在您的参考文献中。
并非所有期刊都按卷和期组织其已发表的文章,因此这些字段是可选的。有些电子期刊不提供页面范围,而是列出文章标识符。在这种情况下,使用文章标识符而不是页面范围是安全的。
只有1位作者的期刊
有2位作者的期刊
有3位作者的期刊
有5位以上作者的期刊
书籍引用格式
以下是创作和编辑的书籍的参考文献的示例。
学位论文引用格式
网页引用格式
这些示例是对网页的引用,以及它们应该如何出现在您的参考文献中。
专利引用格式
最新文章
<scp>PEBS</scp>: An efficient patient‐enabled blockchain system
2024-9-16
QoS prediction of cloud services by selective ensemble learning on prefilling‐based matrix factorizations
2024-9-14
Federated learning based multi‐head attention framework for medical image classification
2024-9-13
FRC‐SGAN based anomaly event recognition for computer night vision in edge and cloud environment
2024-9-13
Issue Information
2024-9-12
Obstacle avoidance planning for industrial robots based on singular manifold splitting configuration space
2024-9-11
Inverse design of a novel multiport power divider based on hybrid neural network
2024-9-11
Applications of blockchain technology in privacy preserving and data security for real time (data) applications
2024-9-10
A self‐stabilizing distributed algorithm for the 1‐MIS problem under the distance‐3 model
2024-9-9
Improved deep network‐based load predictor and optimal load balancing in cloud‐fog services
2024-9-4
Large language model evaluation for high‐performance computing software development
2024-9-4
Detection and mitigation of few control plane attacks in software defined network environments using deep learning algorithm
2024-9-3
Novel hawk swarm‐optimized deep learning classification with K‐nearest neighbor based decision making for autonomous vehicle movement controller
2024-8-31
To secure an e‐commerce system using epidemic mathematical modeling with neural network
2024-8-29
Secure access technology for industrial internet of things
2024-8-29
A distributed memory parallel randomized Kaczmarz for sparse system of equations
2024-8-27
Noise‐robust neural networks for medical image segmentation by dual‐strategy sample selection
2024-8-26
Fair XIDS: Ensuring fairness and transparency in intrusion detection models
2024-8-26
Building an intrusion detection system on <scp>UNSW</scp>‐<scp>NB15</scp>: Reducing the margin of error to deal with data overlap and imbalance
2024-8-22
Enhanced multi‐key privacy‐preserving distributed deep learning protocol with application to diabetic retinopathy diagnosis
2024-8-22
Image encryption algorithm based on a novel <scp>2D</scp> logistic‐sine‐coupling chaos map and bit‐level dynamic scrambling
2024-8-21
Dual‐task enhanced global–local temporal–spatial network for depression recognition from facial videos
2024-8-21
Research on insulator image segmentation and defect recognition technology based on U‐Net and YOLOv7
2024-8-21
Recommending cloud services based on social trust: An overview
2024-8-20
An archive‐based method for efficiently handling small file problems in HDFS
2024-8-20
<scp>Hybrid energy‐Efficient distributed aided frog leaping dynamic A* with reinforcement learning for enhanced trajectory planning in UAV swarms large‐scale networks</scp>
2024-8-20
The blockchain‐based privacy‐preserving searchable attribute‐based encryption scheme for federated learning model in IoMT
2024-8-20
VoWiFi cell capacity improvement using A‐MPDU frame aggregation technique for VBR traffic
2024-8-20
Proactive self‐healing techniques for cloud computing: A systematic review
2024-8-19
HybGBS: A hybrid neural network and grey wolf optimizer for intrusion detection in a cloud computing environment
2024-8-19
Issue Information
2024-8-19
An improved federated transfer learning model for intrusion detection in edge computing empowered wireless sensor networks
2024-8-15
Intelligent botnet detection in IoT networks using parallel CNN‐LSTM fusion
2024-8-15
Metaheuristic algorithms for capacitated controller placement in software defined networks considering failure resilience
2024-8-13
A smart surveillance system utilizing modified federated machine learning: Gossip‐verifiable and quantum‐safe approach
2024-8-13
Adam‐Ladybug Beetle Optimization enabled multi‐objective service placement strategy in fog computing
2024-8-13
M‐DFCPP: A runtime library for multi‐machine dataflow computing
2024-8-7
Runtime performance of a GAMESS quantum chemistry application offloaded to GPUs
2024-8-6
A study of online academic risk prediction based on neural network multivariate time series features
2024-8-6
Ab‐HIDS: An anomaly‐based host intrusion detection system using frequency of N‐gram system call features and ensemble learning for containerized environment
2024-8-6
Issue Information
2024-8-5
SIoT identity management with the ability to preserve owner privacy and built‐in resistance to Sybil attacks
2024-8-4
A provably secure authenticated key agreement protocol for industrial sensor network system
2024-8-4
Enhancing mobile data security using red panda optimized approach with chaotic fuzzy encryption in mobile cloud computing
2024-7-30
Queuing‐based energy‐efficient processing algorithm for smart transportation through <scp>V2V</scp> communication
2024-7-29
<scp>Updated delegated proof of stake and Nash equilibrium</scp>: A mining pool game model for blockchain network
2024-7-28
Optimization design of supply chain network based on BP neural network performance evaluation and feedback mechanism
2024-7-27
帮你贴心管理全部的文献
研飞ivySCI,高效的论文管理
投稿经验分享
分享我的经验,帮你走得更远