
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Integration of task abortion and security requirements in GA-based meta-heuristics for independent batch grid scheduling
Joanna Kołodziej, Fatos Xhafa
Computers & Mathematics with Applications (2011) Vol. 63, Iss. 2, pp. 350-364
Closed Access | Times Cited: 29
Joanna Kołodziej, Fatos Xhafa
Computers & Mathematics with Applications (2011) Vol. 63, Iss. 2, pp. 350-364
Closed Access | Times Cited: 29
Showing 1-25 of 29 citing articles:
A security framework in G-Hadoop for big data computing across distributed Cloud data centres
Jiaqi Zhao, Lizhe Wang, Jie Tao, et al.
Journal of Computer and System Sciences (2014) Vol. 80, Iss. 5, pp. 994-1007
Open Access | Times Cited: 123
Jiaqi Zhao, Lizhe Wang, Jie Tao, et al.
Journal of Computer and System Sciences (2014) Vol. 80, Iss. 5, pp. 994-1007
Open Access | Times Cited: 123
Modelling and simulation of security-aware task scheduling in cloud computing based on Blockchain technology
Andrzej Wilczyński, Joanna Kołodziej
Simulation Modelling Practice and Theory (2019) Vol. 99, pp. 102038-102038
Closed Access | Times Cited: 73
Andrzej Wilczyński, Joanna Kołodziej
Simulation Modelling Practice and Theory (2019) Vol. 99, pp. 102038-102038
Closed Access | Times Cited: 73
MOHBA: Multi-objective Honey Badger Algorithm for workflow scheduling in heterogeneous Cloud–Fog-IoT networks
Prashant Shukla, Deepika Agrawal, Sudhakar Pandey, et al.
International Journal of Information Technology (2024)
Closed Access | Times Cited: 5
Prashant Shukla, Deepika Agrawal, Sudhakar Pandey, et al.
International Journal of Information Technology (2024)
Closed Access | Times Cited: 5
Security, energy, and performance-aware resource allocation mechanisms for computational grids
Joanna Kołodziej, Samee U. Khan, Lizhe Wang, et al.
Future Generation Computer Systems (2012) Vol. 31, pp. 77-92
Closed Access | Times Cited: 65
Joanna Kołodziej, Samee U. Khan, Lizhe Wang, et al.
Future Generation Computer Systems (2012) Vol. 31, pp. 77-92
Closed Access | Times Cited: 65
Task scheduling mechanisms in fog computing: review, trends, and perspectives
Yang Xin, Nazanin Rahmani
Kybernetes (2020) Vol. 50, Iss. 1, pp. 22-38
Closed Access | Times Cited: 39
Yang Xin, Nazanin Rahmani
Kybernetes (2020) Vol. 50, Iss. 1, pp. 22-38
Closed Access | Times Cited: 39
An optimized scheduling algorithm on a cloud workflow using a discrete particle swarm
Jianfang Cao, Junjie Chen, Qingshan Zhao
Cybernetics and Information Technologies (2014) Vol. 14, Iss. 1, pp. 25-39
Open Access | Times Cited: 45
Jianfang Cao, Junjie Chen, Qingshan Zhao
Cybernetics and Information Technologies (2014) Vol. 14, Iss. 1, pp. 25-39
Open Access | Times Cited: 45
Data Scheduling in Data Grids and Data Centers: A Short Taxonomy of Problems and Intelligent Resolution Techniques
Joanna Kołodziej, Samee U. Khan
Lecture notes in computer science (2013), pp. 103-119
Closed Access | Times Cited: 32
Joanna Kołodziej, Samee U. Khan
Lecture notes in computer science (2013), pp. 103-119
Closed Access | Times Cited: 32
Non-deterministic security driven meta scheduler for distributed cloud organizations
Agnieszka Jakóbik, Daniel Grzonka, Francesco Palmieri
Simulation Modelling Practice and Theory (2016) Vol. 76, pp. 67-81
Closed Access | Times Cited: 27
Agnieszka Jakóbik, Daniel Grzonka, Francesco Palmieri
Simulation Modelling Practice and Theory (2016) Vol. 76, pp. 67-81
Closed Access | Times Cited: 27
A hyper-heuristic approach for resource provisioning-based scheduling in grid environment
Rajni Aron, Inderveer Chana, Ajith Abraham
The Journal of Supercomputing (2015) Vol. 71, Iss. 4, pp. 1427-1450
Closed Access | Times Cited: 28
Rajni Aron, Inderveer Chana, Ajith Abraham
The Journal of Supercomputing (2015) Vol. 71, Iss. 4, pp. 1427-1450
Closed Access | Times Cited: 28
Task Scheduling Using Two-Phase Variable Neighborhood Search Algorithm on Heterogeneous Computing and Grid Environments
S. Thamarai Selvi, P. Manimegalai
Arabian Journal for Science and Engineering (2015) Vol. 40, Iss. 3, pp. 817-844
Closed Access | Times Cited: 22
S. Thamarai Selvi, P. Manimegalai
Arabian Journal for Science and Engineering (2015) Vol. 40, Iss. 3, pp. 817-844
Closed Access | Times Cited: 22
Mastering Big Data in the Digital Age
Kijpokin Kasemsap
Advances in data mining and database management book series (2016), pp. 104-129
Closed Access | Times Cited: 16
Kijpokin Kasemsap
Advances in data mining and database management book series (2016), pp. 104-129
Closed Access | Times Cited: 16
Trust-Based Scheduling Strategy for Workflow Applications in Cloud Environment
Yuli Yang, Xinguang Peng
2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (2013) Vol. 4, pp. 316-320
Closed Access | Times Cited: 14
Yuli Yang, Xinguang Peng
2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (2013) Vol. 4, pp. 316-320
Closed Access | Times Cited: 14
An Advanced Technique for User Identification Using Partial Fingerprint
Vincenzo Conti, Giuseppe Vitello, Filippo Sorbello, et al.
(2013), pp. 236-242
Closed Access | Times Cited: 14
Vincenzo Conti, Giuseppe Vitello, Filippo Sorbello, et al.
(2013), pp. 236-242
Closed Access | Times Cited: 14
Evaluation of nine heuristic algorithms with data‐intensive jobs and computing‐intensive jobs in a dynamic environment
Yongsheng Hao, Guanfeng Liu
IET Software (2015) Vol. 9, Iss. 1, pp. 7-16
Open Access | Times Cited: 13
Yongsheng Hao, Guanfeng Liu
IET Software (2015) Vol. 9, Iss. 1, pp. 7-16
Open Access | Times Cited: 13
Planning and Metaheuristic Optimization in Production Job Scheduler
Dalibor Klusáček, Václav Chlumský
Lecture notes in computer science (2017), pp. 198-216
Closed Access | Times Cited: 11
Dalibor Klusáček, Václav Chlumský
Lecture notes in computer science (2017), pp. 198-216
Closed Access | Times Cited: 11
Trust-Based Scheduling Strategy for Cloud Workflow Applications
Yuli Yang, Xinguang Peng, Jianfang Cao
Informatica (2015) Vol. 26, Iss. 1, pp. 159-180
Open Access | Times Cited: 9
Yuli Yang, Xinguang Peng, Jianfang Cao
Informatica (2015) Vol. 26, Iss. 1, pp. 159-180
Open Access | Times Cited: 9
On the Heterogeneity Bias of Cost Matrices for Assessing Scheduling Algorithms
Louis-Claude Canon, Laurent Philippe
IEEE Transactions on Parallel and Distributed Systems (2016) Vol. 28, Iss. 6, pp. 1675-1688
Open Access | Times Cited: 5
Louis-Claude Canon, Laurent Philippe
IEEE Transactions on Parallel and Distributed Systems (2016) Vol. 28, Iss. 6, pp. 1675-1688
Open Access | Times Cited: 5
Security aspects in blockchain-based scheduling in mobile multi-cloud computing
Andrzej Wilczyński, Joanna Kołodziej, Daniel Grzonka
(2021) Vol. 82, pp. 696-703
Closed Access | Times Cited: 5
Andrzej Wilczyński, Joanna Kołodziej, Daniel Grzonka
(2021) Vol. 82, pp. 696-703
Closed Access | Times Cited: 5
QoS based resource provisioning and scheduling in grids
Rajni Aron, Inderveer Chana
The Journal of Supercomputing (2013) Vol. 66, Iss. 1, pp. 262-283
Closed Access | Times Cited: 4
Rajni Aron, Inderveer Chana
The Journal of Supercomputing (2013) Vol. 66, Iss. 1, pp. 262-283
Closed Access | Times Cited: 4
A Metaheuristic for Optimizing the Performance and the Fairness in Job Scheduling Systems
Dalibor Klusáček, Hana Rudová
Studies in computational intelligence (2015), pp. 3-29
Closed Access | Times Cited: 4
Dalibor Klusáček, Hana Rudová
Studies in computational intelligence (2015), pp. 3-29
Closed Access | Times Cited: 4
Energy and Security Awareness in Evolutionary-Driven Grid Scheduling
Joanna Kołodziej, Samee U. Khan, Lizhe Wang, et al.
Studies in computational intelligence (2012), pp. 95-138
Closed Access | Times Cited: 3
Joanna Kołodziej, Samee U. Khan, Lizhe Wang, et al.
Studies in computational intelligence (2012), pp. 95-138
Closed Access | Times Cited: 3
Using a particle swarm method to optimize the weighting in extension theory for the detection of islanding in photovoltaic systems
Uei-Dar Lai, Kuei‐Hsiang Chao, Menghui Wang
Computers & Mathematics with Applications (2012) Vol. 64, Iss. 5, pp. 1441-1449
Open Access | Times Cited: 3
Uei-Dar Lai, Kuei‐Hsiang Chao, Menghui Wang
Computers & Mathematics with Applications (2012) Vol. 64, Iss. 5, pp. 1441-1449
Open Access | Times Cited: 3
Optimization of Resource Control for Transitions in Complex Systems
Florin Pop
Mathematical Problems in Engineering (2012) Vol. 2012, Iss. 1
Open Access | Times Cited: 3
Florin Pop
Mathematical Problems in Engineering (2012) Vol. 2012, Iss. 1
Open Access | Times Cited: 3
Big Data Management
Kijpokin Kasemsap
International Journal of Organizational and Collective Intelligence (2017) Vol. 7, Iss. 3, pp. 44-55
Closed Access | Times Cited: 3
Kijpokin Kasemsap
International Journal of Organizational and Collective Intelligence (2017) Vol. 7, Iss. 3, pp. 44-55
Closed Access | Times Cited: 3
Secure-Sim-G: Security-Aware Grid Simulator – Basic Concept and Structure
Grzegorz Gębczyński, Joanna Kołodziej, Samee U. Khan
Journal of Telecommunications and Information Technology (2012), Iss. 1, pp. 33-42
Open Access | Times Cited: 2
Grzegorz Gębczyński, Joanna Kołodziej, Samee U. Khan
Journal of Telecommunications and Information Technology (2012), Iss. 1, pp. 33-42
Open Access | Times Cited: 2