default search action
Future Generation Computer Systems, Volume 109
Volume 109, August 2020
- Chinmaya Kumar Dehury, Satish Narayana Srirama, Tek Raj Chhetri:
CCoDaMiC: A framework for Coherent Coordination of Data Migration and Computation platforms. 1-16 - Surong Xiao, Chubo Liu, Kenli Li, Keqin Li:
System delay optimization for Mobile Edge Computing. 17-28 - Avadh Kishor, Rajdeep Niyogi, Bharadwaj Veeravalli:
A game-theoretic approach for cost-aware load balancing in distributed systems. 29-44
- Weixin Bian, Prosanta Gope, Yongqiang Cheng, Qingde Li:
Bio-AKA: An efficient fingerprint based two factor user authentication and key agreement scheme. 45-55
- Jilong Wang, Renfa Li, Rui Li, Bin Fu:
A knowledge-based deep learning method for ECG signal delineation. 56-66
- Jesús Esteban Díaz Verdejo, Antonio Jose Estepa, Rafael Estepa, Germán Madinabeitia, Francisco Javier Muñoz-Calle:
A methodology for conducting efficient sanitization of HTTP training datasets. 67-82
- Rebeca P. Díaz Redondo, Carlos García-Rubio, Ana Fernández Vilas, Celeste Campo, Alicia Rodriguez-Carrion:
A hybrid analysis of LBSN data to early detect anomalies in crowd dynamics. 83-94
- Defeng Li, Yuan Hu, Mingming Lan:
IoT device location information storage system based on blockchain. 95-102
- Zhihan Lv, Liang Qiao:
Analysis of healthcare big data. 103-110
- Stefano Iannucci, Valeria Cardellini, Ovidiu Daniel Barba, Ioana Banicescu:
A hybrid model-free approach for the near-optimal intrusion response control of non-stationary systems. 111-124
- Mateusz Starzec, Grazyna Starzec, Aleksander Byrski, Wojciech Turek, Kamil Pietak:
Desynchronization in distributed Ant Colony Optimization in HPC environment. 125-133
- Na Yi, Jianjun Xu, Limei Yan, Lin Huang:
Task optimization and scheduling of distributed cyber-physical system based on improved ant colony algorithm. 134-148
- Yingying Xu, Zhi Liu, Yujun Li, Haixia Hou, Yankun Cao, Yuefeng Zhao, Wei Guo, Lizhen Cui:
Feature data processing: Making medical data fit deep neural networks. 149-157
- Wendi Feng, Chuanchang Liu, Zehua Guo, Thar Baker, Gang Wang, Meng Wang, Bo Cheng, Junliang Chen:
MobiGyges: A mobile hidden volume for preventing data loss, improving storage utilization, and avoiding device reboot. 158-171
- Erwin J. Sacoto-Cabrera, Luis Guijarro, José R. Vidal, Vicent Pla:
Economic feasibility of virtual operators in 5G via network slicing. 172-187
- Xueyan Chen, Jie He, Xiaoqiang Wu, Wei Yan, Wei Wei:
Sleep staging by bidirectional long short-term memory convolution neural network. 188-196
- Sharmin Jahan, Ian Riley, Charles Walter, Rose F. Gamble, Matt Pasco, Philip K. McKinley, Betty H. C. Cheng:
MAPE-K/MAPE-SAC: An interaction framework for adaptive systems with security assurance cases. 197-209
- Francesco Piccialli, Salvatore Cuomo, Fabio Giampaolo, Giampaolo Casolla, Vincenzo Schiano Di Cola:
Path prediction in IoT systems through Markov Chain algorithm. 210-217
- Luciana Bencke, Cristian Cechinel, Roberto Muñoz:
Automated classification of social network messages into Smart Cities dimensions. 218-237
- Duong Bao Ninh, Jing He, Vu Thanh Trung, Dang Phuoc Huy:
An effective random statistical method for Indoor Positioning System using WiFi fingerprinting. 238-248 - Cédric St-Onge, Nadjia Kara, Omar Abdel Wahab, Claes Edstrom, Yves Lemieux:
Detection of time series patterns and periodicity of cloud computing workloads. 249-261
- Xiaohui Wei, Hengshan Yue, Shang Gao, Lina Li, Ruyu Zhang, Jingweijia Tan:
G-SEAP: Analyzing and characterizing soft-error aware approximation in GPGPUs. 262-274
- Zhen Chen, Yuanhao Sun, Dianlong You, Feng Li, Limin Shen:
An accurate and efficient web service QoS prediction model with wide-range awareness. 275-292
- Xiaoyu Qi, Gang Mei, Salvatore Cuomo, Lei Xiao:
A network-based method with privacy-preserving for identifying influential providers in large healthcare service systems. 293-305
- Neenu Garg, Seema Bawa, Neeraj Kumar:
An efficient data integrity auditing protocol for cloud computing. 306-316
- Fotis Savva, Christos Anagnostopoulos, Peter Triantafillou:
Adaptive learning of aggregate analytics under dynamic workloads. 317-330 - Mengyun Cao, Hai Zhuge:
Grouping sentences as better language unit for extractive text summarization. 331-359
- Shah Rukh Khan, Misba Sikandar, Ahmad Almogren, Ikram Ud Din, Antonio Guerrieri, Giancarlo Fortino:
IoMT-based computational approach for detecting brain tumor. 360-367
- Bakkiam David Deebak, Fadi Al-Turjman, Moayad Aloqaily, Omar Alfandi:
IoT-BSFCAN: A smart context-aware system in IoT-Cloud using mobile-fogging. 368-381
- Yan Liu, Xiner Li, Zaimei Zhang:
A new approach in reject inference of using ensemble learning based on global semi-supervised framework. 382-391 - Adrian Asensio, Xavier Masip-Bruin, Ramón J. Durán, Ignacio de Miguel, Guang-Jie Ren, Shahrokh Daijavad, Admela Jukan:
Designing an efficient clustering strategy for combined Fog-to-Cloud scenarios. 392-406 - Gor Mack Diouf, Halima Elbiaze, Wael Jaafar:
On Byzantine fault tolerance in multi-master Kubernetes clusters. 407-419 - Giacomo Tanganelli, Luca Cassano, Antonio Miele, Carlo Vallati:
A methodology for the design and deployment of distributed cyber-physical systems for smart environments. 420-430 - Faizan Rasheed, Kok-Lim Alvin Yau, Yeh-Ching Low:
Deep reinforcement learning for traffic signal control under disturbances: A case study on Sunway city, Malaysia. 431-445
- Priyadarsi Nanda, Xiangjian He, Laurence T. Yang:
Security, Trust and Privacy in Cyber (STPCyber): Future trends and challenges. 446-449 - Jian Shen, Dengzhi Liu, Xingming Sun, Fushan Wei, Yang Xiang:
Efficient cloud-aided verifiable secret sharing scheme with batch verification for smart cities. 450-456 - Meng Liu, Yun Luo, Chi Yang, Shaoning Pang, Deepak Puthal, Kaijun Ren, Xuyun Zhang:
Privacy-preserving matrix product based static mutual exclusive roles constraints violation detection in interoperable role-based access control. 457-468 - Yousra Asim, Ahmad Kamran Malik, Basit Raza, Wajeeha Naeem, Saima Rathore:
Community-Centric Brokerage-Aware Access Control for Online Social Networks. 469-478 - Sally M. Elghamrawy:
Security in Cognitive Radio Network: Defense against Primary User Emulation attacks using Genetic Artificial Bee Colony (GABC) algorithm. 479-487 - Thomas Asikis, Evangelos Pournaras:
Optimization of privacy-utility trade-offs under informational self-determination. 488-499 - Nhien-An Le-Khac, Daniel Jacobs, John Nijhoff, Karsten Bertens, Kim-Kwang Raymond Choo:
Smart vehicle forensics: Challenges and case study. 500-510 - Ping Xiong, Lefeng Zhang, Tianqing Zhu, Gang Li, Wanlei Zhou:
Private collaborative filtering under untrusted recommender server. 511-520 - Ashish Nanda, Priyadarsi Nanda, Xiangjian He, Aruna Jamdagni, Deepak Puthal:
A hybrid encryption technique for Secure-GLOR: The adaptive secure routing protocol for dynamic wireless mesh networks. 521-530 - Diming Zhang, Shaodi You:
iFlask: Isolate flask security system from dangerous execution environment by using ARM TrustZone. 531-537 - Shivani Sharma, Durga Toshniwal:
MR-I MaxMin-scalable two-phase border based knowledge hiding technique using MapReduce. 538-550 - Yongkai Fan, Shengle Liu, Gang Tan, Fei Qiao:
Fine-grained access control based on Trusted Execution Environment. 551-561 - Fatin Hamadah Rahman, Thien-Wan Au, S. H. Shah Newaz, Wida Susanty Suhaili, Gyu Myoung Lee:
Find my trustworthy fogs: A fuzzy-based trust evaluation framework. 562-572 - Tian Wang, Guangxue Zhang, Md. Zakirul Alam Bhuiyan, Anfeng Liu, Weijia Jia, Mande Xie:
A novel trust mechanism based on Fog Computing in Sensor-Cloud System. 573-582 - Shahzaib Tahir, Liutauras Steponkus, Sushmita Ruj, Muttukrishnan Rajarajan, Ali Sajjad:
A parallelized disjunctive query based searchable encryption scheme for big data. 583-592 - Shweta Bhandari, Frédéric Herbreteau, Vijay Laxmi, Akka Zemmari, Manoj Singh Gaur, Partha S. Roop:
SneakLeak+: Large-scale klepto apps analysis. 593-603 - Muhammad Usman, Mian Ahmad Jan, Xiangjian He, Priyadarsi Nanda:
QASEC: A secured data communication scheme for mobile Ad-hoc networks. 604-610 - Wangyang Yu, Zhijun Ding, Lu Liu, Xiaoming Wang, Richard David Crossley:
Petri net-based methods for analyzing structural security in e-commerce business processes. 611-620 - Meng Shen, Guohua Cheng, Liehuang Zhu, Xiaojiang Du, Jiankun Hu:
Content-based multi-source encrypted image retrieval in clouds with privacy preservation. 621-632 - Entao Luo, Kehua Guo, Yayuan Tang, Xiangdong Ying, Wen Huang:
Hidden the true identity and dating characteristics based on quick private matching in mobile social networks. 633-641 - Konstantinos Tserpes, Patrizio Dazzi, Emanuele Carlini, Massimo Coppola, Dimitrios Zissis:
Special Issue on High Performance Services Computing and Internet Technologies. 642-643 - Panagiotis Bourelos, George Kousiouris, Orfefs Voutyras, Achilleas Marinakis, Theodora A. Varvarigou, Vrettos Moulos:
Smart heating in collaborative and reasoning-enabled housing units. 644-656 - Alexandros Psychas, John Violos, Fotis Aisopos, Athanasia Evangelinou, George Kousiouris, Ioannis Bouras, Theodora A. Varvarigou, G. Xidas, Dimitrios Charilas, Yiannis Stavroulas:
Cloud toolkit for Provider assessment, optimized Application Cloudification and deployment on IaaS. 657-667 - Pierre Matri, Yevhen Alforov, Álvaro Brandón, María S. Pérez, Alexandru Costan, Gabriel Antoniu, Michael Kuhn, Philip H. Carns, Thomas Ludwig:
Mission possible: Unify HPC and Big Data stacks towards application-defined blobs at the storage layer. 668-677 - Spyridon V. Gogouvitis, Harald Müller, Sreenath Premnadh, Andreas Seitz, Bernd Bruegge:
Seamless computing in industrial systems using container orchestration. 678-688 - Rodrigo da Rosa Righi, Everton Correa, Márcio Miguel Gomes, Cristiano André da Costa:
Enhancing performance of IoT applications with load prediction and cloud elasticity. 689-701 - Andrii Shalaginov:
Big Data Analytics and Artificial Intelligence for Cyber Crime Investigation and Prevention. 702-703 - Walid Gaaloul, Zhangbing Zhou, Hervé Panetto, Liang Zhang:
Special Issue on Fog and Cloud Computing for Cooperative Information System Management: Challenges and Opportunities. 704-705 - Rongbo Zhu, Lu Liu, Maode Ma, Hongxiang Li:
Cognitive-inspired Computing: Advances and Novel Applications. 706-709 - Tomoya Enokido, David Taniar, Omar Khadeer Hussain:
Special Issue: Intelligent Edge, Fog and Internet of Things (IoT)-based Services. 710-711
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.