


default search action
Future Generation Computer Systems, Volume 79
Volumes 79, Part 1, February 2018
- Zhendong Bei, Zhibin Yu, Ni Luo, Chuntao Jiang, Chengzhong Xu
, Shengzhong Feng:
Configuring in-memory cluster computing using random forest. 1-15 - Chuan Zhang, Liehuang Zhu, Chang Xu
, Rongxing Lu:
PPDP: An efficient and privacy-preserving disease prediction scheme in cloud-based e-Healthcare system. 16-25 - Baldomero Imbernón
, Javier Prades
, Domingo Giménez, José M. Cecilia
, Federico Silla:
Enhancing large-scale docking simulation on heterogeneous systems: An MPI vs rCUDA study. 26-37 - Zhicheng Cai
, Xiaoping Li
, Rubén Ruiz
, Qianmu Li:
Price forecasting for spot instances in Cloud computing. 38-53 - Ali Asghar Rahmanian, Mostafa Ghobaei-Arani
, Sajjad Tofighy:
A learning automata-based ensemble resource usage prediction algorithm for cloud computing environment. 54-71 - Victor A. E. de Farias, Flávio R. C. Sousa, José Gilvan Rodrigues Maia, João Paulo Pordeus Gomes, Javam C. Machado:
Regression based performance modeling and provisioning for NoSQL cloud databases. 72-81 - XinDi Ma, Jianfeng Ma, Hui Li, Qi Jiang
, Sheng Gao
:
ARMOR: A trust-based privacy-preserving framework for decentralized friend recommendation in online social networks. 82-94 - Vishakha Singh
, Indrajeet Gupta
, Prasanta K. Jana:
A novel cost-efficient approach for deadline-constrained workflow scheduling by dynamic provisioning of resources. 95-110
- Alexander V. Boukhanovsky, Valeria V. Krzhizhanovskaya
, Marian Bubak
:
Urgent computing for decision support in critical situations. 111-113 - Siew Hoon Leong, Antonio Parodi
, Dieter Kranzlmüller:
Reprint of "A robust reliable energy-aware urgent computing resource allocation for flash-flood ensemble forecasting on HPC infrastructures for decision support". 114-127 - Bartosz Balis
, Robert Brzoza-Woch, Marian Bubak, Marek Kasztelnik, Bartosz Kwolek, Piotr Nawrocki, Piotr Nowakowski, Tomasz Szydlo
, Krzysztof Zielinski:
Holistic approach to management of IT infrastructure for environmental monitoring and decision support systems with urgent computing capabilities. 128-143 - Sergey V. Kovalchuk
, Evgeniy Krotov, Pavel A. Smirnov, Denis A. Nasonov, Alexey N. Yakovlev
:
Distributed data-driven platform for urgent decision making in cardiological ambulance control. 144-154 - Vladislav A. Karbovskii
, Daniil V. Voloshin
, Andrey Karsakov, Alexey Bezgodov, Carlos Gershenson
:
Multimodel agent-based simulation environment for mass-gatherings and pedestrian dynamics. 155-165
- Paola Grosso
, Malathi Veeraraghavan, Brian Tierney, Cees de Laat:
Editorial INDIS special section FGCS. 166-168 - Sam Nickolay, Eun-Sung Jung
, Rajkumar Kettimuthu, Ian T. Foster:
Bridging the gap between peak and average loads on science networks. 169-179 - Xiaoban Wu, Peilong Li, Yongyi Ran, Yan Luo:
Network measurement for 100 GbE network links using multicore processors. 180-189 - Nicholas Mills, F. Alex Feltus, Walter B. Ligon III:
Maximizing the performance of scientific data transfer by optimizing the interface between parallel file systems and advanced research networks. 190-198 - Liang Zhang
, Wenji Wu
, Phil DeMar, Eric Pouyoul:
mdtmFTP and its evaluation on ESNET SDN testbed. 199-204 - Mariam Kiran
, Eric Pouyoul, Anu Mercian, Brian Tierney, Chin Guok, Inder Monga
:
Enabling intent to configure scientific networks for high performance demands. 205-214 - Przemyslaw Lenkiewicz
, P. Chris Broekema
, Bernard Metzler:
Energy-efficient data transfers in radio astronomy with software UDP RDMA. 215-224 - Joaquin Chung, Eun-Sung Jung
, Rajkumar Kettimuthu, Nageswara S. V. Rao, Ian T. Foster
, Russ Clark, Henry L. Owen:
Advance reservation access control using software-defined networking and tokens. 225-234 - Ralph Koning
, Nick Buraglio
, Cees de Laat, Paola Grosso
:
CoreFlow: Enriching Bro security events using network traffic monitoring data. 235-242
- Jiageng Chen, Chunhua Su, Kuo-Hui Yeh, Moti Yung:
Special Issue on Advanced Persistent Threat. 243-246 - Christian Javier D'Orazio, Kim-Kwang Raymond Choo
:
Circumventing iOS security mechanisms for APT forensic investigations: A security taxonomy for cloud apps. 247-261 - Huaqun Wang, Debiao He
, Yanfei Sun, Neeraj Kumar
, Kim-Kwang Raymond Choo
:
PAT: A precise reward scheme achieving anonymity and traceability for crowdcomputing in public clouds. 262-270 - Ayong Ye, Qiuling Chen, Li Xu, Wei Wu:
The flexible and privacy-preserving proximity detection in mobile social network. 271-283 - Yuexin Zhang, Yang Xiang, Tao Wang, Wei Wu, Jian Shen
:
An over-the-air key establishment protocol using keyless cryptography. 284-294 - Xin Sun, Xishun Zhao, Livio Robaldo
:
Norm-based deontic logic for access control, some computational results. 295-302 - Md. Enamul Kabir
, Jiankun Hu
, Hua Wang
, Guangping Zhuo:
A novel statistical technique for intrusion detection systems. 303-318 - Shashank Gupta
, Brij Bhooshan Gupta
, Pooja Chaudhary
:
Hunting for DOM-Based XSS vulnerabilities in mobile cloud-based online social network. 319-336 - Man Ho Au
, Kaitai Liang
, Joseph K. Liu, Rongxing Lu, Jianting Ning:
Privacy-preserving personal data operation on mobile cloud - Chances and challenges over advanced persistent threat. 337-349
- Xiaokang Zhou, Albert Y. Zomaya
, Weimin Li, Ivan Ruchkin
:
Cybermatics: Advanced Strategy and Technology for Cyber-Enabled Systems and Applications. 350-353 - Saurabh Kumar Garg
, Jagannath Aryal
, Hao Wang, Tejal Shah
, Gabor Kecskemeti
, Rajiv Ranjan
:
Cloud computing based bushfire prediction for cyber-physical emergency applications. 354-363 - Somchart Fugkeaw
, Hiroyuki Sato:
Scalable and secure access control policy update for outsourced big data. 364-373 - Qingyong Li
, Zhiping Shi
, Huayan Zhang, Yunqiang Tan, Shengwei Ren, Peng Dai, Weiyi Li:
A cyber-enabled visual inspection system for rail corrugation. 374-382 - Yijun Mo, Bixi Li, Bang Wang, Laurence T. Yang, Minghua Xu:
Event recommendation in social networks based on reverse random walk and participant scale control. 383-395 - Chong Chen, Dan Chen, Yingnan Yan, Gaofeng Zhang, Qingguo Zhou, Rui Zhou:
Integration of numerical model and cloud computing. 396-407 - Weimin Li, Shu Jiang, Qun Jin:
Overlap community detection using spectral algorithm based on node convergence degree. 408-416 - Xiaohong Li, Feng Liu, Zhiyong Feng, Guangquan Xu, Zhangjie Fu:
A novel optimized vertical handover framework for seamless networking integration in cyber-enabled systems. 417-430 - Ajay Kumara M. A., Jaidhar C. D.:
Automated multi-level malware detection system based on reconstructed semantic view of executables using machine learning techniques at VMM. 431-446 - Wei Dai, Yufeng Wang, Qun Jin, Jianhua Ma:
Geo-QTI: A quality aware truthful incentive mechanism for cyber-physical enabled Geographic crowdsensing. 447-459
Volumes 79, Part 2, February 2018
- Hui Cui
, Robert H. Deng
, Yingjiu Li:
Attribute-based cloud storage with secure provenance over encrypted data. 461-472 - Yi Zhou
, Fazhi He, Neng Hou, Yimin Qiu:
Parallel ant colony optimization on multi-core SIMD CPUs. 473-487 - Mohannad J. Alhanahnah, Peter Bertók
, Zahir Tari
, Sahel Alouneh
:
Context-Aware Multifaceted Trust Framework For Evaluating Trustworthiness of Cloud Providers. 488-499 - Nazmus S. Nafi
, Khandakar Ahmed
, Mark A. Gregory, Manoj Datta
:
Software defined neighborhood area network for smart grid applications. 500-513 - Han Yu
, Hongming Cai, Jun Zhou, Lihong Jiang:
Data service generation framework from heterogeneous printed forms using semantic link discovery. 514-527 - Huixi Li, Wenjun Li, Qilong Feng, Shigeng Zhang, Haodong Wang, Jianxin Wang:
Leveraging content similarity among VMI files to allocate virtual machines in cloud. 528-542 - Souhila Mammeri
, Mohand Yazid, Louiza Bouallouche-Medjkoune
, Asma Mazouz:
Performance study and enhancement of multichannel access methods in the future generation VHT WLAN. 543-557 - Dimitrios Papamartzivanos, Félix Gómez Mármol, Georgios Kambourakis:
Dendron : Genetic trees driven rule induction for network intrusion detection systems. 558-574 - Mohamed Elshenawy
, Baher Abdulhai, Mohamed El-Darieby:
Towards a service-oriented cyber-physical systems of systems for smart city mobility applications. 575-587 - Ben-Jye Chang, Yu-Wei Lee, Ying-Hsin Liang:
Reward-based Markov chain analysis adaptive global resource management for inter-cloud computing. 588-603 - Anna V. Kalyuzhnaya
, Denis A. Nasonov, Sergey V. Ivanov, Sergey S. Kosukhin, Alexander V. Boukhanovsky:
Towards a scenario-based solution for extreme metocean event simulation applying urgent computing. 604-617 - Anton Spivak, Andrew Razumovskiy, Denis A. Nasonov, Alexander Boukhanovsky, Anton Radice:
Storage tier-aware replicative data reorganization with prioritization for efficient workload processing. 618-629 - Alexander A. Visheratin, Mikhail Melnik, Denis A. Nasonov, Nikolay Butakov, Alexander V. Boukhanovsky:
Hybrid scheduling algorithm in early warning systems. 630-642
- Aleksander Byrski
, Katarzyna Rycerz
, John Hughes, Kevin Hammond:
Special section on functional paradigm for high performance computing. 643-644 - Wojciech Turek
:
Erlang-based desynchronized urban traffic simulation for high-performance computing systems. 645-652 - David Castro, Kevin Hammond
, Susmit Sarkar
, Yasir Alguwaifli:
Automatically deriving cost models for structured parallel processes using hylomorphisms. 653-668 - Adam D. Barwell
, Christopher Brown
, Kevin Hammond
:
Finding parallel functional pearls: Automatic parallel recursion scheme detection in Haskell functions via anti-unification. 669-686 - Tamás Kozsik
, Melinda Tóth
, István Bozó
:
Free the Conqueror! Refactoring divide-and-conquer functions. 687-699
- George A. Gravvanis, John P. Morrison, Dana Petcu
, Theo Lynn
, Christos K. Filelis-Papadopoulos
:
Special Issue: Recent trends in cloud computing. 700-702 - Christos K. Filelis-Papadopoulos
, George A. Gravvanis, Panagiotis E. Kyziropoulos
:
A framework for simulating large scale cloud infrastructures. 703-714 - Antonios T. Makaratzis, Konstantinos M. Giannoutakis
, Dimitrios Tzovaras
:
Energy modeling in cloud simulation frameworks. 715-725 - Reginaldo Ré
, Rômulo Manciola Meloca, Douglas Nassif Roma Junior, Marcelo Alexandre da Cruz Ismael, Gabriel Costa Silva:
An empirical study for evaluating the performance of multi-cloud APIs. 726-738 - Maria Alejandra Rodriguez
, Rajkumar Buyya
:
Scheduling dynamic workloads in multi-tenant scientific workflow as a service platforms. 739-750 - Takfarinas Saber
, James Thorburn, Liam Murphy
, Anthony Ventresque
:
VM reassignment in hybrid clouds for large decentralised companies: A multi-objective challenge. 751-764 - Adel Nadjaran Toosi
, Richard O. Sinnott, Rajkumar Buyya
:
Resource provisioning for data-intensive applications with deadline constraints on hybrid clouds using Aneka. 765-775
Volumes 79, Part 3, February 2018
- Xavier Masip-Bruin
, Eva Marín-Tordera, Admela Jukan, Guang-Jie Ren:
Managing resources continuity from the edge to the cloud: Architecture and performance. 777-785 - Guillermo Oyarzun
, Ricard Borrell
, Andrey V. Gorobets
, Filippo Mantovani
, Assensi Oliva
:
Efficient CFD code implementation for the ARM-based Mont-Blanc architecture. 786-796 - Bo Zhang, Qian Zhang, Zhenhua Huang, Meizi Li, Luqun Li:
A multi-criteria detection scheme of collusive fraud organization for reputation aggregation in social networks. 797-814 - Sarogini Grace Pease
, Russell Trueman, Callum Davies, Jude Grosberg, Kai Hin Yau, Navjot Kaur, Paul P. Conway, Andrew A. West:
An intelligent real-time cyber-physical toolset for energy and process prediction and optimisation in the future industrial Internet of Things. 815-829 - Fabio López-Pires, Benjamín Barán
, Leonardo Benítez, Saúl Zalimben, Augusto Amarilla:
Virtual machine placement for elastic infrastructures in overbooked cloud computing datacenters under uncertainty. 830-848 - Blesson Varghese, Rajkumar Buyya
:
Next generation cloud computing: New trends and research directions. 849-861 - Gabriele Mencagli
, Massimo Torquati
, Marco Danelutto
:
Elastic-PPQ: A two-level autonomic system for spatial preference query processing over dynamic data streams. 862-877 - K. Kanagaraj
, S. Swamynathan:
Structure aware resource estimation for effective scheduling and execution of data intensive workflows in cloud. 878-891 - Shapna Muralidharan, Abhishek Roy, Navrati Saxena:
MDP-IoT: MDP based interest forwarding for heterogeneous traffic in IoT-NDN environment. 892-908 - Muhammad Farhan
, Sohail Jabbar
, Muhammad Aslam, Mohammad Hammoudeh
, Mudassar Ahmad, Shehzad Khalid, Murad Khan, Kijun Han:
IoT-based students interaction framework using attention-scoring assessment in eLearning. 909-919 - Junbao Zhang, Haojun Huang, Yan Luo, Yinting Fan, Guan Yang:
Immunization-based redundancy elimination in Mobile Opportunistic Networks-Generated big data. 920-927 - Raheleh Khanduzi
, M. Reza Peyghami
, Arun Kumar Sangaiah
:
Data envelopment analysis and interdiction median problem with fortification for enabling IoT technologies to relieve potential attacks. 928-940 - Syed Hassan Ahmed
, Shalli Rani
:
A hybrid approach, Smart Street use case and future aspects for Internet of Things in smart cities. 941-951 - U. Rajendra Acharya
, Hamido Fujita
, Shu Lih Oh, U. Raghavendra, Jen Hong Tan
, Muhammad Adam, Arkadiusz Gertych
, Yuki Hagiwara
:
Automated identification of shockable and non-shockable life-threatening ventricular arrhythmias using convolutional neural network. 952-959 - Zhe Lin:
Modelling and forecasting the stock market volatility of SSE Composite Index using GARCH models. 960-972 - Victor I. Chang
, Dickson K. W. Chiu
, Muthu Ramachandran, Chung-Sheng Li:
Internet of Things, Big Data and Complex Information Systems: Challenges, solutions and outputs from IoTBD 2016, COMPLEXIS 2016 and CLOSER 2016 selected papers and CLOSER 2015 keynote. 973-974

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.