default search action
Future Generation Computer Systems, Volume 78
Volumes 78, Part 1, January 2018
- Edelberto F. Silva
, Débora Christina Muchaluat-Saade, Natalia Castro Fernandes
:
ACROSS: A generic framework for attribute-based access control with distributed policies for virtual organizations. 1-17 - Xiaoyong Xu, Maolin Tang, Yu-Chu Tian
:
QoS-guaranteed resource provisioning for cloud-based MapReduce in dynamical environments. 18-30 - Sheng-Yao Su, Wenbin Yao, Xiaoyong Li
:
DARS: A dynamic adaptive replica strategy under high load Cloud-P2P. 31-40 - Jian Xu, Hang Zhang, Wubai Zhou, Rouying He, Tao Li:
Signature based trouble ticket classification. 41-58 - Rafael de Oliveira Werneck, Waldir R. de Almeida, Bernardo Vecchia Stein, Daniel V. Pazinato, Pedro Ribeiro Mendes Júnior
, Otávio Augusto Bizetto Penatti, Anderson Rocha, Ricardo da Silva Torres:
Kuaa: A unified framework for design, deployment, execution, and recommendation of machine learning experiments. 59-76 - Yi-Chao He, Haoran Xie
, Tak-Lam Wong, Xizhao Wang:
A novel binary artificial bee colony algorithm for the set-union knapsack problem. 77-86
- Dimosthenis Kyriazis
, Keith G. Jeffery
:
Cloud forward: From distributed to complete computing. 87-88 - Chonglin Gu, Longxiang Fan, Wenbin Wu, Hejiao Huang, Xiaohua Jia:
Greening cloud data centers in an economical way by energy trading with power grid. 89-101 - Athanasia Evangelinou
, Michele Ciavotta
, Danilo Ardagna
, Aliki Kopaneli, George Kousiouris
, Theodora A. Varvarigou:
Enterprise applications cloud rightsizing through a joint benchmarking and optimization approach. 102-114 - Sebastian Lehrig
, Richard Sanders, Gunnar Brataas
, Mariano Cecowski, Simon Ivansek, Jure Polutnik:
CloudStore - towards scalability, elasticity, and efficiency benchmarking and analysis in Cloud computing. 115-126 - George Fylaktopoulos, Michael Skolarikis, I. Papadopoulos, Georgios I. Goumas, Aristidis Sotiropoulos, Ilias Maglogiannis
:
A distributed modular platform for the development of cloud based applications. 127-141 - Pierfrancesco Bellini, Ivan Bruno, Daniele Cenni
, Paolo Nesi
:
Managing cloud via Smart Cloud Engine and Knowledge Base. 142-154 - Kyriakos Kritikos
, Tom Kirkham, Bartosz Kryza, Philippe Massonet
:
Reprint of "Towards a security-enhanced PaaS platform for multi-cloud applications". 155-175 - Rodrigo da Rosa Righi
, Vinicius Facco Rodrigues
, Gustavo Rostirolla, Cristiano André da Costa
, Eduardo Roloff, Philippe Olivier Alexandre Navaux:
A lightweight plug-and-play elasticity service for self-organizing resource provisioning on parallel applications. 176-190 - Mostafa Ghobaei-Arani
, Sam Jabbehdari
, Mohammad Ali Pourmina
:
An autonomic resource provisioning approach for service-based cloud applications: A hybrid approach. 191-210 - Emiliano Casalicchio
, Valeria Cardellini
, Gianluca Interino, Monica Palmirani
:
Research challenges in legal-rule and QoS-aware cloud service brokerage. 211-223 - Netsanet Haile, Jörn Altmann
:
Evaluating investments in portability and interoperability between software service platforms. 224-241
- Florin Pop, Alexandru Iosup
, Radu Prodan:
HPS-HDS: High Performance Scheduling for Heterogeneous Distributed Systems. 242-244 - Antonio Fernández Anta
, Chryssis Georgiou, Dariusz R. Kowalski, Elli Zavou
:
Competitive analysis of fundamental scheduling algorithms on a fault-prone machine and the impact of resource augmentation. 245-256 - Fredy Juarez
, Jorge Ejarque
, Rosa M. Badia
:
Dynamic energy-aware scheduling for parallel task-based application in cloud computing. 257-271 - Rodrigo da Rosa Righi
, Roberto de Quadros Gomes, Vinicius Facco Rodrigues
, Cristiano André da Costa
, Antônio Marcos Alberti
, Laércio Lima Pilla
, Philippe Olivier Alexandre Navaux:
MigPF: Towards on self-organizing process rescheduling of Bulk-Synchronous Parallel applications. 272-286 - Zhuo Tang
, Xiangshen Zhang, Kenli Li, Keqin Li:
An intermediate data placement algorithm for load balancing in Spark computing environment. 287-301 - Michal P. Karpowicz
, Piotr Arabas
, Ewa Niewiadomska-Szynkiewicz
:
Design and implementation of energy-aware application-specific CPU frequency governors for the heterogeneous distributed computing systems. 302-315 - Wenbin Jiang, Min Long, Laurence T. Yang, Xiaobai Liu, Hai Jin, Alan L. Yuille
, Ye Chi:
FIPIP: A novel fine-grained parallel partition based intra-frame prediction on heterogeneous many-core systems. 316-329 - Tudor Cioara
, Ionut Anghel
, Massimo Bertoncini, Ioan Salomie, Diego Arnone, Marzia Mammina, Terpsichori Helen Velivassaki
, Marcel Antal
:
Optimized flexibility management enacting Data Centres participation in Smart Demand Response programs. 330-342 - Massimo Ficco
, Christian Esposito
, Francesco Palmieri, Aniello Castiglione
:
A coral-reefs and Game Theory-based approach for optimizing elastic cloud resource allocation. 343-352 - Lizhe Wang
, Yan Ma, Jining Yan
, Victor Chang
, Albert Y. Zomaya
:
pipsCloud: High performance cloud computing for remote sensing big data management and processing. 353-368 - Konstantinos Douzis, Stelios Sotiriadis
, Euripides G. M. Petrakis
, Cristiana Amza:
Modular and generic IoT management on the cloud. 369-378 - Izzet F. Senturk
, Ponnuraman Balakrishnan, Anas Abu-Doleh, Kamer Kaya, Qutaibah M. Malluhi, Ümit V. Çatalyürek
:
A resource provisioning framework for bioinformatics applications in multi-cloud environments. 379-391 - Rong Jiang, Rongxing Lu, Kim-Kwang Raymond Choo
:
Achieving high performance and privacy-preserving query over encrypted multidimensional big metering data. 392-401 - Hamid Arabnejad
, Jorge G. Barbosa
:
Reprint of "Multi-QoS constrained and Profit-aware scheduling approach for concurrent workflows on heterogeneous systems". 402-412
- Magdalini Eirinaki
, Jerry Gao, Iraklis Varlamis
, Konstantinos Tserpes
:
Recommender Systems for Large-Scale Social Networks: A review of challenges and solutions. 413-418 - Fatemeh Rezaeimehr, Parham Moradi
, Sajad Ahmadian
, Nooruldeen Nasih Qader
, Mahdi Jalili
:
TCARS: Time- and Community-Aware Recommendation System. 419-429 - Davide Feltoni Gurini
, Fabio Gasparetti, Alessandro Micarelli, Giuseppe Sansonetti
:
Temporal people-to-people recommendation on social networks with sentiment-based matrix factorization. 430-439 - Dionisis Margaris
, Costas Vassilakis
, Panagiotis Georgiadis:
Query personalization using social network information and collaborative filtering techniques. 440-450 - Junpeng Guo, Zeng Gao, Na Liu
, Yi Wu:
Recommend products with consideration of multi-category inter-purchase time and price. 451-461 - Mingxin Gan
, Rui Jiang
:
FLOWER: Fusing global and local associations towards personalized social recommendation. 462-473 - Alejandro Corbellini
, Daniela Godoy
, Cristian Mateos
, Silvia N. Schiaffino
, Alejandro Zunino:
DPM: A novel distributed large-scale social graph processing framework for link prediction algorithms. 474-480
Volumes 78, Part 2, January 2018
- Sandro Bartolini, Pierfrancesco Foglia
, Cosimo Antonio Prete:
Exploring the relationship between architectures and management policies in the design of NUCA-based chip multicore systems. 481-501 - Klavdiya Bochenina, Sergey Kesarev, Alexander Boukhanovsky:
Scalable parallel simulation of dynamical processes on large stochastic Kronecker graphs. 502-515 - George Kousiouris
, Adnan Akbar, Juan Sancho
, Paula Ta-Shma, Alexandros Psychas, Dimosthenis Kyriazis
, Theodora A. Varvarigou:
An integrated information lifecycle management framework for exploiting social network data to identify dynamic large crowd concentration events in smart cities applications. 516-530 - Lifang Ren, Wenjian Wang:
An SVM-based collaborative filtering approach for Top-N web services recommendation. 531-543
- Mauro Conti, Ali Dehghantanha, Katrin Franke, Steve Watson
:
Internet of Things security and forensics: Challenges and opportunities. 544-546 - Samet Tonyali
, Kemal Akkaya, Nico Saputro
, A. Selcuk Uluagac
, Mehrdad Nojoumian
:
Privacy-preserving protocols for secure and reliable data aggregation in IoT-enabled Smart Metering systems. 547-557 - Darren Quick, Kim-Kwang Raymond Choo
:
Digital forensic intelligence: Data subsets and Open Source Intelligence (DFINT+OSINT): A timely and cohesive mix. 558-567 - Mengmeng Ge, Jin B. Hong
, Simon Yusuf Enoch
, Dong Seong Kim
:
Proactive defense mechanisms for the software-defined Internet of Things with non-patchable vulnerabilities. 568-582
- Farshad Firouzi, Amir M. Rahmani
, Kunal Mankodiya
, Mustafa Badaroglu, Geoff V. Merrett, P. Wong, Bahar J. Farahani
:
Internet-of-Things and big data for smarter healthcare: From device to architecture, applications and analytics. 583-586 - Josué Pagán
, Marina Zapater
, José L. Ayala
:
Power transmission and workload balancing policies in eHealth mobile cloud computing scenarios. 587-601 - Toni Adame
, Albert Bel
, Anna Carreras
, Joan Melià-Seguí
, Miquel Oliver
, Rafael Pous
:
CUIDATS: An RFID-WSN hybrid monitoring system for smart health care environments. 602-615 - Osamu Ammae, Joseph Korpela, Takuya Maekawa:
Unobtrusive detection of body movements during sleep using Wi-Fi received signal strength with model adaptation technique. 616-625 - Min Woo Woo, JongWhi Lee, KeeHyun Park:
A reliable IoT system for Personal Healthcare Devices. 626-640 - Amir M. Rahmani
, Tuan Nguyen Gia
, Behailu Negash, Arman Anzanpour
, Iman Azimi
, Mingzhe Jiang
, Pasi Liljeberg:
Exploiting smart e-Health gateways at the edge of healthcare Internet-of-Things: A fog computing approach. 641-658 - Bahar J. Farahani
, Farshad Firouzi, Victor I. Chang
, Mustafa Badaroglu, Nicholas Constant
, Kunal Mankodiya
:
Towards fog-driven IoT eHealth: Promises and challenges of IoT in medicine and healthcare. 659-676
- Kim-Kwang Raymond Choo
, Rongxing Lu, Liqun Chen
, Xun Yi:
A foggy research future: Advances and future opportunities in fog computing research. 677-679 - Rodrigo Roman
, Javier López, Masahiro Mambo:
Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges. 680-698 - Yuexin Zhang, Yang Xiang, Wei Wu, Abdulhameed Alelaiwi:
A variant of password authenticated key exchange protocol. 699-711 - Huaqun Wang
, Zhiwei Wang, Josep Domingo-Ferrer
:
Anonymous and secure aggregation scheme in fog-based public cloud computing. 712-719 - Yinhao Jiang
, Willy Susilo
, Yi Mu, Fuchun Guo
:
Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing. 720-729 - Cong Zuo
, Jun Shao, Guiyi Wei, Mande Xie, Min Ji
:
CCA-secure ABE with outsourced decryption for fog computing. 730-738 - Dongyoung Koo
, Junbeom Hur:
Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing. 739-752 - Peng Zhang, Zehong Chen, Joseph K. Liu, Kaitai Liang
, Hongwei Liu:
An efficient access control scheme with outsourcing capability and attribute update for fog computing. 753-762 - Zuoxia Yu, Man Ho Au
, Qiuliang Xu, Rupeng Yang, Jinguang Han
:
Towards leakage-resilient fine-grained access control in fog computing. 763-777 - Zheli Liu, Tong Li
, Ping Li, Chunfu Jia, Jin Li:
Verifiable searchable encryption with aggregate keys for data sharing system. 778-788 - Yannan Li
, Yong Yu
, Bo Yang, Geyong Min, Huai Wu:
Privacy preserving cloud data auditing with efficient key update. 789-798 - Rupeng Yang, Qiuliang Xu, Man Ho Au
, Zuoxia Yu, Hao Wang, Lu Zhou:
Position based cryptography with location privacy: A step for Fog Computing. 799-806 - Catalin Gosman, Tudor Cornea, Ciprian Dobre
, Florin Pop
, Aniello Castiglione
:
Controlling and filtering users data in Intelligent Transportation System. 807-816 - Jian Liu
, Jiangtao Li
, Lei Zhang, Feifei Dai, Yuanfei Zhang, Xinyu Meng, Jian Shen
:
Secure intelligent traffic light control using fog computing. 817-824 - Ximeng Liu
, Robert H. Deng
, Yang Yang, Ngoc Hieu Tran, Shangping Zhong:
Hybrid privacy-preserving clinical decision support system in fog-cloud computing. 825-837 - Biplob R. Ray
, Jemal H. Abawajy, Morshed U. Chowdhury
, Abdulhameed Alelaiwi:
Universal and secure object ownership transfer protocol for the Internet of Things. 838-849 - Hui Huang
, Xiaofeng Chen, Qianhong Wu, Xinyi Huang, Jian Shen
:
Bitcoin-based fair payments for outsourcing computations of fog devices. 850-858 - Bo-Wei Chen, Seungmin Rho, Laurence T. Yang, Yu Gu:
Privacy-preserved big data analysis based on asymmetric imputation kernels and multiside similarities. 859-866
Volumes 78, Part 3, January 2018
- Bei Gong, Yu Zhang, Yubo Wang:
A remote attestation mechanism for the sensing layer nodes of the Internet of Things. 867-886 - Xiang Li, Xiaohong Jiang, Peter Garraghan
, Zhaohui Wu:
Holistic energy and failure aware workload scheduling in Cloud datacenters. 887-900 - Waralak Chongdarakul, Peraphon Sophatsathit, Chidchanok Lursinsap:
Theoretical and heuristic aspects of heterogeneous system scheduling with constraints on client's multiple I/O ports. 901-919 - Xun Shao, Masahiro Jibiki, Yuuichi Teranishi, Nozomu Nishinaga:
An efficient load-balancing mechanism for heterogeneous range-queriable cloud storage. 920-930
- Jin Li, Qiben Yan
, Victor I. Chang
:
Internet of Things: Security and privacy in a connected world. 931-932 - Zhanwei Du
, Yongjian Yang, Qing Cai, Chijun Zhang, Yuan Bai:
Modeling and inferring mobile phone users' negative emotion spreading in social networks. 933-942 - Pandi Vijayakumar
, Victor I. Chang
, L. Jegatha Deborah, Balamurugan Balusamy
, P. G. Shynu
:
Computationally efficient privacy preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks. 943-955 - Jian Shen
, Shaohua Chang, Jun Shen, Qi Liu, Xingming Sun:
A lightweight multi-layer authentication protocol for wireless body area networks. 956-963 - Christos Stergiou
, Kostas E. Psannis
, Byung-Gyu Kim, Brij B. Gupta
:
Secure integration of IoT and Cloud Computing. 964-975 - Hong Liu, Huansheng Ning
, Yinliang Yue, Yueliang Wan, Laurence T. Yang:
Selective disclosure and yoking-proof based privacy-preserving authentication scheme for cloud assisted wearable devices. 976-986 - Wei Wang, Yuanyuan Li, Xing Wang, Jiqiang Liu, Xiangliang Zhang
:
Detecting Android malicious apps and categorizing benign apps with ensemble of classifiers. 987-994 - Ying Wu, Muhua Liu, Rui Xue, Rui Zhang:
Attribute-based multi-function verifiable computation. 995-1004 - Ruhul Amin, Neeraj Kumar
, G. P. Biswas, Rahat Iqbal
, Victor I. Chang
:
A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment. 1005-1019 - Yi Liu, Yinghui Zhang, Jie Ling
, Zhusong Liu:
Secure and fine-grained access control on e-healthcare records in mobile cloud computing. 1020-1026 - Xianglin Wei
, Tongxiang Wang, Chaogang Tang, Jianhua Fan:
Collaborative mobile jammer tracking in Multi-Hop Wireless Network. 1027-1039 - Ming Tao, Jinglong Zuo, Zhusong Liu, Aniello Castiglione
, Francesco Palmieri:
Multi-layer cloud architectural model and ontology-based security service framework for IoT-based smart homes. 1040-1051
- Jakub T. Moscicki, Luca Mascetti:
Cloud storage services for file synchronization and sharing in science, education and research. 1052-1054 - Raúl Gracia Tinedo, Cristian Cotes, Edgar Zamora-Gómez, Genís Ortiz, Adrián Moreno-Martínez, Marc Sánchez Artigas, Pedro García López, Raquel Sánchez, Alberto Gómez, Anastasio Illana:
Giving wings to your data: A first experience of Personal Cloud interoperability. 1055-1070 - Danilo Piparo, Enric Tejedor, Pere Mato, Luca Mascetti, Jakub T. Moscicki, Massimo Lamanna:
SWAN: A service for interactive analysis in the cloud. 1071-1078 - Hassen Riahi, Alberto Aimar, Alejandro Álvarez-Ayllón
, Justas Balcas, Diego Ciangottini
, José M. Hernández
, Oliver Keeble, Nicolò Magini, Andrea Manzi
, Luca Mascetti, Marco Mascheroni, Andres Jorge Tanasijczuk, Eric Wayne Vaandering:
Integration of end-user Cloud storage for CMS analysis. 1079-1082 - Piotr Mrówczynski, Jakub T. Moscicki, Massimo Lamanna, Frederik Orellana
:
Benchmarking and monitoring framework for interconnected file synchronization and sharing services. 1083-1090 - Zhipeng Tan, Li Du, Dan Feng, Wei Zhou:
EML: An I/O scheduling algorithm in large-scale-application environments. 1091-1100
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.