default search action
Future Generation Computer Systems, Volume 82
Volume 82, May 2018
- Long Thai, Blesson Varghese, Adam Barker:
A survey and taxonomy of resource optimisation for executing bag-of-task applications on public clouds. 1-11 - Basant Subba, Santosh Biswas, Sushanta Karmakar:
A game theory based multi layered intrusion detection framework for VANET. 12-28 - Javier Panadero, Jésica de Armas, Xavier Serra, Joan Manuel Marquès:
Multi criteria biased randomized method for resource allocation in distributed systems: Application in a volunteer computing system. 29-40 - Xiao Lv, Fazhi He, Weiwei Cai, Yuan Cheng:
Supporting selective undo of string-wise operations for collaborative editing systems. 41-62 - José Alemany, Elena del Val Noguera, Juan M. Alberola, Ana García-Fornes:
Estimation of privacy risk through centrality metrics. 63-76 - David Antón, Gregorij Kurillo, Ruzena Bajcsy:
User experience and interaction performance in 2D/3D telecollaboration. 77-88 - Vincent Armant, Milan De Cauwer, Kenneth N. Brown, Barry O'Sullivan:
Semi-online task assignment policies for workload consolidation in cloud computing systems. 89-103 - Daniela Loreti, Federico Chesani, Anna Ciampolini, Paola Mello:
A distributed approach to compliance monitoring of business process event streams. 104-118 - Weimin Peng, Aihong Chen, Jing Chen:
Using general master equation for feature fusion. 119-126 - Zhiwen Chen, Xin He, Jianhua Sun, Hao Chen, Ligang He:
Concurrent hash tables on multicore machines: Comparison, evaluation and implications. 127-141 - Huimin Lu, Yujie Li, Tomoki Uemura, Hyoungseop Kim, Seiichi Serikawa:
Low illumination underwater light field images reconstruction using deep convolutional neural networks. 142-148 - Ayush Dogra, Bhawna Goyal, Sunil Agrawal:
Osseous and digital subtraction angiography image fusion via various enhancement schemes and Laplacian pyramid transformations. 149-157 - Bhawna Goyal, Ayush Dogra, Sunil Agrawal, Balwinder Singh Sohi:
Two-dimensional gray scale image denoising via morphological operations in NSST domain & bitonic filtering. 158-175 - Vikrant Bhateja, Mukul Misra, Shabana Urooj:
Unsharp masking approaches for HVS based enhancement of mammographic masses: A comparative evaluation. 176-189 - Neetu Kushwaha, Millie Pant:
Link based BPSO for feature selection in big data text clustering. 190-199 - Yousaf Bin Zikria, Muhammad Khalil Afzal, Farruh Ishmanov, Sung Won Kim, Heejung Yu:
A survey on routing protocols supported by the Contiki Internet of things operating system. 200-219 - Yaguang Lin, Xiaoming Wang, Fei Hao, Liang Wang, Lichen Zhang, Ruonan Zhao:
An on-demand coverage based self-deployment algorithm for big data perception in mobile sensing networks. 220-234 - Lei Liu, Yongjian Ren, Lizhen Cui, Yuliang Shi, Qingzhong Li:
Performance measurement of data flow processing employing software defined architecture. 235-243 - Wei Zheng, Yingsheng Qin, Bugingo Emmanuel, Dongzhan Zhang, Jinjun Chen:
Cost optimization for deadline-aware scheduling of big-data processing jobs on clouds. 244-255 - Bin Cao, Jianwei Zhao, Po Yang, Zhihan Lv, Xin Liu, Xinyuan Kang, Shan Yang, Kai Kang, Amjad Anvari-Moghaddam:
Distributed parallel cooperative coevolutionary multi-objective large-scale immune algorithm for deployment of wireless sensor networks. 256-267 - Gerardo Severino, Guido D'Urso, Maddalena Scarfato, Gerardo Toraldo:
The IoT as a tool to combine the scheduling of the irrigation with the geostatistics of the soils. 268-273 - Khizar Hameed, Abid Khan, Mansoor Ahmed, Goutham Reddy Alavalapati, M. Mazhar Rathore:
Towards a formally verified zero watermarking scheme for data integrity in the Internet of Things based-wireless sensor networks. 274-289 - Zulfiqar Ali, Muhammad Imran, Mansour Alsulaiman, Tanveer A. Zia, Muhammad Shoaib:
A zero-watermarking algorithm for privacy protection in biomedical signals. 290-303 - K. Deepa Thilak, A. Amuthan:
Cellular Automata-based Improved Ant Colony-based Optimization Algorithm for mitigating DDoS attacks in VANETs. 304-314 - Anjia Yang, Yunhui Zhuang, Jian Weng, Gerhard P. Hancke, Duncan S. Wong, Guomin Yang:
Exploring relationship between indistinguishability-based and unpredictability-based RFID privacy models. 315-326 - Fadi Al-Turjman:
Mobile Couriers' selection for the Smart-grid in Smart-cities' Pervasive Sensing. 327-341 - Zhiwei Wang:
A privacy-preserving and accountable authentication protocol for IoT end-devices with weaker identity. 342-348 - Andreas P. Plageras, Kostas E. Psannis, Christos Stergiou, Haoxiang Wang, Brij B. Gupta:
Efficient IoT-based sensor BIG Data collection-processing and analysis in smart buildings. 349-357 - Muhammad Faheem, Vehbi Cagri Gungor:
MQRP: Mobile sinks-based QoS-aware data gathering protocol for wireless sensor networks-based smart grid applications in the context of industry 4.0-based on internet of things. 358-374 - Gunasekaran Manogaran, R. Varatharajan, Daphne Lopez, Priyan Malarvizhi Kumar, Revathi Sundarasekar, Chandu Thota:
A new architecture of Internet of Things and big data ecosystem for secured smart healthcare monitoring and alerting system. 375-387 - Kanae Matsui:
An information provision system to promote energy conservation and maintain indoor comfort in smart homes using sensed data by IoT sensors. 388-394 - Minhaj Ahmad Khan, Khaled Salah:
IoT security: Review, blockchain solutions, and open challenges. 395-411 - Nashreen Nesa, Tania Ghosh, Indrajit Banerjee:
Non-parametric sequence-based learning approach for outlier detection in IoT. 412-421 - Md. Mahmud Hossain, S. M. Riazul Islam, Farman Ali, Kyung Sup Kwak, Ragib Hasan:
An Internet of Things-based health prescription assistant and its security system design. 422-439 - Amritpal Singh, Sahil Garg, Shalini Batra, Neeraj Kumar, Joel J. P. C. Rodrigues:
Bloom filter based optimization scheme for massive data handling in IoT environment. 440-449
- Sandro Fiore, Mohamed Bakhouya, Waleed W. Smari:
On the road to exascale: Advances in High Performance Computing and Simulations - An overview and editorial. 450-458 - Tahir Maqsood, Kashif Bilal, Sajjad Ahmad Madani:
Congestion-aware core mapping for Network-on-Chip based systems using betweenness centrality. 459-471 - Nouredine Melab, Jan Gmys, Mohand-Said Mezmaz, Daniel Tuyttens:
Multi-core versus many-core computing for many-task Branch-and-Bound applied to big optimization problems. 472-481 - Christoph Riesinger, Tobias Neckel, Florian Rupp:
Non-standard pseudo random number generators revisited for GPUs. 482-492 - Gabriele Mencagli, Marco Vanneschi, Silvia Lametti:
The home-forwarding mechanism to reduce the cache coherence overhead in next-generation CMPs. 493-509 - Francisco Candel, Salvador Petit, Julio Sahuquillo, José Duato:
Accurately modeling the on-chip and off-chip GPU memory subsystem. 510-519 - Yang Zhang, Zuocheng Xing, Cang Liu, Chuan Tang, Qinglin Wang:
Locality based warp scheduling in GPGPUs. 520-527 - Lin Ma, Roger D. Chamberlain, Kunal Agrawal, Chen Tian, Ziang Hu:
Analysis of classic algorithms on highly-threaded many-core architectures. 528-543 - Sandra Gesing, Rion Dooley, Marlon E. Pierce, Jens Krüger, Richard Grunzke, Sonja Herres-Pawlis, Alexander Hoffmann:
Gathering requirements for advancing simulations in HPC infrastructures via science gateways. 544-554 - Thomas Jakobs, Jens Lang, Gudula Rünger, Paul Stocker:
Tuning linear algebra for energy efficiency on multicore machines by adapting the ATLAS library. 555-564 - Gemma Sanjuan, Tomàs Margalef, Ana Cortés:
Wind field parallelization based on Schwarz alternating domain decomposition method. 565-574 - Matthias Lieber, Wolfgang E. Nagel:
Highly scalable SFC-based dynamic load balancing and its application to atmospheric modeling. 575-590 - Keqin Li:
Scheduling parallel tasks with energy and time constraints on multiple manycore processors in a cloud computing environment. 591-605 - Hugo Meyer, José Carlos Sancho, Milica Mrdakovic, Wang Miao, Nicola Calabretta:
Optical packet switching in HPC. An analysis of applications performance. 606-616 - Meriem Guerar, Alessio Merlo, Mauro Migliardi:
Completely Automated Public Physical test to tell Computers and Humans Apart: A usability study on mobile devices. 617-630 - Alexandru Uta, Ove Danner, Cas van der Weegen, Ana-Maria Oprescu, Andreea Sandu, Stefania Costache, Thilo Kielmann:
MemEFS: A network-aware elastic in-memory runtime distributed file system. 631-646 - Jorji Nonaka, Kenji Ono, Masahiro Fujita:
234Compositor: A flexible parallel image compositing framework for massively parallel visualization environments. 647-655 - Tie Qiu, Aoyang Zhao, Ruixin Ma, Victor Chang, Fangbing Liu, Zhangjie Fu:
A task-efficient sink node based on embedded multi-core SoC for Internet of Things. 656-666
- Seungmin Rho, Yu Chen:
Social Internet of Things: Applications, architectures and protocols. 667-668 - Hao Wu, Kun Yue, Bo Li, Binbin Zhang, Ching-Hsien Hsu:
Collaborative QoS prediction with context-sensitive matrix factorization. 669-678 - Bo-Wei Chen, Nik Nailah Binti Abdullah, Sang Oh Park, Y. Gu:
Efficient multiple incremental computation for Kernel Ridge Regression with Bayesian uncertainty modeling. 679-688 - Guangjie Han, Lina Zhou, Hao Wang, Wenbo Zhang, Sammy Chan:
A source location protection protocol based on dynamic routing in WSNs for the Social Internet of Things. 689-697 - Caifeng Zou, Huifang Deng, Jiafu Wan, Zhongren Wang, Pan Deng:
Mining and updating association rules based on fuzzy concept lattice. 698-706 - Bindiya Jain, Gursewak Brar, Jyoteesh Malhotra, Shalli Rani, Syed Hassan Ahmed:
A cross layer protocol for traffic management in Social Internet of Vehicles. 707-714 - Awais Ahmad, Murad Khan, Anand Paul, Sadia Din, M. Mazhar Rathore, Gwanggil Jeon, Gyu Sang Choi:
Toward modeling and optimization of features selection in Big Data based social Internet of Things. 715-726 - Fan Wu, Xiong Li, Arun Kumar Sangaiah, Lili Xu, Saru Kumari, Liuxi Wu, Jian Shen:
A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks. 727-737 - Zheng Yan, Haomeng Xie, Peng Zhang, Brij B. Gupta:
Flexible data access control in D2D communications. 738-751 - Seokcheol Lee, SungJin Kim, Ken Choi, Taeshik Shon:
Game theory-based Security Vulnerability Quantification for Social Internet of Things. 752-760 - Abebe Abeshu Diro, Naveen K. Chilamkurti:
Distributed attack detection scheme using deep learning approach for Internet of Things. 761-768 - Seungwan Hong, Sangho Park, Lee Won Park, Minseo Jeon, Hangbae Chang:
An analysis of security systems for electronic information for establishing secure internet of things environments: Focusing on research trends in the security field in South Korea. 769-782
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.