default search action
Future Generation Computer Systems, Volume 86
Volume 86, September 2018
- Yunfei Meng, Zhiqiu Huang, Yu Zhou, Changbo Ke:
Privacy-aware cloud service selection approach based on P-Spec policy models and privacy sensitivities. 1-11 - Mohamed Abdel-Basset, Mai Mohamed, Victor I. Chang:
NMCDA: A framework for evaluating cloud computing services. 12-29 - Gregory Levitin, Liudong Xing, Barry W. Johnson, Yuanshun Dai:
Optimization of dynamic spot-checking for collusion tolerance in grid computing. 30-38 - Guiyan Liu, Songtao Guo, Quanjun Zhao, Yuanyuan Yang:
Tomogravity space based traffic matrix estimation in data center networks. 39-50 - Zhuowei Wang, Wuqing Zhao, Hao Wang, Lianglun Cheng:
Three-level performance optimization for heterogeneous systems based on software prefetching under power constraints. 51-58 - Sergio Ramírez-Gallego, Salvador García, Francisco Herrera:
Online entropy-based discretization for data streaming classification. 59-70 - Orcan Alpar:
Biometric touchstroke authentication by fuzzy proximity of touch locations. 71-80 - Eiman Iranpour, Saeed Sharifian:
A distributed load balancing and admission control algorithm based on Fuzzy type-2 and Game theory for large-scale SaaS cloud architectures. 81-98 - Léo Grange, Georges Da Costa, Patricia Stolf:
Green IT scheduling for data center powered with renewable energy. 99-120 - Enan A. Khalil, Suat Ozdemir, Suleyman Tosun:
Evolutionary task allocation in Internet of Things-based application domains. 121-133 - Ehsan Ataie, Reza Entezari-Maleki, Sayed Ehsan Etesami, Bernhard Egger, Danilo Ardagna, Ali Movaghar:
Power-aware performance analysis of self-adaptive resource management in IaaS clouds. 134-144 - Ihtisham Ali, Susmit Bagchi:
Designing hybrid graph model and algorithmic analysis of workflow decomposition in mobile distributed systems. 145-161 - Karl Mason, Martin Duggan, Enda Barrett, Jim Duggan, Enda Howley:
Predicting host CPU utilization in the cloud using evolutionary neural networks. 162-173 - Xingpo Ma, Junbin Liang, Jianxin Wang, Sheng Wen, Tian Wang, Yin Li, Wenpeng Ma, Chuanda Qi:
Secure fine-grained spatio-temporal Top-k queries in TMWSNs. 174-184 - Asmat Ullah Khan, Susmit Bagchi:
Software architecture and algorithm for reliable RPC for geo-distributed mobile computing systems. 185-198 - Eva Kern, Lorenz M. Hilty, Achim Guldner, Yuliyan V. Maksimov, Andreas Filler, Jens Gröger, Stefan Naumann:
Sustainable software products - Towards assessment criteria for resource and energy efficiency. 199-210 - Mateja Dumic, Dominik Sisejkovic, Rebeka Coric, Domagoj Jakobovic:
Evolving priority rules for resource constrained project scheduling problem with genetic programming. 211-221 - Yongjian Yang, Wenbin Liu, En Wang, Hengzhi Wang:
Beaconing Control strategy based on Game Theory in mobile crowdsensing. 222-233 - Nivethitha Somu, M. R. Gauthama Raman, Kirthivasan Kannan, V. S. Shankar Sriram:
A trust centric optimal service ranking approach for cloud service selection. 234-252 - Tassos Dimitriou, Naser Al-Ibrahim:
"I wasn't there" - Deniable, privacy-aware scheme for decentralized Location-based Services. 253-265 - Shubham Goel, Ravinder Kumar:
Brownian Motus and Clustered Binary Insertion Sort methods: An efficient progress over traditional methods. 266-280 - Suchismita Satpathy, Bibhudatta Sahoo, Ashok Kumar Turuk:
Sensing and Actuation as a Service Delivery Model in Cloud Edge centric Internet of Things. 281-296 - Harmanjeet Kaur, Neeraj Kumar, Shalini Batra:
An efficient multi-party scheme for privacy preserving collaborative filtering for healthcare recommender system. 297-307 - Orcun Yildiz, Amelie Chi Zhou, Shadi Ibrahim:
Improving the Effectiveness of Burst Buffers for Big Data Processing in HPC Systems with Eley. 308-318 - Roberto Boselli, Mirko Cesarini, Fabio Mercorio, Mario Mezzanzanica:
Classifying online Job Advertisements through Machine Learning. 319-328 - Long Hu, Jun Yang, Min Chen, Yongfeng Qian, Joel J. P. C. Rodrigues:
SCAI-SVSC: Smart clothing for effective interaction with a sustainable vital sign collection. 329-338 - Zakarea Alshara, Frederico Alvares, Hugo Bruneliere, Jonathan Lejeune, Charles Prud'homme, Thomas Ledoux:
CoMe4ACloud: An end-to-end framework for autonomic Cloud systems. 339-354 - Jianliang Wei, Fei Meng, Arunkumar N.:
A personalized authoritative user-based recommendation for social tagging. 355-361 - Ke Zhou, Jiangfeng Zeng, Yu Liu, Fuhao Zou:
Deep sentiment hashing for text retrieval in social CIoT. 362-371 - Lirong Qiu, Feng Cai, Guixian Xu:
Quantum digital signature for the access control of sensitive data in the big data era. 372-379 - Ali Hassan Sodhro, Sandeep Pirbhulal, Arun Kumar Sangaiah:
Convergence of IoT and product lifecycle management in medical health care. 380-391 - Kang Yang, Rui Wang, Yu Jiang, Houbing Song, Chenxia Luo, Yong Guan, Xiaojuan Li, Zhiping Shi:
Sensor attack detection using history based pairwise inconsistency. 392-402 - Min Chen, Wei Li, Yixue Hao, Yongfeng Qian, Iztok Humar:
Edge cognitive computing based smart healthcare system. 403-411 - Flora Amato, Aniello Castiglione, Fabio Mercorio, Mario Mezzanzanica, Vincenzo Moscato, Antonio Picariello, Giancarlo Sperlì:
Multimedia story creation on social networks. 412-420 - Rashmika Nawaratne, Damminda Alahakoon, Daswin De Silva, Prem Chhetri, Naveen K. Chilamkurti:
Self-evolving intelligent algorithms for facilitating data interoperability in IoT environments. 421-432 - Gunasekaran Manogaran, Daphne Lopez, Naveen K. Chilamkurti:
In-Mapper combiner based MapReduce algorithm for processing of big climate data. 433-445 - Giovanna Sannino, Giuseppe De Pietro:
A deep learning approach for ECG-based heartbeat classification for arrhythmia detection. 446-455 - Zhijie Han, Yaqiong Li, Jie Li:
A novel routing algorithm for IoT cloud based on hash offset tree. 456-463 - Rongbin Xu, Yeguo Wang, Haoyu Luo, Futian Wang, Ying Xie, Xiao Liu, Yun Yang:
A sufficient and necessary temporal violation handling point selection strategy in cloud workflow. 464-479 - Ehab Nabiel Alkhanak, Sai Peck Lee:
A hyper-heuristic cost optimisation approach for Scientific Workflow Scheduling in cloud computing. 480-506 - Lu Zhou, Chunhua Su, Yamin Wen, Weijie Li, Zheng Gong:
Towards practical white-box lightweight block cipher implementations for IoTs. 507-514 - Wanqing Wu, Sandeep Pirbhulal, Arun Kumar Sangaiah, Subhas Chandra Mukhopadhyay, Guanglin Li:
Optimization of signal quality over comfortability of textile electrodes for ECG monitoring in fog computing based medical applications. 515-526 - Priyan Malarvizhi Kumar, S. Lokesh, R. Varatharajan, Gokulnath Chandra Babu, Parthasarathy Panchatcharam:
Cloud and IoT based disease prediction and diagnosis system for healthcare using Fuzzy neural classifier. 527-534 - Jordi Ros-Giralt, Alan Commike, Peter Cullen, Richard Lethin:
Algorithms and data structures to accelerate network analysis. 535-545 - Wissem Inoubli, Sabeur Aridhi, Haithem Mezni, Mondher Maddouri, Engelbert Mephu Nguifo:
An experimental survey on big data frameworks. 546-564 - Jorge Veiga, Jonatan Enes, Roberto R. Expósito, Juan Touriño:
BDEv 3.0: Energy efficiency and microarchitectural characterization of Big Data processing frameworks. 565-581 - Shao-Jun Yang, Xinyi Huang:
Certain types of M-fuzzifying matroids: A fundamental look at the security protocols in RFID and IoT. 582-590 - Ying Ji, Meng Li, Shaojian Qu:
Multi-objective linear programming games and applications in supply chain competition. 591-597 - Shaofei Wu, Mingqing Wang, Yuntao Zou:
Research on internet information mining based on agent algorithm. 598-602 - Shihong Yao, Zhigao Zheng, Tao Wang, Qingfeng Guan:
An efficient joint compression and sparsity estimation matching pursuit algorithm for artificial intelligence application. 603-613 - (Withdrawn) Internet of Things (IoT) and its impact on supply chain: A framework for building smart, secure and efficient systems. 614-628
- Zeinab Shmeis, Mohamad Jaber:
Fine and coarse grained composition and adaptation of spark applications. 629-640 - (Withdrawn) Research on agricultural supply chain system with double chain architecture based on blockchain technology. 641-649
- Pradip Kumar Sharma, Jong Hyuk Park:
Blockchain based hybrid network architecture for the smart city. 650-655 - Wenbing Chang, Zhenzhong Xu, Shenghan Zhou, Wen Cao:
Research on detection methods based on Doc2vec abnormal comments. 656-662 - Shi-Zhuan Han, Wen-Tsao Pan, Ying-Ying Zhou, Zong-Li Liu:
Construct the prediction model for China agricultural output value based on the optimization neural network of fruit fly optimization algorithm. 663-669 - Bangyong Sun, Nianzeng Yuan, Congjun Cao, Jon Yngve Hardeberg:
Design of four-band multispectral imaging system with one single-sensor. 670-679 - Bo Yang, Zhiyong Li, Shilong Jiang, Keqin Li:
Envy-free auction mechanism for VM pricing and allocation in clouds. 680-693 - Song Wu, Chao Mei, Hai Jin, Duoqiang Wang:
Android Unikernel: Gearing mobile code offloading towards edge computing. 694-703 - Haibo Yi, Zhe Nie:
Side-channel security analysis of UOV signature for cloud-based Internet of Things. 704-708 - Dingju Zhu:
IOT and big data based cooperative logistical delivery scheduling method and cloud robot system. 709-715 - Pyoung Won Kim:
Real-time bio-signal-processing of students based on an Intelligent algorithm for Internet of Things to assess engagement levels in a classroom. 716-722
- Muhammad Younas, Irfan Awan, George Ghinea, Tor-Morten Grønli:
Editorial: New developments in cloud and IoT. 723-725 - Kirill Belyaev, Indrakshi Ray:
Component-oriented access control - Application servers meet tuple spaces for the masses. 726-739 - Bogdan-Cosmin Chifor, Ion Bica, Victor Valeriu Patriciu, Florin Pop:
A security authorization scheme for smart home Internet of Things devices. 740-749 - Chahrazed Labba, Narjès Bellamine Ben Saoud, Julie Dugdale:
A predictive approach for the efficient distribution of agent-based systems on a hybrid-cloud. 750-764 - Mahmoud Al-Ayyoub, Muneera Al-Quraan, Yaser Jararweh, Elhadj Benkhelifa, Salim Hariri:
Resilient service provisioning in cloud based data centers. 765-774 - Bo Yuan, Lu Liu, Nick Antonopoulos:
Efficient service discovery in decentralized online social networks. 775-791 - Mário Antunes, Diogo Gomes, Rui L. Aguiar:
Towards IoT data classification through semantic features. 792-798 - Khawar Hasham, Kamran Munir, Richard McClatchey:
Cloud infrastructure provenance collection and management to reproduce scientific workflows execution. 799-820 - Ragib Hasan, Md. Mahmud Hossain, Rasib Khan:
Aura: An incentive-driven ad-hoc IoT cloud framework for proximal mobile computation offloading. 821-835 - Zhou Zhou, Jemal H. Abawajy, Morshed U. Chowdhury, Zhigang Hu, Keqin Li, Hongbing Cheng, Abdulhameed A. Al Elaiwi, Fangmin Li:
Minimizing SLA violation and power consumption in Cloud data centers using adaptive energy-aware algorithms. 836-850
- Brij B. Gupta, Arun Kumar Sangaiah, Nadia Nedjah, Shingo Yamaguchi, Zhiyong Zhang, Michael Sheng:
Recent research in computational intelligence paradigms into security and privacy for online social networks (OSNs). 851-854 - M. Shamim Hossain, Mohammed F. Alhamid, Ghulam Muhammad:
Collaborative analysis model for trending images on social networks. 855-862 - Xi Xiao, Chunhui Chen, Arun Kumar Sangaiah, Guangwu Hu, Runguo Ye, Yong Jiang:
CenLocShare: A centralized privacy-preserving location-sharing system for mobile online social networks. 863-872 - Yi Liu, Hao Wang, Tong Li, Ping Li, Jie Ling:
Attribute-based handshake protocol for mobile healthcare social networks. 873-880 - Shaobo Zhang, Kim-Kwang Raymond Choo, Qin Liu, Guojun Wang:
Enhancing privacy through uniform grid and caching in location-based services. 881-892 - Androniki Sapountzi, Kostas E. Psannis:
Social networking data analysis tools & challenges. 893-913 - Zhiyong Zhang, Brij B. Gupta:
Social media security and trustworthiness: Overview and new direction. 914-925 - Amit Kumar Singh, Basant Kumar, Sanjay Kumar Singh, S. P. Ghrera, Anand Mohan:
Multiple watermarking technique for securing online social network contents using Back Propagation Neural Network. 926-939 - Weiwei Lin, Wentai Wu, Haoyu Wang, James Z. Wang, Ching-Hsien Hsu:
Experimental and quantitative analysis of server power model for cloud data centers. 940-950 - Khan Muhammad, Muhammad Sajjad, Irfan Mehmood, Seungmin Rho, Sung Wook Baik:
Image steganography using uncorrelated color space and its application for security of visual contents in online social networks. 951-960
- Florin Pop, Radu Prodan, Gabriel Antoniu:
RM-BDP: Resource management for Big Data platforms. 961-963 - Yuxia Cheng, Yang Xiang, Wenzhi Chen, Houcine Hassan, Abdulhameed Alelaiwi:
Efficient cache resource aggregation using adaptive multi-level exclusive caching policies. 964-974 - Massimo Ficco, Roberto Pietrantuono, Stefano Russo:
Aging-related performance anomalies in the apache storm stream processing system. 975-994 - Bin Wang, Chao Chen, Ligang He, Bo Gao, Jiadong Ren, Zhangjie Fu, Songling Fu, Yongjian Hu, Chang-Tsun Li:
Modelling and developing conflict-aware scheduling on large-scale data centres. 995-1007 - Chandrashekar Jatoth, G. R. Gangadharan, Ugo Fiore, Rajkumar Buyya:
QoS-aware Big service composition using MapReduce based evolutionary algorithm with guided mutation. 1008-1018 - Dominik Meiländer, Sergei Gorlatch:
Modeling the Scalability of Real-Time Online Interactive Applications on Clouds. 1019-1031 - Marco Gribaudo, Mauro Iacono, Mariam Kiran:
A performance modeling framework for lambda architecture based applications. 1032-1041 - Qublai Khan Ali Mirza, Irfan Awan, Muhammad Younas:
CloudIntell: An intelligent malware detection system. 1042-1053 - Guipeng Liu, Xiaomin Zhu, Ji Wang, Deke Guo, Weidong Bao, Hui Guo:
SP-Partitioner: A novel partition method to handle intermediate data skew in spark streaming. 1054-1063 - Wanchun Dou, Xiaolong Xu, Xiang Liu, Laurence T. Yang, Yiping Wen:
A Resource Co-Allocation method for load-balance scheduling over big data platforms. 1064-1075 - Álvaro Brandón Hernández, María S. Pérez, Smrati Gupta, Victor Muntés-Mulero:
Using machine learning to optimize parallelism in big data applications. 1076-1092 - Pierre Matri, María S. Pérez, Alexandru Costan, Luc Bougé, Gabriel Antoniu:
Keeping up with storage: Decentralized, write-enabled dynamic geo-replication. 1093-1105 - Daniel Grzonka, Agnieszka Jakobik, Joanna Kolodziej, Sabri Pllana:
Using a multi-agent system and artificial intelligence for monitoring and improving the cloud performance and security. 1106-1117 - Ta Yuan Hsu, Ajay D. Kshemkalyani, Min Shen:
Causal consistency algorithms for partially replicated and fully replicated systems. 1118-1133 - Aniello Castiglione, Francesco Colace, Vincenzo Moscato, Francesco Palmieri:
CHIS: A big data infrastructure to manage digital cultural items. 1134-1145 - Suzhen Wu, Weidong Zhu, Bo Mao, Kuan-Ching Li:
PP: Popularity-based Proactive Data Recovery for HDFS RAID systems. 1146-1153 - Jining Yan, Yan Ma, Lizhe Wang, Kim-Kwang Raymond Choo, Wei Jie:
A cloud-based remote sensing data production system. 1154-1166
- Joarder Kamruzzaman, Guojun Wang, Gour C. Karmakar, Iftekhar Ahmad, Md. Zakirul Alam Bhuiyan:
Acoustic sensor networks in the Internet of Things applications. 1167-1169 - Allaa R. Hilal, Aya Sayedelahl, Arash Tabibiazar, Mohamed S. Kamel, Otman A. Basir:
A distributed sensor management for large-scale IoT indoor acoustic surveillance. 1170-1184 - Yankun Chen, Fei Ji, Quansheng Guan, Yide Wang, Fangjiong Chen, Hua Yu:
Adaptive RTO for handshaking-based MAC protocols in underwater acoustic networks. 1185-1192 - Gour C. Karmakar, Joarder Kamruzzaman, Nusrat Nowsheen:
An efficient data delivery mechanism for AUV-based Ad hoc UASNs. 1193-1208 - Md. Abdul Hamid, Mohammad Abdullah-Al-Wadud, Mohammad Mehedi Hassan, Ahmad Almogren, Atif Alamri, Abu Raihan M. Kamal, Md. Mamun-Or-Rashid:
A key distribution scheme for secure communication in acoustic sensor networks. 1209-1217 - Kun Tang, Ronghua Shi, Jian Dong:
Throughput analysis of cognitive wireless acoustic sensor networks with energy harvesting. 1218-1227 - Yingxue Wang, Yanan Chen, Md. Zakirul Alam Bhuiyan, Yu Han, Shenghui Zhao, Jianxin Li:
Gait-based Human identification using acoustic sensor and deep neural network. 1228-1237
- Zhihan Lv, Rahat Iqbal, Victor I. Chang:
Big data analytics for sustainability. 1238-1241 - Yixiong Feng, Zhifeng Zhang, Guangdong Tian, Zhihan Lv, Shaoxu Tian, Hongfei Jia:
Data-driven accurate design of variable blank holder force in sheet forming under interval uncertainty using sequential approximate multi-objective optimization. 1242-1250 - Yong Peng, Xinghua Wang, Shuangling Peng, Helai Huang, Guangdong Tian, Hongfei Jia:
Investigation on the injuries of drivers and copilots in rear-end crashes between trucks based on real world accident data in China. 1251-1258 - Bin Cao, Jianwei Zhao, Xin Liu, Xinyuan Kang, Shan Yang, Kai Kang, Ming Yu:
Multiobjective recommendation optimization via utilizing distributed parallel algorithm. 1259-1268 - Xu Chen, Jie Zhang, Zheng Xu, Jin Liu:
HIB-tree: An efficient index method for the big data analytics of large-scale human activity trajectories. 1269-1278 - Gagangeet Singh Aujla, Neeraj Kumar:
MEnSuS: An efficient scheme for energy management with sustainability of cloud data centers in edge-cloud environment. 1279-1300 - Abdul Wahid, Munam Ali Shah, Faisal Fayyaz Qureshi, Hafsa Maryam, Rahat Iqbal, Victor I. Chang:
Big data analytics for mitigating broadcast storm in Vehicular Content Centric networks. 1301-1320 - Anna Kobusinska, Kamil Pawluczuk, Jerzy Brzezinski:
Big Data fingerprinting information analytics for sustainability. 1321-1337 - Jiwan Lee, Bonghee Hong, Sunghoon Jung, Victor Chang:
Clustering learning model of CCTV image pattern for producing road hazard meteorological information. 1338-1350 - Wentai Wu, Weiwei Lin, Ching-Hsien Hsu, Ligang He:
Energy-efficient hadoop for big data analytics and computing: A systematic review and research insights. 1351-1367
- Gang Sun, Victor I. Chang, Steven Guan, Muthu Ramachandran, Jin Li, Dan Liao:
Big Data and Internet of Things - Fusion for different services and its impacts. 1368-1370 - Ling Tian, Hongyu Wang, Yimin Zhou, Chengzong Peng:
Video big data in smart city: Background construction and optimization for surveillance video processing. 1371-1382 - Mohamed Elhoseny, Ahmed Abdelaziz, Ahmed S. Salama, Alaa Mohamed Riad, Khan Muhammad, Arun Kumar Sangaiah:
A hybrid model of Internet of Things and cloud computing to manage big data in health services applications. 1383-1394 - Rui Tang, Simon Fong:
Clustering big IoT data by metaheuristic optimized mini-batch and parallel partition-based DGC in Hadoop. 1395-1412 - Xiaohong Huang, Kun Xie, Supeng Leng, Tingting Yuan, Maode Ma:
Improving Quality of Experience in multimedia Internet of Things leveraging machine learning on big data. 1413-1423 - Chien-Ting Kuo, Po-Wen Chi, Victor Chang, Chin-Laung Lei:
SFaaS: Keeping an eye on IoT fusion environment with security fusion as a service. 1424-1436 - Yang Yang, Xianghan Zheng, Wenzhong Guo, Ximeng Liu, Victor I. Chang:
Privacy-preserving fusion of IoT and big data for e-health. 1437-1455
- Sancheng Peng, Shui Yu, Peter Mueller:
Social networking big data: Opportunities, solutions, and challenges. 1456-1458 - Laizhong Cui, Wenyuan Huang, Qiao Yan, F. Richard Yu, Zhenkun Wen, Nan Lu:
A novel context-aware recommendation algorithm with two-level SVD in social networks. 1459-1470 - Qingjuan Zhao, Jianwei Niu, Huan Chen, Lei Wang, Mohammed Atiquzzaman:
An indicative opinion generation model for short texts on social networks. 1471-1480 - Kaili Mao, Jianwei Niu, Huan Chen, Lei Wang, Mohammed Atiquzzaman:
Mining of marital distress from microblogging social networks: A case study on Sina Weibo. 1481-1490 - Feng Wang, Wenjun Jiang, Xiaolin Li, Guojun Wang:
Maximizing positive influence spread in online social networks via fluid dynamics. 1491-1502 - Hao Peng, Mengjiao Bao, Jianxin Li, Md. Zakirul Alam Bhuiyan, Yaopeng Liu, Yu He, Erica Yang:
Incremental term representation learning for social network analysis. 1503-1512 - Kai Dong, Taolin Guo, Haibo Ye, Xuansong Li, Zhen Ling:
On the limitations of existing notions of location privacy. 1513-1522 - Qinlong Huang, Yixian Yang, Jingyi Fu:
PRECISE: Identity-based private data sharing with conditional proxy re-encryption in online social networks. 1523-1533 - Qinlong Huang, Yixian Yang, Mansuo Shen:
Corrigendum to "Secure and efficient data collaboration with hierarchical attribute-based encryption in cloud computing" [Future Gener. Comput. Syst. 72 (2017) 239-249]. 1534
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.