default search action
Future Generation Computer Systems, Volume 78
Volumes 78, Part 1, January 2018
- Edelberto F. Silva, Débora Christina Muchaluat-Saade, Natalia Castro Fernandes:
ACROSS: A generic framework for attribute-based access control with distributed policies for virtual organizations. 1-17 - Xiaoyong Xu, Maolin Tang, Yu-Chu Tian:
QoS-guaranteed resource provisioning for cloud-based MapReduce in dynamical environments. 18-30 - Sheng-Yao Su, Wenbin Yao, Xiaoyong Li:
DARS: A dynamic adaptive replica strategy under high load Cloud-P2P. 31-40 - Jian Xu, Hang Zhang, Wubai Zhou, Rouying He, Tao Li:
Signature based trouble ticket classification. 41-58 - Rafael de Oliveira Werneck, Waldir R. de Almeida, Bernardo Vecchia Stein, Daniel V. Pazinato, Pedro Ribeiro Mendes Júnior, Otávio Augusto Bizetto Penatti, Anderson Rocha, Ricardo da Silva Torres:
Kuaa: A unified framework for design, deployment, execution, and recommendation of machine learning experiments. 59-76 - Yi-Chao He, Haoran Xie, Tak-Lam Wong, Xizhao Wang:
A novel binary artificial bee colony algorithm for the set-union knapsack problem. 77-86
- Dimosthenis Kyriazis, Keith G. Jeffery:
Cloud forward: From distributed to complete computing. 87-88 - Chonglin Gu, Longxiang Fan, Wenbin Wu, Hejiao Huang, Xiaohua Jia:
Greening cloud data centers in an economical way by energy trading with power grid. 89-101 - Athanasia Evangelinou, Michele Ciavotta, Danilo Ardagna, Aliki Kopaneli, George Kousiouris, Theodora A. Varvarigou:
Enterprise applications cloud rightsizing through a joint benchmarking and optimization approach. 102-114 - Sebastian Lehrig, Richard Sanders, Gunnar Brataas, Mariano Cecowski, Simon Ivansek, Jure Polutnik:
CloudStore - towards scalability, elasticity, and efficiency benchmarking and analysis in Cloud computing. 115-126 - George Fylaktopoulos, Michael Skolarikis, I. Papadopoulos, Georgios I. Goumas, Aristidis Sotiropoulos, Ilias Maglogiannis:
A distributed modular platform for the development of cloud based applications. 127-141 - Pierfrancesco Bellini, Ivan Bruno, Daniele Cenni, Paolo Nesi:
Managing cloud via Smart Cloud Engine and Knowledge Base. 142-154 - Kyriakos Kritikos, Tom Kirkham, Bartosz Kryza, Philippe Massonet:
Reprint of "Towards a security-enhanced PaaS platform for multi-cloud applications". 155-175 - Rodrigo da Rosa Righi, Vinicius Facco Rodrigues, Gustavo Rostirolla, Cristiano André da Costa, Eduardo Roloff, Philippe Olivier Alexandre Navaux:
A lightweight plug-and-play elasticity service for self-organizing resource provisioning on parallel applications. 176-190 - Mostafa Ghobaei-Arani, Sam Jabbehdari, Mohammad Ali Pourmina:
An autonomic resource provisioning approach for service-based cloud applications: A hybrid approach. 191-210 - Emiliano Casalicchio, Valeria Cardellini, Gianluca Interino, Monica Palmirani:
Research challenges in legal-rule and QoS-aware cloud service brokerage. 211-223 - Netsanet Haile, Jörn Altmann:
Evaluating investments in portability and interoperability between software service platforms. 224-241
- Florin Pop, Alexandru Iosup, Radu Prodan:
HPS-HDS: High Performance Scheduling for Heterogeneous Distributed Systems. 242-244 - Antonio Fernández Anta, Chryssis Georgiou, Dariusz R. Kowalski, Elli Zavou:
Competitive analysis of fundamental scheduling algorithms on a fault-prone machine and the impact of resource augmentation. 245-256 - Fredy Juarez, Jorge Ejarque, Rosa M. Badia:
Dynamic energy-aware scheduling for parallel task-based application in cloud computing. 257-271 - Rodrigo da Rosa Righi, Roberto de Quadros Gomes, Vinicius Facco Rodrigues, Cristiano André da Costa, Antônio Marcos Alberti, Laércio Lima Pilla, Philippe Olivier Alexandre Navaux:
MigPF: Towards on self-organizing process rescheduling of Bulk-Synchronous Parallel applications. 272-286 - Zhuo Tang, Xiangshen Zhang, Kenli Li, Keqin Li:
An intermediate data placement algorithm for load balancing in Spark computing environment. 287-301 - Michal P. Karpowicz, Piotr Arabas, Ewa Niewiadomska-Szynkiewicz:
Design and implementation of energy-aware application-specific CPU frequency governors for the heterogeneous distributed computing systems. 302-315 - Wenbin Jiang, Min Long, Laurence T. Yang, Xiaobai Liu, Hai Jin, Alan L. Yuille, Ye Chi:
FIPIP: A novel fine-grained parallel partition based intra-frame prediction on heterogeneous many-core systems. 316-329 - Tudor Cioara, Ionut Anghel, Massimo Bertoncini, Ioan Salomie, Diego Arnone, Marzia Mammina, Terpsichori Helen Velivassaki, Marcel Antal:
Optimized flexibility management enacting Data Centres participation in Smart Demand Response programs. 330-342 - Massimo Ficco, Christian Esposito, Francesco Palmieri, Aniello Castiglione:
A coral-reefs and Game Theory-based approach for optimizing elastic cloud resource allocation. 343-352 - Lizhe Wang, Yan Ma, Jining Yan, Victor Chang, Albert Y. Zomaya:
pipsCloud: High performance cloud computing for remote sensing big data management and processing. 353-368 - Konstantinos Douzis, Stelios Sotiriadis, Euripides G. M. Petrakis, Cristiana Amza:
Modular and generic IoT management on the cloud. 369-378 - Izzet F. Senturk, Ponnuraman Balakrishnan, Anas Abu-Doleh, Kamer Kaya, Qutaibah M. Malluhi, Ümit V. Çatalyürek:
A resource provisioning framework for bioinformatics applications in multi-cloud environments. 379-391 - Rong Jiang, Rongxing Lu, Kim-Kwang Raymond Choo:
Achieving high performance and privacy-preserving query over encrypted multidimensional big metering data. 392-401 - Hamid Arabnejad, Jorge G. Barbosa:
Reprint of "Multi-QoS constrained and Profit-aware scheduling approach for concurrent workflows on heterogeneous systems". 402-412
- Magdalini Eirinaki, Jerry Gao, Iraklis Varlamis, Konstantinos Tserpes:
Recommender Systems for Large-Scale Social Networks: A review of challenges and solutions. 413-418 - Fatemeh Rezaeimehr, Parham Moradi, Sajad Ahmadian, Nooruldeen Nasih Qader, Mahdi Jalili:
TCARS: Time- and Community-Aware Recommendation System. 419-429 - Davide Feltoni Gurini, Fabio Gasparetti, Alessandro Micarelli, Giuseppe Sansonetti:
Temporal people-to-people recommendation on social networks with sentiment-based matrix factorization. 430-439 - Dionisis Margaris, Costas Vassilakis, Panagiotis Georgiadis:
Query personalization using social network information and collaborative filtering techniques. 440-450 - Junpeng Guo, Zeng Gao, Na Liu, Yi Wu:
Recommend products with consideration of multi-category inter-purchase time and price. 451-461 - Mingxin Gan, Rui Jiang:
FLOWER: Fusing global and local associations towards personalized social recommendation. 462-473 - Alejandro Corbellini, Daniela Godoy, Cristian Mateos, Silvia N. Schiaffino, Alejandro Zunino:
DPM: A novel distributed large-scale social graph processing framework for link prediction algorithms. 474-480
Volumes 78, Part 2, January 2018
- Sandro Bartolini, Pierfrancesco Foglia, Cosimo Antonio Prete:
Exploring the relationship between architectures and management policies in the design of NUCA-based chip multicore systems. 481-501 - Klavdiya Bochenina, Sergey Kesarev, Alexander Boukhanovsky:
Scalable parallel simulation of dynamical processes on large stochastic Kronecker graphs. 502-515 - George Kousiouris, Adnan Akbar, Juan Sancho, Paula Ta-Shma, Alexandros Psychas, Dimosthenis Kyriazis, Theodora A. Varvarigou:
An integrated information lifecycle management framework for exploiting social network data to identify dynamic large crowd concentration events in smart cities applications. 516-530 - Lifang Ren, Wenjian Wang:
An SVM-based collaborative filtering approach for Top-N web services recommendation. 531-543
- Mauro Conti, Ali Dehghantanha, Katrin Franke, Steve Watson:
Internet of Things security and forensics: Challenges and opportunities. 544-546 - Samet Tonyali, Kemal Akkaya, Nico Saputro, A. Selcuk Uluagac, Mehrdad Nojoumian:
Privacy-preserving protocols for secure and reliable data aggregation in IoT-enabled Smart Metering systems. 547-557 - Darren Quick, Kim-Kwang Raymond Choo:
Digital forensic intelligence: Data subsets and Open Source Intelligence (DFINT+OSINT): A timely and cohesive mix. 558-567 - Mengmeng Ge, Jin B. Hong, Simon Yusuf Enoch, Dong Seong Kim:
Proactive defense mechanisms for the software-defined Internet of Things with non-patchable vulnerabilities. 568-582
- Farshad Firouzi, Amir M. Rahmani, Kunal Mankodiya, Mustafa Badaroglu, Geoff V. Merrett, P. Wong, Bahar J. Farahani:
Internet-of-Things and big data for smarter healthcare: From device to architecture, applications and analytics. 583-586 - Josué Pagán, Marina Zapater, José L. Ayala:
Power transmission and workload balancing policies in eHealth mobile cloud computing scenarios. 587-601 - Toni Adame, Albert Bel, Anna Carreras, Joan Melià-Seguí, Miquel Oliver, Rafael Pous:
CUIDATS: An RFID-WSN hybrid monitoring system for smart health care environments. 602-615 - Osamu Ammae, Joseph Korpela, Takuya Maekawa:
Unobtrusive detection of body movements during sleep using Wi-Fi received signal strength with model adaptation technique. 616-625 - Min Woo Woo, JongWhi Lee, KeeHyun Park:
A reliable IoT system for Personal Healthcare Devices. 626-640 - Amir M. Rahmani, Tuan Nguyen Gia, Behailu Negash, Arman Anzanpour, Iman Azimi, Mingzhe Jiang, Pasi Liljeberg:
Exploiting smart e-Health gateways at the edge of healthcare Internet-of-Things: A fog computing approach. 641-658 - Bahar J. Farahani, Farshad Firouzi, Victor I. Chang, Mustafa Badaroglu, Nicholas Constant, Kunal Mankodiya:
Towards fog-driven IoT eHealth: Promises and challenges of IoT in medicine and healthcare. 659-676
- Kim-Kwang Raymond Choo, Rongxing Lu, Liqun Chen, Xun Yi:
A foggy research future: Advances and future opportunities in fog computing research. 677-679 - Rodrigo Roman, Javier López, Masahiro Mambo:
Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges. 680-698 - Yuexin Zhang, Yang Xiang, Wei Wu, Abdulhameed Alelaiwi:
A variant of password authenticated key exchange protocol. 699-711 - Huaqun Wang, Zhiwei Wang, Josep Domingo-Ferrer:
Anonymous and secure aggregation scheme in fog-based public cloud computing. 712-719 - Yinhao Jiang, Willy Susilo, Yi Mu, Fuchun Guo:
Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing. 720-729 - Cong Zuo, Jun Shao, Guiyi Wei, Mande Xie, Min Ji:
CCA-secure ABE with outsourced decryption for fog computing. 730-738 - Dongyoung Koo, Junbeom Hur:
Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing. 739-752 - Peng Zhang, Zehong Chen, Joseph K. Liu, Kaitai Liang, Hongwei Liu:
An efficient access control scheme with outsourcing capability and attribute update for fog computing. 753-762 - Zuoxia Yu, Man Ho Au, Qiuliang Xu, Rupeng Yang, Jinguang Han:
Towards leakage-resilient fine-grained access control in fog computing. 763-777 - Zheli Liu, Tong Li, Ping Li, Chunfu Jia, Jin Li:
Verifiable searchable encryption with aggregate keys for data sharing system. 778-788 - Yannan Li, Yong Yu, Bo Yang, Geyong Min, Huai Wu:
Privacy preserving cloud data auditing with efficient key update. 789-798 - Rupeng Yang, Qiuliang Xu, Man Ho Au, Zuoxia Yu, Hao Wang, Lu Zhou:
Position based cryptography with location privacy: A step for Fog Computing. 799-806 - Catalin Gosman, Tudor Cornea, Ciprian Dobre, Florin Pop, Aniello Castiglione:
Controlling and filtering users data in Intelligent Transportation System. 807-816 - Jian Liu, Jiangtao Li, Lei Zhang, Feifei Dai, Yuanfei Zhang, Xinyu Meng, Jian Shen:
Secure intelligent traffic light control using fog computing. 817-824 - Ximeng Liu, Robert H. Deng, Yang Yang, Ngoc Hieu Tran, Shangping Zhong:
Hybrid privacy-preserving clinical decision support system in fog-cloud computing. 825-837 - Biplob R. Ray, Jemal H. Abawajy, Morshed U. Chowdhury, Abdulhameed Alelaiwi:
Universal and secure object ownership transfer protocol for the Internet of Things. 838-849 - Hui Huang, Xiaofeng Chen, Qianhong Wu, Xinyi Huang, Jian Shen:
Bitcoin-based fair payments for outsourcing computations of fog devices. 850-858 - Bo-Wei Chen, Seungmin Rho, Laurence T. Yang, Yu Gu:
Privacy-preserved big data analysis based on asymmetric imputation kernels and multiside similarities. 859-866
Volumes 78, Part 3, January 2018
- Bei Gong, Yu Zhang, Yubo Wang:
A remote attestation mechanism for the sensing layer nodes of the Internet of Things. 867-886 - Xiang Li, Xiaohong Jiang, Peter Garraghan, Zhaohui Wu:
Holistic energy and failure aware workload scheduling in Cloud datacenters. 887-900 - Waralak Chongdarakul, Peraphon Sophatsathit, Chidchanok Lursinsap:
Theoretical and heuristic aspects of heterogeneous system scheduling with constraints on client's multiple I/O ports. 901-919 - Xun Shao, Masahiro Jibiki, Yuuichi Teranishi, Nozomu Nishinaga:
An efficient load-balancing mechanism for heterogeneous range-queriable cloud storage. 920-930
- Jin Li, Qiben Yan, Victor I. Chang:
Internet of Things: Security and privacy in a connected world. 931-932 - Zhanwei Du, Yongjian Yang, Qing Cai, Chijun Zhang, Yuan Bai:
Modeling and inferring mobile phone users' negative emotion spreading in social networks. 933-942 - Pandi Vijayakumar, Victor I. Chang, L. Jegatha Deborah, Balamurugan Balusamy, P. G. Shynu:
Computationally efficient privacy preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks. 943-955 - Jian Shen, Shaohua Chang, Jun Shen, Qi Liu, Xingming Sun:
A lightweight multi-layer authentication protocol for wireless body area networks. 956-963 - Christos Stergiou, Kostas E. Psannis, Byung-Gyu Kim, Brij B. Gupta:
Secure integration of IoT and Cloud Computing. 964-975 - Hong Liu, Huansheng Ning, Yinliang Yue, Yueliang Wan, Laurence T. Yang:
Selective disclosure and yoking-proof based privacy-preserving authentication scheme for cloud assisted wearable devices. 976-986 - Wei Wang, Yuanyuan Li, Xing Wang, Jiqiang Liu, Xiangliang Zhang:
Detecting Android malicious apps and categorizing benign apps with ensemble of classifiers. 987-994 - Ying Wu, Muhua Liu, Rui Xue, Rui Zhang:
Attribute-based multi-function verifiable computation. 995-1004 - Ruhul Amin, Neeraj Kumar, G. P. Biswas, Rahat Iqbal, Victor I. Chang:
A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment. 1005-1019 - Yi Liu, Yinghui Zhang, Jie Ling, Zhusong Liu:
Secure and fine-grained access control on e-healthcare records in mobile cloud computing. 1020-1026 - Xianglin Wei, Tongxiang Wang, Chaogang Tang, Jianhua Fan:
Collaborative mobile jammer tracking in Multi-Hop Wireless Network. 1027-1039 - Ming Tao, Jinglong Zuo, Zhusong Liu, Aniello Castiglione, Francesco Palmieri:
Multi-layer cloud architectural model and ontology-based security service framework for IoT-based smart homes. 1040-1051
- Jakub T. Moscicki, Luca Mascetti:
Cloud storage services for file synchronization and sharing in science, education and research. 1052-1054 - Raúl Gracia Tinedo, Cristian Cotes, Edgar Zamora-Gómez, Genís Ortiz, Adrián Moreno-Martínez, Marc Sánchez Artigas, Pedro García López, Raquel Sánchez, Alberto Gómez, Anastasio Illana:
Giving wings to your data: A first experience of Personal Cloud interoperability. 1055-1070 - Danilo Piparo, Enric Tejedor, Pere Mato, Luca Mascetti, Jakub T. Moscicki, Massimo Lamanna:
SWAN: A service for interactive analysis in the cloud. 1071-1078 - Hassen Riahi, Alberto Aimar, Alejandro Álvarez-Ayllón, Justas Balcas, Diego Ciangottini, José M. Hernández, Oliver Keeble, Nicolò Magini, Andrea Manzi, Luca Mascetti, Marco Mascheroni, Andres Jorge Tanasijczuk, Eric Wayne Vaandering:
Integration of end-user Cloud storage for CMS analysis. 1079-1082 - Piotr Mrówczynski, Jakub T. Moscicki, Massimo Lamanna, Frederik Orellana:
Benchmarking and monitoring framework for interconnected file synchronization and sharing services. 1083-1090 - Zhipeng Tan, Li Du, Dan Feng, Wei Zhou:
EML: An I/O scheduling algorithm in large-scale-application environments. 1091-1100
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.