default search action
IEEE Transactions on Services Computing, Volume 13
Volume 13, Number 1, January - February 2020
- James Joshi:
Editorial. 1-2 - Shridhar G. Domanal, Ram Mohana Reddy Guddeti, Rajkumar Buyya:
A Hybrid Bio-Inspired Algorithm for Scheduling and Resource Management in Cloud Environment. 3-15 - Francesco Buccafurri, Gianluca Lax, Serena Nicolazzo, Antonino Nocera:
A Privacy-Preserving Localization Service for Assisted Living Facilities. 16-29 - Marco Anisetti, Claudio Agostino Ardagna, Ernesto Damiani, Filippo Gaudenzi:
A Semi-Automatic and Trustworthy Scheme for Continuous Cloud Service Certification. 30-43 - Antonio Pecchia, Stefano Russo, Santonu Sarkar:
Assessing Invariant Mining Techniques for Cloud-Based Utility Computing Systems. 44-58 - Ali Reza Zamani, Mengsong Zou, Javier Diaz Montes, Ioan Petri, Omer F. Rana, Ashiq Anjum, Manish Parashar:
Deadline Constrained Video Analysis via In-Transit Computational Environments. 59-72 - Bing Bai, Yushun Fan, Wei Tan, Jia Zhang:
DLTSR: A Deep Learning Framework for Recommendations of Long-Tail Web Services. 73-85 - Valeria Cardellini, Valerio Di Valerio, Francesco Lo Presti:
Game-Theoretic Resource Pricing and Provisioning Strategies in Cloud Systems. 86-98 - Buqing Cao, Xiaoqing Frank Liu, Md Mahfuzer Rahman, Bing Li, Jianxun Liu, Mingdong Tang:
Integrated Content and Network-Based Service Clustering and Web APIs Recommendation for Mashup Development. 99-113 - Omar Abdel Wahab, Jamal Bentahar, Hadi Otrok, Azzam Mourad:
Optimal Load Distribution for the Detection of VM-Based DDoS Attacks in the Cloud. 114-129 - Long Chen, Xiaoping Li, Rubén Ruiz:
Resource Renting for Periodical Cloud Workflow Applications. 130-143 - Keman Huang, Jia Zhang, Wei Tan, Zhiyong Feng:
Shifting to Mobile: Network-Based Empirical Study of Mobile Vulnerability Market. 144-157 - Jianan Hong, Kaiping Xue, Yingjie Xue, Weikeng Chen, David S. L. Wei, Nenghai Yu, Peilin Hong:
TAFC: Time and Attribute Factors Combined Access Control for Time-Sensitive Data in Public Cloud. 158-171 - Chuan Pham, Nguyen Hoang Tran, Shaolei Ren, Walid Saad, Choong Seon Hong:
Traffic-Aware and Energy-Efficient vNF Placement for Service Chaining: Joint Sampling and Matching Approach. 172-185 - Nguyen Trung Hieu, Mario Di Francesco, Antti Ylä-Jääski:
Virtual Machine Consolidation with Multiple Usage Prediction for Energy-Efficient Cloud Data Centers. 186-199
Volume 13, Number 2, March - April 2020
- Zibin Zheng, Andreas Kind, Peter Chen:
Guest Editorial: Special Issue on Blockchain-Based Services Computing. 200-202 - Chao Qiu, Haipeng Yao, F. Richard Yu, Chunxiao Jiang, Song Guo:
A Service-Oriented Permissioned Blockchain for the Internet of Things. 203-215 - Yuan Zhang, Chunxiang Xu, Nan Cheng, Hongwei Li, Haomiao Yang, Xuemin Shen:
Chronos$^{{\mathbf +}}$+: An Accurate Blockchain-Based Time-Stamping Scheme for Cloud Storage. 216-229 - Yi Mu, Fatemeh Rezaeibagha, Ke Huang:
Policy-Driven Blockchain and Its Applications for Transport Systems. 230-240 - Zhihua Cui, Fei Xue, Shiqiang Zhang, Xingjuan Cai, Yang Cao, Wensheng Zhang, Jinjun Chen:
A Hybrid BlockChain-Based Identity Authentication Scheme for Multi-WSN. 241-251 - Kai Lei, Maoyu Du, Jiyue Huang, Tong Jin:
Groupchain: Towards a Scalable Public Blockchain in Fog Computing of IoT Services Computing. 252-262 - Muneeb Ul Hassan, Mubashir Husain Rehmani, Jinjun Chen:
DEAL: Differentially Private Auction for Blockchain-Based Microgrids Energy Trading. 263-275 - Mona Taghavi, Jamal Bentahar, Hadi Otrok, Kaveh Bakhtiyari:
A Blockchain-Based Model for Cloud Service Quality Monitoring. 276-288 - Yang Xu, Ju Ren, Yan Zhang, Cheng Zhang, Bo Shen, Yaoxue Zhang:
Blockchain Empowered Arbitrable Data Auditing Scheme for Network Storage as a Service. 289-300 - Bobo Huang, Li Jin, ZhiHui Lu, Xin Zhou, Jie Wu, Qifeng Tang, Patrick C. K. Hung:
BoR: Toward High-Performance Permissioned Blockchain in RDMA-Enabled Network. 301-313 - Xinming Wang, Jiahao He, Zhijian Xie, Gansen Zhao, Shing-Chi Cheung:
ContractGuard: Defend Ethereum Smart Contracts with Embedded Intrusion Detection. 314-328 - WonDeuk Yoon, Janggwan Im, Tindal Choi, Daeyoung Kim:
Blockchain-Based Object Name Service With Tokenized Authority. 329-342 - Xuanzhe Liu, Sam X. Sun, Gang Huang:
Decentralized Services Computing Paradigm for Blockchain-Based Data Governance: Programmability, Interoperability, and Intelligence. 343-355 - Zehui Xiong, Jiawen Kang, Dusit Niyato, Ping Wang, H. Vincent Poor:
Cloud/Edge Computing Service Management in Blockchain Networks: Multi-Leader Multi-Follower Game-Based ADMM for Pricing. 356-367 - Long Cheng, Boudewijn F. van Dongen, Wil M. P. van der Aalst:
Scalable Discovery of Hybrid Process Models in a Cloud Computing Environment. 368-380 - Dian Shen, Junzhou Luo, Fang Dong, Jiahui Jin, Junxue Zhang, Jun Shen:
Facilitating Application-Aware Bandwidth Allocation in the Cloud with One-Step-Ahead Traffic Information. 381-394
Volume 13, Number 3, May - June 2020
- Boyang Yu, Jianping Pan:
A Framework of Hypergraph-Based Data Placement Among Geo-Distributed Datacenters. 395-409 - Jinghua Jiang, Yifeng Zheng, Zhenkui Shi, Xingliang Yuan, Xiaolin Gui, Cong Wang:
A Practical System for Privacy-Aware Targeted Mobile Advertising Services. 410-424 - Jialei Liu, Shangguang Wang, Ao Zhou, Rajkumar Buyya, Fangchun Yang:
Availability-Aware Virtual Cluster Allocation in Bandwidth-Constrained Datacenters. 425-436 - Jiann-Min Ho, Pi-Cheng Hsiu, Ming-Syan Chen:
Deadline Flow Scheduling in Datacenters with Time-Varying Bandwidth Allocations. 437-450 - Lu Rao, Hua Zhang, Tengfei Tu:
Dynamic Outsourced Auditing Services for Cloud Storage Based on Batch-Leaves-Authenticated Merkle Hash Tree. 451-463 - Yang Yang, Ximeng Liu, Robert H. Deng, Jian Weng:
Flexible Wildcard Searchable Encryption System. 464-477 - Jiguo Li, Yao Wang, Yichen Zhang, Jinguang Han:
Full Verifiability for Outsourced Decryption in Attribute Based Encryption. 478-487 - Neng Zhang, Jian Wang, Yutao Ma:
Mining Domain Knowledge on Service Goals from Textual Service Descriptions. 488-502 - Ahmed Abdel Moamen, Nadeem Jamali:
Opportunistic Sharing of Continuous Mobile Sensing Data for Energy and Power Conservation. 503-514 - Luca Pino, George Spanoudakis, Maria Krotsiani, Khaled Mahbub:
Pattern-Based Design and Verification of Secure Service Compositions. 515-528 - Soumi Chattopadhyay, Ansuman Banerjee:
QoS Constrained Large Scale Web Service Composition Using Abstraction Refinement. 529-544 - Ayantika Chatterjee, Indranil Sengupta:
Sorting of Fully Homomorphic Encrypted Cloud Data: Can Partitioning be Effective? 545-558 - Jingtao Ding, Yong Li, Pengyu Zhang, Depeng Jin:
Time Dependent Pricing for Large-Scale Mobile Networks of Urban Environment: Feasibility and Adaptability. 559-571 - Huaqun Wang, Debiao He, Jinguang Han:
VOD-ADAC: Anonymous Distributed Fine-Grained Access Control Protocol with Verifiable Outsourced Decryption in Public Cloud. 572-583 - Robertus Nugroho, Jian Yang, Weiliang Zhao, Cécile Paris, Surya Nepal:
What and With Whom? Identifying Topics in Twitter Through Both Interactions and Text. 584-596
Volume 13, Number 4, July - August 2020
- Rajiv Ranjan, Ching-Hsien Hsu, Lydia Y. Chen, Dimitrios Georgakopoulos:
Holistic Technologies for Managing Internet of Things Services. 597-601 - Yanyu Huang, Bo Li, Zheli Liu, Jin Li, Siu-Ming Yiu, Thar Baker, Brij B. Gupta:
ThinORAM: Towards Practical Oblivious Data Access in Fog Computing Environment. 602-612 - Anish Jindal, Gagangeet Singh Aujla, Neeraj Kumar, Massimo Villari:
GUARDIAN: Blockchain-Based Secure Demand Response Management in Smart Grid System. 613-624 - Abbas Yazdinejad, Reza M. Parizi, Ali Dehghantanha, Qi Zhang, Kim-Kwang Raymond Choo:
An Energy-Efficient SDN Controller Architecture for IoT Networks With Blockchain-Based Security. 625-638 - Mahmoud Barhamgi, Charith Perera, Chia-Mu Yu, Djamal Benslimane, David Camacho, Christine Bonnet:
Privacy in Data Service Composition. 639-652 - Lin Mu, Enjin Zhao, Yuewei Wang, Albert Y. Zomaya:
Buoy Sensor Cyberattack Detection in Offshore Petroleum Cyber-Physical Systems. 653-662 - Ivan Lujic, Vincenzo De Maio, Ivona Brandic:
Resilient Edge Data Management Framework. 663-674 - Puming Wang, Laurence T. Yang, Jintao Li, Xue Li, Xiaokang Zhou:
MMDP: A Mobile-IoT Based Multi-Modal Reinforcement Learning Service Framework. 675-684 - Zhihua Cui, Xianghua Xu, Fei Xue, Xingjuan Cai, Yang Cao, Wensheng Zhang, Jinjun Chen:
Personalized Recommendation System Based on Collaborative Filtering for IoT Scenarios. 685-695 - Hengjin Ke, Dan Chen, Benyun Shi, Jindong Zhang, Xianzeng Liu, Xinhua Zhang, Xiaoli Li:
Improving Brain E-Health Services via High-Performance EEG Classification With Grouping Bayesian Optimization. 696-708 - Sudheer Kumar Battula, Saurabh Garg, James Montgomery, Byeong Kang:
An Efficient Resource Monitoring Service for Fog Computing Environments. 709-722 - Shiheng Ma, Song Guo, Kun Wang, Weijia Jia, Minyi Guo:
A Cyclic Game for Service-Oriented Resource Allocation in Edge Computing. 723-734 - Ao Zhou, Shangguang Wang, Xiao Ma, Stephen S. Yau:
Towards Service Composition Aware Virtual Machine Migration Approach in the Cloud. 735-744 - Junlong Zhou, Jin Sun, Peijin Cong, Zhe Liu, Xiumin Zhou, Tongquan Wei, Shiyan Hu:
Security-Critical Energy-Aware Task Scheduling for Heterogeneous Real-Time MPSoCs in IoT. 745-758 - Qianqian Duan, Daniel Sun, Guoqiang Li, Genke Yang, Weiwu Yan:
IoT-Enabled Service for Crude-Oil Production Systems Against Unpredictable Disturbance. 759-768
Volume 13, Number 5, September - October 2020
- Rebeca Estrada, Rabeb Mizouni, Hadi Otrok, Anis Ouali, Jamal Bentahar:
A Crowd-Sensing Framework for Allocation of Time-Constrained and Location-Based Tasks. 769-785 - Lifang Ren, Wenjian Wang, Hang Xu:
A Reinforcement Learning Method for Constraint-Satisfied Services Composition. 786-800 - Jin He, Kaoru Ota, Mianxiong Dong, Laurence T. Yang, Mingyu Fan, Guangwei Wang, Stephen S. Yau:
Customized Network Security for Cloud Service. 801-814 - Song Wu, Like Zhou, Xingjun Wang, Fei Chen, Hai Jin:
Doris: An Adaptive Soft Real-Time Scheduler in Virtualized Environments. 815-828 - Endong Tong, Lan Chen, Huizi Li:
Energy-Aware Service Selection and Adaptation in Wireless Sensor Networks with QoS Guarantee. 829-842 - Joel Vallone, Robert Birke, Lydia Y. Chen:
Making Neighbors Quiet: An Approach to Detect Virtual Resource Contention. 843-856 - Marzieh Malekimajd, Ali Movaghar:
Minimizing Data Access Latencies for Virtual Machine Assignment in Cloud Systems. 857-870 - Guoqi Xie, Gang Zeng, Yuekun Chen, Yang Bai, Zhili Zhou, Renfa Li, Keqin Li:
Minimizing Redundancy to Satisfy Reliability Requirement for a Parallel Application on Heterogeneous Service-Oriented Systems. 871-886 - Hong Xie, John C. S. Lui:
Mining Deficiencies of Online Reputation Systems: Methodologies, Experiments and Implications. 887-900 - Andreas Weiß, Vasilios Andrikopoulos, Michael Hahn, Dimka Karastoyanova:
Model-as-You-Go for Choreographies: Rewinding and Repeating Scientific Choreographies. 901-914 - Yuanyi Chen, Jingyu Zhang, Liting Xu, Minyi Guo, Jiannong Cao:
Modeling Latent Relation to Boost Things Categorization Service. 915-929 - Weiwei Wu, Jianping Wang, Kejie Lu, Wen Qi, Feng Shan, Junzhou Luo:
Providing Service Continuity in Clouds Under Power Outage. 930-943 - Hengjing He, Wei Zhao, Songling Huang, Geoffrey C. Fox, Qing Wang:
Research on the Architecture and its Implementation for Instrumentation and Measurement Cloud. 944-957 - Xu Zhang, Hao Yin, Dapeng Oliver Wu, Haojun Huang, Geyong Min, Ying Zhang:
SSL: A Surrogate-Based Method for Large-Scale Statistical Latency Measurement. 958-968
Volume 13, Number 6, November - December 2020
- Fang Dong, Junzhou Luo, Jiahui Jin, Jiyuan Shi, Ye Yang, Jun Shen:
Accelerating Skycube Computation with Partial and Parallel Processing for Service Selection. 969-984 - Yinbin Miao, Jianfeng Ma, Ximeng Liu, Xinghua Li, Qi Jiang, Junwei Zhang:
Attribute-Based Keyword Search over Hierarchical Data in Cloud Computing. 985-998 - Wenxin Wang, Yujie Liu, Jiaqiang Liu, Yong Li, Haoyu Song, Yue Wang, Jian Yuan:
Consistent State Updates for Virtualized Network Function Migration. 999-1006 - Han Hu, Yonggang Wen, Lei Yin, Ling Qiu, Dusit Niyato:
Coordinating Workload Scheduling of Geo-Distributed Data Centers and Electricity Generation of Smart Grid. 1007-1020 - Youngjoo Shin, Dongyoung Koo, Joobeom Yun, Junbeom Hur:
Decentralized Server-Aided Encryption for Secure Deduplication in Cloud Storage. 1021-1033 - Cheng Guo, Xue Chen, Yingmo Jie, Zhangjie Fu, Mingchu Li, Bin Feng:
Dynamic Multi-Phrase Ranked Search over Encrypted Data with Symmetric Searchable Encryption. 1034-1044 - Yanchun Wang, Qiang He, Xuyun Zhang, Dayong Ye, Yun Yang:
Efficient QoS-Aware Service Recommendation for Multi-Tenant Service-Based Systems in Cloud. 1045-1058 - Wei Zhang, Yonggang Wen, Loi Lei Lai, Fang Liu, Rui Fan:
Electricity Cost Minimization for Interruptible Workload in Datacenter Servers. 1059-1071 - Jing Chen, Kun He, Lan Deng, Quan Yuan, Ruiying Du, Yang Xiang, Jie Wu:
EliMFS: Achieving Efficient, Leakage-Resilient, and Multi-Keyword Fuzzy Search on Encrypted Cloud Data. 1072-1085 - Nan Wang, Blesson Varghese, Michail Matthaiou, Dimitrios S. Nikolopoulos:
ENORM: A Framework For Edge NOde Resource Management. 1086-1099 - Yuanyi Chen, Jingyu Zhang, Minyi Guo, Jiannong Cao:
Learning User Preference from Heterogeneous Information for Store-Type Recommendation. 1100-1114 - Guoshuai Zhao, Tianlei Liu, Xueming Qian, Tao Hou, Huan Wang, Xingsong Hou, Zhetao Li:
Location Recommendation for Enterprises by Multi-Source Urban Big Data Analysis. 1115-1127 - Junjie Xie, Deke Guo, Xiaomin Zhu, Bangbang Ren, Honghui Chen:
Minimal Fault-Tolerant Coverage of Controllers in IaaS Datacenters. 1128-1141 - Haijiang Wang, Xiaolei Dong, Zhenfu Cao:
Multi-Value-Independent Ciphertext-Policy Attribute Based Encryption with Fast Keyword Search. 1142-1151 - Shunrong Jiang, Tao Jiang, Liangmin Wang:
Secure and Efficient Cloud Data Deduplication with Ownership Management. 1152-1165 - Alireza Toroghi Haghighat, Mehdi Shajari:
Service Integrity Assurance for Distributed Computation Outsourcing. 1166-1179 - Junqiang Ge, Ye Tian, Lei Liu, Rongheng Lan, Xinming Zhang:
Understanding E-Commerce Systems under Massive Flash Crowd: Measurement, Analysis, and Implications. 1180-1193
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.