default search action
Future Generation Computer Systems, Volume 79
Volumes 79, Part 1, February 2018
- Zhendong Bei, Zhibin Yu, Ni Luo, Chuntao Jiang, Chengzhong Xu, Shengzhong Feng:
Configuring in-memory cluster computing using random forest. 1-15 - Chuan Zhang, Liehuang Zhu, Chang Xu, Rongxing Lu:
PPDP: An efficient and privacy-preserving disease prediction scheme in cloud-based e-Healthcare system. 16-25 - Baldomero Imbernón, Javier Prades, Domingo Giménez, José M. Cecilia, Federico Silla:
Enhancing large-scale docking simulation on heterogeneous systems: An MPI vs rCUDA study. 26-37 - Zhicheng Cai, Xiaoping Li, Rubén Ruiz, Qianmu Li:
Price forecasting for spot instances in Cloud computing. 38-53 - Ali Asghar Rahmanian, Mostafa Ghobaei-Arani, Sajjad Tofighy:
A learning automata-based ensemble resource usage prediction algorithm for cloud computing environment. 54-71 - Victor A. E. de Farias, Flávio R. C. Sousa, José Gilvan Rodrigues Maia, João Paulo Pordeus Gomes, Javam C. Machado:
Regression based performance modeling and provisioning for NoSQL cloud databases. 72-81 - XinDi Ma, Jianfeng Ma, Hui Li, Qi Jiang, Sheng Gao:
ARMOR: A trust-based privacy-preserving framework for decentralized friend recommendation in online social networks. 82-94 - Vishakha Singh, Indrajeet Gupta, Prasanta K. Jana:
A novel cost-efficient approach for deadline-constrained workflow scheduling by dynamic provisioning of resources. 95-110
- Alexander V. Boukhanovsky, Valeria V. Krzhizhanovskaya, Marian Bubak:
Urgent computing for decision support in critical situations. 111-113 - Siew Hoon Leong, Antonio Parodi, Dieter Kranzlmüller:
Reprint of "A robust reliable energy-aware urgent computing resource allocation for flash-flood ensemble forecasting on HPC infrastructures for decision support". 114-127 - Bartosz Balis, Robert Brzoza-Woch, Marian Bubak, Marek Kasztelnik, Bartosz Kwolek, Piotr Nawrocki, Piotr Nowakowski, Tomasz Szydlo, Krzysztof Zielinski:
Holistic approach to management of IT infrastructure for environmental monitoring and decision support systems with urgent computing capabilities. 128-143 - Sergey V. Kovalchuk, Evgeniy Krotov, Pavel A. Smirnov, Denis A. Nasonov, Alexey N. Yakovlev:
Distributed data-driven platform for urgent decision making in cardiological ambulance control. 144-154 - Vladislav A. Karbovskii, Daniil V. Voloshin, Andrey Karsakov, Alexey Bezgodov, Carlos Gershenson:
Multimodel agent-based simulation environment for mass-gatherings and pedestrian dynamics. 155-165
- Paola Grosso, Malathi Veeraraghavan, Brian Tierney, Cees de Laat:
Editorial INDIS special section FGCS. 166-168 - Sam Nickolay, Eun-Sung Jung, Rajkumar Kettimuthu, Ian T. Foster:
Bridging the gap between peak and average loads on science networks. 169-179 - Xiaoban Wu, Peilong Li, Yongyi Ran, Yan Luo:
Network measurement for 100 GbE network links using multicore processors. 180-189 - Nicholas Mills, F. Alex Feltus, Walter B. Ligon III:
Maximizing the performance of scientific data transfer by optimizing the interface between parallel file systems and advanced research networks. 190-198 - Liang Zhang, Wenji Wu, Phil DeMar, Eric Pouyoul:
mdtmFTP and its evaluation on ESNET SDN testbed. 199-204 - Mariam Kiran, Eric Pouyoul, Anu Mercian, Brian Tierney, Chin Guok, Inder Monga:
Enabling intent to configure scientific networks for high performance demands. 205-214 - Przemyslaw Lenkiewicz, P. Chris Broekema, Bernard Metzler:
Energy-efficient data transfers in radio astronomy with software UDP RDMA. 215-224 - Joaquin Chung, Eun-Sung Jung, Rajkumar Kettimuthu, Nageswara S. V. Rao, Ian T. Foster, Russ Clark, Henry L. Owen:
Advance reservation access control using software-defined networking and tokens. 225-234 - Ralph Koning, Nick Buraglio, Cees de Laat, Paola Grosso:
CoreFlow: Enriching Bro security events using network traffic monitoring data. 235-242
- Jiageng Chen, Chunhua Su, Kuo-Hui Yeh, Moti Yung:
Special Issue on Advanced Persistent Threat. 243-246 - Christian Javier D'Orazio, Kim-Kwang Raymond Choo:
Circumventing iOS security mechanisms for APT forensic investigations: A security taxonomy for cloud apps. 247-261 - Huaqun Wang, Debiao He, Yanfei Sun, Neeraj Kumar, Kim-Kwang Raymond Choo:
PAT: A precise reward scheme achieving anonymity and traceability for crowdcomputing in public clouds. 262-270 - Ayong Ye, Qiuling Chen, Li Xu, Wei Wu:
The flexible and privacy-preserving proximity detection in mobile social network. 271-283 - Yuexin Zhang, Yang Xiang, Tao Wang, Wei Wu, Jian Shen:
An over-the-air key establishment protocol using keyless cryptography. 284-294 - Xin Sun, Xishun Zhao, Livio Robaldo:
Norm-based deontic logic for access control, some computational results. 295-302 - Md. Enamul Kabir, Jiankun Hu, Hua Wang, Guangping Zhuo:
A novel statistical technique for intrusion detection systems. 303-318 - Shashank Gupta, Brij Bhooshan Gupta, Pooja Chaudhary:
Hunting for DOM-Based XSS vulnerabilities in mobile cloud-based online social network. 319-336 - Man Ho Au, Kaitai Liang, Joseph K. Liu, Rongxing Lu, Jianting Ning:
Privacy-preserving personal data operation on mobile cloud - Chances and challenges over advanced persistent threat. 337-349
- Xiaokang Zhou, Albert Y. Zomaya, Weimin Li, Ivan Ruchkin:
Cybermatics: Advanced Strategy and Technology for Cyber-Enabled Systems and Applications. 350-353 - Saurabh Kumar Garg, Jagannath Aryal, Hao Wang, Tejal Shah, Gabor Kecskemeti, Rajiv Ranjan:
Cloud computing based bushfire prediction for cyber-physical emergency applications. 354-363 - Somchart Fugkeaw, Hiroyuki Sato:
Scalable and secure access control policy update for outsourced big data. 364-373 - Qingyong Li, Zhiping Shi, Huayan Zhang, Yunqiang Tan, Shengwei Ren, Peng Dai, Weiyi Li:
A cyber-enabled visual inspection system for rail corrugation. 374-382 - Yijun Mo, Bixi Li, Bang Wang, Laurence T. Yang, Minghua Xu:
Event recommendation in social networks based on reverse random walk and participant scale control. 383-395 - Chong Chen, Dan Chen, Yingnan Yan, Gaofeng Zhang, Qingguo Zhou, Rui Zhou:
Integration of numerical model and cloud computing. 396-407 - Weimin Li, Shu Jiang, Qun Jin:
Overlap community detection using spectral algorithm based on node convergence degree. 408-416 - Xiaohong Li, Feng Liu, Zhiyong Feng, Guangquan Xu, Zhangjie Fu:
A novel optimized vertical handover framework for seamless networking integration in cyber-enabled systems. 417-430 - Ajay Kumara M. A., Jaidhar C. D.:
Automated multi-level malware detection system based on reconstructed semantic view of executables using machine learning techniques at VMM. 431-446 - Wei Dai, Yufeng Wang, Qun Jin, Jianhua Ma:
Geo-QTI: A quality aware truthful incentive mechanism for cyber-physical enabled Geographic crowdsensing. 447-459
Volumes 79, Part 2, February 2018
- Hui Cui, Robert H. Deng, Yingjiu Li:
Attribute-based cloud storage with secure provenance over encrypted data. 461-472 - Yi Zhou, Fazhi He, Neng Hou, Yimin Qiu:
Parallel ant colony optimization on multi-core SIMD CPUs. 473-487 - Mohannad J. Alhanahnah, Peter Bertók, Zahir Tari, Sahel Alouneh:
Context-Aware Multifaceted Trust Framework For Evaluating Trustworthiness of Cloud Providers. 488-499 - Nazmus S. Nafi, Khandakar Ahmed, Mark A. Gregory, Manoj Datta:
Software defined neighborhood area network for smart grid applications. 500-513 - Han Yu, Hongming Cai, Jun Zhou, Lihong Jiang:
Data service generation framework from heterogeneous printed forms using semantic link discovery. 514-527 - Huixi Li, Wenjun Li, Qilong Feng, Shigeng Zhang, Haodong Wang, Jianxin Wang:
Leveraging content similarity among VMI files to allocate virtual machines in cloud. 528-542 - Souhila Mammeri, Mohand Yazid, Louiza Bouallouche-Medjkoune, Asma Mazouz:
Performance study and enhancement of multichannel access methods in the future generation VHT WLAN. 543-557 - Dimitrios Papamartzivanos, Félix Gómez Mármol, Georgios Kambourakis:
Dendron : Genetic trees driven rule induction for network intrusion detection systems. 558-574 - Mohamed Elshenawy, Baher Abdulhai, Mohamed El-Darieby:
Towards a service-oriented cyber-physical systems of systems for smart city mobility applications. 575-587 - Ben-Jye Chang, Yu-Wei Lee, Ying-Hsin Liang:
Reward-based Markov chain analysis adaptive global resource management for inter-cloud computing. 588-603 - Anna V. Kalyuzhnaya, Denis A. Nasonov, Sergey V. Ivanov, Sergey S. Kosukhin, Alexander V. Boukhanovsky:
Towards a scenario-based solution for extreme metocean event simulation applying urgent computing. 604-617 - Anton Spivak, Andrew Razumovskiy, Denis A. Nasonov, Alexander Boukhanovsky, Anton Radice:
Storage tier-aware replicative data reorganization with prioritization for efficient workload processing. 618-629 - Alexander A. Visheratin, Mikhail Melnik, Denis A. Nasonov, Nikolay Butakov, Alexander V. Boukhanovsky:
Hybrid scheduling algorithm in early warning systems. 630-642
- Aleksander Byrski, Katarzyna Rycerz, John Hughes, Kevin Hammond:
Special section on functional paradigm for high performance computing. 643-644 - Wojciech Turek:
Erlang-based desynchronized urban traffic simulation for high-performance computing systems. 645-652 - David Castro, Kevin Hammond, Susmit Sarkar, Yasir Alguwaifli:
Automatically deriving cost models for structured parallel processes using hylomorphisms. 653-668 - Adam D. Barwell, Christopher Brown, Kevin Hammond:
Finding parallel functional pearls: Automatic parallel recursion scheme detection in Haskell functions via anti-unification. 669-686 - Tamás Kozsik, Melinda Tóth, István Bozó:
Free the Conqueror! Refactoring divide-and-conquer functions. 687-699
- George A. Gravvanis, John P. Morrison, Dana Petcu, Theo Lynn, Christos K. Filelis-Papadopoulos:
Special Issue: Recent trends in cloud computing. 700-702 - Christos K. Filelis-Papadopoulos, George A. Gravvanis, Panagiotis E. Kyziropoulos:
A framework for simulating large scale cloud infrastructures. 703-714 - Antonios T. Makaratzis, Konstantinos M. Giannoutakis, Dimitrios Tzovaras:
Energy modeling in cloud simulation frameworks. 715-725 - Reginaldo Ré, Rômulo Manciola Meloca, Douglas Nassif Roma Junior, Marcelo Alexandre da Cruz Ismael, Gabriel Costa Silva:
An empirical study for evaluating the performance of multi-cloud APIs. 726-738 - Maria Alejandra Rodriguez, Rajkumar Buyya:
Scheduling dynamic workloads in multi-tenant scientific workflow as a service platforms. 739-750 - Takfarinas Saber, James Thorburn, Liam Murphy, Anthony Ventresque:
VM reassignment in hybrid clouds for large decentralised companies: A multi-objective challenge. 751-764 - Adel Nadjaran Toosi, Richard O. Sinnott, Rajkumar Buyya:
Resource provisioning for data-intensive applications with deadline constraints on hybrid clouds using Aneka. 765-775
Volumes 79, Part 3, February 2018
- Xavier Masip-Bruin, Eva Marín-Tordera, Admela Jukan, Guang-Jie Ren:
Managing resources continuity from the edge to the cloud: Architecture and performance. 777-785 - Guillermo Oyarzun, Ricard Borrell, Andrey V. Gorobets, Filippo Mantovani, Assensi Oliva:
Efficient CFD code implementation for the ARM-based Mont-Blanc architecture. 786-796 - Bo Zhang, Qian Zhang, Zhenhua Huang, Meizi Li, Luqun Li:
A multi-criteria detection scheme of collusive fraud organization for reputation aggregation in social networks. 797-814 - Sarogini Grace Pease, Russell Trueman, Callum Davies, Jude Grosberg, Kai Hin Yau, Navjot Kaur, Paul P. Conway, Andrew A. West:
An intelligent real-time cyber-physical toolset for energy and process prediction and optimisation in the future industrial Internet of Things. 815-829 - Fabio López-Pires, Benjamín Barán, Leonardo Benítez, Saúl Zalimben, Augusto Amarilla:
Virtual machine placement for elastic infrastructures in overbooked cloud computing datacenters under uncertainty. 830-848 - Blesson Varghese, Rajkumar Buyya:
Next generation cloud computing: New trends and research directions. 849-861 - Gabriele Mencagli, Massimo Torquati, Marco Danelutto:
Elastic-PPQ: A two-level autonomic system for spatial preference query processing over dynamic data streams. 862-877 - K. Kanagaraj, S. Swamynathan:
Structure aware resource estimation for effective scheduling and execution of data intensive workflows in cloud. 878-891 - Shapna Muralidharan, Abhishek Roy, Navrati Saxena:
MDP-IoT: MDP based interest forwarding for heterogeneous traffic in IoT-NDN environment. 892-908 - Muhammad Farhan, Sohail Jabbar, Muhammad Aslam, Mohammad Hammoudeh, Mudassar Ahmad, Shehzad Khalid, Murad Khan, Kijun Han:
IoT-based students interaction framework using attention-scoring assessment in eLearning. 909-919 - Junbao Zhang, Haojun Huang, Yan Luo, Yinting Fan, Guan Yang:
Immunization-based redundancy elimination in Mobile Opportunistic Networks-Generated big data. 920-927 - Raheleh Khanduzi, M. Reza Peyghami, Arun Kumar Sangaiah:
Data envelopment analysis and interdiction median problem with fortification for enabling IoT technologies to relieve potential attacks. 928-940 - Syed Hassan Ahmed, Shalli Rani:
A hybrid approach, Smart Street use case and future aspects for Internet of Things in smart cities. 941-951 - U. Rajendra Acharya, Hamido Fujita, Shu Lih Oh, U. Raghavendra, Jen Hong Tan, Muhammad Adam, Arkadiusz Gertych, Yuki Hagiwara:
Automated identification of shockable and non-shockable life-threatening ventricular arrhythmias using convolutional neural network. 952-959 - Zhe Lin:
Modelling and forecasting the stock market volatility of SSE Composite Index using GARCH models. 960-972 - Victor I. Chang, Dickson K. W. Chiu, Muthu Ramachandran, Chung-Sheng Li:
Internet of Things, Big Data and Complex Information Systems: Challenges, solutions and outputs from IoTBD 2016, COMPLEXIS 2016 and CLOSER 2016 selected papers and CLOSER 2015 keynote. 973-974
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.