default search action
Future Generation Computer Systems, Volume 93
Volume 93, April 2019
- Osama M. Hussain Rehman, Mohamed Ould-Khaoua:
A hybrid relay node selection scheme for message dissemination in VANETs. 1-17 - Roberto Saia, Salvatore Carta:
Evaluating the benefits of using proactive transformed-domain-based techniques in fraud detection tasks. 18-32 - Ruiguo Yu, Jie Gao, Mei Yu, Wenhuan Lu, Tianyi Xu, Mankun Zhao, Jie Zhang, Ruixuan Zhang, Zhuo Zhang:
LSTM-EFG for wind power forecasting based on sequential correlation features. 33-42 - Abdullah Mohammed Al-Faifi, Biao Song, Mohammad Mehedi Hassan, Atif Alamri, Abdu Gumaei:
A hybrid multi criteria decision method for cloud service selection from Smart data. 43-57 - Yubiao Pan, Yongkun Li, Huizhen Zhang, Yinlong Xu:
Lifetime-aware FTL to improve the lifetime and performance of solid-state drives. 58-67 - Fanyu Bu, Xin Wang, Bo Gao:
A multi-projection deep computation model for smart data in Internet of Things. 68-76 - Mohammed K. Hassan, Ali I. El-Desouky, Sally M. El-Ghamrawy, Amany M. Sarhan:
A Hybrid Real-time remote monitoring framework with NB-WOA algorithm for patients with chronic diseases. 77-95 - Anurag Nishad, Abhay Upadhyay, Ram Bilas Pachori, U. Rajendra Acharya:
Automated classification of hand movements using tunable-Q wavelet transform based filter-bank with surface electromyogram signals. 96-110 - Tim van der Lee, Antonio Liotta, Georgios Exarchakos:
Interference graphs to monitor and control schedules in low-power WPAN. 111-120 - Stevan Milovanovic, Zorica Bogdanovic, Aleksandra Labus, Dusan Barac, Marijana Despotovic-Zrakic:
An approach to identify user preferences based on social network analysis. 121-129 - Yongxuan Lai, Hailin Lin, Fan Yang, Tian Wang:
Efficient data request answering in vehicular Ad-hoc networks based on fog nodes and filters. 130-142 - Felipe Rabuske Costa, Rodrigo da Rosa Righi, Cristiano André da Costa, Cristiano Bonato Both:
Nuoxus: A proactive caching model to manage multimedia content distribution on fog radio access networks. 143-155 - Firat Karatas, Ibrahim Korpeoglu:
Fog-Based Data Distribution Service (F-DAD) for Internet of Things (IoT) applications. 156-169 - Zhichao Wu, Han Wang, Arunkumar N.:
Bayesian analysis model for the use of anesthetic analgesic drugs in cancer patients based on geometry reconstruction. 170-175 - Djillali Boukhelef, Jalil Boukhobza, Kamel Boukhalfa, Hamza Ouarnoughi, Laurent Lemarchand:
Optimizing the cost of DBaaS object placement in hybrid storage systems. 176-187 - Qiao Xiang, Xin Tony Wang, J. Jensen Zhang, Harvey B. Newman, Yang Richard Yang, Y. Jace Liu:
Unicorn: Unified resource orchestration for multi-domain, geo-distributed data analytics. 188-197 - Tuan Nguyen Gia, Imed Ben Dhaou, Mai Ali, Amir M. Rahmani, Tomi Westerlund, Pasi Liljeberg, Hannu Tenhunen:
Energy efficient fog-assisted IoT system for monitoring diabetic patients with cardiovascular disease. 198-211 - Maria Carla Calzarossa, Marco L. Della Vedova, Daniele Tessera:
A methodological framework for cloud resource provisioning and scheduling of data parallel applications under uncertainty. 212-223 - Darpan Triboan, Liming Chen, Feng Chen, Zumin Wang:
A semantics-based approach to sensor data segmentation in real-time Activity Recognition. 224-236 - A. S. M. Kayes, Wenny Rahayu, Tharam S. Dillon, Elizabeth Chang, Jun Han:
Context-aware access control with imprecise context characterization for cloud-based data resources. 237-255 - K. Venkatesh, L. N. B. Srinivas, M. B. Mukesh Krishnan, A. Shanthini:
QoS improvisation of delay sensitive communication using SDN based multipath routing for medical applications. 256-265 - Cheng-Chi Lee, Shun-der Chen, Chun-Ta Li, Chung-Lun Cheng, Yan-Ming Lai:
Security enhancement on an RFID ownership transfer protocol based on cloud. 266-277 - Xiumin Zhou, Gongxuan Zhang, Jin Sun, Junlong Zhou, Tongquan Wei, Shiyan Hu:
Minimizing cost and makespan for workflow scheduling in cloud using fuzzy dominance sort based HEFT. 278-289 - Diogo Nolasco, Jonice Oliveira:
Subevents detection through topic modeling in social media posts. 290-303 - Xiao Ma, Jiangfeng Zeng, Limei Peng, Giancarlo Fortino, Yin Zhang:
Modeling multi-aspects within one opinionated sentence simultaneously for aspect-level sentiment analysis. 304-311 - Tao Peng, Qin Liu, Guojun Wang, Yang Xiang, Shuhong Chen:
Multidimensional privacy preservation in location-based services. 312-326 - Lin Zhong, Qianhong Wu, Jan Xie, Jin Li, Bo Qin:
A secure versatile light payment system based on blockchain. 327-337 - Anitha Ponraj:
Optimistic virtual machine placement in cloud data centers using queuing approach. 338-344 - Lukasz Makowski, Paola Grosso:
Evaluation of virtualization and traffic filtering methods for container networks. 345-357 - Kostas Kolomvatsos, Christos Anagnostopoulos:
Multi-criteria optimal task allocation at the edge. 358-372 - Simeon Veloudis, Iraklis Paraskakis, Christos Petsos, Giannis Verginadis, Ioannis Patiniotakis, Panagiotis Gouvas, Gregoris Mentzas:
Achieving security-by-design through ontology-driven attribute-based access control in cloud environments. 373-391 - Adriano Lino, Álvaro Rocha, Luís Macedo, Amanda Sizo:
Application of clustering-based decision tree approach in SQL query error database. 392-406 - Saleh Shah, Babar Shah, Adnan Amin, Feras N. Al-Obeidat, Francis Chow, Fernando Moreira, Sajid Anwar:
Compromised user credentials detection in a digital enterprise using behavioral analytics. 407-417 - James Zhang, Robert W. Gardner, Ilija Vukotic:
Anomaly detection in wide area network meshes using two machine learning algorithms. 418-426 - Arthur M. Del Esposte, Eduardo Felipe Zambom Santana, Lucas Kanashiro, Fábio M. Costa, Kelly Rosa Braghetto, Nelson Lago, Fabio Kon:
Design and evaluation of a scalable smart city software platform with large-scale simulations. 427-441 - Mohammad Aldossary, Karim Djemame, Ibrahim Alzamil, Alexandros Kostopoulos, Antonis Dimakis, Eleni Agiatzidou:
Energy-aware cost prediction and pricing of virtual machines in cloud computing environments. 442-459 - Fanhui Kong, Jian Li, Bin Jiang, Houbing Song:
Short-term traffic flow prediction in smart multimedia system for Internet of Vehicles based on deep belief network. 460-472 - Eduardo Viegas, Altair Olivo Santin, Alysson Bessani, Nuno Neves:
BigFlow: Real-time and reliable anomaly-based intrusion detection for high-speed networks. 473-485 - Arun Das, Paul Rad, Kim-Kwang Raymond Choo, Babak Nouhi, Jonathan Lish, James Martel:
Distributed machine learning cloud teleophthalmology IoT for predicting AMD disease progression. 486-498 - Yi Xu, Lei Peng, Guangyao Li:
Multi modal registration of structural features and mutual information of medical image. 499-505 - Xiaogang Zhao, Zenggang Xiong, Ling Ding, Xuemin Zhang, Fang Xu:
A smart coordinated temperature feedback controller for energy-efficient data centers. 506-514 - Luca Greco, Pierluigi Ritrovato, Fatos Xhafa:
An edge-stream computing infrastructure for real-time analysis of wearable sensors data. 515-528 - Muhammad Zakarya, Lee Gillam:
Managing energy, performance and cost in large scale heterogeneous datacenters using migrations. 529-547 - Lu Zhou, Chunhua Su, Zhen Li, Zhe Liu, Gerhard P. Hancke:
Automatic fine-grained access control in SCADA by machine learning. 548-559 - Fehmi Burcin Özsoydan, Adil Baykasoglu:
A swarm intelligence-based algorithm for the set-union knapsack problem. 560-569 - Lin Cai, Yong Qi, Wei Wei, Jinsong Wu, Jingwei Li:
mrMoulder: A recommendation-based adaptive parameter tuning approach for big data processing platform. 570-582 - Songtao Ding, Shiru Qu, Yuling Xi, Shaohua Wan:
A long video caption generation algorithm for big video data retrieval. 583-595 - Sven Plaga, Norbert Wiedermann, Simon Duque Antón, Stefan Tatschner, Hans D. Schotten, Thomas Newe:
Securing future decentralised industrial IoT infrastructures: Challenges and free open source solutions. 596-608 - Roshan Lal Neupane, Travis Neely, Prasad Calyam, Nishant Chettri, Mark Vassell, Ramakrishnan Durairajan:
Intelligent defense using pretense against targeted attacks in cloud platforms. 609-626 - Xiaolong Xu, Nan Hu, Tao Li, Marcello Trovati, Francesco Palmieri, Georgios Kontonatsios, Aniello Castiglione:
Distributed temporal link prediction algorithm based on label propagation. 627-636 - Ding Ding, Mauro Conti, Renato Figueiredo:
SAND: Social-aware, network-failure resilient, and decentralized microblogging system. 637-650 - Amir Hossein Alavi, William G. Buttlar:
An overview of smartphone technology for citizen-centered, real-time and scalable civil infrastructure monitoring. 651-672 - Daniel Amo Filvà, Marc Alier Forment, Francisco José García-Peñalvo, David Fonseca Escudero, María José Casañ Guerrero:
Clickstream for learning analytics to assess students' behavior with Scratch. 673-686 - Chao-Tung Yang, Shuo-Tsung Chen, Jung-Chun Liu, Yao-Yu Yang, Karan Mitra, Rajiv Ranjan:
Implementation of a real-time network traffic monitoring service with network functions virtualization. 687-701 - Pranab K. Muhuri, Amit Rauniyar, Rahul Nath:
On arrival scheduling of real-time precedence constrained tasks on multi-processor systems using genetic algorithm. 702-726 - Heng He, Ji Zhang, Peng Li, Yu Jin, Tao Zhang:
A lightweight secure conjunctive keyword search scheme in hybrid cloud. 727-736
- Nesrine Khernane, Jean-François Couchot, Ahmed Mostefaoui:
Optimal power/rate trade-off for internet of multimedia things lifetime maximization under dynamic links capacity. 737-750 - Azizur Rahim, Tie Qiu, Zhaolong Ning, Jinzhong Wang, Noor Ullah, Amr Tolba, Feng Xia:
Social acquaintance based routing in Vehicular Social Networks. 751-760 - Pedro Cruz, Rodrigo S. Couto, Luís Henrique M. K. Costa:
An algorithm for sink positioning in bus-assisted smart city sensing. 761-769 - Zhiwei Wang:
Provably secure key-aggregate cryptosystems with auxiliary inputs for data sharing on the cloud. 770-776 - José Andrés Asensio, Javier Criado, Nicolás Padilla, Luis Iribarne:
Emulating home automation installations through component-based web technology. 777-791 - Amar Abane, Mehammed Daoui, Samia Bouzefrane, Paul Mühlethaler:
NDN-over-ZigBee: A ZigBee support for Named Data Networking. 792-798 - Saber Amri, Fekher Khelifi, Abbas Bradai, Abderrezak Rachedi, Med Lassaad Kaddachi, Mohamed Atri:
A new fuzzy logic based node localization mechanism for Wireless Sensor Networks. 799-813 - Nikolay Akatyev, Joshua I. James:
Evidence identification in IoT networks based on threat assessment. 814-821 - Maha Bouaziz, Abderrezak Rachedi, Abdelfettah Belghith:
EKF-MRPL: Advanced mobility support routing protocol for internet of mobile things: Movement prediction approach. 822-832 - Saptarshi Debroy, Priyanka Samanta, Amina Bashir, Mainak Chatterjee:
SpEED-IoT: Spectrum aware energy efficient routing for device-to-device IoT communication. 833-848 - Abubakar Sadiq Sani, Dong Yuan, Jiong Jin, Longxiang Gao, Shui Yu, Zhao Yang Dong:
Cyber security framework for Internet of Things-based Energy Internet. 849-859 - David Airehrour, Jairo A. Gutiérrez, Sayan Kumar Ray:
SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things. 860-876 - Nhu-Ngoc Dao, Minho Park, Joongheon Kim, Jeongyeup Paek, Sungrae Cho:
Resource-aware relay selection for inter-cell interference avoidance in 5G heterogeneous network for Internet of Things systems. 877-887 - Mauro Tortonesi, Marco Govoni, Alessandro Morelli, Giulio Riberto, Cesare Stefanelli, Niranjan Suri:
Taming the IoT data deluge: An innovative information-centric service model for fog computing applications. 888-902
- Zhenhua Liu, Shuhong Duan, Peilin Zhou, Baocang Wang:
Traceable-then-revocable ciphertext-policy attribute-based encryption scheme. 903-913
- Flora Amato, Vincenzo Moscato, Antonio Picariello, Francesco Piccialli:
SOS: A multimedia recommender System for Online Social networks. 914-923 - Carmen De Maio, Giuseppe Fenza, Mariacristina Gallo, Vincenzo Loia, Mimmo Parente:
Time-aware adaptive tweets ranking through deep learning. 924-932 - Chao Tong, Ji Qi, Yu Lian, Jianwei Niu, Joel J. P. C. Rodrigues:
TimeTrustSVD: A collaborative filtering model integrating time, trust and rating information. 933-941 - Lei Wang, Jianwei Niu, Joel J. P. C. Rodrigues:
GMA: An adult account identification algorithm on Sina Weibo using behavioral footprints. 942-951 - Pradip Kumar Sharma, Shailendra Rathore, Jong Hyuk Park:
Multilevel learning based modeling for link prediction and users' consumption preference in Online Social Networks. 952-961 - Weiwei Yuan, Chenliang Li, Guangjie Han, Donghai Guan, Li Zhou, Kangya He:
Negative sign prediction for signed social networks. 962-970 - Raúl Lara-Cabrera, Antonio González-Pardo, David Camacho:
Statistical analysis of risk assessment factors and metrics to evaluate radicalisation in Twitter. 971-978 - Naveed Ahmad, Haitham S. Cruickshank, Yue Cao, Fakhri Alam Khan, Muhammad Asif, Awais Ahmad, Gwanggil Jeon:
Privacy by Architecture Pseudonym Framework for Delay Tolerant Network. 979-992 - Lingxia Liao, Chin-Feng Lai, Jaifu Wan, Victor C. M. Leung, Tien-Chi Huang:
Scalable distributed control plane for On-line social networks support cognitive neural computing in software defined networks. 993-1001 - Xu Zheng, Zhipeng Cai, Guangchun Luo, Ling Tian, Xiao Bai:
Privacy-preserved community discovery in online social networks. 1002-1009 - Jiahui Jin, Junzhou Luo, Mingyang Du, Yongcheng Dang, Feng Li, Jinghui Zhang, Aibo Song:
A data-locality-aware task scheduler for distributed social graph queries. 1010-1022 - Xiong Luo, Changwei Jiang, Weiping Wang, Yang Xu, Jenq-Haur Wang, Wenbing Zhao:
User behavior prediction in social networks using weighted extreme learning machine with distribution optimization. 1023-1035 - Weiwei Bai, Junsheng Ren, Tieshan Li:
Modified genetic optimization-based locally weighted learning identification modeling of ship maneuvering with full scale trial. 1036-1045 - Jianjiang Li, Kai Zhang, Xiaolei Yang, Peng Wei, Jie Wang, Karan Mitra, Rajiv Ranjan:
Category Preferred Canopy-K-means based Collaborative Filtering algorithm. 1046-1054 - Chun-Wei Tsai, Shih-Jui Liu:
SEIM: Search economics for influence maximization in online social networks. 1055-1064
- Soohyung Kim, Yon Dohn Chung:
An anonymization protocol for continuous and dynamic privacy-preserving data collection. 1065-1073 - (Withdrawn) Corrigendum to "A framework for risk assessment, management and evaluation: Economic tool for quantifying risks in supply chain" [Future Gener. Comput. Syst. 90 (2019) 489-502]. 1076-1077
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.