default search action
Future Generation Computer Systems, Volume 96
Volume 96, July 2019
- Giuseppe Bianchi, Tooska Dargahi, Alberto Caponi, Mauro Conti:
Intelligent conditional collaborative private data sharing. 1-10
- Daniele D'Agostino, Alfonso Quarati, Andrea Clematis, Lucia Morganti, Elena Corni, Valentina Giansanti, Daniele Cesini, Ivan Merelli:
SoC-based computing infrastructures for scientific applications and commercial services: Performance and economic evaluations. 11-22
- Han Qiu, Gérard Memmi, Xuan Chen, Jian Xiong:
DC coefficient recovery for JPEG images in ubiquitous communication systems. 23-31
- Sherif Sakr, Albert Y. Zomaya, Athanasios V. Vasilakos:
Editorial for Special issue of FGCS special issue on "Benchmarking big data systems". 32-34
- Luis Guijarro, Vicent Pla, José R. Vidal, Maurizio Naldi:
Competition in data-based service provision: Nash equilibrium characterization. 35-50
- Syed Fazal Abbas Baqueri, Muhammad Adnan, Bruno Kochan, Tom Bellemans:
Activity-based model for medium-sized cities considering external activity-travel: Enhancing FEATHERS framework. 51-63
- Amir Mohammadzade Lajevardi, Morteza Amini:
A semantic-based correlation approach for detecting hybrid and low-level APTs. 64-88
- Xiaolong Xu, Yuan Xue, Lianyong Qi, Yuan Yuan, Xuyun Zhang, Tariq Umer, Shaohua Wan:
An edge computing-enabled computation offloading method with privacy preservation for internet of connected vehicles. 89-100
- Yezhi Lin, Xinyuan Jin, Jiuqiang Chen, Ali Hassan Sodhro, Zhifang Pan:
An analytic computation-driven algorithm for Decentralized Multicore Systems. 101-110
- Cheng Zhang, Zixuan Zheng:
Task migration for mobile edge computing using deep reinforcement learning. 111-118
- Grace A. Lewis, Patricia Lago, Sebastián Echeverría, Pieter Simoens:
A tale of three systems: Case studies on the application of architectural tactics for cyber-foraging. 119-147 - Moazam Ali, Susmit Bagchi:
Probabilistic normed load monitoring in large scale distributed systems using mobile agents. 148-167
- Joseph Azar, Abdallah Makhoul, Mahmoud Barhamgi, Raphaël Couturier:
An energy efficient IoT data compression approach for edge machine learning. 168-175
- Bo Li, Guiqin Yuan, Li Shen, Ruoyi Zhang, Yiyang Yao:
Incorporating URL embedding into ensemble clustering to detect web anomalies. 176-184
- Wenbo Jiang, Hongwei Li, Guowen Xu, Mi Wen, Guishan Dong, Xiaodong Lin:
PTAS: Privacy-preserving Thin-client Authentication Scheme in blockchain-based PKI. 185-195
- Anas Al-Roubaiey, Tarek R. Sheltami, Ashraf S. Mahmoud, Ansar-Ul-Haque Yasar:
EATDDS: Energy-aware middleware for wireless sensor and actuator networks. 196-206
- Muthu Manikandan Baskaran, Thomas Henretty, James R. Ezick, Richard Lethin, David Bruns-Smith:
Enhancing Network Visibility and Security through Tensor Analysis. 207-215
- Georgios L. Stavrinides, Helen D. Karatza:
An energy-efficient, QoS-aware and cost-effective scheduling approach for real-time workflow applications in cloud computing systems utilizing DVFS and approximate computations. 216-226
- Umara Noor, Zahid Anwar, Tehmina Amjad, Kim-Kwang Raymond Choo:
A machine learning-based FinTech cyber threat attribution framework using high-level indicators of compromise. 227-242
- Andy S. Alic, Jussara M. Almeida, Giovanni Aloisio, Nazareno Andrade, Nuno Antunes, Danilo Ardagna, Rosa M. Badia, Tânia Basso, Ignacio Blanquer, Tarciso Braz, Andrey Brito, Donatello Elia, Sandro Fiore, Dorgival O. Guedes, Marco Lattuada, Daniele Lezzi, Matheus Maciel, Wagner Meira Jr., Demetrio Gomes Mestre, Regina Moraes, Fábio Morais, Carlos Eduardo S. Pires, Nádia P. Kozievitch, Walter dos Santos, Paulo Silva, Marco Vieira:
BIGSEA: A Big Data analytics platform for public transportation information. 243-269
- Mita Cokic, Ivan Seskar:
Software defined network management for dynamic smart GRID traffic. 270-282
- Lara Ortiz-Martin, Pablo Picazo-Sanchez, Pedro Peris-Lopez, Juan Tapiador, Gerardo Schneider:
Feasibility analysis of Inter-Pulse Intervals based solutions for cryptographic token generation by two electrocardiogram sensors. 283-296
- Iman Azimi, Tapio Pahikkala, Amir M. Rahmani, Hannakaisa Niela-Vilén, Anna Axelin, Pasi Liljeberg:
Missing data resilient decision-making for healthcare IoT through personalization: A case study on maternal health. 297-308 - Oussama Senouci, Zibouda Aliouat, Saad Harous:
MCA-V2I: A Multi-hop Clustering Approach over Vehicle-to-Internet communication for improving VANETs performances. 309-323
- Shunmei Meng, Lianyong Qi, Qianmu Li, Wenmin Lin, Xiaolong Xu, Shaohua Wan:
Privacy-preserving and sparsity-aware location-based prediction method for collaborative recommender systems. 324-335
- Chunhua Xiao, Lei Zhang, Weichen Liu, Neil Bergmann, Yuhua Xie:
Energy-efficient crypto acceleration with HW/SW co-design for HTTPS. 336-347
- Javier Fabra, Joaquín Ezpeleta, Pedro Álvarez:
Reducing the price of resource provisioning using EC2 spot instances with prediction models. 348-367
- Xia Feng, Liangmin Wang:
PAU: Privacy Assessment method with Uncertainty consideration for cloud-based vehicular networks. 368-375
- Yongkai Fan, Xiaodong Lin, Gang Tan, Yuqing Zhang, Wei Dong, Jing Lei:
One secure data integrity verification scheme for cloud storage. 376-385
- Amin Ullah, Khan Muhammad, Ijaz Ul Haq, Sung Wook Baik:
Action recognition using optimized deep autoencoder and CNN for surveillance data streams of non-stationary environments. 386-397
- Muhammad Babar, Fahim Arif, Mian Ahmad Jan, Zhiyuan Tan, Fazlullah Khan:
Urban data management system: Towards Big Data analytics for Internet of Things based smart urban environment using customized Hadoop. 398-409
- Seyed Farhad Aghili, Hamid Mala, Mohammad Shojafar, Pedro Peris-Lopez:
LACO: Lightweight Three-Factor Authentication, Access Control and Ownership Transfer Scheme for E-Health Systems in IoT. 410-424
- Hui Yan, Xiongtao Zhang, Huangke Chen, Yun Zhou, Weidong Bao, Laurence T. Yang:
DEED: Dynamic Energy-Efficient Data offloading for IoT applications under unstable channel conditions. 425-437 - Yu He, Guangjie Han, Hao Wang, James Adu Ansere, Wenbo Zhang:
A sector-based random routing scheme for protecting the source location privacy in WSNs for the Internet of Things. 438-448
- Sergio López-Huguet, Alfonso Pérez, Amanda Calatrava, Carlos de Alfonso, Miguel Caballer, Germán Moltó, Ignacio Blanquer:
A self-managed Mesos cluster for data analytics with QoS guarantees. 449-461
- Huixi Li, Wenjun Li, Shigeng Zhang, Haodong Wang, Yi Pan, Jianxin Wang:
Page-sharing-based virtual machine packing with multi-resource constraints to reduce network traffic in migration for clouds. 462-471
- Fang Xu, Qiong Xu, Zenggang Xiong, Nan Xiao, Yong Xie, Min Deng, Huibing Hao:
Intelligent distributed routing scheme based on social similarity for mobile social networks. 472-480
- Wenjuan Li, Steven Tug, Weizhi Meng, Yu Wang:
Designing collaborative blockchained signature-based intrusion detection in IoT environments. 481-489
- Safiollah Heidari, Rajkumar Buyya:
Quality of Service (QoS)-driven resource provisioning for large-scale graph processing in cloud computing environments: Graph Processing-as-a-Service (GPaaS). 490-501
- Shenghao Liu, Bang Wang, Minghua Xu, Laurence T. Yang:
Evolving graph construction for successive recommendation in event-based social networks. 502-514
- Zhiqiang Liu, Shuyang Tang, Sherman S. M. Chow, Zhen Liu, Yu Long:
Fork-free hybrid consensus with flexible Proof-of-Activity. 515-524
- Aaron Zimba, Hongsong Chen, Zhaoshun Wang:
Bayesian network based weighted APT attack paths modeling in cloud computing. 525-537
- Zeinab Rezaeifar, Jian Wang, Heekuck Oh, Suk-Bok Lee, Junbeom Hur:
A reliable adaptive forwarding approach in named data networking. 538-551
- Zenun Kastrati, Ali Shariq Imran:
Performance analysis of machine learning classifiers on improved concept vector space models. 552-562
- Heesuk Son, Dongman Lee:
Towards interactive networking: Runtime message inference approach for incompatible protocol updates in IoT environments. 563-578
- Fadi Al-Turjman, Mohammad Abujubbeh:
IoT-enabled smart grid via SM: An overview. 579-590
- Dongcheng Zhao, Gang Sun, Dan Liao, Shizhong Xu, Victor Chang:
Mobile-aware service function chain migration in cloud-fog computing. 591-604
- Raja Waseem Anwar, Anazida Zainal, Fatma Outay, Ansar-Ul-Haque Yasar, Saleem Iqbal:
BTEM: Belief based trust evaluation mechanism for Wireless Sensor Networks. 605-616
- Zheng Xu, Xiangfeng Luo, Yunhuai Liu, Lin Mei, Chuanping Hu:
Power law based foundation for the measurement of discrimination information for human knowledge representation. 617-627 - Chia-Chen Chen, Jia-Lun Tsai:
Determinants of behavioral intention to use the Personalized Location-based Mobile Tourism Application: An empirical study by integrating TAM with ISSM. 628-638 - Xiaokang Zhou, Bo Wu, Qun Jin:
User role identification based on social behavior and networking analysis for information dissemination. 639-648 - Xiuhui Wang, Ke Yan:
Immersive human-computer interactive virtual environment using large-scale display system. 649-659 - Il-Ju Ko, Dongho Kim, Jong Hyuk Park:
A user experience environment model for human activity simulation. 660-666 - Xu Chen, Judith Gelernter, Han Zhang, Jin Liu:
Multi-lingual geoparsing based on machine translation. 667-677 - Hong Liu, Huansheng Ning, Qitao Mu, Yumei Zheng, Jing Zeng, Laurence T. Yang, Runhe Huang, Jianhua Ma:
A review of the smart world. 678-691 - Mu-Yen Chen, Ting-Hsuan Chen:
Modeling public mood and emotion: Blog and news sentiment and socio-economic phenomena. 692-699 - Muna Alsallal, Rahat Iqbal, Vasile Palade, Saad Ali Amin, Victor Chang:
An integrated approach for intrinsic plagiarism detection. 700-712 - Tanveer Ahmed, Abhishek Srivastava:
Combining humans and machines for the future: A novel procedure to predict human interest. 713-730 - Chao-Tung Yang, Shuo-Tsung Chen, Walter Den, Yun-Ting Wang, Endah Kristiani:
Implementation of an Intelligent Indoor Environmental Monitoring and management system in cloud. 731-749
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.