default search action
Future Generation Computer Systems, Volume 83
Volume 83, June 2018
- Bo Liu, Xiaolin Chang, Zhen Han, Kishor S. Trivedi, Ricardo J. Rodríguez:
Model-based sensitivity analysis of IaaS cloud availability. 1-13 - Anubhav Choudhary, Indrajeet Gupta, Vishakha Singh, Prasanta K. Jana:
A GSA based hybrid algorithm for bi-objective workflow scheduling in cloud computing. 14-26 - Longting Zhu, Jigang Wu, Guiyuan Jiang, Long Chen, Siew-Kei Lam:
Efficient hybrid multicast approach in wireless data center network. 27-36 - Fei Zhang, Xiaoming Fu, Ramin Yahyapour:
LayerMover: Fast virtual machine migration over WAN with three-layer image structure. 37-49 - Alfonso Pérez, Germán Moltó, Miguel Caballer, Amanda Calatrava:
Serverless computing for container-based architectures. 50-59 - Ruijuan Zheng, Jing Chen, Mingchuan Zhang, Qingtao Wu, Junlong Zhu, Huiqiang Wang:
A collaborative analysis method of user abnormal behavior based on reputation voting in cloud environment. 60-74 - Esmail Asyabi, Mohsen Sharifi, Azer Bestavros:
ppXen: A hypervisor CPU scheduler for mitigating performance variability in virtualized clouds. 75-84 - Haiyong Xu, Gangyi Jiang, Mei Yu, Ting Luo, Zongju Peng, Feng Shao, Hao Jiang:
3D visual discomfort predictor based on subjective perceived-constraint sparse representation in 3D display system. 85-94 - Haitao Wang, Lihua Song, Guomin Zhang, Hui Chen:
Timetable-aware opportunistic DTN routing for vehicular communications in battlefield environments. 95-103 - Yongjun Li, Zhen Zhang, You Peng, Hongzhi Yin, Quanqing Xu:
Matching user accounts based on user generated content across social networks. 104-115 - Kostas Kolomvatsos:
An intelligent, uncertainty driven management scheme for software updates in pervasive IoT applications. 116-131 - Jia Jun Tay, M. L. Dennis Wong, Ming Ming Wong, Cishen Zhang, Ismat Hijazin:
A tree search algorithm for low multiplicative complexity logic design. 132-143 - Bruno Silva, Marco A. S. Netto, Renato Luiz de Freitas Cunha:
JobPruner: A machine learning assistant for exploring parameter spaces in HPC applications. 144-157 - Ajit Kumar, K. S. Kuppusamy, Gnanasekaran Aghila:
FAMOUS: Forensic Analysis of MObile devices Using Scoring of application permissions. 158-172 - Li Ma, Wenyin Yang, Yingyu Huo, Yong Zhong:
Research on access control model of social network based on distributed logic. 173-182 - Wei Liu, Jing Wang, Arun Kumar Sangaiah, Jian Yin:
Dynamic metric embedding model for point-of-interest prediction. 183-192 - Md. Shamsul Huda, Md. Rafiqul Islam, Jemal H. Abawajy, John Yearwood, Mohammad Mehedi Hassan, Giancarlo Fortino:
A hybrid-multi filter-wrapper framework to identify run-time behaviour for fast malware detection. 193-207 - Tian Wang, Jiyuan Zhou, Minzhe Huang, Md. Zakirul Alam Bhuiyan, Anfeng Liu, Wenzheng Xu, Mande Xie:
Fog-based storage technology to fight with cyber threat. 208-218 - Keke Gai, Meikang Qiu, Meiqin Liu, Zenggang Xiong:
In-memory big data analytics under space constraints using dynamic programming. 219-227 - Satish Anamalamudi, Abdur Rashid Sangi, Mohammed Saeed Alkatheiri, Ahmedin Mohammed Ahmed:
AODV routing protocol for Cognitive radio access based Internet of Things (IoT). 228-238 - John Panneerselvam, Lu Liu, Yao Lu, Nick Antonopoulos:
An investigation into the impacts of task-level behavioural heterogeneity upon energy efficiency in Cloud datacentres. 239-249 - Wenyin Yang, Guojun Wang, Kim-Kwang Raymond Choo, Shuhong Chen:
HEPart: A balanced hypergraph partitioning algorithm for big data applications. 250-268 - Qi Han, Yinghui Zhang, Hui Li:
Efficient and robust attribute-based encryption supporting access policy hiding in Internet of Things. 269-277 - Elahe Naserian, Xinheng Wang, Keshav P. Dahal, Zhi Wang, Zaijian Wang:
Personalized location prediction for group travellers from spatial-temporal trajectories. 278-292 - Hui Lin, Jia Hu, Chuanfeng Xu, Jianfeng Ma, Mengyang Yu:
DTRM: A new reputation mechanism to enhance data trustworthiness for high-performance cloud computing. 293-302 - Wei Zhang, Xinchang Zhang, Huiling Shi, Longquan Zhou:
An efficient latency monitoring scheme in software defined networks. 303-309 - Lihua Jian, Xiaomin Yang, Zhili Zhou, Kai Zhou, Kai Liu:
Multi-scale image fusion through rolling guidance filter. 310-325 - Kewei Sha, Wei Wei, T. Andrew Yang, Zhiwei Wang, Weisong Shi:
On security challenges and open issues in Internet of Things. 326-337 - Jebaveerasingh Jebadurai, J. Dinesh Peter:
Super-resolution of retinal images using multi-kernel SVR for IoT healthcare applications. 338-346 - Dan Liao, Gang Sun, Guanghua Yang, Victor I. Chang:
Energy-efficient virtual content distribution network provisioning in cloud-based data centers. 347-357 - Hoang Long Nguyen, Jai E. Jung:
SocioScope: A framework for understanding Internet of Social Knowledge. 358-365 - Enas W. Abdulhay, Arunkumar N., Kumaravelu Narasimhan, Elamaran Vellaiappan, Venkatraman V.:
Gait and tremor investigation using machine learning techniques for the diagnosis of Parkinson disease. 366-373
- Kim-Kwang Raymond Choo, Yongtang Shi, Zengqiang Chen:
Measurements and security of complex networks and systems: Research advances and challenges. 374-375 - Min Liu, Zhen Xiong, Yue Ma, Peng Zhang, Jianliang Wu, Xingqin Qi:
DPRank centrality: Finding important vertices based on random walks with a new defined transition matrix. 376-389 - Ryan Ghanbari, Mahdi Jalili, Xinghuo Yu:
Correlation of cascade failures and centrality measures in complex networks. 390-400 - Marin Lujak, Stefano Giordani:
Centrality measures for evacuation: Finding agile evacuation routes. 401-412 - Sebastian Wandelt, Xiaoqian Sun, Massimiliano Zanin, Shlomo Havlin:
QRE: Quick Robustness Estimation for large complex networks. 413-424 - Jinqiang Li, Shuming Zhou, Xuequn Li, Xiaowang Li:
An insertion-deletion-compensation model with Poisson process for scale-free networks. 425-430 - Weifeng Pan, Bing Li, Jing Liu, Yutao Ma, Bo Hu:
Analyzing the structure of Java software systems by weighted K-core decomposition. 431-444 - Huiqiu Lin, Weihua Yang:
A conditional edge connectivity of double-orbit networks. 445-449 - Yinkui Li, Yongtang Shi, Xiaofeng Gu:
Spectrum bounds for the scattering number, integrity, tenacity of regular graphs. 450-453 - Jingcheng Fu, Jianwen Li, Yawei Niu, Guanghui Wang, Jianliang Wu:
Multipolarization versus unification in community networks. 454-460 - Jing Jian Li, Bo Ling:
Symmetric graphs and interconnection networks. 461-467 - Jingjing Wang, Xiaoguang Han, Zengqiang Chen, Qing Zhang:
Model matching of input/output asynchronous sequential machines based on the semi-tensor product of matrices. 468-475 - Yizhi Ren, Gang Wang, Lanping Yu, Benyun Shi, Weitong Hu, Zhen Wang:
Rigorous or tolerant: The effect of different reputation attitudes in complex networks. 476-484 - Sadaf Monajemi, Saeid Sanei, Sim Heng Ong:
Information reliability in complex multitask networks. 485-495 - Shah Fahd, Mehreen Afzal, Haider Abbas, Mian Muhammad Waseem Iqbal, Salman Waheed:
Correlation power analysis of modes of encryption in AES and its countermeasures. 496-509 - Bassam Jamil Mohd, Thaier Hayajneh, Khalil Mustafa Ahmad Yousef, Zaid Abu Khalaf, Md. Zakirul Alam Bhuiyan:
Hardware design and modeling of lightweight block ciphers for secure communications. 510-521 - Jerline Sheebha Anni, Arun Kumar Sangaiah:
Wireless Integrated Sensor Network: Boundary Intellect system for elephant detection via cognitive theory and Fuzzy Cognitive Maps. 522-534 - Gustavo Gonzalez Granadillo, Samuel Dubus, Alexander Motzek, Joaquín García, Ender Alvarez, Matteo Merialdo, Serge Papillon, Hervé Debar:
Dynamic risk management response system to handle cyber threats. 535-552
- Santosh Kumar, Sanjay Kumar Singh:
Monitoring of pet animal in smart cities using animal biometrics. 553-563 - Junping Xie, Minhua Yang, Jinhai Li, Zhong Zheng:
Rule acquisition and optimal scale selection in multi-scale formal decision contexts and their applications to smart city. 564-581 - Vangipuram Radhakrishna, Shadi A. Aljawarneh, Puligadda Veereswara Kumar, Vinjamuri Janaki:
A novel fuzzy similarity measure and prevalence estimation approach for similarity profiled temporal association pattern mining. 582-595 - M. Shamim Hossain, Ghulam Muhammad, Wadood Abdul, Biao Song, Brij B. Gupta:
Cloud-assisted secure video transmission and sharing framework for smart cities. 596-606 - Xiong Li, Jianwei Niu, Saru Kumari, Fan Wu, Kim-Kwang Raymond Choo:
A robust biometrics based three-factor authentication scheme for Global Mobility Networks in smart city. 607-618 - Vasileios A. Memos, Kostas E. Psannis, Yutaka Ishibashi, Byung-Gyu Kim, Brij B. Gupta:
An Efficient Algorithm for Media-based Surveillance System (EAMSuS) in IoT Smart City Framework. 619-628 - Prosanta Gope, Ruhul Amin, SK Hafizul Islam, Neeraj Kumar, Vinod Kumar Bhalla:
Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment. 629-637 - M. Mazhar Rathore, Anand Paul, Awais Ahmad, Naveen K. Chilamkurti, Won-Hwa Hong, HyunCheol Seo:
Real-time secure communication for Smart City in high-speed Big Data environment. 638-652 - Logesh Ravi, V. Subramaniyaswamy, Vijayakumar Varadharajan, Xiao-Zhi Gao, V. Indragandhi:
A hybrid quantum-induced swarm intelligence clustering for the urban trip recommendation in smart city. 653-673
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.