default search action
Future Generation Computer Systems, Volume 97
Volume 97, August 2019
- Zhuo Liu, Chenhui Yao, Hang Yu, Tai-Hua Wu:
Deep reinforcement learning with its application for lung cancer detection in medical Internet of Things. 1-9
- Mohamed Mohamed, Robert Engel, Amit Warke, Shay Berman, Heiko Ludwig:
Extensible persistence as a service for containers. 10-20
- Yibing Zhao, Feng Ding, Jining Li, Lie Guo, Wanfeng Qi:
The intelligent obstacle sensing and recognizing method based on D-S evidence theory for UGV. 21-29
- Dominik Ziemke, Simon Metzler, Kai Nagel:
Bicycle traffic and its interaction with motorized traffic in an agent-based transport simulation framework. 30-40
- Yuhan Su, Xiaozhen Lu, Lianfen Huang, Xiaojiang Du, Mohsen Guizani:
Tac-U: A traffic balancing scheme over licensed and unlicensed bands for Tactile Internet. 41-49
- Juan Luo, Luxiu Yin, Jinyu Hu, Chun Wang, Xuan Liu, Xin Fan, Haibo Luo:
Container-based fog computing architecture and energy-balancing scheduling algorithm for energy IoT. 50-60
- Feng Lu, Ziqian Shi, Lin Gu, Hai Jin, Laurence Tianruo Yang:
An adaptive multi-level caching strategy for Distributed Database System. 61-68
- Aicha Ben Jrad, Sami Bhiri, Samir Tata:
STRATFram: A framework for describing and evaluating elasticity strategies for service-based business processes in the cloud. 69-89
- Zhaoxi Hong, Yixiong Feng, Zhiwu Li, Yong Wang, Hao Zheng, Zhongkai Li, Jianrong Tan:
An integrated approach for multi-objective optimisation and MCDM of energy internet under uncertainty. 90-104
- Toni Perkovic, Mario Cagalj, Tonko Kovacevic:
LISA: Visible light based initialization and SMS based authentication of constrained IoT devices. 105-118
- Mahbuba Afrin, Jiong Jin, Ashfaqur Rahman, Yu-Chu Tian, Ambarish Kulkarni:
Multi-objective resource allocation for Edge Cloud based robotic workflow in smart factory. 119-130
- Carlos Guerrero, Isaac Lera, Carlos Juiz:
Evaluation and efficiency comparison of evolutionary algorithms for service placement optimization in fog architectures. 131-144
- Mauro A. A. da Cruz, Joel J. P. C. Rodrigues, Pascal Lorenz, Petar Solic, Jalal Al-Muhtadi, Victor Hugo C. de Albuquerque:
A proposal for bridging application layer protocols to HTTP on IoT solutions. 145-152
- Tao Hu, Chunxia Xiao:
Data-driven main color map feature learning, design and simulation for smart ethnic cloth. 153-164
- Arsla Khan, Saud Khan, Sobia Baig, Hafiz Muhammad Asif, Soo Young Shin:
Wavelet OFDM with Overlap FDE for non-Gaussian channels in precoded NOMA based systems. 165-179
- Pedro Pedrosa Rebouças Filho, Samuel Luz Gomes, Navar de Medeiros Mendonça e Nascimento, Cláudio Marques de Sá Medeiros, Fatma Outay, Victor Hugo C. de Albuquerque:
Energy production predication via Internet of Thing based machine learning system. 180-193
- Dawei Sun, Shang Gao, Xunyun Liu, Fengyun Li, Xinqi Zheng, Rajkumar Buyya:
State and runtime-aware scheduling in elastic stream computing systems. 194-209
- Abir Mhenni, Estelle Cherrier, Christophe Rosenberger, Najoua Essoukri Ben Amara:
Analysis of Doddington zoo classification for user dependent template update: Application to keystroke dynamics recognition. 210-218
- Wazir Zada Khan, Ejaz Ahmed, Saqib Hakak, Ibrar Yaqoob, Arif Ahmed:
Edge computing: A survey. 219-235
- Marco de Benedictis, Antonio Lioy:
Integrity verification of Docker containers for a lightweight cloud environment. 236-246
- Maha Bouaziz, Abderrezak Rachedi, Abdelfettah Belghith, Marion Berbineau, Saad A. Al-Ahmadi:
EMA-RPL: Energy and mobility aware routing for the Internet of Mobile Things. 247-258 - Vicent Giménez Alventosa, Germán Moltó, Miguel Caballer:
A framework and a performance assessment for serverless MapReduce on AWS Lambda. 259-274
- Jie Cui, Mingjun Wang, Yonglong Luo, Hong Zhong:
DDoS detection and defense mechanism based on cognitive-inspired computing in SDN. 275-283
- Shengmin Xu, Guomin Yang, Yi Mu, Ximeng Liu:
A secure IoT cloud storage system with fine-grained access control and decryption key exposure resistance. 284-294
- Ignacio Martín, José Alberto Hernández, Sergio de los Santos:
Machine-Learning based analysis and classification of Android malware signatures. 295-305
- Qian Xu, Chengxiang Tan, Wenye Zhu, Ya Xiao, Zhijie Fan, Fujia Cheng:
Decentralized attribute-based conjunctive keyword search scheme with online/offline encryption and outsource decryption for cloud computing. 306-326
- Luigi Atzori, Claudia Campolo, Bin Da, Roberto Girau, Antonio Iera, Giacomo Morabito, Salvatore Quattropani:
Smart devices in the social loops: Criteria and algorithms for the creation of the social links. 327-339
- Muthukumar Murugan, Krishna Kant, Ajaykrishna Raghavan, David H. C. Du:
Software defined deduplicated replica management in scale-out storage systems. 340-354
- Sam Leroux, Steven Bohez, Elias De Coninck, Pieter Van Molle, Bert Vankeirsbilck, Tim Verbelen, Pieter Simoens, Bart Dhoedt:
Multi-fidelity deep neural networks for adaptive inference in the internet of multimedia things. 355-360
- Ying Xie, Yuanwei Zhu, Yeguo Wang, Yongliang Cheng, Rongbin Xu, Abubakar Sadiq Sani, Dong Yuan, Yun Yang:
A novel directional and non-local-convergent particle swarm optimization based workflow scheduling in cloud-edge environment. 361-378
- Pedro H. Vilela, Joel J. P. C. Rodrigues, Petar Solic, Kashif Saleem, Vasco Furtado:
Performance evaluation of a Fog-assisted IoT solution for e-Health applications. 379-386
- Yuanchun Jiang, Dandan Tao, Yezheng Liu, Jianshan Sun, Haifeng Ling:
Cloud service recommendation based on unstructured textual information. 387-396
- Khouloud Boukadi, Rima Grati, Molka Rekik, Hanêne Ben-Abdallah:
Business process outsourcing to cloud containers: How to find the optimal deployment? 397-408
- Muhammad Faizan Khan, Guojun Wang, Md. Zakirul Alam Bhuiyan:
Wi-Fi frequency selection concept for effective coverage in collapsed structures. 409-424
- Sana Ullah, Ki-Il Kim, Kyong Hoon Kim, Muhammad Imran, Pervez Khan, Eduardo Tovar, Farman Ali:
UAV-enabled healthcare architecture: Issues and challenges. 425-432
- Suresh V. Limkar, Rakesh Kumar Jha:
A novel method for parallel indexing of real time geospatial big data generated by IoT devices. 433-452
- Hu Xiong, Yanan Zhao, Li Peng, Hao Zhang, Kuo-Hui Yeh:
Partially policy-hidden attribute-based broadcast encryption with secure delegation in edge computing. 453-461
- Hadeel T. El Kassabi, Mohamed Adel Serhani, Rachida Dssouli, Alramzana Nujum Navaz:
Trust enforcement through self-adapting cloud workflow orchestration. 462-481 - Alireza Toroghi Haghighat, Mehdi Shajari:
Block withholding game among bitcoin mining pools. 482-491
- Dimitrios Michail, Antonios Makris, Iraklis Varlamis, Mark Sawyer:
Parallelization of large-scale drug-protein binding experiments. 492-502
- Juan E. Tapia, Claudia Arellano:
Soft-biometrics encoding conditional GAN for synthesis of NIR periocular images. 503-511
- Muneeb Ul Hassan, Mubashir Husain Rehmani, Jinjun Chen:
Privacy preservation in blockchain based IoT systems: Integration issues, prospects, challenges, and future research directions. 512-529
- Varun Kumar Sharma, Lal Pratap Verma, Mahesh Kumar:
CL-ADSP: Cross-Layer Adaptive Data Scheduling Policy in Mobile Ad-hoc Networks. 530-563
- Leandro Bezerra Marinho, Navar de Medeiros Mendonça e Nascimento, João Wellington M. Souza, Mateus Valentim Gurgel, Pedro Pedrosa Rebouças Filho, Victor Hugo C. de Albuquerque:
A novel electrocardiogram feature extraction approach for cardiac arrhythmia classification. 564-577 - Jin Cui, Lei Ren, Xiaokang Wang, Lin Zhang:
Pairwise comparison learning based bearing health quantitative modeling and its application in service life prediction. 578-586
- Nader Sohrabi Safa, Carsten Maple, Steven Furnell, Muhammad Ajmal Azad, Charith Perera, Mohammad Dabbagh, Mehdi Sookhak:
Deterrence and prevention-based model to mitigate information security insider threats in organisations. 587-597
- Aitor Almeida, Rubén Mulero, Piercosimo Rametta, Vladimir Urosevic, Marina Andric, Luigi Patrono:
A critical analysis of an IoT - aware AAL system for elderly monitoring. 598-619
- Luigi Coppolino, Salvatore D'Antonio, Giovanni Mazzeo, Luigi Romano:
A comparative analysis of emerging approaches for securing java software with Intel SGX. 620-633
- Hannan Bin Liaqat, Amjad Ali, Junaid Qadir, Ali Kashif Bashir, Muhammad Bilal, Fiaz Majeed:
Socially-aware congestion control in ad-hoc networks: Current status and the way forward. 634-660
- Zaihong He, Jishun Kuang, Yanjie Tan, Shihui Peng, Huailiang Tan:
LPCMsim: A Lightweight Phase Change Memory Simulator. 661-673
- Václav Bartos, Martin Zádník, Sheikh Mahbub Habib, Emmanouil Vasilomanolakis:
Network entity characterization and attack prediction. 674-686
- Muhammad Asif Habib, Mudassar Ahmad, Sohail Jabbar, Shehzad Khalid, Junaid Chaudhry, Kashif Saleem, Joel J. P. C. Rodrigues, Mohammed Sayim Khalil:
Security and privacy based access control model for internet of connected vehicles. 687-696
- Marcos A. Guerine, Murilo B. Stockinger, Isabel Rosseti, Luidi Gelabert Simonetti, Kary A. C. S. Ocaña, Alexandre Plastino, Daniel de Oliveira:
A provenance-based heuristic for preserving results confidentiality in cloud-based scientific workflows. 697-713
- Shupan Li, Limin Xiao, Li Ruan, Shubin Su:
A novel integrity measurement method based on copy-on-write for region in virtual machine. 714-726
- Hsi-Peng Lu, Chiao-Shan Chen, Hueiju Yu:
Technology roadmap for building a smart city: An exploring study on methodology. 727-742
- Pan Li, Songtao Guo, Chengsheng Pan, Li Yang, Guiyan Liu, Yue Zeng:
Fast congestion-free consistent flow forwarding rules update in software defined networking. 743-754
- Binbin Huang, Zhongjin Li, Peng Tang, Shangguang Wang, Jun Zhao, Haiyang Hu, Wanqing Li, Victor I. Chang:
Security modeling and efficient computation offloading for service workflow in mobile edge computing. 755-774
- Jianfeng Guan, Vishal Sharma, Ilsun You, Mohammed Atiquzzaman, Muhammad Imran:
Extension of MIH for FPMIPv6 (EMIH-FPMIPv6) to support optimized heterogeneous handover. 775-791
- Mohammed AlShaer, Yehia Taher, Rafiqul Haque, Mohand-Saïd Hacid, Mohamed Dbouk:
IBRIDIA: A hybrid solution for processing big logistics data. 792-804
- Chenghao Li, Huyin Zhang, Tianying Zhou:
Coflow scheduling algorithm based density peaks clustering. 805-813
- Damjan Temelkovski, Tamás Kiss, Gábor Terstyánszky, Pamela Greenwell:
Extending molecular docking desktop applications with cloud computing support and analysis of results. 814-824
- Qiang Wu, Jun Shen, Binbin Yong, Jianqing Wu, Fucun Li, Jinqiang Wang, Qingguo Zhou:
Smart fog based workflow for traffic control networks. 825-835
- Lan Gao, Yunlong Xu, Rui Wang, Hailong Yang, Zhongzhi Luan, Depei Qian:
Accelerating in-memory transaction processing using general purpose graphics processing units. 836-848 - Ali Asghar Heidari, Seyedali Mirjalili, Hossam Faris, Ibrahim Aljarah, Majdi M. Mafarja, Huiling Chen:
Harris hawks optimization: Algorithm and applications. 849-872
- Ademir Silva, Kátia Silva, Antônio A. de A. Rocha, Flavio Queiroz:
Calculating the trust of providers through the construction weighted Sec-SLA. 873-886
- Attia Qamar, Ahmad Karim, Victor Chang:
Mobile malware attacks: Review, taxonomy & future directions. 887-909
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.