default search action
Future Generation Computer Systems, Volume 102
Volume 102, January 2020
- Wenlong Chen, Heyang Chen, Zhiliang Wang, Chengan Zhao, Mingwei Xu, Ke Xu, Yingya Guo:
Congestion avoidance transmission mechanism based on two-dimensional forwarding. 1-13
- Eric Ke Wang, Chien-Ming Chen, Siu-Ming Yiu, Mohammad Mehedi Hassan, Majed A. AlRubaian, Giancarlo Fortino:
Incentive evolutionary game model for opportunistic social networks. 14-29
- Harkeerat Kaur, Pritee Khanna:
Privacy preserving remote multi-server biometric authentication using cancelable biometrics and secret sharing. 30-41
- Shaaban A. Sahmoud, Haluk Rahmi Topcuoglu:
A general framework based on dynamic multi-objective evolutionary algorithms for handling feature drifts on data streams. 42-52
- Yu Liu, Yangtao Wang, Ke Zhou, Yujuan Yang, Yifei Liu:
Semantic-aware data quality assessment for image big data. 53-65
- Rui Wang, Miao Li, Limei Peng, Ying Hu, Mohammad Mehedi Hassan, Abdulhameed Alelaiwi:
Cognitive multi-agent empowering mobile edge computing for resource caching and collaboration. 66-74
- Yunliang Chen, Junqing Fan, Ze Deng, Bo Du, Xiaohui Huang, Qirui Gui:
PR-KELM: Icing level prediction for transmission lines in smart grid. 75-83
- Michele Ianni, Elio Masciari, Giuseppe M. Mazzeo, Mario Mezzanzanica, Carlo Zaniolo:
Fast and effective Big Data exploration by clustering. 84-94
- Khavee Agustus Botangen, Jian Yu, Yanbo Han, Quan Z. Sheng, Jun Han:
Quantifying the adaptability of workflow-based service compositions. 95-111
- Muhammad Amin, Tamleek Ali Tanveer, Mohammad Tehseen, Murad Khan, Fakhri Alam Khan, Sajid Anwar:
Static malware detection and attribution in android byte-code through an end-to-end deep system. 112-126
- Hossein Ghomeshi, Mohamed Medhat Gaber, Yevgeniya Kovalchuk:
A non-canonical hybrid metaheuristic approach to adaptive data stream classification. 127-139
- Eric Ke Wang, Zuodong Liang, Chien-Ming Chen, Saru Kumari, Muhammad Khurram Khan:
PoRX: A reputation incentive scheme for blockchain consensus of IIoT. 140-151
- Gicheol Wang, Byoung-Sun Lee, Jae Young Ahn, Gihwan Cho:
A UAV-assisted CH election framework for secure data collection in wireless sensor networks. 152-162
- Lan You, Qingxi Peng, Zenggang Xiong, Du He, Meikang Qiu, Xuemin Zhang:
Integrating aspect analysis and local outlier factor for intelligent review spam detection. 163-172
- Mona Taghavi, Jamal Bentahar, Hadi Otrok:
Two-stage game theoretical framework for IaaS market share dynamics. 173-189
- Anna Giannakou, Dipankar Dwivedi, Sean Peisert:
A machine learning approach for packet loss prediction in science flows. 190-197
- Zubair A. Baig, Surasak Sanguanpong, Syed Naeem Firdous, Van Nhan Vo, Tri Gia Nguyen, Chakchai So-In:
Averaged dependence estimators for DoS attack detection in IoT networks. 198-209
- Wenbin Jiang, Yangsong Zhang, Pai Liu, Jing Peng, Laurence T. Yang, Geyan Ye, Hai Jin:
Exploiting potential of deep neural networks by layer-wise fine-grained parallelism. 210-221
- Zhi-Hong Deng:
Mining high occupancy itemsets. 222-229
- Yi-Shu Lu, Jiun-Long Huang:
GLR: A graph-based latent representation model for successive POI recommendation. 230-244
- Isaías B. Felzmann, Matheus Martins Susin, Liana Dessandre Duenha, Rodolfo Azevedo, Lucas Francisco Wanner:
ADeLe: A description language for approximate hardware. 245-258
- Massimo Bartoletti, Salvatore Carta, Tiziana Cimoli, Roberto Saia:
Dissecting Ponzi schemes on Ethereum: Identification, analysis, and impact. 259-277
- Philip James Basford, Steven J. Johnston, Colin S. Perkins, Tony Garnock-Jones, Fung Po Tso, Dimitrios Pezaros, Robert D. Mullins, Eiko Yoneki, Jeremy Singer, Simon J. Cox:
Performance analysis of single board computer clusters. 278-291
- Wei Zong, Yang-Wai Chow, Willy Susilo:
Interactive three-dimensional visualization of network intrusion detection data for machine learning. 292-306
- Goshgar Ismayilov, Haluk Rahmi Topcuoglu:
Neural network based multi-objective evolutionary algorithm for dynamic workflow scheduling in cloud computing. 307-322
- Kaize Shi, Changjin Gong, Hao Lu, Yifan Zhu, Zhendong Niu:
Wide-grained capsule network with sentence-level feature to detect meteorological event in social network. 323-332
- Lucas Rodríguez, Javier Palanca, Elena del Val, Miguel Rebollo:
Analyzing urban mobility paths based on users' activity in social networks. 333-346
- Guangxia Xu, Weifeng Li, Jun Liu:
A social emotion classification approach using multi-model fusion. 347-356
- Fadi Al-Turjman:
Intelligence and security in big 5G-oriented IoNT: An overview. 357-368
- Jiaojiao Jiang, Steve Versteeg, Jun Han, Md. Arafat Hossain, Jean-Guy Schneider:
A positional keyword-based approach to inferring fine-grained message formats. 369-381
- Romana Talat, Mohammad S. Obaidat, Muhammad Muzammal, Ali Hassan Sodhro, Zongwei Luo, Sandeep Pirbhulal:
A decentralised approach to privacy preserving trajectory mining. 382-392
- Yvan Lucas, Pierre-Edouard Portier, Léa Laporte, Liyun He-Guelton, Olivier Caelen, Michael Granitzer, Sylvie Calabretto:
Towards automated feature engineering for credit card fraud detection using multi-perspective HMMs. 393-402
- Hua Liu, Cunquan Qu, Yawei Niu, Guanghui Wang:
The evolution of structural balance in time-varying signed networks. 403-408
- Jorge Bernal Bernabé, Martin David, Rafael Torres Moreno, Javier Presa Cordero, Sébastien Bahloul, Antonio F. Skarmeta:
ARIES: Evaluation of a reliable and privacy-preserving European identity management framework. 409-425
- Jorge González-Domínguez, Roberto R. Expósito, Verónica Bolón-Canedo:
CUDA-JMI: Acceleration of feature selection on heterogeneous systems. 426-436
- Abhinay Pandya, Mourad Oussalah, Paola Monachesi, Panos Kostakos:
On the use of distributed semantics of tweet metadata for user age prediction. 437-452
- Benjamin A. Steer, Félix Cuadrado, Richard G. Clegg:
Raphtory: Streaming analysis of distributed temporal graphs. 453-464
- Heejung Yu, Taejoon Kim:
Optimization of uplink rate and fronthaul compression in cloud radio access networks. 465-471
- Quanxin Zhang, Xiaosong Zhang, Yuan Xue, Jingjing Hu:
A stealthy covert storage channel for asymmetric surveillance VoLTE endpoints. 472-480
- Weilong Ding, Xuefei Wang, Zhuofeng Zhao:
CO-STAR: A collaborative prediction service for short-term trends on continuous spatio-temporal data. 481-493
- Han Bao, Yijie Wang, Fangliang Xu:
Reducing network cost of data repair in erasure-coded cross-datacenter storage. 494-506
- Ziyu Wang, Hui Yu, Zongyang Zhang, Jiaming Piao, Jianwei Liu:
ECDSA weak randomness in Bitcoin. 507-513
- Jie Tang, Shaoshan Liu, Jie Cao, Dawei Sun, Bolin Ding, Jean-Luc Gaudiot, Weisong Shi:
π-Hub: Large-scale video learning, storage, and retrieval on heterogeneous hardware platforms. 514-523
- Pradeep Kumar Roy, Jyoti Prakash Singh, Snehasish Banerjee:
Deep learning to filter SMS Spam. 524-533
- Zhenfeng Lei, Yuan Sun, Yaser Ahangari Nanehkaran, Shuangyuan Yang, Md. Saiful Islam, Huiqing Lei, Defu Zhang:
A novel data-driven robust framework based on machine learning and knowledge graph for disease classification. 534-548
- Gabriele Gianini, Leopold Ghemmogne Fossi, Corrado Mio, Olivier Caelen, Lionel Brunie, Ernesto Damiani:
Managing a pool of rules for credit card fraud detection by a Game Theory based approach. 549-561
- Yang Hu, Huan Zhou, Cees de Laat, Zhiming Zhao:
Concurrent container scheduling on heterogeneous clusters with multi-resource constraints. 562-573
- Naman Kabra, Pronaya Bhattacharya, Sudeep Tanwar, Sudhanshu Tyagi:
MudraChain: Blockchain-based framework for automated cheque clearance in financial institutions. 574-587
- Ying Zhang, Guohui Tian, Huanzhao Chen:
Exploring the cognitive process for service task in smart home: A robot service mechanism. 588-602
- Wei-Che Chien, Hung-Yen Weng, Chin-Feng Lai:
Q-learning based collaborative cache allocation in mobile edge computing. 603-610
- Heejung Yu, Il-Gu Lee:
Physical layer security based on NOMA and AJ for MISOSE channels with an untrusted relay. 611-618
- Chang Ruan, Jianxin Wang, Wanchun Jiang, Geyong Min, Yi Pan:
PTCP: A priority-based transport control protocol for timeout mitigation in commodity data center. 619-632
- Gianni D'Angelo, Francesco Palmieri:
Knowledge elicitation based on genetic programming for non destructive testing of critical aerospace systems. 633-642
- Ahmed Ghoneim, Ghulam Muhammad, M. Shamim Hossain:
Cervical cancer classification using convolutional neural networks and extreme learning machines. 643-649
- Khaldoon Dhou:
A new chain coding mechanism for compression stimulated by a virtual environment of a predator-prey ecosystem. 650-669
- Jibin Wang:
A deep learning approach for atrial fibrillation signals classification based on convolutional and modified Elman neural network. 670-679 - Souhila Benmakrelouf, Cédric St-Onge, Nadjia Kara, Hanine Tout, Claes Edstrom, Yves Lemieux:
Abnormal behavior detection using resource level to service level metrics mapping in virtualized systems. 680-700
- Jun Yang, Rui Wang, Xin Guan, Mohammad Mehedi Hassan, Ahmad Almogren, Ahmed Alsanad:
AI-enabled emotion-aware robot: The fusion of smart clothing, edge clouds and robotics. 701-709
- David W. Chadwick, Wenjun Fan, Gianpiero Costantino, Rogério de Lemos, Francesco Di Cerbo, Ian Herwono, Mirko Manea, Paolo Mori, Ali Sajjad, Xiao-Si Wang:
A cloud-edge based data security architecture for sharing and analysing cyber threat information. 710-722
- Vishal Sharma, Dushantha Nalin K. Jayakody, Marwa K. Qaraqe:
Osmotic computing-based service migration and resource scheduling in Mobile Augmented Reality Networks (MARN). 723-737
- Yulai Zhang, Yuchao Wang, Guiming Luo:
A new optimization algorithm for non-stationary time series prediction based on recurrent neural networks. 738-745
- Fabio Antonelli, Vittorio Cortellessa, Marco Gribaudo, Riccardo Pinciroli, Kishor S. Trivedi, Catia Trubiani:
Analytical modeling of performance indices under epistemic uncertainty applied to cloud computing systems. 746-761
- Yujiao Hu, Yuan Yao, Qian Ren, Xingshe Zhou:
3D multi-UAV cooperative velocity-aware motion planning. 762-774
- Stefano Forti, Gian-Luigi Ferrari, Antonio Brogi:
Secure Cloud-Edge Deployments, with Trust. 775-788
- Zhihua Li, Xinrong Yu, Lei Yu, Shujie Guo, Victor Chang:
Energy-efficient and quality-aware VM consolidation method. 789-809
- Peng Qin, Jingzhi Guo:
A novel machine natural language mediation for semantic document exchange in smart city. 810-826
- Muhammad Muzammal, Faima Abbasi, Qiang Qu, Romana Talat, Jianping Fan:
A decentralised approach for link inference in large signed graphs. 827-837
- Carla Vairetti, Eugenio Martínez-Cámara, Sebastián Maldonado, María Victoria Luzón, Francisco Herrera:
Enhancing the classification of social media opinions by optimizing the structural information. 838-846
- Haifeng Lu, Chunhua Gu, Fei Luo, Weichao Ding, Xinping Liu:
Optimization of lightweight task offloading strategy for mobile edge computing based on deep reinforcement learning. 847-861 - G. Sai Sesha Chalapathi, Vinay Chamola, Chen-Khong Tham, S. Gurunarayanan, Nirwan Ansari:
An optimal delay aware task assignment scheme for wireless SDN networked edge cloudlets. 862-875
- Youzhu Li, Huiling Zhou, Zhonglong Lin, Yifan Wang, Shunjie Chen, Chang Liu, Zhouyang Wang, Daniela Gîfu, Jingbo Xia:
Investigation in the influences of public opinion indicators on vegetable prices by corpora construction and WeChat article analysis. 876-888
- Matthias Korch, Tim Werner:
Improving locality of explicit one-step methods on GPUs by tiling across stages and time steps. 889-901
- Pengcheng Wei, Dahu Wang, Yu Zhao, Sumarga Kumar Sah Tyagi, Neeraj Kumar:
Blockchain data-based cloud data integrity protection mechanism. 902-911
- Guobiao He, Wei Su, Shuai Gao, Jiarui Yue:
TD-Root: A trustworthy decentralized DNS root management architecture based on permissioned blockchain. 912-924
- Yiming Miao, Gaoxiang Wu, Miao Li, Ahmed Ghoneim, Mabrook Al-Rakhami, M. Shamim Hossain:
Intelligent task prediction and computation offloading based on mobile-edge cloud computing. 925-931
- Fábio Lopes, João Agnelo, César A. D. Teixeira, Nuno Laranjeiro, Jorge Bernardino:
Automating orthogonal defect classification using machine learning algorithms. 932-947 - Chang Choi, Francesco Piccialli, Jason J. Jung:
Internet of Knowledge. 948-949 - Ansar-Ul-Haque Yasar, Haroon Malik, Elhadi M. Shakshuki:
Special issue on future networks & pervasive systems. 950-951 - Jeandro de Mesquita Bezerra, Antônio Janael Pinheiro, Críston P. de Souza, Divanilson R. Campelo:
Performance evaluation of elephant flow predictors in data center networking. 952-964 - Roberto Casado-Vara, Ángel Martín del Rey, Soffiene Affes, Javier Prieto, Juan M. Corchado:
IoT network slicing on virtual layers of homogeneous data for improved algorithm operation in smart buildings. 965-977
- Xiao-Li Sun, Hui Wang, Xin-Ke Li, Guo-Hong Cao, Yu Kuang, Xiao-Chen Zhang:
Monte Carlo computer simulation of a camera system for proton beam range verification in cancer treatment. 978-991
- Giuseppe Desolda, Maristella Matera, Rosa Lanzilotti:
Metamorphic data sources: A user-centric paradigm to consume linked data in interactive workspaces. 992-1015
- Maximilian Hanussek, Felix Bartusch, Jens Krüger:
BOOTABLE: Bioinformatics benchmark tool suite for applications and hardware. 1016-1026
- Sachi Nandan Mohanty, K. C. Ramya, S. Sheeba Rani, Deepak Gupta, K. Shankar, S. K. Lakshmanaprabu, Ashish Khanna:
An efficient Lightweight integrated Blockchain (ELIB) model for IoT security and privacy. 1027-1037
- Claudio Savaglio, Maria Ganzha, Marcin Paprzycki, Costin Badica, Mirjana Ivanovic, Giancarlo Fortino:
Agent-based Internet of Things: State-of-the-art and research challenges. 1038-1053
- Siyi Lv, Jinhui Ye, Sijie Yin, Xiaochun Cheng, Chen Feng, Xiaoyan Liu, Rui Li, Zhaohui Li, Zheli Liu, Li Zhou:
Unbalanced private set intersection cardinality protocol with low communication cost. 1054-1061
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.