default search action
Future Generation Computer Systems, Volume 101
Volume 101, December 2019
- Paul Martin, Laurent Remy, Maria Theodoridou, Keith G. Jeffery, Zhiming Zhao:
Mapping heterogeneous research infrastructure metadata into a unified catalogue for use in a generic virtual research environment. 1-13
- Alireza Keshavarzian, Saeed Sharifian, Sanaz Seyedin:
Modified deep residual network architecture deployed on serverless framework of IoT platform based on human activity recognition application. 14-28
- Lingyue Zhang, Huilin Li, Yannan Li, Yong Yu, Man Ho Au, Baocang Wang:
An efficient linkable group signature for payer tracing in anonymous cryptocurrencies. 29-38
- Yiping Wen, Zhibin Wang, Yu Zhang, Jianxun Liu, Buqing Cao, Jinjun Chen:
Energy and cost aware scheduling with batch processing for instance-intensive IoT workflows in clouds. 39-50
- Ada Bagozi, Devis Bianchini, Valeria De Antonellis, Massimiliano Garda, Alessandro Marini:
A Relevance-based approach for Big Data Exploration. 51-69 - Jun Zhou, Zhenfu Cao, Xiaolei Dong, Thanos Vasilakos:
GTSIM-POP: Game theory based secure incentive mechanism and patient-optimized privacy-preserving packet forwarding scheme in m-healthcare social networks. 70-82 - Khaled Hejja, Xavier Hesselbach:
Evaluating impacts of traffic migration and virtual network functions consolidation on power aware resource allocation algorithms. 83-98
- Tamás Kiss, James DesLauriers, Gregoire Gesmier, Gábor Terstyánszky, Gabriele Pierantoni, Osama Abu Oun, Simon J. E. Taylor, Anastasia Anagnostou, József Kovács:
A cloud-agnostic queuing system to support the implementation of deadline-based application execution policies. 99-111
- Faezeh Sadat Babamir, Murvet Kirci:
Dynamic digest based authentication for client-server systems using biometric verification. 112-126 - Yongkai Fan, Xiaodong Lin, Wei Liang, Gang Tan, Priyadarsi Nanda:
A secure privacy preserving deduplication scheme for cloud computing. 127-135
- Liyakathunisa Syed, Saima Jabeen, Manimala S., Abdullah Alsaeedi:
Smart healthcare framework for ambient assisted living using IoMT and big data analytics techniques. 136-151
- Abduljawad A. Amory, Ghulam Muhammad, Hassan Mathkour:
Deep convolutional tree networks. 152-168 - Yingmo Jie, Kim-Kwang Raymond Choo, Mingchu Li, Ling Chen, Cheng Guo:
Tradeoff gain and loss optimization against man-in-the-middle attacks based on game theoretic model. 169-179
- Mohamed Hammad, Shanzhuo Zhang, Kuanquan Wang:
A novel two-dimensional ECG feature extraction and classification algorithm based on convolution neural network for human authentication. 180-196
- Chengxi Huang, Hongming Cai, Lida Xu, Boyi Xu, Yizhi Gu, Lihong Jiang:
Data-driven ontology generation and evolution towards intelligent service in manufacturing systems. 197-207
- Rafael Ferreira da Silva, Scott Callaghan, Tu Mai Anh Do, George Papadimitriou, Ewa Deelman:
Measuring the impact of burst buffers on data-intensive scientific workflows. 208-220
- Mohammad Reza Shahmoradi, Morteza Ebrahimi, Zainabolhoda Heshmati, Mostafa Salehi:
Multilayer overlapping community detection using multi-objective optimization. 221-235
- Huibing Zhang, Hao Zhong, Weihua Bai, Fang Pan:
Cross-platform rating prediction method based on review topic. 236-245
- Mario Barbareschi, Alessandra De Benedictis, Erasmo La Montagna, Antonino Mazzeo, Nicola Mazzocca:
A PUF-based mutual authentication scheme for Cloud-Edges IoT systems. 246-261
- Hong Zhang, Hai Huang, Liqiang Wang:
Meteor: Optimizing spark-on-yarn for short applications. 262-271
- Rolando Martins, Manuel Eduardo Correia, Luís Antunes, Fernando Silva:
Iris: Secure reliable live-streaming with opportunistic mobile edge cloud offloading. 272-292
- Antoine Cabana, Christophe Charrier, Alain Louis:
Mono and multi-modal biometric systems assessment by a common black box testing framework. 293-303
- Mohammad Hosseinpour, Mohammad Reza Malek, Christophe Claramunt:
Socio-spatial influence maximization in location-based social networks. 304-314
- Haiyu Wang, Xuelian Li, Juntao Gao, Wei Li:
MOBT: A kleptographically-secure hierarchical-deterministic wallet for multiple offline Bitcoin transactions. 315-326
- Chunlin Li, Hezhi Sun, Yi Chen, Youlong Luo:
Edge cloud resource expansion and shrinkage based on workload for minimizing the cost. 327-340
- Muhammad Raza, Farookh Khadeer Hussain, Omar Khadeer Hussain, Ming Zhao, Zia ur Rehman:
A comparative analysis of machine learning models for quality pillar assessment of SaaS services by multi-class text classification of users' reviews. 341-371
- Claire Stirm, Rich Zink, Sandra Gesing, Michael G. Zentner, Damion Junk:
REMEDI central - expanding and sustaining a medical device community. 372-380
- Yoan Gutiérrez, David Tomás, Isabel Moreno:
Developing an ontology schema for enriching and linking digital media assets. 381-397
- Awais Khan, Taeuk Kim, Hyunki Byun, Youngjae Kim:
SciSpace: A scientific collaboration workspace for geo-distributed HPC data centers. 398-409
- Aniseh Najafi, Hamid Haj Seyyed Javadi, Majid Bayat:
Verifiable ranked search over encrypted data with forward and backward privacy. 410-419
- Sehrish Shafeeq, Masoom Alam, Abid Khan:
Privacy aware decentralized access control system. 420-433
- Xiangming Wang, Dong Yang, Xin Jian, Min Chen, Joze Guna:
Performance analysis and optimization for coverage enhancement strategy of Narrow-band Internet of Things. 434-443
- Haidong Luo, Hongming Cai, Han Yu, Yan Sun, Zhuming Bi, Lihong Jiang:
A short-term energy prediction system based on edge computing for smart city. 444-457
- Wei-Ho Chung, Mu-En Wu, Yeong-Luh Ueng, Yu-Hsuan Su:
Seal imprint verification via feature analysis and classifications. 458-466
- Raylin Tso:
Two-in-one oblivious signatures. 467-475
- Bander Ali Saleh Al-rimy, Mohd Aizaini Maarof, Syed Zainudeen Mohd Shaid:
Crypto-ransomware early detection model using novel incremental bagging with enhanced semi-random subspace selection. 476-491 - Guolong Shi, Yigang He, Bing Li, Lei Zuo, Baiqiang Yin, Wenbo Zeng, Farhan Ali:
Analysis and modeling of wireless channel characteristics for Internet of Things scene based on geometric features. 492-501 - Caesar Wu, Rajkumar Buyya, Kotagiri Ramamohanarao:
Value-based cloud price modeling for segmented business to business market. 502-523
- Kai Fan, Shili Sun, Zheng Yan, Qiang Pan, Hui Li, Yintang Yang:
A blockchain-based clock synchronization Scheme in IoT. 524-533
- Silvio Barra, Aniello Castiglione, Fabio Narducci, Maria De Marsico, Michele Nappi:
Biometric data on the edge for secure, smart and user tailored access to cloud services. 534-541
- Syed Umar Amin, Mansour Alsulaiman, Ghulam Muhammad, Mohamed Amine Mekhtiche, M. Shamim Hossain:
Deep Learning for EEG motor imagery classification based on multi-layer CNNs feature fusion. 542-554
- Massimiliano Assante, Leonardo Candela, Donatella Castelli, Roberto Cirillo, Gianpaolo Coro, Luca Frosini, Lucio Lelii, Francesco Mangiacrapa, Pasquale Pagano, Giancarlo Panichi, Fabio Sinibaldi:
Enacting open science by D4Science. 555-563
- Qinghua Lu, Xiwei Xu, Yue Liu, Ingo Weber, Liming Zhu, Weishan Zhang:
uBaaS: A unified blockchain as a service platform. 564-575
- Justin M. Wozniak, Matthieu Dorier, Robert B. Ross, Tong Shu, Tahsin M. Kurç, Li Tang, Norbert Podhorszki, Matthew Wolf:
MPI jobs within MPI jobs: A practical way of enabling task-level fault-tolerance in HPC workflows. 576-589
- Chunlin Li, Chengyi Wang, Hengliang Tang, Youlong Luo:
Scalable and dynamic replica consistency maintenance for edge-cloud system. 590-604
- Antonio J. Sánchez, Sara Rodríguez, Fernando de la Prieta, Alfonso González-Briones:
Adaptive interface ecosystems in smart cities control systems. 605-620 - Seyed Farhad Aghili, Hamid Mala, Pallavi Kaliyar, Mauro Conti:
SecLAP: Secure and lightweight RFID authentication protocol for Medical IoT. 621-634
- Aimin Yang, Yifan Li, Chenshuai Liu, Jie Li, Yuzhu Zhang, Jiahao Wang:
Research on logistics supply chain of iron and steel enterprises based on block chain technology. 635-645
- Fatma A. Hashim, Essam H. Houssein, Mai S. Mabrouk, Walid Al-Atabany, Seyedali Mirjalili:
Henry gas solubility optimization: A novel physics-based algorithm. 646-667 - Rongbo Shen, Kezhou Yan, Kuan Tian, Cheng Jiang, Ke Zhou:
Breast mass detection from the digitized X-ray mammograms based on the combination of deep active learning and self-paced learning. 668-679 - Guosun Zeng, Huanliang Xiong, Canghai Wu:
A scalable method of parallel tasks after the extension of machine systems based on equal change rate. 680-693
- Wenting Li, Ping Wang:
Two-factor authentication in industrial Internet-of-Things: Attacks, evaluation and new construction. 694-708
- Daniele Riboni, Marta Murtas:
Sensor-based activity recognition: One picture is worth a thousand words. 709-722
- Kanishk Chaturvedi, Andreas Matheus, Son H. Nguyen, Thomas H. Kolbe:
Securing Spatial Data Infrastructures for Distributed Smart City applications and services. 723-736
- Melchizedek I. Alipio, Alex Gyran A. Co, Melinda Faye C. Hilario, Christian Miguel C. Pama:
Value-based utility implementation in software-defined testbed for sensor data traffic management. 737-746
- Petar Kochovski, Sandi Gec, Vlado Stankovski, Marko Bajec, Pavel D. Drobintsev:
Trust management in a blockchain based fog computing platform with trustless smart oracles. 747-759
- Md. Rafiul Hassan, Md Sarwar Morshedul Haque, Muhammad Imtiaz Hossain, Mohammad Mehedi Hassan, Abdulhameed Alelaiwi:
A novel cascaded deep neural network for analyzing smart phone data for indoor localization. 760-769
- Massimo Cafaro, Italo Epicoco, Marco Pulimeno:
CMSS: Sketching based reliable tracking of large network flows. 770-784
- Kiran Ahuja, Arun Khosla:
A novel framework for data acquisition and ubiquitous communication provisioning in smart cities. 785-803
- Ning Wang, Zhigang Wang, Yu Gu, Yubin Bao, Ge Yu:
TSH: Easy-to-be distributed partitioning for large-scale graphs. 804-818
- Kevin Atighehchi, Loubna Ghammam, Morgan Barbier, Christophe Rosenberger:
GREYC-Hashing: Combining biometrics and secret for enhancing the security of protected templates. 819-830
- Xue Ouyang, Changjian Wang, Jie Xu:
Mitigating stragglers to avoid QoS violation for time-critical applications through dynamic server blacklisting. 831-842
- Rasheed Hussain, Fatima Hussain, Sherali Zeadally:
Integration of VANET and 5G Security: A review of design and implementation issues. 843-864
- Liang Liu, Zuchao Ma, Weizhi Meng:
Detection of multiple-mix-attack malicious nodes using perceptron-based trust in IoT networks. 865-879
- Zhaomeng Zhu, Xueyan Tang:
Deadline-constrained workflow scheduling in IaaS clouds with multi-resource packing. 880-893
- Peng Cheng, Yutong Lu, Yunfei Du, Zhiguang Chen:
Tiered data management system: Accelerating data processing on HPC systems. 894-908
- Visnja Simic, Boban S. Stojanovic, Milos R. Ivanovic:
Optimizing the performance of optimization in the cloud environment-An intelligent auto-scaling approach. 909-920
- Omid Tarkhaneh, Irene Moser:
An improved differential evolution algorithm using Archimedean spiral and neighborhood search based mutation approach for cluster analysis. 921-939
- Samir Awad, Abdelhamid Malki, Mimoun Malki, Mahmoud Barhamgi, Djamal Benslimane:
Composing WoT services with uncertain data. 940-950
- Sandra Gesing, Maytal Dahan, Michael G. Zentner, Nancy Wilkins-Diehr, Katherine A. Lawrence:
The Science Gateways Community Institute: Collaborations and efforts on international scale. 951-958
- Ahmet Cihat Baktir, Betül Ahat, Necati Aras, Atay Ozgovde, Cem Ersoy:
SLA-aware optimal resource allocation for service-oriented networks. 959-974
- Polona Stefanic, Matej Cigale, Andrew C. Jones, Louise Knight, Ian J. Taylor:
Support for full life cycle cloud-native application management: Dynamic TOSCA and SWITCH IDE. 975-982
- Vincenzo Loia, Francesco Orciuoli:
Understanding the composition and evolution of terrorist group networks: A rough set approach. 983-992
- George Baryannis, Samir Dani, Grigoris Antoniou:
Predicting supply chain risks using machine learning: The trade-off between performance and interpretability. 993-1004 - Zequn Wei, Jin-Kao Hao:
Iterated two-phase local search for the Set-Union Knapsack Problem. 1005-1017
- Weizhi Meng, Liqiu Zhu, Wenjuan Li, Jinguang Han, Yan Li:
Enhancing the security of FinTech applications with map-based graphical password authentication. 1018-1027
- Haiping Si, Changxia Sun, Yanling Li, Hongbo Qiao, Lei Shi:
IoT information sharing security mechanism based on blockchain technology. 1028-1040
- Madalena Pereira da Silva, Alexandre Leopoldo Gonçalves, Mário Antônio Ribeiro Dantas:
A conceptual model for quality of experience management to provide context-aware eHealth services. 1041-1061
- Xiaohui Wei, Yuanyuan Liu, Xingwang Wang, Bingyi Sun, Shang Gao, Jon G. Rokne:
A survey on quality-assurance approximate stream processing and applications. 1062-1080
- Yasser Aldwyan, Richard O. Sinnott:
Latency-aware failover strategies for containerized web applications in distributed clouds. 1081-1095
- Karam Bou Chaaya, Mahmoud Barhamgi, Richard Chbeir, Philippe Arnould, Djamal Benslimane:
Context-aware System for Dynamic Privacy Risk Inference: Application to smart IoT environments. 1096-1111
- Asfa Toor, Saif ul Islam, Nimra Sohail, Adnan Akhunzada, Jalil Boudjadar, Hasan Ali Khattak, Ikram Ud Din, Joel J. P. C. Rodrigues:
Energy and performance aware fog computing: A case of DVFS and green renewable energy. 1112-1121 - Jian Chen, Zhihan Lv, Houbing Song:
Design of personnel big data management system based on blockchain. 1122-1129
- Yu Lu, Yingjian Qi, Xianghua Fu:
A framework for intelligent analysis of digital cardiotocographic signals from IoMT-based foetal monitoring. 1130-1141
- Yongsheng Hao, Jie Cao, Tinghuai Ma, Sai Ji:
Adaptive energy-aware scheduling method in a meteorological cloud. 1142-1157 - Ahmed Suliman, Hadi Otrok, Rabeb Mizouni, Shakti Singh, Anis Ouali:
A greedy-proof incentive-compatible mechanism for group recruitment in mobile crowd sensing. 1158-1167 - Wenying Yue, Peng Du, Xiongwen Quan, Ying Chen:
A new strategy based on approximate dynamic programming to maximize the net revenue of IaaS cloud providers with limited resources. 1168-1186 - Kekun Hu, Guosun Zeng:
Placing big graph into cloud for parallel processing with a two-phase community-aware approach. 1187-1200 - Elton Figueiredo de S. Soares, Carlos Alberto Vieira Campos, Sidney C. de Lucena:
Online travel mode detection method using automated machine learning and feature engineering. 1201-1212 - Woongsoo Na, Demeke Shumeye Lakew, Jihoon Lee, Sungrae Cho:
Congestion control vs. link failure: TCP behavior in mmWave connected vehicular networks. 1213-1222
- Tanya Koohpayeh Araghi, Azizah Abd Manaf:
An enhanced hybrid image watermarking scheme for security of medical and non-medical images based on DWT and 2-D SVD. 1223-1246
- Md. Shamsul Huda, Jemal H. Abawajy, Baker Al-Rubaie, Lei Pan, Mohammad Mehedi Hassan:
Automatic extraction and integration of behavioural indicators of malware for protection of cyber-physical networks. 1247-1258
- Meenakshi Choudhary, Vivek Tiwari, Venkanna U.:
An approach for iris contact lens detection and classification using ensemble of customized DenseNet and SVM. 1259-1270
- Georgios Bouloukakis, Nikolaos Georgantas, Patient Ntumba, Valérie Issarny:
Automated synthesis of mediators for middleware-layer protocol interoperability in the IoT. 1271-1294
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.