


default search action
Future Generation Computer Systems, Volume 108
Volume 108, July 2020
- Bei Xu, Hai Zhuge:
The influence of semantic link network on the ability of question-answering system. 1-14
- Carlos Quinto Huamán
, Ana Lucila Sandoval Orozco, Luis Javier García-Villalba:
Authentication and integrity of smartphone videos through multimedia container structure analysis. 15-33
- Giancarlo Fortino, Lidia Fotia
, Fabrizio Messina, Domenico Rosaci
, Giuseppe M. L. Sarnè:
A meritocratic trust-based group formation in an IoT environment for smart cities. 34-45
- Shanay Behrad, Emmanuel Bertin, Stéphane Tuffin
, Noël Crespi:
A new scalable authentication and access control mechanism for 5G-based IoT. 46-61
- Hyunhee Park:
Adaptive Backoff enabled WUR on non-cellular local IoT for extreme low power operation. 62-67
- João J. C. Gondim
, Robson de Oliveira Albuquerque
, Ana Lucila Sandoval Orozco:
Mirror saturation in amplified reflection Distributed Denial of Service: A case of study using SNMP, SSDP, NTP and DNS protocols. 68-81
- Taesik Kim, Hong Min
, Eunsoo Choi, Jinman Jung
:
Optimal job partitioning and allocation for vehicular cloud computing. 82-96
- Soroush Ojagh
, Mohammad Reza Malek
, Sara Saeedi, Steve H. L. Liang:
A location-based orientation-aware recommender system using IoT smart devices and Social Networks. 97-118
- Jia Luo
, Didier El Baz, Rui Xue, Jinglu Hu:
Solving the dynamic energy aware job shop scheduling problem with the heterogeneous parallel genetic algorithm. 119-134
- Eric Ke Wang, Chien-Ming Chen
, Mohammad Mehedi Hassan, Ahmad Almogren
:
A deep learning based medical image segmentation technique in Internet-of-Medical-Things domain. 135-144
- Jie Lin, Biao Xiao, Hanlin Zhang, Xinyu Yang, Peng Zhao:
A novel multitype-users welfare equilibrium based real-time pricing in smart grid. 145-160 - Filip Petrovic, David Strelák, Jana Hozzová, Jaroslav Olha
, Richard Trembecký, Siegfried Benkner
, Jiri Filipovic:
A benchmark set of highly-efficient CUDA and OpenCL kernels and its dynamic autotuning with Kernel Tuning Toolkit. 161-177
- Quentin Rouland
, Brahim Hamid
, Jason Jaskolka
:
Formal specification and verification of reusable communication models for distributed systems architecture. 178-197
- Tao Han, Roberto F. Ivo, Douglas de A. Rodrigues, Solon Alves Peixoto
, Victor Hugo C. de Albuquerque, Pedro Pedrosa Rebouças Filho:
Cascaded Volumetric Fully Convolutional Networks for Whole-Heart and Great Vessel 3D segmentation. 198-209
- Mirko D'Angelo, Mauro Caporuscio
, Vincenzo Grassi, Raffaela Mirandola
:
Decentralized learning for self-adaptive QoS-aware service assembly. 210-227
- Daniel G. Costa
, Felipe P. de Oliveira:
A prioritization approach for optimization of multiple concurrent sensing applications in smart cities. 228-243
- Lingling Zhang, Hong Jiang, Fang Wang, Dan Feng, Yanwen Xie:
Reservoir-based sampling over large graph streams to estimate triangle counts and node degrees. 244-255
- Giuseppe Rizzo, Nicola Fanizzi, Claudia d'Amato
:
Class expression induction as concept space exploration: From DL-Foil to DL-Focl. 256-272
- Yifan Chen, Zhiyong Li, Bo Yang
, Ke Nai, Keqin Li:
A Stackelberg game approach to multiple resources allocation and pricing in mobile edge computing. 273-287 - Nicola Mc Donnell, Enda Howley
, Jim Duggan:
Dynamic virtual machine consolidation using a multi-agent system to optimise energy efficiency in cloud computing. 288-301 - Seyed Asgary Ghasempouri, Behrouz Tork Ladani
:
Model checking of robustness properties in trust and reputation systems. 302-319 - Ashish Kumar Sahu
, Pragya Dwivedi
:
Knowledge transfer by domain-independent user latent factor for cross-domain recommender systems. 320-333 - Ashwin T. S., Ram Mohana Reddy Guddeti
:
Affective database for e-learning and classroom environments using Indian students' faces, hand gestures and body postures. 334-348 - Chia-Cheng Hu:
Minimizing executing and transmitting time of task scheduling and resource allocation in C-RANs. 349-360
- Ding Ding, Xiaocong Fan, Yihuan Zhao, Kaixuan Kang, Qian Yin, Jing Zeng:
Q-learning based dynamic task scheduling for energy-efficient cloud computing. 361-371
- Budan Wu, Ran Liu, Rongheng Lin, Junliang Chen:
A distributed business process fragmentation method based on community discovery. 372-389
- Xinyao Liu, Baojiang Cui, Junsong Fu, Jinxin Ma:
HFuzz: Towards automatic fuzzing testing of NB-IoT core network protocols implementations. 390-400
- Ghita Berrada
, James Cheney
, Sidahmed Benabderrahmane
, William Maxwell, Himan Mookherjee, Alec Theriault, Ryan Wright:
A baseline for unsupervised advanced persistent threat detection in system-level provenance. 401-413
- Yahya Al-Hadhrami, Farookh Khadeer Hussain:
Real time dataset generation framework for intrusion detection systems in IoT. 414-423
- Yousung Yang, Joohyung Lee, Nakyoung Kim, Kwihoon Kim:
Social-viewport adaptive caching scheme with clustering for virtual reality streaming in an edge computing platform. 424-431 - Karam M. Sallam
, Ripon Kumar Chakrabortty
, Michael J. Ryan:
A two-stage multi-operator differential evolution algorithm for solving Resource Constrained Project Scheduling problems. 432-444
- Kuo-Chi Chang, Kai-Chun Chu, Hsiao-Chuan Wang, Yuh-Chung Lin, Jeng-Shyang Pan
:
Agent-based middleware framework using distributed CPS for improving resource utilization in smart city. 445-453
- Javier Palanca, Jaume Jordán
, Javier Bajo, Vicent J. Botti:
An energy-aware algorithm for electric vehicle infrastructures in smart cities. 454-466
- Aaisha Makkar
, Neeraj Kumar
:
An efficient deep learning-based scheme for web spam detection in IoT environment. 467-487
- Hsing-Chung Chen
, Karisma Trinanda Putra, Shian-Shyong Tseng, Chin-Ling Chen, Jerry Chun-Wei Lin
:
A spatiotemporal data compression approach with low transmission cost and high data fidelity for an air quality monitoring system. 488-500
- Shenglong Peng, Liang Zhou, Xuan He, Junyi Du:
GPS-aided inter-microcell interference avoidance for request-transmission splitting slotted ALOHA-based scheme in smart cities with connected vehicles. 501-511 - Daming Li, Lianbing Deng, Wenjian Liu, Su Qinglang:
Improving communication precision of IoT through behavior-based learning in smart city environment. 512-520
- Zhaonian Tan, Weixing Ji, Jianhua Gao
, Yueyan Zhao, Akrem Benatia, Yizhuo Wang, Feng Shi:
MMSparse: 2D partitioning of sparse matrix based on mathematical morphology. 521-532
- Chaolong Zhang
, Yigang He, Bolun Du, Lifen Yuan, Bing Li, Shanhe Jiang:
Transformer fault diagnosis method using IoT based monitoring system and ensemble machine learning. 533-545
- Shaojun Zou, Jiawei Huang, Wanchun Jiang, Jianxin Wang:
Achieving high utilization of flowlet-based load balancing in data center networks. 546-559 - Jitae Yun, Su-Kyung Yoon, Jeong-Geun Kim, Shin-Dug Kim:
Access pattern-based high-performance main memory system for graph processing on single machines. 560-573
- Wenbo Zhang, Zonglin Wu, Guangjie Han
, Yongxin Feng, Lei Shu:
LDC: A lightweight dada consensus algorithm based on the blockchain for the industrial Internet of Things for smart city applications. 574-582
- Mohamed Adel Serhani, Hadeel T. El Kassabi, Khaled Shuaib, Alramzana Nujum Navaz
, Boualem Benatallah
, Amin Beheshti
:
Self-adapting cloud services orchestration for fulfilling intensive sensory data-driven IoT workflows. 583-597 - Nan Wang, Michail Matthaiou
, Dimitrios S. Nikolopoulos, Blesson Varghese:
DYVERSE: DYnamic VERtical Scaling in multi-tenant Edge environments. 598-612 - Saqib Qamar
, Hai Jin, Ran Zheng, Parvez Ahmad
, Mohd Usama
:
A variant form of 3D-UNet for infant brain segmentation. 613-623 - Dmitrii Chemodanov, Flavio Esposito, Prasad Calyam, Andrei M. Sukhov
:
REBATE: A REpulsive-BAsed Traffic Engineering protocol for dynamic scale-free networks. 624-635 - Timothy A. Chadza, Konstantinos G. Kyriakopoulos, Sangarapillai Lambotharan:
Analysis of hidden Markov model learning algorithms for the detection and prediction of multi-stage network attacks. 636-649 - Yanghao Xie
, Sheng Wang, Yueyue Dai:
Revenue-maximizing virtualized network function chain placement in dynamic environment. 650-661 - Chaoze Lu, Guosun Zeng, Ying-jie Xie:
Bigraph specification of software architecture and evolution analysis in mobile computing environment. 662-676
- Ying Gao, Xiaoqiang Wu, Wei Yan, Lei Zhang, Tunhua Wu:
Dynamic network embedding enhanced advisor-advisee relationship identification based on internet of scholars. 677-686
- Zafar Iqbal, Zahid Anwar:
SCERM - A novel framework for automated management of cyber threat response activities. 687-708
- Wenjing Xiao, Miao Li, Min Chen, Ahmed Barnawi:
Deep interaction: Wearable robot-assisted emotion communication for enhancing perception and expression ability of children with Autism Spectrum Disorders. 709-716
- Eslam B. Ali
, Sherif S. Kishk
, Ehab H. Abdelhay
:
Multidimensional auction for task allocation using computation offloading in fifth generation networks. 717-725
- Feras M. Awaysheh, Mamoun Alazab
, Maanak Gupta, Tomás F. Pena, José Carlos Cabaleiro
:
Next-generation big data federation access control: A reference model. 726-741
- Rasoul Rahmani, Irene Moser, Antonio L. Cricenti:
Modelling and optimisation of microgrid configuration for green data centres: A metaheuristic approach. 742-750
- Faten Fakhfakh, Mohamed Tounsi
, Mohamed Mosbah
:
Modeling and Proving Distributed Algorithms for Dynamic Graphs. 751-761
- Dario Madeo, Somnath Mazumdar
, Chiara Mocenni
, Roberto Zingone:
Evolutionary game for task mapping in resource constrained heterogeneous environments. 762-776
- Omowunmi E. Isafiade, Antoine B. Bagula:
Series mining for public safety advancement in emerging smart cities. 777-802
- Sandhya Mishra
, Devpriya Soni:
Smishing Detector: A security model to detect smishing through SMS content analysis and URL behavior analysis. 803-815
- Adnan Sajid, Bilal Khalid, Mudassar Ali, Shahid Mumtaz
, Usman Masud
, Farhan Qamar
:
Securing Cognitive Radio Networks using blockchains. 816-826
- Damian Arellanes
, Kung-Kiu Lau:
Evaluating IoT service composition mechanisms for the scalability of IoT systems. 827-848 - D. Pradeep
, C. Sundar:
QAOC: Novel query analysis and ontology-based clustering for data management in Hadoop. 849-860 - Lassana Coulibaly
, Bernard Kamsu-Foguem, Fana Tangara
:
Rule-based machine learning for knowledge discovering in weather data. 861-878
- Paolo Bellavista
, Kaoru Ota
, Zhihan Lv
, Irfan Mehmood, Seungmin Rho:
Towards smarter cities: Learning from Internet of Multimedia Things-generated big data. 879-881 - Marisol García-Valls
, Christian Calva-Urrego, Ana García-Fornes
:
Accelerating smart eHealth services execution at the fog computing infrastructure. 882-893 - Bo-Wei Chen:
Incomplete data classification - Fisher Discriminant Ratios versus Welch Discriminant Ratios. 894-908 - Aakanksha Tewari, Brij B. Gupta
:
Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework. 909-920 - Anish Jindal
, Neeraj Kumar
, Mukesh Singh:
A unified framework for big data acquisition, storage, and analytics for demand response management in smart cities. 921-934 - Shabir A. Parah
, Javaid A. Sheikh
, Jahangir A. Akhoon, Nazir A. Loan:
Electronic Health Record hiding in Images for smart city applications: A computationally efficient and reversible information hiding technique for secure communication. 935-949 - Maitreyee Dey
, Soumya Prakash Rana
, Sandra E. M. Dudley
:
Smart building creation in large scale HVAC environments through automated fault detection and diagnosis. 950-966 - Shangguang Wang
, Chuntao Ding, Ching-Hsien Hsu, Fangchun Yang:
Dimensionality reduction via preserving local information. 967-975 - Jiachen Yang, Yurong Han, Yafang Wang, Bin Jiang, Zhihan Lv
, Houbing Song
:
Optimization of real-time traffic network assignment based on IoT data using DBN and clustering model in smart city. 976-986 - Yicong Gao, Zixian Zhang, Yixiong Feng, Maria Savchenko, Ichiro Hagiwara, Hao Zheng:
Flexible mesh morphing in sustainable design using data mining and mesh subdivision. 987-994 - Muhammad Sajjad, Mansoor Nasir, Khan Muhammad
, Siraj Khan, Zahoor Jan, Arun Kumar Sangaiah
, Mohamed Elhoseny
, Sung Wook Baik
:
Raspberry Pi assisted face recognition framework for enhanced law-enforcement services in smart cities. 995-1007 - Rahul Raman
, Pankaj Kumar Sa
, Sambit Bakshi
, Banshidhar Majhi:
Kinesiology-inspired estimation of pedestrian walk direction for smart surveillance. 1008-1026 - Rajiv Ranjan, Lydia Y. Chen, Prem Prakash Jayaraman
, Albert Y. Zomaya
:
A note on advances in scheduling algorithms for Cyber-Physical-Social workflows. 1027-1029 - Reem Y. Ali, Shashi Shekhar, Shounak Athavale, Eric D. Marsman
:
ULAMA: A Utilization-Aware Matching Approach for robust on-demand spatial service brokers. 1030-1048 - Shangguang Wang
, Yan Guo, Yan Li, Ching-Hsien Hsu:
Cultural distance for service composition in cyber-physical-social systems. 1049-1057 - Anish Jindal
, Neeraj Kumar
, Mukesh Singh:
Internet of energy-based demand response management scheme for smart homes and PHEVs using SVM. 1058-1068 - Shijian Li, Minhao Shi, Runhe Huang, Xinwei Chen, Gang Pan
:
Perception-enhancement based task learning and action scheduling for robotic limb in CPS environment. 1069-1083 - Yiping Wen, Jianxun Liu, Wanchun Dou, Xiaolong Xu
, Buqing Cao, Jinjun Chen:
Scheduling workflows with privacy protection constraints for big data applications on cloud. 1084-1091 - Gonzalo De La Torre Parra, Paul Rad, Kim-Kwang Raymond Choo
:
Driverless vehicle security: Challenges and future research opportunities. 1092-1111 - Hong Yao, Muzhou Xiong, Hui Li, Lin Gu, Deze Zeng:
Joint optimization of function mapping and preemptive scheduling for service chains in network function virtualization. 1112-1118 - Liwei Huang, Yutao Ma
, Yanbo Liu, Arun Kumar Sangaiah
:
Multi-modal Bayesian embedding for point-of-interest recommendation on location-based cyber-physical-social networks. 1119-1128 - Jian Shen
, Chen Wang
, Anxi Wang
, Qi Liu, Yang Xiang
:
Moving centroid based routing protocol for incompletely predictable cyber devices in Cyber-Physical-Social Distributed Systems. 1129-1139 - Chinnapong Angsuchotmetee
, Richard Chbeir, Yudith Cardinale
:
MSSN-Onto: An ontology-based approach for flexible event processing in Multimedia Sensor Networks. 1140-1158 - Henri E. Bal, Arindam Pal:
Parallel and Distributed Machine Learning Algorithms for Scalable Big Data Analytics. 1159-1161 - Nitin A. Gawande
, Jeff A. Daily
, Charles Siegel, Nathan R. Tallent, Abhinav Vishnu:
Scaling Deep Learning workloads: NVIDIA DGX-1/Pascal and Intel Knights Landing. 1162-1172 - Thomas P. Parnell, Celestine Dünner, Kubilay Atasu
, Manolis Sifalakis
, Haralampos Pozidis:
Tera-scale coordinate descent on GPUs. 1173-1191 - Jing Chen, Jianbin Fang
, Weifeng Liu
, Tao Tang, Canqun Yang:
clMF: A fine-grained and portable alternating least squares algorithm for parallel matrix factorization. 1192-1205 - Yuchen Qiao, Kazuma Hashimoto, Akiko Eriguchi, Haixia Wang, Dongsheng Wang, Yoshimasa Tsuruoka, Kenjiro Taura
:
Parallelizing and optimizing neural Encoder-Decoder models without padding on multi-core architecture. 1206-1213 - Yin Zhang
, Haider Abbas
:
Special issue: Cognitive Internet of Things assisted by cloud computing and big data. 1214-1216 - Ziad A. Al-Sharif
, Mohammed I. Al-Saleh
, Luay Alawneh
, Yaser Jararweh, Brij B. Gupta
:
Live forensics of software attacks on cyber-physical systems. 1217-1229 - Yan Hu, Hong Li, Tom H. Luan
, An Yang
, Limin Sun, Zhiliang Wang, Rui Wang:
Detecting stealthy attacks on industrial control systems using a permutation entropy-based method. 1230-1240 - Valentin Tudor
, Vincenzo Gulisano
, Magnus Almgren
, Marina Papatriantafilou:
BES: Differentially private event aggregation for large-scale IoT-based systems. 1241-1257 - Weizhi Meng
, Wenjuan Li
, Yu Wang
, Man Ho Au
:
Detecting insider attacks in medical cyber-physical networks based on behavioral profiling. 1258-1266 - Sravani Challa, Ashok Kumar Das
, Prosanta Gope, Neeraj Kumar
, Fan Wu
, Athanasios V. Vasilakos
:
Design and analysis of authenticated key agreement scheme in cloud-assisted cyber-physical systems. 1267-1286 - Jian Xu
, Laiwen Wei, Wei Wu, Andi Wang, Yu Zhang, Fucai Zhou:
Privacy-preserving data integrity verification by using lightweight streaming authenticated data structures for healthcare cyber-physical system. 1287-1296 - Tianqing Zhu, Ping Xiong, Gang Li
, Wanlei Zhou
, Philip S. Yu:
Differentially private model publishing in cyber physical systems. 1297-1306 - Tianqi Zhou, Jian Shen
, Xiong Li
, Chen Wang
, Haowen Tan
:
Logarithmic encryption scheme for cyber-physical systems employing Fibonacci Q-matrix. 1307-1313 - Heng Ye, Jiqiang Liu, Wei Wang, Ping Li, Tong Li, Jin Li:
Secure and efficient outsourcing differential privacy data release scheme in Cyber-physical system. 1314-1323 - Yiting Zhang, Ming Yang, Zhen Ling
, Yaowen Liu, Wenjia Wu:
FingerAuth: 3D magnetic finger motion pattern based implicit authentication for mobile devices. 1324-1337 - Zhiwei Zhang, Xiaofeng Chen, Jianfeng Ma, Jian Shen
:
SLDS: Secure and location-sensitive data sharing scheme for cloud-assisted Cyber-Physical Systems. 1338-1349 - (Withdrawn) Erratum to "Smart health monitoring and management system: Toward autonomous wearable sensing for Internet of Things using big data analytics [Future Gener. Comput. Syst. 91 (2019) 611-619]". 1350-1359

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.