


default search action
Future Generation Computer Systems, Volume 102
Volume 102, January 2020
- Wenlong Chen, Heyang Chen, Zhiliang Wang, Chengan Zhao, Mingwei Xu, Ke Xu, Yingya Guo:

Congestion avoidance transmission mechanism based on two-dimensional forwarding. 1-13
- Eric Ke Wang, Chien-Ming Chen

, Siu-Ming Yiu, Mohammad Mehedi Hassan, Majed A. AlRubaian, Giancarlo Fortino:
Incentive evolutionary game model for opportunistic social networks. 14-29
- Harkeerat Kaur, Pritee Khanna

:
Privacy preserving remote multi-server biometric authentication using cancelable biometrics and secret sharing. 30-41
- Shaaban A. Sahmoud

, Haluk Rahmi Topcuoglu
:
A general framework based on dynamic multi-objective evolutionary algorithms for handling feature drifts on data streams. 42-52
- Yu Liu

, Yangtao Wang
, Ke Zhou, Yujuan Yang, Yifei Liu:
Semantic-aware data quality assessment for image big data. 53-65
- Rui Wang, Miao Li, Limei Peng, Ying Hu, Mohammad Mehedi Hassan, Abdulhameed Alelaiwi:

Cognitive multi-agent empowering mobile edge computing for resource caching and collaboration. 66-74
- Yunliang Chen, Junqing Fan, Ze Deng, Bo Du, Xiaohui Huang, Qirui Gui:

PR-KELM: Icing level prediction for transmission lines in smart grid. 75-83
- Michele Ianni, Elio Masciari

, Giuseppe M. Mazzeo, Mario Mezzanzanica
, Carlo Zaniolo:
Fast and effective Big Data exploration by clustering. 84-94
- Khavee Agustus Botangen

, Jian Yu
, Yanbo Han, Quan Z. Sheng
, Jun Han:
Quantifying the adaptability of workflow-based service compositions. 95-111
- Muhammad Amin, Tamleek Ali Tanveer, Mohammad Tehseen, Murad Khan, Fakhri Alam Khan

, Sajid Anwar
:
Static malware detection and attribution in android byte-code through an end-to-end deep system. 112-126
- Hossein Ghomeshi

, Mohamed Medhat Gaber
, Yevgeniya Kovalchuk:
A non-canonical hybrid metaheuristic approach to adaptive data stream classification. 127-139
- Eric Ke Wang, Zuodong Liang, Chien-Ming Chen

, Saru Kumari
, Muhammad Khurram Khan
:
PoRX: A reputation incentive scheme for blockchain consensus of IIoT. 140-151
- Gicheol Wang, Byoung-Sun Lee, Jae Young Ahn, Gihwan Cho:

A UAV-assisted CH election framework for secure data collection in wireless sensor networks. 152-162
- Lan You, Qingxi Peng, Zenggang Xiong, Du He, Meikang Qiu, Xuemin Zhang:

Integrating aspect analysis and local outlier factor for intelligent review spam detection. 163-172
- Mona Taghavi, Jamal Bentahar

, Hadi Otrok:
Two-stage game theoretical framework for IaaS market share dynamics. 173-189
- Anna Giannakou, Dipankar Dwivedi, Sean Peisert

:
A machine learning approach for packet loss prediction in science flows. 190-197
- Zubair A. Baig

, Surasak Sanguanpong, Syed Naeem Firdous
, Van Nhan Vo, Tri Gia Nguyen
, Chakchai So-In
:
Averaged dependence estimators for DoS attack detection in IoT networks. 198-209
- Wenbin Jiang

, Yangsong Zhang, Pai Liu, Jing Peng, Laurence T. Yang, Geyan Ye, Hai Jin:
Exploiting potential of deep neural networks by layer-wise fine-grained parallelism. 210-221
- Zhi-Hong Deng:

Mining high occupancy itemsets. 222-229
- Yi-Shu Lu, Jiun-Long Huang:

GLR: A graph-based latent representation model for successive POI recommendation. 230-244
- Isaías B. Felzmann

, Matheus Martins Susin, Liana Dessandre Duenha, Rodolfo Azevedo, Lucas Francisco Wanner
:
ADeLe: A description language for approximate hardware. 245-258
- Massimo Bartoletti, Salvatore Carta, Tiziana Cimoli, Roberto Saia

:
Dissecting Ponzi schemes on Ethereum: Identification, analysis, and impact. 259-277
- Philip James Basford

, Steven J. Johnston
, Colin S. Perkins
, Tony Garnock-Jones, Fung Po Tso
, Dimitrios Pezaros
, Robert D. Mullins
, Eiko Yoneki, Jeremy Singer
, Simon J. Cox:
Performance analysis of single board computer clusters. 278-291
- Wei Zong

, Yang-Wai Chow
, Willy Susilo
:
Interactive three-dimensional visualization of network intrusion detection data for machine learning. 292-306
- Goshgar Ismayilov, Haluk Rahmi Topcuoglu

:
Neural network based multi-objective evolutionary algorithm for dynamic workflow scheduling in cloud computing. 307-322
- Kaize Shi

, Changjin Gong, Hao Lu, Yifan Zhu
, Zhendong Niu
:
Wide-grained capsule network with sentence-level feature to detect meteorological event in social network. 323-332
- Lucas Rodríguez, Javier Palanca, Elena del Val

, Miguel Rebollo:
Analyzing urban mobility paths based on users' activity in social networks. 333-346
- Guangxia Xu

, Weifeng Li, Jun Liu
:
A social emotion classification approach using multi-model fusion. 347-356
- Fadi Al-Turjman:

Intelligence and security in big 5G-oriented IoNT: An overview. 357-368
- Jiaojiao Jiang

, Steve Versteeg, Jun Han, Md. Arafat Hossain
, Jean-Guy Schneider
:
A positional keyword-based approach to inferring fine-grained message formats. 369-381
- Romana Talat, Mohammad S. Obaidat, Muhammad Muzammal

, Ali Hassan Sodhro
, Zongwei Luo
, Sandeep Pirbhulal
:
A decentralised approach to privacy preserving trajectory mining. 382-392
- Yvan Lucas, Pierre-Edouard Portier, Léa Laporte, Liyun He-Guelton, Olivier Caelen, Michael Granitzer, Sylvie Calabretto:

Towards automated feature engineering for credit card fraud detection using multi-perspective HMMs. 393-402
- Hua Liu

, Cunquan Qu, Yawei Niu, Guanghui Wang:
The evolution of structural balance in time-varying signed networks. 403-408
- Jorge Bernal Bernabé

, Martin David, Rafael Torres Moreno
, Javier Presa Cordero, Sébastien Bahloul, Antonio F. Skarmeta
:
ARIES: Evaluation of a reliable and privacy-preserving European identity management framework. 409-425
- Jorge González-Domínguez, Roberto R. Expósito

, Verónica Bolón-Canedo:
CUDA-JMI: Acceleration of feature selection on heterogeneous systems. 426-436
- Abhinay Pandya, Mourad Oussalah, Paola Monachesi, Panos Kostakos

:
On the use of distributed semantics of tweet metadata for user age prediction. 437-452
- Benjamin A. Steer

, Félix Cuadrado
, Richard G. Clegg:
Raphtory: Streaming analysis of distributed temporal graphs. 453-464
- Heejung Yu, Taejoon Kim:

Optimization of uplink rate and fronthaul compression in cloud radio access networks. 465-471
- Quanxin Zhang, Xiaosong Zhang, Yuan Xue, Jingjing Hu:

A stealthy covert storage channel for asymmetric surveillance VoLTE endpoints. 472-480
- Weilong Ding

, Xuefei Wang, Zhuofeng Zhao:
CO-STAR: A collaborative prediction service for short-term trends on continuous spatio-temporal data. 481-493
- Han Bao, Yijie Wang, Fangliang Xu:

Reducing network cost of data repair in erasure-coded cross-datacenter storage. 494-506
- Ziyu Wang, Hui Yu, Zongyang Zhang, Jiaming Piao, Jianwei Liu

:
ECDSA weak randomness in Bitcoin. 507-513
- Jie Tang

, Shaoshan Liu, Jie Cao, Dawei Sun, Bolin Ding, Jean-Luc Gaudiot, Weisong Shi
:
π-Hub: Large-scale video learning, storage, and retrieval on heterogeneous hardware platforms. 514-523
- Pradeep Kumar Roy

, Jyoti Prakash Singh
, Snehasish Banerjee
:
Deep learning to filter SMS Spam. 524-533
- Zhenfeng Lei, Yuan Sun, Yaser Ahangari Nanehkaran

, Shuangyuan Yang, Md. Saiful Islam
, Huiqing Lei, Defu Zhang:
A novel data-driven robust framework based on machine learning and knowledge graph for disease classification. 534-548
- Gabriele Gianini, Leopold Ghemmogne Fossi, Corrado Mio, Olivier Caelen, Lionel Brunie, Ernesto Damiani:

Managing a pool of rules for credit card fraud detection by a Game Theory based approach. 549-561
- Yang Hu, Huan Zhou, Cees de Laat, Zhiming Zhao:

Concurrent container scheduling on heterogeneous clusters with multi-resource constraints. 562-573
- Naman Kabra, Pronaya Bhattacharya

, Sudeep Tanwar
, Sudhanshu Tyagi
:
MudraChain: Blockchain-based framework for automated cheque clearance in financial institutions. 574-587
- Ying Zhang

, Guohui Tian, Huanzhao Chen:
Exploring the cognitive process for service task in smart home: A robot service mechanism. 588-602
- Wei-Che Chien, Hung-Yen Weng, Chin-Feng Lai

:
Q-learning based collaborative cache allocation in mobile edge computing. 603-610
- Heejung Yu, Il-Gu Lee:

Physical layer security based on NOMA and AJ for MISOSE channels with an untrusted relay. 611-618
- Chang Ruan, Jianxin Wang, Wanchun Jiang, Geyong Min, Yi Pan

:
PTCP: A priority-based transport control protocol for timeout mitigation in commodity data center. 619-632
- Gianni D'Angelo, Francesco Palmieri:

Knowledge elicitation based on genetic programming for non destructive testing of critical aerospace systems. 633-642
- Ahmed Ghoneim

, Ghulam Muhammad
, M. Shamim Hossain:
Cervical cancer classification using convolutional neural networks and extreme learning machines. 643-649
- Khaldoon Dhou:

A new chain coding mechanism for compression stimulated by a virtual environment of a predator-prey ecosystem. 650-669
- Jibin Wang:

A deep learning approach for atrial fibrillation signals classification based on convolutional and modified Elman neural network. 670-679 - Souhila Benmakrelouf, Cédric St-Onge

, Nadjia Kara, Hanine Tout, Claes Edstrom, Yves Lemieux:
Abnormal behavior detection using resource level to service level metrics mapping in virtualized systems. 680-700
- Jun Yang, Rui Wang, Xin Guan, Mohammad Mehedi Hassan, Ahmad Almogren

, Ahmed Alsanad:
AI-enabled emotion-aware robot: The fusion of smart clothing, edge clouds and robotics. 701-709
- David W. Chadwick, Wenjun Fan

, Gianpiero Costantino, Rogério de Lemos, Francesco Di Cerbo, Ian Herwono, Mirko Manea, Paolo Mori
, Ali Sajjad, Xiao-Si Wang:
A cloud-edge based data security architecture for sharing and analysing cyber threat information. 710-722
- Vishal Sharma

, Dushantha Nalin K. Jayakody
, Marwa K. Qaraqe
:
Osmotic computing-based service migration and resource scheduling in Mobile Augmented Reality Networks (MARN). 723-737
- Yulai Zhang, Yuchao Wang, Guiming Luo:

A new optimization algorithm for non-stationary time series prediction based on recurrent neural networks. 738-745
- Fabio Antonelli, Vittorio Cortellessa, Marco Gribaudo

, Riccardo Pinciroli
, Kishor S. Trivedi, Catia Trubiani:
Analytical modeling of performance indices under epistemic uncertainty applied to cloud computing systems. 746-761
- Yujiao Hu, Yuan Yao, Qian Ren, Xingshe Zhou:

3D multi-UAV cooperative velocity-aware motion planning. 762-774
- Stefano Forti

, Gian-Luigi Ferrari
, Antonio Brogi
:
Secure Cloud-Edge Deployments, with Trust. 775-788
- Zhihua Li, Xinrong Yu, Lei Yu, Shujie Guo, Victor Chang

:
Energy-efficient and quality-aware VM consolidation method. 789-809
- Peng Qin

, Jingzhi Guo
:
A novel machine natural language mediation for semantic document exchange in smart city. 810-826
- Muhammad Muzammal

, Faima Abbasi
, Qiang Qu
, Romana Talat, Jianping Fan:
A decentralised approach for link inference in large signed graphs. 827-837
- Carla Vairetti, Eugenio Martínez-Cámara

, Sebastián Maldonado, María Victoria Luzón, Francisco Herrera:
Enhancing the classification of social media opinions by optimizing the structural information. 838-846
- Haifeng Lu, Chunhua Gu, Fei Luo, Weichao Ding, Xinping Liu:

Optimization of lightweight task offloading strategy for mobile edge computing based on deep reinforcement learning. 847-861 - G. Sai Sesha Chalapathi

, Vinay Chamola
, Chen-Khong Tham
, S. Gurunarayanan, Nirwan Ansari
:
An optimal delay aware task assignment scheme for wireless SDN networked edge cloudlets. 862-875
- Youzhu Li, Huiling Zhou, Zhonglong Lin, Yifan Wang, Shunjie Chen, Chang Liu, Zhouyang Wang, Daniela Gîfu, Jingbo Xia

:
Investigation in the influences of public opinion indicators on vegetable prices by corpora construction and WeChat article analysis. 876-888
- Matthias Korch

, Tim Werner:
Improving locality of explicit one-step methods on GPUs by tiling across stages and time steps. 889-901
- Pengcheng Wei, Dahu Wang, Yu Zhao, Sumarga Kumar Sah Tyagi

, Neeraj Kumar
:
Blockchain data-based cloud data integrity protection mechanism. 902-911
- Guobiao He

, Wei Su, Shuai Gao, Jiarui Yue:
TD-Root: A trustworthy decentralized DNS root management architecture based on permissioned blockchain. 912-924
- Yiming Miao, Gaoxiang Wu, Miao Li, Ahmed Ghoneim

, Mabrook Al-Rakhami
, M. Shamim Hossain:
Intelligent task prediction and computation offloading based on mobile-edge cloud computing. 925-931
- Fábio Lopes

, João Agnelo, César A. D. Teixeira
, Nuno Laranjeiro
, Jorge Bernardino
:
Automating orthogonal defect classification using machine learning algorithms. 932-947 - Chang Choi, Francesco Piccialli, Jason J. Jung:

Internet of Knowledge. 948-949 - Ansar-Ul-Haque Yasar

, Haroon Malik, Elhadi M. Shakshuki:
Special issue on future networks & pervasive systems. 950-951 - Jeandro de Mesquita Bezerra

, Antônio Janael Pinheiro, Críston P. de Souza, Divanilson R. Campelo:
Performance evaluation of elephant flow predictors in data center networking. 952-964 - Roberto Casado-Vara

, Ángel Martín del Rey, Soffiene Affes, Javier Prieto
, Juan M. Corchado
:
IoT network slicing on virtual layers of homogeneous data for improved algorithm operation in smart buildings. 965-977
- Xiao-Li Sun, Hui Wang, Xin-Ke Li, Guo-Hong Cao, Yu Kuang, Xiao-Chen Zhang:

Monte Carlo computer simulation of a camera system for proton beam range verification in cancer treatment. 978-991
- Giuseppe Desolda, Maristella Matera, Rosa Lanzilotti:

Metamorphic data sources: A user-centric paradigm to consume linked data in interactive workspaces. 992-1015
- Maximilian Hanussek

, Felix Bartusch
, Jens Krüger:
BOOTABLE: Bioinformatics benchmark tool suite for applications and hardware. 1016-1026
- Sachi Nandan Mohanty

, K. C. Ramya
, S. Sheeba Rani, Deepak Gupta
, K. Shankar
, S. K. Lakshmanaprabu, Ashish Khanna
:
An efficient Lightweight integrated Blockchain (ELIB) model for IoT security and privacy. 1027-1037
- Claudio Savaglio

, Maria Ganzha, Marcin Paprzycki
, Costin Badica
, Mirjana Ivanovic
, Giancarlo Fortino:
Agent-based Internet of Things: State-of-the-art and research challenges. 1038-1053
- Siyi Lv, Jinhui Ye, Sijie Yin, Xiaochun Cheng

, Chen Feng, Xiaoyan Liu, Rui Li, Zhaohui Li, Zheli Liu, Li Zhou:
Unbalanced private set intersection cardinality protocol with low communication cost. 1054-1061

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














