Stop the war!
Остановите войну!
for scientists:
default search action
Future Generation Computer Systems, Volume 100
Volume 100, November 2019
- Donghai Tian, Rui Ma, Xiaoqi Jia, Changzhen Hu:
KEcruiser: A novel control flow protection for kernel extensions. 1-9
- Hoang Long Nguyen, Jason J. Jung:
Social event decomposition for constructing knowledge graph. 10-18
- Christian Sturm, Jonas Scalanczi, Stefan Schönig, Stefan Jablonski:
A Blockchain-based and resource-aware process execution engine. 19-34
- Lanlan Rui, Xiaotong Wang, Yao Zhang, Xiaomei Wang, Xuesong Qiu:
A self-adaptive and fault-tolerant routing algorithm for wireless sensor networks in microgrids. 35-45
- Qimin Zhou, Hao Wu, Kun Yue, Ching-Hsien Hsu:
Spatio-temporal context-aware collaborative QoS prediction. 46-57
- Kenji Saito, Mitsuru Iwamura:
How to make a digital currency on a blockchain stable. 58-69
- Chris Simpkin, Ian J. Taylor, Graham A. Bent, Geeth de Mel, Swati Rallapalli, Liang Ma, Mudhakar Srivatsa:
Constructing distributed time-critical applications using cognitive enabled services. 70-85
- Mohamed Fathi Al-Sa'D, Abdulla K. Al-Ali, Amr Mohamed, Tamer Khattab, Aiman Erbad:
RF-based drone detection and identification using deep learning approaches: An initiative towards a large open source drone database. 86-97
- Vahid Arabnejad, Kris Bubendorfer, Bryan Ng:
Dynamic multi-workflow scheduling: A deadline and cost-aware approach for commercial clouds. 98-108
- Song Deng, Changan Yuan, Lechan Yang, Xiao Qin, Aihua Zhou:
Data recovery algorithm under intrusion attack for energy internet. 109-121
- Emilio Serrano, Javier Bajo:
Deep neural network architectures for social services diagnosis in smart cities. 122-131
- Wei Liang, Jing Long, Xia Lei, Zhiqiang You, Haibo Luo, Jiahong Cai, Kuan-Ching Li:
Efficient data packet transmission algorithm for IPV6 mobile vehicle network based on fast switching model with time difference. 132-143
- Hasan Ali Khattak, Munam Ali Shah, Sangeen Khan, Ihsan Ali, Muhammad Imran:
Perception layer security in Internet of Things. 144-164
- Kun Cao, Guo Xu, Junlong Zhou, Mingsong Chen, Tongquan Wei, Keqin Li:
Lifetime-aware real-time task scheduling on fault-tolerant mixed-criticality embedded systems. 165-175
- Tsozen Yeh, Hsinyi Huang:
Realizing integrated prioritized service in the Hadoop cloud system. 176-185
- Muzafer Saracevic, Sasa Z. Adamovic, Vladislav Miskovic, Nemanja Macek, Marko Sarac:
A novel approach to steganography based on the properties of Catalan numbers and Dyck words. 186-197
- Yunyi Zhang, Zhan Shi, Dan Feng, Xiu-Xiu Zhan:
Degree-biased random walk for large-scale network embedding. 198-209
- Amit Agarwal, Ta Nguyen Binh Duong:
Secure virtual machine placement in cloud data centers. 210-222
- Fernando de la Prieta, Sara Rodríguez-González, Pablo Chamoso, Juan Manuel Corchado, Javier Bajo:
Survey of agent-based cloud computing applications. 223-236
- Arie Taal, Junchao Wang, Cees de Laat, Zhiming Zhao:
Profiling the scheduling decisions for handling critical paths in deadline-constrained cloud workflows. 237-249
- Mohammed Al-Khafajiy, Thar Baker, Hilal Al-Libawy, Zakaria Maamar, Moayad Aloqaily, Yaser Jararweh:
Improving fog computing performance via Fog-2-Fog collaboration. 266-280
- Ronny Bazan Antequera, Prasad Calyam, Arjun Ankathatti Chandrashekara, Reshmi Mitra:
Recommending heterogeneous resources for science gateway applications based on custom templates composition. 281-297
- Francisco Muñoz-Martínez, José L. Abellán, Manuel E. Acacio:
InsideNet: A tool for characterizing convolutional neural networks. 298-315
- Linbo Wang, Hui Zhen, Xianyong Fang, Shaohua Wan, Weiping Ding, Yanwen Guo:
A unified two-parallel-branch deep neural network for joint gland contour and segmentation learning. 316-324
- Sana Moin, Ahmad Karim, Zanab Safdar, Kalsoom Safdar, Ejaz Ahmed, Muhammad Imran:
Securing IoTs in distributed blockchain: Analysis, requirements and open issues. 325-343 - Yazan Mualla, Amro Najjar, Alaa Daoud, Stéphane Galland, Christophe Nicolle, Ansar-Ul-Haque Yasar, Elhadi M. Shakshuki:
Agent-based simulation of unmanned aerial vehicles in civilian applications: A systematic literature review and research directions. 344-364
- Sreyasee Das Bhattacharjee, William J. Tolone, Ved Suhas Paranjape:
Identifying malicious social media contents using multi-view Context-Aware active learning. 365-379
- Xiaojun Ruan, Haiquan Chen, Yun Tian, Shu Yin:
Virtual machine allocation and migration based on performance-to-power ratio in energy-efficient clouds. 380-394
- Shuai Ding, Ling Li, Zhenmin Li, Hao Wang, Yanchun Zhang:
Smart electronic gastroscope system using a cloud-edge collaborative framework. 395-407
- Mohammed Aamir Ali, Muhammad Ajmal Azad, Mario Parreño Centeno, Feng Hao, Aad van Moorsel:
Consumer-facing technology fraud: Economics, attack methods and potential solutions. 408-427
- Xinbo Zhang, Dongzhan Zhang, Wei Zheng, Jinjun Chen:
An enhanced priority-based scheduling heuristic for DAG applications with temporal unpredictability in task execution and data transmission. 428-439
- Chih Wei Ling, Anwitaman Datta, Jun Xu:
On hybrid network coding for visual traffic surveillance. 440-455
- Fazlullah Khan, Ateeq Ur Rehman, Jiangbin Zheng, Mian Ahmad Jan, Muhammad Alam:
Mobile crowdsensing: A survey on privacy-preservation, task management, assignment models, and incentives mechanisms. 456-472
- Xiao Lv, Fazhi He, Xiaohu Yan, Yiqi Wu, Yuan Cheng:
Integrating selective undo of feature-based modeling operations for real-time collaborative CAD systems. 473-497
- Konstantinos Papadakis-Vlachopapadopoulos, Román Sosa González, Ioannis Dimolitsas, Dimitrios Dechouniotis, Ana Juan Ferrer, Symeon Papavassiliou:
Collaborative SLA and reputation-based trust management in cloud federations. 498-512 - Fabio D'Urso, Corrado Santoro, Federico Fausto Santoro:
Wale: A solution to share libraries in Docker containers. 513-522
- Xiru Qiu, Zhikui Chen, Liang Zhao, Chengsheng Hu:
Unsupervised multi-view non-negative for law data feature learning with dual graph-regularization in smart Internet of Things. 523-530
- Ibrahim A. Elgendy, Weizhe Zhang, Yu-Chu Tian, Keqin Li:
Resource allocation and computation offloading with data security for mobile edge computing. 531-541
- Louise Knight, Polona Stefanic, Matej Cigale, Andrew C. Jones, Ian J. Taylor:
Towards extending the SWITCH platform for time-critical, cloud-based CUDA applications: Job scheduling parameters influencing performance. 542-556
- Bhagya Nathali Silva, Kijun Han:
Mutation operator integrated ant colony optimization based domestic appliance scheduling for lucrative demand side management. 557-568
- Naveed Islam, Yasir Faheem, Ikram Ud Din, Muhammad Talha, Mohsen Guizani, Mudassir Khalil:
A blockchain-based fog computing framework for activity recognition as an application to e-Healthcare services. 569-578
- Jóakim von Kistowski, Klaus-Dieter Lange, Jeremy A. Arnold, John Beckett, Hansfried Block, Michael G. Tricker, Sanjay Sharma, Johann Pais, Samuel Kounev:
Measuring and rating the energy-efficiency of servers. 579-589
- Xiaolong Liu, Khan Muhammad, Jaime Lloret, Yu-Wen Chen, Shyan-Ming Yuan:
Elastic and cost-effective data carrier architecture for smart contract in blockchain. 590-599
- Haifang Wang, Zhongjie Wang, Sihang Hu, Xiaofei Xu, Shiping Chen, Zhiying Tu:
DUSKG: A fine-grained knowledge graph for effective personalized service recommendation. 600-617 - Diego Pennino, Maurizio Pizzonia, Federico Griscioli:
Pipeline-integrity: Scaling the use of authenticated data structures up to the cloud. 618-647
- Hao Wang, Chaonian Guo, Shuhan Cheng:
LoC - A new financial loan management system based on smart contracts. 648-655
- Manuel López Martín, Belén Carro, Antonio Sánchez-Esguevillas:
Neural network architecture based on gradient boosting for IoT traffic prediction. 656-673
- José Simão, Sérgio Esteves, André Pires, Luís Veiga:
GC-Wise: A Self-adaptive approach for memory-performance efficiency in Java VMs. 674-688
- Hui Yin, Zheng Qin, Jixin Zhang, Lu Ou, Fangmin Li, Keqin Li:
Secure conjunctive multi-keyword ranked search over encrypted cloud data for multiple data owners. 689-700
- Yuxin Liu, Anfeng Liu, Tian Wang, Xiao Liu, Neal N. Xiong:
An intelligent incentive mechanism for coverage of data collection in cognitive internet of things. 701-714
- Yu-Chi Chen, Xin Xie, Peter Shaojui Wang, Raylin Tso:
Witness-based searchable encryption with optimal overhead for cloud-edge computing. 715-723
- Shang-Pin Ma, Chen-Yuan Fan, Yen Chuang, I-Hsiu Liu, Ci-Wei Lan:
Graph-based and scenario-driven microservice analysis, retrieval, and testing. 724-735
- Rishikesh Sahay, Weizhi Meng, Daniel A. Sepulveda Estay, Christian Damsgaard Jensen, Michael Bruhn Barfod:
CyberShip-IoT: A dynamic and adaptive SDN-based security policy enforcement framework for ships. 736-750
- Zitian Zhao, Hancong Duan, Geyong Min, Yue Wu, Zilei Huang, Xian Zhuang, Hao Xi, Meirong Fu:
A lighten CNN-LSTM model for speaker verification on embedded devices. 751-758
- Junnan Li, Zhihui Lu, Yu Tong, Jie Wu, Shalin Huang, Meikang Qiu, Wei Du:
A general AI-defined attention network for predicting CDN performance. 759-769 - Liping Zhang, Lanchao Zhao, Shuijun Yin, Chi-Hung Chi, Ran Liu, Yixin Zhang:
A lightweight authentication scheme with privacy protection for smart grid communications. 770-778
- Nickolaos Koroniotis, Nour Moustafa, Elena Sitnikova, Benjamin P. Turnbull:
Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset. 779-796
- Zhidan Li, Wenmin Li, Qiaoyan Wen, Jiageng Chen, Wei Yin, Kaitai Liang:
An efficient blind filter: Location privacy protection and the access control in FinTech. 797-810
- Jin-Myeong Shin, SeokHwan Choi, Peng Liu, Yoon-Ho Choi:
Unsupervised multi-stage attack detection framework without details on single-stage attacks. 811-825
- Ikram Ud Din, Mohsen Guizani, Joel J. P. C. Rodrigues, Suhaidi Hassan, Valery V. Korotaev:
Machine learning in the Internet of Things: Designed techniques for smart cities. 826-843
- Sheng-Yao Su, Wenbin Yao, Baojun Qiao, Ming Zong, Xin He, Xiaoyong Li:
RRSD: A file replication method for ensuring data reliability and reducing storage consumption in a dynamic Cloud-P2P environment. 844-858
- Carlos M. J. M. Dourado Júnior, Suane Pires P. da Silva, Raul Victor Medeiros da Nóbrega, Antônio Carlos da Silva Barros, Arun Kumar Sangaiah, Pedro Pedrosa Rebouças Filho, Victor Hugo C. de Albuquerque:
A new approach for mobile robot localization based on an online IoT system. 859-881
- Arezou Ostad-Sharif, Hamed Arshad, Morteza Nikooghadam, Dariush Abbasinezhad-Mood:
Three party secure data transmission in IoT networks through design of a lightweight authenticated key agreement scheme. 882-892
- Ahmed A. Abd El-Latif, Bassem Abd-El-Atty, Salvador E. Venegas-Andraca, Wojciech Mazurczyk:
Efficient quantum-based security protocols for information sharing and data protection in 5G networks. 893-906
- Denis Migdal, Christophe Rosenberger:
Statistical modeling of keystroke dynamics samples for the generation of synthetic datasets. 907-920
- Chunlin Li, YaPing Wang, Hengliang Tang, Youlong Luo:
Dynamic multi-objective optimized replica placement and migration strategies for SaaS applications in edge cloud. 921-937 - Venkatasamy Sureshkumar, Ruhul Amin, V. R. Vijaykumar, S. Raja Sekar:
Robust secure communication protocol for smart healthcare system with FPGA implementation. 938-951 - Bin Cao, Jianwei Zhao, Po Yang, Peng Yang, Xin Liu, Jun Qi, Andrew Simpson, Mohamed Elhoseny, Irfan Mehmood, Khan Muhammad:
Multiobjective feature selection for microarray data via distributed parallel algorithms. 952-981
- Xu Jiao, Yingyuan Xiao, Wenguang Zheng, Hongya Wang, Ching-Hsien Hsu:
A novel next new point-of-interest recommendation system based on simulated user travel decision-making process. 982-993
- Shuangyan Wang, Gang Mei, Salvatore Cuomo:
A simple and generic paradigm for creating complex networks using the strategy of vertex selecting-and-pairing. 994-1004
- Aravind Kota Gopalakrishna, Tanir Ozcelebi, Johan J. Lukkien, Antonio Liotta:
Runtime evaluation of cognitive systems for non-deterministic multiple output classification problems. 1005-1016
- Mengyu Sun, Zhangbing Zhou, Junping Wang, Chu Du, Walid Gaaloul:
Energy-Efficient IoT Service Composition for Concurrent Timed Applications. 1017-1030 - Linchang Zhao, Zhaowei Shang, Anyong Qin, Taiping Zhang, Ling Zhao, Yu Wei, Yuan Yan Tang:
A cost-sensitive meta-learning classifier: SPFCNN-Miner. 1031-1043 - Junho Jeong, Joong Yeon Lim, Yunsik Son:
A data type inference method based on long short-term memory by improved feature for weakness analysis in binary code. 1044-1052 - Vishal Rathod, Natasha Yogananda Jeppu, Samanvita Sastry, Shruti Singala, Mohit P. Tahiliani:
CoCoA++: Delay gradient based congestion control for Internet of Things. 1053-1072 - Xuemeng Zhai, Wanlei Zhou, Gaolei Fei, Cai Lu, Sheng Wen, Guangmin Hu:
Edge-based stochastic network model reveals structural complexity of edges. 1073-1087
- Zahra Saberi, Morteza Saberi, Omar Hussain, Elizabeth Chang:
Stackelberg model based game theory approach for assortment and selling price planning for small scale online retailers. 1088-1102
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.