


default search action
Future Generation Computer Systems, Volume 101
Volume 101, December 2019
- Paul Martin, Laurent Remy, Maria Theodoridou, Keith G. Jeffery, Zhiming Zhao:

Mapping heterogeneous research infrastructure metadata into a unified catalogue for use in a generic virtual research environment. 1-13
- Alireza Keshavarzian, Saeed Sharifian

, Sanaz Seyedin
:
Modified deep residual network architecture deployed on serverless framework of IoT platform based on human activity recognition application. 14-28
- Lingyue Zhang, Huilin Li, Yannan Li

, Yong Yu
, Man Ho Au, Baocang Wang:
An efficient linkable group signature for payer tracing in anonymous cryptocurrencies. 29-38
- Yiping Wen, Zhibin Wang, Yu Zhang, Jianxun Liu, Buqing Cao, Jinjun Chen:

Energy and cost aware scheduling with batch processing for instance-intensive IoT workflows in clouds. 39-50
- Ada Bagozi

, Devis Bianchini, Valeria De Antonellis, Massimiliano Garda
, Alessandro Marini:
A Relevance-based approach for Big Data Exploration. 51-69 - Jun Zhou, Zhenfu Cao

, Xiaolei Dong, Thanos Vasilakos:
GTSIM-POP: Game theory based secure incentive mechanism and patient-optimized privacy-preserving packet forwarding scheme in m-healthcare social networks. 70-82 - Khaled Hejja, Xavier Hesselbach

:
Evaluating impacts of traffic migration and virtual network functions consolidation on power aware resource allocation algorithms. 83-98
- Tamás Kiss

, James DesLauriers
, Gregoire Gesmier, Gábor Terstyánszky, Gabriele Pierantoni, Osama Abu Oun, Simon J. E. Taylor
, Anastasia Anagnostou, József Kovács
:
A cloud-agnostic queuing system to support the implementation of deadline-based application execution policies. 99-111
- Faezeh Sadat Babamir

, Murvet Kirci
:
Dynamic digest based authentication for client-server systems using biometric verification. 112-126 - Yongkai Fan, Xiaodong Lin, Wei Liang

, Gang Tan
, Priyadarsi Nanda:
A secure privacy preserving deduplication scheme for cloud computing. 127-135
- Liyakathunisa Syed

, Saima Jabeen
, Manimala S.
, Abdullah Alsaeedi
:
Smart healthcare framework for ambient assisted living using IoMT and big data analytics techniques. 136-151
- Abduljawad A. Amory, Ghulam Muhammad

, Hassan Mathkour:
Deep convolutional tree networks. 152-168 - Yingmo Jie, Kim-Kwang Raymond Choo

, Mingchu Li
, Ling Chen, Cheng Guo:
Tradeoff gain and loss optimization against man-in-the-middle attacks based on game theoretic model. 169-179
- Mohamed Hammad

, Shanzhuo Zhang, Kuanquan Wang:
A novel two-dimensional ECG feature extraction and classification algorithm based on convolution neural network for human authentication. 180-196
- Chengxi Huang, Hongming Cai, Lida Xu, Boyi Xu, Yizhi Gu, Lihong Jiang:

Data-driven ontology generation and evolution towards intelligent service in manufacturing systems. 197-207
- Rafael Ferreira da Silva

, Scott Callaghan, Tu Mai Anh Do, George Papadimitriou
, Ewa Deelman
:
Measuring the impact of burst buffers on data-intensive scientific workflows. 208-220
- Mohammad Reza Shahmoradi, Morteza Ebrahimi, Zainabolhoda Heshmati, Mostafa Salehi

:
Multilayer overlapping community detection using multi-objective optimization. 221-235
- Huibing Zhang, Hao Zhong, Weihua Bai, Fang Pan:

Cross-platform rating prediction method based on review topic. 236-245
- Mario Barbareschi, Alessandra De Benedictis, Erasmo La Montagna, Antonino Mazzeo, Nicola Mazzocca

:
A PUF-based mutual authentication scheme for Cloud-Edges IoT systems. 246-261
- Hong Zhang, Hai Huang, Liqiang Wang:

Meteor: Optimizing spark-on-yarn for short applications. 262-271
- Rolando Martins

, Manuel Eduardo Correia
, Luís Antunes
, Fernando Silva
:
Iris: Secure reliable live-streaming with opportunistic mobile edge cloud offloading. 272-292
- Antoine Cabana, Christophe Charrier, Alain Louis:

Mono and multi-modal biometric systems assessment by a common black box testing framework. 293-303
- Mohammad Hosseinpour, Mohammad Reza Malek

, Christophe Claramunt:
Socio-spatial influence maximization in location-based social networks. 304-314
- Haiyu Wang, Xuelian Li, Juntao Gao, Wei Li:

MOBT: A kleptographically-secure hierarchical-deterministic wallet for multiple offline Bitcoin transactions. 315-326
- Chunlin Li, Hezhi Sun, Yi Chen, Youlong Luo:

Edge cloud resource expansion and shrinkage based on workload for minimizing the cost. 327-340
- Muhammad Raza, Farookh Khadeer Hussain, Omar Khadeer Hussain

, Ming Zhao
, Zia ur Rehman
:
A comparative analysis of machine learning models for quality pillar assessment of SaaS services by multi-class text classification of users' reviews. 341-371
- Claire Stirm, Rich Zink, Sandra Gesing, Michael G. Zentner, Damion Junk:

REMEDI central - expanding and sustaining a medical device community. 372-380
- Yoan Gutiérrez

, David Tomás, Isabel Moreno
:
Developing an ontology schema for enriching and linking digital media assets. 381-397
- Awais Khan

, Taeuk Kim, Hyunki Byun, Youngjae Kim:
SciSpace: A scientific collaboration workspace for geo-distributed HPC data centers. 398-409
- Aniseh Najafi, Hamid Haj Seyyed Javadi

, Majid Bayat
:
Verifiable ranked search over encrypted data with forward and backward privacy. 410-419
- Sehrish Shafeeq

, Masoom Alam, Abid Khan
:
Privacy aware decentralized access control system. 420-433
- Xiangming Wang, Dong Yang, Xin Jian, Min Chen, Joze Guna

:
Performance analysis and optimization for coverage enhancement strategy of Narrow-band Internet of Things. 434-443
- Haidong Luo, Hongming Cai, Han Yu

, Yan Sun, Zhuming Bi, Lihong Jiang:
A short-term energy prediction system based on edge computing for smart city. 444-457
- Wei-Ho Chung

, Mu-En Wu, Yeong-Luh Ueng
, Yu-Hsuan Su:
Seal imprint verification via feature analysis and classifications. 458-466
- Raylin Tso:

Two-in-one oblivious signatures. 467-475
- Bander Ali Saleh Al-rimy, Mohd Aizaini Maarof, Syed Zainudeen Mohd Shaid:

Crypto-ransomware early detection model using novel incremental bagging with enhanced semi-random subspace selection. 476-491 - Guolong Shi

, Yigang He, Bing Li, Lei Zuo, Baiqiang Yin, Wenbo Zeng, Farhan Ali
:
Analysis and modeling of wireless channel characteristics for Internet of Things scene based on geometric features. 492-501 - Caesar Wu, Rajkumar Buyya

, Kotagiri Ramamohanarao:
Value-based cloud price modeling for segmented business to business market. 502-523
- Kai Fan, Shili Sun, Zheng Yan

, Qiang Pan, Hui Li, Yintang Yang:
A blockchain-based clock synchronization Scheme in IoT. 524-533
- Silvio Barra, Aniello Castiglione, Fabio Narducci

, Maria De Marsico, Michele Nappi:
Biometric data on the edge for secure, smart and user tailored access to cloud services. 534-541
- Syed Umar Amin

, Mansour Alsulaiman, Ghulam Muhammad
, Mohamed Amine Mekhtiche, M. Shamim Hossain:
Deep Learning for EEG motor imagery classification based on multi-layer CNNs feature fusion. 542-554
- Massimiliano Assante

, Leonardo Candela
, Donatella Castelli, Roberto Cirillo
, Gianpaolo Coro
, Luca Frosini
, Lucio Lelii
, Francesco Mangiacrapa
, Pasquale Pagano
, Giancarlo Panichi
, Fabio Sinibaldi
:
Enacting open science by D4Science. 555-563
- Qinghua Lu

, Xiwei Xu
, Yue Liu
, Ingo Weber
, Liming Zhu
, Weishan Zhang
:
uBaaS: A unified blockchain as a service platform. 564-575
- Justin M. Wozniak

, Matthieu Dorier
, Robert B. Ross
, Tong Shu, Tahsin M. Kurç, Li Tang
, Norbert Podhorszki
, Matthew Wolf:
MPI jobs within MPI jobs: A practical way of enabling task-level fault-tolerance in HPC workflows. 576-589
- Chunlin Li, Chengyi Wang, Hengliang Tang, Youlong Luo:

Scalable and dynamic replica consistency maintenance for edge-cloud system. 590-604
- Antonio J. Sánchez, Sara Rodríguez, Fernando De la Prieta

, Alfonso González-Briones
:
Adaptive interface ecosystems in smart cities control systems. 605-620 - Seyed Farhad Aghili

, Hamid Mala, Pallavi Kaliyar, Mauro Conti
:
SecLAP: Secure and lightweight RFID authentication protocol for Medical IoT. 621-634
- Aimin Yang, Yifan Li, Chenshuai Liu, Jie Li, Yuzhu Zhang, Jiahao Wang:

Research on logistics supply chain of iron and steel enterprises based on block chain technology. 635-645
- Fatma A. Hashim, Essam H. Houssein

, Mai S. Mabrouk, Walid Al-Atabany
, Seyedali Mirjalili
:
Henry gas solubility optimization: A novel physics-based algorithm. 646-667 - Rongbo Shen

, Kezhou Yan, Kuan Tian
, Cheng Jiang
, Ke Zhou:
Breast mass detection from the digitized X-ray mammograms based on the combination of deep active learning and self-paced learning. 668-679 - Guosun Zeng, Huanliang Xiong, Canghai Wu

:
A scalable method of parallel tasks after the extension of machine systems based on equal change rate. 680-693
- Wenting Li, Ping Wang:

Two-factor authentication in industrial Internet-of-Things: Attacks, evaluation and new construction. 694-708
- Daniele Riboni, Marta Murtas:

Sensor-based activity recognition: One picture is worth a thousand words. 709-722
- Kanishk Chaturvedi, Andreas Matheus, Son H. Nguyen

, Thomas H. Kolbe
:
Securing Spatial Data Infrastructures for Distributed Smart City applications and services. 723-736
- Melchizedek I. Alipio, Alex Gyran A. Co, Melinda Faye C. Hilario, Christian Miguel C. Pama:

Value-based utility implementation in software-defined testbed for sensor data traffic management. 737-746
- Petar Kochovski, Sandi Gec, Vlado Stankovski

, Marko Bajec, Pavel D. Drobintsev:
Trust management in a blockchain based fog computing platform with trustless smart oracles. 747-759
- Md. Rafiul Hassan, Md Sarwar Morshedul Haque

, Muhammad Imtiaz Hossain, Mohammad Mehedi Hassan, Abdulhameed Alelaiwi:
A novel cascaded deep neural network for analyzing smart phone data for indoor localization. 760-769
- Massimo Cafaro, Italo Epicoco, Marco Pulimeno

:
CMSS: Sketching based reliable tracking of large network flows. 770-784
- Kiran Ahuja, Arun Khosla

:
A novel framework for data acquisition and ubiquitous communication provisioning in smart cities. 785-803
- Ning Wang, Zhigang Wang, Yu Gu, Yubin Bao, Ge Yu:

TSH: Easy-to-be distributed partitioning for large-scale graphs. 804-818
- Kevin Atighehchi, Loubna Ghammam, Morgan Barbier

, Christophe Rosenberger
:
GREYC-Hashing: Combining biometrics and secret for enhancing the security of protected templates. 819-830
- Xue Ouyang

, Changjian Wang, Jie Xu:
Mitigating stragglers to avoid QoS violation for time-critical applications through dynamic server blacklisting. 831-842
- Rasheed Hussain

, Fatima Hussain, Sherali Zeadally:
Integration of VANET and 5G Security: A review of design and implementation issues. 843-864
- Liang Liu, Zuchao Ma, Weizhi Meng

:
Detection of multiple-mix-attack malicious nodes using perceptron-based trust in IoT networks. 865-879
- Zhaomeng Zhu, Xueyan Tang:

Deadline-constrained workflow scheduling in IaaS clouds with multi-resource packing. 880-893
- Peng Cheng

, Yutong Lu, Yunfei Du
, Zhiguang Chen:
Tiered data management system: Accelerating data processing on HPC systems. 894-908
- Visnja Simic

, Boban S. Stojanovic, Milos R. Ivanovic:
Optimizing the performance of optimization in the cloud environment-An intelligent auto-scaling approach. 909-920
- Omid Tarkhaneh, Irene Moser:

An improved differential evolution algorithm using Archimedean spiral and neighborhood search based mutation approach for cluster analysis. 921-939
- Samir Awad

, Abdelhamid Malki
, Mimoun Malki
, Mahmoud Barhamgi
, Djamal Benslimane:
Composing WoT services with uncertain data. 940-950
- Sandra Gesing, Maytal Dahan

, Michael G. Zentner, Nancy Wilkins-Diehr, Katherine A. Lawrence:
The Science Gateways Community Institute: Collaborations and efforts on international scale. 951-958
- Ahmet Cihat Baktir, Betül Ahat, Necati Aras, Atay Ozgovde

, Cem Ersoy
:
SLA-aware optimal resource allocation for service-oriented networks. 959-974
- Polona Stefanic, Matej Cigale, Andrew C. Jones, Louise Knight

, Ian J. Taylor:
Support for full life cycle cloud-native application management: Dynamic TOSCA and SWITCH IDE. 975-982
- Vincenzo Loia, Francesco Orciuoli:

Understanding the composition and evolution of terrorist group networks: A rough set approach. 983-992
- George Baryannis

, Samir Dani, Grigoris Antoniou:
Predicting supply chain risks using machine learning: The trade-off between performance and interpretability. 993-1004 - Zequn Wei

, Jin-Kao Hao:
Iterated two-phase local search for the Set-Union Knapsack Problem. 1005-1017
- Weizhi Meng

, Liqiu Zhu, Wenjuan Li
, Jinguang Han, Yan Li:
Enhancing the security of FinTech applications with map-based graphical password authentication. 1018-1027
- Haiping Si, Changxia Sun, Yanling Li, Hongbo Qiao, Lei Shi:

IoT information sharing security mechanism based on blockchain technology. 1028-1040
- Madalena Pereira da Silva

, Alexandre Leopoldo Gonçalves, Mário Antônio Ribeiro Dantas
:
A conceptual model for quality of experience management to provide context-aware eHealth services. 1041-1061
- Xiaohui Wei, Yuanyuan Liu, Xingwang Wang, Bingyi Sun, Shang Gao, Jon G. Rokne:

A survey on quality-assurance approximate stream processing and applications. 1062-1080
- Yasser Aldwyan

, Richard O. Sinnott:
Latency-aware failover strategies for containerized web applications in distributed clouds. 1081-1095
- Karam Bou Chaaya, Mahmoud Barhamgi

, Richard Chbeir, Philippe Arnould, Djamal Benslimane:
Context-aware System for Dynamic Privacy Risk Inference: Application to smart IoT environments. 1096-1111
- Asfa Toor, Saif ul Islam

, Nimra Sohail, Adnan Akhunzada
, Jalil Boudjadar, Hasan Ali Khattak
, Ikram Ud Din
, Joel J. P. C. Rodrigues:
Energy and performance aware fog computing: A case of DVFS and green renewable energy. 1112-1121 - Jian Chen, Zhihan Lv

, Houbing Song
:
Design of personnel big data management system based on blockchain. 1122-1129
- Yu Lu

, Yingjian Qi, Xianghua Fu
:
A framework for intelligent analysis of digital cardiotocographic signals from IoMT-based foetal monitoring. 1130-1141
- Yongsheng Hao

, Jie Cao, Tinghuai Ma, Sai Ji:
Adaptive energy-aware scheduling method in a meteorological cloud. 1142-1157 - Ahmed Talal Suliman

, Hadi Otrok, Rabeb Mizouni, Shakti Singh, Anis Ouali:
A greedy-proof incentive-compatible mechanism for group recruitment in mobile crowd sensing. 1158-1167 - Wenying Yue

, Peng Du
, Xiongwen Quan
, Ying Chen:
A new strategy based on approximate dynamic programming to maximize the net revenue of IaaS cloud providers with limited resources. 1168-1186 - Kekun Hu, Guosun Zeng:

Placing big graph into cloud for parallel processing with a two-phase community-aware approach. 1187-1200 - Elton Figueiredo de S. Soares, Carlos Alberto Vieira Campos, Sidney C. de Lucena:

Online travel mode detection method using automated machine learning and feature engineering. 1201-1212 - Woongsoo Na, Demeke Shumeye Lakew, Jihoon Lee

, Sungrae Cho
:
Congestion control vs. link failure: TCP behavior in mmWave connected vehicular networks. 1213-1222
- Tanya Koohpayeh Araghi

, Azizah Abd Manaf:
An enhanced hybrid image watermarking scheme for security of medical and non-medical images based on DWT and 2-D SVD. 1223-1246
- Md. Shamsul Huda, Jemal H. Abawajy, Baker Al-Rubaie, Lei Pan

, Mohammad Mehedi Hassan:
Automatic extraction and integration of behavioural indicators of malware for protection of cyber-physical networks. 1247-1258
- Meenakshi Choudhary, Vivek Tiwari

, Venkanna U.:
An approach for iris contact lens detection and classification using ensemble of customized DenseNet and SVM. 1259-1270
- Georgios Bouloukakis, Nikolaos Georgantas, Patient Ntumba, Valérie Issarny:

Automated synthesis of mediators for middleware-layer protocol interoperability in the IoT. 1271-1294

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














