


default search action
Future Generation Computer Systems, Volume 161
Volume 161, 2024
- Lefteris Mamatas
, Sotiris Skaperas, Ilias Sakellariou
:
Clusterslice: Slicing resources for zero-touch Kubernetes-based experimentation. 1-10 - Thomas Beck
, Alessandro Baroni, Ryan S. Bennink, Gilles Buchs
, Eduardo Antonio Coello Pérez, Markus Eisenbach
, Rafael Ferreira da Silva
, Muralikrishnan Gopalakrishnan Meena
, Kalyana C. Gottiparthi, Peter Groszkowski
, Travis S. Humble, Ryan Landfield, Ketan Maheshwari, Sarp Oral, Michael A. Sandoval
, Amir Shehata, In-Saeng Suh, Christopher Zimmer:
Integrating quantum computing resources into scientific HPC ecosystems. 11-25 - Guosheng Han
, Lingzhi Peng, Aocheng Ding, Yan Zhang, Xuan Lin
:
CTF-DDI: Constrained tensor factorization for drug-drug interactions prediction. 26-34 - Deniz Ozsoyeller
, Öznur Özkasap:
Distributed asynchronous rendezvous planning on the line for multi-agent systems. 35-48 - Zexuan Li
, Kaixin Huang:
A read-efficient and write-optimized hash table for Intel Optane DC Persistent Memory. 49-65 - Zeeshan Hameed Mir, Nils Dreyer, Thomas Kürner, Fethi Filali:
Investigation on cellular LTE C-V2X network serving vehicular data traffic in realistic urban scenarios. 66-80 - Akram Hakiri, Sadok Ben Yahia
, Aniruddha S. Gokhale, Nédra Mellouli:
Special Issue on Digital Twin for Future Networks and Emerging IoT Applications (DT4IoT). 81-84 - Nalveer Moocheet
, Brigitte Jaumard
, Pierre Thibault, Lackis Eleftheriadis
:
Minimum-energy virtual machine placement using embedded sensors and machine learning. 85-94 - Bin Lin, Yingya Guo
, Huan Luo, Mingjie Ding:
TITE: A transformer-based deep reinforcement learning approach for traffic engineering in hybrid SDN with dynamic traffic. 95-105 - Haitao Xu
, Zheng He, Dapeng Lan:
Revolutionizing machine learning: Blockchain-based crowdsourcing for transparent and fair labeled datasets supply. 106-118 - Renato B. Hoffmann
, Dalvan Griebler
, Rodrigo da Rosa Righi
, Luiz Gustavo Fernandes
:
Benchmarking parallel programming for single-board computers. 119-134 - Hironori Takeuchi
, Jati H. Husen
, Hnin Thandar Tun, Hironori Washizaki, Nobukazu Yoshioka:
Enterprise architecture-based metamodel for machine learning projects and its management. 135-145 - Han Xu
, Priyadarsi Nanda, Jie Liang:
Reciprocal Federated Learning Framework: Balancing incentives for model and data owners. 146-161 - Cong Li, Heng Pan
, Haiyang Qian, Yushu Li, Xueming Si, Kunyang Li, Bowei Zhang:
Hierarchical sharding blockchain storage solution for edge computing. 162-173 - Jaime Céspedes Sisniega
, Vicente Rodríguez
, Germán Moltó, Álvaro López García
:
Efficient and scalable covariate drift detection in machine learning systems with serverless computing. 174-188 - Yanan Tian, Chenbin Wang, Ruiqiang Lu, Henry H. Y. Tong
, Xiaoqing Gong, Jiayue Qiu, Shaoliang Peng, Xiaojun Yao, Huanxiang Liu
:
3DSGIMD: An accurate and interpretable molecular property prediction method using 3D spatial graph focusing network and structure-based feature fusion. 189-200 - Jixian Zhang
, Xiyi Liao, Hao Wu
, Weidong Li
:
A two-stage budget-feasible mechanism for mobile crowdsensing based on maximum user revenue routing. 201-213 - Sanjay Moulik
, Yanshul Sharma:
FRESH: Fault-tolerant Real-time Scheduler for Heterogeneous multiprocessor platforms. 214-225 - Xuebin Ma
, Zinan Ding
, Xiaoyan Zhang
:
ST-TrajGAN: A synthetic trajectory generation algorithm for privacy preservation. 226-238 - Baoming Feng
, Yuan-Yuan Zhang
, Niu-Wang-Jie Niu
, Hao-Yu Zheng, Jin-Long Wang, Wen-Feng Feng:
DeFuseDTI: Interpretable drug target interaction prediction model with dual-branch encoder and multiview fusion. 239-247 - Sameh Abdulah, Jorge Ejarque
, Omar Marzouk, Hatem Ltaief
, Ying Sun
, Marc G. Genton, Rosa M. Badia
, David E. Keyes:
Portability and scalability evaluation of large-scale statistical modeling and prediction software through HPC-ready containers. 248-258 - Jiyun Han, Qixuan Chen
, Jiaying Su, Tongxin Kong, Yongchao Song, Sheng Long, Juntao Liu
:
TriStack enables accurate identification of antimicrobial and anti-inflammatory peptides by combining machine learning and deep learning approaches. 259-268 - Nguyet Quang Do
, Ali Selamat
, Hamido Fujita
, Ondrej Krejcar
:
An integrated model based on deep learning classifiers and pre-trained transformer for phishing URL detection. 269-285 - Ashish Kaushal
, Osama Almurshed
, Osama Almoghamis, Areej Alabbas
, Nitin Auluck, Bharadwaj Veeravalli, Omer F. Rana
:
SHIELD: A Secure Heuristic Integrated Environment for Load Distribution in Rural-AI. 286-301 - Jianpeng Lin
, Weiwei Lin
, Wentai Wu
, Wenjun Lin
, Keqin Li
:
Energy-aware virtual machine placement based on a holistic thermal model for cloud data centers. 302-314 - Leonardo Bautista-Gomez, Anne Benoit
, Sheng Di, Thomas Hérault, Yves Robert, Hongyang Sun:
A survey on checkpointing strategies: Should we always checkpoint à la Young/Daly? 315-328 - Prashanthi S. K
, Saisamarth Taluri, Beautlin S
, Lakshya Karwa, Yogesh Simmhan:
PowerTrain: Fast, generalizable time and power prediction models to optimize DNN training on accelerated edges. 329-344 - Jesse McDonald, John Dobbs
, Yick Ching Wong
, Rafael Ferreira da Silva
, Henri Casanova
:
An exploration of online-simulation-driven portfolio scheduling in Workflow Management Systems. 345-360 - Rishabh Puri
, Junya Onishi, Mario Rüttgers, Rakesh Sarma
, Makoto Tsubokura
, Andreas Lintermann:
On the choice of physical constraints in artificial neural networks for predicting flow fields. 361-375 - Yalan Jiang, Dan Wang, Bin Song
, Xiaojiang Du:
A prototype-assisted clustered federated learning for big data security and privacy preservation. 376-389 - Hu Peng
, Chen Pi, Jianpeng Xiong
, Debin Fan
, Fanfan Shen:
A dynamic multi-objective evolutionary algorithm with variable stepsize and dual prediction strategies. 390-403 - Hongjian Xu, Longlong Liao
, Xinqi Liu
, Shuguang Chen, Jianguo Chen, Zhixuan Liang, Yuanlong Yu:
Fault-tolerant deep learning inference on CPU-GPU integrated edge devices with TEEs. 404-414 - Alessandra Rizzardi
, Sabrina Sicari
, Jesús Fernando Cevallos Moreno
, Alberto Coen-Porisini:
IoT-driven blockchain to manage the healthcare supply chain and protect medical records. 415-431 - Mingwei Zhou
, Xuxin Lin
, Yanyan Liang
:
Agile Optimization Framework: A framework for tensor operator optimization in neural network. 432-444 - Jianan Wang, Zhenyuan Sun
, Guohua Wang
, Yan Miao
:
TransGINmer: Identifying viral sequences from metagenomes with self-attention and Graph Isomorphism Network. 445-453 - Xinyu Tian
, Mahbuba Afrin
, Sajib Mistry
, Md. Redowan Mahmud, Aneesh Krishna, Yan Li
:
MURE: Multi-layer real-time livestock management architecture with unmanned aerial vehicles using deep reinforcement learning. 454-466 - Xiaohua Wu, Jing Wang, Tingbo Zhang:
Integrating fully homomorphic encryption to enhance the security of blockchain applications. 467-477 - Meng Li, Han Liu
, Fanyu Kong
, Pengju Lv
:
DTRE: A model for predicting drug-target interactions of endometrial cancer based on heterogeneous graph. 478-486 - Ying Chen, Linlin Tong, Jia Zhao
:
Identification and model construction of survival-associated proteins for pancreatic cancer based on deep learning. 487-495 - Yizhou Sun, Jiao Liu, Fang Fang, Yaoguo Huang
:
Deciphering the abundance of immune cells in glomerular endothelium of Alport syndrome kidneys using the deconvolution algorithm CONVdeconv. 496-501 - Orcun Yildiz, Amal Gueroudji
, Julien Bigot, Bruno Raffin, Rosa M. Badia, Tom Peterka:
Extreme-scale workflows: A perspective from the JLESC international community. 502-513 - Carlo Puliafito, Omer F. Rana
, Luiz F. Bittencourt, Hao Wu:
Serverless computing in the cloud-to-edge continuum. 514-517 - Sheng-Kai Wang, Shang-Pin Ma
, Guan-Hong Lai, Chen-Hao Chao:
ChatOps for microservice systems: A low-code approach using service composition and large language models. 518-530 - Hang Wu
, Bo Wang, Ming Zhang
, Guanyao Li, Ruiyuan Li, Yang Liu:
CUPID: An efficient spatio-temporal data engine. 531-544 - Nicolas Farabegoli
, Danilo Pianini
, Roberto Casadei
, Mirko Viroli
:
Scalability through Pulverisation: Declarative deployment reconfiguration at runtime. 545-558 - Yu Tao
, Yi Zhu
, Chunpeng Ge
, Lu Zhou, Shouchen Zhou
, Yongjing Zhang, Jiarong Liu
, Liming Fang:
ORR-CP-ABE: A secure and efficient outsourced attribute-based encryption scheme with decryption results reuse. 559-571 - Sudip Chandra Ghoshal
, Md Maruf Hossain, Bishozit Chandra Das, Palash Roy
, Md. Abdur Razzaque
, Saiful Azad
, Mohammad Mehedi Hassan
, Claudio Savaglio
, Giancarlo Fortino:
VESBELT: An energy-efficient and low-latency aware task offloading in Maritime Internet-of-Things networks using ensemble neural networks. 572-585 - Wang Zhao
, Dongxiao Gu
, Xuejie Yang
, Meihuizi Jia, Changyong Liang, Xiaoyu Wang, Oleg Zolotarev
:
MedT2T: An adaptive pointer constrain generating method for a new medical text-to-table task. 586-600 - Chunqi Wu, Jingdong Li, Zhao Li
, Ji Zhang, Pan Tang:
Accelerating Maximal Bicliques Enumeration with GPU on large scale network. 601-613 - Pablo Gomariz-Martínez
, Francisco M. Delicado Martínez, Enrique Arias-Antúnez
:
Speeding up the communications on a cluster using MPI by means of Software Defined Networks. 614-624 - Amin Aminifar, Matin Shokri, Amir Aminifar:
Privacy-preserving edge federated learning for intelligent mobile-health systems. 625-637 - Xiongtao Zhang
, Ji Wang
, Weidong Bao
, Wenhua Xiao, Yaohong Zhang
, Lihua Liu
:
Self-adaptive asynchronous federated optimizer with adversarial sharpness-aware minimization. 638-654 - Joy Dutta
, Deepak Puthal:
PoAh 2.0: AI-empowered dynamic authentication based adaptive blockchain consensus for IoMT-edge workflow. 655-672 - Emmen Farooq
, Michela Milano, Andrea Borghesi
:
Harnessing federated learning for anomaly detection in supercomputer nodes. 673-685 - Minghai Jiao, Wenyan Jiang, Tianshuo Yuan, Jing Wang, Yuhuai Peng
:
A cross-modal high-resolution image generation approach based on cloud-terminal collaboration for low-altitude intelligent network. 686-700 - Mikail Mohammed Salim
, David Camacho
, Jong Hyuk Park
:
Digital Twin and federated learning enabled cyberthreat detection system for IoT networks. 701-713

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.