


default search action
Future Generation Computer Systems, Volume 93
Volume 93, April 2019
- Osama M. Hussain Rehman, Mohamed Ould-Khaoua:

A hybrid relay node selection scheme for message dissemination in VANETs. 1-17 - Roberto Saia

, Salvatore Carta:
Evaluating the benefits of using proactive transformed-domain-based techniques in fraud detection tasks. 18-32 - Ruiguo Yu, Jie Gao, Mei Yu, Wenhuan Lu, Tianyi Xu, Mankun Zhao, Jie Zhang, Ruixuan Zhang

, Zhuo Zhang
:
LSTM-EFG for wind power forecasting based on sequential correlation features. 33-42 - Abdullah Mohammed Al-Faifi, Biao Song

, Mohammad Mehedi Hassan
, Atif Alamri, Abdu Gumaei
:
A hybrid multi criteria decision method for cloud service selection from Smart data. 43-57 - Yubiao Pan

, Yongkun Li, Huizhen Zhang, Yinlong Xu:
Lifetime-aware FTL to improve the lifetime and performance of solid-state drives. 58-67 - Fanyu Bu, Xin Wang, Bo Gao:

A multi-projection deep computation model for smart data in Internet of Things. 68-76 - Mohammed K. Hassan

, Ali I. El-Desouky, Sally M. El-Ghamrawy
, Amany M. Sarhan
:
A Hybrid Real-time remote monitoring framework with NB-WOA algorithm for patients with chronic diseases. 77-95 - Anurag Nishad, Abhay Upadhyay, Ram Bilas Pachori

, U. Rajendra Acharya
:
Automated classification of hand movements using tunable-Q wavelet transform based filter-bank with surface electromyogram signals. 96-110 - Tim van der Lee, Antonio Liotta

, Georgios Exarchakos
:
Interference graphs to monitor and control schedules in low-power WPAN. 111-120 - Stevan Milovanovic

, Zorica Bogdanovic
, Aleksandra Labus, Dusan Barac, Marijana Despotovic-Zrakic
:
An approach to identify user preferences based on social network analysis. 121-129 - Yongxuan Lai, Hailin Lin, Fan Yang, Tian Wang

:
Efficient data request answering in vehicular Ad-hoc networks based on fog nodes and filters. 130-142 - Felipe Rabuske Costa, Rodrigo da Rosa Righi

, Cristiano André da Costa
, Cristiano Bonato Both
:
Nuoxus: A proactive caching model to manage multimedia content distribution on fog radio access networks. 143-155 - Firat Karatas, Ibrahim Korpeoglu

:
Fog-Based Data Distribution Service (F-DAD) for Internet of Things (IoT) applications. 156-169 - Zhichao Wu, Han Wang, Arunkumar N.

:
Bayesian analysis model for the use of anesthetic analgesic drugs in cancer patients based on geometry reconstruction. 170-175 - Djillali Boukhelef, Jalil Boukhobza

, Kamel Boukhalfa
, Hamza Ouarnoughi
, Laurent Lemarchand
:
Optimizing the cost of DBaaS object placement in hybrid storage systems. 176-187 - Qiao Xiang, Xin Tony Wang, J. Jensen Zhang, Harvey B. Newman, Yang Richard Yang, Y. Jace Liu:

Unicorn: Unified resource orchestration for multi-domain, geo-distributed data analytics. 188-197 - Tuan Nguyen Gia

, Imed Ben Dhaou
, Mai Ali, Amir M. Rahmani
, Tomi Westerlund
, Pasi Liljeberg, Hannu Tenhunen
:
Energy efficient fog-assisted IoT system for monitoring diabetic patients with cardiovascular disease. 198-211 - Maria Carla Calzarossa

, Marco L. Della Vedova
, Daniele Tessera
:
A methodological framework for cloud resource provisioning and scheduling of data parallel applications under uncertainty. 212-223 - Darpan Triboan, Liming Chen

, Feng Chen
, Zumin Wang:
A semantics-based approach to sensor data segmentation in real-time Activity Recognition. 224-236 - A. S. M. Kayes

, Wenny Rahayu, Tharam S. Dillon, Elizabeth Chang
, Jun Han:
Context-aware access control with imprecise context characterization for cloud-based data resources. 237-255 - K. Venkatesh

, L. N. B. Srinivas
, M. B. Mukesh Krishnan, A. Shanthini:
QoS improvisation of delay sensitive communication using SDN based multipath routing for medical applications. 256-265 - Cheng-Chi Lee

, Shun-der Chen
, Chun-Ta Li
, Chung-Lun Cheng, Yan-Ming Lai:
Security enhancement on an RFID ownership transfer protocol based on cloud. 266-277 - Xiumin Zhou

, Gongxuan Zhang, Jin Sun
, Junlong Zhou, Tongquan Wei, Shiyan Hu
:
Minimizing cost and makespan for workflow scheduling in cloud using fuzzy dominance sort based HEFT. 278-289 - Diogo Nolasco

, Jonice Oliveira
:
Subevents detection through topic modeling in social media posts. 290-303 - Xiao Ma, Jiangfeng Zeng, Limei Peng, Giancarlo Fortino

, Yin Zhang
:
Modeling multi-aspects within one opinionated sentence simultaneously for aspect-level sentiment analysis. 304-311 - Tao Peng, Qin Liu, Guojun Wang, Yang Xiang

, Shuhong Chen
:
Multidimensional privacy preservation in location-based services. 312-326 - Lin Zhong, Qianhong Wu, Jan Xie

, Jin Li, Bo Qin:
A secure versatile light payment system based on blockchain. 327-337 - Anitha Ponraj

:
Optimistic virtual machine placement in cloud data centers using queuing approach. 338-344 - Lukasz Makowski, Paola Grosso

:
Evaluation of virtualization and traffic filtering methods for container networks. 345-357 - Kostas Kolomvatsos, Christos Anagnostopoulos

:
Multi-criteria optimal task allocation at the edge. 358-372 - Simeon Veloudis

, Iraklis Paraskakis
, Christos Petsos, Giannis Verginadis
, Ioannis Patiniotakis, Panagiotis Gouvas, Gregoris Mentzas
:
Achieving security-by-design through ontology-driven attribute-based access control in cloud environments. 373-391 - Adriano Lino

, Álvaro Rocha
, Luís Macedo
, Amanda Sizo
:
Application of clustering-based decision tree approach in SQL query error database. 392-406 - Saleh Shah

, Babar Shah
, Adnan Amin
, Feras N. Al-Obeidat
, Francis Chow, Fernando Moreira
, Sajid Anwar
:
Compromised user credentials detection in a digital enterprise using behavioral analytics. 407-417 - James Zhang, Robert W. Gardner

, Ilija Vukotic
:
Anomaly detection in wide area network meshes using two machine learning algorithms. 418-426 - Arthur M. Del Esposte, Eduardo Felipe Zambom Santana, Lucas Kanashiro, Fábio M. Costa

, Kelly Rosa Braghetto
, Nelson Lago
, Fabio Kon
:
Design and evaluation of a scalable smart city software platform with large-scale simulations. 427-441 - Mohammad Aldossary

, Karim Djemame
, Ibrahim Alzamil
, Alexandros Kostopoulos, Antonis Dimakis, Eleni Agiatzidou:
Energy-aware cost prediction and pricing of virtual machines in cloud computing environments. 442-459 - Fanhui Kong, Jian Li, Bin Jiang, Houbing Song

:
Short-term traffic flow prediction in smart multimedia system for Internet of Vehicles based on deep belief network. 460-472 - Eduardo Viegas

, Altair Olivo Santin
, Alysson Bessani
, Nuno Neves
:
BigFlow: Real-time and reliable anomaly-based intrusion detection for high-speed networks. 473-485 - Arun Das

, Paul Rad, Kim-Kwang Raymond Choo
, Babak Nouhi, Jonathan Lish, James Martel
:
Distributed machine learning cloud teleophthalmology IoT for predicting AMD disease progression. 486-498 - Yi Xu, Lei Peng, Guangyao Li:

Multi modal registration of structural features and mutual information of medical image. 499-505 - Xiaogang Zhao

, Zenggang Xiong, Ling Ding, Xuemin Zhang, Fang Xu:
A smart coordinated temperature feedback controller for energy-efficient data centers. 506-514 - Luca Greco

, Pierluigi Ritrovato
, Fatos Xhafa:
An edge-stream computing infrastructure for real-time analysis of wearable sensors data. 515-528 - Muhammad Zakarya

, Lee Gillam
:
Managing energy, performance and cost in large scale heterogeneous datacenters using migrations. 529-547 - Lu Zhou

, Chunhua Su
, Zhen Li, Zhe Liu
, Gerhard P. Hancke
:
Automatic fine-grained access control in SCADA by machine learning. 548-559 - Fehmi Burcin Özsoydan

, Adil Baykasoglu
:
A swarm intelligence-based algorithm for the set-union knapsack problem. 560-569 - Lin Cai, Yong Qi, Wei Wei, Jinsong Wu

, Jingwei Li:
mrMoulder: A recommendation-based adaptive parameter tuning approach for big data processing platform. 570-582 - Songtao Ding, Shiru Qu, Yuling Xi, Shaohua Wan

:
A long video caption generation algorithm for big video data retrieval. 583-595 - Sven Plaga

, Norbert Wiedermann, Simon Duque Antón
, Stefan Tatschner
, Hans D. Schotten, Thomas Newe
:
Securing future decentralised industrial IoT infrastructures: Challenges and free open source solutions. 596-608 - Roshan Lal Neupane, Travis Neely

, Prasad Calyam, Nishant Chettri, Mark Vassell, Ramakrishnan Durairajan:
Intelligent defense using pretense against targeted attacks in cloud platforms. 609-626 - Xiaolong Xu

, Nan Hu, Tao Li, Marcello Trovati
, Francesco Palmieri
, Georgios Kontonatsios, Aniello Castiglione
:
Distributed temporal link prediction algorithm based on label propagation. 627-636 - Ding Ding, Mauro Conti

, Renato Figueiredo
:
SAND: Social-aware, network-failure resilient, and decentralized microblogging system. 637-650 - Amir Hossein Alavi

, William G. Buttlar:
An overview of smartphone technology for citizen-centered, real-time and scalable civil infrastructure monitoring. 651-672 - Daniel Amo Filvà, Marc Alier Forment

, Francisco José García-Peñalvo
, David Fonseca Escudero, María José Casañ Guerrero:
Clickstream for learning analytics to assess students' behavior with Scratch. 673-686 - Chao-Tung Yang

, Shuo-Tsung Chen, Jung-Chun Liu, Yao-Yu Yang, Karan Mitra
, Rajiv Ranjan:
Implementation of a real-time network traffic monitoring service with network functions virtualization. 687-701 - Pranab K. Muhuri

, Amit Rauniyar
, Rahul Nath
:
On arrival scheduling of real-time precedence constrained tasks on multi-processor systems using genetic algorithm. 702-726 - Heng He, Ji Zhang

, Peng Li
, Yu Jin, Tao Zhang:
A lightweight secure conjunctive keyword search scheme in hybrid cloud. 727-736
- Nesrine Khernane, Jean-François Couchot

, Ahmed Mostefaoui:
Optimal power/rate trade-off for internet of multimedia things lifetime maximization under dynamic links capacity. 737-750 - Azizur Rahim

, Tie Qiu
, Zhaolong Ning
, Jinzhong Wang, Noor Ullah
, Amr Tolba
, Feng Xia
:
Social acquaintance based routing in Vehicular Social Networks. 751-760 - Pedro Cruz

, Rodrigo S. Couto
, Luís Henrique M. K. Costa
:
An algorithm for sink positioning in bus-assisted smart city sensing. 761-769 - Zhiwei Wang:

Provably secure key-aggregate cryptosystems with auxiliary inputs for data sharing on the cloud. 770-776 - José Andrés Asensio

, Javier Criado
, Nicolás Padilla
, Luis Iribarne
:
Emulating home automation installations through component-based web technology. 777-791 - Amar Abane

, Mehammed Daoui, Samia Bouzefrane, Paul Mühlethaler:
NDN-over-ZigBee: A ZigBee support for Named Data Networking. 792-798 - Saber Amri, Fekher Khelifi

, Abbas Bradai, Abderrezak Rachedi
, Med Lassaad Kaddachi, Mohamed Atri
:
A new fuzzy logic based node localization mechanism for Wireless Sensor Networks. 799-813 - Nikolay Akatyev

, Joshua I. James
:
Evidence identification in IoT networks based on threat assessment. 814-821 - Maha Bouaziz, Abderrezak Rachedi

, Abdelfettah Belghith
:
EKF-MRPL: Advanced mobility support routing protocol for internet of mobile things: Movement prediction approach. 822-832 - Saptarshi Debroy, Priyanka Samanta, Amina Bashir, Mainak Chatterjee:

SpEED-IoT: Spectrum aware energy efficient routing for device-to-device IoT communication. 833-848 - Abubakar Sadiq Sani

, Dong Yuan, Jiong Jin
, Longxiang Gao, Shui Yu
, Zhao Yang Dong
:
Cyber security framework for Internet of Things-based Energy Internet. 849-859 - David Airehrour

, Jairo A. Gutiérrez
, Sayan Kumar Ray
:
SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things. 860-876 - Nhu-Ngoc Dao

, Minho Park, Joongheon Kim
, Jeongyeup Paek
, Sungrae Cho
:
Resource-aware relay selection for inter-cell interference avoidance in 5G heterogeneous network for Internet of Things systems. 877-887 - Mauro Tortonesi

, Marco Govoni, Alessandro Morelli
, Giulio Riberto, Cesare Stefanelli, Niranjan Suri:
Taming the IoT data deluge: An innovative information-centric service model for fog computing applications. 888-902
- Zhenhua Liu, Shuhong Duan, Peilin Zhou, Baocang Wang:

Traceable-then-revocable ciphertext-policy attribute-based encryption scheme. 903-913
- Flora Amato

, Vincenzo Moscato, Antonio Picariello, Francesco Piccialli
:
SOS: A multimedia recommender System for Online Social networks. 914-923 - Carmen De Maio, Giuseppe Fenza, Mariacristina Gallo

, Vincenzo Loia, Mimmo Parente
:
Time-aware adaptive tweets ranking through deep learning. 924-932 - Chao Tong, Ji Qi, Yu Lian, Jianwei Niu

, Joel J. P. C. Rodrigues
:
TimeTrustSVD: A collaborative filtering model integrating time, trust and rating information. 933-941 - Lei Wang, Jianwei Niu

, Joel J. P. C. Rodrigues
:
GMA: An adult account identification algorithm on Sina Weibo using behavioral footprints. 942-951 - Pradip Kumar Sharma

, Shailendra Rathore, Jong Hyuk Park:
Multilevel learning based modeling for link prediction and users' consumption preference in Online Social Networks. 952-961 - Weiwei Yuan, Chenliang Li, Guangjie Han

, Donghai Guan, Li Zhou, Kangya He:
Negative sign prediction for signed social networks. 962-970 - Raúl Lara-Cabrera

, Antonio González-Pardo
, David Camacho
:
Statistical analysis of risk assessment factors and metrics to evaluate radicalisation in Twitter. 971-978 - Naveed Ahmad, Haitham S. Cruickshank, Yue Cao

, Fakhri Alam Khan
, Muhammad Asif, Awais Ahmad, Gwanggil Jeon:
Privacy by Architecture Pseudonym Framework for Delay Tolerant Network. 979-992 - Lingxia Liao, Chin-Feng Lai

, Jaifu Wan, Victor C. M. Leung, Tien-Chi Huang
:
Scalable distributed control plane for On-line social networks support cognitive neural computing in software defined networks. 993-1001 - Xu Zheng, Zhipeng Cai

, Guangchun Luo, Ling Tian, Xiao Bai:
Privacy-preserved community discovery in online social networks. 1002-1009 - Jiahui Jin, Junzhou Luo, Mingyang Du, Yongcheng Dang, Feng Li, Jinghui Zhang, Aibo Song:

A data-locality-aware task scheduler for distributed social graph queries. 1010-1022 - Xiong Luo, Changwei Jiang, Weiping Wang, Yang Xu, Jenq-Haur Wang

, Wenbing Zhao
:
User behavior prediction in social networks using weighted extreme learning machine with distribution optimization. 1023-1035 - Weiwei Bai, Junsheng Ren

, Tieshan Li:
Modified genetic optimization-based locally weighted learning identification modeling of ship maneuvering with full scale trial. 1036-1045 - Jianjiang Li, Kai Zhang, Xiaolei Yang, Peng Wei, Jie Wang, Karan Mitra

, Rajiv Ranjan
:
Category Preferred Canopy-K-means based Collaborative Filtering algorithm. 1046-1054 - Chun-Wei Tsai, Shih-Jui Liu:

SEIM: Search economics for influence maximization in online social networks. 1055-1064
- Soohyung Kim, Yon Dohn Chung:

An anonymization protocol for continuous and dynamic privacy-preserving data collection. 1065-1073 - (Withdrawn) Corrigendum to "A framework for risk assessment, management and evaluation: Economic tool for quantifying risks in supply chain" [Future Gener. Comput. Syst. 90 (2019) 489-502]. 1076-1077


manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














