![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Future Generation Computer Systems, Volume 96
Volume 96, July 2019
- Giuseppe Bianchi, Tooska Dargahi
, Alberto Caponi
, Mauro Conti
:
Intelligent conditional collaborative private data sharing. 1-10
- Daniele D'Agostino
, Alfonso Quarati
, Andrea Clematis, Lucia Morganti
, Elena Corni
, Valentina Giansanti
, Daniele Cesini
, Ivan Merelli
:
SoC-based computing infrastructures for scientific applications and commercial services: Performance and economic evaluations. 11-22
- Han Qiu
, Gérard Memmi
, Xuan Chen, Jian Xiong:
DC coefficient recovery for JPEG images in ubiquitous communication systems. 23-31
- Sherif Sakr, Albert Y. Zomaya
, Athanasios V. Vasilakos
:
Editorial for Special issue of FGCS special issue on "Benchmarking big data systems". 32-34
- Luis Guijarro
, Vicent Pla
, José R. Vidal
, Maurizio Naldi
:
Competition in data-based service provision: Nash equilibrium characterization. 35-50
- Syed Fazal Abbas Baqueri
, Muhammad Adnan
, Bruno Kochan
, Tom Bellemans
:
Activity-based model for medium-sized cities considering external activity-travel: Enhancing FEATHERS framework. 51-63
- Amir Mohammadzade Lajevardi
, Morteza Amini
:
A semantic-based correlation approach for detecting hybrid and low-level APTs. 64-88
- Xiaolong Xu
, Yuan Xue
, Lianyong Qi, Yuan Yuan, Xuyun Zhang
, Tariq Umer
, Shaohua Wan
:
An edge computing-enabled computation offloading method with privacy preservation for internet of connected vehicles. 89-100
- Yezhi Lin, Xinyuan Jin, Jiuqiang Chen, Ali Hassan Sodhro
, Zhifang Pan
:
An analytic computation-driven algorithm for Decentralized Multicore Systems. 101-110
- Cheng Zhang, Zixuan Zheng:
Task migration for mobile edge computing using deep reinforcement learning. 111-118
- Grace A. Lewis, Patricia Lago
, Sebastián Echeverría, Pieter Simoens
:
A tale of three systems: Case studies on the application of architectural tactics for cyber-foraging. 119-147 - Moazam Ali, Susmit Bagchi
:
Probabilistic normed load monitoring in large scale distributed systems using mobile agents. 148-167
- Joseph Azar, Abdallah Makhoul, Mahmoud Barhamgi
, Raphaël Couturier
:
An energy efficient IoT data compression approach for edge machine learning. 168-175
- Bo Li, Guiqin Yuan, Li Shen, Ruoyi Zhang, Yiyang Yao:
Incorporating URL embedding into ensemble clustering to detect web anomalies. 176-184
- Wenbo Jiang, Hongwei Li, Guowen Xu
, Mi Wen, Guishan Dong, Xiaodong Lin:
PTAS: Privacy-preserving Thin-client Authentication Scheme in blockchain-based PKI. 185-195
- Anas Al-Roubaiey
, Tarek R. Sheltami
, Ashraf S. Mahmoud
, Ansar-Ul-Haque Yasar
:
EATDDS: Energy-aware middleware for wireless sensor and actuator networks. 196-206
- Muthu Manikandan Baskaran, Thomas Henretty, James R. Ezick, Richard Lethin, David Bruns-Smith:
Enhancing Network Visibility and Security through Tensor Analysis. 207-215
- Georgios L. Stavrinides
, Helen D. Karatza:
An energy-efficient, QoS-aware and cost-effective scheduling approach for real-time workflow applications in cloud computing systems utilizing DVFS and approximate computations. 216-226
- Umara Noor, Zahid Anwar
, Tehmina Amjad
, Kim-Kwang Raymond Choo
:
A machine learning-based FinTech cyber threat attribution framework using high-level indicators of compromise. 227-242
- Andy S. Alic
, Jussara M. Almeida
, Giovanni Aloisio, Nazareno Andrade, Nuno Antunes
, Danilo Ardagna
, Rosa M. Badia
, Tânia Basso, Ignacio Blanquer, Tarciso Braz
, Andrey Brito, Donatello Elia
, Sandro Fiore
, Dorgival O. Guedes, Marco Lattuada
, Daniele Lezzi
, Matheus Maciel, Wagner Meira Jr., Demetrio Gomes Mestre
, Regina Moraes
, Fábio Morais, Carlos Eduardo S. Pires, Nádia P. Kozievitch
, Walter dos Santos, Paulo Silva
, Marco Vieira
:
BIGSEA: A Big Data analytics platform for public transportation information. 243-269
- Mita Cokic
, Ivan Seskar:
Software defined network management for dynamic smart GRID traffic. 270-282
- Lara Ortiz-Martin, Pablo Picazo-Sanchez
, Pedro Peris-Lopez
, Juan Tapiador
, Gerardo Schneider:
Feasibility analysis of Inter-Pulse Intervals based solutions for cryptographic token generation by two electrocardiogram sensors. 283-296
- Iman Azimi
, Tapio Pahikkala
, Amir M. Rahmani
, Hannakaisa Niela-Vilén, Anna Axelin
, Pasi Liljeberg:
Missing data resilient decision-making for healthcare IoT through personalization: A case study on maternal health. 297-308 - Oussama Senouci
, Zibouda Aliouat
, Saad Harous
:
MCA-V2I: A Multi-hop Clustering Approach over Vehicle-to-Internet communication for improving VANETs performances. 309-323
- Shunmei Meng, Lianyong Qi, Qianmu Li, Wenmin Lin, Xiaolong Xu
, Shaohua Wan
:
Privacy-preserving and sparsity-aware location-based prediction method for collaborative recommender systems. 324-335
- Chunhua Xiao, Lei Zhang
, Weichen Liu, Neil Bergmann, Yuhua Xie:
Energy-efficient crypto acceleration with HW/SW co-design for HTTPS. 336-347
- Javier Fabra, Joaquín Ezpeleta
, Pedro Álvarez:
Reducing the price of resource provisioning using EC2 spot instances with prediction models. 348-367
- Xia Feng, Liangmin Wang
:
PAU: Privacy Assessment method with Uncertainty consideration for cloud-based vehicular networks. 368-375
- Yongkai Fan, Xiaodong Lin, Gang Tan
, Yuqing Zhang, Wei Dong, Jing Lei:
One secure data integrity verification scheme for cloud storage. 376-385
- Amin Ullah
, Khan Muhammad
, Ijaz Ul Haq, Sung Wook Baik:
Action recognition using optimized deep autoencoder and CNN for surveillance data streams of non-stationary environments. 386-397
- Muhammad Babar
, Fahim Arif, Mian Ahmad Jan
, Zhiyuan Tan
, Fazlullah Khan
:
Urban data management system: Towards Big Data analytics for Internet of Things based smart urban environment using customized Hadoop. 398-409
- Seyed Farhad Aghili
, Hamid Mala
, Mohammad Shojafar
, Pedro Peris-Lopez
:
LACO: Lightweight Three-Factor Authentication, Access Control and Ownership Transfer Scheme for E-Health Systems in IoT. 410-424
- Hui Yan, Xiongtao Zhang, Huangke Chen, Yun Zhou, Weidong Bao, Laurence T. Yang:
DEED: Dynamic Energy-Efficient Data offloading for IoT applications under unstable channel conditions. 425-437 - Yu He
, Guangjie Han
, Hao Wang, James Adu Ansere
, Wenbo Zhang:
A sector-based random routing scheme for protecting the source location privacy in WSNs for the Internet of Things. 438-448
- Sergio López-Huguet
, Alfonso Pérez, Amanda Calatrava
, Carlos de Alfonso, Miguel Caballer
, Germán Moltó
, Ignacio Blanquer:
A self-managed Mesos cluster for data analytics with QoS guarantees. 449-461
- Huixi Li, Wenjun Li, Shigeng Zhang, Haodong Wang, Yi Pan
, Jianxin Wang:
Page-sharing-based virtual machine packing with multi-resource constraints to reduce network traffic in migration for clouds. 462-471
- Fang Xu, Qiong Xu, Zenggang Xiong, Nan Xiao, Yong Xie, Min Deng, Huibing Hao:
Intelligent distributed routing scheme based on social similarity for mobile social networks. 472-480
- Wenjuan Li
, Steven Tug, Weizhi Meng
, Yu Wang:
Designing collaborative blockchained signature-based intrusion detection in IoT environments. 481-489
- Safiollah Heidari
, Rajkumar Buyya
:
Quality of Service (QoS)-driven resource provisioning for large-scale graph processing in cloud computing environments: Graph Processing-as-a-Service (GPaaS). 490-501
- Shenghao Liu, Bang Wang, Minghua Xu, Laurence T. Yang
:
Evolving graph construction for successive recommendation in event-based social networks. 502-514
- Zhiqiang Liu, Shuyang Tang
, Sherman S. M. Chow
, Zhen Liu, Yu Long:
Fork-free hybrid consensus with flexible Proof-of-Activity. 515-524
- Aaron Zimba
, Hongsong Chen
, Zhaoshun Wang:
Bayesian network based weighted APT attack paths modeling in cloud computing. 525-537
- Zeinab Rezaeifar, Jian Wang
, Heekuck Oh, Suk-Bok Lee, Junbeom Hur:
A reliable adaptive forwarding approach in named data networking. 538-551
- Zenun Kastrati
, Ali Shariq Imran
:
Performance analysis of machine learning classifiers on improved concept vector space models. 552-562
- Heesuk Son, Dongman Lee
:
Towards interactive networking: Runtime message inference approach for incompatible protocol updates in IoT environments. 563-578
- Fadi Al-Turjman, Mohammad Abujubbeh
:
IoT-enabled smart grid via SM: An overview. 579-590
- Dongcheng Zhao, Gang Sun
, Dan Liao, Shizhong Xu, Victor Chang
:
Mobile-aware service function chain migration in cloud-fog computing. 591-604
- Raja Waseem Anwar
, Anazida Zainal, Fatma Outay
, Ansar-Ul-Haque Yasar
, Saleem Iqbal:
BTEM: Belief based trust evaluation mechanism for Wireless Sensor Networks. 605-616
- Zheng Xu, Xiangfeng Luo, Yunhuai Liu, Lin Mei, Chuanping Hu:
Power law based foundation for the measurement of discrimination information for human knowledge representation. 617-627 - Chia-Chen Chen, Jia-Lun Tsai:
Determinants of behavioral intention to use the Personalized Location-based Mobile Tourism Application: An empirical study by integrating TAM with ISSM. 628-638 - Xiaokang Zhou, Bo Wu, Qun Jin
:
User role identification based on social behavior and networking analysis for information dissemination. 639-648 - Xiuhui Wang
, Ke Yan
:
Immersive human-computer interactive virtual environment using large-scale display system. 649-659 - Il-Ju Ko, Dongho Kim, Jong Hyuk Park
:
A user experience environment model for human activity simulation. 660-666 - Xu Chen, Judith Gelernter, Han Zhang, Jin Liu:
Multi-lingual geoparsing based on machine translation. 667-677 - Hong Liu, Huansheng Ning
, Qitao Mu, Yumei Zheng, Jing Zeng, Laurence T. Yang, Runhe Huang, Jianhua Ma:
A review of the smart world. 678-691 - Mu-Yen Chen, Ting-Hsuan Chen:
Modeling public mood and emotion: Blog and news sentiment and socio-economic phenomena. 692-699 - Muna Alsallal
, Rahat Iqbal
, Vasile Palade, Saad Ali Amin, Victor Chang
:
An integrated approach for intrinsic plagiarism detection. 700-712 - Tanveer Ahmed, Abhishek Srivastava
:
Combining humans and machines for the future: A novel procedure to predict human interest. 713-730 - Chao-Tung Yang
, Shuo-Tsung Chen, Walter Den
, Yun-Ting Wang, Endah Kristiani
:
Implementation of an Intelligent Indoor Environmental Monitoring and management system in cloud. 731-749
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.