callback( { "result":{ "query":":facetid:toc:\"db/journals/fgcs/fgcs86.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"194.65" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"132", "@dc":"132", "@oc":"132", "@id":"43451118", "text":":facetid:toc:db/journals/fgcs/fgcs86.bht" } }, "hits":{ "@total":"132", "@computed":"132", "@sent":"132", "@first":"0", "hit":[{ "@score":"1", "@id":"2405678", "info":{"authors":{"author":[{"@pid":"195/5342","text":"Mohamed Abdel-Basset"},{"@pid":"210/6838","text":"Mai Mohamed"},{"@pid":"158/5207","text":"Victor I. Chang 0001"}]},"title":"NMCDA: A framework for evaluating cloud computing services.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"12-29","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/Abdel-BassetMC18","doi":"10.1016/J.FUTURE.2018.03.014","ee":"https://doi.org/10.1016/j.future.2018.03.014","url":"https://dblp.org/rec/journals/fgcs/Abdel-BassetMC18"}, "url":"URL#2405678" }, { "@score":"1", "@id":"2405690", "info":{"authors":{"author":[{"@pid":"10/7992","text":"Mahmoud Al-Ayyoub"},{"@pid":"187/6900","text":"Muneera Al-Quraan"},{"@pid":"53/4234","text":"Yaser Jararweh"},{"@pid":"29/5366","text":"Elhadj Benkhelifa"},{"@pid":"38/2282","text":"Salim Hariri"}]},"title":"Resilient service provisioning in cloud based data centers.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"765-774","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/Al-AyyoubAJBH18","doi":"10.1016/J.FUTURE.2017.07.005","ee":"https://doi.org/10.1016/j.future.2017.07.005","url":"https://dblp.org/rec/journals/fgcs/Al-AyyoubAJBH18"}, "url":"URL#2405690" }, { "@score":"1", "@id":"2405701", "info":{"authors":{"author":[{"@pid":"177/1075","text":"Ihtisham Ali"},{"@pid":"80/4297","text":"Susmit Bagchi"}]},"title":"Designing hybrid graph model and algorithmic analysis of workflow decomposition in mobile distributed systems.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"145-161","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/AliB18","doi":"10.1016/J.FUTURE.2018.03.012","ee":"https://doi.org/10.1016/j.future.2018.03.012","url":"https://dblp.org/rec/journals/fgcs/AliB18"}, "url":"URL#2405701" }, { "@score":"1", "@id":"2405707", "info":{"authors":{"author":[{"@pid":"176/6500","text":"Ehab Nabiel Alkhanak"},{"@pid":"54/2983","text":"Sai Peck Lee"}]},"title":"A hyper-heuristic cost optimisation approach for Scientific Workflow Scheduling in cloud computing.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"480-506","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/AlkhanakL18","doi":"10.1016/J.FUTURE.2018.03.055","ee":"https://doi.org/10.1016/j.future.2018.03.055","url":"https://dblp.org/rec/journals/fgcs/AlkhanakL18"}, "url":"URL#2405707" }, { "@score":"1", "@id":"2405708", "info":{"authors":{"author":{"@pid":"154/2116","text":"Orcan Alpar"}},"title":"Biometric touchstroke authentication by fuzzy proximity of touch locations.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"71-80","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/Alpar18","doi":"10.1016/J.FUTURE.2018.03.030","ee":"https://doi.org/10.1016/j.future.2018.03.030","url":"https://dblp.org/rec/journals/fgcs/Alpar18"}, "url":"URL#2405708" }, { "@score":"1", "@id":"2405709", "info":{"authors":{"author":[{"@pid":"133/9395","text":"Zakarea Alshara"},{"@pid":"167/5053","text":"Frederico Alvares"},{"@pid":"50/1751","text":"Hugo Bruneliere"},{"@pid":"115/6296","text":"Jonathan Lejeune"},{"@pid":"139/6447","text":"Charles Prud'homme"},{"@pid":"05/6869","text":"Thomas Ledoux"}]},"title":"CoMe4ACloud: An end-to-end framework for autonomic Cloud systems.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"339-354","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/AlsharaABLPL18","doi":"10.1016/J.FUTURE.2018.03.039","ee":"https://doi.org/10.1016/j.future.2018.03.039","url":"https://dblp.org/rec/journals/fgcs/AlsharaABLPL18"}, "url":"URL#2405709" }, { "@score":"1", "@id":"2405711", "info":{"authors":{"author":[{"@pid":"68/4698","text":"Flora Amato"},{"@pid":"46/295","text":"Aniello Castiglione"},{"@pid":"69/7560","text":"Fabio Mercorio"},{"@pid":"11/6470","text":"Mario Mezzanzanica"},{"@pid":"97/4042","text":"Vincenzo Moscato"},{"@pid":"62/431","text":"Antonio Picariello"},{"@pid":"121/0078","text":"Giancarlo Sperlì"}]},"title":"Multimedia story creation on social networks.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"412-420","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/AmatoCMMMPS18","doi":"10.1016/J.FUTURE.2018.04.006","ee":"https://doi.org/10.1016/j.future.2018.04.006","url":"https://dblp.org/rec/journals/fgcs/AmatoCMMMPS18"}, "url":"URL#2405711" }, { "@score":"1", "@id":"2405725", "info":{"authors":{"author":[{"@pid":"130/6233","text":"Mário Antunes 0001"},{"@pid":"30/262","text":"Diogo Gomes 0001"},{"@pid":"53/223","text":"Rui L. Aguiar"}]},"title":"Towards IoT data classification through semantic features.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"792-798","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/AntunesGA18","doi":"10.1016/J.FUTURE.2017.11.045","ee":"https://doi.org/10.1016/j.future.2017.11.045","url":"https://dblp.org/rec/journals/fgcs/AntunesGA18"}, "url":"URL#2405725" }, { "@score":"1", "@id":"2405736", "info":{"authors":{"author":[{"@pid":"52/2677","text":"Ehsan Ataie"},{"@pid":"50/7467","text":"Reza Entezari-Maleki"},{"@pid":"222/1464","text":"Sayed Ehsan Etesami"},{"@pid":"40/2471","text":"Bernhard Egger"},{"@pid":"13/1991","text":"Danilo Ardagna"},{"@pid":"m/AliMovagharRahimabadi","text":"Ali Movaghar 0001"}]},"title":"Power-aware performance analysis of self-adaptive resource management in IaaS clouds.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"134-144","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/AtaieEEEAM18","doi":"10.1016/J.FUTURE.2018.02.042","ee":"https://doi.org/10.1016/j.future.2018.02.042","url":"https://dblp.org/rec/journals/fgcs/AtaieEEEAM18"}, "url":"URL#2405736" }, { "@score":"1", "@id":"2405739", "info":{"authors":{"author":[{"@pid":"194/6963","text":"Gagangeet Singh Aujla"},{"@pid":"04/8395","text":"Neeraj Kumar 0001"}]},"title":"MEnSuS: An efficient scheme for energy management with sustainability of cloud data centers in edge-cloud environment.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"1279-1300","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/AujlaK18","doi":"10.1016/J.FUTURE.2017.09.066","ee":"https://doi.org/10.1016/j.future.2017.09.066","url":"https://dblp.org/rec/journals/fgcs/AujlaK18"}, "url":"URL#2405739" }, { "@score":"1", "@id":"2405750", "info":{"authors":{"author":[{"@pid":"128/7861","text":"Kirill Belyaev"},{"@pid":"r/IndrakshiRay","text":"Indrakshi Ray"}]},"title":"Component-oriented access control - Application servers meet tuple spaces for the masses.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"726-739","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/BelyaevR18","doi":"10.1016/J.FUTURE.2017.05.003","ee":"https://doi.org/10.1016/j.future.2017.05.003","url":"https://dblp.org/rec/journals/fgcs/BelyaevR18"}, "url":"URL#2405750" }, { "@score":"1", "@id":"2405759", "info":{"authors":{"author":[{"@pid":"51/2589","text":"Roberto Boselli"},{"@pid":"60/5919","text":"Mirko Cesarini"},{"@pid":"69/7560","text":"Fabio Mercorio"},{"@pid":"11/6470","text":"Mario Mezzanzanica"}]},"title":"Classifying online Job Advertisements through Machine Learning.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"319-328","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/BoselliCMM18","doi":"10.1016/J.FUTURE.2018.03.035","ee":"https://doi.org/10.1016/j.future.2018.03.035","url":"https://dblp.org/rec/journals/fgcs/BoselliCMM18"}, "url":"URL#2405759" }, { "@score":"1", "@id":"2405772", "info":{"authors":{"author":[{"@pid":"17/1169-5","text":"Bin Cao 0005"},{"@pid":"35/4780-1","text":"Jianwei Zhao 0001"},{"@pid":"76/1820-55","text":"Xin Liu 0055"},{"@pid":"185/1451","text":"Xinyuan Kang"},{"@pid":"72/8479","text":"Shan Yang"},{"@pid":"69/6765","text":"Kai Kang"},{"@pid":"42/1562-1","text":"Ming Yu 0001"}]},"title":"Multiobjective recommendation optimization via utilizing distributed parallel algorithm.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"1259-1268","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/CaoZLKYKY18","doi":"10.1016/J.FUTURE.2017.09.005","ee":"https://doi.org/10.1016/j.future.2017.09.005","url":"https://dblp.org/rec/journals/fgcs/CaoZLKYKY18"}, "url":"URL#2405772" }, { "@score":"1", "@id":"2405782", "info":{"authors":{"author":[{"@pid":"46/295","text":"Aniello Castiglione"},{"@pid":"62/291","text":"Francesco Colace"},{"@pid":"97/4042","text":"Vincenzo Moscato"},{"@pid":"86/2508-2","text":"Francesco Palmieri 0002"}]},"title":"CHIS: A big data infrastructure to manage digital cultural items.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"1134-1145","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/CastiglioneCMP18","doi":"10.1016/J.FUTURE.2017.04.006","ee":"https://doi.org/10.1016/j.future.2017.04.006","url":"https://dblp.org/rec/journals/fgcs/CastiglioneCMP18"}, "url":"URL#2405782" }, { "@score":"1", "@id":"2405786", "info":{"authors":{"author":[{"@pid":"12/1272","text":"Wenbing Chang"},{"@pid":"85/10035","text":"Zhenzhong Xu"},{"@pid":"49/6599","text":"Shenghan Zhou"},{"@pid":"94/3380","text":"Wen Cao"}]},"title":"Research on detection methods based on Doc2vec abnormal comments.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"656-662","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/ChangXZC18","doi":"10.1016/J.FUTURE.2018.04.059","ee":"https://doi.org/10.1016/j.future.2018.04.059","url":"https://dblp.org/rec/journals/fgcs/ChangXZC18"}, "url":"URL#2405786" }, { "@score":"1", "@id":"2405794", "info":{"authors":{"author":[{"@pid":"182/8911","text":"Yankun Chen"},{"@pid":"73/3157","text":"Fei Ji"},{"@pid":"46/7206","text":"Quansheng Guan"},{"@pid":"78/7004","text":"Yide Wang"},{"@pid":"99/2217","text":"Fangjiong Chen"},{"@pid":"02/2407-1","text":"Hua Yu 0001"}]},"title":"Adaptive RTO for handshaking-based MAC protocols in underwater acoustic networks.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"1185-1192","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/ChenJGWCY18","doi":"10.1016/J.FUTURE.2017.08.022","ee":"https://doi.org/10.1016/j.future.2017.08.022","url":"https://dblp.org/rec/journals/fgcs/ChenJGWCY18"}, "url":"URL#2405794" }, { "@score":"1", "@id":"2405795", "info":{"authors":{"author":[{"@pid":"50/6996-3","text":"Min Chen 0003"},{"@pid":"64/6025-61","text":"Wei Li 0061"},{"@pid":"163/7333","text":"Yixue Hao"},{"@pid":"186/8821","text":"Yongfeng Qian"},{"@pid":"41/7072","text":"Iztok Humar"}]},"title":"Edge cognitive computing based smart healthcare system.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"403-411","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/ChenLHQH18","doi":"10.1016/J.FUTURE.2018.03.054","ee":"https://doi.org/10.1016/j.future.2018.03.054","url":"https://dblp.org/rec/journals/fgcs/ChenLHQH18"}, "url":"URL#2405795" }, { "@score":"1", "@id":"2405801", "info":{"authors":{"author":[{"@pid":"83/6331","text":"Xu Chen"},{"@pid":"84/6889","text":"Jie Zhang"},{"@pid":"83/2535","text":"Zheng Xu"},{"@pid":"01/2537","text":"Jin Liu"}]},"title":"HIB-tree: An efficient index method for the big data analytics of large-scale human activity trajectories.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"1269-1278","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/ChenZXL18","doi":"10.1016/J.FUTURE.2018.01.004","ee":"https://doi.org/10.1016/j.future.2018.01.004","url":"https://dblp.org/rec/journals/fgcs/ChenZXL18"}, "url":"URL#2405801" }, { "@score":"1", "@id":"2405806", "info":{"authors":{"author":[{"@pid":"138/1608","text":"Yuxia Cheng"},{"@pid":"50/2192-1","text":"Yang Xiang 0001"},{"@pid":"70/2079","text":"Wenzhi Chen"},{"@pid":"72/5369","text":"Houcine Hassan"},{"@pid":"56/7481","text":"Abdulhameed Alelaiwi"}]},"title":"Efficient cache resource aggregation using adaptive multi-level exclusive caching policies.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"964-974","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/ChengXCHA18","doi":"10.1016/J.FUTURE.2017.09.044","ee":"https://doi.org/10.1016/j.future.2017.09.044","url":"https://dblp.org/rec/journals/fgcs/ChengXCHA18"}, "url":"URL#2405806" }, { "@score":"1", "@id":"2405807", "info":{"authors":{"author":[{"@pid":"203/8593","text":"Bogdan-Cosmin Chifor"},{"@pid":"35/6866","text":"Ion Bica"},{"@pid":"01/7267","text":"Victor Valeriu Patriciu"},{"@pid":"26/5194","text":"Florin Pop"}]},"title":"A security authorization scheme for smart home Internet of Things devices.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"740-749","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/ChiforBPP18","doi":"10.1016/J.FUTURE.2017.05.048","ee":"https://doi.org/10.1016/j.future.2017.05.048","url":"https://dblp.org/rec/journals/fgcs/ChiforBPP18"}, "url":"URL#2405807" }, { "@score":"1", "@id":"2405819", "info":{"authors":{"author":[{"@pid":"86/10615","text":"Laizhong Cui"},{"@pid":"222/1462","text":"Wenyuan Huang"},{"@pid":"71/1527","text":"Qiao Yan"},{"@pid":"16/6654","text":"F. Richard Yu"},{"@pid":"137/9246","text":"Zhenkun Wen"},{"@pid":"14/4965","text":"Nan Lu"}]},"title":"A novel context-aware recommendation algorithm with two-level SVD in social networks.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"1459-1470","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/CuiHYYWL18","doi":"10.1016/J.FUTURE.2017.07.017","ee":"https://doi.org/10.1016/j.future.2017.07.017","url":"https://dblp.org/rec/journals/fgcs/CuiHYYWL18"}, "url":"URL#2405819" }, { "@score":"1", "@id":"2405826", "info":{"authors":{"author":[{"@pid":"18/4520","text":"Tassos Dimitriou"},{"@pid":"158/7878","text":"Naser Al-Ibrahim"}]},"title":""I wasn't there" - Deniable, privacy-aware scheme for decentralized Location-based Services.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"253-265","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/DimitriouA18","doi":"10.1016/J.FUTURE.2018.04.004","ee":"https://doi.org/10.1016/j.future.2018.04.004","url":"https://dblp.org/rec/journals/fgcs/DimitriouA18"}, "url":"URL#2405826" }, { "@score":"1", "@id":"2405832", "info":{"authors":{"author":[{"@pid":"88/7785","text":"Kai Dong"},{"@pid":"222/1395","text":"Taolin Guo"},{"@pid":"299/4980","text":"Haibo Ye"},{"@pid":"93/5369","text":"Xuansong Li"},{"@pid":"79/7563","text":"Zhen Ling"}]},"title":"On the limitations of existing notions of location privacy.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"1513-1522","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/DongGYLL18","doi":"10.1016/J.FUTURE.2017.05.045","ee":"https://doi.org/10.1016/j.future.2017.05.045","url":"https://dblp.org/rec/journals/fgcs/DongGYLL18"}, "url":"URL#2405832" }, { "@score":"1", "@id":"2405833", "info":{"authors":{"author":[{"@pid":"57/5595","text":"Wanchun Dou"},{"@pid":"10/137-1","text":"Xiaolong Xu 0001"},{"@pid":"31/5736","text":"Xiang Liu"},{"@pid":"y/LaurenceTianruoYang","text":"Laurence T. Yang"},{"@pid":"20/1210","text":"Yiping Wen"}]},"title":"A Resource Co-Allocation method for load-balance scheduling over big data platforms.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"1064-1075","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/DouXLYW18","doi":"10.1016/J.FUTURE.2017.07.009","ee":"https://doi.org/10.1016/j.future.2017.07.009","url":"https://dblp.org/rec/journals/fgcs/DouXLYW18"}, "url":"URL#2405833" }, { "@score":"1", "@id":"2405838", "info":{"authors":{"author":[{"@pid":"203/1121","text":"Mateja Dumic"},{"@pid":"152/5269","text":"Dominik Sisejkovic"},{"@pid":"202/9402","text":"Rebeka Coric"},{"@pid":"82/5852","text":"Domagoj Jakobovic"}]},"title":"Evolving priority rules for resource constrained project scheduling problem with genetic programming.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"211-221","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/DumicSCJ18","doi":"10.1016/J.FUTURE.2018.04.029","ee":"https://doi.org/10.1016/j.future.2018.04.029","url":"https://dblp.org/rec/journals/fgcs/DumicSCJ18"}, "url":"URL#2405838" }, { "@score":"1", "@id":"2405840", "info":{"authors":{"author":[{"@pid":"173/3758","text":"Mohamed Elhoseny"},{"@pid":"16/9939","text":"Ahmed Abdelaziz"},{"@pid":"83/7092","text":"Ahmed S. Salama"},{"@pid":"173/3744","text":"Alaa Mohamed Riad"},{"@pid":"159/2187","text":"Khan Muhammad 0001"},{"@pid":"150/1679","text":"Arun Kumar Sangaiah"}]},"title":"A hybrid model of Internet of Things and cloud computing to manage big data in health services applications.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"1383-1394","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/ElhosenyASRMS18","doi":"10.1016/J.FUTURE.2018.03.005","ee":"https://doi.org/10.1016/j.future.2018.03.005","url":"https://dblp.org/rec/journals/fgcs/ElhosenyASRMS18"}, "url":"URL#2405840" }, { "@score":"1", "@id":"2405858", "info":{"authors":{"author":[{"@pid":"57/8878","text":"Yixiong Feng"},{"@pid":"03/2567","text":"Zhifeng Zhang"},{"@pid":"68/10526","text":"Guangdong Tian"},{"@pid":"21/9114","text":"Zhihan Lv"},{"@pid":"222/1355","text":"Shaoxu Tian"},{"@pid":"119/1719","text":"Hongfei Jia"}]},"title":"Data-driven accurate design of variable blank holder force in sheet forming under interval uncertainty using sequential approximate multi-objective optimization.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"1242-1250","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/FengZTLTJ18","doi":"10.1016/J.FUTURE.2017.02.048","ee":"https://doi.org/10.1016/j.future.2017.02.048","url":"https://dblp.org/rec/journals/fgcs/FengZTLTJ18"}, "url":"URL#2405858" }, { "@score":"1", "@id":"2405860", "info":{"authors":{"author":[{"@pid":"49/1311","text":"Massimo Ficco"},{"@pid":"07/504","text":"Roberto Pietrantuono"},{"@pid":"20/665","text":"Stefano Russo 0001"}]},"title":"Aging-related performance anomalies in the apache storm stream processing system.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"975-994","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/FiccoPR18","doi":"10.1016/J.FUTURE.2017.08.051","ee":"https://doi.org/10.1016/j.future.2017.08.051","url":"https://dblp.org/rec/journals/fgcs/FiccoPR18"}, "url":"URL#2405860" }, { "@score":"1", "@id":"2405883", "info":{"authors":{"author":[{"@pid":"194/2742-2","text":"Shubham Goel 0002"},{"@pid":"78/10606-2","text":"Ravinder Kumar 0002"}]},"title":"Brownian Motus and Clustered Binary Insertion Sort methods: An efficient progress over traditional methods.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"266-280","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/GoelK18","doi":"10.1016/J.FUTURE.2018.04.038","ee":"https://doi.org/10.1016/j.future.2018.04.038","url":"https://dblp.org/rec/journals/fgcs/GoelK18"}, "url":"URL#2405883" }, { "@score":"1", "@id":"2405895", "info":{"authors":{"author":[{"@pid":"198/3938","text":"Léo Grange"},{"@pid":"37/2282","text":"Georges Da Costa"},{"@pid":"49/3338","text":"Patricia Stolf"}]},"title":"Green IT scheduling for data center powered with renewable energy.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"99-120","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/GrangeCS18","doi":"10.1016/J.FUTURE.2018.03.049","ee":"https://doi.org/10.1016/j.future.2018.03.049","url":"https://dblp.org/rec/journals/fgcs/GrangeCS18"}, "url":"URL#2405895" }, { "@score":"1", "@id":"2405897", "info":{"authors":{"author":[{"@pid":"05/2603","text":"Marco Gribaudo"},{"@pid":"05/1559","text":"Mauro Iacono"},{"@pid":"86/578","text":"Mariam Kiran"}]},"title":"A performance modeling framework for lambda architecture based applications.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"1032-1041","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/GribaudoIK18","doi":"10.1016/J.FUTURE.2017.07.033","ee":"https://doi.org/10.1016/j.future.2017.07.033","url":"https://dblp.org/rec/journals/fgcs/GribaudoIK18"}, "url":"URL#2405897" }, { "@score":"1", "@id":"2405899", "info":{"authors":{"author":[{"@pid":"147/8836","text":"Daniel Grzonka"},{"@pid":"185/6909","text":"Agnieszka Jakobik"},{"@pid":"08/5515","text":"Joanna Kolodziej"},{"@pid":"40/1392","text":"Sabri Pllana"}]},"title":"Using a multi-agent system and artificial intelligence for monitoring and improving the cloud performance and security.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"1106-1117","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/GrzonkaJKP18","doi":"10.1016/J.FUTURE.2017.05.046","ee":"https://doi.org/10.1016/j.future.2017.05.046","url":"https://dblp.org/rec/journals/fgcs/GrzonkaJKP18"}, "url":"URL#2405899" }, { "@score":"1", "@id":"2405909", "info":{"authors":{"author":[{"@pid":"185/9576","text":"Brij B. Gupta"},{"@pid":"150/1679","text":"Arun Kumar Sangaiah"},{"@pid":"n/NadiaNedjah","text":"Nadia Nedjah"},{"@pid":"73/1323","text":"Shingo Yamaguchi"},{"@pid":"03/5274-2","text":"Zhiyong Zhang 0002"},{"@pid":"s/QuanZSheng","text":"Michael Sheng 0001"}]},"title":"Recent research in computational intelligence paradigms into security and privacy for online social networks (OSNs).","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"851-854","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/GuptaSNYZS18","doi":"10.1016/J.FUTURE.2018.05.017","ee":"https://doi.org/10.1016/j.future.2018.05.017","url":"https://dblp.org/rec/journals/fgcs/GuptaSNYZS18"}, "url":"URL#2405909" }, { "@score":"1", "@id":"2405916", "info":{"authors":{"author":[{"@pid":"22/824","text":"Md. Abdul Hamid"},{"@pid":"85/744","text":"Mohammad Abdullah-Al-Wadud"},{"@pid":"84/4762","text":"Mohammad Mehedi Hassan"},{"@pid":"63/1919","text":"Ahmad Almogren"},{"@pid":"25/2352","text":"Atif Alamri"},{"@pid":"26/9153","text":"Abu Raihan M. Kamal"},{"@pid":"24/4653","text":"Md. Mamun-Or-Rashid"}]},"title":"A key distribution scheme for secure communication in acoustic sensor networks.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"1209-1217","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/HamidAHAAKM18","doi":"10.1016/J.FUTURE.2017.07.025","ee":"https://doi.org/10.1016/j.future.2017.07.025","url":"https://dblp.org/rec/journals/fgcs/HamidAHAAKM18"}, "url":"URL#2405916" }, { "@score":"1", "@id":"2405918", "info":{"authors":{"author":[{"@pid":"116/7911","text":"Zhijie Han 0001"},{"@pid":"30/1565","text":"Yaqiong Li"},{"@pid":"17/2703","text":"Jie Li"}]},"title":"A novel routing algorithm for IoT cloud based on hash offset tree.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"456-463","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/HanLL18","doi":"10.1016/J.FUTURE.2018.02.047","ee":"https://doi.org/10.1016/j.future.2018.02.047","url":"https://dblp.org/rec/journals/fgcs/HanLL18"}, "url":"URL#2405918" }, { "@score":"1", "@id":"2405919", "info":{"authors":{"author":[{"@pid":"222/1332","text":"Shi-Zhuan Han"},{"@pid":"92/7602","text":"Wen-Tsao Pan"},{"@pid":"222/0614","text":"Ying-Ying Zhou"},{"@pid":"222/1523","text":"Zong-Li Liu"}]},"title":"Construct the prediction model for China agricultural output value based on the optimization neural network of fruit fly optimization algorithm.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"663-669","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/HanPZL18","doi":"10.1016/J.FUTURE.2018.04.058","ee":"https://doi.org/10.1016/j.future.2018.04.058","url":"https://dblp.org/rec/journals/fgcs/HanPZL18"}, "url":"URL#2405919" }, { "@score":"1", "@id":"2405922", "info":{"authors":{"author":[{"@pid":"h/RagibHasan","text":"Ragib Hasan"},{"@pid":"164/3720","text":"Md. Mahmud Hossain"},{"@pid":"122/1085","text":"Rasib Khan"}]},"title":"Aura: An incentive-driven ad-hoc IoT cloud framework for proximal mobile computation offloading.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"821-835","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/HasanHK18","doi":"10.1016/J.FUTURE.2017.11.024","ee":"https://doi.org/10.1016/j.future.2017.11.024","url":"https://dblp.org/rec/journals/fgcs/HasanHK18"}, "url":"URL#2405922" }, { "@score":"1", "@id":"2405923", "info":{"authors":{"author":[{"@pid":"45/700","text":"Khawar Hasham"},{"@pid":"00/909","text":"Kamran Munir"},{"@pid":"75/860","text":"Richard McClatchey"}]},"title":"Cloud infrastructure provenance collection and management to reproduce scientific workflows execution.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"799-820","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/HashamMM18","doi":"10.1016/J.FUTURE.2017.07.015","ee":"https://doi.org/10.1016/j.future.2017.07.015","url":"https://dblp.org/rec/journals/fgcs/HashamMM18"}, "url":"URL#2405923" }, { "@score":"1", "@id":"2405927", "info":{"authors":{"author":[{"@pid":"222/1505","text":"Álvaro Brandón Hernández"},{"@pid":"p/MSPerezHernandez","text":"María S. Pérez 0001"},{"@pid":"123/3346","text":"Smrati Gupta"},{"@pid":"79/488","text":"Victor Muntés-Mulero"}]},"title":"Using machine learning to optimize parallelism in big data applications.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"1076-1092","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/HernandezPGM18","doi":"10.1016/J.FUTURE.2017.07.003","ee":"https://doi.org/10.1016/j.future.2017.07.003","url":"https://dblp.org/rec/journals/fgcs/HernandezPGM18"}, "url":"URL#2405927" }, { "@score":"1", "@id":"2405929", "info":{"authors":{"author":[{"@pid":"68/10016","text":"Allaa R. Hilal"},{"@pid":"51/6567","text":"Aya Sayedelahl"},{"@pid":"15/3847","text":"Arash Tabibiazar"},{"@pid":"k/MSKamel","text":"Mohamed S. Kamel"},{"@pid":"b/OtmanABasir","text":"Otman A. Basir"}]},"title":"A distributed sensor management for large-scale IoT indoor acoustic surveillance.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"1170-1184","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/HilalSTKB18","doi":"10.1016/J.FUTURE.2018.01.020","ee":"https://doi.org/10.1016/j.future.2018.01.020","url":"https://dblp.org/rec/journals/fgcs/HilalSTKB18"}, "url":"URL#2405929" }, { "@score":"1", "@id":"2405934", "info":{"authors":{"author":[{"@pid":"66/5574","text":"M. Shamim Hossain"},{"@pid":"70/8117","text":"Mohammed F. Alhamid"},{"@pid":"49/10239","text":"Ghulam Muhammad"}]},"title":"Collaborative analysis model for trending images on social networks.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"855-862","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/HossainAM18","doi":"10.1016/J.FUTURE.2017.01.030","ee":"https://doi.org/10.1016/j.future.2017.01.030","url":"https://dblp.org/rec/journals/fgcs/HossainAM18"}, "url":"URL#2405934" }, { "@score":"1", "@id":"2405939", "info":{"authors":{"author":[{"@pid":"151/4061","text":"Ta Yuan Hsu"},{"@pid":"96/6394","text":"Ajay D. Kshemkalyani"},{"@pid":"09/5499","text":"Min Shen"}]},"title":"Causal consistency algorithms for partially replicated and fully replicated systems.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"1118-1133","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/HsuKS18","doi":"10.1016/J.FUTURE.2017.04.044","ee":"https://doi.org/10.1016/j.future.2017.04.044","url":"https://dblp.org/rec/journals/fgcs/HsuKS18"}, "url":"URL#2405939" }, { "@score":"1", "@id":"2405942", "info":{"authors":{"author":[{"@pid":"130/4705","text":"Long Hu"},{"@pid":"y/JunYang14","text":"Jun Yang 0014"},{"@pid":"50/6996-3","text":"Min Chen 0003"},{"@pid":"186/8821","text":"Yongfeng Qian"},{"@pid":"25/3419","text":"Joel J. P. C. Rodrigues"}]},"title":"SCAI-SVSC: Smart clothing for effective interaction with a sustainable vital sign collection.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"329-338","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/HuYCQR18","doi":"10.1016/J.FUTURE.2018.03.042","ee":"https://doi.org/10.1016/j.future.2018.03.042","url":"https://dblp.org/rec/journals/fgcs/HuYCQR18"}, "url":"URL#2405942" }, { "@score":"1", "@id":"2405949", "info":{"authors":{"author":[{"@pid":"67/4573","text":"Xiaohong Huang"},{"@pid":"98/476-3","text":"Kun Xie 0003"},{"@pid":"98/4623","text":"Supeng Leng"},{"@pid":"132/1328","text":"Tingting Yuan"},{"@pid":"74/1079","text":"Maode Ma"}]},"title":"Improving Quality of Experience in multimedia Internet of Things leveraging machine learning on big data.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"1413-1423","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/HuangXLYM18","doi":"10.1016/J.FUTURE.2018.02.046","ee":"https://doi.org/10.1016/j.future.2018.02.046","url":"https://dblp.org/rec/journals/fgcs/HuangXLYM18"}, "url":"URL#2405949" }, { "@score":"1", "@id":"2405950", "info":{"authors":{"author":[{"@pid":"22/8338","text":"Qinlong Huang"},{"@pid":"33/5774","text":"Yixian Yang"},{"@pid":"138/6885","text":"Jingyi Fu"}]},"title":"PRECISE: Identity-based private data sharing with conditional proxy re-encryption in online social networks.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"1523-1533","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/HuangYF18","doi":"10.1016/J.FUTURE.2017.05.026","ee":"https://doi.org/10.1016/j.future.2017.05.026","url":"https://dblp.org/rec/journals/fgcs/HuangYF18"}, "url":"URL#2405950" }, { "@score":"1", "@id":"2405951", "info":{"authors":{"author":[{"@pid":"22/8338","text":"Qinlong Huang"},{"@pid":"33/5774","text":"Yixian Yang"},{"@pid":"199/9095","text":"Mansuo Shen"}]},"title":"Corrigendum to "Secure and efficient data collaboration with hierarchical attribute-based encryption in cloud computing" [Future Gener. Comput. Syst. 72 (2017) 239-249].","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"1534","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/HuangYS18","doi":"10.1016/J.FUTURE.2018.05.041","ee":"https://doi.org/10.1016/j.future.2018.05.041","url":"https://dblp.org/rec/journals/fgcs/HuangYS18"}, "url":"URL#2405951" }, { "@score":"1", "@id":"2405957", "info":{"authors":{"author":[{"@pid":"188/5971","text":"Wissem Inoubli"},{"@pid":"09/7833","text":"Sabeur Aridhi"},{"@pid":"34/569","text":"Haithem Mezni"},{"@pid":"62/2885","text":"Mondher Maddouri"},{"@pid":"10/3832","text":"Engelbert Mephu Nguifo"}]},"title":"An experimental survey on big data frameworks.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"546-564","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/InoubliAMMN18","doi":"10.1016/J.FUTURE.2018.04.032","ee":"https://doi.org/10.1016/j.future.2018.04.032","url":"https://dblp.org/rec/journals/fgcs/InoubliAMMN18"}, "url":"URL#2405957" }, { "@score":"1", "@id":"2405958", "info":{"authors":{"author":[{"@pid":"222/1481","text":"Eiman Iranpour"},{"@pid":"63/4264","text":"Saeed Sharifian"}]},"title":"A distributed load balancing and admission control algorithm based on Fuzzy type-2 and Game theory for large-scale SaaS cloud architectures.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"81-98","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/IranpourS18","doi":"10.1016/J.FUTURE.2018.03.045","ee":"https://doi.org/10.1016/j.future.2018.03.045","url":"https://dblp.org/rec/journals/fgcs/IranpourS18"}, "url":"URL#2405958" }, { "@score":"1", "@id":"2405965", "info":{"authors":{"author":[{"@pid":"201/5490","text":"Chandrashekar Jatoth"},{"@pid":"10/3459","text":"G. R. Gangadharan"},{"@pid":"56/6378","text":"Ugo Fiore"},{"@pid":"b/RajkumarBuyya","text":"Rajkumar Buyya"}]},"title":"QoS-aware Big service composition using MapReduce based evolutionary algorithm with guided mutation.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"1008-1018","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/JatothGFB18","doi":"10.1016/J.FUTURE.2017.07.042","ee":"https://doi.org/10.1016/j.future.2017.07.042","url":"https://dblp.org/rec/journals/fgcs/JatothGFB18"}, "url":"URL#2405965" }, { "@score":"1", "@id":"2405968", "info":{"authors":{"author":[{"@pid":"92/5420-1","text":"Ying Ji 0001"},{"@pid":"70/1726","text":"Meng Li"},{"@pid":"89/3489","text":"Shaojian Qu"}]},"title":"Multi-objective linear programming games and applications in supply chain competition.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"591-597","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/JiLQ18","doi":"10.1016/J.FUTURE.2018.04.041","ee":"https://doi.org/10.1016/j.future.2018.04.041","url":"https://dblp.org/rec/journals/fgcs/JiLQ18"}, "url":"URL#2405968" }, { "@score":"1", "@id":"2405981", "info":{"authors":{"author":[{"@pid":"k/JoarderKamruzzaman","text":"Joarder Kamruzzaman"},{"@pid":"81/3285-1","text":"Guojun Wang 0001"},{"@pid":"61/1339","text":"Gour C. Karmakar"},{"@pid":"30/5329","text":"Iftekhar Ahmad"},{"@pid":"88/7649","text":"Md. Zakirul Alam Bhuiyan"}]},"title":"Acoustic sensor networks in the Internet of Things applications.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"1167-1169","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/KamruzzamanWKAB18","doi":"10.1016/J.FUTURE.2018.05.019","ee":"https://doi.org/10.1016/j.future.2018.05.019","url":"https://dblp.org/rec/journals/fgcs/KamruzzamanWKAB18"}, "url":"URL#2405981" }, { "@score":"1", "@id":"2405984", "info":{"authors":{"author":[{"@pid":"61/1339","text":"Gour C. Karmakar"},{"@pid":"k/JoarderKamruzzaman","text":"Joarder Kamruzzaman"},{"@pid":"152/8880","text":"Nusrat Nowsheen"}]},"title":"An efficient data delivery mechanism for AUV-based Ad hoc UASNs.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"1193-1208","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/KarmakarKN18","doi":"10.1016/J.FUTURE.2017.10.025","ee":"https://doi.org/10.1016/j.future.2017.10.025","url":"https://dblp.org/rec/journals/fgcs/KarmakarKN18"}, "url":"URL#2405984" }, { "@score":"1", "@id":"2405986", "info":{"authors":{"author":[{"@pid":"222/1365","text":"Harmanjeet Kaur"},{"@pid":"04/8395","text":"Neeraj Kumar 0001"},{"@pid":"24/6409","text":"Shalini Batra"}]},"title":"An efficient multi-party scheme for privacy preserving collaborative filtering for healthcare recommender system.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"297-307","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/KaurKB18","doi":"10.1016/J.FUTURE.2018.03.017","ee":"https://doi.org/10.1016/j.future.2018.03.017","url":"https://dblp.org/rec/journals/fgcs/KaurKB18"}, "url":"URL#2405986" }, { "@score":"1", "@id":"2405987", "info":{"authors":{"author":[{"@pid":"118/7836","text":"Eva Kern"},{"@pid":"36/6947","text":"Lorenz M. Hilty"},{"@pid":"134/4461","text":"Achim Guldner"},{"@pid":"208/2291","text":"Yuliyan V. Maksimov"},{"@pid":"24/4451","text":"Andreas Filler"},{"@pid":"222/1361","text":"Jens Gröger"},{"@pid":"08/1313","text":"Stefan Naumann"}]},"title":"Sustainable software products - Towards assessment criteria for resource and energy efficiency.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"199-210","year":"2018","type":"Journal Articles","access":"open","key":"journals/fgcs/KernHGMFGN18","doi":"10.1016/J.FUTURE.2018.02.044","ee":"https://doi.org/10.1016/j.future.2018.02.044","url":"https://dblp.org/rec/journals/fgcs/KernHGMFGN18"}, "url":"URL#2405987" }, { "@score":"1", "@id":"2405989", "info":{"authors":{"author":[{"@pid":"59/10798","text":"Enan A. Khalil"},{"@pid":"70/6467","text":"Suat Ozdemir"},{"@pid":"29/4213","text":"Suleyman Tosun"}]},"title":"Evolutionary task allocation in Internet of Things-based application domains.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"121-133","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/KhalilOT18","doi":"10.1016/J.FUTURE.2018.03.033","ee":"https://doi.org/10.1016/j.future.2018.03.033","url":"https://dblp.org/rec/journals/fgcs/KhalilOT18"}, "url":"URL#2405989" }, { "@score":"1", "@id":"2405990", "info":{"authors":{"author":[{"@pid":"122/4755","text":"Asmat Ullah Khan"},{"@pid":"80/4297","text":"Susmit Bagchi"}]},"title":"Software architecture and algorithm for reliable RPC for geo-distributed mobile computing systems.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"185-198","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/KhanB18","doi":"10.1016/J.FUTURE.2018.04.023","ee":"https://doi.org/10.1016/j.future.2018.04.023","url":"https://dblp.org/rec/journals/fgcs/KhanB18"}, "url":"URL#2405990" }, { "@score":"1", "@id":"2405995", "info":{"authors":{"author":{"@pid":"124/8581","text":"Pyoung Won Kim"}},"title":"Real-time bio-signal-processing of students based on an Intelligent algorithm for Internet of Things to assess engagement levels in a classroom.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"716-722","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/Kim18","doi":"10.1016/J.FUTURE.2018.04.093","ee":"https://doi.org/10.1016/j.future.2018.04.093","url":"https://dblp.org/rec/journals/fgcs/Kim18"}, "url":"URL#2405995" }, { "@score":"1", "@id":"2406000", "info":{"authors":{"author":[{"@pid":"71/4081","text":"Anna Kobusinska"},{"@pid":"222/1339","text":"Kamil Pawluczuk"},{"@pid":"56/766","text":"Jerzy Brzezinski"}]},"title":"Big Data fingerprinting information analytics for sustainability.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"1321-1337","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/KobusinskaPB18","doi":"10.1016/J.FUTURE.2017.12.061","ee":"https://doi.org/10.1016/j.future.2017.12.061","url":"https://dblp.org/rec/journals/fgcs/KobusinskaPB18"}, "url":"URL#2406000" }, { "@score":"1", "@id":"2406013", "info":{"authors":{"author":[{"@pid":"214/3701","text":"Priyan Malarvizhi Kumar"},{"@pid":"75/8147","text":"S. Lokesh"},{"@pid":"232/9374","text":"R. Varatharajan 0001"},{"@pid":"222/1465","text":"Gokulnath Chandra Babu"},{"@pid":"225/2562","text":"Parthasarathy Panchatcharam"}]},"title":"Cloud and IoT based disease prediction and diagnosis system for healthcare using Fuzzy neural classifier.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"527-534","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/KumarLVBP18","doi":"10.1016/J.FUTURE.2018.04.036","ee":"https://doi.org/10.1016/j.future.2018.04.036","url":"https://dblp.org/rec/journals/fgcs/KumarLVBP18"}, "url":"URL#2406013" }, { "@score":"1", "@id":"2406016", "info":{"authors":{"author":[{"@pid":"01/7634","text":"Chien-Ting Kuo"},{"@pid":"07/4559","text":"Po-Wen Chi"},{"@pid":"158/5207","text":"Victor Chang 0001"},{"@pid":"31/3229","text":"Chin-Laung Lei"}]},"title":"SFaaS: Keeping an eye on IoT fusion environment with security fusion as a service.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"1424-1436","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/KuoCCL18","doi":"10.1016/J.FUTURE.2017.12.069","ee":"https://doi.org/10.1016/j.future.2017.12.069","url":"https://dblp.org/rec/journals/fgcs/KuoCCL18"}, "url":"URL#2406016" }, { "@score":"1", "@id":"2406019", "info":{"authors":{"author":[{"@pid":"155/0856","text":"Chahrazed Labba"},{"@pid":"40/9467","text":"Narjès Bellamine Ben Saoud"},{"@pid":"d/JulieDugdale","text":"Julie Dugdale"}]},"title":"A predictive approach for the efficient distribution of agent-based systems on a hybrid-cloud.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"750-764","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/LabbaSD18","doi":"10.1016/J.FUTURE.2017.10.053","ee":"https://doi.org/10.1016/j.future.2017.10.053","url":"https://dblp.org/rec/journals/fgcs/LabbaSD18"}, "url":"URL#2406019" }, { "@score":"1", "@id":"2406021", "info":{"authors":{"author":[{"@pid":"160/1183","text":"Jiwan Lee"},{"@pid":"39/848","text":"Bonghee Hong"},{"@pid":"148/9555","text":"Sunghoon Jung"},{"@pid":"158/5207","text":"Victor Chang 0001"}]},"title":"Clustering learning model of CCTV image pattern for producing road hazard meteorological information.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"1338-1350","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/LeeHJC18","doi":"10.1016/J.FUTURE.2018.03.022","ee":"https://doi.org/10.1016/j.future.2018.03.022","url":"https://dblp.org/rec/journals/fgcs/LeeHJC18"}, "url":"URL#2406021" }, { "@score":"1", "@id":"2406027", "info":{"authors":{"author":[{"@pid":"22/3589","text":"Gregory Levitin"},{"@pid":"81/6453","text":"Liudong Xing"},{"@pid":"89/3269","text":"Barry W. Johnson"},{"@pid":"18/5175","text":"Yuanshun Dai"}]},"title":"Optimization of dynamic spot-checking for collusion tolerance in grid computing.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"30-38","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/LevitinXJD18","doi":"10.1016/J.FUTURE.2018.01.049","ee":"https://doi.org/10.1016/j.future.2018.01.049","url":"https://dblp.org/rec/journals/fgcs/LevitinXJD18"}, "url":"URL#2406027" }, { "@score":"1", "@id":"2406061", "info":{"authors":{"author":[{"@pid":"53/282-1","text":"Weiwei Lin 0001"},{"@pid":"181/3887","text":"Wentai Wu"},{"@pid":"50/8499","text":"Haoyu Wang"},{"@pid":"w/JamesZijunWang","text":"James Z. Wang 0002"},{"@pid":"35/3725","text":"Ching-Hsien Hsu"}]},"title":"Experimental and quantitative analysis of server power model for cloud data centers.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"940-950","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/LinWWWH18","doi":"10.1016/J.FUTURE.2016.11.034","ee":"https://doi.org/10.1016/j.future.2016.11.034","url":"https://dblp.org/rec/journals/fgcs/LinWWWH18"}, "url":"URL#2406061" }, { "@score":"1", "@id":"2406066", "info":{"authors":{"author":[{"@pid":"194/9823","text":"Guiyan Liu"},{"@pid":"23/4556","text":"Songtao Guo"},{"@pid":"21/6580","text":"Quanjun Zhao"},{"@pid":"10/2031-1","text":"Yuanyuan Yang 0001"}]},"title":"Tomogravity space based traffic matrix estimation in data center networks.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"39-50","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/LiuGZY18","doi":"10.1016/J.FUTURE.2018.03.011","ee":"https://doi.org/10.1016/j.future.2018.03.011","url":"https://dblp.org/rec/journals/fgcs/LiuGZY18"}, "url":"URL#2406066" }, { "@score":"1", "@id":"2406078", "info":{"authors":{"author":[{"@pid":"97/4626-29","text":"Yi Liu 0029"},{"@pid":"w/HaoWang-7","text":"Hao Wang 0007"},{"@pid":"29/3826-11","text":"Tong Li 0011"},{"@pid":"62/5860-18","text":"Ping Li 0018"},{"@pid":"16/2061-2","text":"Jie Ling 0002"}]},"title":"Attribute-based handshake protocol for mobile healthcare social networks.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"873-880","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/LiuWLLL18","doi":"10.1016/J.FUTURE.2016.12.010","ee":"https://doi.org/10.1016/j.future.2016.12.010","url":"https://dblp.org/rec/journals/fgcs/LiuWLLL18"}, "url":"URL#2406078" }, { "@score":"1", "@id":"2406086", "info":{"authors":{"author":[{"@pid":"194/1430","text":"Guipeng Liu"},{"@pid":"09/4144-1","text":"Xiaomin Zhu 0001"},{"@pid":"64/856-2","text":"Ji Wang 0002"},{"@pid":"74/6501","text":"Deke Guo"},{"@pid":"60/5004","text":"Weidong Bao"},{"@pid":"70/2221-1","text":"Hui Guo 0001"}]},"title":"SP-Partitioner: A novel partition method to handle intermediate data skew in spark streaming.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"1054-1063","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/LiuZWGBG18","doi":"10.1016/J.FUTURE.2017.07.014","ee":"https://doi.org/10.1016/j.future.2017.07.014","url":"https://dblp.org/rec/journals/fgcs/LiuZWGBG18"}, "url":"URL#2406086" }, { "@score":"1", "@id":"2406093", "info":{"authors":{"author":[{"@pid":"21/9114","text":"Zhihan Lv"},{"@pid":"65/2239","text":"Rahat Iqbal"},{"@pid":"158/5207","text":"Victor I. Chang 0001"}]},"title":"Big data analytics for sustainability.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"1238-1241","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/LvIC18","doi":"10.1016/J.FUTURE.2018.05.020","ee":"https://doi.org/10.1016/j.future.2018.05.020","url":"https://dblp.org/rec/journals/fgcs/LvIC18"}, "url":"URL#2406093" }, { "@score":"1", "@id":"2406097", "info":{"authors":{"author":[{"@pid":"123/7165","text":"Xingpo Ma"},{"@pid":"49/2010","text":"Junbin Liang"},{"@pid":"75/2669-1","text":"Jianxin Wang 0001"},{"@pid":"41/3095","text":"Sheng Wen"},{"@pid":"25/3246-1","text":"Tian Wang 0001"},{"@pid":"49/5981-1","text":"Yin Li 0001"},{"@pid":"206/7546","text":"Wenpeng Ma"},{"@pid":"81/5415","text":"Chuanda Qi"}]},"title":"Secure fine-grained spatio-temporal Top-k queries in TMWSNs.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"174-184","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/MaLWWWLMQ18","doi":"10.1016/J.FUTURE.2018.04.010","ee":"https://doi.org/10.1016/j.future.2018.04.010","url":"https://dblp.org/rec/journals/fgcs/MaLWWWLMQ18"}, "url":"URL#2406097" }, { "@score":"1", "@id":"2406105", "info":{"authors":{"author":[{"@pid":"198/4495","text":"Gunasekaran Manogaran"},{"@pid":"58/548","text":"Daphne Lopez"},{"@pid":"31/1108","text":"Naveen K. Chilamkurti"}]},"title":"In-Mapper combiner based MapReduce algorithm for processing of big climate data.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"433-445","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/ManogaranLC18","doi":"10.1016/J.FUTURE.2018.02.048","ee":"https://doi.org/10.1016/j.future.2018.02.048","url":"https://dblp.org/rec/journals/fgcs/ManogaranLC18"}, "url":"URL#2406105" }, { "@score":"1", "@id":"2406107", "info":{"authors":{"author":[{"@pid":"172/2758","text":"Kaili Mao"},{"@pid":"25/4653-2","text":"Jianwei Niu 0002"},{"@pid":"132/8300","text":"Huan Chen"},{"@pid":"w/LeiWang37","text":"Lei Wang 0037"},{"@pid":"a/MAtiquzzaman","text":"Mohammed Atiquzzaman"}]},"title":"Mining of marital distress from microblogging social networks: A case study on Sina Weibo.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"1481-1490","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/MaoNCWA18","doi":"10.1016/J.FUTURE.2017.05.030","ee":"https://doi.org/10.1016/j.future.2017.05.030","url":"https://dblp.org/rec/journals/fgcs/MaoNCWA18"}, "url":"URL#2406107" }, { "@score":"1", "@id":"2406115", "info":{"authors":{"author":[{"@pid":"180/1414","text":"Karl Mason"},{"@pid":"191/2897","text":"Martin Duggan"},{"@pid":"09/181","text":"Enda Barrett"},{"@pid":"07/14","text":"Jim Duggan"},{"@pid":"71/5537","text":"Enda Howley"}]},"title":"Predicting host CPU utilization in the cloud using evolutionary neural networks.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"162-173","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/MasonDBDH18","doi":"10.1016/J.FUTURE.2018.03.040","ee":"https://doi.org/10.1016/j.future.2018.03.040","url":"https://dblp.org/rec/journals/fgcs/MasonDBDH18"}, "url":"URL#2406115" }, { "@score":"1", "@id":"2406116", "info":{"authors":{"author":[{"@pid":"183/2617","text":"Pierre Matri"},{"@pid":"p/MSPerezHernandez","text":"María S. Pérez 0001"},{"@pid":"81/2916","text":"Alexandru Costan"},{"@pid":"b/LucBouge","text":"Luc Bougé"},{"@pid":"a/GabrielAntoniu","text":"Gabriel Antoniu"}]},"title":"Keeping up with storage: Decentralized, write-enabled dynamic geo-replication.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"1093-1105","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/MatriPCBA18","doi":"10.1016/J.FUTURE.2017.06.009","ee":"https://doi.org/10.1016/j.future.2017.06.009","url":"https://dblp.org/rec/journals/fgcs/MatriPCBA18"}, "url":"URL#2406116" }, { "@score":"1", "@id":"2406119", "info":{"authors":{"author":[{"@pid":"22/1625","text":"Dominik Meiländer"},{"@pid":"84/5223","text":"Sergei Gorlatch"}]},"title":"Modeling the Scalability of Real-Time Online Interactive Applications on Clouds.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"1019-1031","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/MeilanderG18","doi":"10.1016/J.FUTURE.2017.07.041","ee":"https://doi.org/10.1016/j.future.2017.07.041","url":"https://dblp.org/rec/journals/fgcs/MeilanderG18"}, "url":"URL#2406119" }, { "@score":"1", "@id":"2406124", "info":{"authors":{"author":[{"@pid":"222/1419","text":"Yunfei Meng"},{"@pid":"70/2080","text":"Zhiqiu Huang"},{"@pid":"36/2728-10","text":"Yu Zhou 0010"},{"@pid":"119/7944","text":"Changbo Ke"}]},"title":"Privacy-aware cloud service selection approach based on P-Spec policy models and privacy sensitivities.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"1-11","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/MengHZK18","doi":"10.1016/J.FUTURE.2018.03.013","ee":"https://doi.org/10.1016/j.future.2018.03.013","url":"https://dblp.org/rec/journals/fgcs/MengHZK18"}, "url":"URL#2406124" }, { "@score":"1", "@id":"2406128", "info":{"authors":{"author":[{"@pid":"180/2966","text":"Qublai Khan Ali Mirza"},{"@pid":"a/IrfanUllahAwan","text":"Irfan Awan"},{"@pid":"26/4300","text":"Muhammad Younas 0001"}]},"title":"CloudIntell: An intelligent malware detection system.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"1042-1053","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/MirzaAY18","doi":"10.1016/J.FUTURE.2017.07.016","ee":"https://doi.org/10.1016/j.future.2017.07.016","url":"https://dblp.org/rec/journals/fgcs/MirzaAY18"}, "url":"URL#2406128" }, { "@score":"1", "@id":"2406142", "info":{"authors":{"author":[{"@pid":"159/2187","text":"Khan Muhammad 0001"},{"@pid":"28/582","text":"Muhammad Sajjad"},{"@pid":"73/8780","text":"Irfan Mehmood"},{"@pid":"73/4067","text":"Seungmin Rho"},{"@pid":"b/SungWookBaik","text":"Sung Wook Baik"}]},"title":"Image steganography using uncorrelated color space and its application for security of visual contents in online social networks.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"951-960","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/MuhammadSMRB18","doi":"10.1016/J.FUTURE.2016.11.029","ee":"https://doi.org/10.1016/j.future.2016.11.029","url":"https://dblp.org/rec/journals/fgcs/MuhammadSMRB18"}, "url":"URL#2406142" }, { "@score":"1", "@id":"2406150", "info":{"authors":{"author":[{"@pid":"222/1479","text":"Rashmika Nawaratne"},{"@pid":"a/LDAlahakoon","text":"Damminda Alahakoon"},{"@pid":"29/7993","text":"Daswin De Silva"},{"@pid":"88/7329","text":"Prem Chhetri"},{"@pid":"31/1108","text":"Naveen K. Chilamkurti"}]},"title":"Self-evolving intelligent algorithms for facilitating data interoperability in IoT environments.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"421-432","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/NawaratneASCC18","doi":"10.1016/J.FUTURE.2018.02.049","ee":"https://doi.org/10.1016/j.future.2018.02.049","url":"https://dblp.org/rec/journals/fgcs/NawaratneASCC18"}, "url":"URL#2406150" }, { "@score":"1", "@id":"2406174", "info":{"authors":{"author":[{"@pid":"69/7742-1","text":"Hao Peng 0001"},{"@pid":"217/4481","text":"Mengjiao Bao"},{"@pid":"l/JianxinLi-2","text":"Jianxin Li 0002"},{"@pid":"88/7649","text":"Md. Zakirul Alam Bhuiyan"},{"@pid":"195/8155","text":"Yaopeng Liu"},{"@pid":"16/3418","text":"Yu He"},{"@pid":"173/9226","text":"Erica Yang"}]},"title":"Incremental term representation learning for social network analysis.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"1503-1512","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/PengBLBLHY18","doi":"10.1016/J.FUTURE.2017.05.020","ee":"https://doi.org/10.1016/j.future.2017.05.020","url":"https://dblp.org/rec/journals/fgcs/PengBLBLHY18"}, "url":"URL#2406174" }, { "@score":"1", "@id":"2406177", "info":{"authors":{"author":[{"@pid":"58/4461-2","text":"Yong Peng 0002"},{"@pid":"09/2773","text":"Xinghua Wang"},{"@pid":"222/1393","text":"Shuangling Peng"},{"@pid":"47/8694","text":"Helai Huang"},{"@pid":"68/10526","text":"Guangdong Tian"},{"@pid":"119/1719","text":"Hongfei Jia"}]},"title":"Investigation on the injuries of drivers and copilots in rear-end crashes between trucks based on real world accident data in China.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"1251-1258","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/PengWPHTJ18","doi":"10.1016/J.FUTURE.2017.07.065","ee":"https://doi.org/10.1016/j.future.2017.07.065","url":"https://dblp.org/rec/journals/fgcs/PengWPHTJ18"}, "url":"URL#2406177" }, { "@score":"1", "@id":"2406178", "info":{"authors":{"author":[{"@pid":"97/1246","text":"Sancheng Peng"},{"@pid":"90/3575-1","text":"Shui Yu 0001"},{"@pid":"20/4094","text":"Peter Mueller"}]},"title":"Social networking big data: Opportunities, solutions, and challenges.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"1456-1458","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/PengYM18","doi":"10.1016/J.FUTURE.2018.05.040","ee":"https://doi.org/10.1016/j.future.2018.05.040","url":"https://dblp.org/rec/journals/fgcs/PengYM18"}, "url":"URL#2406178" }, { "@score":"1", "@id":"2406194", "info":{"authors":{"author":[{"@pid":"26/5194","text":"Florin Pop"},{"@pid":"43/1754","text":"Radu Prodan"},{"@pid":"a/GabrielAntoniu","text":"Gabriel Antoniu"}]},"title":"RM-BDP: Resource management for Big Data platforms.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"961-963","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/PopPA18","doi":"10.1016/J.FUTURE.2018.05.018","ee":"https://doi.org/10.1016/j.future.2018.05.018","url":"https://dblp.org/rec/journals/fgcs/PopPA18"}, "url":"URL#2406194" }, { "@score":"1", "@id":"2406199", "info":{"authors":{"author":[{"@pid":"63/3087","text":"Lirong Qiu"},{"@pid":"99/2623","text":"Feng Cai"},{"@pid":"67/7648","text":"Guixian Xu"}]},"title":"Quantum digital signature for the access control of sensitive data in the big data era.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"372-379","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/QiuCX18","doi":"10.1016/J.FUTURE.2018.03.053","ee":"https://doi.org/10.1016/j.future.2018.03.053","url":"https://dblp.org/rec/journals/fgcs/QiuCX18"}, "url":"URL#2406199" }, { "@score":"1", "@id":"2406209", "info":{"authors":{"author":[{"@pid":"95/11481","text":"Sergio Ramírez-Gallego"},{"@pid":"27/5514","text":"Salvador García 0001"},{"@pid":"04/0","text":"Francisco Herrera"}]},"title":"Online entropy-based discretization for data streaming classification.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"59-70","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/Ramirez-Gallego18","doi":"10.1016/J.FUTURE.2018.03.008","ee":"https://doi.org/10.1016/j.future.2018.03.008","url":"https://dblp.org/rec/journals/fgcs/Ramirez-Gallego18"}, "url":"URL#2406209" }, { "@score":"1", "@id":"2406233", "info":{"authors":{"author":[{"@pid":"129/5432","text":"Jordi Ros-Giralt"},{"@pid":"158/4873","text":"Alan Commike"},{"@pid":"200/8485","text":"Peter Cullen"},{"@pid":"00/4078","text":"Richard Lethin"}]},"title":"Algorithms and data structures to accelerate network analysis.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"535-545","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/Ros-GiraltCCL18","doi":"10.1016/J.FUTURE.2018.04.034","ee":"https://doi.org/10.1016/j.future.2018.04.034","url":"https://dblp.org/rec/journals/fgcs/Ros-GiraltCCL18"}, "url":"URL#2406233" }, { "@score":"1", "@id":"2406241", "info":{"authors":{"author":[{"@pid":"53/8145","text":"Giovanna Sannino"},{"@pid":"64/4882","text":"Giuseppe De Pietro"}]},"title":"A deep learning approach for ECG-based heartbeat classification for arrhythmia detection.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"446-455","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/SanninoP18","doi":"10.1016/J.FUTURE.2018.03.057","ee":"https://doi.org/10.1016/j.future.2018.03.057","url":"https://dblp.org/rec/journals/fgcs/SanninoP18"}, "url":"URL#2406241" }, { "@score":"1", "@id":"2406242", "info":{"authors":{"author":[{"@pid":"222/1491","text":"Androniki Sapountzi"},{"@pid":"53/6109","text":"Kostas E. Psannis"}]},"title":"Social networking data analysis tools & challenges.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"893-913","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/SapountziP18","doi":"10.1016/J.FUTURE.2016.10.019","ee":"https://doi.org/10.1016/j.future.2016.10.019","url":"https://dblp.org/rec/journals/fgcs/SapountziP18"}, "url":"URL#2406242" }, { "@score":"1", "@id":"2406244", "info":{"authors":{"author":[{"@pid":"222/1477","text":"Suchismita Satpathy"},{"@pid":"86/1418-1","text":"Bibhudatta Sahoo 0001"},{"@pid":"24/6016","text":"Ashok Kumar Turuk"}]},"title":"Sensing and Actuation as a Service Delivery Model in Cloud Edge centric Internet of Things.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"281-296","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/SatpathyST18","doi":"10.1016/J.FUTURE.2018.04.015","ee":"https://doi.org/10.1016/j.future.2018.04.015","url":"https://dblp.org/rec/journals/fgcs/SatpathyST18"}, "url":"URL#2406244" }, { "@score":"1", "@id":"2406254", "info":{"authors":{"author":[{"@pid":"197/7243","text":"Pradip Kumar Sharma"},{"@pid":"p/JongHyukPark","text":"Jong Hyuk Park"}]},"title":"Blockchain based hybrid network architecture for the smart city.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"650-655","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/SharmaP18","doi":"10.1016/J.FUTURE.2018.04.060","ee":"https://doi.org/10.1016/j.future.2018.04.060","url":"https://dblp.org/rec/journals/fgcs/SharmaP18"}, "url":"URL#2406254" }, { "@score":"1", "@id":"2406256", "info":{"authors":{"author":[{"@pid":"203/3321","text":"Zeinab Shmeis"},{"@pid":"j/MohamadJaber","text":"Mohamad Jaber 0001"}]},"title":"Fine and coarse grained composition and adaptation of spark applications.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"629-640","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/ShmeisJ18","doi":"10.1016/J.FUTURE.2018.04.048","ee":"https://doi.org/10.1016/j.future.2018.04.048","url":"https://dblp.org/rec/journals/fgcs/ShmeisJ18"}, "url":"URL#2406256" }, { "@score":"1", "@id":"2406263", "info":{"authors":{"author":[{"@pid":"10/7647-1","text":"Amit Kumar Singh 0001"},{"@pid":"29/9554","text":"Basant Kumar"},{"@pid":"11/4030","text":"Sanjay Kumar Singh"},{"@pid":"116/2837","text":"S. P. Ghrera"},{"@pid":"24/5508","text":"Anand Mohan"}]},"title":"Multiple watermarking technique for securing online social network contents using Back Propagation Neural Network.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"926-939","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/SinghKSGM18","doi":"10.1016/J.FUTURE.2016.11.023","ee":"https://doi.org/10.1016/j.future.2016.11.023","url":"https://dblp.org/rec/journals/fgcs/SinghKSGM18"}, "url":"URL#2406263" }, { "@score":"1", "@id":"2406265", "info":{"authors":{"author":[{"@pid":"146/0413","text":"Ali Hassan Sodhro"},{"@pid":"188/8899","text":"Sandeep Pirbhulal"},{"@pid":"150/1679","text":"Arun Kumar Sangaiah"}]},"title":"Convergence of IoT and product lifecycle management in medical health care.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"380-391","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/SodhroPS18","doi":"10.1016/J.FUTURE.2018.03.052","ee":"https://doi.org/10.1016/j.future.2018.03.052","url":"https://dblp.org/rec/journals/fgcs/SodhroPS18"}, "url":"URL#2406265" }, { "@score":"1", "@id":"2406267", "info":{"authors":{"author":[{"@pid":"187/4364","text":"Nivethitha Somu"},{"@pid":"187/4694","text":"M. R. Gauthama Raman"},{"@pid":"92/10402","text":"Kirthivasan Kannan"},{"@pid":"150/0591","text":"V. S. Shankar Sriram"}]},"title":"A trust centric optimal service ranking approach for cloud service selection.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"234-252","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/SomuRKS18","doi":"10.1016/J.FUTURE.2018.04.033","ee":"https://doi.org/10.1016/j.future.2018.04.033","url":"https://dblp.org/rec/journals/fgcs/SomuRKS18"}, "url":"URL#2406267" }, { "@score":"1", "@id":"2406278", "info":{"authors":{"author":[{"@pid":"11/383-1","text":"Gang Sun 0001"},{"@pid":"158/5207","text":"Victor I. Chang 0001"},{"@pid":"g/StevenGuan","text":"Steven Guan 0001"},{"@pid":"35/1979","text":"Muthu Ramachandran"},{"@pid":"48/1097-2","text":"Jin Li 0002"},{"@pid":"82/7699","text":"Dan Liao"}]},"title":"Big Data and Internet of Things - Fusion for different services and its impacts.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"1368-1370","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/SunCGRLL18","doi":"10.1016/J.FUTURE.2018.05.022","ee":"https://doi.org/10.1016/j.future.2018.05.022","url":"https://dblp.org/rec/journals/fgcs/SunCGRLL18"}, "url":"URL#2406278" }, { "@score":"1", "@id":"2406283", "info":{"authors":{"author":[{"@pid":"182/4739","text":"Bangyong Sun"},{"@pid":"222/1381","text":"Nianzeng Yuan"},{"@pid":"05/3198","text":"Congjun Cao"},{"@pid":"92/5741","text":"Jon Yngve Hardeberg"}]},"title":"Design of four-band multispectral imaging system with one single-sensor.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"670-679","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/SunYCH18","doi":"10.1016/J.FUTURE.2018.04.056","ee":"https://doi.org/10.1016/j.future.2018.04.056","url":"https://dblp.org/rec/journals/fgcs/SunYCH18"}, "url":"URL#2406283" }, { "@score":"1", "@id":"2406289", "info":{"authors":{"author":[{"@pid":"78/437","text":"Rui Tang"},{"@pid":"50/2205","text":"Simon Fong 0001"}]},"title":"Clustering big IoT data by metaheuristic optimized mini-batch and parallel partition-based DGC in Hadoop.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"1395-1412","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/TangF18","doi":"10.1016/J.FUTURE.2018.03.006","ee":"https://doi.org/10.1016/j.future.2018.03.006","url":"https://dblp.org/rec/journals/fgcs/TangF18"}, "url":"URL#2406289" }, { "@score":"1", "@id":"2406290", "info":{"authors":{"author":[{"@pid":"93/1223","text":"Kun Tang"},{"@pid":"49/2052","text":"Ronghua Shi"},{"@pid":"58/3444","text":"Jian Dong"}]},"title":"Throughput analysis of cognitive wireless acoustic sensor networks with energy harvesting.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"1218-1227","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/TangSD18","doi":"10.1016/J.FUTURE.2017.07.032","ee":"https://doi.org/10.1016/j.future.2017.07.032","url":"https://dblp.org/rec/journals/fgcs/TangSD18"}, "url":"URL#2406290" }, { "@score":"1", "@id":"2406298", "info":{"authors":{"author":[{"@pid":"59/4435","text":"Ling Tian"},{"@pid":"96/3995","text":"Hongyu Wang"},{"@pid":"63/2223-2","text":"Yimin Zhou 0002"},{"@pid":"204/8568","text":"Chengzong Peng"}]},"title":"Video big data in smart city: Background construction and optimization for surveillance video processing.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"1371-1382","year":"2018","type":"Journal Articles","access":"open","key":"journals/fgcs/TianWZP18","doi":"10.1016/J.FUTURE.2017.12.065","ee":"https://doi.org/10.1016/j.future.2017.12.065","url":"https://dblp.org/rec/journals/fgcs/TianWZP18"}, "url":"URL#2406298" }, { "@score":"1", "@id":"2406314", "info":{"authors":{"author":[{"@pid":"160/2226","text":"Jorge Veiga"},{"@pid":"222/1423","text":"Jonatan Enes"},{"@pid":"86/11495","text":"Roberto R. Expósito"},{"@pid":"t/JuanTourino","text":"Juan Touriño"}]},"title":"BDEv 3.0: Energy efficiency and microarchitectural characterization of Big Data processing frameworks.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"565-581","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/VeigaEET18","doi":"10.1016/J.FUTURE.2018.04.030","ee":"https://doi.org/10.1016/j.future.2018.04.030","url":"https://dblp.org/rec/journals/fgcs/VeigaEET18"}, "url":"URL#2406314" }, { "@score":"1", "@id":"2406318", "info":{"authors":{"author":[{"@pid":"64/2684","text":"Abdul Wahid"},{"@pid":"20/10812","text":"Munam Ali Shah"},{"@pid":"130/8797","text":"Faisal Fayyaz Qureshi"},{"@pid":"222/1470","text":"Hafsa Maryam"},{"@pid":"65/2239","text":"Rahat Iqbal"},{"@pid":"158/5207","text":"Victor I. Chang 0001"}]},"title":"Big data analytics for mitigating broadcast storm in Vehicular Content Centric networks.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"1301-1320","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/WahidSQMIC18","doi":"10.1016/J.FUTURE.2017.10.005","ee":"https://doi.org/10.1016/j.future.2017.10.005","url":"https://dblp.org/rec/journals/fgcs/WahidSQMIC18"}, "url":"URL#2406318" }, { "@score":"1", "@id":"2406323", "info":{"authors":{"author":[{"@pid":"48/121","text":"Yingxue Wang"},{"@pid":"78/10104","text":"Yanan Chen"},{"@pid":"88/7649","text":"Md. Zakirul Alam Bhuiyan"},{"@pid":"67/2976","text":"Yu Han"},{"@pid":"61/5354","text":"Shenghui Zhao"},{"@pid":"l/JianxinLi-2","text":"Jianxin Li 0002"}]},"title":"Gait-based Human identification using acoustic sensor and deep neural network.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"1228-1237","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/WangCBHZL18","doi":"10.1016/J.FUTURE.2017.07.012","ee":"https://doi.org/10.1016/j.future.2017.07.012","url":"https://dblp.org/rec/journals/fgcs/WangCBHZL18"}, "url":"URL#2406323" }, { "@score":"1", "@id":"2406324", "info":{"authors":{"author":[{"@pid":"13/1898","text":"Bin Wang"},{"@pid":"66/3019-11","text":"Chao Chen 0011"},{"@pid":"36/5655","text":"Ligang He"},{"@pid":"93/2407-1","text":"Bo Gao 0001"},{"@pid":"77/1631","text":"Jiadong Ren"},{"@pid":"83/10000","text":"Zhangjie Fu"},{"@pid":"37/9956","text":"Songling Fu"},{"@pid":"39/737","text":"Yongjian Hu"},{"@pid":"l/ChangTsunLi","text":"Chang-Tsun Li"}]},"title":"Modelling and developing conflict-aware scheduling on large-scale data centres.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"995-1007","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/WangCHGRFFHL18","doi":"10.1016/J.FUTURE.2017.07.043","ee":"https://doi.org/10.1016/j.future.2017.07.043","url":"https://dblp.org/rec/journals/fgcs/WangCHGRFFHL18"}, "url":"URL#2406324" }, { "@score":"1", "@id":"2406330", "info":{"authors":{"author":[{"@pid":"90/4225","text":"Feng Wang"},{"@pid":"55/7770","text":"Wenjun Jiang"},{"@pid":"07/6728-1","text":"Xiaolin Li 0001"},{"@pid":"81/3285-1","text":"Guojun Wang 0001"}]},"title":"Maximizing positive influence spread in online social networks via fluid dynamics.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"1491-1502","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/WangJLW18","doi":"10.1016/J.FUTURE.2017.05.050","ee":"https://doi.org/10.1016/j.future.2017.05.050","url":"https://dblp.org/rec/journals/fgcs/WangJLW18"}, "url":"URL#2406330" }, { "@score":"1", "@id":"2406342", "info":{"authors":{"author":[{"@pid":"77/7826","text":"Zhuowei Wang 0001"},{"@pid":"39/3694","text":"Wuqing Zhao"},{"@pid":"w/HaoWang-3","text":"Hao Wang 0003"},{"@pid":"58/1879","text":"Lianglun Cheng"}]},"title":"Three-level performance optimization for heterogeneous systems based on software prefetching under power constraints.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"51-58","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/WangZWC18","doi":"10.1016/J.FUTURE.2018.03.009","ee":"https://doi.org/10.1016/j.future.2018.03.009","url":"https://dblp.org/rec/journals/fgcs/WangZWC18"}, "url":"URL#2406342" }, { "@score":"1", "@id":"2406343", "info":{"authors":{"author":[{"@pid":"46/8471","text":"Jianliang Wei"},{"@pid":"78/5984-6","text":"Fei Meng 0006"},{"@pid":"201/6631","text":"Arunkumar N."}]},"title":"A personalized authoritative user-based recommendation for social tagging.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"355-361","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/WeiMA18","doi":"10.1016/J.FUTURE.2018.03.048","ee":"https://doi.org/10.1016/j.future.2018.03.048","url":"https://dblp.org/rec/journals/fgcs/WeiMA18"}, "url":"URL#2406343" }, { "@score":"1", "@id":"2406352", "info":{"authors":{"author":[{"@pid":"181/3887","text":"Wentai Wu"},{"@pid":"53/282-1","text":"Weiwei Lin 0001"},{"@pid":"35/3725","text":"Ching-Hsien Hsu"},{"@pid":"36/5655","text":"Ligang He"}]},"title":"Energy-efficient hadoop for big data analytics and computing: A systematic review and research insights.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"1351-1367","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/WuLHH18","doi":"10.1016/J.FUTURE.2017.11.010","ee":"https://doi.org/10.1016/j.future.2017.11.010","url":"https://dblp.org/rec/journals/fgcs/WuLHH18"}, "url":"URL#2406352" }, { "@score":"1", "@id":"2406356", "info":{"authors":{"author":[{"@pid":"23/1092-1","text":"Song Wu 0001"},{"@pid":"50/3755","text":"Chao Mei"},{"@pid":"98/4156","text":"Hai Jin 0001"},{"@pid":"168/6275","text":"Duoqiang Wang"}]},"title":"Android Unikernel: Gearing mobile code offloading towards edge computing.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"694-703","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/WuMJW18","doi":"10.1016/J.FUTURE.2018.04.069","ee":"https://doi.org/10.1016/j.future.2018.04.069","url":"https://dblp.org/rec/journals/fgcs/WuMJW18"}, "url":"URL#2406356" }, { "@score":"1", "@id":"2406357", "info":{"authors":{"author":[{"@pid":"75/2327","text":"Wanqing Wu"},{"@pid":"188/8899","text":"Sandeep Pirbhulal"},{"@pid":"150/1679","text":"Arun Kumar Sangaiah"},{"@pid":"44/4000","text":"Subhas Chandra Mukhopadhyay"},{"@pid":"115/5533-1","text":"Guanglin Li 0001"}]},"title":"Optimization of signal quality over comfortability of textile electrodes for ECG monitoring in fog computing based medical applications.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"515-526","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/WuPSML18","doi":"10.1016/J.FUTURE.2018.04.024","ee":"https://doi.org/10.1016/j.future.2018.04.024","url":"https://dblp.org/rec/journals/fgcs/WuPSML18"}, "url":"URL#2406357" }, { "@score":"1", "@id":"2406358", "info":{"authors":{"author":[{"@pid":"14/292","text":"Shaofei Wu"},{"@pid":"212/2459","text":"Mingqing Wang"},{"@pid":"222/1397","text":"Yuntao Zou"}]},"title":"Research on internet information mining based on agent algorithm.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"598-602","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/WuWZ18","doi":"10.1016/J.FUTURE.2018.04.040","ee":"https://doi.org/10.1016/j.future.2018.04.040","url":"https://dblp.org/rec/journals/fgcs/WuWZ18"}, "url":"URL#2406358" }, { "@score":"1", "@id":"2406361", "info":{"authors":{"author":[{"@pid":"18/2177","text":"Suzhen Wu"},{"@pid":"34/2615","text":"Weidong Zhu"},{"@pid":"26/3849","text":"Bo Mao"},{"@pid":"l/KuanChingLi","text":"Kuan-Ching Li"}]},"title":"PP: Popularity-based Proactive Data Recovery for HDFS RAID systems.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"1146-1153","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/WuZML18","doi":"10.1016/J.FUTURE.2017.03.032","ee":"https://doi.org/10.1016/j.future.2017.03.032","url":"https://dblp.org/rec/journals/fgcs/WuZML18"}, "url":"URL#2406361" }, { "@score":"1", "@id":"2406364", "info":{"authors":{"author":[{"@pid":"83/6642","text":"Xi Xiao"},{"@pid":"222/1442","text":"Chunhui Chen 0003"},{"@pid":"150/1679","text":"Arun Kumar Sangaiah"},{"@pid":"87/11301","text":"Guangwu Hu"},{"@pid":"84/2898","text":"Runguo Ye"},{"@pid":"74/1552-1","text":"Yong Jiang 0001"}]},"title":"CenLocShare: A centralized privacy-preserving location-sharing system for mobile online social networks.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"863-872","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/XiaoCSHYJ18","doi":"10.1016/J.FUTURE.2017.01.035","ee":"https://doi.org/10.1016/j.future.2017.01.035","url":"https://dblp.org/rec/journals/fgcs/XiaoCSHYJ18"}, "url":"URL#2406364" }, { "@score":"1", "@id":"2406374", "info":{"authors":{"author":[{"@pid":"129/9463","text":"Rongbin Xu"},{"@pid":"205/0406","text":"Yeguo Wang"},{"@pid":"156/8997","text":"Haoyu Luo"},{"@pid":"145/9337","text":"Futian Wang"},{"@pid":"51/6470","text":"Ying Xie"},{"@pid":"82/1364-4","text":"Xiao Liu 0004"},{"@pid":"90/3406-1","text":"Yun Yang 0001"}]},"title":"A sufficient and necessary temporal violation handling point selection strategy in cloud workflow.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"464-479","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/XuWLWXLY18","doi":"10.1016/J.FUTURE.2018.03.056","ee":"https://doi.org/10.1016/j.future.2018.03.056","url":"https://dblp.org/rec/journals/fgcs/XuWLWXLY18"}, "url":"URL#2406374" }, { "@score":"1", "@id":"2406378", "info":{"authors":{"author":[{"@pid":"185/2741","text":"Jining Yan"},{"@pid":"31/1970-1","text":"Yan Ma 0001"},{"@pid":"w/LizheWang","text":"Lizhe Wang 0001"},{"@pid":"c/KimKwangRaymondChoo","text":"Kim-Kwang Raymond Choo"},{"@pid":"37/934","text":"Wei Jie"}]},"title":"A cloud-based remote sensing data production system.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"1154-1166","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/YanMWCJ18","doi":"10.1016/J.FUTURE.2017.02.044","ee":"https://doi.org/10.1016/j.future.2017.02.044","url":"https://dblp.org/rec/journals/fgcs/YanMWCJ18"}, "url":"URL#2406378" }, { "@score":"1", "@id":"2406380", "info":{"authors":{"author":[{"@pid":"151/3434","text":"Shao-Jun Yang"},{"@pid":"82/4944-1","text":"Xinyi Huang 0001"}]},"title":"Certain types of M-fuzzifying matroids: A fundamental look at the security protocols in RFID and IoT.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"582-590","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/YangH18","doi":"10.1016/J.FUTURE.2018.04.028","ee":"https://doi.org/10.1016/j.future.2018.04.028","url":"https://dblp.org/rec/journals/fgcs/YangH18"}, "url":"URL#2406380" }, { "@score":"1", "@id":"2406383", "info":{"authors":{"author":[{"@pid":"46/999-21","text":"Bo Yang 0021"},{"@pid":"59/5464-1","text":"Zhiyong Li 0001"},{"@pid":"18/1427","text":"Shilong Jiang"},{"@pid":"l/KeqinLi","text":"Keqin Li 0001"}]},"title":"Envy-free auction mechanism for VM pricing and allocation in clouds.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"680-693","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/YangLJL18","doi":"10.1016/J.FUTURE.2018.04.055","ee":"https://doi.org/10.1016/j.future.2018.04.055","url":"https://dblp.org/rec/journals/fgcs/YangLJL18"}, "url":"URL#2406383" }, { "@score":"1", "@id":"2406384", "info":{"authors":{"author":[{"@pid":"01/6376","text":"Yongjian Yang"},{"@pid":"87/793","text":"Wenbin Liu"},{"@pid":"94/10612","text":"En Wang"},{"@pid":"150/5759","text":"Hengzhi Wang"}]},"title":"Beaconing Control strategy based on Game Theory in mobile crowdsensing.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"222-233","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/YangLWW18","doi":"10.1016/J.FUTURE.2018.04.013","ee":"https://doi.org/10.1016/j.future.2018.04.013","url":"https://dblp.org/rec/journals/fgcs/YangLWW18"}, "url":"URL#2406384" }, { "@score":"1", "@id":"2406386", "info":{"authors":{"author":[{"@pid":"86/8501","text":"Kang Yang"},{"@pid":"06/2293-24","text":"Rui Wang 0024"},{"@pid":"21/4633-1","text":"Yu Jiang 0001"},{"@pid":"49/594","text":"Houbing Song"},{"@pid":"222/1483","text":"Chenxia Luo"},{"@pid":"04/606","text":"Yong Guan"},{"@pid":"37/4568","text":"Xiaojuan Li"},{"@pid":"143/4573-2","text":"Zhiping Shi 0002"}]},"title":"Sensor attack detection using history based pairwise inconsistency.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"392-402","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/YangWJSLGLS18","doi":"10.1016/J.FUTURE.2018.03.050","ee":"https://doi.org/10.1016/j.future.2018.03.050","url":"https://dblp.org/rec/journals/fgcs/YangWJSLGLS18"}, "url":"URL#2406386" }, { "@score":"1", "@id":"2406389", "info":{"authors":{"author":[{"@pid":"48/450-26","text":"Yang Yang 0026"},{"@pid":"14/7437","text":"Xianghan Zheng"},{"@pid":"10/2272","text":"Wenzhong Guo"},{"@pid":"134/3945","text":"Ximeng Liu"},{"@pid":"158/5207","text":"Victor I. Chang 0001"}]},"title":"Privacy-preserving fusion of IoT and big data for e-health.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"1437-1455","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/YangZGLC18","doi":"10.1016/J.FUTURE.2018.01.003","ee":"https://doi.org/10.1016/j.future.2018.01.003","url":"https://dblp.org/rec/journals/fgcs/YangZGLC18"}, "url":"URL#2406389" }, { "@score":"1", "@id":"2406393", "info":{"authors":{"author":[{"@pid":"132/6839","text":"Shihong Yao"},{"@pid":"187/6055","text":"Zhigao Zheng"},{"@pid":"12/5838-37","text":"Tao Wang 0037"},{"@pid":"52/3863-1","text":"Qingfeng Guan 0001"}]},"title":"An efficient joint compression and sparsity estimation matching pursuit algorithm for artificial intelligence application.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"603-613","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/YaoZWG18","doi":"10.1016/J.FUTURE.2018.04.039","ee":"https://doi.org/10.1016/j.future.2018.04.039","url":"https://dblp.org/rec/journals/fgcs/YaoZWG18"}, "url":"URL#2406393" }, { "@score":"1", "@id":"2406399", "info":{"authors":{"author":[{"@pid":"20/10310","text":"Haibo Yi"},{"@pid":"26/7076","text":"Zhe Nie"}]},"title":"Side-channel security analysis of UOV signature for cloud-based Internet of Things.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"704-708","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/YiN18","doi":"10.1016/J.FUTURE.2018.04.083","ee":"https://doi.org/10.1016/j.future.2018.04.083","url":"https://dblp.org/rec/journals/fgcs/YiN18"}, "url":"URL#2406399" }, { "@score":"1", "@id":"2406400", "info":{"authors":{"author":[{"@pid":"152/0205","text":"Orcun Yildiz"},{"@pid":"131/6619","text":"Amelie Chi Zhou"},{"@pid":"00/981","text":"Shadi Ibrahim"}]},"title":"Improving the Effectiveness of Burst Buffers for Big Data Processing in HPC Systems with Eley.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"308-318","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/YildizZI18","doi":"10.1016/J.FUTURE.2018.03.029","ee":"https://doi.org/10.1016/j.future.2018.03.029","url":"https://dblp.org/rec/journals/fgcs/YildizZI18"}, "url":"URL#2406400" }, { "@score":"1", "@id":"2406402", "info":{"authors":{"author":[{"@pid":"26/4300","text":"Muhammad Younas 0001"},{"@pid":"a/IrfanUllahAwan","text":"Irfan Awan"},{"@pid":"g/GeorgeGhinea","text":"George Ghinea"},{"@pid":"49/3681","text":"Tor-Morten Grønli"}]},"title":"Editorial: New developments in cloud and IoT.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"723-725","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/YounasAGG18","doi":"10.1016/J.FUTURE.2018.05.016","ee":"https://doi.org/10.1016/j.future.2018.05.016","url":"https://dblp.org/rec/journals/fgcs/YounasAGG18"}, "url":"URL#2406402" }, { "@score":"1", "@id":"2406407", "info":{"authors":{"author":[{"@pid":"41/1662-4","text":"Bo Yuan 0004"},{"@pid":"31/2088-1","text":"Lu Liu 0001"},{"@pid":"66/3455","text":"Nick Antonopoulos"}]},"title":"Efficient service discovery in decentralized online social networks.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"775-791","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/YuanLA18","doi":"10.1016/J.FUTURE.2017.04.022","ee":"https://doi.org/10.1016/j.future.2017.04.022","url":"https://dblp.org/rec/journals/fgcs/YuanLA18"}, "url":"URL#2406407" }, { "@score":"1", "@id":"2406412", "info":{"authors":{"author":[{"@pid":"02/4385-1","text":"Shaobo Zhang 0001"},{"@pid":"c/KimKwangRaymondChoo","text":"Kim-Kwang Raymond Choo"},{"@pid":"06/2123-1","text":"Qin Liu 0001"},{"@pid":"81/3285-1","text":"Guojun Wang 0001"}]},"title":"Enhancing privacy through uniform grid and caching in location-based services.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"881-892","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/ZhangCLW18","doi":"10.1016/J.FUTURE.2017.06.022","ee":"https://doi.org/10.1016/j.future.2017.06.022","url":"https://dblp.org/rec/journals/fgcs/ZhangCLW18"}, "url":"URL#2406412" }, { "@score":"1", "@id":"2406417", "info":{"authors":{"author":[{"@pid":"03/5274-2","text":"Zhiyong Zhang 0002"},{"@pid":"185/9576","text":"Brij B. Gupta"}]},"title":"Social media security and trustworthiness: Overview and new direction.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"914-925","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/ZhangG18","doi":"10.1016/J.FUTURE.2016.10.007","ee":"https://doi.org/10.1016/j.future.2016.10.007","url":"https://dblp.org/rec/journals/fgcs/ZhangG18"}, "url":"URL#2406417" }, { "@score":"1", "@id":"2406433", "info":{"authors":{"author":[{"@pid":"156/3821","text":"Qingjuan Zhao"},{"@pid":"25/4653-2","text":"Jianwei Niu 0002"},{"@pid":"132/8300","text":"Huan Chen"},{"@pid":"w/LeiWang37","text":"Lei Wang 0037"},{"@pid":"a/MAtiquzzaman","text":"Mohammed Atiquzzaman"}]},"title":"An indicative opinion generation model for short texts on social networks.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"1471-1480","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/ZhaoNCWA18","doi":"10.1016/J.FUTURE.2017.05.025","ee":"https://doi.org/10.1016/j.future.2017.05.025","url":"https://dblp.org/rec/journals/fgcs/ZhaoNCWA18"}, "url":"URL#2406433" }, { "@score":"1", "@id":"2406438", "info":{"authors":{"author":[{"@pid":"67/2535-1","text":"Zhou Zhou 0001"},{"@pid":"44/300","text":"Jemal H. Abawajy"},{"@pid":"74/4874","text":"Morshed U. Chowdhury"},{"@pid":"11/6486","text":"Zhigang Hu"},{"@pid":"l/KeqinLi","text":"Keqin Li 0001"},{"@pid":"68/2334","text":"Hongbing Cheng"},{"@pid":"56/7481","text":"Abdulhameed A. Al Elaiwi"},{"@pid":"87/3216","text":"Fangmin Li"}]},"title":"Minimizing SLA violation and power consumption in Cloud data centers using adaptive energy-aware algorithms.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"836-850","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/ZhouACHLCEL18","doi":"10.1016/J.FUTURE.2017.07.048","ee":"https://doi.org/10.1016/j.future.2017.07.048","url":"https://dblp.org/rec/journals/fgcs/ZhouACHLCEL18"}, "url":"URL#2406438" }, { "@score":"1", "@id":"2406442", "info":{"authors":{"author":[{"@pid":"56/6786-2","text":"Lu Zhou 0002"},{"@pid":"04/4049","text":"Chunhua Su"},{"@pid":"87/10003","text":"Yamin Wen"},{"@pid":"59/10083","text":"Weijie Li"},{"@pid":"85/5448","text":"Zheng Gong"}]},"title":"Towards practical white-box lightweight block cipher implementations for IoTs.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"507-514","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/ZhouSWLG18","doi":"10.1016/J.FUTURE.2018.04.011","ee":"https://doi.org/10.1016/j.future.2018.04.011","url":"https://dblp.org/rec/journals/fgcs/ZhouSWLG18"}, "url":"URL#2406442" }, { "@score":"1", "@id":"2406447", "info":{"authors":{"author":[{"@pid":"78/2949-1","text":"Ke Zhou 0001"},{"@pid":"188/3546","text":"Jiangfeng Zeng"},{"@pid":"97/2274-40","text":"Yu Liu 0040"},{"@pid":"62/5740","text":"Fuhao Zou"}]},"title":"Deep sentiment hashing for text retrieval in social CIoT.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"362-371","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/ZhouZLZ18","doi":"10.1016/J.FUTURE.2018.03.047","ee":"https://doi.org/10.1016/j.future.2018.03.047","url":"https://dblp.org/rec/journals/fgcs/ZhouZLZ18"}, "url":"URL#2406447" }, { "@score":"1", "@id":"2406448", "info":{"authors":{"author":{"@pid":"65/4369","text":"Dingju Zhu"}},"title":"IOT and big data based cooperative logistical delivery scheduling method and cloud robot system.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"709-715","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fgcs/Zhu18","doi":"10.1016/J.FUTURE.2018.04.081","ee":"https://doi.org/10.1016/j.future.2018.04.081","url":"https://dblp.org/rec/journals/fgcs/Zhu18"}, "url":"URL#2406448" }, { "@score":"1", "@id":"2733694", "info":{"title":"Internet of Things (IoT) and its impact on supply chain: A framework for building smart, secure and efficient systems.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"614-628","year":"2018","type":"Withdrawn Items","access":"withdrawn","key":"journals/fgcs/Abdel-BassetMM18","doi":"10.1016/J.FUTURE.2018.04.051","ee":"https://doi.org/10.1016/j.future.2018.04.051","url":"https://dblp.org/rec/journals/fgcs/Abdel-BassetMM18"}, "url":"URL#2733694" }, { "@score":"1", "@id":"2733697", "info":{"title":"Research on agricultural supply chain system with double chain architecture based on blockchain technology.","venue":"Future Gener. Comput. Syst.","volume":"86","pages":"641-649","year":"2018","type":"Withdrawn Items","access":"withdrawn","key":"journals/fgcs/LengBJFN18","doi":"10.1016/J.FUTURE.2018.04.061","ee":"https://doi.org/10.1016/j.future.2018.04.061","url":"https://dblp.org/rec/journals/fgcs/LengBJFN18"}, "url":"URL#2733697" } ] } } } )