![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Future Generation Computer Systems, Volume 100
Volume 100, November 2019
- Donghai Tian, Rui Ma, Xiaoqi Jia, Changzhen Hu:
KEcruiser: A novel control flow protection for kernel extensions. 1-9
- Hoang Long Nguyen, Jason J. Jung:
Social event decomposition for constructing knowledge graph. 10-18
- Christian Sturm, Jonas Scalanczi, Stefan Schönig
, Stefan Jablonski:
A Blockchain-based and resource-aware process execution engine. 19-34
- Lanlan Rui, Xiaotong Wang, Yao Zhang, Xiaomei Wang, Xuesong Qiu:
A self-adaptive and fault-tolerant routing algorithm for wireless sensor networks in microgrids. 35-45
- Qimin Zhou, Hao Wu
, Kun Yue, Ching-Hsien Hsu:
Spatio-temporal context-aware collaborative QoS prediction. 46-57
- Kenji Saito
, Mitsuru Iwamura:
How to make a digital currency on a blockchain stable. 58-69
- Chris Simpkin, Ian J. Taylor, Graham A. Bent, Geeth de Mel, Swati Rallapalli, Liang Ma, Mudhakar Srivatsa:
Constructing distributed time-critical applications using cognitive enabled services. 70-85
- Mohamed Fathi Al-Sa'D
, Abdulla K. Al-Ali
, Amr Mohamed
, Tamer Khattab
, Aiman Erbad
:
RF-based drone detection and identification using deep learning approaches: An initiative towards a large open source drone database. 86-97
- Vahid Arabnejad, Kris Bubendorfer, Bryan C. K. Ng:
Dynamic multi-workflow scheduling: A deadline and cost-aware approach for commercial clouds. 98-108
- Song Deng, Changan Yuan, Lechan Yang, Xiao Qin, Aihua Zhou:
Data recovery algorithm under intrusion attack for energy internet. 109-121
- Emilio Serrano, Javier Bajo
:
Deep neural network architectures for social services diagnosis in smart cities. 122-131
- Wei Liang
, Jing Long, Xia Lei, Zhiqiang You, Haibo Luo, Jiahong Cai, Kuan-Ching Li
:
Efficient data packet transmission algorithm for IPV6 mobile vehicle network based on fast switching model with time difference. 132-143
- Hasan Ali Khattak
, Munam Ali Shah
, Sangeen Khan, Ihsan Ali
, Muhammad Imran:
Perception layer security in Internet of Things. 144-164
- Kun Cao, Guo Xu, Junlong Zhou, Mingsong Chen, Tongquan Wei, Keqin Li:
Lifetime-aware real-time task scheduling on fault-tolerant mixed-criticality embedded systems. 165-175
- Tsozen Yeh, Hsinyi Huang:
Realizing integrated prioritized service in the Hadoop cloud system. 176-185
- Muzafer Saracevic
, Sasa Z. Adamovic, Vladislav Miskovic
, Nemanja Macek, Marko Sarac
:
A novel approach to steganography based on the properties of Catalan numbers and Dyck words. 186-197
- Yunyi Zhang, Zhan Shi, Dan Feng, Xiu-Xiu Zhan:
Degree-biased random walk for large-scale network embedding. 198-209
- Amit Agarwal, Ta Nguyen Binh Duong:
Secure virtual machine placement in cloud data centers. 210-222
- Fernando de la Prieta
, Sara Rodríguez-González, Pablo Chamoso
, Juan Manuel Corchado
, Javier Bajo:
Survey of agent-based cloud computing applications. 223-236
- Arie Taal, Junchao Wang, Cees de Laat, Zhiming Zhao
:
Profiling the scheduling decisions for handling critical paths in deadline-constrained cloud workflows. 237-249
- Mohammed Al-Khafajiy
, Thar Baker
, Hilal Al-Libawy
, Zakaria Maamar
, Moayad Aloqaily
, Yaser Jararweh:
Improving fog computing performance via Fog-2-Fog collaboration. 266-280
- Ronny Bazan Antequera, Prasad Calyam, Arjun Ankathatti Chandrashekara, Reshmi Mitra:
Recommending heterogeneous resources for science gateway applications based on custom templates composition. 281-297
- Francisco Muñoz-Martínez, José L. Abellán, Manuel E. Acacio
:
InsideNet: A tool for characterizing convolutional neural networks. 298-315
- Linbo Wang
, Hui Zhen, Xianyong Fang
, Shaohua Wan
, Weiping Ding, Yanwen Guo:
A unified two-parallel-branch deep neural network for joint gland contour and segmentation learning. 316-324
- Sana Moin, Ahmad Karim, Zanab Safdar, Kalsoom Safdar
, Ejaz Ahmed, Muhammad Imran:
Securing IoTs in distributed blockchain: Analysis, requirements and open issues. 325-343 - Yazan Mualla
, Amro Najjar, Alaa Daoud
, Stéphane Galland
, Christophe Nicolle, Ansar-Ul-Haque Yasar
, Elhadi M. Shakshuki:
Agent-based simulation of unmanned aerial vehicles in civilian applications: A systematic literature review and research directions. 344-364
- Sreyasee Das Bhattacharjee
, William J. Tolone, Ved Suhas Paranjape:
Identifying malicious social media contents using multi-view Context-Aware active learning. 365-379
- Xiaojun Ruan, Haiquan Chen, Yun Tian, Shu Yin:
Virtual machine allocation and migration based on performance-to-power ratio in energy-efficient clouds. 380-394
- Shuai Ding, Ling Li, Zhenmin Li, Hao Wang
, Yanchun Zhang:
Smart electronic gastroscope system using a cloud-edge collaborative framework. 395-407
- Mohammed Aamir Ali, Muhammad Ajmal Azad
, Mario Parreño Centeno, Feng Hao
, Aad van Moorsel:
Consumer-facing technology fraud: Economics, attack methods and potential solutions. 408-427
- Xinbo Zhang
, Dongzhan Zhang, Wei Zheng, Jinjun Chen:
An enhanced priority-based scheduling heuristic for DAG applications with temporal unpredictability in task execution and data transmission. 428-439
- Chih Wei Ling, Anwitaman Datta
, Jun Xu:
On hybrid network coding for visual traffic surveillance. 440-455
- Fazlullah Khan
, Ateeq Ur Rehman
, Jiangbin Zheng, Mian Ahmad Jan
, Muhammad Alam:
Mobile crowdsensing: A survey on privacy-preservation, task management, assignment models, and incentives mechanisms. 456-472
- Xiao Lv, Fazhi He, Xiaohu Yan, Yiqi Wu
, Yuan Cheng:
Integrating selective undo of feature-based modeling operations for real-time collaborative CAD systems. 473-497
- Konstantinos Papadakis-Vlachopapadopoulos, Román Sosa González, Ioannis Dimolitsas
, Dimitrios Dechouniotis
, Ana Juan Ferrer, Symeon Papavassiliou:
Collaborative SLA and reputation-based trust management in cloud federations. 498-512 - Fabio D'Urso, Corrado Santoro, Federico Fausto Santoro
:
Wale: A solution to share libraries in Docker containers. 513-522
- Xiru Qiu, Zhikui Chen, Liang Zhao, Chengsheng Hu:
Unsupervised multi-view non-negative for law data feature learning with dual graph-regularization in smart Internet of Things. 523-530
- Ibrahim A. Elgendy
, Weizhe Zhang, Yu-Chu Tian
, Keqin Li:
Resource allocation and computation offloading with data security for mobile edge computing. 531-541
- Louise Knight
, Polona Stefanic, Matej Cigale, Andrew C. Jones, Ian J. Taylor:
Towards extending the SWITCH platform for time-critical, cloud-based CUDA applications: Job scheduling parameters influencing performance. 542-556
- Bhagya Nathali Silva
, Kijun Han:
Mutation operator integrated ant colony optimization based domestic appliance scheduling for lucrative demand side management. 557-568
- Naveed Islam
, Yasir Faheem, Ikram Ud Din
, Muhammad Talha, Mohsen Guizani, Mudassir Khalil:
A blockchain-based fog computing framework for activity recognition as an application to e-Healthcare services. 569-578
- Jóakim von Kistowski, Klaus-Dieter Lange
, Jeremy A. Arnold, John Beckett, Hansfried Block, Michael G. Tricker, Sanjay Sharma, Johann Pais, Samuel Kounev:
Measuring and rating the energy-efficiency of servers. 579-589
- Xiaolong Liu
, Khan Muhammad
, Jaime Lloret, Yu-Wen Chen, Shyan-Ming Yuan
:
Elastic and cost-effective data carrier architecture for smart contract in blockchain. 590-599
- Haifang Wang, Zhongjie Wang, Sihang Hu, Xiaofei Xu, Shiping Chen
, Zhiying Tu:
DUSKG: A fine-grained knowledge graph for effective personalized service recommendation. 600-617 - Diego Pennino
, Maurizio Pizzonia, Federico Griscioli:
Pipeline-integrity: Scaling the use of authenticated data structures up to the cloud. 618-647
- Hao Wang
, Chaonian Guo, Shuhan Cheng:
LoC - A new financial loan management system based on smart contracts. 648-655
- Manuel López Martín
, Belén Carro
, Antonio Sánchez-Esguevillas:
Neural network architecture based on gradient boosting for IoT traffic prediction. 656-673
- José Simão
, Sérgio Esteves, André Pires, Luís Veiga
:
GC-Wise: A Self-adaptive approach for memory-performance efficiency in Java VMs. 674-688
- Hui Yin, Zheng Qin, Jixin Zhang, Lu Ou, Fangmin Li, Keqin Li:
Secure conjunctive multi-keyword ranked search over encrypted cloud data for multiple data owners. 689-700
- Yuxin Liu, Anfeng Liu, Tian Wang
, Xiao Liu, Neal N. Xiong
:
An intelligent incentive mechanism for coverage of data collection in cognitive internet of things. 701-714
- Yu-Chi Chen
, Xin Xie, Peter Shaojui Wang
, Raylin Tso:
Witness-based searchable encryption with optimal overhead for cloud-edge computing. 715-723
- Shang-Pin Ma, Chen-Yuan Fan, Yen Chuang, I-Hsiu Liu, Ci-Wei Lan:
Graph-based and scenario-driven microservice analysis, retrieval, and testing. 724-735
- Rishikesh Sahay
, Weizhi Meng
, Daniel A. Sepulveda Estay
, Christian Damsgaard Jensen, Michael Bruhn Barfod
:
CyberShip-IoT: A dynamic and adaptive SDN-based security policy enforcement framework for ships. 736-750
- Zitian Zhao
, Hancong Duan, Geyong Min, Yue Wu, Zilei Huang, Xian Zhuang, Hao Xi, Meirong Fu:
A lighten CNN-LSTM model for speaker verification on embedded devices. 751-758
- Junnan Li, Zhihui Lu, Yu Tong, Jie Wu, Shalin Huang, Meikang Qiu, Wei Du:
A general AI-defined attention network for predicting CDN performance. 759-769 - Liping Zhang, Lanchao Zhao, Shuijun Yin, Chi-Hung Chi, Ran Liu, Yixin Zhang:
A lightweight authentication scheme with privacy protection for smart grid communications. 770-778
- Nickolaos Koroniotis, Nour Moustafa
, Elena Sitnikova
, Benjamin P. Turnbull
:
Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset. 779-796
- Zhidan Li, Wenmin Li, Qiaoyan Wen, Jiageng Chen, Wei Yin, Kaitai Liang
:
An efficient blind filter: Location privacy protection and the access control in FinTech. 797-810
- Jin-Myeong Shin
, SeokHwan Choi, Peng Liu, Yoon-Ho Choi:
Unsupervised multi-stage attack detection framework without details on single-stage attacks. 811-825
- Ikram Ud Din
, Mohsen Guizani, Joel J. P. C. Rodrigues, Suhaidi Hassan
, Valery V. Korotaev:
Machine learning in the Internet of Things: Designed techniques for smart cities. 826-843
- Sheng-Yao Su, Wenbin Yao, Baojun Qiao, Ming Zong, Xin He, Xiaoyong Li
:
RRSD: A file replication method for ensuring data reliability and reducing storage consumption in a dynamic Cloud-P2P environment. 844-858
- Carlos M. J. M. Dourado Júnior, Suane Pires P. da Silva, Raul Victor Medeiros da Nóbrega, Antônio Carlos da Silva Barros, Arun Kumar Sangaiah
, Pedro Pedrosa Rebouças Filho, Victor Hugo C. de Albuquerque:
A new approach for mobile robot localization based on an online IoT system. 859-881
- Arezou Ostad-Sharif
, Hamed Arshad
, Morteza Nikooghadam
, Dariush Abbasinezhad-Mood
:
Three party secure data transmission in IoT networks through design of a lightweight authenticated key agreement scheme. 882-892
- Ahmed A. Abd El-Latif
, Bassem Abd-El-Atty
, Salvador E. Venegas-Andraca
, Wojciech Mazurczyk
:
Efficient quantum-based security protocols for information sharing and data protection in 5G networks. 893-906
- Denis Migdal, Christophe Rosenberger
:
Statistical modeling of keystroke dynamics samples for the generation of synthetic datasets. 907-920
- Chunlin Li, YaPing Wang, Hengliang Tang, Youlong Luo:
Dynamic multi-objective optimized replica placement and migration strategies for SaaS applications in edge cloud. 921-937 - Venkatasamy Sureshkumar, Ruhul Amin, V. R. Vijaykumar
, S. Raja Sekar:
Robust secure communication protocol for smart healthcare system with FPGA implementation. 938-951 - Bin Cao, Jianwei Zhao
, Po Yang, Peng Yang, Xin Liu, Jun Qi, Andrew Simpson, Mohamed Elhoseny
, Irfan Mehmood, Khan Muhammad
:
Multiobjective feature selection for microarray data via distributed parallel algorithms. 952-981
- Xu Jiao, Yingyuan Xiao
, Wenguang Zheng, Hongya Wang, Ching-Hsien Hsu:
A novel next new point-of-interest recommendation system based on simulated user travel decision-making process. 982-993
- Shuangyan Wang, Gang Mei
, Salvatore Cuomo
:
A simple and generic paradigm for creating complex networks using the strategy of vertex selecting-and-pairing. 994-1004
- Aravind Kota Gopalakrishna, Tanir Ozcelebi, Johan J. Lukkien, Antonio Liotta
:
Runtime evaluation of cognitive systems for non-deterministic multiple output classification problems. 1005-1016
- Mengyu Sun, Zhangbing Zhou, Junping Wang, Chu Du, Walid Gaaloul
:
Energy-Efficient IoT Service Composition for Concurrent Timed Applications. 1017-1030 - Linchang Zhao
, Zhaowei Shang, Anyong Qin, Taiping Zhang, Ling Zhao, Yu Wei, Yuan Yan Tang:
A cost-sensitive meta-learning classifier: SPFCNN-Miner. 1031-1043 - Junho Jeong
, Joong Yeon Lim, Yunsik Son:
A data type inference method based on long short-term memory by improved feature for weakness analysis in binary code. 1044-1052 - Vishal Rathod
, Natasha Yogananda Jeppu, Samanvita Sastry, Shruti Singala, Mohit P. Tahiliani:
CoCoA++: Delay gradient based congestion control for Internet of Things. 1053-1072 - Xuemeng Zhai, Wanlei Zhou
, Gaolei Fei, Cai Lu, Sheng Wen, Guangmin Hu:
Edge-based stochastic network model reveals structural complexity of edges. 1073-1087
- Zahra Saberi, Morteza Saberi
, Omar Hussain
, Elizabeth Chang
:
Stackelberg model based game theory approach for assortment and selling price planning for small scale online retailers. 1088-1102
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.