


default search action
Future Generation Computer Systems, Volume 117
Volume 117, April 2021
- Amit Kumar Jaiswal, Prayag Tiwari
, Sahil Garg, M. Shamim Hossain
:
Entity-aware capsule network for multi-class classification of big data: A deep learning approach. 1-11
- Peyman Paknejad, Reihaneh Khorsand, Mohammadreza Ramezanpour
:
Chaotic improved PICEA-g-based multi-objective optimization for workflow scheduling in cloud environment. 12-28
- Kirstie L. Bellman, Jean Botev
, Ada Diaconescu, Lukas Esterle
, Christian Gruhl, Christopher Landauer, Peter R. Lewis, Phyllis R. Nelson, Evangelos Pournaras, Anthony Stein
, Sven Tomforde:
Self-improving system integration: Mastering continuous change. 29-46
- Saqib Hakak, Mamoun Alazab
, Suleman Khan, Thippa Reddy Gadekallu
, Praveen Kumar Reddy Maddikunta
, Wazir Zada Khan
:
An ensemble machine learning approach through effective feature extraction to classify fake news. 47-58
- Muhammad Ashad Kabir
, Jun Han, Md. Arafat Hossain, Steve Versteeg:
SpecMiner: Heuristic-based mining of service behavioral models from interaction traces. 59-71 - Leonardo R. Rodrigues, Guilherme Piêgas Koslovski, Marcelo Pasin, Maurício Aronne Pillon, Omir Correia Alves Junior, Charles Christian Miers
:
Time-constrained and network-aware containers scheduling in GPU era. 72-86
- Amr Tolba
, Zafer Al-Makhadmeh:
Predictive data analysis approach for securing medical data in smart grid healthcare systems. 87-96
- Xavier Oriol
, Giuseppe De Giacomo, Montserrat Estañol, Ernest Teniente:
Embedding reactive behavior into artifact-centric business process models. 97-110
- Shankai Yan
, Ka-Chun Wong
:
Future DNA computing device and accompanied tool stack: Towards high-throughput computation. 111-124
- Jianhua Li
, Jiong Jin
, Lingjuan Lyu, Dong Yuan, Yingying Yang, Longxiang Gao, Chao Shen:
A fast and scalable authentication scheme in IOT for smart living. 125-137
- Yuanjin Xu, Ming Wei:
Multi-view clustering toward aerial images by combining spectral analysis and local refinement. 138-144
- Huan Wang
, Shahid Mumtaz
, Houjun Li, Jingxian Liu, Fan Yang:
An identification strategy for unknown attack through the joint learning of space-time features. 145-154
- Hibiki Taguchi
, Xin Liu, Tsuyoshi Murata
:
Graph convolutional networks for graphs containing missing features. 155-168
- Jimmy Ming-Tai Wu, Gautam Srivastava
, Alireza Jolfaei
, Philippe Fournier-Viger, Jerry Chun-Wei Lin
:
Hiding sensitive information in eHealth datasets. 169-180
- Qika Lin
, Yifan Zhu
, Hao Lu, Kaize Shi, Zhendong Niu
:
Improving University Faculty Evaluations via multi-view Knowledge Graph. 181-192
- Amrita Dahiya, Brij B. Gupta
:
A reputation score policy and Bayesian game theory based incentivized mechanism for DDoS attacks mitigation and cyber defense. 193-204 - Zhiwei Guo
, Lianggui Tang, Tan Guo, Keping Yu
, Mamoun Alazab
, Andrii Shalaginov:
Deep Graph neural network-based spammer detection under the perspective of heterogeneous cyberspace. 205-218
- Leila Eskandari, Jason Mair, Zhiyi Huang
, David M. Eyers:
I-Scheduler: Iterative scheduling for distributed stream processing systems. 219-233
- Iqra Kamran, Saeeda Naz, Imran Razzak
, Muhammad Imran:
Handwriting dynamics assessment using deep neural network for early identification of Parkinson's disease. 234-244
- Aqsa Rashid
, Asif Masood, Haider Abbas
:
Cryptographic Framework for Role Control Remedy: A Secure Role Engineering mechanism for Single Authority Organizations. 245-258
- Yongsheng Hao
, Jie Cao, Qi Wang
, Jinglin Du:
Energy-aware scheduling in edge computing with a clustering method. 259-272 - Olatunji Mumini Omisore
, Bolanle Adefowoke Ojokoh, Asegunloluwa Eunice Babalola
, Tobore Igbe
, Yetunde Folajimi, Zedong Nie, Lei Wang:
An affective learning-based system for diagnosis and personalized management of diabetes mellitus. 273-290
- Zhihan Lv
, Dongliang Chen
, Ranran Lou, Ammar Alazab:
Artificial intelligence for securing industrial-based cyber-physical systems. 291-298
- Hisham A. Kholidy:
Detecting impersonation attacks in cloud computing environments using a centric user profiling approach. 299-320
- Hongfei Zhu, Ye Wang, Chonghua Wang, Xiaochun Cheng
:
An efficient identity-based proxy signcryption using lattice. 321-327
- Yuanhang Qi
, M. Shamim Hossain
, Jiangtian Nie
, Xuandi Li:
Privacy-preserving blockchain-based federated learning for traffic flow prediction. 328-337
- Xiaogang Wang
, Jian Cao, Dingyu Yang, Zhen Qin, Rajkumar Buyya:
Online cloud resource prediction via scalable window waveform sampling on classified workloads. 338-358 - Zeineb Rejiba, Xavier Masip-Bruin
, Eva Marín-Tordera:
Towards user-centric, switching cost-aware fog node selection strategies. 359-368
- Endah Kristiani
, Yuan-An Chen, Chao-Tung Yang
, Chin-Yin Huang
, Yu-Tse Tsan, Wei-Cheng Chan:
Using deep ensemble for influenza-like illness consultation rate prediction. 369-386
- George Papadimitriou
, Cong Wang, Karan Vahi, Rafael Ferreira da Silva
, Anirban Mandal
, Zhengchun Liu, Rajiv Mayani, Mats Rynge
, Mariam Kiran, Vickie E. Lynch, Rajkumar Kettimuthu, Ewa Deelman
, Jeffrey S. Vetter, Ian T. Foster:
End-to-end online performance data capture and analysis for scientific workflows. 387-400
- Shanshan Liu
, Pedro Reviriego, Paolo Montuschi
, Fabrizio Lombardi:
Less-is-Better Protection (LBP) for memory errors in kNNs classifiers. 401-411
- Usman Rauf, Mohamed Shehab
, Nafees Qamar, Sheema Sameen:
Formal approach to thwart against insider attacks: A bio-inspired auto-resilient policy regulation framework. 412-425
- Zehui Qu, Zhongsheng Chen:
An intelligent vehicle image segmentation and quality assessment model. 426-432 - Xin Liu, YuJia Jiang:
Aesthetic assessment of website design based on multimodal fusion. 433-438
- Satish Narayana Srirama, Freddy Marcelo Surriabre Dick, Mainak Adhikari:
Akka framework based on the Actor model for executing distributed Fog Computing applications. 439-452
- Wei Ren, Xutao Wan, Pengcheng Gan:
A double-blockchain solution for agricultural sampled data security in Internet of Things network. 453-461 - Ibrahim Alghamdi, Christos Anagnostopoulos
, Dimitrios P. Pezaros:
Data quality-aware task offloading in Mobile Edge Computing: An Optimal Stopping Theory approach. 462-479
- Xing Li, Junpei Zhong
, M. M. Kamruzzaman
:
Complicated robot activity recognition by quality-aware deep reinforcement learning. 480-485
- Linh-An Phan, Duc-Thang Nguyen, Meonghun Lee, Dae-Heon Park, Taehong Kim
:
Dynamic fog-to-fog offloading in SDN-based fog computing systems. 486-497 - Chuge Wu
, Wei Li, Ling Wang
, Albert Y. Zomaya
:
An evolutionary fuzzy scheduler for multi-objective resource allocation in fog computing. 498-509
- Xiaoyu Yin, Dagmar Gromann
, Sebastian Rudolph
:
Neural machine translating from natural language to SPARQL. 510-519

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.