


default search action
Future Generation Computer Systems, Volume 127
Volume 127, February 2022
- Abdul Razaque
, Yaser Jararweh, Bandar Alotaibi
, Munif Alotaibi
, Salim Hariri, Muder Almiani
:
Energy-efficient and secure mobile fog-based cloud for the Internet of Things. 1-13 - Brice Ekane, Tu Dinh Ngoc
, Boris Teabe, Daniel Hagimont, Noel De Palma:
FlexVF: Adaptive network device services in a virtualized environment. 14-22 - Bei Gong, Yong Wu, Qian Wang, Yuheng Ren
, Chong Guo:
A secure and lightweight certificateless hybrid signcryption scheme for Internet of Things. 23-30
- Fabio Gasparetti
:
Discovering prerequisite relations from educational documents through word embeddings. 31-41 - Tai Tan Mai
, Marija Bezbradica
, Martin Crane
:
Learning behaviours data in programming education: Community analysis and outcome prediction with cleaned data. 42-55
- Yingying Ren, Wei Liu, Anfeng Liu, Tian Wang
, Ang Li:
A privacy-protected intelligent crowdsourcing application of IoT based on the reinforcement learning. 56-69
- Usman Ahmed, Gautam Srivastava
, Jerry Chun-Wei Lin
:
Reliable customer analysis using federated learning and exploring deep-attention edge intelligence. 70-79
- Xiaowen Huang
, Shimin Gong, Jingmin Yang, Wenjie Zhang
, Liwei Yang, Chai Kiat Yeo
:
Hybrid market-based resources allocation in Mobile Edge Computing systems under stochastic information. 80-91
- Weixing Liu
, Shaohong Yan, Tailong Chen
, Jiaqing Cheng
, Ke Wang, Jintao Song
, Aimin Yang
, Jie Li, Hongwei Xing, Yuzhu Zhang:
Feature recognition of irregular pellet images by regularized Extreme Learning Machine in combination with fractal theory. 92-108
- Nikolay O. Nikitin
, Pavel Vychuzhanin, Mikhail Sarafanov
, Iana S. Polonskaia, Ilia Revin, Irina V. Barabanova
, Gleb Maximov
, Anna V. Kalyuzhnaya, Alexander Boukhanovsky
:
Automated evolutionary approach for the design of composite machine learning pipelines. 109-125 - Tao Zhang, Qianqiang Zhang, Yasi Lei, Shaojun Zou, Juan Huang, Fangmin Li
:
Load balancing with traffic isolation in data center networks. 126-141 - Chunlin Li, Qianqian Cai, Youlong Lou:
Optimal data placement strategy considering capacity limitation and load balancing in geographically distributed cloud. 142-159 - Bei Gong, Chi Cui
, Mingsheng Hu, Chong Guo, Xiaochong Li, Yuheng Ren
:
Anonymous Traceability protocol based on Group Signature for Blockchain. 160-167 - Yisel Gari
, David A. Monge
, Cristian Mateos:
A Q-learning approach for the autoscaling of scientific workflows in the Cloud. 168-180
- Izhar Ahmed Khan
, Nour Moustafa, Imran Razzak
, Muhammad Tanveer, Dechang Pi, Yue Pan, Bakht Sher Ali
:
XSRU-IoMT: Explainable simple recurrent units for threat detection in Internet of Medical Things networks. 181-193
- Jionghao Lin
, Shaveen Singh
, Lele Sha
, Wei Tan
, David Lang, Dragan Gasevic
, Guanliang Chen
:
Is it a good move? Mining effective tutoring strategies from human-human tutorial dialogues. 194-207
- Sergio Santander-Jiménez
, Miguel A. Vega-Rodríguez
, Leonel Sousa:
Exploiting multi-level parallel metaheuristics and heterogeneous computing to boost phylogenetics. 208-224 - Xuyang Ma
, Du Xu, Katinka Wolter
:
Blockchain-enabled feedback-based combinatorial double auction for cloud markets. 225-239 - Bo Yin, Weilong Zeng, Xuetao Wei:
Cost-effective crowdsourced join queries for entity resolution without prior knowledge. 240-251 - Sarah Alhozaimy, Daniel A. Menascé
:
A formal analysis of performance-security tradeoffs under frequent task reconfigurations. 252-262
- Yujin Zhang, Luo Yu, Zhijun Fang, Neal N. Xiong
, Lijun Zhang, Haiyue Tian:
An end-to-end deep learning model for robust smooth filtering identification. 263-275
- Souradip Roy
, Juan Li
, Bong-Jin Choi
, Yan Bai:
A lightweight supervised intrusion detection mechanism for IoT networks. 276-285
- Zhen Hong
, Miao Hong
, Ning Wang, Yong Ma
, Xiaolong Zhou
, Wei Wang
:
A wearable-based posture recognition system with AI-assisted approach for healthcare IoT. 286-296
- Shishir Kumar Shandilya
, Saket Upadhyay
, Ajit Kumar
, Atulya K. Nagar
:
AI-assisted Computer Network Operations testbed for Nature-Inspired Cyber Security based adaptive defense simulation and analysis. 297-308 - Tiantian Wang
, HaiLong Yu
, Kechao Wang, Xiaohong Su:
Fault localization based on wide & deep learning model by mining software behavior. 309-319 - Filipe Magalhães
, José Monteiro
, Juan A. Acebrón
, José R. Herrero
:
A distributed Monte Carlo based linear algebra solver applied to the analysis of large complex networks. 320-330
- Geoffray Bonnin, Danilo Dessì, Gianni Fenu, Martin Hlosta
, Mirko Marras, Harald Sack:
Guest Editorial of the FGCS Special Issue on Advances in Intelligent Systems for Online Education. 331-333
- Shan Gao, Hanyi Wang:
Scenario prediction of public health emergencies using infectious disease dynamics model and dynamic Bayes. 334-346
- Xiaocan Wu, Yu-e Sun, Yang Du, Guoju Gao, He Huang
, Xiaoshuang Xing:
An Anti-Malicious Task Allocation Mechanism in Crowdsensing Systems. 347-361 - Xiang Wu, Yongting Zhang
, Minyu Shi, Pei Li, Ruirui Li, Neal N. Xiong
:
An adaptive federated learning scheme with differential privacy preserving. 362-372
- Peng Wang, Biwen Chen
, Tao Xiang
, Zhongming Wang
:
Lattice-based public key searchable encryption with fine-grained access control for edge computing. 373-383 - Wentao Li
, Zhiwen Chen, Xin He, Guoyun Duan
, Jianhua Sun
, Hao Chen:
CVFuzz: Detecting complexity vulnerabilities in OpenCL kernels via automated pathological input generation. 384-395 - Laaziz Lahlou
, Nadjia Kara, Claes Edstrom:
DAVINCI: online and Dynamic Adaptation of eVolvable vIrtual Network services over Cloud Infrastructures. 396-408 - Shashi Prakash Tripathi
, Rahul Kumar Yadav
, Abhay Kumar Rai
:
Network embedding based link prediction in dynamic networks. 409-420 - Yuran Zhang, Ziyan Tang:
PSO-weighted random forest for attractive tourism spots recommendation. 421-425
- Ahmed M. Anter
, Mohamed Abd Elaziz, Zhiguo Zhang:
Real-time epileptic seizure recognition using Bayesian genetic whale optimizer and adaptive machine learning. 426-434
- Elizabeth Gómez
, Carlos Shui Zhang
, Ludovico Boratto
, Maria Salamó
, Guilherme Ramos
:
Enabling cross-continent provider fairness in educational recommender systems. 435-447
- Md. Enamul Haque, Mehmet Engin Tozal
:
Byte embeddings for file fragment classification. 448-461
- Md. Rafiul Hassan, Md. Fakrul Islam, Md. Zia Uddin
, Goutam Ghoshal, Mohammad Mehedi Hassan
, Shamsul Huda, Giancarlo Fortino:
Prostate cancer classification from ultrasound and MRI images using deep learning based Explainable Artificial Intelligence. 462-472
- Neda Bugshan
, Ibrahim Khalil
, Nour Moustafa, Mahathir Almashor
, Alsharif Abuadbba
:
Radial Basis Function Network with Differential Privacy. 473-486 - Junaid Haseeb
, Masood Mansoori
, Yuichi Hirose
, Harith Al-Sahaf
, Ian Welch
:
Autoencoder-based feature construction for IoT attacks clustering. 487-502

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.