default search action
Future Generation Computer Systems, Volume 127
Volume 127, February 2022
- Abdul Razaque, Yaser Jararweh, Bandar Alotaibi, Munif Alotaibi, Salim Hariri, Muder Almiani:
Energy-efficient and secure mobile fog-based cloud for the Internet of Things. 1-13 - Brice Ekane, Tu Dinh Ngoc, Boris Teabe, Daniel Hagimont, Noel De Palma:
FlexVF: Adaptive network device services in a virtualized environment. 14-22 - Bei Gong, Yong Wu, Qian Wang, Yuheng Ren, Chong Guo:
A secure and lightweight certificateless hybrid signcryption scheme for Internet of Things. 23-30
- Fabio Gasparetti:
Discovering prerequisite relations from educational documents through word embeddings. 31-41 - Tai Tan Mai, Marija Bezbradica, Martin Crane:
Learning behaviours data in programming education: Community analysis and outcome prediction with cleaned data. 42-55
- Yingying Ren, Wei Liu, Anfeng Liu, Tian Wang, Ang Li:
A privacy-protected intelligent crowdsourcing application of IoT based on the reinforcement learning. 56-69
- Usman Ahmed, Gautam Srivastava, Jerry Chun-Wei Lin:
Reliable customer analysis using federated learning and exploring deep-attention edge intelligence. 70-79
- Xiaowen Huang, Shimin Gong, Jingmin Yang, Wenjie Zhang, Liwei Yang, Chai Kiat Yeo:
Hybrid market-based resources allocation in Mobile Edge Computing systems under stochastic information. 80-91
- Weixing Liu, Shaohong Yan, Tailong Chen, Jiaqing Cheng, Ke Wang, Jintao Song, Aimin Yang, Jie Li, Hongwei Xing, Yuzhu Zhang:
Feature recognition of irregular pellet images by regularized Extreme Learning Machine in combination with fractal theory. 92-108
- Nikolay O. Nikitin, Pavel Vychuzhanin, Mikhail Sarafanov, Iana S. Polonskaia, Ilia Revin, Irina V. Barabanova, Gleb Maximov, Anna V. Kalyuzhnaya, Alexander Boukhanovsky:
Automated evolutionary approach for the design of composite machine learning pipelines. 109-125 - Tao Zhang, Qianqiang Zhang, Yasi Lei, Shaojun Zou, Juan Huang, Fangmin Li:
Load balancing with traffic isolation in data center networks. 126-141 - Chunlin Li, Qianqian Cai, Youlong Lou:
Optimal data placement strategy considering capacity limitation and load balancing in geographically distributed cloud. 142-159 - Bei Gong, Chi Cui, Mingsheng Hu, Chong Guo, Xiaochong Li, Yuheng Ren:
Anonymous Traceability protocol based on Group Signature for Blockchain. 160-167 - Yisel Gari, David A. Monge, Cristian Mateos:
A Q-learning approach for the autoscaling of scientific workflows in the Cloud. 168-180
- Izhar Ahmed Khan, Nour Moustafa, Imran Razzak, Muhammad Tanveer, Dechang Pi, Yue Pan, Bakht Sher Ali:
XSRU-IoMT: Explainable simple recurrent units for threat detection in Internet of Medical Things networks. 181-193
- Jionghao Lin, Shaveen Singh, Lele Sha, Wei Tan, David Lang, Dragan Gasevic, Guanliang Chen:
Is it a good move? Mining effective tutoring strategies from human-human tutorial dialogues. 194-207
- Sergio Santander-Jiménez, Miguel A. Vega-Rodríguez, Leonel Sousa:
Exploiting multi-level parallel metaheuristics and heterogeneous computing to boost phylogenetics. 208-224 - Xuyang Ma, Du Xu, Katinka Wolter:
Blockchain-enabled feedback-based combinatorial double auction for cloud markets. 225-239 - Bo Yin, Weilong Zeng, Xuetao Wei:
Cost-effective crowdsourced join queries for entity resolution without prior knowledge. 240-251 - Sarah Alhozaimy, Daniel A. Menascé:
A formal analysis of performance-security tradeoffs under frequent task reconfigurations. 252-262
- Yujin Zhang, Luo Yu, Zhijun Fang, Neal N. Xiong, Lijun Zhang, Haiyue Tian:
An end-to-end deep learning model for robust smooth filtering identification. 263-275
- Souradip Roy, Juan Li, Bong-Jin Choi, Yan Bai:
A lightweight supervised intrusion detection mechanism for IoT networks. 276-285
- Zhen Hong, Miao Hong, Ning Wang, Yong Ma, Xiaolong Zhou, Wei Wang:
A wearable-based posture recognition system with AI-assisted approach for healthcare IoT. 286-296
- Shishir Kumar Shandilya, Saket Upadhyay, Ajit Kumar, Atulya K. Nagar:
AI-assisted Computer Network Operations testbed for Nature-Inspired Cyber Security based adaptive defense simulation and analysis. 297-308 - Tiantian Wang, HaiLong Yu, Kechao Wang, Xiaohong Su:
Fault localization based on wide & deep learning model by mining software behavior. 309-319 - Filipe Magalhães, José Monteiro, Juan A. Acebrón, José R. Herrero:
A distributed Monte Carlo based linear algebra solver applied to the analysis of large complex networks. 320-330
- Geoffray Bonnin, Danilo Dessì, Gianni Fenu, Martin Hlosta, Mirko Marras, Harald Sack:
Guest Editorial of the FGCS Special Issue on Advances in Intelligent Systems for Online Education. 331-333
- Shan Gao, Hanyi Wang:
Scenario prediction of public health emergencies using infectious disease dynamics model and dynamic Bayes. 334-346
- Xiaocan Wu, Yu-e Sun, Yang Du, Guoju Gao, He Huang, Xiaoshuang Xing:
An Anti-Malicious Task Allocation Mechanism in Crowdsensing Systems. 347-361 - Xiang Wu, Yongting Zhang, Minyu Shi, Pei Li, Ruirui Li, Neal N. Xiong:
An adaptive federated learning scheme with differential privacy preserving. 362-372
- Peng Wang, Biwen Chen, Tao Xiang, Zhongming Wang:
Lattice-based public key searchable encryption with fine-grained access control for edge computing. 373-383 - Wentao Li, Zhiwen Chen, Xin He, Guoyun Duan, Jianhua Sun, Hao Chen:
CVFuzz: Detecting complexity vulnerabilities in OpenCL kernels via automated pathological input generation. 384-395 - Laaziz Lahlou, Nadjia Kara, Claes Edstrom:
DAVINCI: online and Dynamic Adaptation of eVolvable vIrtual Network services over Cloud Infrastructures. 396-408 - Shashi Prakash Tripathi, Rahul Kumar Yadav, Abhay Kumar Rai:
Network embedding based link prediction in dynamic networks. 409-420 - Yuran Zhang, Ziyan Tang:
PSO-weighted random forest for attractive tourism spots recommendation. 421-425
- Ahmed M. Anter, Mohamed Abd Elaziz, Zhiguo Zhang:
Real-time epileptic seizure recognition using Bayesian genetic whale optimizer and adaptive machine learning. 426-434
- Elizabeth Gómez, Carlos Shui Zhang, Ludovico Boratto, Maria Salamó, Guilherme Ramos:
Enabling cross-continent provider fairness in educational recommender systems. 435-447
- Md. Enamul Haque, Mehmet Engin Tozal:
Byte embeddings for file fragment classification. 448-461
- Md. Rafiul Hassan, Md. Fakrul Islam, Md. Zia Uddin, Goutam Ghoshal, Mohammad Mehedi Hassan, Shamsul Huda, Giancarlo Fortino:
Prostate cancer classification from ultrasound and MRI images using deep learning based Explainable Artificial Intelligence. 462-472
- Neda Bugshan, Ibrahim Khalil, Nour Moustafa, Mahathir Almashor, Alsharif Abuadbba:
Radial Basis Function Network with Differential Privacy. 473-486 - Junaid Haseeb, Masood Mansoori, Yuichi Hirose, Harith Al-Sahaf, Ian Welch:
Autoencoder-based feature construction for IoT attacks clustering. 487-502
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.