


default search action
Future Generation Computer Systems, Volume 137
Volume 137, December 2022
- Xingqiu He
, Yuhang Shen
, Jing Ren, Sheng Wang, Xiong Wang, Shizhong Xu:
An online auction-based incentive mechanism for soft-deadline tasks in Collaborative Edge Computing. 1-13 - Amanda Jayanetti
, Saman K. Halgamuge
, Rajkumar Buyya:
Deep reinforcement learning for energy and time optimized scheduling of precedence-constrained tasks in edge-cloud computing environments. 14-30 - Min Zhu, Han Yu
, Zhiyuan Liu, Bingqing Shen, Lihong Jiang, Hongming Cai:
An intelligent collaboration framework of IoT applications based on event logic graph. 31-41
- Huijie Yang, Pandi Vijayakumar, Jian Shen
, Brij B. Gupta
:
A location-based privacy-preserving oblivious sharing scheme for indoor navigation. 42-52
- Yunseong Lee
, Arooj Masood, Wonjong Noh, Sungrae Cho
:
DQN based user association control in hierarchical mobile edge computing systems for mobile IoT services. 53-69
- Asan Baker Kanbar, Kamaran Faraj:
Region aware dynamic task scheduling and resource virtualization for load balancing in IoT-fog multi-cloud environment. 70-86
- Zehua Guo, Liangjie Liu, Mofan Feng, Kai Su, Runqiu Chi, Keyi Li, Qing Lu, Xianbin Su
, Lin-Tai Da, Song Cao, Mingxuan Zhang, Luming Meng, Dan Cao, Jiayi Wang, Guang He, Yi Shi
:
3D genome assisted protein-protein interaction prediction. 87-96
- Behrooz Zolfaghari
, Saeid Abrishami
:
A multi-class workflow ensemble management system using on-demand and spot instances in cloud. 97-110 - Yunyun Cai
, Wei Xi
, Yuhao Shen, Youcheng Peng, Shixuan Song, Jizhong Zhao:
High-efficient hierarchical federated learning on non-IID data with progressive collaboration. 111-128 - Carmine Colarusso
, Antonio De Iasio, Angelo Furno, Lorenzo Goglia, Mohammed Amine Merzoug
, Eugenio Zimeo
:
PROMENADE: A big data platform for handling city complex networks with dynamic graphs. 129-145
- Haiyan Wang, Jiaming Feng, Ke Li
, Lisi Chen:
Deep understanding of big geospatial data for self-driving: Data, technologies, and systems. 146-163
- Daosen Zhai, Chen Wang, Haotong Cao, Sahil Garg, Mohammad Mehedi Hassan, Salman A. AlQahtani
:
Deep neural network based UAV deployment and dynamic power control for 6G-Envisioned intelligent warehouse logistics system. 164-172
- Yuanyi Chen, Peng Yu
, Zengwei Zheng
, Jiaxing Shen
, Minyi Guo:
Modeling feature interactions for context-aware QoS prediction of IoT services. 173-185
- Wei Wei, Vincenzo Piuri, Witold Pedrycz, Syed Hassan Ahmed
:
Special Issue on Artificial Intelligence-of-Things (AIoT): Opportunities, Challenges, and Solutions-Part II: Artificial-Intelligence-Powered Internet of Things. 186-188
- Xiaojia Song, Tao Xie, Stephen Fischer:
Accelerating kNN search in high dimensional datasets on FPGA by reducing external memory access. 189-200 - Jiahui Li
, Xiaogang Qi, Wenchao Ma, Lifang Liu:
Path selection for link failure protection in hybrid SDNs. 201-215
- Wei Wei, Vincenzo Piuri, Witold Pedrycz, Syed Hassan Ahmed
:
Special Issue on Artificial Intelligence-of-Things (AIoT): Opportunities, Challenges, and Solutions-Part I: Artificial Intelligence Applications in Various Fields. 216-218
- Sang-Hoon Choi
, Ki-Woong Park
:
Cloud-BlackBox: Toward practical recording and tracking of VM swarms for multifaceted cloud inspection. 219-233 - Abukari Mohammed Yakubu, Yi-Ping Phoebe Chen
:
A blockchain-based application for genomic access and variant discovery using smart contracts and homomorphic encryption. 234-247 - Jiexi Wang, Yingxu Lai, Jing Liu:
Stealthy attack detection method based on Multi-feature long short-term memory prediction model. 248-259 - Zhi Xiong
, Min Zhao, Linhui Tan, Lingru Cai:
Real-time power optimization for application server clusters based on Mixed-Integer Programming. 260-273 - Xinxin Hu
, Hongchang Chen
, Shuxin Liu, Haocong Jiang, Guanghan Chu, Ran Li:
BTG: A Bridge to Graph machine learning in telecommunications fraud detection. 274-287
- Kamran Ahmad Awan, Ikram Ud Din
, Ahmad Almogren, Joel J. P. C. Rodrigues:
AutoTrust: A privacy-enhanced trust-based intrusion detection approach for internet of smart things. 288-301
- Luciano Caroprese
, Carmela Comito, Domenico Talia, Ester Zumpano
:
A fuzzy logic technique for virtual sensor networks. 302-322
- Xin Wang
, Azim Khan, Jianwu Wang
, Aryya Gangopadhyay, Carl E. Busart, Jade Freeman:
An edge-cloud integrated framework for flexible and dynamic stream analytics. 323-335 - Shaoming Duan, Chuanyi Liu
, Zhengsheng Cao, Xiaopeng Jin, Peiyi Han:
Fed-DR-Filter: Using global data representation to reduce the impact of noisy labels on the performance of federated learning. 336-348 - Ke Kong
, Zhaoxin Zhang, Changyong Guo, Jideng Han
, Gang Long:
PMMSA: Security analysis system for android wearable applications based on permission matching and malware similarity analysis. 349-362 - Bassem Sellami
, Akram Hakiri
, Sadok Ben Yahia
:
Deep Reinforcement Learning for energy-aware task offloading in join SDN-Blockchain 5G massive IoT edge network. 363-379
- Bing Jia, Wenling Qiao, Zhaopeng Zong, Shuai Liu
, Mohammad Hijji
, Javier Del Ser, Khan Muhammad
:
A fingerprint-based localization algorithm based on LSTM and data expansion method for sparse samples. 380-393

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.