


default search action
Future Generation Computer Systems, Volume 141
Volume 141, April 2023
- Xu Yang, Hongyan Xing
, Xin Su:
AI-based sound source localization system with higher accuracy. 1-15
- Sasikumar Asaithambi, Subramaniyaswamy Vairavasundaram, Ketan Kotecha, V. Indragandhi, Logesh Ravi
, Ganeshsree Selvachandran
, Ajith Abraham:
Blockchain-based trust mechanism for digital twin empowered Industrial Internet of Things. 16-27
- Xin Su
, Li An, Zhen Cheng, Yajuan Weng:
Cloud-edge collaboration-based bi-level optimal scheduling for intelligent healthcare systems. 28-39
- Alejandro Guerra-Manzanares
, Hayretdin Bahsi:
On the application of active learning for efficient and effective IoT botnet detection. 40-53
- Andrea Cimmino
, Juan Cano-Benito
, Alba Fernández-Izquierdo
, Christos Patsonakis, Apostolos C. Tsolakis
, Raúl García-Castro
, Dimosthenis Ioannidis
, Dimitrios Tzovaras
:
A scalable, secure, and semantically interoperable client for cloud-enabled Demand Response. 54-66
- Hangxu Ji, Su Jiang, Yuhai Zhao, Gang Wu, Guoren Wang, George Y. Yuan:
BS-Join: A novel and efficient mixed batch-stream join method for spatiotemporal data management in Flink. 67-80
- Yi Liang, Kaizhong Chen, Lan Yi, Xing Su, Xiaoming Jin:
DeGTeC: A deep graph-temporal clustering framework for data-parallel job characterization in data centers. 81-95 - Vivek Sethi
, Sujata Pal
:
FedDOVe: A Federated Deep Q-learning-based Offloading for Vehicular fog computing. 96-105
- Weisheng Zhang
, ZhiBang Yang
, Shenghong Yang, Mingxing Duan, Kenli Li:
SPsync: Lightweight multi-terminal big spatiotemporal data synchronization solution. 106-115
- Junchao Wang, Dongmin Huang
, Shengwen Fan, Kaining Han, Gwanggil Jeon, Joel J. P. C. Rodrigues:
PSDCE: Physiological signal-based double chaotic encryption for instantaneous E-healthcare services. 116-128
- Chunrong Wu
, Qinglan Peng
, Yunni Xia
, Yong Jin, Zhentao Hu:
Towards cost-effective and robust AI microservice deployment in edge computing environments. 129-142 - Zehao Wang
, Huifeng Wu, Jin Fan
, Danfeng Sun
, Jia Wu
:
A robust feature reinforcement framework for heterogeneous graphs neural networks. 143-153 - Issam W. Damaj
, Hadi Al-Mubasher
, Mahmoud Saadeh
:
An extended analytical framework for heterogeneous implementations of light cryptographic algorithms. 154-172
- Yuhan Su
, Zhibin Gao, Xiaojiang Du, Mohsen Guizani:
User-centric base station clustering and resource allocation for cell-edge users in 6G ultra-dense networks. 173-185
- Nannan Wu
, Lei Xu, Liehuang Zhu:
A blockchain based access control scheme with hidden policy and attribute. 186-196
- Shaoliang Peng
, Wenxuan Bao
, Hao Liu, Xia Xiao, Jiandong Shang, Lin Han, Shan Wang, Xiaolan Xie, Yang Xu:
A peer-to-peer file storage and sharing system based on consortium blockchain. 197-204
- Jiaxin Hou, Meng Chen
, Haijun Geng, Rongzhen Li, Jianyuan Lu:
GP-NFSP: Decentralized task offloading for mobile edge computing with independent reinforcement learning. 205-217 - Kun Wang, Song Wu
, Kun Suo, Yijie Liu, Hang Huang, Zhuo Huang, Hai Jin:
Characterizing and optimizing Kernel resource isolation for containers. 218-229
- A. H. M. Kamal, Md. Golam Rabiul Alam, Md. Rafiul Hassan, Tasnim Sakib Apon
, Mohammad Mehedi Hassan
:
Explainable indoor localization of BLE devices through RSSI using recursive continuous wavelet transformation and XGBoost classifier. 230-242
- Simon Volpert
, Philipp Eichhammer, Florian Held, Thomas Huffert
, Hans P. Reiser, Jörg Domaschka
:
The view on systems monitoring and its requirements from future Cloud-to-Thing applications and infrastructures. 243-257 - Yaqiang Zhang, Ruyang Li
, Yaqian Zhao, Rengang Li, Yanwei Wang, Zhangbing Zhou:
Multi-agent deep reinforcement learning for online request scheduling in edge cooperation networks. 258-268 - Jose Carlos Romero
, Angeles G. Navarro
, Andrés Rodríguez, Rafael Asenjo:
SkyFlow: Heterogeneous streaming for skyline computation using FlowGraph and SYCL. 269-283 - Genxin Chen
, Jin Qi, Ying Sun, Xiaoxuan Hu, Zhenjiang Dong
, Yanfei Sun:
A collaborative scheduling method for cloud computing heterogeneous workflows based on deep reinforcement learning. 284-297 - Ayaskanta Mishra
, Arun Kumar Ray:
Multi-Access Edge Computing assisted ultra-low energy scheduling and harvesting in multi-hop Wireless Sensor and Actuator Network for energy neutral self-sustainable Next-gen Cyber-Physical System. 298-324 - Tian Jiang, Yunqi Liu, Xuemeng Wu, Mohan Xu, Xiaohui Cui
:
Application of deep reinforcement learning in attacking and protecting structural features-based malicious PDF detector. 325-338 - Ihsan H. Abdulqadder
, Deqing Zou, Israa T. Aziz:
The DAG blockchain: A secure edge assisted honeypot for attack detection and multi-controller based load balancing in SDN 5G. 339-354
- Kan Wang
, Xuan Liu, Hongfang Zhou, Dapeng Lan, Zhen Gao, Amir Taherkordi, Yujie Ye, Yuan Gao:
Reinforcement learning-based cost-efficient service function chaining with CoMP zero-forcing beamforming in edge networks. 355-368
- Jemma L. König
, Annika Hinze, Judy Bowen:
Workload categorization for hazardous industries: The semantic modelling of multi-modal physiological data. 369-381
- Julius Köpke
, Giovanni Meroni
, Mattia Salnitri
:
Designing secure business processes for blockchains with SecBPMN2BC. 382-398 - Zhuojin Liu, Shufeng Gong, Yuxuan Su, Changyi Wan, Yanfeng Zhang
, Ge Yu:
Improving Density Peaks Clustering through GPU acceleration. 399-413 - Guangyao Zhou
, Wenhong Tian
, Rajkumar Buyya:
Multi-search-routes-based methods for minimizing makespan of homogeneous and heterogeneous resources in Cloud computing. 414-432 - Byung Moo Lee
, Hong Yang:
Optimized power control strategy in Massive MIMO for distributed IoT networks. 433-447
- Cailing Cai
, Shimin Pan, Tsz Hon Yuen, Siu-Ming Yiu:
Practical fully leakage resilient signatures with auxiliary inputs. 448-461 - Carmen Sánchez-Zas
, Víctor A. Villagrá
, Mario Vega-Barbas
, Xavier Larriva-Novo, José Ignacio Moreno, Julio Berrocal:
Ontology-based approach to real-time risk management and cyber-situational awareness. 462-472
- Francesco Tusa
, Stuart Clayman:
End-to-end slices to orchestrate resources and services in the cloud-to-edge continuum. 473-488
- Marcin Wozniak
, Michal Wieczorek
, Jakub Silka:
BiLSTM deep neural network model for imbalanced medical data of IoT systems. 489-499
- Haroon Malik, Shahzaib Tahir
, Hasan Tahir, Musfirah Ihtasham, Fawad Khan
:
A homomorphic approach for security and privacy preservation of Smart Airports. 500-513
- Lei Shi, Yimin Zhou
, Juan Wang
, Zuli Wang, Ding Chen, Haifeng Zhao, Wankou Yang, Edward Szczerbicki:
Compact global association based adaptive routing framework for personnel behavior understanding. 514-525
- Jiayi Yu, Zeyuan Li, Naixue Xiong
, Shaobo Zhang
, Anfeng Liu
, Athanasios V. Vasilakos:
A reliability and truth-aware based online digital data auction mechanism for cybersecurity in MCS. 526-541
- Martin Molan
, Andrea Borghesi, Daniele Cesarini
, Luca Benini, Andrea Bartolini
:
RUAD: Unsupervised anomaly detection in HPC systems. 542-554
- Zhaowei Ma, Xiaoming Yuan, Kai Liang, Jie Feng, Li Zhu, Dajun Zhang, F. Richard Yu:
Blockchain-escorted distributed deep learning with collaborative model aggregation towards 6G networks. 555-566
- Yi Zhou
, Lei Huang, Tao Zhou, Hanshi Sun:
Combating medical noisy labels by disentangled distribution learning and consistency regularization. 567-576
- Lu Chen
, De-Gan Zhang, Jie Zhang, Ting Zhang, Wen-Jing Wang, Ya-Hui Cao:
A novel offloading approach of IoT user perception task based on quantum behavior particle swarm optimization. 577-594
- Luca Gagliardelli
, Luca Zecchini
, Luca Ferretti, Domenico Beneventano, Giovanni Simonini, Sonia Bergamaschi, Mirko Orsini, Luca Magnotta, Emma Mescoli, Andrea Livaldi
, Nicola Gessa, Piero De Sabbata, Gianluca D'Agosta
, Fabrizio Paolucci, Fabio Moretti:
A big data platform exploiting auditable tokenization to promote good practices inside local energy communities. 595-610
- Zhongyang Wang
, Du Xu:
Online optimization of intelligent reflecting surface-aided energy-efficient IoT-edge computing. 611-625
- Ece Isik-Polat
, Gorkem Polat
, Altan Koçyigit
:
ARFED: Attack-Resistant Federated averaging based on outlier elimination. 626-650
- Jinhui Liu, Jiaming Wen
, Bowen Zhang, Shunyu Dong, Bo Tang, Yong Yu
:
A post quantum secure multi-party collaborative signature with deterability in the Industrial Internet of Things. 663-676
- Hendrik Nolte
, Nicolai Spicher
, Andrew Russel, Tim Ehlers, Sebastian Krey, Dagmar Krefting, Julian Kunkel:
Secure HPC: A workflow providing a secure partition on an HPC system. 677-691
- Ziming Zhang, Xiaolong Xu
, Fu Xiao:
LGAN-DP: A novel differential private publication mechanism of trajectory data. 692-703
- Wei Han, Junchao Wang, Shike Hou, Tong Bai, Gwanggil Jeon, Joel J. P. C. Rodrigues:
An PPG signal and body channel based encryption method for WBANs. 704-712
- Sung-Jong Eun
, Eun Joung Kim
, Jung Yoon Kim
:
Artificial intelligence-based personalized serious game for enhancing the physical and cognitive abilities of the elderly. 713-722
- Junwen Liu
, Ziyun Xiao, Shiyong Lu, Dunren Che, Ming Dong, Changxin Bai
:
Infrastructure-level Support for GPU-Enabled Deep Learning in DATAVIEW. 723-737
- Roop Singh, Mukesh Saraswat, Alaknanda Ashok, Himanshu Mittal, Ashish K. Tripathi, Avinash Chandra Pandey, Raju Pal
:
From classical to soft computing based watermarking techniques: A comprehensive review. 738-754
- António Barreto, Hervé Paulino
, João A. Silva, Nuno M. Preguiça
:
PS-CRDTs: CRDTs in highly volatile environments. 755-767
- Lixiang Yuan
, Siyang Yu, ZhiBang Yang
, Mingxing Duan, Kenli Li:
A data balancing approach based on generative adversarial network. 768-776

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.