default search action
Future Generation Computer Systems, Volume 145
Volume 145, August 2023
- Ming Tao:
Semantic ontology enabled modeling, retrieval and inference for incomplete mobile trajectory data. 1-11
- Javier Pastor-Galindo, Félix Gómez Mármol, Gregorio Martínez Pérez:
On the gathering of Tor onion addresses. 12-26
- Xuanwei Zeng, Yong Yang, Qiaoqiao Xu, Huimiao Zhan, Haoan Lv, Zhiqiang Zhou, Xin Ma, Xiaojuan Liu, Jiaojiao Gui, Qianruo Kang, Neal Xiong, Junfeng Gao, Hua Zheng:
Intraoperative enhancement of effective connectivity in the default mode network predicts postoperative delirium following cardiovascular surgery. 27-37
- William Ochoa, Felix Larrinaga, Alain Perez:
Context-aware workflow management for smart manufacturing: A literature review of semantic web-based approaches. 38-55 - Shan Ji, Jiale Zhang, Yongjing Zhang, Zhaoyang Han, Chuan Ma:
LAFED: A lightweight authentication mechanism for blockchain-enabled federated learning system. 56-67 - Shah Khalid, Aftab Alam, Muhammad Fayaz, Fakhrud Din, Sehat Ullah, Shabir Ahmad:
Investigating the effect of network latency on users' performance in Collaborative Virtual Environments using navigation aids. 68-76 - Yujia Song, Ruyue Xin, Peng Chen, Rui Zhang, Juan Chen, Zhiming Zhao:
Identifying performance anomalies in fluctuating cloud environments: A robust correlative-GNN-based explainable approach. 77-86
- Juan Armando Barron-Lugo, José Luis González, Ivan López-Arévalo, Jesús Carretero, José-Lázaro Martínez-Rodríguez:
Xel: A cloud-agnostic data platform for the design-driven building of high-availability data science services. 87-103
- Chen Zhou, Masoud Barati, Omair Shafiq:
A compliance-based architecture for supporting GDPR accountability in cloud computing. 104-120 - Fumio Machida, Qingyang Zhang, Ermeson C. Andrade:
Performability analysis of adaptive drone computation offloading with fog computing. 121-135
- Dong Zhang, Heye Zhang, Hongwei Zhang, Lei Xu, Jinglin Zhang, Zhifan Gao:
Distance transform learning for structural and functional analysis of coronary artery from dual-view angiography. 136-149 - Shaoyi Du, Yuying Liu, Xijing Wang, Yuting Chi, Nanning Zheng, Yucheng Guo:
Curriculum classification network based on margin balancing multi-loss and ensemble learning. 150-163
- Drew Penney, Bin Li, Jaroslaw J. Sydir, Lizhong Chen, Charlie Tai, Stefan Lee, Eoin Walsh, Thomas Long:
PROMPT: Learning dynamic resource allocation policies for network applications. 164-175 - Duong Tuan Nguyen, Chuan Pham, Kim Khoa Nguyen, Mohamed Cheriet:
Jointly optimized resource allocation for SDN control and forwarding planes in edge-cloud SDN-based networks. 176-188 - Shaobo Zhang, Tao Guo, Qin Liu, Entao Luo, Kim-Kwang Raymond Choo, Guojun Wang:
ALPS: Achieving accuracy-aware location privacy service via assisted regions. 189-199 - Yulin Wu, Lanxiang Chen:
Structured encryption for triangle counting on graph data. 200-210
- Mirko Franco, Ombretta Gaggi, Barbara Guidi, Andrea Michienzi, Claudio E. Palazzi:
A decentralised messaging system robust against the unauthorised forwarding of private content. 211-222
- Cleber Jorge Lira de Santana, Ernando Batista, Flávia Coimbra Delicato, Cássio V. S. Prazeres:
Architecture for IoT applications based on reactive microservices: A performance evaluation. 223-238 - Felipe A. Quezada, Cristóbal A. Navarro, Miguel Romero, Cristhian Aguilera:
Modeling GPU Dynamic Parallelism for self similar density workloads. 239-253 - Neha Agarwal, Geeta Sikka, Lalit Kumar Awasthi:
WGSDMM+GA: A genetic algorithm-based service clustering methodology assimilating dirichlet multinomial mixture model with word embedding. 254-266
- Salwa Alem, David Espes, Laurent Nana, Eric Martin, Florent de Lamotte:
A novel bi-anomaly-based intrusion detection system approach for industry 4.0. 267-283
- Zhexin Yao, Qiuming Liu, Jingkang Yang, Yanan Chen, Zhen Wu:
PPUP-GAN: A GAN-based privacy-protecting method for aerial photography. 284-292 - Aimin Yang, Yunjie Bai, Tao Xue, Yifan Li, Jie Li:
A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. 293-302 - Qizhi Zhang, Yale He, Ruilin Lai, Zhihao Hou, Gansen Zhao:
A survey on the efficiency, reliability, and security of data query in blockchain systems. 303-320 - Sergi Vila, Fernando Guirado, Josep L. Lérida:
Cloud computing virtual machine consolidation based on stock trading forecast techniques. 321-336 - Jing Chen, Xiaoqiang Di, Rui Xu, Hui Qi, Ligang Cong, Kehan Zhang, Ziyang Xing, Xiongwen He, Wenping Lei, Shiwei Zhang:
A remote sensing data transmission strategy based on the combination of satellite-ground link and GEO relay under dynamic topology. 337-353 - Jiangjiang Zhang, Zhenhu Ning, Fei Xue:
A two-stage federated optimization algorithm for privacy computing in Internet of Things. 354-366 - Chehara Pathmabandu, John C. Grundy, Mohan Baruwal Chhetri, Zubair A. Baig:
Privacy for IoT: Informed consent management in Smart Buildings. 367-383
- Caixing Shao, Fengxin Cheng, Jingzhong Xiao, Ke Zhang:
Vehicular intelligent collaborative intersection driving decision algorithm in Internet of Vehicles. 384-395
- Adam Krzywaniak, Pawel Czarnul, Jerzy Proficz:
Dynamic GPU power capping with online performance tracing for energy efficient GPU computing using DEPO tool. 396-414 - Qing Yang, Xiaoqian Zhu, Xiaoliang Wang, Junjie Fu, Jing Zheng, Yuzhen Liu:
A novel authentication and key agreement scheme for Internet of Vehicles. 415-428
- Chenbin Ma, Yulan Ma, Longsheng Pan, Xuemei Li, Chunyu Yin, Rui Zong, Zhengbo Zhang:
Automatic diagnosis of multi-task in essential tremor: Dynamic handwriting analysis using multi-modal fusion neural network. 429-441
- Shangdong Yang, Huihui Wang, Shaokang Dong, Xingguo Chen:
Leveraging transition exploratory bonus for efficient exploration in Hard-Transiting reinforcement learning problems. 442-453
- Guoqiang Deng, Xuefeng Duan, Min Tang, Yuhao Zhang, Ying Huang:
Non-interactive and privacy-preserving neural network learning using functional encryption. 454-465 - Mengjie Zhang, Renhai Feng, Hehe Zhang, Yishan Su:
A recommendation management defense mechanism based on trust model in underwater acoustic sensor networks. 466-477
- Genaro Sanchez-Gallegos, Dante D. Sánchez-Gallegos, José Luis González Compeán, Hugo G. Reyes-Anastacio, Jesús Carretero:
On the building of efficient self-adaptable health data science services by using dynamic patterns. 478-495
- Yan-Yang Cheng, Zheng-Yi Chai, Ya-Lun Li:
Many-objective many-task optimization using reference-points-based nondominated sorting approach. 496-510 - Pan Yang, Hongbo Li, Jianye Huang, Hao Zhang, Man Ho Allen Au, Qiong Huang:
Secure channel free public key authenticated encryption with multi-keyword search on healthcare systems. 511-520 - Ziyi Lu, Na Yu, Xuehe Wang:
Incentive mechanism and path planning for Unmanned Aerial Vehicle (UAV) hitching over traffic networks. 521-535 - Zhao Tong, Jiake Wang, Jing Mei, Kenli Li, Wenbin Li, Keqin Li:
Multi-type task offloading for wireless Internet of Things by federated deep reinforcement learning. 536-549
- Chen Wang, Tao Chen, Antonio Plaza:
MFE-ResNet: A new extraction framework for land cover characterization in mining areas. 550-562
- SeokHwan Choi, Jin-Myeong Shin, Yoon-Ho Choi:
PIHA: Detection method using perceptual image hashing against query-based adversarial attacks. 563-577
- Rui Chen, Bo Liu, Weiwei Lin, Jianpeng Lin, Huiwen Cheng, Keqin Li:
Power and thermal-aware virtual machine scheduling optimization in cloud data center. 578-589
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.