![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Future Generation Computer Systems, Volume 158
Volume 158, 2024
- Yongzhi Wang
, Pengfei Gui, Mehdi Sookhak
:
Sort-then-insert: A space efficient and oblivious model aggregation algorithm for top-k sparsification in federated learning. 1-10 - Giorgio Audrito, Roberto Casadei
, Gianluca Torta
:
A general framework and decentralised algorithms for collective computational processes. 11-27 - Seyedsina Nabavirazavi
, Rahim Taheri
, Sundaraja Sitharama Iyengar:
Enhancing federated learning robustness through randomization and mixture. 28-43 - Luigi Crisci
, Lorenzo Carpentieri
, Biagio Cosenza
, Gianmarco Accordi
, Davide Gadioli
, Emanuele Vitali
, Gianluca Palermo
, Andrea Rosario Beccari:
Enabling performance portability on the LiGen drug discovery pipeline. 44-59 - Wei Liang, Jiahong Xiao, Yuxiang Chen, Chaoyi Yang, Kun Xie, Kuan-Ching Li, Beniamino Di Martino:
TMHD: Twin-Bridge Scheduling of Multi-Heterogeneous Dependent Tasks for Edge Computing. 60-72 - Salvador Cuñat Negueroles
, Raúl Reinosa Simón
, Matilde Julián
, Andreu Belsa, Ignacio Lacalle, Raúl S.-Julián, Carlos Enrique Palau:
A Blockchain-based Digital Twin for IoT deployments in logistics and transportation. 73-88 - Alin-Bogdan Popa, Bogdan-Cãlin Ciobanu, Voichita Iancu, Florin Pop
, Pantelimon George Popescu:
SkySwapping: Entanglement resupply by separating quantum swapping and photon exchange. 89-97 - Ignacio Dominguez Martinez-Casanueva
, Luis Bellido
, Daniel González-Sánchez
, Diego R. López
:
CANDIL: A federated data fabric for network analytics. 98-109 - Hongbin Zhuang
, Xiao-Yan Li, Dajin Wang
, Cheng-Kuan Lin, Kun Zhao:
Enabling high fault-tolerant embedding capability of alternating group graphs. 110-121 - Guanjie Lin
, Mingyuan Zeng, Zhiguang Shan, Kaishun Wu, Guan Wang, Kai Lei
:
Blockchain-based cooperative game bilateral matching architecture for shared storage. 122-137 - Yi Wan, Xianzhong Xie, Junfan Chen, Kunpeng Xie
, Dezhi Yi, Ye Lu
, Keke Gai
:
ADS-CNN: Adaptive Dataflow Scheduling for lightweight CNN accelerator on FPGAs. 138-149 - Guan-Ying Huang, Ching-Hung Lee
:
Industrial federated learning algorithm (P-PFedSGD) for tool wear estimation. 150-157 - Nidhi Kumari
, Prasanta K. Jana:
Communication efficient federated learning with data offloading in fog-based IoT environment. 158-166 - Shizhen Bai, Songlin Shi, Chunjia Han
, Mu Yang, Brij B. Gupta, Varsha Arya:
Prioritizing user requirements for digital products using explainable artificial intelligence: A data-driven analysis on video conferencing apps. 167-182 - Eda Sena Erdol
, Beste Ustubioglu
, Hakan Erdöl
, Güzin Ulutas:
Low dimensional secure federated learning framework against poisoning attacks. 183-199 - Xingting Liu
, Siwang Zhou, Jie Luo, Jianping Yu, Wei Zhang:
Region-based compressive distributed storage in Mobile CrowdSensing. 200-209 - WangYang Yu
, Jie Feng, Lu Liu, Xiaojun Zhai, Yumeng Cheng:
Enhancing security in e-business processes: Utilizing dynamic slicing of Colored Petri Nets for logical vulnerability detection. 210-218 - Huiqing Wang, Yongrong Huang, Zhide Chen, Xu Yang
, Xun Yi, Hai Dong
, Xuechao Yang
:
Estimation of realized volatility of cryptocurrencies using CEEMDAN-RF-LSTM. 219-229 - Ya-Lun Li, Yan-Yang Cheng
, Zheng-Yi Chai, Xu Liu
, Haole Hou
, Guoqiang Chen
:
Evolutionary multitasking for multiobjective optimization based on hybrid differential evolution and multiple search strategy. 230-241 - Huiyao Dong
, Igor V. Kotenko
:
Multi-task learning for IoT traffic classification: A comparative analysis of deep autoencoders. 242-254 - Juyan Li
, Mingyan Yan, Jialiang Peng
, Haodong Huang, Ahmed A. Abd El-Latif:
A lattice-based efficient certificateless public key encryption for big data security in clouds. 255-266 - Xiaoling Song
, Guangxia Xu
, Yongfei Huang
, Jingnan Dong
:
DID-HVC-based Web3 healthcare data security and privacy protection scheme. 267-276 - Patient Ntumba, Nikolaos Georgantas, Vassilis Christophides:
Adaptive Scheduling of Continuous Operators for IoT Edge Analytics. 277-293 - Kan Wang
, Peng Yuan, Mian Ahmad Jan, Fazlullah Khan
, Thippa Reddy Gadekallu
, Saru Kumari, Hao Pan, Lei Liu:
Digital twin-assisted service function chaining in multi-domain computing power networks with multi-agent reinforcement learning. 294-307 - Daniela Loreti, Giorgio Visani
:
Parallel approaches for a decision tree-based explainability algorithm. 308-322 - Na Hu, Dafang Zhang, Kun Xie, Wei Liang, Kuan-Ching Li, Albert Y. Zomaya
:
Dynamic multi-scale spatial-temporal graph convolutional network for traffic flow prediction. 323-332 - Aintzane Mosteiro-Sanchez
, Marc Barcelo
, Jasone Astorga
, Aitor Urbieta
:
End to End secure data exchange in value chains with dynamic policy updates. 333-345 - Sandeep Suresh Cranganore
, Vincenzo De Maio
, Ivona Brandic, Ewa Deelman
:
Paving the way to hybrid quantum-classical scientific workflows. 346-366 - Weicheng Xue
, Hongyu Wang
, Christopher J. Roy
:
CPU-GPU heterogeneous code acceleration of a finite volume Computational Fluid Dynamics solver. 367-377 - Ezhilarasie Rajapackiyam
, M. Anusouya Devi, Mandi Sushmanth Reddy, Umamakeswari Arumugam, Subramaniyaswamy Vairavasundaram
, Indragandhi Vairavasundaram, Vishnu Suresh
:
An efficient computation offloading in edge environment using genetic algorithm with directed search techniques for IoT applications. 378-390 - Yi Zhang
, Peiying Zhang
, Mohsen Guizani, Jianyong Zhang
, Jian Wang
, Hailong Zhu, Kostromitin Konstantin Igorevich
, Huiling Shi
:
Blockchain-based secure communication of internet of things in space-air-ground integrated network. 391-399 - Elena Cristina Rodríguez-Garlito
, Abel Paz-Gallardo
, Antonio Plaza
:
Advancements in remote sensing for invasive plant mapping along the Guadiana River: The role of CNN2D. 400-409 - Pushpita Chatterjee
, Debashis Das, Danda B. Rawat:
Digital twin for credit card fraud detection: opportunities, challenges, and fraud detection advancements. 410-426 - Asha S
, D. Shanmugapriya
:
Understanding insiders in cloud adopted organizations: A survey on taxonomies, incident analysis, defensive solutions, challenges. 427-446 - Shijing Hu
, Junxiong Lin, Zhihui Lu, Xin Du, Qiang Duan, Shih-Chia Huang:
CoLLaRS : A cloud-edge-terminal collaborative lifelong learning framework for AIoT. 447-456 - Peng Qin
, Quanyi Hu, Menglin Cui:
Towards machine-readable semantic-based E-business contract representations using Network of Timed Automata (NTA). 457-471 - Zhu Yuan
, Xueqiang Lv
, Yunchao Gong, Ping Xie, Taifu Yuan, Xindong You
:
Cost-effective data classification storage through text seasonal features. 472-487 - Shengbo Chen, Jidong Yuan
, Zhihai Wang, Yongqi Sun
:
Local perturbation-based black-box federated learning attack for time series classification. 488-500 - Pham Khanh Quan
, Taehong Kim
:
Elastic Federated Learning with Kubernetes Vertical Pod Autoscaler for edge computing. 501-515 - Libo Feng
, Fei Qiu, Kai Hu, Bei Yu, Junyu Lin, Shaowen Yao:
CABC: A Cross-Domain Authentication Method Combining Blockchain with Certificateless Signature for IIoT. 516-529 - Huabing Zhang, Liang Li
, Qiong Lu, Yi Yue
, Yakun Huang
, Schahram Dustdar
:
Distributed realtime rendering in decentralized network for mobile web augmented reality. 530-544 - Jiagang Liu
, Yun Mi, Xinyu Zhang, Xiaocui Li
:
Task graph offloading via deep reinforcement learning in mobile edge computing. 545-555 - Chenfeng Wang
, Xiaoguang Gao
, Xinyu Li, Bo Li, Kaifang Wan:
Finding community structure in Bayesian networks by heuristic K-standard deviation method. 556-568 - Retraction notice to "Intelligent Edge Computing Based on Machine Learning for Smart City" [Future Generation Computer Systems 115 (2020) 90-99]. 569
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.