![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Future Generation Computer Systems, Volume 83
Volume 83, June 2018
- Bo Liu, Xiaolin Chang, Zhen Han, Kishor S. Trivedi, Ricardo J. Rodríguez:
Model-based sensitivity analysis of IaaS cloud availability. 1-13 - Anubhav Choudhary, Indrajeet Gupta
, Vishakha Singh
, Prasanta K. Jana:
A GSA based hybrid algorithm for bi-objective workflow scheduling in cloud computing. 14-26 - Longting Zhu, Jigang Wu, Guiyuan Jiang, Long Chen
, Siew-Kei Lam
:
Efficient hybrid multicast approach in wireless data center network. 27-36 - Fei Zhang, Xiaoming Fu
, Ramin Yahyapour
:
LayerMover: Fast virtual machine migration over WAN with three-layer image structure. 37-49 - Alfonso Pérez, Germán Moltó, Miguel Caballer, Amanda Calatrava
:
Serverless computing for container-based architectures. 50-59 - Ruijuan Zheng, Jing Chen, Mingchuan Zhang, Qingtao Wu, Junlong Zhu, Huiqiang Wang:
A collaborative analysis method of user abnormal behavior based on reputation voting in cloud environment. 60-74 - Esmail Asyabi, Mohsen Sharifi
, Azer Bestavros:
ppXen: A hypervisor CPU scheduler for mitigating performance variability in virtualized clouds. 75-84 - Haiyong Xu, Gangyi Jiang, Mei Yu, Ting Luo, Zongju Peng, Feng Shao, Hao Jiang:
3D visual discomfort predictor based on subjective perceived-constraint sparse representation in 3D display system. 85-94 - Haitao Wang, Lihua Song, Guomin Zhang, Hui Chen:
Timetable-aware opportunistic DTN routing for vehicular communications in battlefield environments. 95-103 - Yongjun Li, Zhen Zhang, You Peng, Hongzhi Yin
, Quanqing Xu:
Matching user accounts based on user generated content across social networks. 104-115 - Kostas Kolomvatsos:
An intelligent, uncertainty driven management scheme for software updates in pervasive IoT applications. 116-131 - Jia Jun Tay, M. L. Dennis Wong
, Ming Ming Wong, Cishen Zhang, Ismat Hijazin:
A tree search algorithm for low multiplicative complexity logic design. 132-143 - Bruno Silva, Marco A. S. Netto, Renato Luiz de Freitas Cunha
:
JobPruner: A machine learning assistant for exploring parameter spaces in HPC applications. 144-157 - Ajit Kumar
, K. S. Kuppusamy, Gnanasekaran Aghila:
FAMOUS: Forensic Analysis of MObile devices Using Scoring of application permissions. 158-172 - Li Ma, Wenyin Yang, Yingyu Huo, Yong Zhong:
Research on access control model of social network based on distributed logic. 173-182 - Wei Liu, Jing Wang, Arun Kumar Sangaiah
, Jian Yin:
Dynamic metric embedding model for point-of-interest prediction. 183-192 - Md. Shamsul Huda, Md. Rafiqul Islam
, Jemal H. Abawajy, John Yearwood, Mohammad Mehedi Hassan
, Giancarlo Fortino
:
A hybrid-multi filter-wrapper framework to identify run-time behaviour for fast malware detection. 193-207 - Tian Wang
, Jiyuan Zhou, Minzhe Huang, Md. Zakirul Alam Bhuiyan
, Anfeng Liu, Wenzheng Xu, Mande Xie:
Fog-based storage technology to fight with cyber threat. 208-218 - Keke Gai
, Meikang Qiu
, Meiqin Liu, Zenggang Xiong:
In-memory big data analytics under space constraints using dynamic programming. 219-227 - Satish Anamalamudi, Abdur Rashid Sangi, Mohammed Saeed Alkatheiri
, Ahmedin Mohammed Ahmed:
AODV routing protocol for Cognitive radio access based Internet of Things (IoT). 228-238 - John Panneerselvam
, Lu Liu
, Yao Lu
, Nick Antonopoulos:
An investigation into the impacts of task-level behavioural heterogeneity upon energy efficiency in Cloud datacentres. 239-249 - Wenyin Yang, Guojun Wang, Kim-Kwang Raymond Choo
, Shuhong Chen
:
HEPart: A balanced hypergraph partitioning algorithm for big data applications. 250-268 - Qi Han, Yinghui Zhang, Hui Li
:
Efficient and robust attribute-based encryption supporting access policy hiding in Internet of Things. 269-277 - Elahe Naserian
, Xinheng Wang
, Keshav P. Dahal
, Zhi Wang, Zaijian Wang:
Personalized location prediction for group travellers from spatial-temporal trajectories. 278-292 - Hui Lin, Jia Hu, Chuanfeng Xu, Jianfeng Ma, Mengyang Yu:
DTRM: A new reputation mechanism to enhance data trustworthiness for high-performance cloud computing. 293-302 - Wei Zhang, Xinchang Zhang, Huiling Shi, Longquan Zhou:
An efficient latency monitoring scheme in software defined networks. 303-309 - Lihua Jian, Xiaomin Yang, Zhili Zhou, Kai Zhou, Kai Liu
:
Multi-scale image fusion through rolling guidance filter. 310-325 - Kewei Sha
, Wei Wei, T. Andrew Yang, Zhiwei Wang, Weisong Shi
:
On security challenges and open issues in Internet of Things. 326-337 - Jebaveerasingh Jebadurai
, J. Dinesh Peter
:
Super-resolution of retinal images using multi-kernel SVR for IoT healthcare applications. 338-346 - Dan Liao, Gang Sun
, Guanghua Yang, Victor I. Chang
:
Energy-efficient virtual content distribution network provisioning in cloud-based data centers. 347-357 - Hoang Long Nguyen, Jai E. Jung:
SocioScope: A framework for understanding Internet of Social Knowledge. 358-365 - Enas W. Abdulhay, Arunkumar N.
, Kumaravelu Narasimhan, Elamaran Vellaiappan
, Venkatraman V.:
Gait and tremor investigation using machine learning techniques for the diagnosis of Parkinson disease. 366-373
- Kim-Kwang Raymond Choo
, Yongtang Shi, Zengqiang Chen:
Measurements and security of complex networks and systems: Research advances and challenges. 374-375 - Min Liu, Zhen Xiong, Yue Ma, Peng Zhang, Jianliang Wu, Xingqin Qi
:
DPRank centrality: Finding important vertices based on random walks with a new defined transition matrix. 376-389 - Ryan Ghanbari, Mahdi Jalili
, Xinghuo Yu
:
Correlation of cascade failures and centrality measures in complex networks. 390-400 - Marin Lujak
, Stefano Giordani
:
Centrality measures for evacuation: Finding agile evacuation routes. 401-412 - Sebastian Wandelt
, Xiaoqian Sun, Massimiliano Zanin
, Shlomo Havlin:
QRE: Quick Robustness Estimation for large complex networks. 413-424 - Jinqiang Li, Shuming Zhou, Xuequn Li, Xiaowang Li:
An insertion-deletion-compensation model with Poisson process for scale-free networks. 425-430 - Weifeng Pan
, Bing Li, Jing Liu, Yutao Ma, Bo Hu:
Analyzing the structure of Java software systems by weighted K-core decomposition. 431-444 - Huiqiu Lin, Weihua Yang:
A conditional edge connectivity of double-orbit networks. 445-449 - Yinkui Li, Yongtang Shi, Xiaofeng Gu:
Spectrum bounds for the scattering number, integrity, tenacity of regular graphs. 450-453 - Jingcheng Fu, Jianwen Li
, Yawei Niu, Guanghui Wang, Jianliang Wu:
Multipolarization versus unification in community networks. 454-460 - Jing Jian Li, Bo Ling
:
Symmetric graphs and interconnection networks. 461-467 - Jingjing Wang, Xiaoguang Han
, Zengqiang Chen, Qing Zhang:
Model matching of input/output asynchronous sequential machines based on the semi-tensor product of matrices. 468-475 - Yizhi Ren, Gang Wang, Lanping Yu, Benyun Shi
, Weitong Hu, Zhen Wang:
Rigorous or tolerant: The effect of different reputation attitudes in complex networks. 476-484 - Sadaf Monajemi, Saeid Sanei, Sim Heng Ong:
Information reliability in complex multitask networks. 485-495 - Shah Fahd
, Mehreen Afzal
, Haider Abbas
, Mian Muhammad Waseem Iqbal
, Salman Waheed:
Correlation power analysis of modes of encryption in AES and its countermeasures. 496-509 - Bassam Jamil Mohd
, Thaier Hayajneh
, Khalil Mustafa Ahmad Yousef
, Zaid Abu Khalaf, Md. Zakirul Alam Bhuiyan
:
Hardware design and modeling of lightweight block ciphers for secure communications. 510-521 - Jerline Sheebha Anni
, Arun Kumar Sangaiah
:
Wireless Integrated Sensor Network: Boundary Intellect system for elephant detection via cognitive theory and Fuzzy Cognitive Maps. 522-534 - Gustavo Gonzalez Granadillo, Samuel Dubus, Alexander Motzek, Joaquín García
, Ender Alvarez, Matteo Merialdo, Serge Papillon, Hervé Debar
:
Dynamic risk management response system to handle cyber threats. 535-552
- Santosh Kumar
, Sanjay Kumar Singh
:
Monitoring of pet animal in smart cities using animal biometrics. 553-563 - Junping Xie, Minhua Yang, Jinhai Li
, Zhong Zheng:
Rule acquisition and optimal scale selection in multi-scale formal decision contexts and their applications to smart city. 564-581 - Vangipuram Radhakrishna, Shadi A. Aljawarneh
, Puligadda Veereswara Kumar
, Vinjamuri Janaki
:
A novel fuzzy similarity measure and prevalence estimation approach for similarity profiled temporal association pattern mining. 582-595 - M. Shamim Hossain
, Ghulam Muhammad
, Wadood Abdul
, Biao Song, Brij B. Gupta
:
Cloud-assisted secure video transmission and sharing framework for smart cities. 596-606 - Xiong Li
, Jianwei Niu
, Saru Kumari
, Fan Wu
, Kim-Kwang Raymond Choo
:
A robust biometrics based three-factor authentication scheme for Global Mobility Networks in smart city. 607-618 - Vasileios A. Memos
, Kostas E. Psannis
, Yutaka Ishibashi, Byung-Gyu Kim
, Brij B. Gupta
:
An Efficient Algorithm for Media-based Surveillance System (EAMSuS) in IoT Smart City Framework. 619-628 - Prosanta Gope, Ruhul Amin, SK Hafizul Islam, Neeraj Kumar
, Vinod Kumar Bhalla:
Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment. 629-637 - M. Mazhar Rathore
, Anand Paul
, Awais Ahmad, Naveen K. Chilamkurti
, Won-Hwa Hong, HyunCheol Seo
:
Real-time secure communication for Smart City in high-speed Big Data environment. 638-652 - Logesh Ravi
, V. Subramaniyaswamy
, Vijayakumar Varadharajan
, Xiao-Zhi Gao, V. Indragandhi
:
A hybrid quantum-induced swarm intelligence clustering for the urban trip recommendation in smart city. 653-673
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.