


default search action
Future Generation Computer Systems, Volume 86
Volume 86, September 2018
- Yunfei Meng, Zhiqiu Huang, Yu Zhou, Changbo Ke:
Privacy-aware cloud service selection approach based on P-Spec policy models and privacy sensitivities. 1-11 - Mohamed Abdel-Basset, Mai Mohamed, Victor I. Chang
:
NMCDA: A framework for evaluating cloud computing services. 12-29 - Gregory Levitin, Liudong Xing, Barry W. Johnson, Yuanshun Dai:
Optimization of dynamic spot-checking for collusion tolerance in grid computing. 30-38 - Guiyan Liu, Songtao Guo, Quanjun Zhao, Yuanyuan Yang
:
Tomogravity space based traffic matrix estimation in data center networks. 39-50 - Zhuowei Wang, Wuqing Zhao, Hao Wang
, Lianglun Cheng:
Three-level performance optimization for heterogeneous systems based on software prefetching under power constraints. 51-58 - Sergio Ramírez-Gallego
, Salvador García
, Francisco Herrera
:
Online entropy-based discretization for data streaming classification. 59-70 - Orcan Alpar
:
Biometric touchstroke authentication by fuzzy proximity of touch locations. 71-80 - Eiman Iranpour, Saeed Sharifian
:
A distributed load balancing and admission control algorithm based on Fuzzy type-2 and Game theory for large-scale SaaS cloud architectures. 81-98 - Léo Grange, Georges Da Costa, Patricia Stolf
:
Green IT scheduling for data center powered with renewable energy. 99-120 - Enan A. Khalil
, Suat Ozdemir
, Suleyman Tosun:
Evolutionary task allocation in Internet of Things-based application domains. 121-133 - Ehsan Ataie
, Reza Entezari-Maleki
, Sayed Ehsan Etesami
, Bernhard Egger
, Danilo Ardagna
, Ali Movaghar:
Power-aware performance analysis of self-adaptive resource management in IaaS clouds. 134-144 - Ihtisham Ali, Susmit Bagchi
:
Designing hybrid graph model and algorithmic analysis of workflow decomposition in mobile distributed systems. 145-161 - Karl Mason
, Martin Duggan, Enda Barrett, Jim Duggan, Enda Howley
:
Predicting host CPU utilization in the cloud using evolutionary neural networks. 162-173 - Xingpo Ma, Junbin Liang, Jianxin Wang, Sheng Wen
, Tian Wang
, Yin Li
, Wenpeng Ma, Chuanda Qi:
Secure fine-grained spatio-temporal Top-k queries in TMWSNs. 174-184 - Asmat Ullah Khan, Susmit Bagchi
:
Software architecture and algorithm for reliable RPC for geo-distributed mobile computing systems. 185-198 - Eva Kern
, Lorenz M. Hilty
, Achim Guldner
, Yuliyan V. Maksimov
, Andreas Filler
, Jens Gröger, Stefan Naumann:
Sustainable software products - Towards assessment criteria for resource and energy efficiency. 199-210 - Mateja Dumic, Dominik Sisejkovic
, Rebeka Coric
, Domagoj Jakobovic
:
Evolving priority rules for resource constrained project scheduling problem with genetic programming. 211-221 - Yongjian Yang, Wenbin Liu, En Wang
, Hengzhi Wang:
Beaconing Control strategy based on Game Theory in mobile crowdsensing. 222-233 - Nivethitha Somu
, M. R. Gauthama Raman
, Kirthivasan Kannan, V. S. Shankar Sriram
:
A trust centric optimal service ranking approach for cloud service selection. 234-252 - Tassos Dimitriou, Naser Al-Ibrahim:
"I wasn't there" - Deniable, privacy-aware scheme for decentralized Location-based Services. 253-265 - Shubham Goel
, Ravinder Kumar
:
Brownian Motus and Clustered Binary Insertion Sort methods: An efficient progress over traditional methods. 266-280 - Suchismita Satpathy, Bibhudatta Sahoo
, Ashok Kumar Turuk:
Sensing and Actuation as a Service Delivery Model in Cloud Edge centric Internet of Things. 281-296 - Harmanjeet Kaur, Neeraj Kumar
, Shalini Batra:
An efficient multi-party scheme for privacy preserving collaborative filtering for healthcare recommender system. 297-307 - Orcun Yildiz, Amelie Chi Zhou, Shadi Ibrahim:
Improving the Effectiveness of Burst Buffers for Big Data Processing in HPC Systems with Eley. 308-318 - Roberto Boselli
, Mirko Cesarini
, Fabio Mercorio
, Mario Mezzanzanica
:
Classifying online Job Advertisements through Machine Learning. 319-328 - Long Hu, Jun Yang, Min Chen
, Yongfeng Qian
, Joel J. P. C. Rodrigues
:
SCAI-SVSC: Smart clothing for effective interaction with a sustainable vital sign collection. 329-338 - Zakarea Alshara
, Frederico Alvares, Hugo Bruneliere
, Jonathan Lejeune, Charles Prud'homme
, Thomas Ledoux
:
CoMe4ACloud: An end-to-end framework for autonomic Cloud systems. 339-354 - Jianliang Wei, Fei Meng, Arunkumar N.
:
A personalized authoritative user-based recommendation for social tagging. 355-361 - Ke Zhou, Jiangfeng Zeng, Yu Liu
, Fuhao Zou:
Deep sentiment hashing for text retrieval in social CIoT. 362-371 - Lirong Qiu, Feng Cai, Guixian Xu:
Quantum digital signature for the access control of sensitive data in the big data era. 372-379 - Ali Hassan Sodhro
, Sandeep Pirbhulal
, Arun Kumar Sangaiah
:
Convergence of IoT and product lifecycle management in medical health care. 380-391 - Kang Yang, Rui Wang, Yu Jiang, Houbing Song
, Chenxia Luo, Yong Guan, Xiaojuan Li, Zhiping Shi
:
Sensor attack detection using history based pairwise inconsistency. 392-402 - Min Chen
, Wei Li, Yixue Hao
, Yongfeng Qian
, Iztok Humar:
Edge cognitive computing based smart healthcare system. 403-411 - Flora Amato
, Aniello Castiglione
, Fabio Mercorio
, Mario Mezzanzanica
, Vincenzo Moscato, Antonio Picariello, Giancarlo Sperlì:
Multimedia story creation on social networks. 412-420 - Rashmika Nawaratne, Damminda Alahakoon, Daswin De Silva, Prem Chhetri, Naveen K. Chilamkurti
:
Self-evolving intelligent algorithms for facilitating data interoperability in IoT environments. 421-432 - Gunasekaran Manogaran, Daphne Lopez, Naveen K. Chilamkurti
:
In-Mapper combiner based MapReduce algorithm for processing of big climate data. 433-445 - Giovanna Sannino, Giuseppe De Pietro
:
A deep learning approach for ECG-based heartbeat classification for arrhythmia detection. 446-455 - Zhijie Han
, Yaqiong Li
, Jie Li:
A novel routing algorithm for IoT cloud based on hash offset tree. 456-463 - Rongbin Xu, Yeguo Wang, Haoyu Luo, Futian Wang, Ying Xie, Xiao Liu
, Yun Yang:
A sufficient and necessary temporal violation handling point selection strategy in cloud workflow. 464-479 - Ehab Nabiel Alkhanak
, Sai Peck Lee:
A hyper-heuristic cost optimisation approach for Scientific Workflow Scheduling in cloud computing. 480-506 - Lu Zhou
, Chunhua Su, Yamin Wen, Weijie Li
, Zheng Gong:
Towards practical white-box lightweight block cipher implementations for IoTs. 507-514 - Wanqing Wu, Sandeep Pirbhulal
, Arun Kumar Sangaiah
, Subhas Chandra Mukhopadhyay
, Guanglin Li
:
Optimization of signal quality over comfortability of textile electrodes for ECG monitoring in fog computing based medical applications. 515-526 - Priyan Malarvizhi Kumar
, S. Lokesh
, R. Varatharajan, Gokulnath Chandra Babu
, Parthasarathy Panchatcharam
:
Cloud and IoT based disease prediction and diagnosis system for healthcare using Fuzzy neural classifier. 527-534 - Jordi Ros-Giralt
, Alan Commike, Peter Cullen, Richard Lethin:
Algorithms and data structures to accelerate network analysis. 535-545 - Wissem Inoubli
, Sabeur Aridhi, Haithem Mezni
, Mondher Maddouri, Engelbert Mephu Nguifo
:
An experimental survey on big data frameworks. 546-564 - Jorge Veiga
, Jonatan Enes, Roberto R. Expósito
, Juan Touriño
:
BDEv 3.0: Energy efficiency and microarchitectural characterization of Big Data processing frameworks. 565-581 - Shao-Jun Yang, Xinyi Huang:
Certain types of M-fuzzifying matroids: A fundamental look at the security protocols in RFID and IoT. 582-590 - Ying Ji, Meng Li, Shaojian Qu:
Multi-objective linear programming games and applications in supply chain competition. 591-597 - Shaofei Wu, Mingqing Wang, Yuntao Zou
:
Research on internet information mining based on agent algorithm. 598-602 - Shihong Yao, Zhigao Zheng
, Tao Wang, Qingfeng Guan
:
An efficient joint compression and sparsity estimation matching pursuit algorithm for artificial intelligence application. 603-613 - (Withdrawn) Internet of Things (IoT) and its impact on supply chain: A framework for building smart, secure and efficient systems. 614-628
- Zeinab Shmeis
, Mohamad Jaber:
Fine and coarse grained composition and adaptation of spark applications. 629-640 - (Withdrawn) Research on agricultural supply chain system with double chain architecture based on blockchain technology. 641-649
- Pradip Kumar Sharma
, Jong Hyuk Park:
Blockchain based hybrid network architecture for the smart city. 650-655 - Wenbing Chang, Zhenzhong Xu
, Shenghan Zhou, Wen Cao
:
Research on detection methods based on Doc2vec abnormal comments. 656-662 - Shi-Zhuan Han, Wen-Tsao Pan, Ying-Ying Zhou, Zong-Li Liu:
Construct the prediction model for China agricultural output value based on the optimization neural network of fruit fly optimization algorithm. 663-669 - Bangyong Sun
, Nianzeng Yuan, Congjun Cao, Jon Yngve Hardeberg:
Design of four-band multispectral imaging system with one single-sensor. 670-679 - Bo Yang
, Zhiyong Li
, Shilong Jiang, Keqin Li:
Envy-free auction mechanism for VM pricing and allocation in clouds. 680-693 - Song Wu, Chao Mei
, Hai Jin, Duoqiang Wang:
Android Unikernel: Gearing mobile code offloading towards edge computing. 694-703 - Haibo Yi, Zhe Nie:
Side-channel security analysis of UOV signature for cloud-based Internet of Things. 704-708 - Dingju Zhu:
IOT and big data based cooperative logistical delivery scheduling method and cloud robot system. 709-715 - Pyoung Won Kim
:
Real-time bio-signal-processing of students based on an Intelligent algorithm for Internet of Things to assess engagement levels in a classroom. 716-722
- Muhammad Younas, Irfan Awan, George Ghinea
, Tor-Morten Grønli
:
Editorial: New developments in cloud and IoT. 723-725 - Kirill Belyaev, Indrakshi Ray:
Component-oriented access control - Application servers meet tuple spaces for the masses. 726-739 - Bogdan-Cosmin Chifor, Ion Bica, Victor Valeriu Patriciu, Florin Pop:
A security authorization scheme for smart home Internet of Things devices. 740-749 - Chahrazed Labba, Narjès Bellamine Ben Saoud
, Julie Dugdale:
A predictive approach for the efficient distribution of agent-based systems on a hybrid-cloud. 750-764 - Mahmoud Al-Ayyoub, Muneera Al-Quraan, Yaser Jararweh, Elhadj Benkhelifa
, Salim Hariri:
Resilient service provisioning in cloud based data centers. 765-774 - Bo Yuan
, Lu Liu
, Nick Antonopoulos:
Efficient service discovery in decentralized online social networks. 775-791 - Mário Antunes
, Diogo Gomes
, Rui L. Aguiar
:
Towards IoT data classification through semantic features. 792-798 - Khawar Hasham, Kamran Munir
, Richard McClatchey:
Cloud infrastructure provenance collection and management to reproduce scientific workflows execution. 799-820 - Ragib Hasan
, Md. Mahmud Hossain
, Rasib Khan:
Aura: An incentive-driven ad-hoc IoT cloud framework for proximal mobile computation offloading. 821-835 - Zhou Zhou
, Jemal H. Abawajy, Morshed U. Chowdhury
, Zhigang Hu, Keqin Li, Hongbing Cheng, Abdulhameed A. Al Elaiwi, Fangmin Li
:
Minimizing SLA violation and power consumption in Cloud data centers using adaptive energy-aware algorithms. 836-850
- Brij B. Gupta
, Arun Kumar Sangaiah
, Nadia Nedjah
, Shingo Yamaguchi, Zhiyong Zhang, Michael Sheng
:
Recent research in computational intelligence paradigms into security and privacy for online social networks (OSNs). 851-854 - M. Shamim Hossain
, Mohammed F. Alhamid, Ghulam Muhammad
:
Collaborative analysis model for trending images on social networks. 855-862 - Xi Xiao, Chunhui Chen, Arun Kumar Sangaiah
, Guangwu Hu
, Runguo Ye, Yong Jiang:
CenLocShare: A centralized privacy-preserving location-sharing system for mobile online social networks. 863-872 - Yi Liu
, Hao Wang
, Tong Li, Ping Li, Jie Ling
:
Attribute-based handshake protocol for mobile healthcare social networks. 873-880 - Shaobo Zhang
, Kim-Kwang Raymond Choo
, Qin Liu, Guojun Wang:
Enhancing privacy through uniform grid and caching in location-based services. 881-892 - Androniki Sapountzi
, Kostas E. Psannis
:
Social networking data analysis tools & challenges. 893-913 - Zhiyong Zhang
, Brij B. Gupta
:
Social media security and trustworthiness: Overview and new direction. 914-925 - Amit Kumar Singh
, Basant Kumar, Sanjay Kumar Singh
, S. P. Ghrera, Anand Mohan:
Multiple watermarking technique for securing online social network contents using Back Propagation Neural Network. 926-939 - Weiwei Lin, Wentai Wu
, Haoyu Wang, James Z. Wang, Ching-Hsien Hsu:
Experimental and quantitative analysis of server power model for cloud data centers. 940-950 - Khan Muhammad
, Muhammad Sajjad, Irfan Mehmood
, Seungmin Rho, Sung Wook Baik
:
Image steganography using uncorrelated color space and its application for security of visual contents in online social networks. 951-960
- Florin Pop, Radu Prodan, Gabriel Antoniu:
RM-BDP: Resource management for Big Data platforms. 961-963 - Yuxia Cheng, Yang Xiang, Wenzhi Chen, Houcine Hassan, Abdulhameed Alelaiwi:
Efficient cache resource aggregation using adaptive multi-level exclusive caching policies. 964-974 - Massimo Ficco, Roberto Pietrantuono
, Stefano Russo
:
Aging-related performance anomalies in the apache storm stream processing system. 975-994 - Bin Wang, Chao Chen, Ligang He, Bo Gao, Jiadong Ren, Zhangjie Fu, Songling Fu, Yongjian Hu, Chang-Tsun Li
:
Modelling and developing conflict-aware scheduling on large-scale data centres. 995-1007 - Chandrashekar Jatoth
, G. R. Gangadharan
, Ugo Fiore
, Rajkumar Buyya
:
QoS-aware Big service composition using MapReduce based evolutionary algorithm with guided mutation. 1008-1018 - Dominik Meiländer, Sergei Gorlatch
:
Modeling the Scalability of Real-Time Online Interactive Applications on Clouds. 1019-1031 - Marco Gribaudo
, Mauro Iacono
, Mariam Kiran:
A performance modeling framework for lambda architecture based applications. 1032-1041 - Qublai Khan Ali Mirza
, Irfan Awan, Muhammad Younas:
CloudIntell: An intelligent malware detection system. 1042-1053 - Guipeng Liu, Xiaomin Zhu, Ji Wang, Deke Guo, Weidong Bao, Hui Guo:
SP-Partitioner: A novel partition method to handle intermediate data skew in spark streaming. 1054-1063 - Wanchun Dou, Xiaolong Xu
, Xiang Liu, Laurence T. Yang, Yiping Wen:
A Resource Co-Allocation method for load-balance scheduling over big data platforms. 1064-1075 - Álvaro Brandón Hernández, María S. Pérez, Smrati Gupta, Victor Muntés-Mulero
:
Using machine learning to optimize parallelism in big data applications. 1076-1092 - Pierre Matri, María S. Pérez, Alexandru Costan
, Luc Bougé
, Gabriel Antoniu:
Keeping up with storage: Decentralized, write-enabled dynamic geo-replication. 1093-1105 - Daniel Grzonka
, Agnieszka Jakobik
, Joanna Kolodziej, Sabri Pllana
:
Using a multi-agent system and artificial intelligence for monitoring and improving the cloud performance and security. 1106-1117 - Ta Yuan Hsu, Ajay D. Kshemkalyani
, Min Shen:
Causal consistency algorithms for partially replicated and fully replicated systems. 1118-1133 - Aniello Castiglione
, Francesco Colace
, Vincenzo Moscato, Francesco Palmieri:
CHIS: A big data infrastructure to manage digital cultural items. 1134-1145 - Suzhen Wu, Weidong Zhu
, Bo Mao, Kuan-Ching Li
:
PP: Popularity-based Proactive Data Recovery for HDFS RAID systems. 1146-1153 - Jining Yan
, Yan Ma, Lizhe Wang
, Kim-Kwang Raymond Choo
, Wei Jie
:
A cloud-based remote sensing data production system. 1154-1166
- Joarder Kamruzzaman
, Guojun Wang, Gour C. Karmakar, Iftekhar Ahmad
, Md. Zakirul Alam Bhuiyan
:
Acoustic sensor networks in the Internet of Things applications. 1167-1169 - Allaa R. Hilal
, Aya Sayedelahl, Arash Tabibiazar, Mohamed S. Kamel, Otman A. Basir
:
A distributed sensor management for large-scale IoT indoor acoustic surveillance. 1170-1184 - Yankun Chen
, Fei Ji, Quansheng Guan, Yide Wang, Fangjiong Chen, Hua Yu:
Adaptive RTO for handshaking-based MAC protocols in underwater acoustic networks. 1185-1192 - Gour C. Karmakar, Joarder Kamruzzaman
, Nusrat Nowsheen:
An efficient data delivery mechanism for AUV-based Ad hoc UASNs. 1193-1208 - Md. Abdul Hamid
, Mohammad Abdullah-Al-Wadud
, Mohammad Mehedi Hassan
, Ahmad Almogren
, Atif Alamri, Abu Raihan M. Kamal, Md. Mamun-Or-Rashid:
A key distribution scheme for secure communication in acoustic sensor networks. 1209-1217 - Kun Tang, Ronghua Shi, Jian Dong
:
Throughput analysis of cognitive wireless acoustic sensor networks with energy harvesting. 1218-1227 - Yingxue Wang, Yanan Chen
, Md. Zakirul Alam Bhuiyan
, Yu Han, Shenghui Zhao, Jianxin Li:
Gait-based Human identification using acoustic sensor and deep neural network. 1228-1237
- Zhihan Lv
, Rahat Iqbal
, Victor I. Chang
:
Big data analytics for sustainability. 1238-1241 - Yixiong Feng
, Zhifeng Zhang, Guangdong Tian, Zhihan Lv
, Shaoxu Tian, Hongfei Jia:
Data-driven accurate design of variable blank holder force in sheet forming under interval uncertainty using sequential approximate multi-objective optimization. 1242-1250 - Yong Peng
, Xinghua Wang, Shuangling Peng, Helai Huang, Guangdong Tian, Hongfei Jia:
Investigation on the injuries of drivers and copilots in rear-end crashes between trucks based on real world accident data in China. 1251-1258 - Bin Cao
, Jianwei Zhao
, Xin Liu, Xinyuan Kang, Shan Yang, Kai Kang, Ming Yu:
Multiobjective recommendation optimization via utilizing distributed parallel algorithm. 1259-1268 - Xu Chen
, Jie Zhang, Zheng Xu, Jin Liu:
HIB-tree: An efficient index method for the big data analytics of large-scale human activity trajectories. 1269-1278 - Gagangeet Singh Aujla
, Neeraj Kumar
:
MEnSuS: An efficient scheme for energy management with sustainability of cloud data centers in edge-cloud environment. 1279-1300 - Abdul Wahid
, Munam Ali Shah
, Faisal Fayyaz Qureshi, Hafsa Maryam, Rahat Iqbal
, Victor I. Chang
:
Big data analytics for mitigating broadcast storm in Vehicular Content Centric networks. 1301-1320 - Anna Kobusinska
, Kamil Pawluczuk, Jerzy Brzezinski
:
Big Data fingerprinting information analytics for sustainability. 1321-1337 - Jiwan Lee, Bonghee Hong, Sunghoon Jung, Victor Chang
:
Clustering learning model of CCTV image pattern for producing road hazard meteorological information. 1338-1350 - Wentai Wu
, Weiwei Lin, Ching-Hsien Hsu, Ligang He:
Energy-efficient hadoop for big data analytics and computing: A systematic review and research insights. 1351-1367
- Gang Sun, Victor I. Chang
, Steven Guan, Muthu Ramachandran, Jin Li, Dan Liao:
Big Data and Internet of Things - Fusion for different services and its impacts. 1368-1370 - Ling Tian, Hongyu Wang, Yimin Zhou
, Chengzong Peng:
Video big data in smart city: Background construction and optimization for surveillance video processing. 1371-1382 - Mohamed Elhoseny
, Ahmed Abdelaziz
, Ahmed S. Salama
, Alaa Mohamed Riad, Khan Muhammad
, Arun Kumar Sangaiah
:
A hybrid model of Internet of Things and cloud computing to manage big data in health services applications. 1383-1394 - Rui Tang, Simon Fong
:
Clustering big IoT data by metaheuristic optimized mini-batch and parallel partition-based DGC in Hadoop. 1395-1412 - Xiaohong Huang, Kun Xie
, Supeng Leng, Tingting Yuan
, Maode Ma:
Improving Quality of Experience in multimedia Internet of Things leveraging machine learning on big data. 1413-1423 - Chien-Ting Kuo, Po-Wen Chi, Victor Chang
, Chin-Laung Lei:
SFaaS: Keeping an eye on IoT fusion environment with security fusion as a service. 1424-1436 - Yang Yang, Xianghan Zheng
, Wenzhong Guo, Ximeng Liu, Victor I. Chang
:
Privacy-preserving fusion of IoT and big data for e-health. 1437-1455
- Sancheng Peng, Shui Yu
, Peter Mueller
:
Social networking big data: Opportunities, solutions, and challenges. 1456-1458 - Laizhong Cui
, Wenyuan Huang, Qiao Yan, F. Richard Yu
, Zhenkun Wen, Nan Lu:
A novel context-aware recommendation algorithm with two-level SVD in social networks. 1459-1470 - Qingjuan Zhao, Jianwei Niu
, Huan Chen, Lei Wang, Mohammed Atiquzzaman
:
An indicative opinion generation model for short texts on social networks. 1471-1480 - Kaili Mao, Jianwei Niu
, Huan Chen, Lei Wang, Mohammed Atiquzzaman
:
Mining of marital distress from microblogging social networks: A case study on Sina Weibo. 1481-1490 - Feng Wang
, Wenjun Jiang, Xiaolin Li, Guojun Wang:
Maximizing positive influence spread in online social networks via fluid dynamics. 1491-1502 - Hao Peng
, Mengjiao Bao, Jianxin Li, Md. Zakirul Alam Bhuiyan
, Yaopeng Liu, Yu He, Erica Yang:
Incremental term representation learning for social network analysis. 1503-1512 - Kai Dong
, Taolin Guo
, Haibo Ye, Xuansong Li, Zhen Ling:
On the limitations of existing notions of location privacy. 1513-1522 - Qinlong Huang, Yixian Yang, Jingyi Fu:
PRECISE: Identity-based private data sharing with conditional proxy re-encryption in online social networks. 1523-1533 - Qinlong Huang, Yixian Yang, Mansuo Shen:
Corrigendum to "Secure and efficient data collaboration with hierarchical attribute-based encryption in cloud computing" [Future Gener. Comput. Syst. 72 (2017) 239-249]. 1534

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.