default search action
Future Generation Computer Systems, Volume 89
Volume 89, December 2018
- Joseph Nathanael Witanto, Hyotaek Lim, Mohammed Atiquzzaman:
Smart government framework with geo-crowdsourcing and social media analysis. 1-9 - Zhengchun Liu, Rajkumar Kettimuthu, Ian T. Foster, Peter H. Beckman:
Toward a smart data transfer node. 10-18 - (Withdrawn) Three-way decisions based on neutrosophic sets and AHP-QFD framework for supplier selection problem. 19-30
- Jihe Wang, Danghui Wang, Meikang Qiu, Yao Chen, Bing Guo:
A locality-aware shuffle optimization on fat-tree data centers. 31-43 - Muhammad Ajmal Azad, Samiran Bag, Feng Hao:
PrivBox: Verifiable decentralized reputation system for online marketplaces. 44-57 - Zemin Chao, Shengfei Shi, Hong Gao, Jizhou Luo, Hongzhi Wang:
A gray-box performance model for Apache Spark. 58-67 - Ab Shaqoor Nengroo, K. S. Kuppusamy:
Machine learning based heterogeneous web advertisements detection using a diverse feature set. 68-77 - Weihong Chen, Ji-yao An, Renfa Li, Li Fu, Guoqi Xie, Md. Zakirul Alam Bhuiyan, Keqin Li:
A novel fuzzy deep-learning approach to traffic flow prediction with uncertain spatial-temporal data features. 78-88 - Xiaomin Li, Jiafu Wan:
Proactive caching for edge computing-enabled industrial mobile wireless networks. 89-97 - Valerio Persico, Antonio Pescapè, Antonio Picariello, Giancarlo Sperlì:
Benchmarking big data architectures for social networks data processing using public cloud platforms. 98-109 - Ashok Kumar Das, Sherali Zeadally, Debiao He:
Taxonomy and analysis of security protocols for Internet of Things. 110-125 - Enwen Hu, Zhongliang Deng, Mudan Hu, Lu Yin, Wen Liu:
Cooperative indoor positioning with factor graph based on FIM for wireless sensor network. 126-136 - Mário W. L. Moreira, Joel J. P. C. Rodrigues, Arun Kumar Sangaiah, Jalal Al-Muhtadi, Valery Korotaev:
Semantic interoperability and pattern classification for a service-oriented architecture in pregnancy care. 137-147 - Shehroz Riaz, Maaz Rehan, Tariq Umer, Muhammad Khalil Afzal, Waqas Rehan, Ehsan Ullah Munir, Tassawar Iqbal:
FRP: A novel fast rerouting protocol with multi-link-failure recovery for mission-critical WSN. 148-165 - Azadeh Faroughi, Reza Javidan:
CANF: Clustering and anomaly detection method using nearest and farthest neighbor. 166-177 - Ramadan Gad, Muhammad Talha, Ahmed A. Abd El-Latif, Mohamed Zorkany, Ayman El-Sayed, Nawal A. El-Fishawy, Ghulam Muhammad:
Iris Recognition Using Multi-Algorithmic Approaches for Cognitive Internet of things (CIoT) Framework. 178-191 - Jianhao Ding, Lansheng Han, Dan Li:
An adaptive control momentum method as an optimizer in the cloud. 192-200 - Steven J. Johnston, Philip James Basford, Colin S. Perkins, Herry Herry, Fung Po Tso, Dimitrios Pezaros, Robert D. Mullins, Eiko Yoneki, Simon J. Cox, Jeremy Singer:
Commodity single board computer clusters and their applications. 201-212 - Zehua Guo, Yang Xu, Ruoyan Liu, Andrey Gushchin, Kuan-yin Chen, Anwar Walid, H. Jonathan Chao:
Balancing flow table occupancy and link utilization in software-defined networks. 213-223 - Juan Gómez-Romero, Miguel Molina-Solana, Axel Oehmichen, Yike Guo:
Visualizing large knowledge graphs: A performance analysis. 224-238 - Imran Khan, Habib-ur Rehman, Mohammad Hussein Fayiz Al-khatib, Zahid Anwar, Masoom Alam:
A thin client friendly trusted execution framework for infrastructure-as-a-service clouds. 239-248 - Serpil Aslan, Mehmet Kaya:
Topic recommendation for authors as a link prediction problem. 249-264 - Hanlin Sun, Wei Jie, Jonathan Loo, Lizhe Wang, Sugang Ma, Gang Han, Zhongmin Wang, Wei Xing:
A parallel self-organizing overlapping community detection algorithm based on swarm intelligence for large scale complex networks. 265-285 - Jixian Zhang, Ning Xie, Xuejie Zhang, Weidong Li:
An online auction mechanism for cloud computing resource allocation and pricing based on user evaluation and cost. 286-299 - Deepsubhra Guha Roy, Bipasha Mahato, Debashis De, Rajkumar Buyya:
Application-aware end-to-end delay and message loss estimation in Internet of Things (IoT) - MQTT-SN protocols. 300-316 - Jiatang Cheng, Lei Wang, Qiaoyong Jiang, Zijian Cao, Yan Xiong:
Cuckoo search algorithm with dynamic feedback information. 317-334 - Farid Orujov, Rytis Maskeliunas, Robertas Damasevicius, Wei Wei, Ye Li:
Smartphone based intelligent indoor positioning using fuzzy logic. 335-348 - Ibrahim Ghafir, Mohammad Hammoudeh, Vaclav Prenosil, Liangxiu Han, Robert Hegarty, Khaled M. Rabie, Francisco J. Aparicio-Navarro:
Detection of advanced persistent threat using machine-learning correlation analysis. 349-359 - Shan Huang, Dezun Dong, Wei Bai:
Congestion control in high-speed lossless data center networks: A survey. 360-374 - Xiaolong Xu, Hanzhong Rong, Ella Pereira, Marcello Trovati:
Predatory Search-based Chaos Turbo Particle Swarm Optimisation (PS-CTPSO): A new particle swarm optimisation algorithm for Web service combination problems. 375-386 - Touraj Laleh, Joey Paquet, Serguei A. Mokhov, Yuhong Yan:
Constraint verification failure recovery in web service composition. 387-401 - Xing Liu, Jiqiang Liu, Wei Wang, Sencun Zhu:
Android single sign-on security: Issues, taxonomy and directions. 402-420 - Luca Trani, Malcolm P. Atkinson, Daniele Bailo, Rossana Paciello, Rosa Filgueira:
Establishing Core Concepts for Information-Powered Collaborations. 421-437 - Yongfeng Qian, Jiayi Lu, Yiming Miao, Wen Ji, Renchao Jin, Enmin Song:
AIEM: AI-enabled affective experience management. 438-445 - Szu-Yin Lin, Chi-Chun Chiang, Jung-Bin Li, Zih-Siang Hung, Kuo-Ming Chao:
Dynamic fine-tuning stacked auto-encoder neural network for weather forecast. 446-454 - Dan Liu, Xin Sui, Li Li, Zhengang Jiang, Huan Wang, Zetian Zhang, Yan Zeng:
A cloud service adaptive framework based on reliable resource allocation. 455-463 - Walayat Hussain, Farookh Khadeer Hussain, Morteza Saberi, Omar Khadeer Hussain, Elizabeth Chang:
Comparing time series with machine learning-based prediction approaches for violation management in cloud SLAs. 464-477 - Laizhong Cui, Kai Zhang, Genghui Li, Xizhao Wang, Shu Yang, Zhong Ming, Joshua Zhexue Huang, Nan Lu:
A smart artificial bee colony algorithm with distance-fitness-based neighbor search and its application. 478-493 - Yifei Zhang, Hongming Cai, Boyi Xu, Thanos Vasilakos, Chengxi Huang:
Data driven business rule generation based on fog computing. 494-505 - Shudong Liu, Lei Wang:
A self-adaptive point-of-interest recommendation algorithm based on a multi-order Markov model. 506-514 - Chen Xu, Peilong Li, Yan Luo:
A programmable policy engine to facilitate time-efficient science DMZ management. 515-524 - Jemal H. Abawajy, Md. Shamsul Huda, Shaila Sharmeen, Mohammad Mehedi Hassan, Ahmad Almogren:
Identifying cyber threats to mobile-IoT applications in edge computing paradigm. 525-538 - Mazin Abed Mohammed, Mohd Khanapi Abd Ghani, Arunkumar N., Raed Ibraheem Hamed, Mohamad Khir Abdullah, Burhanuddin Mohd Aboobaider:
A real time computer aided object detection of nasopharyngeal carcinoma using genetic algorithm and artificial neural network based on Haar feature fear. 539-547 - Danilo Ardagna, Cinzia Cappiello, Walter Samá, Monica Vitali:
Context-aware data quality assessment for big data. 548-562 - Shilpi Bhattacharyya, Dimitrios Katramatos, Shinjae Yoo:
Why wait? Let us start computing while the data is still on the wire. 563-574 - Hamza Turabieh, Amer O. Abu Salem, Noor Abu-El-Rub:
Dynamic L-RNN recovery of missing data in IoMT applications. 575-583 - Vitor A. C. Horta, Victor Ströele, Regina Braga, José Maria N. David, Fernanda Campos:
Analyzing scientific context of researchers and communities by using complex network and semantic technologies. 584-605 - Guanglu Sun, Jiabin Li, Jian Dai, Zhichao Song, Fei Lang:
Feature selection for IoT based on maximal information coefficient. 606-616 - Leila Eskandari, Jason Mair, Zhiyi Huang, David M. Eyers:
T3-Scheduler: A topology and Traffic aware two-level Scheduler for stream processing systems in a heterogeneous cluster. 617-632 - Richard Olaniyan, Olamilekan Fadahunsi, Muthucumaru Maheswaran, Mohamed Faten Zhani:
Opportunistic Edge Computing: Concepts, opportunities and research challenges. 633-645 - Davide Carneiro, Ana P. Pinheiro, Marta Pereira, Inês Ferreira, Miguel Domingues, Paulo Novais:
Using behavioral features in tablet-based auditory emotion recognition studies. 646-658 - Long Chen, Xiaoping Li, Rubén Ruiz:
Idle block based methods for cloud workflow scheduling with preemptive and non-preemptive tasks. 659-669 - Tao Huang, Boyi Xu, Hongming Cai, Jiawei Du, Kuo-Ming Chao, Chengxi Huang:
A fog computing based concept drift adaptive process mining framework for mobile APPs. 670-684 - Kshira Sagar Sahoo, Deepak Puthal, Mayank Tiwary, Joel J. P. C. Rodrigues, Bibhudatta Sahoo, Ratnakar Dash:
An early detection of low rate DDoS attack to SDN based data center networks using information distance metrics. 685-697 - Yongli Cheng, Fang Wang, Hong Jiang, Yu Hua, Dan Feng, Yunxiang Wu, Tingwei Zhu, Wenzhong Guo:
A highly cost-effective task scheduling strategy for very large graph computation. 698-712 - Hua Guo, Yandong Zheng, Xiong Li, Zhoujun Li, Chunhe Xia:
Self-healing group key distribution protocol in wireless sensor networks for secure IoT communications. 713-721 - Fangxiaoqi Yu, Haopeng Chen, Jinqing Xu:
DMPO: Dynamic mobility-aware partial offloading in mobile edge computing. 722-735 - Fatma Alali, Nathan Hanford, Eric Pouyoul, Rajkumar Kettimuthu, Mariam Kiran, Ben Mack-Crane, Brian Tierney, Yatish Kumar, Dipak Ghosal:
Calibers: A bandwidth calendaring paradigm for science workflows. 736-745 - Zhaofeng Ma, Ming Jiang, Hongmin Gao, Zhen Wang:
Blockchain for digital rights management. 746-764 - Babak Ravandi, Ioannis Papapanagiotou:
A self-organized resource provisioning for cloud block storage. 765-776 - Sumith N., Annappa B., Swapan Bhattacharya:
Influence maximization in large social networks: Heuristics, models and parameters. 777-790 - Angelo Furfaro, Antonio Piccolo, Andrea Parise, Luciano Argento, Domenico Saccà:
A Cloud-based platform for the emulation of complex cybersecurity scenarios. 791-803 - Giancarlo Fortino, Fabrizio Messina, Domenico Rosaci, Giuseppe M. L. Sarnè:
Using trust and local reputation for group formation in the Cloud of Things. 804-815
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.