


default search action
Future Generation Computer Systems, Volume 90
Volume 90, January 2019
- Antonio Celesti
, Maria Fazio
, Antonino Galletta
, Lorenzo Carnevale
, Jiafu Wan
, Massimo Villari:
An approach for the secure management of hybrid cloud-edge environments. 1-19 - Luis M. Vaquero
, Félix Cuadrado
, Yehia Elkhatib
, Jorge Bernal Bernabé
, Satish Narayana Srirama
, Mohamed Faten Zhani
:
Research challenges in nextgen service orchestration. 20-38 - Zhida Yin, Haopeng Chen, Fei Hu:
An advanced decision model enabling two-way initiative offloading in edge computing. 39-48 - Oguz Selvitopi, Gunduz Vehbi Demirci
, Ata Turk, Cevdet Aykanat:
Locality-aware and load-balanced static task scheduling for MapReduce. 49-61 - Ammar Awad Mutlag
, Mohd Khanapi Abd Ghani, Arunkumar N.
, Mazin Abed Mohammed
, Othman Mohd:
Enabling technologies for fog computing in healthcare IoT systems. 62-78 - Daniele D'Agostino
, Lucia Morganti, Elena Corni
, Daniele Cesini
, Ivan Merelli
:
Combining Edge and Cloud computing for low-power, cost-effective metagenomics analysis. 79-85 - Joel E. W. Koh, Yuki Hagiwara
, Shu Lih Oh
, Jen Hong Tan
, Edward J. Ciaccio, Peter H. R. Green, Suzanne K. Lewis, U. Rajendra Acharya
:
Automated diagnosis of celiac disease using DWT and nonlinear features with video capsule endoscopy images. 86-93 - Sajad Homayoun
, Ali Dehghantanha, Marzieh Ahmadzadeh, Sattar Hashemi
, Raouf Khayami
, Kim-Kwang Raymond Choo
, David Ellis Newton:
DRTHIS: Deep ransomware threat hunting and intelligence system at the fog layer. 94-104 - Muhammad Muzammal
, Qiang Qu
, Bulat Nasrulin:
Renovating blockchain with distributed databases: An open source system. 105-117 - Yali Liu, Martianus Frederic Ezerman
, Huaxiong Wang:
Double verification protocol via secret sharing for low-cost RFID tags. 118-128 - Jesús Sánchez-García
, Daniel Gutiérrez-Reina, Sergio L. Toral Marín
:
A distributed PSO-based exploration algorithm for a UAV network assisting a disaster scenario. 129-148 - Md. Golam Rabiul Alam
, Mohammad Mehedi Hassan
, Md. Zia Uddin
, Ahmad Almogren
, Giancarlo Fortino
:
Autonomic computation offloading in mobile edge for IoT applications. 149-157 - Chunhui Piao, Yajuan Shi, Jiaqi Yan, Changyou Zhang, Liping Liu:
Privacy-preserving governmental data publishing: A fog-computing-based differential privacy approach. 158-174 - Chuan Zhang, Liehuang Zhu, Chang Xu
, Kashif Sharif
, Xiaojiang Du, Mohsen Guizani:
LPTD: Achieving lightweight and privacy-preserving truth discovery in CIoT. 175-184 - Thierry Louge
, Mohamed-Hedi Karray, Bernard Archimède, Zakaria Maamar
, Michael Mrissa
:
Semantic Web Services Composition in the astrophysics domain: Issues and solutions. 185-197 - Shijila B., Anju Jose Tom
, Sudhish N. George:
Simultaneous denoising and moving object detection using low rank approximation. 198-210 - Hanqi Zhang, Xi Xiao, Francesco Mercaldo, Shiguang Ni, Fabio Martinelli, Arun Kumar Sangaiah
:
Classification of ransomware families with machine learning based on N-gram of opcodes. 211-221 - Bruno Carpentieri
, Arcangelo Castiglione
, Alfredo De Santis
, Francesco Palmieri
, Raffaele Pizzolante:
One-pass lossless data hiding and compression of remote sensing data. 222-239 - Omid Mirzaei
, José María de Fuentes
, Juan E. Tapiador
, Lorena González-Manzano
:
AndrODet: An adaptive Android obfuscation detector. 240-261 - Magdalena Cantabella
, Raquel Martínez-España
, Belén Ayuso
, Juan Antonio Yáñez, Andrés Muñoz
:
Analysis of student behavior in learning management systems through a Big Data framework. 262-272 - Siva Kumar Gavvala, Chandrashekar Jatoth
, G. R. Gangadharan
, Rajkumar Buyya
:
QoS-aware cloud service composition using eagle strategy. 273-290 - Ertem Esiner, Anwitaman Datta
:
Two-factor authentication for trusted third party free dispersed storage. 291-306 - Irfan Mohiuddin, Ahmad Almogren
, Mohammed Al Qurishi, Mohammad Mehedi Hassan
, Iehab Al Rassan, Giancarlo Fortino
:
Secure distributed adaptive bin packing algorithm for cloud storage. 307-316 - Gangzhao Lu, Weizhe Zhang
, Hui He, Laurence T. Yang:
Performance modeling for MPI applications with low overhead fine-grained profiling. 317-326 - Zahra Momenzadeh, Faramarz Safi Esfahani
:
Workflow scheduling applying adaptable and dynamic fragmentation (WSADF) based on runtime conditions in cloud computing. 327-346 - Ben van Werkhoven:
Kernel Tuner: A search-optimizing GPU code auto-tuner. 347-358 - Anjan Gudigar, U. Raghavendra, Ru San Tan
, Edward J. Ciaccio, U. Rajendra Acharya
:
Application of multiresolution analysis for automated detection of brain abnormality using MR images: A comparative study. 359-367 - Andrei Kelarev
, Xun Yi, Shahriar Badsha
, Xuechao Yang
, Leanne Rylands, Jennifer Seberry:
A multistage protocol for aggregated queries in distributed cloud databases with privacy protection. 368-380 - Aaisha Makkar
, Neeraj Kumar
:
Cognitive spammer: A Framework for PageRank analysis with Split by Over-sampling and Train by Under-fitting. 381-404 - Edward Curry
, Wassim Derguech, Souleiman Hasan
, Christos Kouroupetroglou, Umair ul Hassan:
A Real-time Linked Dataspace for the Internet of Things: Enabling "Pay-As-You-Go" Data Management in Smart Environments. 405-422 - Nenavath Srinivas Naik
, Atul Negi, B. R. Tapas Bapu, R. Anitha:
A data locality based scheduler to enhance MapReduce performance in heterogeneous environments. 423-434 - Xiang Fei
, Nazaraf Shah
, Nandor Verba
, Kuo-Ming Chao, Víctor Sánchez-Anguix, Jacek Lewandowski
, Anne E. James
, Zahid Usman
:
CPS data streams analytics based on machine learning for Cloud and Fog Computing: A survey. 435-450 - Moslem Habibi
, MohammadAmin Fazli, Ali Movaghar:
Efficient distribution of requests in federated cloud computing environments utilizing statistical multiplexing. 451-460 - Hui Sun, Guodong Chen, Jianzhong Huang, Xiao Qin, Weisong Shi
:
CalmWPC: A buffer management to calm down write performance cliff for NAND flash-based storage systems. 461-476 - Pin Wu, Zhihui Lu, Quan Zhou, Zhidan Lei, Xiaoqiang Li
, Meikang Qiu, Patrick C. K. Hung:
Bigdata logs analysis based on seq2seq networks for cognitive Internet of Things. 477-488 - (Withdrawn) A framework for risk assessment, management and evaluation: Economic tool for quantifying risks in supply chain. 489-502
- Warley Junior, Eduardo Oliveira
, Albertinin Santos
, Kelvin Lopes Dias
:
A context-sensitive offloading system using machine-learning classification algorithms for mobile cloud environment. 503-520 - Marcello Cinque
, Domenico Cotroneo, Raffaele Della Corte, Antonio Pecchia:
A framework for on-line timing error detection in software systems. 521-538 - Hassan Ziafat
, Seyed Morteza Babamir
:
A hierarchical structure for optimal resource allocation in geographically distributed clouds. 539-568 - Long Hu, Yiming Miao
, Gaoxiang Wu, Mohammad Mehedi Hassan
, Iztok Humar:
iRobot-Factory: An intelligent robot factory based on cognitive manufacturing and edge computing. 569-577 - Zoltan Zvara, Péter G. N. Szabó, Barnabás Balázs, András Benczúr:
Optimizing distributed data stream processing by tracing. 578-591

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.