


default search action
Future Generation Computer Systems, Volume 97
Volume 97, August 2019
- Zhuo Liu, Chenhui Yao, Hang Yu, Tai-Hua Wu:
Deep reinforcement learning with its application for lung cancer detection in medical Internet of Things. 1-9
- Mohamed Mohamed
, Robert Engel, Amit Warke, Shay Berman, Heiko Ludwig:
Extensible persistence as a service for containers. 10-20
- Yibing Zhao, Feng Ding, Jining Li, Lie Guo
, Wanfeng Qi:
The intelligent obstacle sensing and recognizing method based on D-S evidence theory for UGV. 21-29
- Dominik Ziemke
, Simon Metzler, Kai Nagel
:
Bicycle traffic and its interaction with motorized traffic in an agent-based transport simulation framework. 30-40
- Yuhan Su, Xiaozhen Lu
, Lianfen Huang, Xiaojiang Du, Mohsen Guizani:
Tac-U: A traffic balancing scheme over licensed and unlicensed bands for Tactile Internet. 41-49
- Juan Luo
, Luxiu Yin, Jinyu Hu, Chun Wang, Xuan Liu, Xin Fan, Haibo Luo:
Container-based fog computing architecture and energy-balancing scheduling algorithm for energy IoT. 50-60
- Feng Lu, Ziqian Shi, Lin Gu, Hai Jin, Laurence Tianruo Yang
:
An adaptive multi-level caching strategy for Distributed Database System. 61-68
- Aicha Ben Jrad, Sami Bhiri, Samir Tata:
STRATFram: A framework for describing and evaluating elasticity strategies for service-based business processes in the cloud. 69-89
- Zhaoxi Hong
, Yixiong Feng, Zhiwu Li, Yong Wang, Hao Zheng, Zhongkai Li, Jianrong Tan:
An integrated approach for multi-objective optimisation and MCDM of energy internet under uncertainty. 90-104
- Toni Perkovic
, Mario Cagalj, Tonko Kovacevic:
LISA: Visible light based initialization and SMS based authentication of constrained IoT devices. 105-118
- Mahbuba Afrin
, Jiong Jin
, Ashfaqur Rahman
, Yu-Chu Tian
, Ambarish Kulkarni
:
Multi-objective resource allocation for Edge Cloud based robotic workflow in smart factory. 119-130
- Carlos Guerrero
, Isaac Lera, Carlos Juiz:
Evaluation and efficiency comparison of evolutionary algorithms for service placement optimization in fog architectures. 131-144
- Mauro A. A. da Cruz, Joel J. P. C. Rodrigues
, Pascal Lorenz
, Petar Solic
, Jalal Al-Muhtadi, Victor Hugo C. de Albuquerque
:
A proposal for bridging application layer protocols to HTTP on IoT solutions. 145-152
- Tao Hu
, Chunxia Xiao:
Data-driven main color map feature learning, design and simulation for smart ethnic cloth. 153-164
- Arsla Khan, Saud Khan
, Sobia Baig
, Hafiz Muhammad Asif
, Soo Young Shin
:
Wavelet OFDM with Overlap FDE for non-Gaussian channels in precoded NOMA based systems. 165-179
- Pedro Pedrosa Rebouças Filho
, Samuel Luz Gomes, Navar de Medeiros Mendonça e Nascimento
, Cláudio Marques de Sá Medeiros, Fatma Outay
, Victor Hugo C. de Albuquerque
:
Energy production predication via Internet of Thing based machine learning system. 180-193
- Dawei Sun, Shang Gao
, Xunyun Liu, Fengyun Li, Xinqi Zheng, Rajkumar Buyya
:
State and runtime-aware scheduling in elastic stream computing systems. 194-209
- Abir Mhenni
, Estelle Cherrier, Christophe Rosenberger
, Najoua Essoukri Ben Amara:
Analysis of Doddington zoo classification for user dependent template update: Application to keystroke dynamics recognition. 210-218
- Wazir Zada Khan
, Ejaz Ahmed, Saqib Hakak
, Ibrar Yaqoob
, Arif Ahmed
:
Edge computing: A survey. 219-235
- Marco de Benedictis
, Antonio Lioy
:
Integrity verification of Docker containers for a lightweight cloud environment. 236-246
- Maha Bouaziz, Abderrezak Rachedi
, Abdelfettah Belghith
, Marion Berbineau, Saad A. Al-Ahmadi
:
EMA-RPL: Energy and mobility aware routing for the Internet of Mobile Things. 247-258 - Vicent Giménez Alventosa
, Germán Moltó
, Miguel Caballer
:
A framework and a performance assessment for serverless MapReduce on AWS Lambda. 259-274
- Jie Cui, Mingjun Wang, Yonglong Luo, Hong Zhong:
DDoS detection and defense mechanism based on cognitive-inspired computing in SDN. 275-283
- Shengmin Xu
, Guomin Yang
, Yi Mu, Ximeng Liu:
A secure IoT cloud storage system with fine-grained access control and decryption key exposure resistance. 284-294
- Ignacio Martín
, José Alberto Hernández
, Sergio de los Santos:
Machine-Learning based analysis and classification of Android malware signatures. 295-305
- Qian Xu, Chengxiang Tan, Wenye Zhu, Ya Xiao, Zhijie Fan, Fujia Cheng:
Decentralized attribute-based conjunctive keyword search scheme with online/offline encryption and outsource decryption for cloud computing. 306-326
- Luigi Atzori, Claudia Campolo
, Bin Da, Roberto Girau
, Antonio Iera
, Giacomo Morabito
, Salvatore Quattropani
:
Smart devices in the social loops: Criteria and algorithms for the creation of the social links. 327-339
- Muthukumar Murugan, Krishna Kant, Ajaykrishna Raghavan, David H. C. Du:
Software defined deduplicated replica management in scale-out storage systems. 340-354
- Sam Leroux, Steven Bohez, Elias De Coninck, Pieter Van Molle, Bert Vankeirsbilck, Tim Verbelen
, Pieter Simoens
, Bart Dhoedt:
Multi-fidelity deep neural networks for adaptive inference in the internet of multimedia things. 355-360
- Ying Xie, Yuanwei Zhu, Yeguo Wang, Yongliang Cheng, Rongbin Xu, Abubakar Sadiq Sani
, Dong Yuan, Yun Yang:
A novel directional and non-local-convergent particle swarm optimization based workflow scheduling in cloud-edge environment. 361-378
- Pedro H. Vilela, Joel J. P. C. Rodrigues
, Petar Solic
, Kashif Saleem
, Vasco Furtado
:
Performance evaluation of a Fog-assisted IoT solution for e-Health applications. 379-386
- Yuanchun Jiang, Dandan Tao, Yezheng Liu, Jianshan Sun, Haifeng Ling:
Cloud service recommendation based on unstructured textual information. 387-396
- Khouloud Boukadi
, Rima Grati, Molka Rekik
, Hanêne Ben-Abdallah
:
Business process outsourcing to cloud containers: How to find the optimal deployment? 397-408
- Muhammad Faizan Khan
, Guojun Wang, Md. Zakirul Alam Bhuiyan
:
Wi-Fi frequency selection concept for effective coverage in collapsed structures. 409-424
- Sana Ullah, Ki-Il Kim
, Kyong Hoon Kim, Muhammad Imran, Pervez Khan, Eduardo Tovar
, Farman Ali
:
UAV-enabled healthcare architecture: Issues and challenges. 425-432
- Suresh V. Limkar
, Rakesh Kumar Jha
:
A novel method for parallel indexing of real time geospatial big data generated by IoT devices. 433-452
- Hu Xiong
, Yanan Zhao, Li Peng, Hao Zhang, Kuo-Hui Yeh
:
Partially policy-hidden attribute-based broadcast encryption with secure delegation in edge computing. 453-461
- Hadeel T. El Kassabi, Mohamed Adel Serhani, Rachida Dssouli, Alramzana Nujum Navaz
:
Trust enforcement through self-adapting cloud workflow orchestration. 462-481 - Alireza Toroghi Haghighat, Mehdi Shajari:
Block withholding game among bitcoin mining pools. 482-491
- Dimitrios Michail
, Antonios Makris
, Iraklis Varlamis
, Mark Sawyer:
Parallelization of large-scale drug-protein binding experiments. 492-502
- Juan E. Tapia
, Claudia Arellano
:
Soft-biometrics encoding conditional GAN for synthesis of NIR periocular images. 503-511
- Muneeb Ul Hassan
, Mubashir Husain Rehmani
, Jinjun Chen:
Privacy preservation in blockchain based IoT systems: Integration issues, prospects, challenges, and future research directions. 512-529
- Varun Kumar Sharma, Lal Pratap Verma, Mahesh Kumar:
CL-ADSP: Cross-Layer Adaptive Data Scheduling Policy in Mobile Ad-hoc Networks. 530-563
- Leandro Bezerra Marinho
, Navar de Medeiros Mendonça e Nascimento
, João Wellington M. Souza, Mateus Valentim Gurgel, Pedro Pedrosa Rebouças Filho
, Victor Hugo C. de Albuquerque
:
A novel electrocardiogram feature extraction approach for cardiac arrhythmia classification. 564-577 - Jin Cui
, Lei Ren, Xiaokang Wang
, Lin Zhang:
Pairwise comparison learning based bearing health quantitative modeling and its application in service life prediction. 578-586
- Nader Sohrabi Safa
, Carsten Maple, Steven Furnell, Muhammad Ajmal Azad
, Charith Perera, Mohammad Dabbagh
, Mehdi Sookhak
:
Deterrence and prevention-based model to mitigate information security insider threats in organisations. 587-597
- Aitor Almeida
, Rubén Mulero
, Piercosimo Rametta, Vladimir Urosevic
, Marina Andric, Luigi Patrono:
A critical analysis of an IoT - aware AAL system for elderly monitoring. 598-619
- Luigi Coppolino
, Salvatore D'Antonio, Giovanni Mazzeo
, Luigi Romano:
A comparative analysis of emerging approaches for securing java software with Intel SGX. 620-633
- Hannan Bin Liaqat, Amjad Ali, Junaid Qadir
, Ali Kashif Bashir
, Muhammad Bilal
, Fiaz Majeed
:
Socially-aware congestion control in ad-hoc networks: Current status and the way forward. 634-660
- Zaihong He, Jishun Kuang, Yanjie Tan, Shihui Peng, Huailiang Tan:
LPCMsim: A Lightweight Phase Change Memory Simulator. 661-673
- Václav Bartos
, Martin Zádník
, Sheikh Mahbub Habib
, Emmanouil Vasilomanolakis
:
Network entity characterization and attack prediction. 674-686
- Muhammad Asif Habib
, Mudassar Ahmad
, Sohail Jabbar
, Shehzad Khalid, Junaid Chaudhry
, Kashif Saleem
, Joel J. P. C. Rodrigues
, Mohammed Sayim Khalil
:
Security and privacy based access control model for internet of connected vehicles. 687-696
- Marcos A. Guerine, Murilo B. Stockinger, Isabel Rosseti
, Luidi Gelabert Simonetti
, Kary A. C. S. Ocaña
, Alexandre Plastino, Daniel de Oliveira
:
A provenance-based heuristic for preserving results confidentiality in cloud-based scientific workflows. 697-713
- Shupan Li, Limin Xiao, Li Ruan, Shubin Su:
A novel integrity measurement method based on copy-on-write for region in virtual machine. 714-726
- Hsi-Peng Lu, Chiao-Shan Chen, Hueiju Yu:
Technology roadmap for building a smart city: An exploring study on methodology. 727-742
- Pan Li
, Songtao Guo, Chengsheng Pan, Li Yang, Guiyan Liu, Yue Zeng
:
Fast congestion-free consistent flow forwarding rules update in software defined networking. 743-754
- Binbin Huang, Zhongjin Li, Peng Tang, Shangguang Wang
, Jun Zhao, Haiyang Hu, Wanqing Li, Victor I. Chang
:
Security modeling and efficient computation offloading for service workflow in mobile edge computing. 755-774
- Jianfeng Guan, Vishal Sharma
, Ilsun You, Mohammed Atiquzzaman
, Muhammad Imran:
Extension of MIH for FPMIPv6 (EMIH-FPMIPv6) to support optimized heterogeneous handover. 775-791
- Mohammed AlShaer, Yehia Taher, Rafiqul Haque
, Mohand-Saïd Hacid, Mohamed Dbouk:
IBRIDIA: A hybrid solution for processing big logistics data. 792-804
- Chenghao Li, Huyin Zhang, Tianying Zhou:
Coflow scheduling algorithm based density peaks clustering. 805-813
- Damjan Temelkovski
, Tamás Kiss
, Gábor Terstyánszky, Pamela Greenwell:
Extending molecular docking desktop applications with cloud computing support and analysis of results. 814-824
- Qiang Wu, Jun Shen
, Binbin Yong
, Jianqing Wu, Fucun Li, Jinqiang Wang, Qingguo Zhou:
Smart fog based workflow for traffic control networks. 825-835
- Lan Gao
, Yunlong Xu, Rui Wang, Hailong Yang, Zhongzhi Luan, Depei Qian:
Accelerating in-memory transaction processing using general purpose graphics processing units. 836-848 - Ali Asghar Heidari
, Seyedali Mirjalili
, Hossam Faris, Ibrahim Aljarah
, Majdi M. Mafarja
, Huiling Chen
:
Harris hawks optimization: Algorithm and applications. 849-872
- Ademir Silva
, Kátia Silva, Antônio A. de A. Rocha
, Flavio Queiroz:
Calculating the trust of providers through the construction weighted Sec-SLA. 873-886
- Attia Qamar, Ahmad Karim, Victor Chang
:
Mobile malware attacks: Review, taxonomy & future directions. 887-909

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.