default search action
Future Generation Computer Systems, Volume 117
Volume 117, April 2021
- Amit Kumar Jaiswal, Prayag Tiwari, Sahil Garg, M. Shamim Hossain:
Entity-aware capsule network for multi-class classification of big data: A deep learning approach. 1-11
- Peyman Paknejad, Reihaneh Khorsand, Mohammadreza Ramezanpour:
Chaotic improved PICEA-g-based multi-objective optimization for workflow scheduling in cloud environment. 12-28
- Kirstie L. Bellman, Jean Botev, Ada Diaconescu, Lukas Esterle, Christian Gruhl, Christopher Landauer, Peter R. Lewis, Phyllis R. Nelson, Evangelos Pournaras, Anthony Stein, Sven Tomforde:
Self-improving system integration: Mastering continuous change. 29-46
- Saqib Hakak, Mamoun Alazab, Suleman Khan, Thippa Reddy Gadekallu, Praveen Kumar Reddy Maddikunta, Wazir Zada Khan:
An ensemble machine learning approach through effective feature extraction to classify fake news. 47-58
- Muhammad Ashad Kabir, Jun Han, Md. Arafat Hossain, Steve Versteeg:
SpecMiner: Heuristic-based mining of service behavioral models from interaction traces. 59-71 - Leonardo R. Rodrigues, Guilherme Piêgas Koslovski, Marcelo Pasin, Maurício Aronne Pillon, Omir Correia Alves Junior, Charles Christian Miers:
Time-constrained and network-aware containers scheduling in GPU era. 72-86
- Amr Tolba, Zafer Al-Makhadmeh:
Predictive data analysis approach for securing medical data in smart grid healthcare systems. 87-96
- Xavier Oriol, Giuseppe De Giacomo, Montserrat Estañol, Ernest Teniente:
Embedding reactive behavior into artifact-centric business process models. 97-110
- Shankai Yan, Ka-Chun Wong:
Future DNA computing device and accompanied tool stack: Towards high-throughput computation. 111-124
- Jianhua Li, Jiong Jin, Lingjuan Lyu, Dong Yuan, Yingying Yang, Longxiang Gao, Chao Shen:
A fast and scalable authentication scheme in IOT for smart living. 125-137
- Yuanjin Xu, Ming Wei:
Multi-view clustering toward aerial images by combining spectral analysis and local refinement. 138-144
- Huan Wang, Shahid Mumtaz, Houjun Li, Jingxian Liu, Fan Yang:
An identification strategy for unknown attack through the joint learning of space-time features. 145-154
- Hibiki Taguchi, Xin Liu, Tsuyoshi Murata:
Graph convolutional networks for graphs containing missing features. 155-168
- Jimmy Ming-Tai Wu, Gautam Srivastava, Alireza Jolfaei, Philippe Fournier-Viger, Jerry Chun-Wei Lin:
Hiding sensitive information in eHealth datasets. 169-180
- Qika Lin, Yifan Zhu, Hao Lu, Kaize Shi, Zhendong Niu:
Improving University Faculty Evaluations via multi-view Knowledge Graph. 181-192
- Amrita Dahiya, Brij B. Gupta:
A reputation score policy and Bayesian game theory based incentivized mechanism for DDoS attacks mitigation and cyber defense. 193-204 - Zhiwei Guo, Lianggui Tang, Tan Guo, Keping Yu, Mamoun Alazab, Andrii Shalaginov:
Deep Graph neural network-based spammer detection under the perspective of heterogeneous cyberspace. 205-218
- Leila Eskandari, Jason Mair, Zhiyi Huang, David M. Eyers:
I-Scheduler: Iterative scheduling for distributed stream processing systems. 219-233
- Iqra Kamran, Saeeda Naz, Imran Razzak, Muhammad Imran:
Handwriting dynamics assessment using deep neural network for early identification of Parkinson's disease. 234-244
- Aqsa Rashid, Asif Masood, Haider Abbas:
Cryptographic Framework for Role Control Remedy: A Secure Role Engineering mechanism for Single Authority Organizations. 245-258
- Yongsheng Hao, Jie Cao, Qi Wang, Jinglin Du:
Energy-aware scheduling in edge computing with a clustering method. 259-272 - Olatunji Mumini Omisore, Bolanle Adefowoke Ojokoh, Asegunloluwa Eunice Babalola, Tobore Igbe, Yetunde Folajimi, Zedong Nie, Lei Wang:
An affective learning-based system for diagnosis and personalized management of diabetes mellitus. 273-290
- Zhihan Lv, Dongliang Chen, Ranran Lou, Ammar Alazab:
Artificial intelligence for securing industrial-based cyber-physical systems. 291-298
- Hisham A. Kholidy:
Detecting impersonation attacks in cloud computing environments using a centric user profiling approach. 299-320
- Hongfei Zhu, Ye Wang, Chonghua Wang, Xiaochun Cheng:
An efficient identity-based proxy signcryption using lattice. 321-327
- Yuanhang Qi, M. Shamim Hossain, Jiangtian Nie, Xuandi Li:
Privacy-preserving blockchain-based federated learning for traffic flow prediction. 328-337
- Xiaogang Wang, Jian Cao, Dingyu Yang, Zhen Qin, Rajkumar Buyya:
Online cloud resource prediction via scalable window waveform sampling on classified workloads. 338-358 - Zeineb Rejiba, Xavier Masip-Bruin, Eva Marín-Tordera:
Towards user-centric, switching cost-aware fog node selection strategies. 359-368
- Endah Kristiani, Yuan-An Chen, Chao-Tung Yang, Chin-Yin Huang, Yu-Tse Tsan, Wei-Cheng Chan:
Using deep ensemble for influenza-like illness consultation rate prediction. 369-386
- George Papadimitriou, Cong Wang, Karan Vahi, Rafael Ferreira da Silva, Anirban Mandal, Zhengchun Liu, Rajiv Mayani, Mats Rynge, Mariam Kiran, Vickie E. Lynch, Rajkumar Kettimuthu, Ewa Deelman, Jeffrey S. Vetter, Ian T. Foster:
End-to-end online performance data capture and analysis for scientific workflows. 387-400
- Shanshan Liu, Pedro Reviriego, Paolo Montuschi, Fabrizio Lombardi:
Less-is-Better Protection (LBP) for memory errors in kNNs classifiers. 401-411
- Usman Rauf, Mohamed Shehab, Nafees Qamar, Sheema Sameen:
Formal approach to thwart against insider attacks: A bio-inspired auto-resilient policy regulation framework. 412-425
- Zehui Qu, Zhongsheng Chen:
An intelligent vehicle image segmentation and quality assessment model. 426-432 - Xin Liu, YuJia Jiang:
Aesthetic assessment of website design based on multimodal fusion. 433-438
- Satish Narayana Srirama, Freddy Marcelo Surriabre Dick, Mainak Adhikari:
Akka framework based on the Actor model for executing distributed Fog Computing applications. 439-452
- Wei Ren, Xutao Wan, Pengcheng Gan:
A double-blockchain solution for agricultural sampled data security in Internet of Things network. 453-461 - Ibrahim Alghamdi, Christos Anagnostopoulos, Dimitrios P. Pezaros:
Data quality-aware task offloading in Mobile Edge Computing: An Optimal Stopping Theory approach. 462-479
- Xing Li, Junpei Zhong, M. M. Kamruzzaman:
Complicated robot activity recognition by quality-aware deep reinforcement learning. 480-485
- Linh-An Phan, Duc-Thang Nguyen, Meonghun Lee, Dae-Heon Park, Taehong Kim:
Dynamic fog-to-fog offloading in SDN-based fog computing systems. 486-497 - Chuge Wu, Wei Li, Ling Wang, Albert Y. Zomaya:
An evolutionary fuzzy scheduler for multi-objective resource allocation in fog computing. 498-509
- Xiaoyu Yin, Dagmar Gromann, Sebastian Rudolph:
Neural machine translating from natural language to SPARQL. 510-519
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.