


Остановите войну!
for scientists:


default search action
Future Generation Computer Systems, Volume 125
Volume 125, December 2021
- Ying Li, Binbin Fan
, Weiping Zhang, Zhiqiang Jiang:
TireNet: A high recall rate method for practical application of tire defect type classification. 1-9 - Jose Carlos Romero
, Angeles G. Navarro
, Antonio Vilches
, Andrés Rodríguez
, Francisco Corbera
, Rafael Asenjo
:
Efficient heterogeneous matrix profile on a CPU + High Performance FPGA with integrated HBM. 10-23
- Sumin Li
, Xiuqin Pan:
A computational drug repositioning model based on hybrid similarity side information powered graph neural network. 24-31
- Peng Xu
, Ruijie Sun, Wei Wang
, Tianyang Chen
, Yubo Zheng
, Hai Jin:
SDD: A trusted display of FIDO2 transaction confirmation without trusted execution environment. 32-40
- Aaisha Makkar
, Neeraj Kumar
:
PROTECTOR: An optimized deep learning-based framework for image spam detection and prevention. 41-58
- Lingqiang Kong:
A study on the AI-based online triage model for hospitals in sustainable smart city. 59-70
- Diana Laura Aguilar
, Octavio Loyola-González
, Miguel Angel Medina-Pérez
, Leonardo Cañete-Sifuentes
, Kim-Kwang Raymond Choo
:
PBC4occ: A novel contrast pattern-based classifier for one-class classification. 71-90
- Haibo Liang, Haifeng Chen, Jialing Zou, Jing Bai:
Technical research on realizing remote intelligent diagnosis of petroleum drilling loss circulation under smart city strategy. 91-99 - Xu Zhu:
Complex event detection for commodity distribution Internet of Things model incorporating radio frequency identification and Wireless Sensor Network. 100-111
- Yifei Zhang
, Senlin Luo, Limin Pan
, Hanqing Zhang:
Syscall-BSEM: Behavioral semantics enhancement method of system call sequence for high accurate and robust host intrusion detection. 112-126 - Jiachen Yang, Shuai Xiao
, Aiyun Li, Guipeng Lan, Huihui Wang
:
Detecting fake images by identifying potential texture difference. 127-135 - Zhi-bin Huang
, Guang-Tao Fu, Tian-Hao Fa, Dan-Yang Dong, Peng Bai, Xiao Chen:
High performance ant colony system based on GPU warp specialization with a static-dynamic balanced candidate set strategy. 136-150 - Su Hu, Hua Yin:
Research on the optimum synchronous network search data extraction based on swarm intelligence algorithm. 151-155 - Matheus P. Novaes
, Luiz Fernando Carvalho, Jaime Lloret
, Mario Lemes Proença Jr.
:
Adversarial Deep Learning approach detection and defense against DDoS attacks in SDN environments. 156-167 - Shubham Gupta, Balu L. Parne
, Narendra S. Chaudhari:
ISAG: IoT-enabled and Secrecy Aware Group-based handover scheme for e-health services in M2M communication network. 168-187 - Bai Ning, Liu Na:
Deep Spatial/temporal-level feature engineering for Tennis-based action recognition. 188-193
- Shaoqiang Wang, Zhenzhen Wu, Gewen He, Shudong Wang, Hongwei Sun, Fangfang Fan:
Semi-supervised classification-aware cross-modal deep adversarial data augmentation. 194-205
- Zhongjin Li, Victor Chang
, Haiyang Hu, Maozhong Fu, Jidong Ge, Francesco Piccialli
:
Optimizing makespan and resource utilization for multi-DNN training in GPU cluster. 206-220 - Rekha Goyat, Gulshan Kumar, Mamoun Alazab, Rahul Saha, Reji Thomas, Mritunjay Kumar Rai:
A secure localization scheme based on trust assessment for WSNs using blockchain technology. 221-231 - José Paredes, Gerardo I. Simari
, Maria Vanina Martinez, Marcelo A. Falappa
:
Detecting malicious behavior in social platforms via hybrid knowledge- and data-driven systems. 232-246
- Chengyi Qu, Prasad Calyam, Jeromy Yu, Aditya Vandanapu, Osunkoya Opeoluwa, Ke Gao
, Songjie Wang, Raymond Chastain
, Kannappan Palaniappan:
DroneCOCoNet: Learning-based edge computation offloading and control networking for drone video analytics. 247-262
- Patricia López Martínez, Ricardo Dintén
, José María Drake, Marta E. Zorrilla
:
A big data-centric architecture metamodel for Industry 4.0. 263-284 - Haiyang Yu
, Zhen Yang, Muhammad Waqas
, Shanshan Tu, Zhu Han, Zahid Halim, Richard O. Sinnott, Udaya Parampalli:
Efficient dynamic multi-replica auditing for the cloud with geographic location. 285-298 - Matteo Francia
, Enrico Gallinucci, Matteo Golfarelli
, Anna Giulia Leoni, Stefano Rizzi
, Nicola Santolini:
Making data platforms smarter with MOSES. 299-313 - Abdul Basit Darem
, Jemal H. Abawajy, Aaisha Makkar
, Asma Alhashmi
, Sultan M. Alanazi:
Visualization and deep-learning-based malware variant detection using OpCode-level features. 314-323 - Zhenyan Ji, Mengdan Wu
, Hong Yang, José Enrique Armendáriz-Iñigo
:
Temporal sensitive heterogeneous graph neural network for news recommendation. 324-333 - Sudhakar
, Sushil Kumar
:
MCFT-CNN: Malware classification with fine-tune convolution neural networks using traditional and transfer learning in Internet of Things. 334-351
- Yi Zheng, Youqiang Wang
, Jixin Liu:
Analysis and experimental research on stability characteristics of squatting posture of wearable lower limb exoskeleton robot. 352-363
- Xiaoming Li
, Guangquan Xu
, Changzheng Liu
, Wei Yu, Zhao Liu
, Zhenhuan Wu
, Xiaoping Yang:
Higher-Order Multiple-Feature-based Community Evolution Model with Potential Applications in Criminal Network Investigation. 364-375
- Guan Wang, Jiali Yin, M. Shamim Hossain
, Ghulam Muhammad
:
Incentive mechanism for collaborative distributed learning in Artificial Intelligence of Things. 376-384
- Yachao Yuan
, Yali Yuan
, Thar Baker
, Lutz Maria Kolbe, Dieter Hogrefe:
FedRD: Privacy-preserving adaptive Federated learning framework for intelligent hazardous Road Damage detection and warning. 385-398
- Elyazid Akachar, Brahim Ouhbi, Bouchra Frikh
:
ACSIMCD: A 2-phase framework for detecting meaningful communities in dynamic social networks. 399-420
- Gyeong Ho Lee
, Jaeseob Han
, Jun Kyun Choi:
MPdist-based missing data imputation for supporting big data analyses in IoT-based applications. 421-432 - Devrim Unal
, Abdulla K. Al-Ali, Ferhat Özgür Çatak
, Mohammad Hammoudeh
:
A secure and efficient Internet of Things cloud encryption scheme with forensics investigation compatibility based on identity-based encryption. 433-445
- Marco Viviani
, Cristina Crocamo
, Matteo Mazzola
, Francesco Bartoli
, Giuseppe Carrà
, Gabriella Pasi
:
Assessing vulnerability to psychological distress during the COVID-19 pandemic through the analysis of microblogging content. 446-459
- Weizhong Qiang, Renwan Liu, Hai Jin:
Defending CNN against privacy leakage in edge computing via binary neural networks. 460-470
- Yueshen Xu
, Yinchen Wu, Honghao Gao, Shengli Song, Yuyu Yin
, Xichu Xiao
:
Collaborative APIs recommendation for Artificial Intelligence of Things with information fusion. 471-479
- Xin Li, Lei Zhang:
Unbalanced data processing using deep sparse learning technique. 480-484 - Hongxiao Gan, Jinglan Zhang
, Michael Towsey, Anthony Truskinger, Debra Stark
, Berndt van Rensburg, Yuefeng Li, Paul Roe
:
A novel frog chorusing recognition method with acoustic indices and machine learning. 485-495 - Helan Liang, Bincheng Ding, Yanhua Du
, Fanzhang Li:
Parallel optimization of QoS-aware big service processes with discovery of skyline services. 496-514 - Yuanyuan Shen
, Manman Peng, Shiling Wang, Qiang Wu:
Towards parallelism detection of sequential programs with graph neural network. 515-525 - Jiajia Ren, Hongxin Li, Mengmeng Zhang, Cong Wu:
Massive-scale graph mining for e-commerce cold chain analysis and optimization. 526-531
- Bardh Prenkaj
, Damiano Distante
, Stefano Faralli
, Paola Velardi
:
Hidden space deep sequential risk prediction on student trajectories. 532-543
- Serin V. Simpson
, G. Nagarajan:
A fuzzy based Co-Operative Blackmailing Attack detection scheme for Edge Computing nodes in MANET-IOT environment. 544-563 - Kai Yang, Xiaodong Lin, Limin Sun:
CShield: Enabling code privacy for Cyber-Physical systems. 564-574 - Michal Wrzeszcz
, Lukasz Dutka, Renata G. Slota
, Jacek Kitowski
:
New approach to global data access in computational infrastructures. 575-589
- José A. Ruipérez Valiente
, Daniel Alberto Jaramillo-Morillo
, Srecko Joksimovic
, Vitomir Kovanovic
, Pedro J. Muñoz-Merino
, Dragan Gasevic:
Data-driven detection and characterization of communities of accounts collaborating in MOOCs. 590-603
- Hongzhi Zhou, Gan Yu:
Research on pedestrian detection technology based on the SVM classifier trained by HOG and LTP features. 604-615
- Bin Wang, Fagui Liu, Weiwei Lin:
Energy-efficient VM scheduling based on deep reinforcement learning. 616-628 - Niloofar Bayat, Kunal Mahajan, Sam Denton, Vishal Misra, Dan Rubenstein:
Down for failure: Active power status monitoring. 629-640
- Bárbara Silveira, Henrique S. Silva, Fabricio Murai
, Ana Paula Couto da Silva:
Predicting user emotional tone in mental disorder online communities. 641-651
- Faisal Janjua, Asif Masood, Haider Abbas
, Imran Rashid, Malik Muhammad Zaki Murtaza Khan
:
Textual analysis of traitor-based dataset through semi supervised machine learning. 652-660
- Jakub Kuzilek
, Zdenek Zdráhal, Viktor Fuglik:
Student success prediction using student exam behaviour. 661-671
- Peng Zhang:
E-commerce products recognition based on a deep learning architecture: Theory and implementation. 672-676
- Tao Zhang, Yan Zhao, Wenjing Jia
, Mu-Yen Chen:
Collaborative algorithms that combine AI with IoT towards monitoring and control system. 677-686
- Deepak Singh, Anurag Shukla, Mohit Sajwan:
Deep transfer learning framework for the identification of malicious activities to combat cyberattack. 687-697 - George E. Violettas
, George Simoglou
, Sophia G. Petridou
, Lefteris Mamatas
:
A Softwarized Intrusion Detection System for the RPL-based Internet of Things networks. 698-714
- Arno Breitfuss, Karen Errou, Anelia Kurteva, Anna Fensel:
Representing emotions with knowledge graphs for movie recommendations. 715-725
- Abd Ullah Khan
, Ghulam Abbas
, Ziaul Haq Abbas, Wali Ullah Khan
, Muhammad Waqas
:
Spectrum utilization efficiency in CRNs with hybrid spectrum access and channel reservation: A comprehensive analysis under prioritized traffic. 726-742 - Júnior Löff
, Dalvan Griebler
, Gabriele Mencagli
, Gabriell Alves de Araujo, Massimo Torquati
, Marco Danelutto
, Luiz Gustavo Fernandes
:
The NAS Parallel Benchmarks for evaluating C++ parallel programming frameworks on shared-memory architectures. 743-757
- Haomiao Yang, Shaopeng Liang, Yi Zhang, Xiong Li:
Cloud-based privacy- and integrity-protecting density peaks clustering. 758-769
- Qingsong Ai, Wei Meng, Faycal Bensaali
, Xiaojun Zhai, Lu Liu, Nasser Alaraje:
Editorial for FGCS special issue: Intelligent IoT systems for healthcare and rehabilitation. 770-773
- Andrea F. Abate
, Lucia Cascone
, Michele Nappi, Fabio Narducci
, Ignazio Passero
:
Attention monitoring for synchronous distance learning. 774-784
- Cong Wu, Hongxin Li, Jiajia Ren:
Research on hierarchical clustering method based on partially-ordered Hasse graph. 785-791 - Jordi Garcia
, Francesc Aguiló
, Adrià Asensio, Ester Simó
, Marisa Zaragozá, Xavi Masip-Bruin
:
Data-flow driven optimal tasks distribution for global heterogeneous systems. 792-805 - Yishu Liu, Qi Zhang, Weixiong Chen:
Massive-scale complicated human action recognition: Theory and applications. 806-811 - Shuigen Yang:
A novel study on deep learning framework to predict and analyze the financial time series information. 812-819 - Khan Muhammad, Mustaqeem
, Amin Ullah
, Ali Shariq Imran
, Muhammad Sajjad, Mustafa Servet Kiran, Giovanna Sannino
, Victor Hugo C. de Albuquerque:
Human action recognition using attention based LSTM network with dilated CNN features. 820-830 - Fengtao Nan
, Yahui Tang, Po Yang, Zhenli He
, Yun Yang:
A novel sub-Kmeans based on co-training approach by transforming single-view into multi-view. 831-843 - Michel J. F. Rosa
, Célia Ghedini Ralha
, Maristela Holanda
, Aletéia P. F. Araújo
:
Computational resource and cost prediction service for scientific workflows in federated clouds. 844-858
- Sumarga Kumar Sah Tyagi
, Shiva Raj Pokhrel
, Mahyar Nemati
, Deepak Kumar Jain, Gang Li
, Jinho Choi
:
Redesigning compound TCP with cognitive edge intelligence for WiFi-based IoT. 859-868
- Marco Antonio Sotelo Monge, Jorge Maestre Vidal:
Conceptualization and cases of study on cyber operations against the sustainability of the tactical edge. 869-890 - Sergio Pérez
, Patricia Arroba
, José Manuel Moya
:
Energy-conscious optimization of Edge Computing through Deep Reinforcement Learning and two-phase immersion cooling. 891-907 - Yi Jin
, Jiawei Cai, Jiawei Xu
, Yuxiang Huan
, Yulong Yan, Bin Huang, Yongliang Guo, Lirong Zheng
, Zhuo Zou:
Self-aware distributed deep learning framework for heterogeneous IoT edge devices. 908-920
- Tayyab Ali Khan, Karan Singh, Mohd Hilmi Hasan
, Khaleel Ahmad
, G. Thippa Reddy
, Senthilkumar Mohan
, Ali Ahmadian
:
ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs. 921-943
- Shajunyi Zhao, Dongyuan Ge, Jingfeng Zhao, Wenjiang Xiang:
Fingerprint pre-processing and feature engineering to enhance agricultural products categorization. 944-948 - Yongqiang Wang, Mei Sun, Long Liu:
Basketball shooting angle calculation and analysis by deeply-learned vision model. 949-953

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.