


default search action
Future Generation Computer Systems, Volume 145
Volume 145, August 2023
- Ming Tao

:
Semantic ontology enabled modeling, retrieval and inference for incomplete mobile trajectory data. 1-11
- Javier Pastor-Galindo

, Félix Gómez Mármol, Gregorio Martínez Pérez:
On the gathering of Tor onion addresses. 12-26
- Xuanwei Zeng, Yong Yang, Qiaoqiao Xu, Huimiao Zhan, Haoan Lv, Zhiqiang Zhou, Xin Ma, Xiaojuan Liu, Jiaojiao Gui, Qianruo Kang, Neal Xiong, Junfeng Gao, Hua Zheng:

Intraoperative enhancement of effective connectivity in the default mode network predicts postoperative delirium following cardiovascular surgery. 27-37
- William Ochoa

, Felix Larrinaga
, Alain Perez
:
Context-aware workflow management for smart manufacturing: A literature review of semantic web-based approaches. 38-55 - Shan Ji, Jiale Zhang

, Yongjing Zhang, Zhaoyang Han, Chuan Ma
:
LAFED: A lightweight authentication mechanism for blockchain-enabled federated learning system. 56-67 - Shah Khalid, Aftab Alam, Muhammad Fayaz, Fakhrud Din

, Sehat Ullah
, Shabir Ahmad
:
Investigating the effect of network latency on users' performance in Collaborative Virtual Environments using navigation aids. 68-76 - Yujia Song

, Ruyue Xin
, Peng Chen
, Rui Zhang
, Juan Chen, Zhiming Zhao
:
Identifying performance anomalies in fluctuating cloud environments: A robust correlative-GNN-based explainable approach. 77-86
- Juan Armando Barron-Lugo

, José Luis González
, Ivan López-Arévalo, Jesús Carretero, José-Lázaro Martínez-Rodríguez:
Xel: A cloud-agnostic data platform for the design-driven building of high-availability data science services. 87-103
- Chen Zhou

, Masoud Barati
, Omair Shafiq:
A compliance-based architecture for supporting GDPR accountability in cloud computing. 104-120 - Fumio Machida

, Qingyang Zhang
, Ermeson C. Andrade:
Performability analysis of adaptive drone computation offloading with fog computing. 121-135
- Dong Zhang, Heye Zhang, Hongwei Zhang, Lei Xu, Jinglin Zhang, Zhifan Gao

:
Distance transform learning for structural and functional analysis of coronary artery from dual-view angiography. 136-149 - Shaoyi Du

, Yuying Liu, Xijing Wang, Yuting Chi, Nanning Zheng, Yucheng Guo:
Curriculum classification network based on margin balancing multi-loss and ensemble learning. 150-163
- Drew Penney

, Bin Li, Jaroslaw J. Sydir, Lizhong Chen
, Charlie Tai, Stefan Lee, Eoin Walsh
, Thomas Long:
PROMPT: Learning dynamic resource allocation policies for network applications. 164-175 - Duong Tuan Nguyen

, Chuan Pham, Kim Khoa Nguyen, Mohamed Cheriet:
Jointly optimized resource allocation for SDN control and forwarding planes in edge-cloud SDN-based networks. 176-188 - Shaobo Zhang

, Tao Guo, Qin Liu, Entao Luo, Kim-Kwang Raymond Choo
, Guojun Wang:
ALPS: Achieving accuracy-aware location privacy service via assisted regions. 189-199 - Yulin Wu, Lanxiang Chen

:
Structured encryption for triangle counting on graph data. 200-210
- Mirko Franco

, Ombretta Gaggi, Barbara Guidi, Andrea Michienzi, Claudio E. Palazzi:
A decentralised messaging system robust against the unauthorised forwarding of private content. 211-222
- Cleber Jorge Lira de Santana

, Ernando Batista
, Flávia Coimbra Delicato
, Cássio V. S. Prazeres:
Architecture for IoT applications based on reactive microservices: A performance evaluation. 223-238 - Felipe A. Quezada, Cristóbal A. Navarro

, Miguel Romero
, Cristhian Aguilera
:
Modeling GPU Dynamic Parallelism for self similar density workloads. 239-253 - Neha Agarwal

, Geeta Sikka, Lalit Kumar Awasthi
:
WGSDMM+GA: A genetic algorithm-based service clustering methodology assimilating dirichlet multinomial mixture model with word embedding. 254-266
- Salwa Alem

, David Espes, Laurent Nana, Eric Martin, Florent de Lamotte:
A novel bi-anomaly-based intrusion detection system approach for industry 4.0. 267-283
- Zhexin Yao, Qiuming Liu, Jingkang Yang, Yanan Chen, Zhen Wu

:
PPUP-GAN: A GAN-based privacy-protecting method for aerial photography. 284-292 - Aimin Yang, Yunjie Bai, Tao Xue, Yifan Li, Jie Li:

A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. 293-302 - Qizhi Zhang, Yale He, Ruilin Lai

, Zhihao Hou, Gansen Zhao:
A survey on the efficiency, reliability, and security of data query in blockchain systems. 303-320 - Sergi Vila

, Fernando Guirado
, Josep L. Lérida
:
Cloud computing virtual machine consolidation based on stock trading forecast techniques. 321-336 - Jing Chen

, Xiaoqiang Di, Rui Xu
, Hui Qi, Ligang Cong, Kehan Zhang, Ziyang Xing, Xiongwen He, Wenping Lei, Shiwei Zhang:
A remote sensing data transmission strategy based on the combination of satellite-ground link and GEO relay under dynamic topology. 337-353 - Jiangjiang Zhang, Zhenhu Ning, Fei Xue:

A two-stage federated optimization algorithm for privacy computing in Internet of Things. 354-366 - Chehara Pathmabandu

, John C. Grundy
, Mohan Baruwal Chhetri, Zubair A. Baig
:
Privacy for IoT: Informed consent management in Smart Buildings. 367-383
- Caixing Shao, Fengxin Cheng, Jingzhong Xiao, Ke Zhang:

Vehicular intelligent collaborative intersection driving decision algorithm in Internet of Vehicles. 384-395
- Adam Krzywaniak

, Pawel Czarnul
, Jerzy Proficz
:
Dynamic GPU power capping with online performance tracing for energy efficient GPU computing using DEPO tool. 396-414 - Qing Yang, Xiaoqian Zhu, Xiaoliang Wang

, Junjie Fu
, Jing Zheng, Yuzhen Liu:
A novel authentication and key agreement scheme for Internet of Vehicles. 415-428
- Chenbin Ma, Yulan Ma, Longsheng Pan, Xuemei Li, Chunyu Yin, Rui Zong, Zhengbo Zhang

:
Automatic diagnosis of multi-task in essential tremor: Dynamic handwriting analysis using multi-modal fusion neural network. 429-441
- Shangdong Yang

, Huihui Wang, Shaokang Dong, Xingguo Chen:
Leveraging transition exploratory bonus for efficient exploration in Hard-Transiting reinforcement learning problems. 442-453
- Guoqiang Deng

, Xuefeng Duan, Min Tang
, Yuhao Zhang
, Ying Huang
:
Non-interactive and privacy-preserving neural network learning using functional encryption. 454-465 - Mengjie Zhang

, Renhai Feng, Hehe Zhang, Yishan Su:
A recommendation management defense mechanism based on trust model in underwater acoustic sensor networks. 466-477
- Genaro Sanchez-Gallegos

, Dante D. Sánchez-Gallegos
, José Luis González Compeán
, Hugo G. Reyes-Anastacio
, Jesús Carretero:
On the building of efficient self-adaptable health data science services by using dynamic patterns. 478-495
- Yan-Yang Cheng

, Zheng-Yi Chai, Ya-Lun Li:
Many-objective many-task optimization using reference-points-based nondominated sorting approach. 496-510 - Pan Yang

, Hongbo Li
, Jianye Huang, Hao Zhang, Man Ho Allen Au, Qiong Huang
:
Secure channel free public key authenticated encryption with multi-keyword search on healthcare systems. 511-520 - Ziyi Lu

, Na Yu
, Xuehe Wang
:
Incentive mechanism and path planning for Unmanned Aerial Vehicle (UAV) hitching over traffic networks. 521-535 - Zhao Tong

, Jiake Wang
, Jing Mei
, Kenli Li, Wenbin Li, Keqin Li
:
Multi-type task offloading for wireless Internet of Things by federated deep reinforcement learning. 536-549
- Chen Wang, Tao Chen

, Antonio Plaza
:
MFE-ResNet: A new extraction framework for land cover characterization in mining areas. 550-562
- SeokHwan Choi

, Jin-Myeong Shin
, Yoon-Ho Choi
:
PIHA: Detection method using perceptual image hashing against query-based adversarial attacks. 563-577
- Rui Chen, Bo Liu, Weiwei Lin, Jianpeng Lin, Huiwen Cheng, Keqin Li:

Power and thermal-aware virtual machine scheduling optimization in cloud data center. 578-589

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














