default search action
Future Generation Computer Systems, Volume 115
Volume 115, February 2021
- Adarsh Kumar, Kriti Sharma, Harvinder Singh, Sagar Gupta Naugriya, Sukhpal Singh Gill, Rajkumar Buyya:
A drone-based networked system and methods for combating coronavirus disease (COVID-19) pandemic. 1-19 - Juan Carlos Salinas-Hilburg, Marina Zapater, José Manuel Moya, José L. Ayala:
Fast energy estimation framework for long-running applications. 20-33
- Alan Briones, Adrià Mallorquí, Agustín Zaballos, Ramon Martín de Pozuelo:
Adaptive and aggressive transport protocol to provide QoS in cloud data exchange over Long Fat Networks. 34-44
- Milosz Ciznicki, Krzysztof Kurowski, Jan Weglarz:
Energy and performance improvements in stencil computations on multi-node HPC systems with different network and communication topologies. 45-58
- Jianhang Zhou, Qi Zhang, Bob Zhang:
An automatic multi-view disease detection system via Collective Deep Region-based Feature Representation. 59-75
- Qianren Mao, Xi Li, Hao Peng, Jianxin Li, Dongxiao He, Shu Guo, Min He, Lihong Wang:
Event prediction based on evolutionary event ontology knowledge. 76-89
- (Withdrawn) Intelligent edge computing based on machine learning for smart city. 90-99
- Fahimeh Hajizadeh, Mohammadreza Binesh Marvasti, Seyyed Amir Asghari, Mostafa Abbas Mollaei, Amir M. Rahmani:
Configurable DSI partitioned approximate multiplier. 100-114
- Mordechai Guri:
MAGNETO: Covert channel between air-gapped systems and nearby smartphones via CPU-generated magnetic fields. 115-125 - Özgür Yürekten, Mehmet Demirci:
SDN-based cyber defense: A survey. 126-149
- Roger Pueyo Centelles, Roc Meseguer, Felix Freitag, Leandro Navarro, Sergio F. Ochoa, Rodrigo M. Santos:
LoRaMoto: A communication system to provide safety awareness among civilians after an earthquake. 150-170
- Hisham A. Kholidy:
Autonomous mitigation of cyber risks in the Cyber-Physical Systems. 171-187
- Saeed Mirpour Marzuni, Abdorreza Savadi, Adel Nadjaran Toosi, Mahmoud Naghibzadeh:
Cross-MapReduce: Data transfer reduction in geo-distributed MapReduce. 188-200 - Dabiah Ahmed Alboaneen, Hugo Tianfield, Yan Zhang, Bernardi Pranggono:
A metaheuristic method for joint task scheduling and virtual machine placement in cloud data centers. 201-212 - Emiliano Casalicchio, Gabriele Gualandi:
ASiMOV: A self-protecting control application for the smart factory. 213-235
- Wenjie Feng, Shenghua Liu, Christos Faloutsos, Bryan Hooi, Huawei Shen, Xueqi Cheng:
EagleMine: Vision-guided Micro-clusters recognition and collective anomaly detection. 236-250
- Matteo Repetto, Alessandro Carrega, Riccardo Rapuzzi:
An architecture to manage security operations for digital service chains. 251-266
- Mumin Cebe, Kemal Akkaya:
Communication-efficient certificate revocation management for Advanced Metering Infrastructure and IoT Integration. 267-278 - Mohammad Ehsan Basiri, Shahla Nemati, Moloud Abdar, Erik Cambria, U. Rajendra Acharya:
ABCDM: An Attention-based Bidirectional CNN-RNN Deep Model for sentiment analysis. 279-294
- Yan Zhang, Kun Wang, Lei He:
Editorial for FGCS special issue: Computation Intelligence for Energy Internet. 295-297
- Tao Song, Honghua Zhao, Zhi Liu, Hao Liu, Yuanyuan Hu, Dianmin Sun:
Intelligent human hand gesture recognition by local-global fusing quality-aware features. 298-303
- Yongjun Ren, Yan Leng, Jian Qi, Pradip Kumar Sharma, Jin Wang, Zafer Al-Makhadmeh, Amr Tolba:
Multiple cloud storage mechanism based on blockchain in smart homes. 304-313
- Ahmed Falah, Lei Pan, Md. Shamsul Huda, Shiva Raj Pokhrel, Adnan Anwar:
Improving malicious PDF classifier with feature engineering: A data-driven approach. 314-326
- Shudong Wang, Gaowei Liu, Xinzeng Wang, Yuanyuan Zhang, Sicheng He, Yulin Zhang:
TagSNP-set selection for genotyping using integrated data. 327-334
- Babar Shahzaad, Athman Bouguettaya, Sajib Mistry, Azadeh Ghari Neiat:
Resilient composition of drone services for delivery. 335-350 - Majid Makki, Dimitri Van Landuyt, Bert Lagaisse, Wouter Joosen:
Thread-level resource consumption control of tenant custom code in a shared JVM for multi-tenant SaaS. 351-364
- Sunggon Kim, Jaehyun Han, Hyeonsang Eom, Yongseok Son:
Improving I/O performance in distributed file systems for flash-based SSDs by access pattern reshaping. 365-373
- Faizana Naeem, Mujahid Mohsin, Usman Rauf, Liaqat Ali Khan:
Formal approach to thwart against drone discovery attacks: A taxonomy of novel 3D obfuscation mechanisms. 374-386 - José Tomás Martínez Garre, Manuel Gil Pérez, Antonio Ruiz-Martínez:
A novel Machine Learning-based approach for the detection of SSH botnet infection. 387-396
- Xiaonan Wang, Xingwei Wang, Yanli Li:
NDN-based IoT with Edge computing. 397-405 - Meng Li, Chhagan Lal, Mauro Conti, Donghui Hu:
LEChain: A blockchain-based lawful evidence management scheme for digital forensics. 406-420
- Charilaos Skandylas, Narges Khakpour:
Design and Implementation of Self-Protecting systems: A Formal Approach. 421-437
- Ramin Toosi, Mohammad Ali Akhaee:
Time-frequency analysis of keystroke dynamics for user authentication. 438-447 - Jing Chen, Jiong Chen, Kun He, Ruiying Du:
SeCrowd: Efficient secure interactive crowdsourcing via permission-based signatures. 448-458 - Martina Sestak, Marjan Hericko, Tatjana Welzer-Druzovec, Muhamed Turkanovic:
Applying k-vertex cardinality constraints on a Neo4j graph database. 459-474 - Hongbo Zhu, Guangjie Han, Peng Yang, Wenbo Zhang, Chuan Lin, Hai Zhao:
Functional-realistic CT image super-resolution for early-stage pulmonary nodule detection. 475-485
- Hong Zhong, Yiyuan Zhou, Qingyang Zhang, Yan Xu, Jie Cui:
An efficient and outsourcing-supported attribute-based access control scheme for edge-enabled smart healthcare. 486-496
- Miao Zhang, Yong Peng, Mei Yang, Quanjun Yin, Xu Xie:
A discrete PSO-based static load balancing algorithm for distributed simulations in a cloud environment. 497-516
- Martin Husák, Václav Bartos, Pavol Sokol, Andrej Gajdos:
Predictive methods in cyber defense: Current experience and research challenges. 517-530
- Wenyi Tang, Ling Tian, Xu Zheng, Guangchun Luo, Zaobo He:
Susceptible user search for defending opinion manipulation. 531-541
- Jianliang Wei, Fei Meng:
How opinion distortion appears in super-influencer dominated social network. 542-552
- Qiang Wang, Fucai Zhou, Jian Xu, Zifeng Xu:
Efficient verifiable databases with additional insertion and deletion operations in cloud computing. 553-567 - Timothy R. McIntosh, Paul A. Watters, A. S. M. Kayes, Alex Ng, Yi-Ping Phoebe Chen:
Enforcing situation-aware access control to build malware-resilient file systems. 568-582 - Gang Yu, Yi Wang, Min Hu, Lihua Shi, Zeyu Mao, Vijayan Sugumaran:
RIOMS: An intelligent system for operation and maintenance of urban roads using spatio-temporal data in smart cities. 583-609
- Shitong Mao, Aliaa Sabry, Yassin Khalifa, James L. Coyle, Ervin Sejdic:
Estimation of laryngeal closure duration during swallowing without invasive X-rays. 610-618
- Viraaji Mothukuri, Reza M. Parizi, Seyedamin Pouriyeh, Yan Huang, Ali Dehghantanha, Gautam Srivastava:
A survey on security and privacy of federated learning. 619-640
- Bander Ali Saleh Al-rimy, Mohd Aizaini Maarof, Mamoun Alazab, Syed Zainudeen Mohd Shaid, Fuad A. Ghaleb, Abdulmohsen Almalawi, Abdullah Marish Ali, Tawfik Al Hadhrami:
Redundancy Coefficient Gradual Up-weighting-based Mutual Information Feature Selection technique for Crypto-ransomware early detection. 641-658
- Zar Bakht Imtiaz, Awais Manzoor, Saif ul Islam, Malik Ali Judge, Kim-Kwang Raymond Choo, Joel J. P. C. Rodrigues:
Discovering communities from disjoint complex networks using Multi-Layer Ant Colony Optimization. 659-670
- Jian Liu, Yuanmin Duan, Yuedong Wu, Rui Chen, Liang Chen, Geng Chen:
Information flow perception modeling and optimization of Internet of Things for cloud services. 671-679
- Shaker H. Ali El-Sappagh, Hager Saleh, Radhya Sahal, Tamer AbuHmed, S. M. Riazul Islam, Farman Ali, Eslam Amer:
Alzheimer's disease progression detection model based on an early fusion of cost-effective multimodal data. 680-699
- Mostafa Mehrabi, Nasser Giacaman, Oliver Sinnen:
Unified programming concepts for unobtrusive integration of cloud-based and local parallel computing. 700-719 - Maroua Masmoudi, Sana Ben Abdallah Ben Lamine, Hajer Baazaoui Zghal, Bernard Archimède, Mohamed-Hedi Karray:
Knowledge hypergraph-based approach for data integration and querying: Application to Earth Observation. 720-740
- Santiago Felici-Castell, Miguel García-Pineda, Jaume Segura-Garcia, Rafael Fayos-Jordan, Jesús López Ballester:
Adaptive live video streaming on low-cost wireless multihop networks for road traffic surveillance in smart cities. 741-755
- P. Mohamed Shakeel, S. Baskar, Hassan Fouad, Gunasekaran Manogaran, Vijayalakshmi Saravanan, Carlos Enrique Montenegro-Marín:
Internet of things forensic data analysis using machine learning to identify roots of data scavenging. 756-768
- Mohamad Arafeh, Paolo Ceravolo, Azzam Mourad, Ernesto Damiani, Emanuele Bellini:
Ontology based recommender system using social network data. 769-779 - Ritu Singhal, Archana Singhal:
A feedback-based combinatorial fair economical double auction resource allocation model for cloud computing. 780-797 - Ali Daud, Faizan Abbas, Tehmina Amjad, Abdulrahman A. Alshdadi, Jalal S. Alowibdi:
Finding rising stars through hot topics detection. 798-813 - Iván García-Cobo, Héctor D. Menéndez:
Designing large quantum key distribution networks via medoid-based algorithms. 814-824
- Bin Pu, Ningbo Zhu, Kenli Li, Shengli Li:
Fetal cardiac cycle detection in multi-resource echocardiograms using hybrid classification framework. 825-836
- Kun Zhan, Chaoxi Niu:
Mutual teaching for graph convolutional networks. 837-843
- Syed Ibrahim Imtiaz, Saif ur Rehman, Abdul Rehman Javed, Zunera Jalil, Xuan Liu, Waleed S. Alnumay:
DeepAMD: Detection and identification of Android malware using high-efficient Deep Artificial Neural Network. 844-856
- Christopher Bayliss, Javier Panadero, Laura Calvet, Joan Manuel Marquès:
Reliability in volunteer computing micro-blogging services. 857-871
- Dehua Zhang, Sha Lou:
The application research of neural network and BP algorithm in stock price pattern classification and prediction. 872-879
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.