


default search action
Future Generation Computer Systems, Volume 108
Volume 108, July 2020
- Bei Xu

, Hai Zhuge:
The influence of semantic link network on the ability of question-answering system. 1-14
- Carlos Quinto Huamán

, Ana Lucila Sandoval Orozco, Luis Javier García-Villalba:
Authentication and integrity of smartphone videos through multimedia container structure analysis. 15-33
- Giancarlo Fortino, Lidia Fotia

, Fabrizio Messina, Domenico Rosaci
, Giuseppe M. L. Sarnè:
A meritocratic trust-based group formation in an IoT environment for smart cities. 34-45
- Shanay Behrad, Emmanuel Bertin, Stéphane Tuffin

, Noël Crespi:
A new scalable authentication and access control mechanism for 5G-based IoT. 46-61
- Hyunhee Park:

Adaptive Backoff enabled WUR on non-cellular local IoT for extreme low power operation. 62-67
- João J. C. Gondim

, Robson de Oliveira Albuquerque
, Ana Lucila Sandoval Orozco:
Mirror saturation in amplified reflection Distributed Denial of Service: A case of study using SNMP, SSDP, NTP and DNS protocols. 68-81
- Taesik Kim, Hong Min

, Eunsoo Choi, Jinman Jung
:
Optimal job partitioning and allocation for vehicular cloud computing. 82-96
- Soroush Ojagh

, Mohammad Reza Malek
, Sara Saeedi, Steve H. L. Liang:
A location-based orientation-aware recommender system using IoT smart devices and Social Networks. 97-118
- Jia Luo

, Didier El Baz, Rui Xue, Jinglu Hu:
Solving the dynamic energy aware job shop scheduling problem with the heterogeneous parallel genetic algorithm. 119-134
- Eric Ke Wang, Chien-Ming Chen

, Mohammad Mehedi Hassan, Ahmad Almogren
:
A deep learning based medical image segmentation technique in Internet-of-Medical-Things domain. 135-144
- Jie Lin, Biao Xiao, Hanlin Zhang, Xinyu Yang, Peng Zhao:

A novel multitype-users welfare equilibrium based real-time pricing in smart grid. 145-160 - Filip Petrovic, David Strelák, Jana Hozzová, Jaroslav Olha

, Richard Trembecký, Siegfried Benkner
, Jiri Filipovic:
A benchmark set of highly-efficient CUDA and OpenCL kernels and its dynamic autotuning with Kernel Tuning Toolkit. 161-177
- Quentin Rouland

, Brahim Hamid
, Jason Jaskolka
:
Formal specification and verification of reusable communication models for distributed systems architecture. 178-197
- Tao Han, Roberto F. Ivo, Douglas de A. Rodrigues, Solon Alves Peixoto

, Victor Hugo C. de Albuquerque, Pedro Pedrosa Rebouças Filho:
Cascaded Volumetric Fully Convolutional Networks for Whole-Heart and Great Vessel 3D segmentation. 198-209
- Mirko D'Angelo, Mauro Caporuscio

, Vincenzo Grassi, Raffaela Mirandola
:
Decentralized learning for self-adaptive QoS-aware service assembly. 210-227
- Daniel G. Costa

, Felipe P. de Oliveira:
A prioritization approach for optimization of multiple concurrent sensing applications in smart cities. 228-243
- Lingling Zhang, Hong Jiang, Fang Wang, Dan Feng, Yanwen Xie:

Reservoir-based sampling over large graph streams to estimate triangle counts and node degrees. 244-255
- Giuseppe Rizzo, Nicola Fanizzi, Claudia d'Amato

:
Class expression induction as concept space exploration: From DL-Foil to DL-Focl. 256-272
- Yifan Chen, Zhiyong Li, Bo Yang

, Ke Nai, Keqin Li:
A Stackelberg game approach to multiple resources allocation and pricing in mobile edge computing. 273-287 - Nicola Mc Donnell, Enda Howley

, Jim Duggan:
Dynamic virtual machine consolidation using a multi-agent system to optimise energy efficiency in cloud computing. 288-301 - Seyed Asgary Ghasempouri, Behrouz Tork Ladani

:
Model checking of robustness properties in trust and reputation systems. 302-319 - Ashish Kumar Sahu

, Pragya Dwivedi
:
Knowledge transfer by domain-independent user latent factor for cross-domain recommender systems. 320-333 - Ashwin T. S., Ram Mohana Reddy Guddeti

:
Affective database for e-learning and classroom environments using Indian students' faces, hand gestures and body postures. 334-348 - Chia-Cheng Hu:

Minimizing executing and transmitting time of task scheduling and resource allocation in C-RANs. 349-360
- Ding Ding, Xiaocong Fan, Yihuan Zhao, Kaixuan Kang, Qian Yin, Jing Zeng:

Q-learning based dynamic task scheduling for energy-efficient cloud computing. 361-371
- Budan Wu, Ran Liu, Rongheng Lin, Junliang Chen:

A distributed business process fragmentation method based on community discovery. 372-389
- Xinyao Liu, Baojiang Cui, Junsong Fu, Jinxin Ma:

HFuzz: Towards automatic fuzzing testing of NB-IoT core network protocols implementations. 390-400
- Ghita Berrada

, James Cheney
, Sidahmed Benabderrahmane
, William Maxwell, Himan Mookherjee, Alec Theriault, Ryan Wright:
A baseline for unsupervised advanced persistent threat detection in system-level provenance. 401-413
- Yahya Al-Hadhrami, Farookh Khadeer Hussain:

Real time dataset generation framework for intrusion detection systems in IoT. 414-423
- Yousung Yang, Joohyung Lee, Nakyoung Kim, Kwihoon Kim:

Social-viewport adaptive caching scheme with clustering for virtual reality streaming in an edge computing platform. 424-431 - Karam M. Sallam

, Ripon Kumar Chakrabortty
, Michael J. Ryan:
A two-stage multi-operator differential evolution algorithm for solving Resource Constrained Project Scheduling problems. 432-444
- Kuo-Chi Chang, Kai-Chun Chu, Hsiao-Chuan Wang, Yuh-Chung Lin

, Jeng-Shyang Pan
:
Agent-based middleware framework using distributed CPS for improving resource utilization in smart city. 445-453
- Javier Palanca, Jaume Jordán

, Javier Bajo, Vicent J. Botti:
An energy-aware algorithm for electric vehicle infrastructures in smart cities. 454-466
- Aaisha Makkar

, Neeraj Kumar
:
An efficient deep learning-based scheme for web spam detection in IoT environment. 467-487
- Hsing-Chung Chen

, Karisma Trinanda Putra, Shian-Shyong Tseng, Chin-Ling Chen, Jerry Chun-Wei Lin
:
A spatiotemporal data compression approach with low transmission cost and high data fidelity for an air quality monitoring system. 488-500
- Shenglong Peng, Liang Zhou, Xuan He, Junyi Du:

GPS-aided inter-microcell interference avoidance for request-transmission splitting slotted ALOHA-based scheme in smart cities with connected vehicles. 501-511 - Daming Li, Lianbing Deng, Wenjian Liu, Su Qinglang:

Improving communication precision of IoT through behavior-based learning in smart city environment. 512-520
- Zhaonian Tan, Weixing Ji, Jianhua Gao

, Yueyan Zhao, Akrem Benatia, Yizhuo Wang, Feng Shi:
MMSparse: 2D partitioning of sparse matrix based on mathematical morphology. 521-532
- Chaolong Zhang

, Yigang He, Bolun Du, Lifen Yuan, Bing Li, Shanhe Jiang:
Transformer fault diagnosis method using IoT based monitoring system and ensemble machine learning. 533-545
- Shaojun Zou, Jiawei Huang, Wanchun Jiang, Jianxin Wang:

Achieving high utilization of flowlet-based load balancing in data center networks. 546-559 - Jitae Yun, Su-Kyung Yoon, Jeong-Geun Kim, Shin-Dug Kim:

Access pattern-based high-performance main memory system for graph processing on single machines. 560-573
- Wenbo Zhang, Zonglin Wu, Guangjie Han

, Yongxin Feng, Lei Shu:
LDC: A lightweight dada consensus algorithm based on the blockchain for the industrial Internet of Things for smart city applications. 574-582
- Mohamed Adel Serhani, Hadeel T. El Kassabi, Khaled Shuaib, Alramzana Nujum Navaz

, Boualem Benatallah
, Amin Beheshti
:
Self-adapting cloud services orchestration for fulfilling intensive sensory data-driven IoT workflows. 583-597 - Nan Wang, Michail Matthaiou

, Dimitrios S. Nikolopoulos, Blesson Varghese:
DYVERSE: DYnamic VERtical Scaling in multi-tenant Edge environments. 598-612 - Saqib Qamar

, Hai Jin, Ran Zheng, Parvez Ahmad
, Mohd Usama
:
A variant form of 3D-UNet for infant brain segmentation. 613-623 - Dmitrii Chemodanov, Flavio Esposito, Prasad Calyam, Andrei M. Sukhov

:
REBATE: A REpulsive-BAsed Traffic Engineering protocol for dynamic scale-free networks. 624-635 - Timothy A. Chadza, Konstantinos G. Kyriakopoulos, Sangarapillai Lambotharan:

Analysis of hidden Markov model learning algorithms for the detection and prediction of multi-stage network attacks. 636-649 - Yanghao Xie

, Sheng Wang, Yueyue Dai:
Revenue-maximizing virtualized network function chain placement in dynamic environment. 650-661 - Chaoze Lu, Guosun Zeng, Ying-jie Xie:

Bigraph specification of software architecture and evolution analysis in mobile computing environment. 662-676
- Ying Gao, Xiaoqiang Wu, Wei Yan, Lei Zhang, Tunhua Wu:

Dynamic network embedding enhanced advisor-advisee relationship identification based on internet of scholars. 677-686
- Zafar Iqbal, Zahid Anwar:

SCERM - A novel framework for automated management of cyber threat response activities. 687-708
- Wenjing Xiao, Miao Li, Min Chen, Ahmed Barnawi:

Deep interaction: Wearable robot-assisted emotion communication for enhancing perception and expression ability of children with Autism Spectrum Disorders. 709-716
- Eslam B. Ali

, Sherif S. Kishk
, Ehab H. Abdelhay
:
Multidimensional auction for task allocation using computation offloading in fifth generation networks. 717-725
- Feras M. Awaysheh, Mamoun Alazab

, Maanak Gupta, Tomás F. Pena, José Carlos Cabaleiro
:
Next-generation big data federation access control: A reference model. 726-741
- Rasoul Rahmani, Irene Moser, Antonio L. Cricenti:

Modelling and optimisation of microgrid configuration for green data centres: A metaheuristic approach. 742-750
- Faten Fakhfakh, Mohamed Tounsi

, Mohamed Mosbah
:
Modeling and Proving Distributed Algorithms for Dynamic Graphs. 751-761
- Dario Madeo, Somnath Mazumdar

, Chiara Mocenni
, Roberto Zingone:
Evolutionary game for task mapping in resource constrained heterogeneous environments. 762-776
- Omowunmi E. Isafiade, Antoine B. Bagula:

Series mining for public safety advancement in emerging smart cities. 777-802
- Sandhya Mishra

, Devpriya Soni:
Smishing Detector: A security model to detect smishing through SMS content analysis and URL behavior analysis. 803-815
- Adnan Sajid, Bilal Khalid, Mudassar Ali, Shahid Mumtaz

, Usman Masud
, Farhan Qamar
:
Securing Cognitive Radio Networks using blockchains. 816-826
- Damian Arellanes

, Kung-Kiu Lau:
Evaluating IoT service composition mechanisms for the scalability of IoT systems. 827-848 - D. Pradeep

, C. Sundar:
QAOC: Novel query analysis and ontology-based clustering for data management in Hadoop. 849-860 - Lassana Coulibaly

, Bernard Kamsu-Foguem, Fana Tangara
:
Rule-based machine learning for knowledge discovering in weather data. 861-878
- Paolo Bellavista

, Kaoru Ota
, Zhihan Lv
, Irfan Mehmood, Seungmin Rho:
Towards smarter cities: Learning from Internet of Multimedia Things-generated big data. 879-881 - Marisol García-Valls

, Christian Calva-Urrego, Ana García-Fornes
:
Accelerating smart eHealth services execution at the fog computing infrastructure. 882-893 - Bo-Wei Chen:

Incomplete data classification - Fisher Discriminant Ratios versus Welch Discriminant Ratios. 894-908 - Aakanksha Tewari, Brij B. Gupta

:
Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework. 909-920 - Anish Jindal

, Neeraj Kumar
, Mukesh Singh:
A unified framework for big data acquisition, storage, and analytics for demand response management in smart cities. 921-934 - Shabir A. Parah

, Javaid A. Sheikh
, Jahangir A. Akhoon, Nazir A. Loan:
Electronic Health Record hiding in Images for smart city applications: A computationally efficient and reversible information hiding technique for secure communication. 935-949 - Maitreyee Dey

, Soumya Prakash Rana
, Sandra E. M. Dudley
:
Smart building creation in large scale HVAC environments through automated fault detection and diagnosis. 950-966 - Shangguang Wang

, Chuntao Ding, Ching-Hsien Hsu, Fangchun Yang:
Dimensionality reduction via preserving local information. 967-975 - Jiachen Yang, Yurong Han, Yafang Wang, Bin Jiang, Zhihan Lv

, Houbing Song
:
Optimization of real-time traffic network assignment based on IoT data using DBN and clustering model in smart city. 976-986 - Yicong Gao, Zixian Zhang, Yixiong Feng, Maria Savchenko, Ichiro Hagiwara, Hao Zheng:

Flexible mesh morphing in sustainable design using data mining and mesh subdivision. 987-994 - Muhammad Sajjad, Mansoor Nasir, Khan Muhammad

, Siraj Khan, Zahoor Jan, Arun Kumar Sangaiah
, Mohamed Elhoseny
, Sung Wook Baik
:
Raspberry Pi assisted face recognition framework for enhanced law-enforcement services in smart cities. 995-1007 - Rahul Raman

, Pankaj Kumar Sa
, Sambit Bakshi
, Banshidhar Majhi:
Kinesiology-inspired estimation of pedestrian walk direction for smart surveillance. 1008-1026 - Rajiv Ranjan, Lydia Y. Chen, Prem Prakash Jayaraman

, Albert Y. Zomaya
:
A note on advances in scheduling algorithms for Cyber-Physical-Social workflows. 1027-1029 - Reem Y. Ali, Shashi Shekhar, Shounak Athavale, Eric D. Marsman

:
ULAMA: A Utilization-Aware Matching Approach for robust on-demand spatial service brokers. 1030-1048 - Shangguang Wang

, Yan Guo, Yan Li, Ching-Hsien Hsu:
Cultural distance for service composition in cyber-physical-social systems. 1049-1057 - Anish Jindal

, Neeraj Kumar
, Mukesh Singh:
Internet of energy-based demand response management scheme for smart homes and PHEVs using SVM. 1058-1068 - Shijian Li, Minhao Shi, Runhe Huang, Xinwei Chen, Gang Pan

:
Perception-enhancement based task learning and action scheduling for robotic limb in CPS environment. 1069-1083 - Yiping Wen, Jianxun Liu, Wanchun Dou, Xiaolong Xu

, Buqing Cao, Jinjun Chen:
Scheduling workflows with privacy protection constraints for big data applications on cloud. 1084-1091 - Gonzalo De La Torre Parra, Paul Rad, Kim-Kwang Raymond Choo

:
Driverless vehicle security: Challenges and future research opportunities. 1092-1111 - Hong Yao, Muzhou Xiong, Hui Li, Lin Gu, Deze Zeng:

Joint optimization of function mapping and preemptive scheduling for service chains in network function virtualization. 1112-1118 - Liwei Huang, Yutao Ma

, Yanbo Liu, Arun Kumar Sangaiah
:
Multi-modal Bayesian embedding for point-of-interest recommendation on location-based cyber-physical-social networks. 1119-1128 - Jian Shen

, Chen Wang
, Anxi Wang
, Qi Liu, Yang Xiang
:
Moving centroid based routing protocol for incompletely predictable cyber devices in Cyber-Physical-Social Distributed Systems. 1129-1139 - Chinnapong Angsuchotmetee

, Richard Chbeir, Yudith Cardinale
:
MSSN-Onto: An ontology-based approach for flexible event processing in Multimedia Sensor Networks. 1140-1158 - Henri E. Bal, Arindam Pal:

Parallel and Distributed Machine Learning Algorithms for Scalable Big Data Analytics. 1159-1161 - Nitin A. Gawande

, Jeff A. Daily
, Charles Siegel, Nathan R. Tallent
, Abhinav Vishnu:
Scaling Deep Learning workloads: NVIDIA DGX-1/Pascal and Intel Knights Landing. 1162-1172 - Thomas P. Parnell, Celestine Dünner, Kubilay Atasu

, Manolis Sifalakis
, Haralampos Pozidis:
Tera-scale coordinate descent on GPUs. 1173-1191 - Jing Chen, Jianbin Fang

, Weifeng Liu
, Tao Tang, Canqun Yang:
clMF: A fine-grained and portable alternating least squares algorithm for parallel matrix factorization. 1192-1205 - Yuchen Qiao, Kazuma Hashimoto, Akiko Eriguchi, Haixia Wang, Dongsheng Wang, Yoshimasa Tsuruoka, Kenjiro Taura

:
Parallelizing and optimizing neural Encoder-Decoder models without padding on multi-core architecture. 1206-1213 - Yin Zhang

, Haider Abbas
:
Special issue: Cognitive Internet of Things assisted by cloud computing and big data. 1214-1216 - Ziad A. Al-Sharif

, Mohammed I. Al-Saleh
, Luay Alawneh
, Yaser Jararweh, Brij B. Gupta
:
Live forensics of software attacks on cyber-physical systems. 1217-1229 - Yan Hu, Hong Li, Tom H. Luan

, An Yang
, Limin Sun, Zhiliang Wang, Rui Wang:
Detecting stealthy attacks on industrial control systems using a permutation entropy-based method. 1230-1240 - Valentin Tudor

, Vincenzo Gulisano
, Magnus Almgren
, Marina Papatriantafilou:
BES: Differentially private event aggregation for large-scale IoT-based systems. 1241-1257 - Weizhi Meng

, Wenjuan Li
, Yu Wang
, Man Ho Au
:
Detecting insider attacks in medical cyber-physical networks based on behavioral profiling. 1258-1266 - Sravani Challa, Ashok Kumar Das

, Prosanta Gope, Neeraj Kumar
, Fan Wu
, Athanasios V. Vasilakos
:
Design and analysis of authenticated key agreement scheme in cloud-assisted cyber-physical systems. 1267-1286 - Jian Xu

, Laiwen Wei, Wei Wu, Andi Wang, Yu Zhang, Fucai Zhou:
Privacy-preserving data integrity verification by using lightweight streaming authenticated data structures for healthcare cyber-physical system. 1287-1296 - Tianqing Zhu, Ping Xiong, Gang Li

, Wanlei Zhou
, Philip S. Yu:
Differentially private model publishing in cyber physical systems. 1297-1306 - Tianqi Zhou, Jian Shen

, Xiong Li
, Chen Wang
, Haowen Tan
:
Logarithmic encryption scheme for cyber-physical systems employing Fibonacci Q-matrix. 1307-1313 - Heng Ye, Jiqiang Liu, Wei Wang, Ping Li, Tong Li, Jin Li:

Secure and efficient outsourcing differential privacy data release scheme in Cyber-physical system. 1314-1323 - Yiting Zhang, Ming Yang, Zhen Ling

, Yaowen Liu, Wenjia Wu:
FingerAuth: 3D magnetic finger motion pattern based implicit authentication for mobile devices. 1324-1337 - Zhiwei Zhang, Xiaofeng Chen, Jianfeng Ma, Jian Shen

:
SLDS: Secure and location-sensitive data sharing scheme for cloud-assisted Cyber-Physical Systems. 1338-1349 - (Withdrawn) Erratum to "Smart health monitoring and management system: Toward autonomous wearable sensing for Internet of Things using big data analytics [Future Gener. Comput. Syst. 91 (2019) 611-619]". 1350-1359


manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














