default search action
Future Generation Computer Systems, Volume 132
Volume 132, July 2022
- Linhao Cong, Jia Yu, Xinrui Ge:
Enabling efficient privacy-preserving subgraph isomorphic query over graphs. 1-10 - Jixian Zhang, Wenlu Lou, Hao Sun, Qian Su, Weidong Li:
Truthful auction mechanisms for resource allocation in the Internet of Vehicles with public blockchain networks. 11-24 - Ziheng Wang, Heng Chen, Xiaoshe Dong, Weilin Cai, Xingjun Zhang:
LogSC: Model-based one-sided communication performance estimation. 25-39 - Jia Wei, Xingjun Zhang, Zeyu Ji, Zheng Wei, Jingbo Li:
DPLRS: Distributed Population Learning Rate Schedule. 40-50 - Taehoon Kim, Wooguil Pak:
Real-time network intrusion detection using deferred decision and hybrid classifier. 51-66 - Lu Zhou, Ye Zhu, Tianrui Zong, Yong Xiang:
A feature selection-based method for DDoS attack flow classification. 67-79 - Roberto Rodrigues Filho, Barry Porter:
Hatch: Self-distributing systems for data centers. 80-92 - Bonsu Adjei-Arthur, Jianbin Gao, Qi Xia, Eliezer da Silva Tavares, Hu Xia, Sandro Amofa, Yu Wang:
A blockchain-adaptive contractual approach for multi-contracting organizational entities. 93-107 - Christian Ponte-Fernández, Jorge González-Domínguez, María J. Martín:
A SIMD algorithm for the detection of epistatic interactions of any order. 108-123 - Jemin Lee, Misun Yu, Yongin Kwon, Taeho Kim:
Quantune: Post-training quantization of convolutional neural networks using extreme gradient boosting for fast deployment. 124-135 - Roberto Tardío, Alejandro Maté, Juan Trujillo:
Beyond TPC-DS, a benchmark for Big Data OLAP systems (BDOLAP-Bench). 136-151 - Weichu Xiao, Hongli Liu, Ziji Ma, Weihong Chen:
Attention-based deep neural network for driver behavior recognition. 152-161 - Xiaoyan Hu, Cheng Zhu, Zhongqi Tong, Wenjie Gao, Guang Cheng, Ruidong Li, Hua Wu, Jian Gong:
Identifying Ethereum traffic based on an active node library and DEVp2p features. 162-177 - Uzma Maroof, Arash Shaghaghi, Regio A. Michelin, Sanjay K. Jha:
iRECOVer: Patch your IoT on-the-fly. 178-193 - Hongling Jiang, Jinzhi Lin, Haiyan Kang:
FGMD: A robust detector against adversarial attacks in the IoT network. 194-210 - Mehboob Hussain, Lian-Fu Wei, Amir Rehman, Fakhar Abbas, Abid Hussain, Muqadar Ali:
Deadline-constrained energy-aware workflow scheduling in geographically distributed cloud data centers. 211-222
- Martin Charachon, Paul-Henry Cournède, Céline Hudelot, Roberto Ardon:
Leveraging conditional generative models in a general explanation framework of classifier decisions. 223-238
- Tarek Zaarour, Edward Curry:
SemanticPeer: A distributional semantic peer-to-peer lookup protocol for large content spaces at internet-scale. 239-253 - Wenbo Zhang, Yayu Bai, Jingyu Feng:
TIIA: A blockchain-enabled Threat Intelligence Integrity Audit scheme for IIoT. 254-265
- Runze Yan, Whitney R. Ringwald, Julio Vega, Madeline Kehl, Sangwon Bae, Anind K. Dey, Carissa A. Low, Aidan G. C. Wright, Afsaneh Doryab:
Exploratory machine learning modeling of adaptive and maladaptive personality traits from passively sensed behavior. 266-281
- Ivan Livaja, Kresimir Pripuzic, Sinisa Sovilj, Marin Vukovic:
A distributed geospatial publish/subscribe system on Apache Spark. 282-298 - Jian Su, Leyou Zhang, Yi Mu:
BA-RMKABSE: Blockchain-aided Ranked Multi-keyword Attribute-based Searchable Encryption with Hiding Policy for Smart Health System. 299-309
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.