


default search action
Future Generation Computer Systems, Volume 137
Volume 137, December 2022
- Xingqiu He

, Yuhang Shen
, Jing Ren, Sheng Wang, Xiong Wang, Shizhong Xu:
An online auction-based incentive mechanism for soft-deadline tasks in Collaborative Edge Computing. 1-13 - Amanda Jayanetti

, Saman K. Halgamuge
, Rajkumar Buyya:
Deep reinforcement learning for energy and time optimized scheduling of precedence-constrained tasks in edge-cloud computing environments. 14-30 - Min Zhu, Han Yu

, Zhiyuan Liu, Bingqing Shen, Lihong Jiang, Hongming Cai:
An intelligent collaboration framework of IoT applications based on event logic graph. 31-41
- Huijie Yang, Pandi Vijayakumar, Jian Shen

, Brij B. Gupta
:
A location-based privacy-preserving oblivious sharing scheme for indoor navigation. 42-52
- Yunseong Lee

, Arooj Masood, Wonjong Noh, Sungrae Cho
:
DQN based user association control in hierarchical mobile edge computing systems for mobile IoT services. 53-69
- Asan Baker Kanbar, Kamaran Faraj:

Region aware dynamic task scheduling and resource virtualization for load balancing in IoT-fog multi-cloud environment. 70-86
- Zehua Guo, Liangjie Liu, Mofan Feng, Kai Su, Runqiu Chi, Keyi Li

, Qing Lu, Xianbin Su
, Lin-Tai Da, Song Cao, Mingxuan Zhang, Luming Meng
, Dan Cao, Jiayi Wang, Guang He, Yi Shi
:
3D genome assisted protein-protein interaction prediction. 87-96
- Behrooz Zolfaghari

, Saeid Abrishami
:
A multi-class workflow ensemble management system using on-demand and spot instances in cloud. 97-110 - Yunyun Cai

, Wei Xi
, Yuhao Shen, Youcheng Peng, Shixuan Song, Jizhong Zhao:
High-efficient hierarchical federated learning on non-IID data with progressive collaboration. 111-128 - Carmine Colarusso

, Antonio De Iasio, Angelo Furno, Lorenzo Goglia, Mohammed Amine Merzoug
, Eugenio Zimeo
:
PROMENADE: A big data platform for handling city complex networks with dynamic graphs. 129-145
- Haiyan Wang, Jiaming Feng

, Ke Li
, Lisi Chen:
Deep understanding of big geospatial data for self-driving: Data, technologies, and systems. 146-163
- Daosen Zhai, Chen Wang, Haotong Cao, Sahil Garg, Mohammad Mehedi Hassan, Salman A. AlQahtani

:
Deep neural network based UAV deployment and dynamic power control for 6G-Envisioned intelligent warehouse logistics system. 164-172
- Yuanyi Chen, Peng Yu

, Zengwei Zheng
, Jiaxing Shen
, Minyi Guo:
Modeling feature interactions for context-aware QoS prediction of IoT services. 173-185
- Wei Wei, Vincenzo Piuri, Witold Pedrycz, Syed Hassan Ahmed

:
Special Issue on Artificial Intelligence-of-Things (AIoT): Opportunities, Challenges, and Solutions-Part II: Artificial-Intelligence-Powered Internet of Things. 186-188
- Xiaojia Song, Tao Xie, Stephen Fischer:

Accelerating kNN search in high dimensional datasets on FPGA by reducing external memory access. 189-200 - Jiahui Li

, Xiaogang Qi, Wenchao Ma, Lifang Liu:
Path selection for link failure protection in hybrid SDNs. 201-215
- Wei Wei, Vincenzo Piuri, Witold Pedrycz, Syed Hassan Ahmed

:
Special Issue on Artificial Intelligence-of-Things (AIoT): Opportunities, Challenges, and Solutions-Part I: Artificial Intelligence Applications in Various Fields. 216-218
- Sang-Hoon Choi

, Ki-Woong Park
:
Cloud-BlackBox: Toward practical recording and tracking of VM swarms for multifaceted cloud inspection. 219-233 - Abukari Mohammed Yakubu, Yi-Ping Phoebe Chen

:
A blockchain-based application for genomic access and variant discovery using smart contracts and homomorphic encryption. 234-247 - Jiexi Wang, Yingxu Lai, Jing Liu:

Stealthy attack detection method based on Multi-feature long short-term memory prediction model. 248-259 - Zhi Xiong

, Min Zhao, Linhui Tan, Lingru Cai:
Real-time power optimization for application server clusters based on Mixed-Integer Programming. 260-273 - Xinxin Hu

, Hongchang Chen
, Shuxin Liu, Haocong Jiang, Guanghan Chu, Ran Li:
BTG: A Bridge to Graph machine learning in telecommunications fraud detection. 274-287
- Kamran Ahmad Awan, Ikram Ud Din

, Ahmad Almogren, Joel J. P. C. Rodrigues:
AutoTrust: A privacy-enhanced trust-based intrusion detection approach for internet of smart things. 288-301
- Luciano Caroprese

, Carmela Comito
, Domenico Talia, Ester Zumpano
:
A fuzzy logic technique for virtual sensor networks. 302-322
- Xin Wang

, Azim Khan, Jianwu Wang
, Aryya Gangopadhyay, Carl E. Busart, Jade Freeman:
An edge-cloud integrated framework for flexible and dynamic stream analytics. 323-335 - Shaoming Duan, Chuanyi Liu

, Zhengsheng Cao, Xiaopeng Jin, Peiyi Han:
Fed-DR-Filter: Using global data representation to reduce the impact of noisy labels on the performance of federated learning. 336-348 - Ke Kong

, Zhaoxin Zhang, Changyong Guo, Jideng Han
, Gang Long:
PMMSA: Security analysis system for android wearable applications based on permission matching and malware similarity analysis. 349-362 - Bassem Sellami

, Akram Hakiri
, Sadok Ben Yahia
:
Deep Reinforcement Learning for energy-aware task offloading in join SDN-Blockchain 5G massive IoT edge network. 363-379
- Bing Jia, Wenling Qiao, Zhaopeng Zong, Shuai Liu

, Mohammad Hijji
, Javier Del Ser, Khan Muhammad
:
A fingerprint-based localization algorithm based on LSTM and data expansion method for sparse samples. 380-393

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














