


default search action
Future Generation Computer Systems, Volume 148
Volume 148, November 2023
- Meng Chen
, Jiaxin Hou, Yongpan Sheng
, Yingbo Wu, Sen Wang, Jianyuan Lu
, Qilin Fan:
HA-D3QN: Embedding virtual private cloud in cloud data centers with heuristic assisted deep reinforcement learning. 1-14 - Jin Wang
, Hui Xiao, Shuwen Zhong, Yinhao Xiao:
DeepVulSeeker: A novel vulnerability identification framework via code graph structure and pre-training mechanism. 15-26 - Xiangying Zhang, Pai Zheng, Tao Peng
, Dai Li, Xujun Zhang, Renzhong Tang:
Privacy-preserving activity recognition using multimodal sensors in smart office. 27-38 - Jannis Klinkenberg
, Anara Kozhokanova, Christian Terboven, Clément Foyer
, Brice Goglin, Emmanuel Jeannot:
H2M: Exploiting Heterogeneous Shared Memory Architectures. 39-55
- Xiurui Xie, Maojun Tian, Guangchun Luo, Guisong Liu
, Yizhe Wu, Ke Qin:
Active learning in multi-label image classification with graph convolutional network embedding. 56-65 - Zhongming Han
, Xuelian Jin
, Haozhen Xing, Weijie Yang, Haitao Xiong
:
An effective heterogeneous information network representation learning framework. 66-78
- Amir Reshadinezhad
, Mohammad Reza Khayyambashi
, Naser Movahedinia
:
An efficient adaptive cache management scheme for named data networks. 79-92
- Gianni D'Angelo, Eslam Farsimadan
, Massimo Ficco, Francesco Palmieri
, Antonio Robustelli:
Privacy-preserving malware detection in Android-based IoT devices through federated Markov chains. 93-105
- Ji Liu, Zhihua Wu
, Danlei Feng, Minxu Zhang, Xinxuan Wu, Xuefeng Yao, Dianhai Yu, Yanjun Ma, Feng Zhao, Dejing Dou:
HeterPS: Distributed deep learning with reinforcement learning based scheduling in heterogeneous environments. 106-117
- Fahd N. Al-Wesabi, Hanan Abdullah Mengash, Radwa Marzouk, Nuha Alruwais, Randa Allafi, Rana Alabdan, Meshal Alharbi, Deepak Gupta:
Pelican Optimization Algorithm with Federated Learning Driven Attack Detection model in Internet of Things environment. 118-127
- Liang Jiang
, Jingjing Yao, Leilei Shi, Zixuan Han:
A fusion recommendation model based on mutual information and attention learning in heterogeneous social networks. 128-138
- Zhongcheng Lei, Hong Zhou, Wenshan Hu
, Guo-Ping Liu
:
Concurrent experimentation in NCSLab: A scalable approach for online laboratories. 139-149
- Michal Orzechowski
, Michal Wrzeszcz
, Bartosz Kryza
, Lukasz Dutka
, Renata G. Slota
, Jacek Kitowski
:
Indexing legacy data-sets for global access and processing in multi-cloud environments. 150-159
- Xiaobo Yang
, Daosen Zhai, Ruonan Zhang, Haotong Cao, Sahil Garg, Mohammad Mehedi Hassan:
Human-to-human interaction behaviors sensing based on complex-valued neural network using Wi-Fi channel state information. 160-172
- Spyridon Chouliaras
, Stelios Sotiriadis
:
An adaptive auto-scaling framework for cloud resource provisioning. 173-183
- Nafiseh Soveizi
, Fatih Turkmen
, Dimka Karastoyanova:
Security and privacy concerns in cloud-based scientific and business workflows: A systematic review. 184-200
- Guodong Ye, Xin Liu
, Siqi Fan, Yuan Tan
, Qingguo Zhou, Rui Zhou, Xiaokang Zhou:
Novel supply chain vulnerability detection based on heterogeneous-graph-driven hash similarity in IoT. 201-210
- Youssef Amin
, Christian Gianoglio
, Maurizio Valle:
Embedded real-time objects' hardness classification for robotic grippers. 211-224
- Premkumar Chithaluru, Aman Singh
, Jagjit Singh Dhatterwal, Ali Hassan Sodhro, Marwan Ali Albahar
, Anca Jurcut
, Ahmed Alkhayyat:
An Optimized Privacy Information Exchange Schema for Explainable AI Empowered WiMAX-based IoT networks. 225-239
- Guojia Wan
, Zhengyun Zhou, Zhigao Zheng, Bo Du:
Sub-Entity Embedding for inductive spatio-temporal knowledge graph completion. 240-249
- Saeed Hamood Alsamhi
, Alexey V. Shvetsov
, Ammar Hawbani, Svetlana V. Shvetsova, Santosh Kumar, Liang Zhao:
Survey on Federated Learning enabling indoor navigation for industry 4.0 in B5G. 250-265
- Cheick Tidiane Ba
, Matteo Zignani, Sabrina Gaito:
Cooperative behavior in blockchain-based complementary currency networks through time: The Sarafu case study. 266-279
- Luxia Fu, Zhuang Zhang, Liang Tan
, Zhengyi Yao
, Hongxin Tan, Jingxue Xie, Kun She:
Blockchain-enabled device command operation security for Industrial Internet of Things. 280-297 - Zhenli He
, Yanan Xu
, Di Liu
, Wei Zhou
, Keqin Li
:
Energy-efficient computation offloading strategy with task priority in cloud assisted multi-access edge computing. 298-313 - Yanqi Gong, Kun Bian, Fei Hao, Yifei Sun, Yulei Wu
:
Dependent tasks offloading in mobile edge computing: A multi-objective evolutionary optimization strategy. 314-325
- Fasee Ullah
, Chi-Man Pun, Omprakash Kaiwartya, Ali Safaa Sadiq, Jaime Lloret
, Mohammed Ali:
HIDE-Healthcare IoT Data Trust ManagEment: Attribute centric intelligent privacy approach. 326-341
- Bo Yin
, Peng Zhang, Binyao Xu, Hang Chen, Youlin Ji:
Crowd-enabled multiple Pareto-optimal queries for multi-criteria decision-making services. 342-356
- Shuzhe Li, Wei Chen, Bingqi Yan, Zhen Li, Shunzhi Zhu, Yanwei Yu
:
Self-supervised contrastive representation learning for large-scale trajectories. 357-366 - Beibei Li
, Yujie Chang, Hanyuan Huang, Wenshan Li, Tao Li, Wen Chen:
Artificial immunity based distributed and fast anomaly detection for Industrial Internet of Things. 367-379
- Aaliya Sarfaraz
, Ripon K. Chakrabortty
, Daryl Leslie Essam:
AccessChain: An access control framework to protect data access in blockchain enabled supply chain. 380-394 - Imen Tounsi, Abdessamad Saidi
, Mohamed Hadj Kacem, Ahmed Hadj Kacem:
Internet of Things design patterns modeling proven correct by construction: Application to aged care solution. 395-407
- Yanling Wang
, Qian Wang
, Lingchen Zhao, Cong Wang:
Differential privacy in deep learning: Privacy and beyond. 408-424
- Roberto Román
, Rosario Arjona
, Iluminada Baturone
:
A lightweight remote attestation using PUFs and hash-based signatures for low-end IoT devices. 425-435 - Zijia Mo
, Zhipeng Gao, Kaile Xiao
, Chen Zhao
, Xinlei Yu
:
IDDANet: An Input-Driven Dynamic Adaptive Network ensemble method for edge intelligence. 436-445 - Paulo Souza
, Tiago Ferreto
, Rodrigo N. Calheiros
:
EdgeSimPy: Python-based modeling and simulation of edge computing resource management policies. 446-459 - Yu Liu
, Yunchuan Guan
, Tianming Jiang
, Ke Zhou, Hua Wang, Guangxing Hu, Ji Zhang, Wei Fang, Zhuo Cheng, Ping Huang:
SPAE: Lifelong disk failure prediction via end-to-end GAN-based anomaly detection with ensemble update. 460-471
- Ayesha Afzal
, Georg Hager, Stefano Markidis, Gerhard Wellein:
Making applications faster by asynchronous execution: Slowing down processes or relaxing MPI collectives. 472-487
- Huy-Tan Thai
, Kim-Hung Le
, Ngan Luu-Thuy Nguyen:
Towards sustainable agriculture: A lightweight hybrid model and cloud-based collection of datasets for efficient leaf disease detection. 488-500 - Walter Lohman
, Hans Cornelissen, Jeroen Borst, Ralph Klerkx, Yashar Araghi, Erwin Walraven:
Building digital twins of cities using the Inter Model Broker framework. 501-513
- Francisco Orts
, Antonio Manuel Puertas
, Gloria Ortega, Ester M. Garzón:
Quantum annealing solution for the unrelated parallel machine scheduling with priorities and delay of task switching on machines. 514-523
- Fang Zuo
, Yajie Li
, Guanghui Wang
, Xin He
:
Towards accurate and privacy-preserving localization using anchor quality assessment in Internet of Things. 524-537 - Baoshan Lu
, Junli Fang
, Xuemin Hong, Jianghong Shi:
Energy-efficient task scheduling for mobile edge computing with virtual machine I/O interference. 538-549 - Theodoros-Thirimachos Davarakis, Georgios Palaiokrassas
, Antonios Litke
, Theodora A. Varvarigou:
Reinforcement learning with smart contracts on blockchains. 550-563 - Fatemeh Abdi, Mahmood Ahmadi
, Montajab Ghanem:
AM-IF: Adaptive Multi-Path Interest Forwarding in named data networking. 564-583 - Chenggang Shan
, Yuanqing Xia, Yufeng Zhan, Jinhui Zhang:
KubeAdaptor: A docking framework for workflow containerization on Kubernetes. 584-599
- Jinshu Huang
, Haidong Xie, Chunlin Wu, Xueshuang Xiang:
Union label smoothing adversarial training: Recognize small perturbation attacks and reject larger perturbation attacks balanced. 600-609
- Shanming Wei, Shunmei Meng, Qianmu Li, Xiaokang Zhou, Lianyong Qi, Xiaolong Xu:
Edge-enabled federated sequential recommendation with knowledge-aware Transformer. 610-622
- Lukasz Szustak
, Marcin Lawenda
, Sebastian Arming, Gregor Bankhamer, Christoph Schweimer
, Robert Elsässer:
Profiling and optimization of Python-based social sciences applications on HPC systems by means of task and data parallelism. 623-635
- Retraction notice to "Multi-spectral and panchromatic image fusion approach using stationary wavelet transform and swarm flower pollination optimization for remote sensing applications" [Future Gener. Comput. Syst. 88 (2018) 501-511]. 636

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.