


default search action
Future Generation Computer Systems, Volume 148
Volume 148, November 2023
- Meng Chen

, Jiaxin Hou, Yongpan Sheng
, Yingbo Wu, Sen Wang, Jianyuan Lu
, Qilin Fan:
HA-D3QN: Embedding virtual private cloud in cloud data centers with heuristic assisted deep reinforcement learning. 1-14 - Jin Wang

, Hui Xiao, Shuwen Zhong, Yinhao Xiao:
DeepVulSeeker: A novel vulnerability identification framework via code graph structure and pre-training mechanism. 15-26 - Xiangying Zhang, Pai Zheng, Tao Peng

, Dai Li, Xujun Zhang, Renzhong Tang:
Privacy-preserving activity recognition using multimodal sensors in smart office. 27-38 - Jannis Klinkenberg

, Anara Kozhokanova, Christian Terboven, Clément Foyer
, Brice Goglin, Emmanuel Jeannot:
H2M: Exploiting Heterogeneous Shared Memory Architectures. 39-55
- Xiurui Xie, Maojun Tian, Guangchun Luo, Guisong Liu

, Yizhe Wu, Ke Qin:
Active learning in multi-label image classification with graph convolutional network embedding. 56-65 - Zhongming Han

, Xuelian Jin
, Haozhen Xing, Weijie Yang, Haitao Xiong
:
An effective heterogeneous information network representation learning framework. 66-78
- Amir Reshadinezhad

, Mohammad Reza Khayyambashi
, Naser Movahedinia
:
An efficient adaptive cache management scheme for named data networks. 79-92
- Gianni D'Angelo, Eslam Farsimadan

, Massimo Ficco, Francesco Palmieri
, Antonio Robustelli:
Privacy-preserving malware detection in Android-based IoT devices through federated Markov chains. 93-105
- Ji Liu, Zhihua Wu

, Danlei Feng, Minxu Zhang, Xinxuan Wu, Xuefeng Yao, Dianhai Yu, Yanjun Ma, Feng Zhao, Dejing Dou:
HeterPS: Distributed deep learning with reinforcement learning based scheduling in heterogeneous environments. 106-117
- Fahd N. Al-Wesabi, Hanan Abdullah Mengash, Radwa Marzouk, Nuha Alruwais, Randa Allafi, Rana Alabdan, Meshal Alharbi, Deepak Gupta:

Pelican Optimization Algorithm with Federated Learning Driven Attack Detection model in Internet of Things environment. 118-127
- Liang Jiang

, Jingjing Yao, Leilei Shi, Zixuan Han:
A fusion recommendation model based on mutual information and attention learning in heterogeneous social networks. 128-138
- Zhongcheng Lei, Hong Zhou, Wenshan Hu

, Guo-Ping Liu
:
Concurrent experimentation in NCSLab: A scalable approach for online laboratories. 139-149
- Michal Orzechowski

, Michal Wrzeszcz
, Bartosz Kryza
, Lukasz Dutka
, Renata G. Slota
, Jacek Kitowski
:
Indexing legacy data-sets for global access and processing in multi-cloud environments. 150-159
- Xiaobo Yang

, Daosen Zhai, Ruonan Zhang, Haotong Cao, Sahil Garg, Mohammad Mehedi Hassan:
Human-to-human interaction behaviors sensing based on complex-valued neural network using Wi-Fi channel state information. 160-172
- Spyridon Chouliaras

, Stelios Sotiriadis
:
An adaptive auto-scaling framework for cloud resource provisioning. 173-183
- Nafiseh Soveizi

, Fatih Turkmen
, Dimka Karastoyanova:
Security and privacy concerns in cloud-based scientific and business workflows: A systematic review. 184-200
- Guodong Ye, Xin Liu

, Siqi Fan, Yuan Tan
, Qingguo Zhou, Rui Zhou, Xiaokang Zhou:
Novel supply chain vulnerability detection based on heterogeneous-graph-driven hash similarity in IoT. 201-210
- Youssef Amin

, Christian Gianoglio
, Maurizio Valle:
Embedded real-time objects' hardness classification for robotic grippers. 211-224
- Premkumar Chithaluru, Aman Singh

, Jagjit Singh Dhatterwal, Ali Hassan Sodhro, Marwan Ali Albahar
, Anca Jurcut
, Ahmed Alkhayyat:
An Optimized Privacy Information Exchange Schema for Explainable AI Empowered WiMAX-based IoT networks. 225-239
- Guojia Wan

, Zhengyun Zhou, Zhigao Zheng, Bo Du:
Sub-Entity Embedding for inductive spatio-temporal knowledge graph completion. 240-249
- Saeed Hamood Alsamhi

, Alexey V. Shvetsov
, Ammar Hawbani, Svetlana V. Shvetsova, Santosh Kumar, Liang Zhao:
Survey on Federated Learning enabling indoor navigation for industry 4.0 in B5G. 250-265
- Cheick Tidiane Ba

, Matteo Zignani, Sabrina Gaito:
Cooperative behavior in blockchain-based complementary currency networks through time: The Sarafu case study. 266-279
- Luxia Fu, Zhuang Zhang, Liang Tan

, Zhengyi Yao
, Hongxin Tan, Jingxue Xie, Kun She:
Blockchain-enabled device command operation security for Industrial Internet of Things. 280-297 - Zhenli He

, Yanan Xu
, Di Liu
, Wei Zhou
, Keqin Li
:
Energy-efficient computation offloading strategy with task priority in cloud assisted multi-access edge computing. 298-313 - Yanqi Gong, Kun Bian, Fei Hao, Yifei Sun, Yulei Wu

:
Dependent tasks offloading in mobile edge computing: A multi-objective evolutionary optimization strategy. 314-325
- Fasee Ullah

, Chi-Man Pun, Omprakash Kaiwartya, Ali Safaa Sadiq, Jaime Lloret
, Mohammed Ali:
HIDE-Healthcare IoT Data Trust ManagEment: Attribute centric intelligent privacy approach. 326-341
- Bo Yin

, Peng Zhang, Binyao Xu, Hang Chen, Youlin Ji:
Crowd-enabled multiple Pareto-optimal queries for multi-criteria decision-making services. 342-356
- Shuzhe Li, Wei Chen, Bingqi Yan, Zhen Li, Shunzhi Zhu, Yanwei Yu

:
Self-supervised contrastive representation learning for large-scale trajectories. 357-366 - Beibei Li

, Yujie Chang, Hanyuan Huang, Wenshan Li, Tao Li, Wen Chen:
Artificial immunity based distributed and fast anomaly detection for Industrial Internet of Things. 367-379
- Aaliya Sarfaraz

, Ripon K. Chakrabortty
, Daryl Leslie Essam:
AccessChain: An access control framework to protect data access in blockchain enabled supply chain. 380-394 - Imen Tounsi, Abdessamad Saidi

, Mohamed Hadj Kacem, Ahmed Hadj Kacem:
Internet of Things design patterns modeling proven correct by construction: Application to aged care solution. 395-407
- Yanling Wang

, Qian Wang
, Lingchen Zhao, Cong Wang:
Differential privacy in deep learning: Privacy and beyond. 408-424
- Roberto Román

, Rosario Arjona
, Iluminada Baturone
:
A lightweight remote attestation using PUFs and hash-based signatures for low-end IoT devices. 425-435 - Zijia Mo

, Zhipeng Gao, Kaile Xiao
, Chen Zhao
, Xinlei Yu
:
IDDANet: An Input-Driven Dynamic Adaptive Network ensemble method for edge intelligence. 436-445 - Paulo Souza

, Tiago Ferreto
, Rodrigo N. Calheiros
:
EdgeSimPy: Python-based modeling and simulation of edge computing resource management policies. 446-459 - Yu Liu

, Yunchuan Guan
, Tianming Jiang
, Ke Zhou, Hua Wang, Guangxing Hu, Ji Zhang, Wei Fang, Zhuo Cheng, Ping Huang:
SPAE: Lifelong disk failure prediction via end-to-end GAN-based anomaly detection with ensemble update. 460-471
- Ayesha Afzal

, Georg Hager, Stefano Markidis, Gerhard Wellein:
Making applications faster by asynchronous execution: Slowing down processes or relaxing MPI collectives. 472-487
- Huy-Tan Thai

, Kim-Hung Le
, Ngan Luu-Thuy Nguyen:
Towards sustainable agriculture: A lightweight hybrid model and cloud-based collection of datasets for efficient leaf disease detection. 488-500 - Walter Lohman

, Hans Cornelissen, Jeroen Borst, Ralph Klerkx, Yashar Araghi, Erwin Walraven:
Building digital twins of cities using the Inter Model Broker framework. 501-513
- Francisco Orts

, Antonio Manuel Puertas
, Gloria Ortega, Ester M. Garzón:
Quantum annealing solution for the unrelated parallel machine scheduling with priorities and delay of task switching on machines. 514-523
- Fang Zuo

, Yajie Li
, Guanghui Wang
, Xin He
:
Towards accurate and privacy-preserving localization using anchor quality assessment in Internet of Things. 524-537 - Baoshan Lu

, Junli Fang
, Xuemin Hong, Jianghong Shi:
Energy-efficient task scheduling for mobile edge computing with virtual machine I/O interference. 538-549 - Theodoros-Thirimachos Davarakis, Georgios Palaiokrassas

, Antonios Litke
, Theodora A. Varvarigou:
Reinforcement learning with smart contracts on blockchains. 550-563 - Fatemeh Abdi, Mahmood Ahmadi

, Montajab Ghanem:
AM-IF: Adaptive Multi-Path Interest Forwarding in named data networking. 564-583 - Chenggang Shan

, Yuanqing Xia, Yufeng Zhan, Jinhui Zhang:
KubeAdaptor: A docking framework for workflow containerization on Kubernetes. 584-599
- Jinshu Huang

, Haidong Xie, Chunlin Wu, Xueshuang Xiang:
Union label smoothing adversarial training: Recognize small perturbation attacks and reject larger perturbation attacks balanced. 600-609
- Shanming Wei, Shunmei Meng, Qianmu Li, Xiaokang Zhou, Lianyong Qi, Xiaolong Xu:

Edge-enabled federated sequential recommendation with knowledge-aware Transformer. 610-622
- Lukasz Szustak

, Marcin Lawenda
, Sebastian Arming, Gregor Bankhamer, Christoph Schweimer
, Robert Elsässer:
Profiling and optimization of Python-based social sciences applications on HPC systems by means of task and data parallelism. 623-635
- Retraction notice to "Multi-spectral and panchromatic image fusion approach using stationary wavelet transform and swarm flower pollination optimization for remote sensing applications" [Future Gener. Comput. Syst. 88 (2018) 501-511]. 636


manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














