


default search action
Future Generation Computer Systems, Volume 79
Volumes 79, Part 1, February 2018
- Zhendong Bei, Zhibin Yu, Ni Luo, Chuntao Jiang, Chengzhong Xu  , Shengzhong Feng: , Shengzhong Feng:
 Configuring in-memory cluster computing using random forest. 1-15
- Chuan Zhang, Liehuang Zhu, Chang Xu  , Rongxing Lu: , Rongxing Lu:
 PPDP: An efficient and privacy-preserving disease prediction scheme in cloud-based e-Healthcare system. 16-25
- Baldomero Imbernón  , Javier Prades , Javier Prades , Domingo Giménez, José M. Cecilia , Domingo Giménez, José M. Cecilia , Federico Silla: , Federico Silla:
 Enhancing large-scale docking simulation on heterogeneous systems: An MPI vs rCUDA study. 26-37
- Zhicheng Cai  , Xiaoping Li , Xiaoping Li , Rubén Ruiz , Rubén Ruiz , Qianmu Li: , Qianmu Li:
 Price forecasting for spot instances in Cloud computing. 38-53
- Ali Asghar Rahmanian, Mostafa Ghobaei-Arani  , Sajjad Tofighy: , Sajjad Tofighy:
 A learning automata-based ensemble resource usage prediction algorithm for cloud computing environment. 54-71
- Victor A. E. de Farias, Flávio R. C. Sousa, José Gilvan Rodrigues Maia, João Paulo Pordeus Gomes, Javam C. Machado: 
 Regression based performance modeling and provisioning for NoSQL cloud databases. 72-81
- XinDi Ma, Jianfeng Ma, Hui Li, Qi Jiang  , Sheng Gao , Sheng Gao : :
 ARMOR: A trust-based privacy-preserving framework for decentralized friend recommendation in online social networks. 82-94
- Vishakha Singh  , Indrajeet Gupta , Indrajeet Gupta , Prasanta K. Jana: , Prasanta K. Jana:
 A novel cost-efficient approach for deadline-constrained workflow scheduling by dynamic provisioning of resources. 95-110
- Alexander V. Boukhanovsky, Valeria V. Krzhizhanovskaya  , Marian Bubak , Marian Bubak : :
 Urgent computing for decision support in critical situations. 111-113
- Siew Hoon Leong, Antonio Parodi  , Dieter Kranzlmüller: , Dieter Kranzlmüller:
 Reprint of "A robust reliable energy-aware urgent computing resource allocation for flash-flood ensemble forecasting on HPC infrastructures for decision support". 114-127
- Bartosz Balis  , Robert Brzoza-Woch, Marian Bubak, Marek Kasztelnik, Bartosz Kwolek, Piotr Nawrocki, Piotr Nowakowski, Tomasz Szydlo , Robert Brzoza-Woch, Marian Bubak, Marek Kasztelnik, Bartosz Kwolek, Piotr Nawrocki, Piotr Nowakowski, Tomasz Szydlo , Krzysztof Zielinski: , Krzysztof Zielinski:
 Holistic approach to management of IT infrastructure for environmental monitoring and decision support systems with urgent computing capabilities. 128-143
- Sergey V. Kovalchuk  , Evgeniy Krotov, Pavel A. Smirnov, Denis A. Nasonov, Alexey N. Yakovlev , Evgeniy Krotov, Pavel A. Smirnov, Denis A. Nasonov, Alexey N. Yakovlev : :
 Distributed data-driven platform for urgent decision making in cardiological ambulance control. 144-154
- Vladislav A. Karbovskii  , Daniil V. Voloshin , Daniil V. Voloshin , Andrey Karsakov, Alexey Bezgodov, Carlos Gershenson , Andrey Karsakov, Alexey Bezgodov, Carlos Gershenson : :
 Multimodel agent-based simulation environment for mass-gatherings and pedestrian dynamics. 155-165
- Paola Grosso  , Malathi Veeraraghavan, Brian Tierney, Cees de Laat: , Malathi Veeraraghavan, Brian Tierney, Cees de Laat:
 Editorial INDIS special section FGCS. 166-168
- Sam Nickolay, Eun-Sung Jung  , Rajkumar Kettimuthu, Ian T. Foster: , Rajkumar Kettimuthu, Ian T. Foster:
 Bridging the gap between peak and average loads on science networks. 169-179
- Xiaoban Wu, Peilong Li, Yongyi Ran, Yan Luo: 
 Network measurement for 100 GbE network links using multicore processors. 180-189
- Nicholas Mills, F. Alex Feltus, Walter B. Ligon III: 
 Maximizing the performance of scientific data transfer by optimizing the interface between parallel file systems and advanced research networks. 190-198
- Liang Zhang  , Wenji Wu , Wenji Wu , Phil DeMar, Eric Pouyoul: , Phil DeMar, Eric Pouyoul:
 mdtmFTP and its evaluation on ESNET SDN testbed. 199-204
- Mariam Kiran  , Eric Pouyoul, Anu Mercian, Brian Tierney, Chin Guok, Inder Monga , Eric Pouyoul, Anu Mercian, Brian Tierney, Chin Guok, Inder Monga : :
 Enabling intent to configure scientific networks for high performance demands. 205-214
- Przemyslaw Lenkiewicz  , P. Chris Broekema , P. Chris Broekema , Bernard Metzler: , Bernard Metzler:
 Energy-efficient data transfers in radio astronomy with software UDP RDMA. 215-224
- Joaquin Chung, Eun-Sung Jung  , Rajkumar Kettimuthu, Nageswara S. V. Rao, Ian T. Foster , Rajkumar Kettimuthu, Nageswara S. V. Rao, Ian T. Foster , Russ Clark, Henry L. Owen: , Russ Clark, Henry L. Owen:
 Advance reservation access control using software-defined networking and tokens. 225-234
- Ralph Koning  , Nick Buraglio , Nick Buraglio , Cees de Laat, Paola Grosso , Cees de Laat, Paola Grosso : :
 CoreFlow: Enriching Bro security events using network traffic monitoring data. 235-242
- Jiageng Chen  , Chunhua Su, Kuo-Hui Yeh, Moti Yung: , Chunhua Su, Kuo-Hui Yeh, Moti Yung:
 Special Issue on Advanced Persistent Threat. 243-246
- Christian Javier D'Orazio, Kim-Kwang Raymond Choo  : :
 Circumventing iOS security mechanisms for APT forensic investigations: A security taxonomy for cloud apps. 247-261
- Huaqun Wang, Debiao He  , Yanfei Sun, Neeraj Kumar , Yanfei Sun, Neeraj Kumar , Kim-Kwang Raymond Choo , Kim-Kwang Raymond Choo : :
 PAT: A precise reward scheme achieving anonymity and traceability for crowdcomputing in public clouds. 262-270
- Ayong Ye, Qiuling Chen, Li Xu, Wei Wu: 
 The flexible and privacy-preserving proximity detection in mobile social network. 271-283
- Yuexin Zhang, Yang Xiang, Tao Wang, Wei Wu, Jian Shen  : :
 An over-the-air key establishment protocol using keyless cryptography. 284-294
- Xin Sun, Xishun Zhao, Livio Robaldo  : :
 Norm-based deontic logic for access control, some computational results. 295-302
- Md. Enamul Kabir  , Jiankun Hu , Jiankun Hu , Hua Wang , Hua Wang , Guangping Zhuo: , Guangping Zhuo:
 A novel statistical technique for intrusion detection systems. 303-318
- Shashank Gupta  , Brij Bhooshan Gupta , Brij Bhooshan Gupta , Pooja Chaudhary , Pooja Chaudhary : :
 Hunting for DOM-Based XSS vulnerabilities in mobile cloud-based online social network. 319-336
- Man Ho Au  , Kaitai Liang , Kaitai Liang , Joseph K. Liu, Rongxing Lu, Jianting Ning: , Joseph K. Liu, Rongxing Lu, Jianting Ning:
 Privacy-preserving personal data operation on mobile cloud - Chances and challenges over advanced persistent threat. 337-349
- Xiaokang Zhou, Albert Y. Zomaya  , Weimin Li, Ivan Ruchkin , Weimin Li, Ivan Ruchkin : :
 Cybermatics: Advanced Strategy and Technology for Cyber-Enabled Systems and Applications. 350-353
- Saurabh Kumar Garg  , Jagannath Aryal , Jagannath Aryal , Hao Wang, Tejal Shah , Hao Wang, Tejal Shah , Gabor Kecskemeti , Gabor Kecskemeti , Rajiv Ranjan , Rajiv Ranjan : :
 Cloud computing based bushfire prediction for cyber-physical emergency applications. 354-363
- Somchart Fugkeaw  , Hiroyuki Sato: , Hiroyuki Sato:
 Scalable and secure access control policy update for outsourced big data. 364-373
- Qingyong Li  , Zhiping Shi , Zhiping Shi , Huayan Zhang, Yunqiang Tan, Shengwei Ren, Peng Dai, Weiyi Li: , Huayan Zhang, Yunqiang Tan, Shengwei Ren, Peng Dai, Weiyi Li:
 A cyber-enabled visual inspection system for rail corrugation. 374-382
- Yijun Mo, Bixi Li, Bang Wang, Laurence T. Yang, Minghua Xu: 
 Event recommendation in social networks based on reverse random walk and participant scale control. 383-395
- Chong Chen, Dan Chen, Yingnan Yan, Gaofeng Zhang, Qingguo Zhou, Rui Zhou: 
 Integration of numerical model and cloud computing. 396-407
- Weimin Li, Shu Jiang, Qun Jin: 
 Overlap community detection using spectral algorithm based on node convergence degree. 408-416
- Xiaohong Li, Feng Liu, Zhiyong Feng, Guangquan Xu, Zhangjie Fu: 
 A novel optimized vertical handover framework for seamless networking integration in cyber-enabled systems. 417-430
- Ajay Kumara M. A., Jaidhar C. D.: 
 Automated multi-level malware detection system based on reconstructed semantic view of executables using machine learning techniques at VMM. 431-446
- Wei Dai, Yufeng Wang, Qun Jin, Jianhua Ma: 
 Geo-QTI: A quality aware truthful incentive mechanism for cyber-physical enabled Geographic crowdsensing. 447-459
Volumes 79, Part 2, February 2018
- Hui Cui  , Robert H. Deng , Robert H. Deng , Yingjiu Li: , Yingjiu Li:
 Attribute-based cloud storage with secure provenance over encrypted data. 461-472
- Yi Zhou  , Fazhi He, Neng Hou, Yimin Qiu: , Fazhi He, Neng Hou, Yimin Qiu:
 Parallel ant colony optimization on multi-core SIMD CPUs. 473-487
- Mohannad J. Alhanahnah, Peter Bertók  , Zahir Tari , Zahir Tari , Sahel Alouneh , Sahel Alouneh : :
 Context-Aware Multifaceted Trust Framework For Evaluating Trustworthiness of Cloud Providers. 488-499
- Nazmus S. Nafi  , Khandakar Ahmed , Khandakar Ahmed , Mark A. Gregory, Manoj Datta , Mark A. Gregory, Manoj Datta : :
 Software defined neighborhood area network for smart grid applications. 500-513
- Han Yu  , Hongming Cai, Jun Zhou, Lihong Jiang: , Hongming Cai, Jun Zhou, Lihong Jiang:
 Data service generation framework from heterogeneous printed forms using semantic link discovery. 514-527
- Huixi Li, Wenjun Li, Qilong Feng, Shigeng Zhang, Haodong Wang, Jianxin Wang: 
 Leveraging content similarity among VMI files to allocate virtual machines in cloud. 528-542
- Souhila Mammeri  , Mohand Yazid, Louiza Bouallouche-Medjkoune , Mohand Yazid, Louiza Bouallouche-Medjkoune , Asma Mazouz: , Asma Mazouz:
 Performance study and enhancement of multichannel access methods in the future generation VHT WLAN. 543-557
- Dimitrios Papamartzivanos, Félix Gómez Mármol, Georgios Kambourakis: 
 Dendron : Genetic trees driven rule induction for network intrusion detection systems. 558-574
- Mohamed Elshenawy  , Baher Abdulhai, Mohamed El-Darieby: , Baher Abdulhai, Mohamed El-Darieby:
 Towards a service-oriented cyber-physical systems of systems for smart city mobility applications. 575-587
- Ben-Jye Chang, Yu-Wei Lee, Ying-Hsin Liang: 
 Reward-based Markov chain analysis adaptive global resource management for inter-cloud computing. 588-603
- Anna V. Kalyuzhnaya  , Denis A. Nasonov, Sergey V. Ivanov, Sergey S. Kosukhin, Alexander V. Boukhanovsky: , Denis A. Nasonov, Sergey V. Ivanov, Sergey S. Kosukhin, Alexander V. Boukhanovsky:
 Towards a scenario-based solution for extreme metocean event simulation applying urgent computing. 604-617
- Anton Spivak, Andrew Razumovskiy, Denis A. Nasonov, Alexander Boukhanovsky, Anton Radice: 
 Storage tier-aware replicative data reorganization with prioritization for efficient workload processing. 618-629
- Alexander A. Visheratin, Mikhail Melnik, Denis A. Nasonov, Nikolay Butakov, Alexander V. Boukhanovsky: 
 Hybrid scheduling algorithm in early warning systems. 630-642
- Aleksander Byrski  , Katarzyna Rycerz , Katarzyna Rycerz , John Hughes, Kevin Hammond: , John Hughes, Kevin Hammond:
 Special section on functional paradigm for high performance computing. 643-644
- Wojciech Turek  : :
 Erlang-based desynchronized urban traffic simulation for high-performance computing systems. 645-652
- David Castro, Kevin Hammond  , Susmit Sarkar , Susmit Sarkar , Yasir Alguwaifli: , Yasir Alguwaifli:
 Automatically deriving cost models for structured parallel processes using hylomorphisms. 653-668
- Adam D. Barwell  , Christopher Brown , Christopher Brown , Kevin Hammond , Kevin Hammond : :
 Finding parallel functional pearls: Automatic parallel recursion scheme detection in Haskell functions via anti-unification. 669-686
- Tamás Kozsik  , Melinda Tóth , Melinda Tóth , István Bozó , István Bozó : :
 Free the Conqueror! Refactoring divide-and-conquer functions. 687-699
- George A. Gravvanis, John P. Morrison, Dana Petcu  , Theo Lynn , Theo Lynn , Christos K. Filelis-Papadopoulos , Christos K. Filelis-Papadopoulos : :
 Special Issue: Recent trends in cloud computing. 700-702
- Christos K. Filelis-Papadopoulos  , George A. Gravvanis, Panagiotis E. Kyziropoulos , George A. Gravvanis, Panagiotis E. Kyziropoulos : :
 A framework for simulating large scale cloud infrastructures. 703-714
- Antonios T. Makaratzis, Konstantinos M. Giannoutakis  , Dimitrios Tzovaras , Dimitrios Tzovaras : :
 Energy modeling in cloud simulation frameworks. 715-725
- Reginaldo Ré  , Rômulo Manciola Meloca, Douglas Nassif Roma Junior, Marcelo Alexandre da Cruz Ismael, Gabriel Costa Silva: , Rômulo Manciola Meloca, Douglas Nassif Roma Junior, Marcelo Alexandre da Cruz Ismael, Gabriel Costa Silva:
 An empirical study for evaluating the performance of multi-cloud APIs. 726-738
- Maria Alejandra Rodriguez  , Rajkumar Buyya , Rajkumar Buyya : :
 Scheduling dynamic workloads in multi-tenant scientific workflow as a service platforms. 739-750
- Takfarinas Saber  , James Thorburn, Liam Murphy , James Thorburn, Liam Murphy , Anthony Ventresque , Anthony Ventresque : :
 VM reassignment in hybrid clouds for large decentralised companies: A multi-objective challenge. 751-764
- Adel Nadjaran Toosi  , Richard O. Sinnott, Rajkumar Buyya , Richard O. Sinnott, Rajkumar Buyya : :
 Resource provisioning for data-intensive applications with deadline constraints on hybrid clouds using Aneka. 765-775
Volumes 79, Part 3, February 2018
- Xavier Masip-Bruin  , Eva Marín-Tordera, Admela Jukan, Guang-Jie Ren: , Eva Marín-Tordera, Admela Jukan, Guang-Jie Ren:
 Managing resources continuity from the edge to the cloud: Architecture and performance. 777-785
- Guillermo Oyarzun  , Ricard Borrell , Ricard Borrell , Andrey V. Gorobets , Andrey V. Gorobets , Filippo Mantovani , Filippo Mantovani , Assensi Oliva , Assensi Oliva : :
 Efficient CFD code implementation for the ARM-based Mont-Blanc architecture. 786-796
- Bo Zhang, Qian Zhang, Zhenhua Huang, Meizi Li, Luqun Li: 
 A multi-criteria detection scheme of collusive fraud organization for reputation aggregation in social networks. 797-814
- Sarogini Grace Pease  , Russell Trueman, Callum Davies, Jude Grosberg, Kai Hin Yau, Navjot Kaur, Paul P. Conway, Andrew A. West: , Russell Trueman, Callum Davies, Jude Grosberg, Kai Hin Yau, Navjot Kaur, Paul P. Conway, Andrew A. West:
 An intelligent real-time cyber-physical toolset for energy and process prediction and optimisation in the future industrial Internet of Things. 815-829
- Fabio López-Pires, Benjamín Barán  , Leonardo Benítez, Saúl Zalimben, Augusto Amarilla: , Leonardo Benítez, Saúl Zalimben, Augusto Amarilla:
 Virtual machine placement for elastic infrastructures in overbooked cloud computing datacenters under uncertainty. 830-848
- Blesson Varghese, Rajkumar Buyya  : :
 Next generation cloud computing: New trends and research directions. 849-861
- Gabriele Mencagli  , Massimo Torquati , Massimo Torquati , Marco Danelutto , Marco Danelutto : :
 Elastic-PPQ: A two-level autonomic system for spatial preference query processing over dynamic data streams. 862-877
- K. Kanagaraj  , S. Swamynathan: , S. Swamynathan:
 Structure aware resource estimation for effective scheduling and execution of data intensive workflows in cloud. 878-891
- Shapna Muralidharan, Abhishek Roy, Navrati Saxena: 
 MDP-IoT: MDP based interest forwarding for heterogeneous traffic in IoT-NDN environment. 892-908
- Muhammad Farhan  , Sohail Jabbar , Sohail Jabbar , Muhammad Aslam, Mohammad Hammoudeh , Muhammad Aslam, Mohammad Hammoudeh , Mudassar Ahmad, Shehzad Khalid, Murad Khan, Kijun Han: , Mudassar Ahmad, Shehzad Khalid, Murad Khan, Kijun Han:
 IoT-based students interaction framework using attention-scoring assessment in eLearning. 909-919
- Junbao Zhang, Haojun Huang, Yan Luo, Yinting Fan, Guan Yang: 
 Immunization-based redundancy elimination in Mobile Opportunistic Networks-Generated big data. 920-927
- Raheleh Khanduzi  , M. Reza Peyghami , M. Reza Peyghami , Arun Kumar Sangaiah , Arun Kumar Sangaiah : :
 Data envelopment analysis and interdiction median problem with fortification for enabling IoT technologies to relieve potential attacks. 928-940
- Syed Hassan Ahmed  , Shalli Rani , Shalli Rani : :
 A hybrid approach, Smart Street use case and future aspects for Internet of Things in smart cities. 941-951
- U. Rajendra Acharya  , Hamido Fujita , Hamido Fujita , Shu Lih Oh, U. Raghavendra, Jen Hong Tan , Shu Lih Oh, U. Raghavendra, Jen Hong Tan , Muhammad Adam , Muhammad Adam , Arkadiusz Gertych , Arkadiusz Gertych , Yuki Hagiwara , Yuki Hagiwara : :
 Automated identification of shockable and non-shockable life-threatening ventricular arrhythmias using convolutional neural network. 952-959
- Zhe Lin: 
 Modelling and forecasting the stock market volatility of SSE Composite Index using GARCH models. 960-972
- Victor I. Chang  , Dickson K. W. Chiu , Dickson K. W. Chiu , Muthu Ramachandran, Chung-Sheng Li: , Muthu Ramachandran, Chung-Sheng Li:
 Internet of Things, Big Data and Complex Information Systems: Challenges, solutions and outputs from IoTBD 2016, COMPLEXIS 2016 and CLOSER 2016 selected papers and CLOSER 2015 keynote. 973-974

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


 Google
Google Google Scholar
Google Scholar Semantic Scholar
Semantic Scholar Internet Archive Scholar
Internet Archive Scholar CiteSeerX
CiteSeerX ORCID
ORCID














