default search action
Future Generation Computer Systems, Volume 80
Volume 80, March 2018
- Ke-Kun Hu, Guosun Zeng, Huo-wen Jiang, Wei Wang:
Partitioning big graph with respect to arbitrary proportions in a streaming manner. 1-11 - Gangin Lee, Unil Yun:
Single-pass based efficient erasable pattern mining using list data structure on dynamic incremental databases. 12-28 - Anirban Sengupta, Deepak Kachave:
Forensic engineering for resolving ownership problem of reusable IP core generated during high level synthesis. 29-46 - James Brook, Félix Cuadrado, Eric Deliot, Julio Guijarro, Rycharde Hawkes, Marco A. B. F. G. Lotz, Romaric Pascal, Suksant Sae Lor, Luis M. Vaquero, Joan Varvenne, Lawrence Wilcock:
Loom: Complex large-scale visual insight for large hybrid IT infrastructure management. 47-62 - Fadi Al-Turjman:
Information-centric framework for the Internet of Things (IoT): Traffic modeling & optimization. 63-75 - Rui Liu, Junbin Liang, Wenyu Gao, Ruiyun Yu:
Privacy-based recommendation mechanism in mobile participatory sensing systems using crowdsourced users' preferences. 76-88 - Tao Wang, Jiwei Xu, Wenbo Zhang, Zeyu Gu, Hua Zhong:
Self-adaptive cloud monitoring with online anomaly detection. 89-101 - Liang Zhang, Yuanyuan Feng, Peiyi Shen, Guangming Zhu, Wei Wei, Juan Song, Syed Afaq Ali Shah, Mohammed Bennamoun:
Efficient finer-grained incremental processing with MapReduce for big data. 102-111 - Neyire Deniz Sarier:
Multimodal biometric Identity Based Encryption. 112-125 - Elena Torroglosa-García, Jordi Ortiz, Antonio F. Skarmeta:
Matching federation identities, the eduGAIN and STORK approach. 126-138 - Zhihua Li, Chengyu Yan, Lei Yu, Xinrong Yu:
Energy-aware and multi-resource overload probability constraint-based virtual machine dynamic consolidation method. 139-156 - Syed Ali Raza Shah, Biju Issac:
Performance comparison of intrusion detection systems and application of machine learning to Snort system. 157-170 - Seungwoo Jeon, Bonghee Hong, Victor Chang:
Pattern graph tracking-based stock price prediction using big data. 171-187 - Djamila Bendouda, Abderrezak Rachedi, Hafid Haffaf:
Programmable architecture based on Software Defined Network for Internet of Things: Connected Dominated Sets approach. 188-197 - Rui-Yang Chen:
A traceability chain algorithm for artificial neural networks using T-S fuzzy cognitive maps in blockchain. 198-210
- Nik Bessis, Xiaojun Zhai, Stelios Sotiriadis:
Service-Oriented System Engineering. 211-214 - Lina Barakat, Simon Miles, Michael Luck:
Adaptive composition in dynamic service environments. 215-228 - Francesco Piccialli, Paolo Benedusi, Flora Amato:
S-InTime: A social cloud analytical service oriented system. 229-241 - Feiyu Chen, Zhiwei Zhao, Geyong Min, Weifeng Gao, Jinjun Chen, Hancong Duan, Po Yang:
Speed control of mobile chargers serving wireless rechargeable networks. 242-249 - Matthias Geiger, Simon Harrer, Jörg Lenhard, Guido Wirtz:
BPMN 2.0: The state of support and implementation. 250-262 - Yuvraj Sahni, Jiannong Cao, Xuefeng Liu:
MidSHM: A Middleware for WSN-based SHM Application using Service-Oriented Architecture. 263-274 - Jianxin Li, Hao Peng, Erica Yang, Chunming Hu, Shenghai Zhong, Lihong Wang:
Eagle+: A fast incremental approach to automaton and table online updates for cloud services. 275-285 - Muhammad Usman Yaseen, Ashiq Anjum, Omer F. Rana, Richard Hill:
Cloud-based scalable object detection and classification in video streams. 286-298 - Zhangbing Zhou, Deng Zhao, Lu Liu, Patrick C. K. Hung:
Energy-aware composition for wireless sensor networks as a service. 299-310 - Virginie Gabrel, Maude Manouvrier, Kamil Moreau, Cécile Murat:
QoS-aware automatic syntactic service composition problem: Complexity and resolution. 311-321 - John Panneerselvam, Lu Liu, Nick Antonopoulos:
InOt-RePCoN: Forecasting user behavioural trend in large-scale cloud environments. 322-341 - Ali Reza Zamani, Mengsong Zou, Javier Diaz Montes, Ioan Petri, Omer F. Rana, Manish Parashar:
A computational model to support in-network data analysis in federated ecosystems. 342-354 - Ahlem Kalaï, Corinne Amel Zayani, Ikram Amous, Wafa Abdelghani, Florence Sèdes:
Social collaborative service recommendation approach based on user's trust and domain-specific expertise. 355-367 - Tudor Cioara, Ionut Anghel, Ioan Salomie, Lina Barakat, Simon Miles, Dianne Reidlinger, Adel Taweel, Ciprian Dobre, Florin Pop:
Expert system for nutrition care process of older adults. 368-383 - María Teresa González-Aparicio, Muhammad Younas, Javier Tuya, Rubén Casado:
Testing of transactional services in NoSQL key-value databases. 384-399 - Mark Anderson, Joseph Bolton:
A service-oriented framework for collating retail intelligence. 400-408 - Hong Zhong, Yaming Fang, Jie Cui:
Reprint of "LBBSRT: An efficient SDN load balancing scheme based on server response time". 409-416
- Raja Naeem Akram, Hsiao-Hwa Chen, Javier López, Damien Sauveron, Laurence T. Yang:
Security, privacy and trust of user-centric solutions. 417-420 - Meikang Qiu, Keke Gai, Bhavani Thuraisingham, Lixin Tao, Hui Zhao:
Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry. 421-429 - Sven Kiljan, Harald P. E. Vranken, Marko C. J. D. van Eekelen:
Evaluation of transaction authentication methods for online banking. 430-447 - Jan Henrik Ziegeldorf, Roman Matzutt, Martin Henze, Fred Grossmann, Klaus Wehrle:
Secure and anonymous decentralized Bitcoin mixing. 448-466 - Kirill Belyaev, Wuliang Sun, Indrakshi Ray, Indrajit Ray:
On the design and analysis of protocols for Personal Health Record storage on Personal Data Server devices. 467-482 - Ruhul Amin, SK Hafizul Islam, G. P. Biswas, Muhammad Khurram Khan, Neeraj Kumar:
A robust and anonymous patient monitoring system using wireless medical sensor networks. 483-495 - Lansheng Han, Songsong Liu, Shuxia Han, Wenjing Jia, Jingwei Lei:
Owner based malware discrimination. 496-504 - Gianluca Dini, Fabio Martinelli, Ilaria Matteucci, Marinella Petrocchi, Andrea Saracino, Daniele Sgandurra:
Risk analysis of Android applications: A user-centric solution. 505-518 - Gabriele Costa, Alessio Merlo, Luca Verderame, Alessandro Armando:
Automatic security verification of mobile app configurations. 519-536 - Iakovos Gurulian, Konstantinos Markantonakis, Lorenzo Cavallaro, Keith Mayes:
Reprint of "You can't touch this: Consumer-centric android application repackaging detection". 537-545 - John S. Atkinson, John E. Mitchell, Miguel Rio, George Matich:
Your WiFi is leaking: What do your mobile apps gossip about you? 546-557 - Roger Jardí-Cedó, Macià Mut Puigserver, María Magdalena Payeras Capellà, Jordi Castellà-Roca, Alexandre Viejo:
Time-based low emission zones preserving drivers' privacy. 558-571 - Konstantinos Fysarakis, Othonas Soultatos, Charalampos Manifavas, Ioannis Papaefstathiou, Ioannis G. Askoxylakis:
XSACd - Cross-domain resource sharing & access control for smart environments. 572-582 - Andrei Poenaru, Roxana Istrate, Florin Pop:
AFT: Adaptive and fault tolerant peer-to-peer overlay - A user-centric solution for data sharing. 583-595 - Mohamed Amine Bouazzouni, Emmanuel Conchon, Fabrice Peyrard:
Trusted mobile computing: An overview of existing solutions. 596-612 - Mian Ahmad Jan, Priyadarsi Nanda, Xiangjian He, Ren Ping Liu:
A Sybil attack detection scheme for a forest wildfire monitoring application. 613-626 - Elena Pagnin, Anjia Yang, Qiao Hu, Gerhard P. Hancke, Aikaterini Mitrokotsa:
HB+DB: Distance bounding meets human based authentication. 627-639 - Hao Jin, Ke Zhou, Hong Jiang, Dongliang Lei, Ronglei Wei, Chun-hua Li:
Full integrity and freshness for cloud data. 640-652 - Xingang Liu, Lingyun Lu, Zhixin Shen, Kaixuan Lu:
A novel face recognition algorithm via weighted kernel sparse representation. 653-663
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.