


default search action
IEEE Transactions on Services Computing, Volume 13
Volume 13, Number 1, January - February 2020
- James Joshi:

Editorial. 1-2 - Shridhar G. Domanal

, Ram Mohana Reddy Guddeti
, Rajkumar Buyya
:
A Hybrid Bio-Inspired Algorithm for Scheduling and Resource Management in Cloud Environment. 3-15 - Francesco Buccafurri

, Gianluca Lax, Serena Nicolazzo
, Antonino Nocera
:
A Privacy-Preserving Localization Service for Assisted Living Facilities. 16-29 - Marco Anisetti, Claudio Agostino Ardagna

, Ernesto Damiani
, Filippo Gaudenzi:
A Semi-Automatic and Trustworthy Scheme for Continuous Cloud Service Certification. 30-43 - Antonio Pecchia

, Stefano Russo
, Santonu Sarkar
:
Assessing Invariant Mining Techniques for Cloud-Based Utility Computing Systems. 44-58 - Ali Reza Zamani, Mengsong Zou, Javier Diaz Montes

, Ioan Petri
, Omer F. Rana
, Ashiq Anjum
, Manish Parashar
:
Deadline Constrained Video Analysis via In-Transit Computational Environments. 59-72 - Bing Bai

, Yushun Fan, Wei Tan
, Jia Zhang
:
DLTSR: A Deep Learning Framework for Recommendations of Long-Tail Web Services. 73-85 - Valeria Cardellini

, Valerio Di Valerio, Francesco Lo Presti
:
Game-Theoretic Resource Pricing and Provisioning Strategies in Cloud Systems. 86-98 - Buqing Cao

, Xiaoqing Frank Liu, Md Mahfuzer Rahman, Bing Li, Jianxun Liu
, Mingdong Tang:
Integrated Content and Network-Based Service Clustering and Web APIs Recommendation for Mashup Development. 99-113 - Omar Abdel Wahab

, Jamal Bentahar
, Hadi Otrok, Azzam Mourad
:
Optimal Load Distribution for the Detection of VM-Based DDoS Attacks in the Cloud. 114-129 - Long Chen, Xiaoping Li

, Rubén Ruiz
:
Resource Renting for Periodical Cloud Workflow Applications. 130-143 - Keman Huang

, Jia Zhang
, Wei Tan
, Zhiyong Feng
:
Shifting to Mobile: Network-Based Empirical Study of Mobile Vulnerability Market. 144-157 - Jianan Hong, Kaiping Xue

, Yingjie Xue, Weikeng Chen
, David S. L. Wei, Nenghai Yu
, Peilin Hong
:
TAFC: Time and Attribute Factors Combined Access Control for Time-Sensitive Data in Public Cloud. 158-171 - Chuan Pham

, Nguyen Hoang Tran
, Shaolei Ren
, Walid Saad
, Choong Seon Hong
:
Traffic-Aware and Energy-Efficient vNF Placement for Service Chaining: Joint Sampling and Matching Approach. 172-185 - Nguyen Trung Hieu

, Mario Di Francesco, Antti Ylä-Jääski
:
Virtual Machine Consolidation with Multiple Usage Prediction for Energy-Efficient Cloud Data Centers. 186-199
Volume 13, Number 2, March - April 2020
- Zibin Zheng

, Andreas Kind, Peter Chen:
Guest Editorial: Special Issue on Blockchain-Based Services Computing. 200-202 - Chao Qiu

, Haipeng Yao
, F. Richard Yu
, Chunxiao Jiang
, Song Guo
:
A Service-Oriented Permissioned Blockchain for the Internet of Things. 203-215 - Yuan Zhang

, Chunxiang Xu
, Nan Cheng
, Hongwei Li
, Haomiao Yang
, Xuemin Shen
:
Chronos$^{{\mathbf +}}$+: An Accurate Blockchain-Based Time-Stamping Scheme for Cloud Storage. 216-229 - Yi Mu

, Fatemeh Rezaeibagha
, Ke Huang
:
Policy-Driven Blockchain and Its Applications for Transport Systems. 230-240 - Zhihua Cui

, Fei Xue
, Shiqiang Zhang, Xingjuan Cai
, Yang Cao, Wensheng Zhang, Jinjun Chen
:
A Hybrid BlockChain-Based Identity Authentication Scheme for Multi-WSN. 241-251 - Kai Lei

, Maoyu Du
, Jiyue Huang, Tong Jin:
Groupchain: Towards a Scalable Public Blockchain in Fog Computing of IoT Services Computing. 252-262 - Muneeb Ul Hassan

, Mubashir Husain Rehmani
, Jinjun Chen
:
DEAL: Differentially Private Auction for Blockchain-Based Microgrids Energy Trading. 263-275 - Mona Taghavi

, Jamal Bentahar
, Hadi Otrok
, Kaveh Bakhtiyari
:
A Blockchain-Based Model for Cloud Service Quality Monitoring. 276-288 - Yang Xu

, Ju Ren
, Yan Zhang, Cheng Zhang
, Bo Shen
, Yaoxue Zhang
:
Blockchain Empowered Arbitrable Data Auditing Scheme for Network Storage as a Service. 289-300 - Bobo Huang

, Li Jin, ZhiHui Lu
, Xin Zhou
, Jie Wu, Qifeng Tang, Patrick C. K. Hung
:
BoR: Toward High-Performance Permissioned Blockchain in RDMA-Enabled Network. 301-313 - Xinming Wang

, Jiahao He
, Zhijian Xie, Gansen Zhao, Shing-Chi Cheung
:
ContractGuard: Defend Ethereum Smart Contracts with Embedded Intrusion Detection. 314-328 - WonDeuk Yoon

, Janggwan Im
, Tindal Choi, Daeyoung Kim
:
Blockchain-Based Object Name Service With Tokenized Authority. 329-342 - Xuanzhe Liu

, Sam X. Sun, Gang Huang
:
Decentralized Services Computing Paradigm for Blockchain-Based Data Governance: Programmability, Interoperability, and Intelligence. 343-355 - Zehui Xiong

, Jiawen Kang
, Dusit Niyato
, Ping Wang
, H. Vincent Poor
:
Cloud/Edge Computing Service Management in Blockchain Networks: Multi-Leader Multi-Follower Game-Based ADMM for Pricing. 356-367 - Long Cheng

, Boudewijn F. van Dongen
, Wil M. P. van der Aalst
:
Scalable Discovery of Hybrid Process Models in a Cloud Computing Environment. 368-380 - Dian Shen

, Junzhou Luo, Fang Dong
, Jiahui Jin
, Junxue Zhang
, Jun Shen
:
Facilitating Application-Aware Bandwidth Allocation in the Cloud with One-Step-Ahead Traffic Information. 381-394
Volume 13, Number 3, May - June 2020
- Boyang Yu

, Jianping Pan
:
A Framework of Hypergraph-Based Data Placement Among Geo-Distributed Datacenters. 395-409 - Jinghua Jiang, Yifeng Zheng

, Zhenkui Shi, Xingliang Yuan
, Xiaolin Gui
, Cong Wang
:
A Practical System for Privacy-Aware Targeted Mobile Advertising Services. 410-424 - Jialei Liu

, Shangguang Wang
, Ao Zhou, Rajkumar Buyya
, Fangchun Yang:
Availability-Aware Virtual Cluster Allocation in Bandwidth-Constrained Datacenters. 425-436 - Jiann-Min Ho, Pi-Cheng Hsiu

, Ming-Syan Chen
:
Deadline Flow Scheduling in Datacenters with Time-Varying Bandwidth Allocations. 437-450 - Lu Rao

, Hua Zhang
, Tengfei Tu:
Dynamic Outsourced Auditing Services for Cloud Storage Based on Batch-Leaves-Authenticated Merkle Hash Tree. 451-463 - Yang Yang

, Ximeng Liu
, Robert H. Deng
, Jian Weng
:
Flexible Wildcard Searchable Encryption System. 464-477 - Jiguo Li

, Yao Wang, Yichen Zhang, Jinguang Han
:
Full Verifiability for Outsourced Decryption in Attribute Based Encryption. 478-487 - Neng Zhang, Jian Wang

, Yutao Ma
:
Mining Domain Knowledge on Service Goals from Textual Service Descriptions. 488-502 - Ahmed Abdel Moamen

, Nadeem Jamali
:
Opportunistic Sharing of Continuous Mobile Sensing Data for Energy and Power Conservation. 503-514 - Luca Pino, George Spanoudakis

, Maria Krotsiani, Khaled Mahbub
:
Pattern-Based Design and Verification of Secure Service Compositions. 515-528 - Soumi Chattopadhyay

, Ansuman Banerjee
:
QoS Constrained Large Scale Web Service Composition Using Abstraction Refinement. 529-544 - Ayantika Chatterjee

, Indranil Sengupta:
Sorting of Fully Homomorphic Encrypted Cloud Data: Can Partitioning be Effective? 545-558 - Jingtao Ding, Yong Li

, Pengyu Zhang, Depeng Jin:
Time Dependent Pricing for Large-Scale Mobile Networks of Urban Environment: Feasibility and Adaptability. 559-571 - Huaqun Wang

, Debiao He
, Jinguang Han
:
VOD-ADAC: Anonymous Distributed Fine-Grained Access Control Protocol with Verifiable Outsourced Decryption in Public Cloud. 572-583 - Robertus Nugroho

, Jian Yang
, Weiliang Zhao
, Cécile Paris, Surya Nepal
:
What and With Whom? Identifying Topics in Twitter Through Both Interactions and Text. 584-596
Volume 13, Number 4, July - August 2020
- Rajiv Ranjan

, Ching-Hsien Hsu
, Lydia Y. Chen, Dimitrios Georgakopoulos
:
Holistic Technologies for Managing Internet of Things Services. 597-601 - Yanyu Huang

, Bo Li
, Zheli Liu
, Jin Li
, Siu-Ming Yiu
, Thar Baker
, Brij B. Gupta
:
ThinORAM: Towards Practical Oblivious Data Access in Fog Computing Environment. 602-612 - Anish Jindal

, Gagangeet Singh Aujla
, Neeraj Kumar
, Massimo Villari:
GUARDIAN: Blockchain-Based Secure Demand Response Management in Smart Grid System. 613-624 - Abbas Yazdinejad

, Reza M. Parizi
, Ali Dehghantanha
, Qi Zhang
, Kim-Kwang Raymond Choo
:
An Energy-Efficient SDN Controller Architecture for IoT Networks With Blockchain-Based Security. 625-638 - Mahmoud Barhamgi

, Charith Perera
, Chia-Mu Yu
, Djamal Benslimane
, David Camacho
, Christine Bonnet:
Privacy in Data Service Composition. 639-652 - Lin Mu

, Enjin Zhao
, Yuewei Wang
, Albert Y. Zomaya
:
Buoy Sensor Cyberattack Detection in Offshore Petroleum Cyber-Physical Systems. 653-662 - Ivan Lujic

, Vincenzo De Maio
, Ivona Brandic:
Resilient Edge Data Management Framework. 663-674 - Puming Wang

, Laurence T. Yang
, Jintao Li, Xue Li, Xiaokang Zhou
:
MMDP: A Mobile-IoT Based Multi-Modal Reinforcement Learning Service Framework. 675-684 - Zhihua Cui, Xianghua Xu

, Fei Xue
, Xingjuan Cai
, Yang Cao, Wensheng Zhang, Jinjun Chen
:
Personalized Recommendation System Based on Collaborative Filtering for IoT Scenarios. 685-695 - Hengjin Ke, Dan Chen

, Benyun Shi
, Jindong Zhang, Xianzeng Liu, Xinhua Zhang, Xiaoli Li
:
Improving Brain E-Health Services via High-Performance EEG Classification With Grouping Bayesian Optimization. 696-708 - Sudheer Kumar Battula

, Saurabh Garg
, James Montgomery
, Byeong Kang
:
An Efficient Resource Monitoring Service for Fog Computing Environments. 709-722 - Shiheng Ma

, Song Guo
, Kun Wang, Weijia Jia
, Minyi Guo
:
A Cyclic Game for Service-Oriented Resource Allocation in Edge Computing. 723-734 - Ao Zhou

, Shangguang Wang
, Xiao Ma
, Stephen S. Yau:
Towards Service Composition Aware Virtual Machine Migration Approach in the Cloud. 735-744 - Junlong Zhou

, Jin Sun
, Peijin Cong
, Zhe Liu
, Xiumin Zhou, Tongquan Wei
, Shiyan Hu
:
Security-Critical Energy-Aware Task Scheduling for Heterogeneous Real-Time MPSoCs in IoT. 745-758 - Qianqian Duan

, Daniel Sun
, Guoqiang Li
, Genke Yang, Weiwu Yan
:
IoT-Enabled Service for Crude-Oil Production Systems Against Unpredictable Disturbance. 759-768
Volume 13, Number 5, September - October 2020
- Rebeca Estrada

, Rabeb Mizouni
, Hadi Otrok
, Anis Ouali, Jamal Bentahar
:
A Crowd-Sensing Framework for Allocation of Time-Constrained and Location-Based Tasks. 769-785 - Lifang Ren

, Wenjian Wang
, Hang Xu:
A Reinforcement Learning Method for Constraint-Satisfied Services Composition. 786-800 - Jin He

, Kaoru Ota
, Mianxiong Dong
, Laurence T. Yang
, Mingyu Fan, Guangwei Wang, Stephen S. Yau:
Customized Network Security for Cloud Service. 801-814 - Song Wu

, Like Zhou, Xingjun Wang, Fei Chen, Hai Jin
:
Doris: An Adaptive Soft Real-Time Scheduler in Virtualized Environments. 815-828 - Endong Tong

, Lan Chen, Huizi Li:
Energy-Aware Service Selection and Adaptation in Wireless Sensor Networks with QoS Guarantee. 829-842 - Joel Vallone, Robert Birke, Lydia Y. Chen

:
Making Neighbors Quiet: An Approach to Detect Virtual Resource Contention. 843-856 - Marzieh Malekimajd

, Ali Movaghar
:
Minimizing Data Access Latencies for Virtual Machine Assignment in Cloud Systems. 857-870 - Guoqi Xie

, Gang Zeng
, Yuekun Chen
, Yang Bai
, Zhili Zhou
, Renfa Li
, Keqin Li
:
Minimizing Redundancy to Satisfy Reliability Requirement for a Parallel Application on Heterogeneous Service-Oriented Systems. 871-886 - Hong Xie

, John C. S. Lui
:
Mining Deficiencies of Online Reputation Systems: Methodologies, Experiments and Implications. 887-900 - Andreas Weiß

, Vasilios Andrikopoulos
, Michael Hahn
, Dimka Karastoyanova
:
Model-as-You-Go for Choreographies: Rewinding and Repeating Scientific Choreographies. 901-914 - Yuanyi Chen

, Jingyu Zhang, Liting Xu, Minyi Guo
, Jiannong Cao
:
Modeling Latent Relation to Boost Things Categorization Service. 915-929 - Weiwei Wu

, Jianping Wang
, Kejie Lu
, Wen Qi, Feng Shan
, Junzhou Luo:
Providing Service Continuity in Clouds Under Power Outage. 930-943 - Hengjing He

, Wei Zhao
, Songling Huang
, Geoffrey C. Fox, Qing Wang:
Research on the Architecture and its Implementation for Instrumentation and Measurement Cloud. 944-957 - Xu Zhang

, Hao Yin, Dapeng Oliver Wu
, Haojun Huang
, Geyong Min
, Ying Zhang:
SSL: A Surrogate-Based Method for Large-Scale Statistical Latency Measurement. 958-968
Volume 13, Number 6, November - December 2020
- Fang Dong

, Junzhou Luo, Jiahui Jin
, Jiyuan Shi, Ye Yang, Jun Shen
:
Accelerating Skycube Computation with Partial and Parallel Processing for Service Selection. 969-984 - Yinbin Miao

, Jianfeng Ma, Ximeng Liu, Xinghua Li, Qi Jiang
, Junwei Zhang:
Attribute-Based Keyword Search over Hierarchical Data in Cloud Computing. 985-998 - Wenxin Wang, Yujie Liu, Jiaqiang Liu, Yong Li

, Haoyu Song
, Yue Wang, Jian Yuan
:
Consistent State Updates for Virtualized Network Function Migration. 999-1006 - Han Hu

, Yonggang Wen
, Lei Yin
, Ling Qiu, Dusit Niyato
:
Coordinating Workload Scheduling of Geo-Distributed Data Centers and Electricity Generation of Smart Grid. 1007-1020 - Youngjoo Shin

, Dongyoung Koo, Joobeom Yun, Junbeom Hur
:
Decentralized Server-Aided Encryption for Secure Deduplication in Cloud Storage. 1021-1033 - Cheng Guo

, Xue Chen, Yingmo Jie
, Zhangjie Fu
, Mingchu Li
, Bin Feng:
Dynamic Multi-Phrase Ranked Search over Encrypted Data with Symmetric Searchable Encryption. 1034-1044 - Yanchun Wang

, Qiang He
, Xuyun Zhang
, Dayong Ye
, Yun Yang
:
Efficient QoS-Aware Service Recommendation for Multi-Tenant Service-Based Systems in Cloud. 1045-1058 - Wei Zhang

, Yonggang Wen
, Loi Lei Lai
, Fang Liu, Rui Fan:
Electricity Cost Minimization for Interruptible Workload in Datacenter Servers. 1059-1071 - Jing Chen

, Kun He
, Lan Deng, Quan Yuan, Ruiying Du, Yang Xiang
, Jie Wu
:
EliMFS: Achieving Efficient, Leakage-Resilient, and Multi-Keyword Fuzzy Search on Encrypted Cloud Data. 1072-1085 - Nan Wang

, Blesson Varghese
, Michail Matthaiou
, Dimitrios S. Nikolopoulos
:
ENORM: A Framework For Edge NOde Resource Management. 1086-1099 - Yuanyi Chen

, Jingyu Zhang, Minyi Guo
, Jiannong Cao
:
Learning User Preference from Heterogeneous Information for Store-Type Recommendation. 1100-1114 - Guoshuai Zhao, Tianlei Liu, Xueming Qian

, Tao Hou, Huan Wang, Xingsong Hou
, Zhetao Li
:
Location Recommendation for Enterprises by Multi-Source Urban Big Data Analysis. 1115-1127 - Junjie Xie

, Deke Guo
, Xiaomin Zhu
, Bangbang Ren, Honghui Chen:
Minimal Fault-Tolerant Coverage of Controllers in IaaS Datacenters. 1128-1141 - Haijiang Wang

, Xiaolei Dong, Zhenfu Cao
:
Multi-Value-Independent Ciphertext-Policy Attribute Based Encryption with Fast Keyword Search. 1142-1151 - Shunrong Jiang

, Tao Jiang
, Liangmin Wang
:
Secure and Efficient Cloud Data Deduplication with Ownership Management. 1152-1165 - Alireza Toroghi Haghighat

, Mehdi Shajari
:
Service Integrity Assurance for Distributed Computation Outsourcing. 1166-1179 - Junqiang Ge

, Ye Tian
, Lei Liu
, Rongheng Lan
, Xinming Zhang
:
Understanding E-Commerce Systems under Massive Flash Crowd: Measurement, Analysis, and Implications. 1180-1193

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














