


default search action
Future Generation Computer Systems, Volume 93
Volume 93, April 2019
- Osama M. Hussain Rehman, Mohamed Ould-Khaoua:
A hybrid relay node selection scheme for message dissemination in VANETs. 1-17 - Roberto Saia
, Salvatore Carta:
Evaluating the benefits of using proactive transformed-domain-based techniques in fraud detection tasks. 18-32 - Ruiguo Yu, Jie Gao, Mei Yu, Wenhuan Lu, Tianyi Xu, Mankun Zhao, Jie Zhang, Ruixuan Zhang
, Zhuo Zhang
:
LSTM-EFG for wind power forecasting based on sequential correlation features. 33-42 - Abdullah Mohammed Al-Faifi, Biao Song
, Mohammad Mehedi Hassan
, Atif Alamri, Abdu Gumaei
:
A hybrid multi criteria decision method for cloud service selection from Smart data. 43-57 - Yubiao Pan
, Yongkun Li, Huizhen Zhang, Yinlong Xu:
Lifetime-aware FTL to improve the lifetime and performance of solid-state drives. 58-67 - Fanyu Bu, Xin Wang, Bo Gao:
A multi-projection deep computation model for smart data in Internet of Things. 68-76 - Mohammed K. Hassan
, Ali I. El-Desouky, Sally M. El-Ghamrawy
, Amany M. Sarhan
:
A Hybrid Real-time remote monitoring framework with NB-WOA algorithm for patients with chronic diseases. 77-95 - Anurag Nishad, Abhay Upadhyay, Ram Bilas Pachori
, U. Rajendra Acharya
:
Automated classification of hand movements using tunable-Q wavelet transform based filter-bank with surface electromyogram signals. 96-110 - Tim van der Lee, Antonio Liotta
, Georgios Exarchakos
:
Interference graphs to monitor and control schedules in low-power WPAN. 111-120 - Stevan Milovanovic
, Zorica Bogdanovic
, Aleksandra Labus, Dusan Barac, Marijana Despotovic-Zrakic
:
An approach to identify user preferences based on social network analysis. 121-129 - Yongxuan Lai, Hailin Lin, Fan Yang, Tian Wang
:
Efficient data request answering in vehicular Ad-hoc networks based on fog nodes and filters. 130-142 - Felipe Rabuske Costa, Rodrigo da Rosa Righi
, Cristiano André da Costa
, Cristiano Bonato Both
:
Nuoxus: A proactive caching model to manage multimedia content distribution on fog radio access networks. 143-155 - Firat Karatas, Ibrahim Korpeoglu
:
Fog-Based Data Distribution Service (F-DAD) for Internet of Things (IoT) applications. 156-169 - Zhichao Wu, Han Wang, Arunkumar N.
:
Bayesian analysis model for the use of anesthetic analgesic drugs in cancer patients based on geometry reconstruction. 170-175 - Djillali Boukhelef, Jalil Boukhobza
, Kamel Boukhalfa
, Hamza Ouarnoughi, Laurent Lemarchand
:
Optimizing the cost of DBaaS object placement in hybrid storage systems. 176-187 - Qiao Xiang, Xin Tony Wang, J. Jensen Zhang, Harvey B. Newman, Yang Richard Yang, Y. Jace Liu:
Unicorn: Unified resource orchestration for multi-domain, geo-distributed data analytics. 188-197 - Tuan Nguyen Gia
, Imed Ben Dhaou
, Mai Ali, Amir M. Rahmani
, Tomi Westerlund
, Pasi Liljeberg, Hannu Tenhunen
:
Energy efficient fog-assisted IoT system for monitoring diabetic patients with cardiovascular disease. 198-211 - Maria Carla Calzarossa
, Marco L. Della Vedova
, Daniele Tessera
:
A methodological framework for cloud resource provisioning and scheduling of data parallel applications under uncertainty. 212-223 - Darpan Triboan, Liming Chen
, Feng Chen
, Zumin Wang:
A semantics-based approach to sensor data segmentation in real-time Activity Recognition. 224-236 - A. S. M. Kayes
, Wenny Rahayu, Tharam S. Dillon, Elizabeth Chang
, Jun Han:
Context-aware access control with imprecise context characterization for cloud-based data resources. 237-255 - K. Venkatesh
, L. N. B. Srinivas, M. B. Mukesh Krishnan, A. Shanthini:
QoS improvisation of delay sensitive communication using SDN based multipath routing for medical applications. 256-265 - Cheng-Chi Lee
, Shun-der Chen, Chun-Ta Li
, Chung-Lun Cheng, Yan-Ming Lai:
Security enhancement on an RFID ownership transfer protocol based on cloud. 266-277 - Xiumin Zhou
, Gongxuan Zhang, Jin Sun
, Junlong Zhou, Tongquan Wei, Shiyan Hu:
Minimizing cost and makespan for workflow scheduling in cloud using fuzzy dominance sort based HEFT. 278-289 - Diogo Nolasco
, Jonice Oliveira
:
Subevents detection through topic modeling in social media posts. 290-303 - Xiao Ma, Jiangfeng Zeng, Limei Peng, Giancarlo Fortino
, Yin Zhang
:
Modeling multi-aspects within one opinionated sentence simultaneously for aspect-level sentiment analysis. 304-311 - Tao Peng, Qin Liu, Guojun Wang, Yang Xiang
, Shuhong Chen
:
Multidimensional privacy preservation in location-based services. 312-326 - Lin Zhong, Qianhong Wu, Jan Xie
, Jin Li, Bo Qin:
A secure versatile light payment system based on blockchain. 327-337 - Anitha Ponraj:
Optimistic virtual machine placement in cloud data centers using queuing approach. 338-344 - Lukasz Makowski, Paola Grosso
:
Evaluation of virtualization and traffic filtering methods for container networks. 345-357 - Kostas Kolomvatsos, Christos Anagnostopoulos
:
Multi-criteria optimal task allocation at the edge. 358-372 - Simeon Veloudis
, Iraklis Paraskakis
, Christos Petsos, Giannis Verginadis
, Ioannis Patiniotakis, Panagiotis Gouvas, Gregoris Mentzas
:
Achieving security-by-design through ontology-driven attribute-based access control in cloud environments. 373-391 - Adriano Lino
, Álvaro Rocha
, Luís Macedo
, Amanda Sizo
:
Application of clustering-based decision tree approach in SQL query error database. 392-406 - Saleh Shah
, Babar Shah, Adnan Amin
, Feras N. Al-Obeidat
, Francis Chow, Fernando Moreira
, Sajid Anwar
:
Compromised user credentials detection in a digital enterprise using behavioral analytics. 407-417 - James Zhang, Robert W. Gardner
, Ilija Vukotic
:
Anomaly detection in wide area network meshes using two machine learning algorithms. 418-426 - Arthur M. Del Esposte, Eduardo Felipe Zambom Santana, Lucas Kanashiro, Fábio M. Costa
, Kelly Rosa Braghetto
, Nelson Lago
, Fabio Kon
:
Design and evaluation of a scalable smart city software platform with large-scale simulations. 427-441 - Mohammad Aldossary
, Karim Djemame
, Ibrahim Alzamil
, Alexandros Kostopoulos, Antonis Dimakis, Eleni Agiatzidou:
Energy-aware cost prediction and pricing of virtual machines in cloud computing environments. 442-459 - Fanhui Kong, Jian Li, Bin Jiang, Houbing Song
:
Short-term traffic flow prediction in smart multimedia system for Internet of Vehicles based on deep belief network. 460-472 - Eduardo Viegas
, Altair Olivo Santin
, Alysson Bessani
, Nuno Neves:
BigFlow: Real-time and reliable anomaly-based intrusion detection for high-speed networks. 473-485 - Arun Das
, Paul Rad, Kim-Kwang Raymond Choo
, Babak Nouhi, Jonathan Lish, James Martel
:
Distributed machine learning cloud teleophthalmology IoT for predicting AMD disease progression. 486-498 - Yi Xu, Lei Peng, Guangyao Li:
Multi modal registration of structural features and mutual information of medical image. 499-505 - Xiaogang Zhao
, Zenggang Xiong, Ling Ding, Xuemin Zhang, Fang Xu:
A smart coordinated temperature feedback controller for energy-efficient data centers. 506-514 - Luca Greco
, Pierluigi Ritrovato
, Fatos Xhafa:
An edge-stream computing infrastructure for real-time analysis of wearable sensors data. 515-528 - Muhammad Zakarya
, Lee Gillam
:
Managing energy, performance and cost in large scale heterogeneous datacenters using migrations. 529-547 - Lu Zhou
, Chunhua Su
, Zhen Li, Zhe Liu
, Gerhard P. Hancke
:
Automatic fine-grained access control in SCADA by machine learning. 548-559 - Fehmi Burcin Özsoydan
, Adil Baykasoglu
:
A swarm intelligence-based algorithm for the set-union knapsack problem. 560-569 - Lin Cai, Yong Qi, Wei Wei, Jinsong Wu
, Jingwei Li:
mrMoulder: A recommendation-based adaptive parameter tuning approach for big data processing platform. 570-582 - Songtao Ding, Shiru Qu, Yuling Xi, Shaohua Wan
:
A long video caption generation algorithm for big video data retrieval. 583-595 - Sven Plaga
, Norbert Wiedermann, Simon Duque Antón
, Stefan Tatschner
, Hans D. Schotten, Thomas Newe
:
Securing future decentralised industrial IoT infrastructures: Challenges and free open source solutions. 596-608 - Roshan Lal Neupane, Travis Neely, Prasad Calyam, Nishant Chettri, Mark Vassell, Ramakrishnan Durairajan:
Intelligent defense using pretense against targeted attacks in cloud platforms. 609-626 - Xiaolong Xu
, Nan Hu, Tao Li, Marcello Trovati, Francesco Palmieri
, Georgios Kontonatsios, Aniello Castiglione
:
Distributed temporal link prediction algorithm based on label propagation. 627-636 - Ding Ding, Mauro Conti
, Renato Figueiredo
:
SAND: Social-aware, network-failure resilient, and decentralized microblogging system. 637-650 - Amir Hossein Alavi
, William G. Buttlar:
An overview of smartphone technology for citizen-centered, real-time and scalable civil infrastructure monitoring. 651-672 - Daniel Amo Filvà, Marc Alier Forment
, Francisco José García-Peñalvo
, David Fonseca Escudero, María José Casañ Guerrero:
Clickstream for learning analytics to assess students' behavior with Scratch. 673-686 - Chao-Tung Yang
, Shuo-Tsung Chen, Jung-Chun Liu, Yao-Yu Yang, Karan Mitra
, Rajiv Ranjan:
Implementation of a real-time network traffic monitoring service with network functions virtualization. 687-701 - Pranab K. Muhuri
, Amit Rauniyar
, Rahul Nath
:
On arrival scheduling of real-time precedence constrained tasks on multi-processor systems using genetic algorithm. 702-726 - Heng He, Ji Zhang
, Peng Li
, Yu Jin, Tao Zhang:
A lightweight secure conjunctive keyword search scheme in hybrid cloud. 727-736
- Nesrine Khernane, Jean-François Couchot
, Ahmed Mostefaoui:
Optimal power/rate trade-off for internet of multimedia things lifetime maximization under dynamic links capacity. 737-750 - Azizur Rahim
, Tie Qiu
, Zhaolong Ning
, Jinzhong Wang, Noor Ullah
, Amr Tolba
, Feng Xia
:
Social acquaintance based routing in Vehicular Social Networks. 751-760 - Pedro Cruz
, Rodrigo S. Couto
, Luís Henrique M. K. Costa
:
An algorithm for sink positioning in bus-assisted smart city sensing. 761-769 - Zhiwei Wang:
Provably secure key-aggregate cryptosystems with auxiliary inputs for data sharing on the cloud. 770-776 - José Andrés Asensio
, Javier Criado
, Nicolás Padilla
, Luis Iribarne
:
Emulating home automation installations through component-based web technology. 777-791 - Amar Abane
, Mehammed Daoui, Samia Bouzefrane, Paul Mühlethaler:
NDN-over-ZigBee: A ZigBee support for Named Data Networking. 792-798 - Saber Amri, Fekher Khelifi
, Abbas Bradai, Abderrezak Rachedi
, Med Lassaad Kaddachi, Mohamed Atri
:
A new fuzzy logic based node localization mechanism for Wireless Sensor Networks. 799-813 - Nikolay Akatyev
, Joshua I. James
:
Evidence identification in IoT networks based on threat assessment. 814-821 - Maha Bouaziz, Abderrezak Rachedi
, Abdelfettah Belghith
:
EKF-MRPL: Advanced mobility support routing protocol for internet of mobile things: Movement prediction approach. 822-832 - Saptarshi Debroy, Priyanka Samanta, Amina Bashir, Mainak Chatterjee:
SpEED-IoT: Spectrum aware energy efficient routing for device-to-device IoT communication. 833-848 - Abubakar Sadiq Sani
, Dong Yuan, Jiong Jin
, Longxiang Gao, Shui Yu
, Zhao Yang Dong
:
Cyber security framework for Internet of Things-based Energy Internet. 849-859 - David Airehrour
, Jairo A. Gutiérrez
, Sayan Kumar Ray:
SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things. 860-876 - Nhu-Ngoc Dao
, Minho Park, Joongheon Kim, Jeongyeup Paek
, Sungrae Cho
:
Resource-aware relay selection for inter-cell interference avoidance in 5G heterogeneous network for Internet of Things systems. 877-887 - Mauro Tortonesi
, Marco Govoni, Alessandro Morelli
, Giulio Riberto, Cesare Stefanelli, Niranjan Suri:
Taming the IoT data deluge: An innovative information-centric service model for fog computing applications. 888-902
- Zhenhua Liu, Shuhong Duan, Peilin Zhou, Baocang Wang:
Traceable-then-revocable ciphertext-policy attribute-based encryption scheme. 903-913
- Flora Amato
, Vincenzo Moscato, Antonio Picariello, Francesco Piccialli
:
SOS: A multimedia recommender System for Online Social networks. 914-923 - Carmen De Maio, Giuseppe Fenza, Mariacristina Gallo
, Vincenzo Loia, Mimmo Parente
:
Time-aware adaptive tweets ranking through deep learning. 924-932 - Chao Tong, Ji Qi, Yu Lian, Jianwei Niu, Joel J. P. C. Rodrigues
:
TimeTrustSVD: A collaborative filtering model integrating time, trust and rating information. 933-941 - Lei Wang, Jianwei Niu, Joel J. P. C. Rodrigues
:
GMA: An adult account identification algorithm on Sina Weibo using behavioral footprints. 942-951 - Pradip Kumar Sharma
, Shailendra Rathore, Jong Hyuk Park:
Multilevel learning based modeling for link prediction and users' consumption preference in Online Social Networks. 952-961 - Weiwei Yuan, Chenliang Li, Guangjie Han
, Donghai Guan, Li Zhou, Kangya He:
Negative sign prediction for signed social networks. 962-970 - Raúl Lara-Cabrera
, Antonio González-Pardo
, David Camacho
:
Statistical analysis of risk assessment factors and metrics to evaluate radicalisation in Twitter. 971-978 - Naveed Ahmad, Haitham S. Cruickshank, Yue Cao
, Fakhri Alam Khan
, Muhammad Asif, Awais Ahmad, Gwanggil Jeon:
Privacy by Architecture Pseudonym Framework for Delay Tolerant Network. 979-992 - Lingxia Liao, Chin-Feng Lai
, Jaifu Wan, Victor C. M. Leung, Tien-Chi Huang
:
Scalable distributed control plane for On-line social networks support cognitive neural computing in software defined networks. 993-1001 - Xu Zheng, Zhipeng Cai
, Guangchun Luo, Ling Tian, Xiao Bai:
Privacy-preserved community discovery in online social networks. 1002-1009 - Jiahui Jin, Junzhou Luo, Mingyang Du, Yongcheng Dang, Feng Li, Jinghui Zhang, Aibo Song:
A data-locality-aware task scheduler for distributed social graph queries. 1010-1022 - Xiong Luo, Changwei Jiang, Weiping Wang, Yang Xu, Jenq-Haur Wang
, Wenbing Zhao
:
User behavior prediction in social networks using weighted extreme learning machine with distribution optimization. 1023-1035 - Weiwei Bai, Junsheng Ren
, Tieshan Li:
Modified genetic optimization-based locally weighted learning identification modeling of ship maneuvering with full scale trial. 1036-1045 - Jianjiang Li, Kai Zhang, Xiaolei Yang, Peng Wei, Jie Wang, Karan Mitra
, Rajiv Ranjan
:
Category Preferred Canopy-K-means based Collaborative Filtering algorithm. 1046-1054 - Chun-Wei Tsai, Shih-Jui Liu:
SEIM: Search economics for influence maximization in online social networks. 1055-1064
- Soohyung Kim, Yon Dohn Chung:
An anonymization protocol for continuous and dynamic privacy-preserving data collection. 1065-1073 - (Withdrawn) Corrigendum to "A framework for risk assessment, management and evaluation: Economic tool for quantifying risks in supply chain" [Future Gener. Comput. Syst. 90 (2019) 489-502]. 1076-1077

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.