


default search action
Future Generation Computer Systems, Volume 110
Volume 110, September 2020
- Pablo Tesone, Guillermo Polito, Luc Fabresse
, Noury Bouraqadi, Stéphane Ducasse:
Preserving instance state during refactorings in live environments. 1-17 - Shirzad Shahryari, Seyed Amin Hosseini Seno
, Farzad Tashtarian:
An SDN based framework for maximizing throughput and balanced load distribution in a Cloudlet network. 18-32
- Roger D. Chamberlain:
Architecturally truly diverse systems: A review. 33-44
- Hassan Nasiraee
, Maede Ashouri-Talouki
:
Anonymous decentralized attribute-based access control for cloud-assisted IoT. 45-56
- Junchao Wang, Kaining Han, Shengwen Fan, Ying Zhang, Honghao Tan, Gwanggil Jeon, Yu Pang, Jinzhao Lin:
A logistic mapping-based encryption scheme for Wireless Body Area Networks. 57-67
- Sachini Jayasekara, Aaron Harwood, Shanika Karunasekera:
A utilization model for optimization of checkpoint intervals in distributed stream processing systems. 68-79
- S. Velliangiri
, Hari Mohan Pandey:
Fuzzy-Taylor-elephant herd optimization inspired Deep Belief Network for DDoS attack detection and comparison with state-of-the-arts algorithms. 80-90
- Nickolaos Koroniotis, Nour Moustafa
, Elena Sitnikova
:
A new network forensic framework based on deep learning for Internet of Things networks: A particle deep framework. 91-106
- Ali Reza Zamani, Daniel Balouek-Thomert, Juan J. Villalobos, Ivan Rodero
, Manish Parashar:
An edge-aware autonomic runtime for data streaming and in-transit processing. 107-118
- Ignacio Blanquer, Francisco V. Brasileiro, Andrey Brito, Amanda Calatrava
, André Carvalho, Christof Fetzer, Flavio V. D. de Figueiredo, Ronny Petterson Guimarães, Leandro Bezerra Marinho
, Wagner Meira Jr., Altigran S. da Silva, Angel Alberich-Bayarri, Eduardo Camacho-Ramos, Ana Jimenez-Pastor, Antonio Luiz L. Ribeiro, Bruno Ramos Nascimento, Fábio Silva:
Federated and secure cloud services for building medical image classifiers on an intercontinental infrastructure. 119-134
- Roni Mateless, Daniel Rejabek, Oded Margalit, Robert Moskovitch:
Decompiled APK based malicious code classification. 135-147
- Marek Pawlicki
, Michal Choras, Rafal Kozik
:
Defending network intrusion detection systems against adversarial evasion attacks. 148-154
- David Buchaca Prats
, Joan Marcual, Josep Lluis Berral
, David Carrera:
Sequence-to-sequence models for workload interference prediction on batch processing datacenters. 155-166
- Wei Liu, Jingzhi Guo, Feng Yao, Deng Chen
:
Adaptive protocol generation for group collaborative in smart medical waste transportation. 167-180
- Inder Monga
, Chin Guok, John MacAuley
, Alex Sim
, Harvey B. Newman, Justas Balcas, Phil DeMar, Linda Winkler, Tom Lehman, Xi Yang:
Software-Defined Network for End-to-end Networked Science at the Exascale. 181-201
- Dong H. Ahn, Ned Bass, Albert Chu, Jim Garlick, Mark Grondona, Stephen Herbein, Helgi I. Ingólfsson
, Joseph Koning
, Tapasya Patki
, Thomas R. W. Scogland
, Becky Springmeyer, Michela Taufer
:
Flux: Overcoming scheduling challenges for exascale workflows. 202-213
- Gael Pérez Rodríguez
, Martín Pérez-Pérez
, Florentino Fdez-Riverola
, Anália Lourenço
:
Mining the sociome for Health Informatics: Analysis of therapeutic lifestyle adherence of diabetic patients in Twitter. 214-232
- Jie Li, Jianming Zhi, Wei Hu, Liya Wang
, Aimin Yang:
Research on the improvement of vision target tracking algorithm for Internet of things technology and Simple extended application in pellet ore phase. 233-242
- Zoltán Ádám Mann:
Secure software placement and configuration. 243-253
- Moayad Aloqaily
, Haythem Bany Salameh
, Ismaeel Al Ridhawi, Khalaf Batieha, Jalel Ben-Othman:
A multi-stage resource-constrained spectrum access mechanism for cognitive radio IoT networks: Time-spectrum block utilization. 254-266
- Javier Carrillo Mondéjar
, José Luis Martínez
, Guillermo Suarez-Tangil
:
Characterizing Linux-based malware: Findings and recent trends. 267-281
- Dhanalakshmi B. K., K. C. Srikantaiah
, K. R. Venugopal:
Carry Forward and Access Control for Unused Resources in Multi Sharing System of Hybrid Cloud. 282-290 - Jing Wang, Huyin Zhang, Xing Tang
, Zongpeng Li:
Delay-tolerant routing and message scheduling for CR-VANETs. 291-309
- Sabeur Aridhi, José A. F. de Macêdo, Engelbert Mephu Nguifo
, Karine Zeitouni
:
Special issue on "Advances on Large Evolving Graphs". 310
- Simona Bernardi, Ugo Gentile
, Roberto Nardone, Stefano Marrone:
Advancements in knowledge elicitation for computer-based critical systems. 311-313
- Wojciech Mazurczyk
, Pascal Bisson, Roger Piqueras Jover, Koji Nakao, Krzysztof Cabaj
:
Special issue on Advancements in 5G Networks Security. 314-316
- Ansar-Ul-Haque Yasar, Haroon Malik, Elhadi M. Shakshuki:
Special Issue on Emerging trends in Ubiquitous Systems and Pervasive Networks. 317-319
- Maytal Dahan
, Rebecca Pirzl
, Sandra Gesing:
International Science Gateways 2017 Special issue. 320-322
- Glenn Cich, Irith Ben-Arroyo Hartman, Luk Knapen
, Davy Janssens
:
A simulation study of commuting alternatives for day care centres. 323-337 - Wim Ectors
, Sofie Reumers, Won Do Lee
, Bruno Kochan
, Davy Janssens
, Tom Bellemans
, Geert Wets
:
Optimizing copious activity type classes based on classification accuracy and entropy retention. 338-349 - Olga Petrik, Muhammad Adnan
, Kakali Basak, Moshe E. Ben-Akiva
:
Uncertainty analysis of an activity-based microsimulation model for Singapore. 350-363 - Marko Celan, Marjan Lep:
Bus-arrival time prediction using bus network data model and time periods. 364-371 - Awadh Gaamel
, Tarek R. Sheltami
, Anas Al-Roubaiey
, Elhadi M. Shakshuki:
Broker-less middleware for WSAN performance evaluation. 372-381 - Feras N. Al-Obeidat
, Bruce Spencer, Omar Alfandi
:
Consistently accurate forecasts of temperature within buildings from sensor data using ridge and lasso regression. 382-392 - Jan Vuurstaek
, Glenn Cich
, Luk Knapen
, Wim Ectors
, Ansar-Ul-Haque Yasar
, Tom Bellemans
, Davy Janssens
:
GTFS bus stop mapping to the OSM network. 393-406 - Salvatore Cuomo
, Vittorio Di Somma, Francesco Piccialli:
Pricing estimation of a barrier option in an IoT scenario. 407-412 - Feras N. Al-Obeidat
, Bruce Spencer
, May Al Taei:
Identifying major tasks and minor tasks within online reviews. 413-421
- Vítor Silva, Leonardo Neves, Renan Souza, Alvaro L. G. A. Coutinho, Daniel de Oliveira, Marta Mattoso
:
Adding domain data to code profiling tools to debug workflow parallel execution. 422-439 - Silvina Caíno-Lores, Andrei Lapin
, Jesús Carretero
, Peter G. Kropf
:
Applying big data paradigms to a large scale scientific workflow: Lessons learned and future directions. 440-452 - Raffaele Montella
, Alison Brizius, Diana Di Luccio
, Cheryl H. Porter, Joshua Elliott, Ravi K. Madduri
, David Kelly, Angelo Riccio
, Ian T. Foster:
Using the FACE-IT portal and workflow engine for operational food quality prediction and assessment: An application to mussel farms monitoring in the Bay of Napoli, Italy. 453-467 - Christopher S. Daley
, Devarshi Ghoshal, Glenn K. Lockwood
, Sudip S. Dosanjh, Lavanya Ramakrishnan, Nicholas J. Wright
:
Performance characterization of scientific workflows for the optimal use of Burst Buffers. 468-480 - Renan Souza, Vítor Silva, Alvaro L. G. A. Coutinho, Patrick Valduriez, Marta Mattoso
:
Data reduction in scientific workflows using provenance monitoring and user steering. 481-501 - Maciej Malawski
, Adam Gajek, Adam Zima, Bartosz Balis
, Kamil Figiela:
Serverless execution of scientific workflows: Experiments with HyperFlow, AWS Lambda and Google Cloud Functions. 502-514 - Tong Shu, Chase Q. Wu:
Energy-efficient mapping of large-scale workflows under deadline constraints in big data computing systems. 515-530
- Evangelos Psomakelis
, Konstantinos Tserpes, Dimitris Zissis, Dimosthenis Anagnostopoulos, Theodora A. Varvarigou:
Context agnostic trajectory prediction based on λ-architecture. 531-539 - Georgios M. Santipantakis
, Apostolos Glenis, Kostas Patroumpas, Akrivi Vlachou, Christos Doulkeridis, George A. Vouros
, Nikos Pelekis, Yannis Theodoridis
:
SPARTAN: Semantic integration of big spatio-temporal data from streaming and archival sources. 540-555 - Zhongliang Zhao, Mostafa Karimzadeh
, Florian Gerber, Torsten Braun
:
Mobile crowd location prediction with hybrid features using ensemble learning. 556-571 - Vangelis Marinakis, Haris Ch. Doukas, John Tsapelas, Spyros Mouzakitis
, Álvaro Sicilia
, Leandro Madrazo, Sgouris P. Sgouridis
:
From big data to smart energy services: An application for intelligent energy management. 572-586 - Nikos Giatrakos
, Antonios Deligiannakis, Minos N. Garofalakis, Yannis Kotidis:
Omnibus outlier detection in sensor networks using windowed locality sensitive hashing. 587-609 - Marc Hüsch
, Bruno U. Schyska, Lueder von Bremen:
CorClustST - Correlation-based clustering of big spatio-temporal datasets. 610-619 - Thin Nguyen
, Mark E. Larsen, Bridianne O'Dea
, Hung Nguyen, Duc Thanh Nguyen, John Yearwood, Dinh Quoc Phung
, Svetha Venkatesh, Helen Christensen:
Using spatiotemporal distribution of geocoded Twitter data to predict US county-level health indices. 620-628
- Ta-Wei Yang
, Yu-Han Ho, Cheng-Fu Chou:
Achieving M2M-device authentication through heterogeneous information bound with USIM card. 629-637 - Han Lee, Maode Ma:
Blockchain-based mobility management for 5G. 638-646
- Yongnan Liu, Xin Guan, Jun Li, Di Sun, Tomoaki Ohtsuki
, Mohammad Mehedi Hassan, Abdulhameed Alelaiwi:
Evaluating smart grid renewable energy accommodation capability with uncertain generation using deep reinforcement learning. 647-657 - Jing Zhang, Minhao Lou, Lin Xiang
, Long Hu:
Power cognition: Enabling intelligent energy harvesting and resource allocation for solar-powered UAVs. 658-664
- Kuan Fan, Zijian Bao, Mingxi Liu, Athanasios V. Vasilakos
, Wenbo Shi:
Dredas: Decentralized, reliable and efficient remote outsourced data auditing scheme with blockchain smart contract for industrial IoT. 665-674 - Junchao Wang, Kaining Han, Anastasios Alexandridis
, Zhiyu Chen, Zeljko Zilic, Yu Pang, Gwanggil Jeon, Francesco Piccialli:
A blockchain-based eHealthcare system interoperating with WBANs. 675-685 - Zhitao Guan, Xin Lu, Naiyu Wang, Jun Wu, Xiaojiang Du, Mohsen Guizani
:
Towards secure and efficient energy trading in IIoT-enabled energy internet: A blockchain approach. 686-695 - Qin Wang
, Haitao Zhao, Qianqian Wang, Haotong Cao, Gagangeet Singh Aujla, Hongbo Zhu:
Enabling secure wireless multimedia resource pricing using consortium blockchains. 696-707 - Bin Zhang, Wentao Xiao, Xi Xiao, Arun Kumar Sangaiah
, Weizhe Zhang, Jiajia Zhang:
Ransomware classification using patch-based CNN and self-attention network on embedded N-grams of opcodes. 708-720 - Sushil Kumar Singh, Shailendra Rathore, Jong Hyuk Park:
BlockIoTIntelligence: A Blockchain-enabled Intelligent IoT Architecture with Artificial Intelligence. 721-743
- Mohamed Falah Faiz, Junaid Arshad, Mamoun Alazab
, Andrii Shalaginov:
Predicting likelihood of legitimate data loss in email DLP. 744-757 - Khin Nandar Win
, Kenli Li, Jianguo Chen
, Philippe Fournier-Viger, Keqin Li:
Fingerprint classification and identification algorithms for criminal investigation: A survey. 758-771
- Jun Yang, Wenjing Xiao, Huimin Lu, Ahmed Barnawi:
Wireless high-frequency NLOS monitoring system for heart disease combined with hospital and home. 772-780 - Oluwarotimi Williams Samuel, Bin Yang, Yanjuan Geng, Mojisola Grace Asogbon, Sandeep Pirbhulal
, Deogratias Mzurikwao
, Oluwagbenga Paul Idowu
, Tunde Joseph Ogundele, Xiangxin Li, Shixiong Chen, Ganesh R. Naik
, Peng Fang
, Fanghai Han, Guanglin Li
:
A new technique for the prediction of heart failure risk driven by hierarchical neighborhood component-based learning and adaptive multi-layer networks. 781-794 - Xu Chen, Jianjun Li, Yanchao Zhang, Yu Lu, Shaoyu Liu:
Automatic feature extraction in X-ray image based on deep learning approach for determination of bone age. 795-801 - Kelvin Kian Loong Wong
, Giancarlo Fortino, Derek Abbott
:
Deep learning-based cardiovascular image diagnosis: A promising challenge. 802-811
- Hao Wang
, Shenglan Ma, Hong-Ning Dai
, Muhammad Imran, Tongsen Wang:
Blockchain-based data privacy management with Nudge theory in open banking. 812-823
- Anitta Patience Namanya, Irfan-Ullah Awan, Jules Pagna Disso, Muhammad Younas:
Similarity hash based scoring of portable executable files for efficient malware detection in IoT. 824-832
- Rui André Oliveira
, Miquel Martínez Raga, Nuno Laranjeiro
, Marco Vieira
:
An approach for benchmarking the security of web service frameworks. 833-848
- Hui Li, Zhe Li, Sizhe Peng, Jingjing Li, Chia Emmanuel Tungom:
Mining the frequency of time-constrained serial episodes over massive data sequences and streams. 849-863 - Teodoro Eduardo Macias-Escobar
, Laura Cruz-Reyes
, Héctor J. Fraire H., Bernabé Dorronsoro:
Plane Separation: A method to solve dynamic multi-objective optimization problems with incorporated preferences. 864-875 - Francisco Luna
, Pablo H. Zapata-Cano, Juan C. Gonzalez-Macias, Juan F. Valenzuela-Valdés:
Approaching the cell switch-off problem in 5G ultra-dense networks with dynamic multi-objective optimization. 876-891
- Ao Lei, Yue Cao
, Shihan Bao, Dasen Li, Philip Michael Asuquo, Haitham S. Cruickshank, Zhili Sun:
A blockchain based certificate revocation scheme for vehicular communication systems. 892-903
- Paolo Mengoni, Alfredo Milani, Valentina Poggioni, Yuanxi Li
:
Community elicitation from co-occurrence of activities. 904-917 - Fabio R. Gallo, Gerardo I. Simari, Maria Vanina Martinez
, Marcelo A. Falappa
:
Predicting user reactions to Twitter feed content based on personality type and social cues. 918-930 - Fabio Persia, Giovanni Pilato, Mouzhi Ge, Paolo Bolzoni, Daniela D'Auria, Sven Helmer:
Improving orienteering-based tourist trip planning with social sensing. 931-945 - Ben De Meester, Tom Seymoens
, Anastasia Dimou
, Ruben Verborgh:
Implementation-independent function reuse. 946-959
- Ángel Panizo-LLedot, Gema Bello Orgaz, David Camacho
:
A Multi-Objective Genetic Algorithm for detecting dynamic communities using a local search driven immigrant's scheme. 960-975 - Senaka Fernando, Julio Amador Díaz López
, Ovidiu Serban
, Juan Gómez-Romero, Miguel Molina-Solana
, Yike Guo:
Towards a large-scale twitter observatory for political events. 976-983 - Mattia Atzeni, Diego Reforgiato Recupero
:
Multi-domain sentiment analysis with mimicked and polarized word embeddings for human-robot interaction. 984-999 - Flor Miriam Plaza del Arco
, María Teresa Martín Valdivia, Luis Alfonso Ureña López, Ruslan Mitkov:
Improved emotion recognition in Spanish social media through incorporation of lexical knowledge. 1000-1008
- Alessio Netti, Zeynep Kiziltan, Özalp Babaoglu
, Alina Sîrbu
, Andrea Bartolini
, Andrea Borghesi
:
A machine learning approach to online fault classification in HPC systems. 1009-1022 - Feiyun Xiao
, Decai Yang, Zhongming Lv, Xiaohui Guo, Zhengshi Liu, Yong Wang:
Classification of hand movements using variational mode decomposition and composite permutation entropy index with surface electromyogram signals. 1023-1036 - José Puche
, Salvador Petit
, María Engracia Gómez
, Julio Sahuquillo:
An efficient cache flat storage organization for multithreaded workloads for low power processors. 1037-1054 - Patrick Seeling
:
WWW Retrieval Handling Optimization wρ3: A metric for webpage timeout setting performance evaluation and comparison. 1055-1066 - Vivek Singh Bawa, Vinay Kumar:
Mutually independent feature flow: An approach to produce fixed complexity latent space for improved performance and decreased parameter count. 1067-1078 - Gaith Rjoub, Jamal Bentahar
, Omar Abdel Wahab:
BigTrustScheduling: Trust-aware big data task scheduling approach in cloud computing environments. 1079-1097 - Pegah Gazori, Dadmehr Rahbari
, Mohsen Nickray:
Saving time and cost on the scheduling of fog-based IoT applications using deep reinforcement learning approach. 1098-1115 - Minh-Thuyen Thi
, Jean-Marc Pierson, Georges Da Costa, Patricia Stolf, Jean-Marc Nicod, Gustavo Rostirolla, Marwa Haddad:
Negotiation game for joint IT and energy management in green datacenters. 1116-1138 - Tribikram Pradhan
, Sukomal Pal:
A hybrid personalized scholarly venue recommender system integrating social network analysis and contextual similarity. 1139-1166

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.