


default search action
Future Generation Computer Systems, Volume 89
Volume 89, December 2018
- Joseph Nathanael Witanto
, Hyotaek Lim, Mohammed Atiquzzaman
:
Smart government framework with geo-crowdsourcing and social media analysis. 1-9 - Zhengchun Liu
, Rajkumar Kettimuthu, Ian T. Foster, Peter H. Beckman:
Toward a smart data transfer node. 10-18 - (Withdrawn) Three-way decisions based on neutrosophic sets and AHP-QFD framework for supplier selection problem. 19-30
- Jihe Wang
, Danghui Wang, Meikang Qiu, Yao Chen
, Bing Guo:
A locality-aware shuffle optimization on fat-tree data centers. 31-43 - Muhammad Ajmal Azad
, Samiran Bag, Feng Hao
:
PrivBox: Verifiable decentralized reputation system for online marketplaces. 44-57 - Zemin Chao, Shengfei Shi
, Hong Gao, Jizhou Luo
, Hongzhi Wang
:
A gray-box performance model for Apache Spark. 58-67 - Ab Shaqoor Nengroo
, K. S. Kuppusamy:
Machine learning based heterogeneous web advertisements detection using a diverse feature set. 68-77 - Weihong Chen, Ji-yao An
, Renfa Li, Li Fu, Guoqi Xie
, Md. Zakirul Alam Bhuiyan
, Keqin Li:
A novel fuzzy deep-learning approach to traffic flow prediction with uncertain spatial-temporal data features. 78-88 - Xiaomin Li
, Jiafu Wan
:
Proactive caching for edge computing-enabled industrial mobile wireless networks. 89-97 - Valerio Persico, Antonio Pescapè, Antonio Picariello, Giancarlo Sperlì:
Benchmarking big data architectures for social networks data processing using public cloud platforms. 98-109 - Ashok Kumar Das
, Sherali Zeadally, Debiao He:
Taxonomy and analysis of security protocols for Internet of Things. 110-125 - Enwen Hu, Zhongliang Deng, Mudan Hu, Lu Yin
, Wen Liu:
Cooperative indoor positioning with factor graph based on FIM for wireless sensor network. 126-136 - Mário W. L. Moreira
, Joel J. P. C. Rodrigues
, Arun Kumar Sangaiah
, Jalal Al-Muhtadi, Valery Korotaev:
Semantic interoperability and pattern classification for a service-oriented architecture in pregnancy care. 137-147 - Shehroz Riaz, Maaz Rehan, Tariq Umer
, Muhammad Khalil Afzal, Waqas Rehan
, Ehsan Ullah Munir, Tassawar Iqbal:
FRP: A novel fast rerouting protocol with multi-link-failure recovery for mission-critical WSN. 148-165 - Azadeh Faroughi, Reza Javidan
:
CANF: Clustering and anomaly detection method using nearest and farthest neighbor. 166-177 - Ramadan Gad, Muhammad Talha, Ahmed A. Abd El-Latif
, Mohamed Zorkany, Ayman El-Sayed
, Nawal A. El-Fishawy
, Ghulam Muhammad
:
Iris Recognition Using Multi-Algorithmic Approaches for Cognitive Internet of things (CIoT) Framework. 178-191 - Jianhao Ding
, Lansheng Han, Dan Li
:
An adaptive control momentum method as an optimizer in the cloud. 192-200 - Steven J. Johnston
, Philip James Basford
, Colin S. Perkins
, Herry Herry, Fung Po Tso
, Dimitrios Pezaros
, Robert D. Mullins
, Eiko Yoneki
, Simon J. Cox, Jeremy Singer
:
Commodity single board computer clusters and their applications. 201-212 - Zehua Guo, Yang Xu
, Ruoyan Liu, Andrey Gushchin, Kuan-yin Chen, Anwar Walid, H. Jonathan Chao:
Balancing flow table occupancy and link utilization in software-defined networks. 213-223 - Juan Gómez-Romero
, Miguel Molina-Solana
, Axel Oehmichen
, Yike Guo:
Visualizing large knowledge graphs: A performance analysis. 224-238 - Imran Khan, Habib-ur Rehman
, Mohammad Hussein Fayiz Al-khatib
, Zahid Anwar, Masoom Alam:
A thin client friendly trusted execution framework for infrastructure-as-a-service clouds. 239-248 - Serpil Aslan
, Mehmet Kaya
:
Topic recommendation for authors as a link prediction problem. 249-264 - Hanlin Sun, Wei Jie
, Jonathan Loo
, Lizhe Wang
, Sugang Ma, Gang Han, Zhongmin Wang, Wei Xing:
A parallel self-organizing overlapping community detection algorithm based on swarm intelligence for large scale complex networks. 265-285 - Jixian Zhang
, Ning Xie, Xuejie Zhang, Weidong Li
:
An online auction mechanism for cloud computing resource allocation and pricing based on user evaluation and cost. 286-299 - Deepsubhra Guha Roy
, Bipasha Mahato, Debashis De
, Rajkumar Buyya
:
Application-aware end-to-end delay and message loss estimation in Internet of Things (IoT) - MQTT-SN protocols. 300-316 - Jiatang Cheng, Lei Wang, Qiaoyong Jiang, Zijian Cao, Yan Xiong:
Cuckoo search algorithm with dynamic feedback information. 317-334 - Farid Orujov
, Rytis Maskeliunas
, Robertas Damasevicius, Wei Wei, Ye Li:
Smartphone based intelligent indoor positioning using fuzzy logic. 335-348 - Ibrahim Ghafir, Mohammad Hammoudeh
, Vaclav Prenosil
, Liangxiu Han
, Robert Hegarty
, Khaled M. Rabie, Francisco J. Aparicio-Navarro
:
Detection of advanced persistent threat using machine-learning correlation analysis. 349-359 - Shan Huang
, Dezun Dong, Wei Bai:
Congestion control in high-speed lossless data center networks: A survey. 360-374 - Xiaolong Xu
, Hanzhong Rong, Ella Pereira
, Marcello Trovati
:
Predatory Search-based Chaos Turbo Particle Swarm Optimisation (PS-CTPSO): A new particle swarm optimisation algorithm for Web service combination problems. 375-386 - Touraj Laleh, Joey Paquet, Serguei A. Mokhov
, Yuhong Yan:
Constraint verification failure recovery in web service composition. 387-401 - Xing Liu, Jiqiang Liu, Wei Wang, Sencun Zhu:
Android single sign-on security: Issues, taxonomy and directions. 402-420 - Luca Trani
, Malcolm P. Atkinson, Daniele Bailo
, Rossana Paciello
, Rosa Filgueira
:
Establishing Core Concepts for Information-Powered Collaborations. 421-437 - Yongfeng Qian
, Jiayi Lu, Yiming Miao
, Wen Ji, Renchao Jin, Enmin Song:
AIEM: AI-enabled affective experience management. 438-445 - Szu-Yin Lin
, Chi-Chun Chiang, Jung-Bin Li, Zih-Siang Hung, Kuo-Ming Chao
:
Dynamic fine-tuning stacked auto-encoder neural network for weather forecast. 446-454 - Dan Liu, Xin Sui, Li Li, Zhengang Jiang, Huan Wang
, Zetian Zhang, Yan Zeng:
A cloud service adaptive framework based on reliable resource allocation. 455-463 - Walayat Hussain
, Farookh Khadeer Hussain, Morteza Saberi
, Omar Khadeer Hussain
, Elizabeth Chang
:
Comparing time series with machine learning-based prediction approaches for violation management in cloud SLAs. 464-477 - Laizhong Cui, Kai Zhang, Genghui Li
, Xizhao Wang, Shu Yang, Zhong Ming, Joshua Zhexue Huang, Nan Lu:
A smart artificial bee colony algorithm with distance-fitness-based neighbor search and its application. 478-493 - Yifei Zhang, Hongming Cai, Boyi Xu, Thanos Vasilakos
, Chengxi Huang:
Data driven business rule generation based on fog computing. 494-505 - Shudong Liu
, Lei Wang:
A self-adaptive point-of-interest recommendation algorithm based on a multi-order Markov model. 506-514 - Chen Xu, Peilong Li, Yan Luo:
A programmable policy engine to facilitate time-efficient science DMZ management. 515-524 - Jemal H. Abawajy, Md. Shamsul Huda, Shaila Sharmeen, Mohammad Mehedi Hassan
, Ahmad Almogren
:
Identifying cyber threats to mobile-IoT applications in edge computing paradigm. 525-538 - Mazin Abed Mohammed
, Mohd Khanapi Abd Ghani, Arunkumar N.
, Raed Ibraheem Hamed
, Mohamad Khir Abdullah
, Burhanuddin Mohd Aboobaider:
A real time computer aided object detection of nasopharyngeal carcinoma using genetic algorithm and artificial neural network based on Haar feature fear. 539-547 - Danilo Ardagna
, Cinzia Cappiello
, Walter Samá, Monica Vitali
:
Context-aware data quality assessment for big data. 548-562 - Shilpi Bhattacharyya, Dimitrios Katramatos, Shinjae Yoo
:
Why wait? Let us start computing while the data is still on the wire. 563-574 - Hamza Turabieh
, Amer O. Abu Salem
, Noor Abu-El-Rub:
Dynamic L-RNN recovery of missing data in IoMT applications. 575-583 - Vitor A. C. Horta, Victor Ströele
, Regina Braga
, José Maria N. David
, Fernanda Campos:
Analyzing scientific context of researchers and communities by using complex network and semantic technologies. 584-605 - Guanglu Sun, Jiabin Li, Jian Dai, Zhichao Song, Fei Lang
:
Feature selection for IoT based on maximal information coefficient. 606-616 - Leila Eskandari, Jason Mair, Zhiyi Huang, David M. Eyers
:
T3-Scheduler: A topology and Traffic aware two-level Scheduler for stream processing systems in a heterogeneous cluster. 617-632 - Richard Olaniyan
, Olamilekan Fadahunsi
, Muthucumaru Maheswaran, Mohamed Faten Zhani
:
Opportunistic Edge Computing: Concepts, opportunities and research challenges. 633-645 - Davide Carneiro
, Ana P. Pinheiro
, Marta Pereira, Inês Ferreira, Miguel Domingues
, Paulo Novais
:
Using behavioral features in tablet-based auditory emotion recognition studies. 646-658 - Long Chen, Xiaoping Li
, Rubén Ruiz
:
Idle block based methods for cloud workflow scheduling with preemptive and non-preemptive tasks. 659-669 - Tao Huang, Boyi Xu, Hongming Cai, Jiawei Du, Kuo-Ming Chao
, Chengxi Huang:
A fog computing based concept drift adaptive process mining framework for mobile APPs. 670-684 - Kshira Sagar Sahoo
, Deepak Puthal, Mayank Tiwary
, Joel J. P. C. Rodrigues
, Bibhudatta Sahoo
, Ratnakar Dash:
An early detection of low rate DDoS attack to SDN based data center networks using information distance metrics. 685-697 - Yongli Cheng, Fang Wang, Hong Jiang, Yu Hua, Dan Feng, Yunxiang Wu
, Tingwei Zhu
, Wenzhong Guo:
A highly cost-effective task scheduling strategy for very large graph computation. 698-712 - Hua Guo, Yandong Zheng, Xiong Li
, Zhoujun Li, Chunhe Xia:
Self-healing group key distribution protocol in wireless sensor networks for secure IoT communications. 713-721 - Fangxiaoqi Yu
, Haopeng Chen, Jinqing Xu:
DMPO: Dynamic mobility-aware partial offloading in mobile edge computing. 722-735 - Fatma Alali, Nathan Hanford
, Eric Pouyoul, Rajkumar Kettimuthu, Mariam Kiran, Ben Mack-Crane, Brian Tierney, Yatish Kumar, Dipak Ghosal:
Calibers: A bandwidth calendaring paradigm for science workflows. 736-745 - Zhaofeng Ma, Ming Jiang, Hongmin Gao, Zhen Wang:
Blockchain for digital rights management. 746-764 - Babak Ravandi
, Ioannis Papapanagiotou:
A self-organized resource provisioning for cloud block storage. 765-776 - Sumith N., Annappa B.
, Swapan Bhattacharya
:
Influence maximization in large social networks: Heuristics, models and parameters. 777-790 - Angelo Furfaro
, Antonio Piccolo, Andrea Parise, Luciano Argento, Domenico Saccà
:
A Cloud-based platform for the emulation of complex cybersecurity scenarios. 791-803 - Giancarlo Fortino
, Fabrizio Messina
, Domenico Rosaci
, Giuseppe M. L. Sarnè:
Using trust and local reputation for group formation in the Cloud of Things. 804-815

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.