default search action
Future Generation Computer Systems, Volume 87
Volume 87, October 2018
- Vitor Barbosa C. Souza, Xavier Masip-Bruin, Eva Marín-Tordera, Sergio Sánchez-López, Jordi Garcia, Guang-Jie Ren, Admela Jukan, Ana Juan Ferrer:
Towards a proper service placement in combined Fog-to-Cloud (F2C) architectures. 1-15 - Dawid Polap, Marcin Wozniak, Wei Wei, Robertas Damasevicius:
Multi-threaded learning control mechanism for neural networks. 16-34 - Joseph Nathanael Witanto, Hyotaek Lim, Mohammed Atiquzzaman:
Adaptive selection of dynamic VM consolidation algorithm using neural network for cloud resource management. 35-42 - Alessio Arleo, Walter Didimo, Giuseppe Liotta, Fabrizio Montecchiani:
Profiling distributed graph processing systems through visual analytics. 43-57 - Seyyed Amir Asghari, Mohammadreza Binesh Marvasti, Amir M. Rahmani:
Enhancing transient fault tolerance in embedded systems through an OS task level redundancy approach. 58-65 - Jorge Gonzalez-Lopez, Sebastián Ventura, Alberto Cano:
Distributed nearest neighbor classification for large-scale multi-label data on spark. 66-82 - Maryam Amiri, Leili Mohammad Khanli, Raffaela Mirandola:
An online learning model based on episode mining for workload prediction in cloud. 83-101 - Mhamed Zineddine:
Optimizing security and quality of service in a real-time operating system using multi-objective Bat algorithm. 102-114 - Ayoub Bahnasse, Fatima Ezzahraa Louhab, Hafsa Ait Oulahyane, Mohamed Talea, Assia Bakali:
Novel SDN architecture for smart MPLS Traffic Engineering-DiffServ Aware management. 115-126 - Jen Hong Tan, Sulatha V. Bhandary, Sobha Sivaprasad, Yuki Hagiwara, Akanksha Bagchi, U. Raghavendra, A. Krishna Rao, Biju Raju, Nitin Shridhara Shetty, Arkadiusz Gertych, Kuang Chua Chua, U. Rajendra Acharya:
Age-related Macular Degeneration detection using deep convolutional neural network. 127-135 - Daniele De Sensi, Tiziano De Matteis, Marco Danelutto:
Simplifying self-adaptive and power-aware computing with Nornir. 136-151 - Boris Vaisband, Eby G. Friedman:
Heterogeneous 3-D ICs as a platform for hybrid energy harvesting in IoT systems. 152-158 - Lesandro Ponciano, Francisco Vilar Brasileiro:
Agreement-based credibility assessment and task replication in human computation systems. 159-170 - Valeria Cardellini, Francesco Lo Presti, Matteo Nardelli, Gabriele Russo Russo:
Decentralized self-adaptation for elastic Data Stream Processing. 171-185 - Yezheng Liu, Fei Du, Jianshan Sun, Yuanchun Jiang, Jianmin He, Tingting Zhu, Chunhua Sun:
A crowdsourcing-based topic model for service matchmaking in Internet of Things. 186-197 - Juan Luis Pérez, Alberto Gutierrez-Torre, Josep Lluis Berral, David Carrera:
A resilient and distributed near real-time traffic forecasting application for Fog computing environments. 198-212 - Rui Li, Zhaohui Liu, Huayi Wu, Ru Li, Guangsheng Dong, Jie Jiang:
Hierarchical decomposition method and combination forecasting scheme for access load on public map service platforms. 213-227 - David del Rio Astorga, Manuel F. Dolz, Javier Fernández, José Daniel García:
Paving the way towards high-level parallel pattern interfaces for data stream processing. 228-241 - Pedro Morillo, Juan M. Orduña, Marcos Fernández, Inma García-Pereira:
Comparison of WSN and IoT approaches for a real-time monitoring system of meal distribution trolleys: A case study. 242-250 - Jun Ye, Zheng Xu, Yong Ding:
Image search scheme over encrypted database. 251-258 - Yangfan Li, Wei Ren, Tianqing Zhu, Yi Ren, Yue Qin, Wei Jie:
RIMS: A Real-time and Intelligent Monitoring System for live-broadcasting platforms. 259-266 - Weifeng Pan, Chunlai Chai:
Structure-aware Mashup service Clustering for cloud-based Internet of Things using genetic algorithm based clustering algorithm. 267-277 - Mohammad Aazam, Sherali Zeadally, Khaled A. Harras:
Offloading in fog computing for IoT: Review, enabling technologies, and research opportunities. 278-289 - Javeria Amin, Muhammad Sharif, Mussarat Yasmin, Steven Lawrence Fernandes:
Big data analysis for brain tumor detection: Deep convolutional neural networks. 290-297 - Honghao Gao, Wanqiu Huang, Xiaoxian Yang, Yucong Duan, Yuyu Yin:
Toward service selection for workflow reconfiguration: An interface-based computing solution. 298-311 - Wei Yu, Shijun Li:
Recommender systems based on multiple social networks correlation. 312-327 - Ghulam Jillani Ansari, Jamal Hussain Shah, Mussarat Yasmin, Muhammad Sharif, Steven Lawrence Fernandes:
A novel machine learning approach for scene text extraction. 328-340 - Ping Li, Tong Li, Heng Ye, Jin Li, Xiaofeng Chen, Yang Xiang:
Privacy-preserving machine learning with multiple data providers. 341-350 - Maroua Meddeb, Amine Dhraief, Abdelfettah Belghith, Thierry Monteil, Khalil Drira, Sofien Gannouni:
AFIRM: Adaptive forwarding based link recovery for mobility support in NDN/IoT networks. 351-363 - Haleem Farman, Bilal Jan, Huma Javed, Naveed Ahmed, Javed Iqbal, Muhammad Arshad, Shaukat Ali:
Multi-criteria based zone head selection in Internet of Things based wireless sensor networks. 364-371 - Shubbhi Taneja, Yi Zhou, Xiao Qin:
Thermal benchmarking and modeling for HPC using big data applications. 372-381 - Wei Xiong, Zhihui Lu, Bing Li, Bo Hang, Zhao Wu:
Automating smart recommendation from natural language API descriptions via representation learning. 382-391 - Claudia Misale, Maurizio Drocco, Guy Tremblay, Alberto Riccardo Martinelli, Marco Aldinucci:
PiCo: High-performance data analytics pipelines in modern C++. 392-403 - Baolei Cheng, Jianxi Fan, Qiang Lyu, Jingya Zhou, Zhao Liu:
Constructing independent spanning trees with height n on the n-dimensional crossed cube. 404-415
- Anna Kobusinska, Carson Kai-Sang Leung, Ching-Hsien Hsu, Raghavendra S., Victor Chang:
Emerging trends, issues and challenges in Internet of Things, Big Data and cloud computing. 416-419 - Jonatan Enes, Roberto R. Expósito, Juan Touriño:
BDWatchdog: Real-time monitoring and profiling of Big Data applications and frameworks. 420-437 - Feifei Zhang, Jidong Ge, Zhongjin Li, Chuanyi Li, Chifong Wong, Li Kong, Bin Luo, Victor I. Chang:
A load-aware resource allocation and task scheduling for the emerging cloudlet system. 438-456 - Gang Sun, Dan Liao, Dongcheng Zhao, Zhili Sun, Victor I. Chang:
Towards provisioning hybrid virtual networks in federated cloud data centers. 457-469 - Chih-Tien Fan, Yue-Shan Chang, Shyan-Ming Yuan:
VM instance selection for deadline constraint job on agent-based interconnected cloud. 470-487 - Masoom Alam, Naina Emmanuel, Tanveer Khan, Abid Khan, Nadeem Javaid, Kim-Kwang Raymond Choo, Rajkumar Buyya:
Secure policy execution using reusable garbled circuit in the cloud. 488-501 - Anna Kobusinska, Ching-Hsien Hsu:
Towards increasing reliability of clouds environments with RESTful web services. 502-513 - Chen Gu, Matthew Bradbury, Jack Kirton, Arshad Jhumka:
A decision theoretic framework for selecting source location privacy aware routing protocols in wireless sensor networks. 514-526 - Fangliang Xu, Yijie Wang, Xingkong Ma:
Incremental encoding for erasure-coded cross-datacenters cloud storage. 527-537 - Wasim Ahmad Bhat:
Bridging data-capacity gap in big data storage. 538-548 - Bin Zhang, Xiaoyang Wang, Zhigao Zheng:
The optimization for recurring queries in big data analysis system with MapReduce. 549-556 - Zhenqiu Huang, Kwei-Jay Lin, Bo-Lung Tsai, Surong Yan, Chi-Sheng Shih:
Building edge intelligence for online activity recognition in service-oriented IoT systems. 557-567 - Chih-Hua Tai, Ching-Tang Chang, Yue-Shan Chang:
Hybrid knowledge fusion and inference on cloud environment. 568-579 - Meisong Wang, Prem Prakash Jayaraman, Ellis Solaiman, Lydia Y. Chen, Zheng Li, Jun Song, Dimitrios Georgakopoulos, Rajiv Ranjan:
A multi-layered performance analysis for cloud-based topic detection and tracking in Big Data applications. 580-590 - Wei Liang, Xiaokang Zhou, Suzhen Huang, Chunhua Hu, Xuesong Xu, Qun Jin:
Modeling of cross-disciplinary collaboration for potential field discovery and recommendation based on scholarly big data. 591-600 - Mouzhi Ge, Hind Bangui, Barbora Buhnova:
Big Data for Internet of Things: A Survey. 601-614
- Jesús Carretero, Francisco Javier García Blas, Gabriel Antoniu, Dana Petcu:
New directions in mobile, hybrid, and heterogeneous clouds for cyberinfrastructures. 615-617 - Giovanni Mariani, Andreea Anghel, Rik Jongerius, Gero Dittmann:
Predicting cloud performance for HPC applications before deployment. 618-628 - Alexandros Evangelidis, David Parker, Rami Bahsoon:
Performance modelling and verification of cloud-based auto-scaling policies. 629-638 - Abhinandan S. Prasad, David Koll, Jesús Omana Iglesias, Jordi Arjona Aroca, Volker Hilt, Xiaoming Fu:
RConf(PD): Automated resource configuration of complex services in the cloud. 639-650 - Saul Alonso Monsalve, Félix García Carballeira, Alejandro Calderón:
A heterogeneous mobile cloud computing model for hybrid clouds. 651-666 - Yunbo Li, Anne-Cécile Orgerie, Ivan Rodero, Betsegaw Lemma Amersho, Manish Parashar, Jean-Marc Menaud:
End-to-end energy models for Edge Cloud-based IoT platforms: Application to data stream analysis in IoT. 667-678 - Zhiwei Wang:
Leakage resilient ID-based proxy re-encryption scheme for access control in fog computing. 679-685
- Jun Zhang, Aniello Castiglione, Laurence Tianruo Yang, Yan Zhang:
Recent advances in security and privacy in Social Big Data. 686-687 - Bidyut Mukherjee, Songjie Wang, Wenyi Lu, Roshan Lal Neupane, Daniel Dunn, Yijie Ren, Qi Su, Prasad Calyam:
Flexible IoT security middleware for end-to-end cloud-fog communication. 688-703 - Yuyi Fang, Zhiwei Zhao, Zi Wang, Geyong Min, Yue Cao, Haojun Huang, Hao Yin:
Eavesdrop with PoKeMon: Position free keystroke monitoring using acoustic data. 704-711 - Zehong Chen, Fangguo Zhang, Peng Zhang, Joseph K. Liu, Jiwu Huang, Hanbang Zhao, Jian Shen:
Verifiable keyword search for secure big data-based mobile healthcare networks with fine-grained authorization control. 712-724 - Mansura Habiba, Md. Rafiqul Islam, A. B. M. Shawkat Ali:
A component based unified architecture for utility service in cloud. 725-742 - Muhammad Al-Qurishi, Majed A. AlRubaian, Sk. Md. Mizanur Rahman, Atif Alamri, Mohammad Mehedi Hassan:
A prediction system of Sybil attack in social network using deep-regression model. 743-753 - Flora Amato, Francesco Moscato, Vincenzo Moscato, Francesco Colace:
Improving security in cloud by formal modeling of IaaS resources. 754-764 - Jun Cai, Yu Wang, Yan Liu, Jian-Zhen Luo, Wenguo Wei, Xiaoping Xu:
Enhancing network capacity by weakening community structure in scale-free network. 765-771 - Meikang Qiu, Keke Gai, Zenggang Xiong:
Privacy-preserving wireless communications using bipartite matching in social big data. 772-781 - Hong Yao, Muzhou Xiong, Deze Zeng, Junfang Gong:
Mining multiple spatial-temporal paths from social media data. 782-791 - Shuo Wang, Richard O. Sinnott, Surya Nepal:
Privacy-protected statistics publication over social media user trajectory streams. 792-802 - Dapeng Wu, Feng Zhang, Honggang Wang, Ruyan Wang:
Security-oriented opportunistic data forwarding in Mobile Social Networks. 803-815 - Tianqing Zhu, Gang Li, Ping Xiong, Wanlei Zhou:
Answering differentially private queries for continual datasets release. 816-827
- Jörn Altmann, José Ángel Bañares, Ioan Petri:
Economics of Computing Services: A literature survey about technologies for an economy of fungible cloud services. 828-830 - John O'Loughlin, Lee Gillam:
A performance brokerage for heterogeneous clouds. 831-845 - Mathias Slawik, Begüm Ilke Zilci, Axel Küpper:
Establishing User-centric Cloud Service Registries. 846-867 - Roger Baig, Felix Freitag, Leandro Navarro:
Cloudy in guifi.net: Establishing and sustaining a community cloud as open commons. 868-887 - Rafael Tolosana-Calasanz, José Ángel Bañares, José Manuel Colom:
Model-driven development of data intensive applications over cloud resources. 888-909 - Tanwir Ahmad, Dragos Truscan, Ivan Porres:
Identifying worst-case user scenarios for performance testing of web applications using Markov-chain workload models. 910-920
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.