default search action
Future Generation Computer Systems, Volume 142
Volume 142, May 2023
- Domenico Potena, Antonella Longo, Alex Mircoli, Marco Zappatore:
Semantic modeling and design patterns for IoT ecosystems. 1-3
- Tiago Veiga, Hafiz Areeb Asad, Frank Alexander Kraemer, Kerstin Bach:
Towards containerized, reuse-oriented AI deployment platforms for cognitive IoT applications. 4-13
- José M. Cecilia, Juan Morales-García, Baldomero Imbernón, Javier Prades, Juan-Carlos Cano, Federico Silla:
Using remote GPU virtualization techniques to enhance edge computing devices. 14-24
- Jing Zhang, Qihan Huang, Yirui Huang, Qian Ding, Pei-Wei Tsai:
DP-TrajGAN: A privacy-aware trajectory generation model with differential privacy. 25-40
- Muhammed Amin Abdullah, Yongbin Yu, Kwabena Adu, Yakubu Imrana, Xiangxiang Wang, Jingye Cai:
HCL-Classifier: CNN and LSTM based hybrid malware classifier for Internet of Things (IoT). 41-58
- Ran Wang, Cheng Xu, Runshi Dong, Zhenghui Luo, Rong Zheng, Xiaotong Zhang:
A secured big-data sharing platform for materials genome engineering: State-of-the-art, challenges and architecture. 59-74
- Zhe Wang, Matthieu Dorier, Pradeep Subedi, Philip E. Davis, Manish Parashar:
Adaptive elasticity policies for staging-based in situ visualization. 75-89
- Yuanfeng Yang, Lin Li, Husheng Dong, Gang Liu, Xun Sun, Zhaobin Liu:
Progressive unsupervised video person re-identification with accumulative motion and tracklet spatial-temporal correlation. 90-100
- Barbara Martini, Molka Gharbaoui, Piero Castoldi:
Intent-based network slicing for SDN vertical services with assurance: Context, design and preliminary experiments. 101-116 - Laurens Versluis, Mehmet Çetin, Caspar Greeven, Kristian Laursen, Damian Podareanu, Valeriu Codreanu, Alexandru Uta, Alexandru Iosup:
Less is not more: We need rich datasets to explore. 117-130
- Degan Zhang, Chen-hao Ni, Jie Zhang, Ting Zhang, Zhi-Hao Zhang:
New method of vehicle cooperative communication based on fuzzy logic and signaling game strategy. 131-149
- Ying Wang, Fengjun Shang, Jianjun Lei, Xiangwei Zhu, Haoming Qin, Jiayu Wen:
Dual-attention assisted deep reinforcement learning algorithm for energy-efficient resource allocation in Industrial Internet of Things. 150-164
- Zhen Li, Xiang Huang, Yangrui Li, Guenevere Chen:
A comparative study of adversarial training methods for neural models of source code. 165-181
- Matteo Francia, Joseph Giovanelli, Giuseppe Pisano:
HAMLET: A framework for Human-centered AutoML via Structured Argumentation. 182-194
- Jiatao Li, Dezhi Han, Zhongdai Wu, Junxiang Wang, Kuan-Ching Li, Arcangelo Castiglione:
A novel system for medical equipment supply chain traceability based on alliance chain and attribute and role access control. 195-211
- Marcin Gorawski, Krzysztof Pasterak, Anna Gorawska, Michal Gorawski:
The stream data warehouse: Page replacement algorithms and quality of service metrics. 212-227
- Li-bo Zhang, Shuang Sun, Junxin Chen, Yue Teng, Zhihan Lv:
Self-adaptive reconstruction for compressed sensing based ECG acquisition in wireless body area network. 228-236
- Jiahui Chen, Hang Xiao, Muchuang Hu, Chien-Ming Chen:
A blockchain-based signature exchange protocol for metaverse. 237-247
- Sudeep Tanwar, Dakshita Reebadiya, Pronaya Bhattacharya, Anuja R. Nair, Neeraj Kumar, Minho Jo:
Fusion of blockchain and IoT in scientific publishing: Taxonomy, tools, and future directions. 248-275
- Naveen Chandra Gowda, Sunilkumar S. Manvi, A. Bharathi Malakreddy, Pascal Lorenz:
BSKM-FC: Blockchain-based secured key management in a fog computing environment. 276-291
- Runde Yu, Fusheng Jin, Zhuang Qiao, Ye Yuan, Guoren Wang:
Multi-scale image-text matching network for scene and spatio-temporal images. 292-300
- Jing Zhang, Yi-rui Huang, Qihan Huang, Yan-zi Li, Xiucai Ye:
Hasse sensitivity level: A sensitivity-aware trajectory privacy-enhanced framework with Reinforcement Learning. 301-313
- Shuo Huai, Di Liu, Hao Kong, Weichen Liu, Ravi Subramaniam, Christian Makaya, Qian Lin:
Latency-constrained DNN architecture learning for edge systems using zerorized batch normalization. 314-327 - Viktória Spisaková, Lukás Hejtmánek, Jakub Hynst:
Nextflow in Bioinformatics: Executors Performance Comparison Using Genomics Data. 328-339 - Ahmed M. Helmi, Mohammed Abdulaziz Aide Al-qaness, Abdelghani Dahou, Mohamed Abd Elaziz:
Human activity recognition using marine predators algorithm with deep learning. 340-350 - Dongwon Lee, Yongwoo Oh, Jin B. Hong, Hyoungshick Kim, Dan Dongseong Kim:
PP-GSM: Privacy-preserving graphical security model for security assessment as a service. 351-363 - Kahkishan Sanam, Saif Ur Rehman Malik, Tehsin Kanwal, Zain Ul Islam Adil:
SecurePrivChain: A decentralized framework for securing the global model using cryptography. 364-375 - Yashwant Singh Patel, Jatin Bedi:
MAG-D: A multivariate attention network based approach for cloud workload forecasting. 376-392 - Ryan Chard, Jim Pruyne, Kurt McKee, Josh Bryan, Brigitte Raumann, Rachana Ananthakrishnan, Kyle Chard, Ian T. Foster:
Globus automation services: Research process automation across the space-time continuum. 393-409
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.