


default search action
Future Generation Computer Systems, Volume 87
Volume 87, October 2018
- Vitor Barbosa C. Souza

, Xavier Masip-Bruin
, Eva Marín-Tordera, Sergio Sánchez-López, Jordi Garcia
, Guang-Jie Ren, Admela Jukan, Ana Juan Ferrer:
Towards a proper service placement in combined Fog-to-Cloud (F2C) architectures. 1-15 - Dawid Polap

, Marcin Wozniak
, Wei Wei, Robertas Damasevicius:
Multi-threaded learning control mechanism for neural networks. 16-34 - Joseph Nathanael Witanto

, Hyotaek Lim, Mohammed Atiquzzaman
:
Adaptive selection of dynamic VM consolidation algorithm using neural network for cloud resource management. 35-42 - Alessio Arleo

, Walter Didimo
, Giuseppe Liotta
, Fabrizio Montecchiani
:
Profiling distributed graph processing systems through visual analytics. 43-57 - Seyyed Amir Asghari

, Mohammadreza Binesh Marvasti, Amir M. Rahmani
:
Enhancing transient fault tolerance in embedded systems through an OS task level redundancy approach. 58-65 - Jorge Gonzalez-Lopez, Sebastián Ventura

, Alberto Cano
:
Distributed nearest neighbor classification for large-scale multi-label data on spark. 66-82 - Maryam Amiri

, Leili Mohammad Khanli
, Raffaela Mirandola
:
An online learning model based on episode mining for workload prediction in cloud. 83-101 - Mhamed Zineddine:

Optimizing security and quality of service in a real-time operating system using multi-objective Bat algorithm. 102-114 - Ayoub Bahnasse

, Fatima Ezzahraa Louhab, Hafsa Ait Oulahyane, Mohamed Talea
, Assia Bakali
:
Novel SDN architecture for smart MPLS Traffic Engineering-DiffServ Aware management. 115-126 - Jen Hong Tan

, Sulatha V. Bhandary
, Sobha Sivaprasad
, Yuki Hagiwara
, Akanksha Bagchi, U. Raghavendra, A. Krishna Rao, Biju Raju, Nitin Shridhara Shetty, Arkadiusz Gertych
, Kuang Chua Chua, U. Rajendra Acharya
:
Age-related Macular Degeneration detection using deep convolutional neural network. 127-135 - Daniele De Sensi

, Tiziano De Matteis
, Marco Danelutto
:
Simplifying self-adaptive and power-aware computing with Nornir. 136-151 - Boris Vaisband, Eby G. Friedman:

Heterogeneous 3-D ICs as a platform for hybrid energy harvesting in IoT systems. 152-158 - Lesandro Ponciano

, Francisco Vilar Brasileiro
:
Agreement-based credibility assessment and task replication in human computation systems. 159-170 - Valeria Cardellini

, Francesco Lo Presti, Matteo Nardelli
, Gabriele Russo Russo
:
Decentralized self-adaptation for elastic Data Stream Processing. 171-185 - Yezheng Liu, Fei Du, Jianshan Sun, Yuanchun Jiang, Jianmin He, Tingting Zhu

, Chunhua Sun:
A crowdsourcing-based topic model for service matchmaking in Internet of Things. 186-197 - Juan Luis Pérez, Alberto Gutierrez-Torre

, Josep Lluis Berral
, David Carrera
:
A resilient and distributed near real-time traffic forecasting application for Fog computing environments. 198-212 - Rui Li, Zhaohui Liu, Huayi Wu, Ru Li, Guangsheng Dong

, Jie Jiang:
Hierarchical decomposition method and combination forecasting scheme for access load on public map service platforms. 213-227 - David del Rio Astorga

, Manuel F. Dolz
, Javier Fernández
, José Daniel García
:
Paving the way towards high-level parallel pattern interfaces for data stream processing. 228-241 - Pedro Morillo

, Juan M. Orduña
, Marcos Fernández
, Inma García-Pereira
:
Comparison of WSN and IoT approaches for a real-time monitoring system of meal distribution trolleys: A case study. 242-250 - Jun Ye, Zheng Xu, Yong Ding

:
Image search scheme over encrypted database. 251-258 - Yangfan Li, Wei Ren

, Tianqing Zhu
, Yi Ren
, Yue Qin
, Wei Jie
:
RIMS: A Real-time and Intelligent Monitoring System for live-broadcasting platforms. 259-266 - Weifeng Pan

, Chunlai Chai:
Structure-aware Mashup service Clustering for cloud-based Internet of Things using genetic algorithm based clustering algorithm. 267-277 - Mohammad Aazam

, Sherali Zeadally, Khaled A. Harras
:
Offloading in fog computing for IoT: Review, enabling technologies, and research opportunities. 278-289 - Javeria Amin, Muhammad Sharif

, Mussarat Yasmin, Steven Lawrence Fernandes:
Big data analysis for brain tumor detection: Deep convolutional neural networks. 290-297 - Honghao Gao, Wanqiu Huang, Xiaoxian Yang, Yucong Duan

, Yuyu Yin
:
Toward service selection for workflow reconfiguration: An interface-based computing solution. 298-311 - Wei Yu, Shijun Li:

Recommender systems based on multiple social networks correlation. 312-327 - Ghulam Jillani Ansari

, Jamal Hussain Shah
, Mussarat Yasmin, Muhammad Sharif
, Steven Lawrence Fernandes:
A novel machine learning approach for scene text extraction. 328-340 - Ping Li, Tong Li, Heng Ye

, Jin Li, Xiaofeng Chen, Yang Xiang:
Privacy-preserving machine learning with multiple data providers. 341-350 - Maroua Meddeb, Amine Dhraief

, Abdelfettah Belghith
, Thierry Monteil, Khalil Drira, Sofien Gannouni
:
AFIRM: Adaptive forwarding based link recovery for mobility support in NDN/IoT networks. 351-363 - Haleem Farman

, Bilal Jan, Huma Javed, Naveed Ahmed
, Javed Iqbal
, Muhammad Arshad
, Shaukat Ali:
Multi-criteria based zone head selection in Internet of Things based wireless sensor networks. 364-371 - Shubbhi Taneja

, Yi Zhou, Xiao Qin
:
Thermal benchmarking and modeling for HPC using big data applications. 372-381 - Wei Xiong, Zhihui Lu, Bing Li, Bo Hang, Zhao Wu:

Automating smart recommendation from natural language API descriptions via representation learning. 382-391 - Claudia Misale, Maurizio Drocco

, Guy Tremblay
, Alberto Riccardo Martinelli
, Marco Aldinucci
:
PiCo: High-performance data analytics pipelines in modern C++. 392-403 - Baolei Cheng, Jianxi Fan, Qiang Lyu, Jingya Zhou, Zhao Liu:

Constructing independent spanning trees with height n on the n-dimensional crossed cube. 404-415
- Anna Kobusinska

, Carson Kai-Sang Leung
, Ching-Hsien Hsu, Raghavendra S., Victor Chang
:
Emerging trends, issues and challenges in Internet of Things, Big Data and cloud computing. 416-419 - Jonatan Enes, Roberto R. Expósito

, Juan Touriño
:
BDWatchdog: Real-time monitoring and profiling of Big Data applications and frameworks. 420-437 - Feifei Zhang, Jidong Ge, Zhongjin Li, Chuanyi Li, Chifong Wong, Li Kong, Bin Luo, Victor I. Chang

:
A load-aware resource allocation and task scheduling for the emerging cloudlet system. 438-456 - Gang Sun

, Dan Liao, Dongcheng Zhao, Zhili Sun
, Victor I. Chang
:
Towards provisioning hybrid virtual networks in federated cloud data centers. 457-469 - Chih-Tien Fan, Yue-Shan Chang

, Shyan-Ming Yuan
:
VM instance selection for deadline constraint job on agent-based interconnected cloud. 470-487 - Masoom Alam, Naina Emmanuel, Tanveer Khan, Abid Khan

, Nadeem Javaid
, Kim-Kwang Raymond Choo
, Rajkumar Buyya
:
Secure policy execution using reusable garbled circuit in the cloud. 488-501 - Anna Kobusinska

, Ching-Hsien Hsu:
Towards increasing reliability of clouds environments with RESTful web services. 502-513 - Chen Gu

, Matthew Bradbury
, Jack Kirton, Arshad Jhumka:
A decision theoretic framework for selecting source location privacy aware routing protocols in wireless sensor networks. 514-526 - Fangliang Xu

, Yijie Wang, Xingkong Ma:
Incremental encoding for erasure-coded cross-datacenters cloud storage. 527-537 - Wasim Ahmad Bhat

:
Bridging data-capacity gap in big data storage. 538-548 - Bin Zhang, Xiaoyang Wang, Zhigao Zheng

:
The optimization for recurring queries in big data analysis system with MapReduce. 549-556 - Zhenqiu Huang, Kwei-Jay Lin, Bo-Lung Tsai

, Surong Yan, Chi-Sheng Shih:
Building edge intelligence for online activity recognition in service-oriented IoT systems. 557-567 - Chih-Hua Tai, Ching-Tang Chang, Yue-Shan Chang:

Hybrid knowledge fusion and inference on cloud environment. 568-579 - Meisong Wang, Prem Prakash Jayaraman

, Ellis Solaiman, Lydia Y. Chen, Zheng Li
, Jun Song
, Dimitrios Georgakopoulos
, Rajiv Ranjan
:
A multi-layered performance analysis for cloud-based topic detection and tracking in Big Data applications. 580-590 - Wei Liang, Xiaokang Zhou, Suzhen Huang, Chunhua Hu, Xuesong Xu

, Qun Jin:
Modeling of cross-disciplinary collaboration for potential field discovery and recommendation based on scholarly big data. 591-600 - Mouzhi Ge, Hind Bangui

, Barbora Buhnova
:
Big Data for Internet of Things: A Survey. 601-614
- Jesús Carretero

, Francisco Javier García Blas
, Gabriel Antoniu, Dana Petcu
:
New directions in mobile, hybrid, and heterogeneous clouds for cyberinfrastructures. 615-617 - Giovanni Mariani

, Andreea Anghel, Rik Jongerius, Gero Dittmann
:
Predicting cloud performance for HPC applications before deployment. 618-628 - Alexandros Evangelidis

, David Parker
, Rami Bahsoon:
Performance modelling and verification of cloud-based auto-scaling policies. 629-638 - Abhinandan S. Prasad

, David Koll, Jesús Omana Iglesias
, Jordi Arjona Aroca, Volker Hilt, Xiaoming Fu
:
RConf(PD): Automated resource configuration of complex services in the cloud. 639-650 - Saul Alonso Monsalve

, Félix García Carballeira
, Alejandro Calderón
:
A heterogeneous mobile cloud computing model for hybrid clouds. 651-666 - Yunbo Li, Anne-Cécile Orgerie

, Ivan Rodero
, Betsegaw Lemma Amersho, Manish Parashar, Jean-Marc Menaud:
End-to-end energy models for Edge Cloud-based IoT platforms: Application to data stream analysis in IoT. 667-678 - Zhiwei Wang:

Leakage resilient ID-based proxy re-encryption scheme for access control in fog computing. 679-685
- Jun Zhang, Aniello Castiglione

, Laurence Tianruo Yang, Yan Zhang:
Recent advances in security and privacy in Social Big Data. 686-687 - Bidyut Mukherjee

, Songjie Wang, Wenyi Lu, Roshan Lal Neupane, Daniel Dunn
, Yijie Ren, Qi Su, Prasad Calyam:
Flexible IoT security middleware for end-to-end cloud-fog communication. 688-703 - Yuyi Fang, Zhiwei Zhao, Zi Wang

, Geyong Min, Yue Cao
, Haojun Huang
, Hao Yin:
Eavesdrop with PoKeMon: Position free keystroke monitoring using acoustic data. 704-711 - Zehong Chen, Fangguo Zhang

, Peng Zhang, Joseph K. Liu, Jiwu Huang, Hanbang Zhao, Jian Shen
:
Verifiable keyword search for secure big data-based mobile healthcare networks with fine-grained authorization control. 712-724 - Mansura Habiba, Md. Rafiqul Islam, A. B. M. Shawkat Ali:

A component based unified architecture for utility service in cloud. 725-742 - Muhammad Al-Qurishi, Majed A. AlRubaian, Sk. Md. Mizanur Rahman

, Atif Alamri, Mohammad Mehedi Hassan
:
A prediction system of Sybil attack in social network using deep-regression model. 743-753 - Flora Amato

, Francesco Moscato, Vincenzo Moscato, Francesco Colace
:
Improving security in cloud by formal modeling of IaaS resources. 754-764 - Jun Cai, Yu Wang

, Yan Liu, Jian-Zhen Luo, Wenguo Wei, Xiaoping Xu:
Enhancing network capacity by weakening community structure in scale-free network. 765-771 - Meikang Qiu, Keke Gai

, Zenggang Xiong:
Privacy-preserving wireless communications using bipartite matching in social big data. 772-781 - Hong Yao, Muzhou Xiong, Deze Zeng, Junfang Gong:

Mining multiple spatial-temporal paths from social media data. 782-791 - Shuo Wang, Richard O. Sinnott, Surya Nepal

:
Privacy-protected statistics publication over social media user trajectory streams. 792-802 - Dapeng Wu

, Feng Zhang, Honggang Wang
, Ruyan Wang:
Security-oriented opportunistic data forwarding in Mobile Social Networks. 803-815 - Tianqing Zhu

, Gang Li
, Ping Xiong, Wanlei Zhou
:
Answering differentially private queries for continual datasets release. 816-827
- Jörn Altmann

, José Ángel Bañares
, Ioan Petri
:
Economics of Computing Services: A literature survey about technologies for an economy of fungible cloud services. 828-830 - John O'Loughlin, Lee Gillam:

A performance brokerage for heterogeneous clouds. 831-845 - Mathias Slawik

, Begüm Ilke Zilci, Axel Küpper:
Establishing User-centric Cloud Service Registries. 846-867 - Roger Baig

, Felix Freitag
, Leandro Navarro
:
Cloudy in guifi.net: Establishing and sustaining a community cloud as open commons. 868-887 - Rafael Tolosana-Calasanz, José Ángel Bañares

, José Manuel Colom:
Model-driven development of data intensive applications over cloud resources. 888-909 - Tanwir Ahmad

, Dragos Truscan
, Ivan Porres
:
Identifying worst-case user scenarios for performance testing of web applications using Markov-chain workload models. 910-920

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














