


default search action
Future Generation Computer Systems, Volume 86
Volume 86, September 2018
- Yunfei Meng, Zhiqiu Huang, Yu Zhou, Changbo Ke:

Privacy-aware cloud service selection approach based on P-Spec policy models and privacy sensitivities. 1-11 - Mohamed Abdel-Basset, Mai Mohamed

, Victor I. Chang
:
NMCDA: A framework for evaluating cloud computing services. 12-29 - Gregory Levitin, Liudong Xing, Barry W. Johnson, Yuanshun Dai:

Optimization of dynamic spot-checking for collusion tolerance in grid computing. 30-38 - Guiyan Liu, Songtao Guo, Quanjun Zhao, Yuanyuan Yang

:
Tomogravity space based traffic matrix estimation in data center networks. 39-50 - Zhuowei Wang, Wuqing Zhao, Hao Wang

, Lianglun Cheng:
Three-level performance optimization for heterogeneous systems based on software prefetching under power constraints. 51-58 - Sergio Ramírez-Gallego

, Salvador García
, Francisco Herrera
:
Online entropy-based discretization for data streaming classification. 59-70 - Orcan Alpar

:
Biometric touchstroke authentication by fuzzy proximity of touch locations. 71-80 - Eiman Iranpour, Saeed Sharifian

:
A distributed load balancing and admission control algorithm based on Fuzzy type-2 and Game theory for large-scale SaaS cloud architectures. 81-98 - Léo Grange, Georges Da Costa, Patricia Stolf

:
Green IT scheduling for data center powered with renewable energy. 99-120 - Enan A. Khalil

, Suat Ozdemir
, Suleyman Tosun:
Evolutionary task allocation in Internet of Things-based application domains. 121-133 - Ehsan Ataie

, Reza Entezari-Maleki
, Sayed Ehsan Etesami
, Bernhard Egger
, Danilo Ardagna
, Ali Movaghar:
Power-aware performance analysis of self-adaptive resource management in IaaS clouds. 134-144 - Ihtisham Ali, Susmit Bagchi

:
Designing hybrid graph model and algorithmic analysis of workflow decomposition in mobile distributed systems. 145-161 - Karl Mason

, Martin Duggan, Enda Barrett, Jim Duggan, Enda Howley
:
Predicting host CPU utilization in the cloud using evolutionary neural networks. 162-173 - Xingpo Ma, Junbin Liang, Jianxin Wang, Sheng Wen

, Tian Wang
, Yin Li
, Wenpeng Ma, Chuanda Qi:
Secure fine-grained spatio-temporal Top-k queries in TMWSNs. 174-184 - Asmat Ullah Khan, Susmit Bagchi

:
Software architecture and algorithm for reliable RPC for geo-distributed mobile computing systems. 185-198 - Eva Kern

, Lorenz M. Hilty
, Achim Guldner
, Yuliyan V. Maksimov
, Andreas Filler
, Jens Gröger, Stefan Naumann:
Sustainable software products - Towards assessment criteria for resource and energy efficiency. 199-210 - Mateja Dumic, Dominik Sisejkovic

, Rebeka Coric
, Domagoj Jakobovic
:
Evolving priority rules for resource constrained project scheduling problem with genetic programming. 211-221 - Yongjian Yang, Wenbin Liu, En Wang

, Hengzhi Wang:
Beaconing Control strategy based on Game Theory in mobile crowdsensing. 222-233 - Nivethitha Somu

, M. R. Gauthama Raman
, Kirthivasan Kannan, V. S. Shankar Sriram
:
A trust centric optimal service ranking approach for cloud service selection. 234-252 - Tassos Dimitriou, Naser Al-Ibrahim:

"I wasn't there" - Deniable, privacy-aware scheme for decentralized Location-based Services. 253-265 - Shubham Goel

, Ravinder Kumar
:
Brownian Motus and Clustered Binary Insertion Sort methods: An efficient progress over traditional methods. 266-280 - Suchismita Satpathy, Bibhudatta Sahoo

, Ashok Kumar Turuk
:
Sensing and Actuation as a Service Delivery Model in Cloud Edge centric Internet of Things. 281-296 - Harmanjeet Kaur, Neeraj Kumar

, Shalini Batra:
An efficient multi-party scheme for privacy preserving collaborative filtering for healthcare recommender system. 297-307 - Orcun Yildiz, Amelie Chi Zhou, Shadi Ibrahim:

Improving the Effectiveness of Burst Buffers for Big Data Processing in HPC Systems with Eley. 308-318 - Roberto Boselli

, Mirko Cesarini
, Fabio Mercorio
, Mario Mezzanzanica
:
Classifying online Job Advertisements through Machine Learning. 319-328 - Long Hu, Jun Yang, Min Chen

, Yongfeng Qian
, Joel J. P. C. Rodrigues
:
SCAI-SVSC: Smart clothing for effective interaction with a sustainable vital sign collection. 329-338 - Zakarea Alshara

, Frederico Alvares, Hugo Bruneliere
, Jonathan Lejeune, Charles Prud'homme
, Thomas Ledoux
:
CoMe4ACloud: An end-to-end framework for autonomic Cloud systems. 339-354 - Jianliang Wei, Fei Meng, Arunkumar N.

:
A personalized authoritative user-based recommendation for social tagging. 355-361 - Ke Zhou, Jiangfeng Zeng, Yu Liu

, Fuhao Zou:
Deep sentiment hashing for text retrieval in social CIoT. 362-371 - Lirong Qiu, Feng Cai, Guixian Xu:

Quantum digital signature for the access control of sensitive data in the big data era. 372-379 - Ali Hassan Sodhro

, Sandeep Pirbhulal
, Arun Kumar Sangaiah
:
Convergence of IoT and product lifecycle management in medical health care. 380-391 - Kang Yang, Rui Wang, Yu Jiang, Houbing Song

, Chenxia Luo, Yong Guan, Xiaojuan Li, Zhiping Shi
:
Sensor attack detection using history based pairwise inconsistency. 392-402 - Min Chen

, Wei Li
, Yixue Hao
, Yongfeng Qian
, Iztok Humar:
Edge cognitive computing based smart healthcare system. 403-411 - Flora Amato

, Aniello Castiglione
, Fabio Mercorio
, Mario Mezzanzanica
, Vincenzo Moscato, Antonio Picariello, Giancarlo Sperlì:
Multimedia story creation on social networks. 412-420 - Rashmika Nawaratne, Damminda Alahakoon, Daswin De Silva, Prem Chhetri, Naveen K. Chilamkurti

:
Self-evolving intelligent algorithms for facilitating data interoperability in IoT environments. 421-432 - Gunasekaran Manogaran, Daphne Lopez, Naveen K. Chilamkurti

:
In-Mapper combiner based MapReduce algorithm for processing of big climate data. 433-445 - Giovanna Sannino, Giuseppe De Pietro

:
A deep learning approach for ECG-based heartbeat classification for arrhythmia detection. 446-455 - Zhijie Han

, Yaqiong Li
, Jie Li:
A novel routing algorithm for IoT cloud based on hash offset tree. 456-463 - Rongbin Xu, Yeguo Wang, Haoyu Luo, Futian Wang, Ying Xie, Xiao Liu

, Yun Yang:
A sufficient and necessary temporal violation handling point selection strategy in cloud workflow. 464-479 - Ehab Nabiel Alkhanak

, Sai Peck Lee:
A hyper-heuristic cost optimisation approach for Scientific Workflow Scheduling in cloud computing. 480-506 - Lu Zhou

, Chunhua Su, Yamin Wen, Weijie Li
, Zheng Gong:
Towards practical white-box lightweight block cipher implementations for IoTs. 507-514 - Wanqing Wu, Sandeep Pirbhulal

, Arun Kumar Sangaiah
, Subhas Chandra Mukhopadhyay
, Guanglin Li
:
Optimization of signal quality over comfortability of textile electrodes for ECG monitoring in fog computing based medical applications. 515-526 - Priyan Malarvizhi Kumar

, S. Lokesh
, R. Varatharajan, Gokulnath Chandra Babu
, Parthasarathy Panchatcharam
:
Cloud and IoT based disease prediction and diagnosis system for healthcare using Fuzzy neural classifier. 527-534 - Jordi Ros-Giralt

, Alan Commike, Peter Cullen, Richard Lethin:
Algorithms and data structures to accelerate network analysis. 535-545 - Wissem Inoubli

, Sabeur Aridhi, Haithem Mezni
, Mondher Maddouri, Engelbert Mephu Nguifo
:
An experimental survey on big data frameworks. 546-564 - Jorge Veiga

, Jonatan Enes, Roberto R. Expósito
, Juan Touriño
:
BDEv 3.0: Energy efficiency and microarchitectural characterization of Big Data processing frameworks. 565-581 - Shao-Jun Yang, Xinyi Huang:

Certain types of M-fuzzifying matroids: A fundamental look at the security protocols in RFID and IoT. 582-590 - Ying Ji, Meng Li, Shaojian Qu:

Multi-objective linear programming games and applications in supply chain competition. 591-597 - Shaofei Wu, Mingqing Wang, Yuntao Zou

:
Research on internet information mining based on agent algorithm. 598-602 - Shihong Yao, Zhigao Zheng

, Tao Wang, Qingfeng Guan
:
An efficient joint compression and sparsity estimation matching pursuit algorithm for artificial intelligence application. 603-613 - (Withdrawn) Internet of Things (IoT) and its impact on supply chain: A framework for building smart, secure and efficient systems. 614-628

- Zeinab Shmeis

, Mohamad Jaber:
Fine and coarse grained composition and adaptation of spark applications. 629-640 - (Withdrawn) Research on agricultural supply chain system with double chain architecture based on blockchain technology. 641-649

- Pradip Kumar Sharma

, Jong Hyuk Park:
Blockchain based hybrid network architecture for the smart city. 650-655 - Wenbing Chang, Zhenzhong Xu

, Shenghan Zhou, Wen Cao
:
Research on detection methods based on Doc2vec abnormal comments. 656-662 - Shi-Zhuan Han, Wen-Tsao Pan, Ying-Ying Zhou, Zong-Li Liu:

Construct the prediction model for China agricultural output value based on the optimization neural network of fruit fly optimization algorithm. 663-669 - Bangyong Sun

, Nianzeng Yuan, Congjun Cao, Jon Yngve Hardeberg:
Design of four-band multispectral imaging system with one single-sensor. 670-679 - Bo Yang

, Zhiyong Li
, Shilong Jiang, Keqin Li:
Envy-free auction mechanism for VM pricing and allocation in clouds. 680-693 - Song Wu, Chao Mei

, Hai Jin, Duoqiang Wang:
Android Unikernel: Gearing mobile code offloading towards edge computing. 694-703 - Haibo Yi, Zhe Nie:

Side-channel security analysis of UOV signature for cloud-based Internet of Things. 704-708 - Dingju Zhu:

IOT and big data based cooperative logistical delivery scheduling method and cloud robot system. 709-715 - Pyoung Won Kim

:
Real-time bio-signal-processing of students based on an Intelligent algorithm for Internet of Things to assess engagement levels in a classroom. 716-722
- Muhammad Younas, Irfan Awan, George Ghinea

, Tor-Morten Grønli
:
Editorial: New developments in cloud and IoT. 723-725 - Kirill Belyaev, Indrakshi Ray:

Component-oriented access control - Application servers meet tuple spaces for the masses. 726-739 - Bogdan-Cosmin Chifor, Ion Bica

, Victor Valeriu Patriciu, Florin Pop:
A security authorization scheme for smart home Internet of Things devices. 740-749 - Chahrazed Labba, Narjès Bellamine Ben Saoud

, Julie Dugdale:
A predictive approach for the efficient distribution of agent-based systems on a hybrid-cloud. 750-764 - Mahmoud Al-Ayyoub, Muneera Al-Quraan, Yaser Jararweh, Elhadj Benkhelifa

, Salim Hariri:
Resilient service provisioning in cloud based data centers. 765-774 - Bo Yuan

, Lu Liu
, Nick Antonopoulos:
Efficient service discovery in decentralized online social networks. 775-791 - Mário Antunes

, Diogo Gomes
, Rui L. Aguiar
:
Towards IoT data classification through semantic features. 792-798 - Khawar Hasham, Kamran Munir

, Richard McClatchey:
Cloud infrastructure provenance collection and management to reproduce scientific workflows execution. 799-820 - Ragib Hasan

, Md. Mahmud Hossain
, Rasib Khan:
Aura: An incentive-driven ad-hoc IoT cloud framework for proximal mobile computation offloading. 821-835 - Zhou Zhou

, Jemal H. Abawajy, Morshed U. Chowdhury
, Zhigang Hu, Keqin Li, Hongbing Cheng, Abdulhameed A. Al Elaiwi, Fangmin Li
:
Minimizing SLA violation and power consumption in Cloud data centers using adaptive energy-aware algorithms. 836-850
- Brij B. Gupta

, Arun Kumar Sangaiah
, Nadia Nedjah
, Shingo Yamaguchi, Zhiyong Zhang, Michael Sheng
:
Recent research in computational intelligence paradigms into security and privacy for online social networks (OSNs). 851-854 - M. Shamim Hossain

, Mohammed F. Alhamid, Ghulam Muhammad
:
Collaborative analysis model for trending images on social networks. 855-862 - Xi Xiao, Chunhui Chen, Arun Kumar Sangaiah

, Guangwu Hu
, Runguo Ye, Yong Jiang:
CenLocShare: A centralized privacy-preserving location-sharing system for mobile online social networks. 863-872 - Yi Liu

, Hao Wang
, Tong Li, Ping Li, Jie Ling
:
Attribute-based handshake protocol for mobile healthcare social networks. 873-880 - Shaobo Zhang

, Kim-Kwang Raymond Choo
, Qin Liu, Guojun Wang:
Enhancing privacy through uniform grid and caching in location-based services. 881-892 - Androniki Sapountzi

, Kostas E. Psannis
:
Social networking data analysis tools & challenges. 893-913 - Zhiyong Zhang

, Brij B. Gupta
:
Social media security and trustworthiness: Overview and new direction. 914-925 - Amit Kumar Singh

, Basant Kumar, Sanjay Kumar Singh
, S. P. Ghrera, Anand Mohan:
Multiple watermarking technique for securing online social network contents using Back Propagation Neural Network. 926-939 - Weiwei Lin, Wentai Wu

, Haoyu Wang, James Z. Wang, Ching-Hsien Hsu:
Experimental and quantitative analysis of server power model for cloud data centers. 940-950 - Khan Muhammad

, Muhammad Sajjad, Irfan Mehmood
, Seungmin Rho, Sung Wook Baik
:
Image steganography using uncorrelated color space and its application for security of visual contents in online social networks. 951-960
- Florin Pop, Radu Prodan, Gabriel Antoniu:

RM-BDP: Resource management for Big Data platforms. 961-963 - Yuxia Cheng, Yang Xiang, Wenzhi Chen, Houcine Hassan, Abdulhameed Alelaiwi:

Efficient cache resource aggregation using adaptive multi-level exclusive caching policies. 964-974 - Massimo Ficco, Roberto Pietrantuono

, Stefano Russo
:
Aging-related performance anomalies in the apache storm stream processing system. 975-994 - Bin Wang, Chao Chen, Ligang He, Bo Gao, Jiadong Ren, Zhangjie Fu, Songling Fu, Yongjian Hu, Chang-Tsun Li

:
Modelling and developing conflict-aware scheduling on large-scale data centres. 995-1007 - Chandrashekar Jatoth

, G. R. Gangadharan
, Ugo Fiore
, Rajkumar Buyya
:
QoS-aware Big service composition using MapReduce based evolutionary algorithm with guided mutation. 1008-1018 - Dominik Meiländer, Sergei Gorlatch

:
Modeling the Scalability of Real-Time Online Interactive Applications on Clouds. 1019-1031 - Marco Gribaudo

, Mauro Iacono
, Mariam Kiran:
A performance modeling framework for lambda architecture based applications. 1032-1041 - Qublai Khan Ali Mirza

, Irfan Awan, Muhammad Younas:
CloudIntell: An intelligent malware detection system. 1042-1053 - Guipeng Liu, Xiaomin Zhu, Ji Wang, Deke Guo, Weidong Bao, Hui Guo:

SP-Partitioner: A novel partition method to handle intermediate data skew in spark streaming. 1054-1063 - Wanchun Dou, Xiaolong Xu

, Xiang Liu, Laurence T. Yang, Yiping Wen:
A Resource Co-Allocation method for load-balance scheduling over big data platforms. 1064-1075 - Álvaro Brandón Hernández, María S. Pérez, Smrati Gupta, Victor Muntés-Mulero

:
Using machine learning to optimize parallelism in big data applications. 1076-1092 - Pierre Matri, María S. Pérez, Alexandru Costan

, Luc Bougé
, Gabriel Antoniu:
Keeping up with storage: Decentralized, write-enabled dynamic geo-replication. 1093-1105 - Daniel Grzonka

, Agnieszka Jakobik
, Joanna Kolodziej, Sabri Pllana
:
Using a multi-agent system and artificial intelligence for monitoring and improving the cloud performance and security. 1106-1117 - Ta Yuan Hsu, Ajay D. Kshemkalyani

, Min Shen:
Causal consistency algorithms for partially replicated and fully replicated systems. 1118-1133 - Aniello Castiglione

, Francesco Colace
, Vincenzo Moscato, Francesco Palmieri:
CHIS: A big data infrastructure to manage digital cultural items. 1134-1145 - Suzhen Wu, Weidong Zhu

, Bo Mao, Kuan-Ching Li
:
PP: Popularity-based Proactive Data Recovery for HDFS RAID systems. 1146-1153 - Jining Yan

, Yan Ma, Lizhe Wang
, Kim-Kwang Raymond Choo
, Wei Jie
:
A cloud-based remote sensing data production system. 1154-1166
- Joarder Kamruzzaman

, Guojun Wang, Gour C. Karmakar, Iftekhar Ahmad
, Md. Zakirul Alam Bhuiyan
:
Acoustic sensor networks in the Internet of Things applications. 1167-1169 - Allaa R. Hilal

, Aya Sayedelahl, Arash Tabibiazar, Mohamed S. Kamel, Otman A. Basir
:
A distributed sensor management for large-scale IoT indoor acoustic surveillance. 1170-1184 - Yankun Chen

, Fei Ji, Quansheng Guan, Yide Wang, Fangjiong Chen, Hua Yu
:
Adaptive RTO for handshaking-based MAC protocols in underwater acoustic networks. 1185-1192 - Gour C. Karmakar, Joarder Kamruzzaman

, Nusrat Nowsheen:
An efficient data delivery mechanism for AUV-based Ad hoc UASNs. 1193-1208 - Md. Abdul Hamid

, Mohammad Abdullah-Al-Wadud
, Mohammad Mehedi Hassan
, Ahmad Almogren
, Atif Alamri, Abu Raihan M. Kamal, Md. Mamun-Or-Rashid:
A key distribution scheme for secure communication in acoustic sensor networks. 1209-1217 - Kun Tang, Ronghua Shi, Jian Dong

:
Throughput analysis of cognitive wireless acoustic sensor networks with energy harvesting. 1218-1227 - Yingxue Wang, Yanan Chen

, Md. Zakirul Alam Bhuiyan
, Yu Han, Shenghui Zhao, Jianxin Li:
Gait-based Human identification using acoustic sensor and deep neural network. 1228-1237
- Zhihan Lv

, Rahat Iqbal
, Victor I. Chang
:
Big data analytics for sustainability. 1238-1241 - Yixiong Feng

, Zhifeng Zhang
, Guangdong Tian, Zhihan Lv
, Shaoxu Tian, Hongfei Jia:
Data-driven accurate design of variable blank holder force in sheet forming under interval uncertainty using sequential approximate multi-objective optimization. 1242-1250 - Yong Peng

, Xinghua Wang, Shuangling Peng, Helai Huang, Guangdong Tian, Hongfei Jia:
Investigation on the injuries of drivers and copilots in rear-end crashes between trucks based on real world accident data in China. 1251-1258 - Bin Cao

, Jianwei Zhao
, Xin Liu, Xinyuan Kang, Shan Yang, Kai Kang
, Ming Yu:
Multiobjective recommendation optimization via utilizing distributed parallel algorithm. 1259-1268 - Xu Chen

, Jie Zhang, Zheng Xu, Jin Liu:
HIB-tree: An efficient index method for the big data analytics of large-scale human activity trajectories. 1269-1278 - Gagangeet Singh Aujla

, Neeraj Kumar
:
MEnSuS: An efficient scheme for energy management with sustainability of cloud data centers in edge-cloud environment. 1279-1300 - Abdul Wahid

, Munam Ali Shah
, Faisal Fayyaz Qureshi, Hafsa Maryam, Rahat Iqbal
, Victor I. Chang
:
Big data analytics for mitigating broadcast storm in Vehicular Content Centric networks. 1301-1320 - Anna Kobusinska

, Kamil Pawluczuk, Jerzy Brzezinski
:
Big Data fingerprinting information analytics for sustainability. 1321-1337 - Jiwan Lee, Bonghee Hong, Sunghoon Jung, Victor Chang

:
Clustering learning model of CCTV image pattern for producing road hazard meteorological information. 1338-1350 - Wentai Wu

, Weiwei Lin, Ching-Hsien Hsu, Ligang He:
Energy-efficient hadoop for big data analytics and computing: A systematic review and research insights. 1351-1367
- Gang Sun

, Victor I. Chang
, Steven Guan, Muthu Ramachandran, Jin Li, Dan Liao:
Big Data and Internet of Things - Fusion for different services and its impacts. 1368-1370 - Ling Tian, Hongyu Wang, Yimin Zhou

, Chengzong Peng:
Video big data in smart city: Background construction and optimization for surveillance video processing. 1371-1382 - Mohamed Elhoseny

, Ahmed Abdelaziz
, Ahmed S. Salama
, Alaa Mohamed Riad, Khan Muhammad
, Arun Kumar Sangaiah
:
A hybrid model of Internet of Things and cloud computing to manage big data in health services applications. 1383-1394 - Rui Tang, Simon Fong

:
Clustering big IoT data by metaheuristic optimized mini-batch and parallel partition-based DGC in Hadoop. 1395-1412 - Xiaohong Huang, Kun Xie

, Supeng Leng, Tingting Yuan
, Maode Ma:
Improving Quality of Experience in multimedia Internet of Things leveraging machine learning on big data. 1413-1423 - Chien-Ting Kuo, Po-Wen Chi, Victor Chang

, Chin-Laung Lei:
SFaaS: Keeping an eye on IoT fusion environment with security fusion as a service. 1424-1436 - Yang Yang, Xianghan Zheng

, Wenzhong Guo, Ximeng Liu, Victor I. Chang
:
Privacy-preserving fusion of IoT and big data for e-health. 1437-1455
- Sancheng Peng, Shui Yu

, Peter Mueller
:
Social networking big data: Opportunities, solutions, and challenges. 1456-1458 - Laizhong Cui

, Wenyuan Huang, Qiao Yan, F. Richard Yu
, Zhenkun Wen, Nan Lu:
A novel context-aware recommendation algorithm with two-level SVD in social networks. 1459-1470 - Qingjuan Zhao, Jianwei Niu

, Huan Chen, Lei Wang, Mohammed Atiquzzaman
:
An indicative opinion generation model for short texts on social networks. 1471-1480 - Kaili Mao, Jianwei Niu

, Huan Chen, Lei Wang, Mohammed Atiquzzaman
:
Mining of marital distress from microblogging social networks: A case study on Sina Weibo. 1481-1490 - Feng Wang

, Wenjun Jiang, Xiaolin Li, Guojun Wang:
Maximizing positive influence spread in online social networks via fluid dynamics. 1491-1502 - Hao Peng

, Mengjiao Bao, Jianxin Li, Md. Zakirul Alam Bhuiyan
, Yaopeng Liu, Yu He, Erica Yang:
Incremental term representation learning for social network analysis. 1503-1512 - Kai Dong

, Taolin Guo
, Haibo Ye, Xuansong Li, Zhen Ling:
On the limitations of existing notions of location privacy. 1513-1522 - Qinlong Huang, Yixian Yang, Jingyi Fu:

PRECISE: Identity-based private data sharing with conditional proxy re-encryption in online social networks. 1523-1533 - Qinlong Huang, Yixian Yang, Mansuo Shen:

Corrigendum to "Secure and efficient data collaboration with hierarchical attribute-based encryption in cloud computing" [Future Gener. Comput. Syst. 72 (2017) 239-249]. 1534

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














