


default search action
Future Generation Computer Systems, Volume 151
Volume 151, February 2024
- Yahui Wang

, Hongchang Chen, Shuxin Liu, Kai Wang, Yuxiang Hu:
Geo-aware graph-augmented self-attention network for individual mobility prediction. 1-11
- Afia Anjum, Paul Agbaje, Arkajyoti Mitra, Emmanuel Oseghale, Ebelechukwu Nwafor, Habeeb Olufowobi

:
Towards named data networking technology: Emerging applications, use cases, and challenges for secure data communication. 12-31
- Shiwen Zhang

, Jiayi He, Wei Liang
, Keqin Li:
MMDS: A secure and verifiable multimedia data search scheme for cloud-assisted edge computing. 32-44 - Hongtai Guo

, Zhangbing Zhou, Deng Zhao
, Walid Gaaloul:
EGNN: Energy-efficient anomaly detection for IoT multivariate time series data using graph neural network. 45-56 - Zhigang Jin, Junyi Zhou, Bing Li

, Xiaodong Wu
, Chenxu Duan
:
FL-IIDS: A novel federated learning-based incremental intrusion detection system. 57-70 - Hyunseo Park

, Gyeong Ho Lee
, Jaeseob Han
, Jun Kyun Choi:
Multiclass autoencoder-based active learning for sensor-based human activity recognition. 71-84 - Jungwon Seo

, Sooyong Park
:
SBAC: Substitution cipher access control based on blockchain for protecting personal data in metaverse. 85-97
- Shuo Shang, Bingsheng He, Lizhe Wang:

Introduction to distributed and parallel processing of big spatiotemporal data. 98-99
- Spyridon Chouliaras

, Stelios Sotiriadis
:
Towards constrained optimization of cloud applications: A hybrid approach. 100-110 - Mingkang Chen

, Jingtao Sun, Kento Aida, Atsuko Takefusa:
Weather-aware object detection method for maritime surveillance systems. 111-123
- Zhiwei Ye

, Jun Luo
, Wen Zhou, Mingwei Wang, Qiyi He:
An ensemble framework with improved hybrid breeding optimization-based feature selection for intrusion detection. 124-136
- Dominik Olszewski, Marcin Iwanowski

, Waldemar Graniszewski
:
Dimensionality reduction for detection of anomalies in the IoT traffic data. 137-151 - Hang Zhang, Jinsong Wang

, Hongwei Zhang, Chao Bu:
Security computing resource allocation based on deep reinforcement learning in serverless multi-cloud edge computing. 152-161 - Norah Alsaeed

, Farrukh Nadeem, Faisal Albalwy
:
A scalable and lightweight group authentication framework for Internet of Medical Things using integrated blockchain and fog computing. 162-181 - Bo Cui

, Yun Hu
:
BSELA: A Blockchain Simulator with Event-Layered Architecture. 182-195 - Zeynep Turgut, Arzu Gorgulu Kakisim

:
An explainable hybrid deep learning architecture for WiFi-based indoor localization in Internet of Things environment. 196-213
- Huanhuan Hou

, Siti Nuraishah Agos Jawaddi, Azlan B. Ismail
:
Energy efficient task scheduling based on deep reinforcement learning in cloud environment: A specialized review. 214-231
- Wei Qin

, Haiming Chen
, Lei Wang, Yinshui Xia, Alfredo Nascita
, Antonio Pescapè
:
MCOTM: Mobility-aware computation offloading and task migration for edge computing in industrial IoT. 232-241
- Luying Wang, Anfeng Liu

, Neal N. Xiong
, Shaobo Zhang, Tian Wang, Mianxiong Dong:
SD-SRF: An Intelligent Service Deployment Scheme for Serverless-operated Cloud-Edge Computing in 6G Networks. 242-259
- Serdar Metin

, Can C. Özturan
:
Quantised and Simulated Max-min Fairness in Blockchain Ecosystems. 260-271
- Retraction notice to "Research on agricultural supply chain system with double chain architecture based on blockchain technology" [Future Generation Computer Systems 86 (2018) 641-649]. 272


manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














