


default search action
Future Generation Computer Systems, Volume 115
Volume 115, February 2021
- Adarsh Kumar

, Kriti Sharma
, Harvinder Singh, Sagar Gupta Naugriya, Sukhpal Singh Gill
, Rajkumar Buyya
:
A drone-based networked system and methods for combating coronavirus disease (COVID-19) pandemic. 1-19 - Juan Carlos Salinas-Hilburg, Marina Zapater, José Manuel Moya

, José L. Ayala
:
Fast energy estimation framework for long-running applications. 20-33
- Alan Briones

, Adrià Mallorquí
, Agustín Zaballos
, Ramon Martín de Pozuelo:
Adaptive and aggressive transport protocol to provide QoS in cloud data exchange over Long Fat Networks. 34-44
- Milosz Ciznicki

, Krzysztof Kurowski, Jan Weglarz
:
Energy and performance improvements in stencil computations on multi-node HPC systems with different network and communication topologies. 45-58
- Jianhang Zhou

, Qi Zhang, Bob Zhang
:
An automatic multi-view disease detection system via Collective Deep Region-based Feature Representation. 59-75
- Qianren Mao

, Xi Li, Hao Peng
, Jianxin Li, Dongxiao He, Shu Guo, Min He, Lihong Wang:
Event prediction based on evolutionary event ontology knowledge. 76-89
- (Withdrawn) Intelligent edge computing based on machine learning for smart city. 90-99

- Fahimeh Hajizadeh

, Mohammadreza Binesh Marvasti, Seyyed Amir Asghari
, Mostafa Abbas Mollaei
, Amir M. Rahmani
:
Configurable DSI partitioned approximate multiplier. 100-114
- Mordechai Guri:

MAGNETO: Covert channel between air-gapped systems and nearby smartphones via CPU-generated magnetic fields. 115-125 - Özgür Yürekten

, Mehmet Demirci:
SDN-based cyber defense: A survey. 126-149
- Roger Pueyo Centelles

, Roc Meseguer
, Felix Freitag
, Leandro Navarro
, Sergio F. Ochoa
, Rodrigo M. Santos
:
LoRaMoto: A communication system to provide safety awareness among civilians after an earthquake. 150-170
- Hisham A. Kholidy

:
Autonomous mitigation of cyber risks in the Cyber-Physical Systems. 171-187
- Saeed Mirpour Marzuni

, Abdorreza Savadi
, Adel Nadjaran Toosi
, Mahmoud Naghibzadeh:
Cross-MapReduce: Data transfer reduction in geo-distributed MapReduce. 188-200 - Dabiah Ahmed Alboaneen

, Hugo Tianfield, Yan Zhang, Bernardi Pranggono
:
A metaheuristic method for joint task scheduling and virtual machine placement in cloud data centers. 201-212 - Emiliano Casalicchio

, Gabriele Gualandi:
ASiMOV: A self-protecting control application for the smart factory. 213-235
- Wenjie Feng

, Shenghua Liu, Christos Faloutsos, Bryan Hooi, Huawei Shen, Xueqi Cheng:
EagleMine: Vision-guided Micro-clusters recognition and collective anomaly detection. 236-250
- Matteo Repetto, Alessandro Carrega

, Riccardo Rapuzzi
:
An architecture to manage security operations for digital service chains. 251-266
- Mumin Cebe, Kemal Akkaya:

Communication-efficient certificate revocation management for Advanced Metering Infrastructure and IoT Integration. 267-278 - Mohammad Ehsan Basiri

, Shahla Nemati, Moloud Abdar
, Erik Cambria
, U. Rajendra Acharya
:
ABCDM: An Attention-based Bidirectional CNN-RNN Deep Model for sentiment analysis. 279-294
- Yan Zhang, Kun Wang, Lei He:

Editorial for FGCS special issue: Computation Intelligence for Energy Internet. 295-297
- Tao Song, Honghua Zhao, Zhi Liu, Hao Liu, Yuanyuan Hu, Dianmin Sun:

Intelligent human hand gesture recognition by local-global fusing quality-aware features. 298-303
- Yongjun Ren, Yan Leng, Jian Qi, Pradip Kumar Sharma

, Jin Wang, Zafer Al-Makhadmeh, Amr Tolba
:
Multiple cloud storage mechanism based on blockchain in smart homes. 304-313
- Ahmed Falah, Lei Pan, Md. Shamsul Huda, Shiva Raj Pokhrel

, Adnan Anwar
:
Improving malicious PDF classifier with feature engineering: A data-driven approach. 314-326
- Shudong Wang, Gaowei Liu, Xinzeng Wang, Yuanyuan Zhang, Sicheng He, Yulin Zhang:

TagSNP-set selection for genotyping using integrated data. 327-334
- Babar Shahzaad

, Athman Bouguettaya, Sajib Mistry
, Azadeh Ghari Neiat
:
Resilient composition of drone services for delivery. 335-350 - Majid Makki, Dimitri Van Landuyt

, Bert Lagaisse
, Wouter Joosen:
Thread-level resource consumption control of tenant custom code in a shared JVM for multi-tenant SaaS. 351-364
- Sunggon Kim

, Jaehyun Han, Hyeonsang Eom, Yongseok Son:
Improving I/O performance in distributed file systems for flash-based SSDs by access pattern reshaping. 365-373
- Faizana Naeem

, Mujahid Mohsin, Usman Rauf, Liaqat Ali Khan:
Formal approach to thwart against drone discovery attacks: A taxonomy of novel 3D obfuscation mechanisms. 374-386 - José Tomás Martínez Garre

, Manuel Gil Pérez
, Antonio Ruiz-Martínez
:
A novel Machine Learning-based approach for the detection of SSH botnet infection. 387-396
- Xiaonan Wang, Xingwei Wang, Yanli Li:

NDN-based IoT with Edge computing. 397-405 - Meng Li

, Chhagan Lal, Mauro Conti
, Donghui Hu:
LEChain: A blockchain-based lawful evidence management scheme for digital forensics. 406-420
- Charilaos Skandylas, Narges Khakpour

:
Design and Implementation of Self-Protecting systems: A Formal Approach. 421-437
- Ramin Toosi

, Mohammad Ali Akhaee:
Time-frequency analysis of keystroke dynamics for user authentication. 438-447 - Jing Chen, Jiong Chen, Kun He, Ruiying Du:

SeCrowd: Efficient secure interactive crowdsourcing via permission-based signatures. 448-458 - Martina Sestak

, Marjan Hericko, Tatjana Welzer-Druzovec, Muhamed Turkanovic:
Applying k-vertex cardinality constraints on a Neo4j graph database. 459-474 - Hongbo Zhu, Guangjie Han

, Peng Yang, Wenbo Zhang, Chuan Lin, Hai Zhao:
Functional-realistic CT image super-resolution for early-stage pulmonary nodule detection. 475-485
- Hong Zhong, Yiyuan Zhou, Qingyang Zhang

, Yan Xu, Jie Cui:
An efficient and outsourcing-supported attribute-based access control scheme for edge-enabled smart healthcare. 486-496
- Miao Zhang, Yong Peng, Mei Yang, Quanjun Yin, Xu Xie:

A discrete PSO-based static load balancing algorithm for distributed simulations in a cloud environment. 497-516
- Martin Husák

, Václav Bartos
, Pavol Sokol
, Andrej Gajdos
:
Predictive methods in cyber defense: Current experience and research challenges. 517-530
- Wenyi Tang, Ling Tian, Xu Zheng, Guangchun Luo, Zaobo He:

Susceptible user search for defending opinion manipulation. 531-541
- Jianliang Wei, Fei Meng:

How opinion distortion appears in super-influencer dominated social network. 542-552
- Qiang Wang, Fucai Zhou, Jian Xu

, Zifeng Xu:
Efficient verifiable databases with additional insertion and deletion operations in cloud computing. 553-567 - Timothy R. McIntosh

, Paul A. Watters
, A. S. M. Kayes
, Alex Ng, Yi-Ping Phoebe Chen
:
Enforcing situation-aware access control to build malware-resilient file systems. 568-582 - Gang Yu, Yi Wang

, Min Hu, Lihua Shi, Zeyu Mao, Vijayan Sugumaran
:
RIOMS: An intelligent system for operation and maintenance of urban roads using spatio-temporal data in smart cities. 583-609
- Shitong Mao

, Aliaa Sabry, Yassin Khalifa
, James L. Coyle, Ervin Sejdic:
Estimation of laryngeal closure duration during swallowing without invasive X-rays. 610-618
- Viraaji Mothukuri, Reza M. Parizi, Seyedamin Pouriyeh, Yan Huang

, Ali Dehghantanha, Gautam Srivastava:
A survey on security and privacy of federated learning. 619-640
- Bander Ali Saleh Al-rimy, Mohd Aizaini Maarof, Mamoun Alazab

, Syed Zainudeen Mohd Shaid, Fuad A. Ghaleb
, Abdulmohsen Almalawi
, Abdullah Marish Ali
, Tawfik Al Hadhrami:
Redundancy Coefficient Gradual Up-weighting-based Mutual Information Feature Selection technique for Crypto-ransomware early detection. 641-658
- Zar Bakht Imtiaz

, Awais Manzoor
, Saif ul Islam
, Malik Ali Judge
, Kim-Kwang Raymond Choo
, Joel J. P. C. Rodrigues
:
Discovering communities from disjoint complex networks using Multi-Layer Ant Colony Optimization. 659-670
- Jian Liu, Yuanmin Duan, Yuedong Wu, Rui Chen, Liang Chen, Geng Chen:

Information flow perception modeling and optimization of Internet of Things for cloud services. 671-679
- Shaker H. Ali El-Sappagh

, Hager Saleh
, Radhya Sahal, Tamer AbuHmed
, S. M. Riazul Islam
, Farman Ali
, Eslam Amer
:
Alzheimer's disease progression detection model based on an early fusion of cost-effective multimodal data. 680-699
- Mostafa Mehrabi, Nasser Giacaman, Oliver Sinnen

:
Unified programming concepts for unobtrusive integration of cloud-based and local parallel computing. 700-719 - Maroua Masmoudi, Sana Ben Abdallah Ben Lamine

, Hajer Baazaoui Zghal
, Bernard Archimède, Mohamed-Hedi Karray:
Knowledge hypergraph-based approach for data integration and querying: Application to Earth Observation. 720-740
- Santiago Felici-Castell

, Miguel García-Pineda
, Jaume Segura-Garcia, Rafael Fayos-Jordan
, Jesús López Ballester:
Adaptive live video streaming on low-cost wireless multihop networks for road traffic surveillance in smart cities. 741-755
- P. Mohamed Shakeel, S. Baskar, Hassan Fouad

, Gunasekaran Manogaran, Vijayalakshmi Saravanan, Carlos Enrique Montenegro-Marín
:
Internet of things forensic data analysis using machine learning to identify roots of data scavenging. 756-768
- Mohamad Arafeh, Paolo Ceravolo, Azzam Mourad

, Ernesto Damiani
, Emanuele Bellini:
Ontology based recommender system using social network data. 769-779 - Ritu Singhal

, Archana Singhal
:
A feedback-based combinatorial fair economical double auction resource allocation model for cloud computing. 780-797 - Ali Daud, Faizan Abbas, Tehmina Amjad

, Abdulrahman A. Alshdadi
, Jalal S. Alowibdi:
Finding rising stars through hot topics detection. 798-813 - Iván García-Cobo

, Héctor D. Menéndez:
Designing large quantum key distribution networks via medoid-based algorithms. 814-824
- Bin Pu, Ningbo Zhu, Kenli Li, Shengli Li

:
Fetal cardiac cycle detection in multi-resource echocardiograms using hybrid classification framework. 825-836
- Kun Zhan, Chaoxi Niu

:
Mutual teaching for graph convolutional networks. 837-843
- Syed Ibrahim Imtiaz, Saif ur Rehman, Abdul Rehman Javed

, Zunera Jalil
, Xuan Liu
, Waleed S. Alnumay
:
DeepAMD: Detection and identification of Android malware using high-efficient Deep Artificial Neural Network. 844-856
- Christopher Bayliss

, Javier Panadero
, Laura Calvet, Joan Manuel Marquès:
Reliability in volunteer computing micro-blogging services. 857-871
- Dehua Zhang

, Sha Lou:
The application research of neural network and BP algorithm in stock price pattern classification and prediction. 872-879

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














