default search action
Future Generation Computer Systems, Volume 141
Volume 141, April 2023
- Xu Yang, Hongyan Xing, Xin Su:
AI-based sound source localization system with higher accuracy. 1-15
- Sasikumar Asaithambi, Subramaniyaswamy Vairavasundaram, Ketan Kotecha, V. Indragandhi, Logesh Ravi, Ganeshsree Selvachandran, Ajith Abraham:
Blockchain-based trust mechanism for digital twin empowered Industrial Internet of Things. 16-27
- Xin Su, Li An, Zhen Cheng, Yajuan Weng:
Cloud-edge collaboration-based bi-level optimal scheduling for intelligent healthcare systems. 28-39
- Alejandro Guerra-Manzanares, Hayretdin Bahsi:
On the application of active learning for efficient and effective IoT botnet detection. 40-53
- Andrea Cimmino, Juan Cano-Benito, Alba Fernández-Izquierdo, Christos Patsonakis, Apostolos C. Tsolakis, Raúl García-Castro, Dimosthenis Ioannidis, Dimitrios Tzovaras:
A scalable, secure, and semantically interoperable client for cloud-enabled Demand Response. 54-66
- Hangxu Ji, Su Jiang, Yuhai Zhao, Gang Wu, Guoren Wang, George Y. Yuan:
BS-Join: A novel and efficient mixed batch-stream join method for spatiotemporal data management in Flink. 67-80
- Yi Liang, Kaizhong Chen, Lan Yi, Xing Su, Xiaoming Jin:
DeGTeC: A deep graph-temporal clustering framework for data-parallel job characterization in data centers. 81-95 - Vivek Sethi, Sujata Pal:
FedDOVe: A Federated Deep Q-learning-based Offloading for Vehicular fog computing. 96-105
- Weisheng Zhang, ZhiBang Yang, Shenghong Yang, Mingxing Duan, Kenli Li:
SPsync: Lightweight multi-terminal big spatiotemporal data synchronization solution. 106-115
- Junchao Wang, Dongmin Huang, Shengwen Fan, Kaining Han, Gwanggil Jeon, Joel J. P. C. Rodrigues:
PSDCE: Physiological signal-based double chaotic encryption for instantaneous E-healthcare services. 116-128
- Chunrong Wu, Qinglan Peng, Yunni Xia, Yong Jin, Zhentao Hu:
Towards cost-effective and robust AI microservice deployment in edge computing environments. 129-142 - Zehao Wang, Huifeng Wu, Jin Fan, Danfeng Sun, Jia Wu:
A robust feature reinforcement framework for heterogeneous graphs neural networks. 143-153 - Issam W. Damaj, Hadi Al-Mubasher, Mahmoud Saadeh:
An extended analytical framework for heterogeneous implementations of light cryptographic algorithms. 154-172
- Yuhan Su, Zhibin Gao, Xiaojiang Du, Mohsen Guizani:
User-centric base station clustering and resource allocation for cell-edge users in 6G ultra-dense networks. 173-185
- Nannan Wu, Lei Xu, Liehuang Zhu:
A blockchain based access control scheme with hidden policy and attribute. 186-196
- Shaoliang Peng, Wenxuan Bao, Hao Liu, Xia Xiao, Jiandong Shang, Lin Han, Shan Wang, Xiaolan Xie, Yang Xu:
A peer-to-peer file storage and sharing system based on consortium blockchain. 197-204
- Jiaxin Hou, Meng Chen, Haijun Geng, Rongzhen Li, Jianyuan Lu:
GP-NFSP: Decentralized task offloading for mobile edge computing with independent reinforcement learning. 205-217 - Kun Wang, Song Wu, Kun Suo, Yijie Liu, Hang Huang, Zhuo Huang, Hai Jin:
Characterizing and optimizing Kernel resource isolation for containers. 218-229
- A. H. M. Kamal, Md. Golam Rabiul Alam, Md. Rafiul Hassan, Tasnim Sakib Apon, Mohammad Mehedi Hassan:
Explainable indoor localization of BLE devices through RSSI using recursive continuous wavelet transformation and XGBoost classifier. 230-242
- Simon Volpert, Philipp Eichhammer, Florian Held, Thomas Huffert, Hans P. Reiser, Jörg Domaschka:
The view on systems monitoring and its requirements from future Cloud-to-Thing applications and infrastructures. 243-257 - Yaqiang Zhang, Ruyang Li, Yaqian Zhao, Rengang Li, Yanwei Wang, Zhangbing Zhou:
Multi-agent deep reinforcement learning for online request scheduling in edge cooperation networks. 258-268 - Jose Carlos Romero, Angeles G. Navarro, Andrés Rodríguez, Rafael Asenjo:
SkyFlow: Heterogeneous streaming for skyline computation using FlowGraph and SYCL. 269-283 - Genxin Chen, Jin Qi, Ying Sun, Xiaoxuan Hu, Zhenjiang Dong, Yanfei Sun:
A collaborative scheduling method for cloud computing heterogeneous workflows based on deep reinforcement learning. 284-297 - Ayaskanta Mishra, Arun Kumar Ray:
Multi-Access Edge Computing assisted ultra-low energy scheduling and harvesting in multi-hop Wireless Sensor and Actuator Network for energy neutral self-sustainable Next-gen Cyber-Physical System. 298-324 - Tian Jiang, Yunqi Liu, Xuemeng Wu, Mohan Xu, Xiaohui Cui:
Application of deep reinforcement learning in attacking and protecting structural features-based malicious PDF detector. 325-338 - Ihsan H. Abdulqadder, Deqing Zou, Israa T. Aziz:
The DAG blockchain: A secure edge assisted honeypot for attack detection and multi-controller based load balancing in SDN 5G. 339-354
- Kan Wang, Xuan Liu, Hongfang Zhou, Dapeng Lan, Zhen Gao, Amir Taherkordi, Yujie Ye, Yuan Gao:
Reinforcement learning-based cost-efficient service function chaining with CoMP zero-forcing beamforming in edge networks. 355-368
- Jemma L. König, Annika Hinze, Judy Bowen:
Workload categorization for hazardous industries: The semantic modelling of multi-modal physiological data. 369-381
- Julius Köpke, Giovanni Meroni, Mattia Salnitri:
Designing secure business processes for blockchains with SecBPMN2BC. 382-398 - Zhuojin Liu, Shufeng Gong, Yuxuan Su, Changyi Wan, Yanfeng Zhang, Ge Yu:
Improving Density Peaks Clustering through GPU acceleration. 399-413 - Guangyao Zhou, Wenhong Tian, Rajkumar Buyya:
Multi-search-routes-based methods for minimizing makespan of homogeneous and heterogeneous resources in Cloud computing. 414-432 - Byung Moo Lee, Hong Yang:
Optimized power control strategy in Massive MIMO for distributed IoT networks. 433-447
- Cailing Cai, Shimin Pan, Tsz Hon Yuen, Siu-Ming Yiu:
Practical fully leakage resilient signatures with auxiliary inputs. 448-461 - Carmen Sánchez-Zas, Víctor A. Villagrá, Mario Vega-Barbas, Xavier Larriva-Novo, José Ignacio Moreno, Julio Berrocal:
Ontology-based approach to real-time risk management and cyber-situational awareness. 462-472
- Francesco Tusa, Stuart Clayman:
End-to-end slices to orchestrate resources and services in the cloud-to-edge continuum. 473-488
- Marcin Wozniak, Michal Wieczorek, Jakub Silka:
BiLSTM deep neural network model for imbalanced medical data of IoT systems. 489-499
- Haroon Malik, Shahzaib Tahir, Hasan Tahir, Musfirah Ihtasham, Fawad Khan:
A homomorphic approach for security and privacy preservation of Smart Airports. 500-513
- Lei Shi, Yimin Zhou, Juan Wang, Zuli Wang, Ding Chen, Haifeng Zhao, Wankou Yang, Edward Szczerbicki:
Compact global association based adaptive routing framework for personnel behavior understanding. 514-525
- Jiayi Yu, Zeyuan Li, Naixue Xiong, Shaobo Zhang, Anfeng Liu, Athanasios V. Vasilakos:
A reliability and truth-aware based online digital data auction mechanism for cybersecurity in MCS. 526-541
- Martin Molan, Andrea Borghesi, Daniele Cesarini, Luca Benini, Andrea Bartolini:
RUAD: Unsupervised anomaly detection in HPC systems. 542-554
- Zhaowei Ma, Xiaoming Yuan, Kai Liang, Jie Feng, Li Zhu, Dajun Zhang, F. Richard Yu:
Blockchain-escorted distributed deep learning with collaborative model aggregation towards 6G networks. 555-566
- Yi Zhou, Lei Huang, Tao Zhou, Hanshi Sun:
Combating medical noisy labels by disentangled distribution learning and consistency regularization. 567-576
- Lu Chen, De-Gan Zhang, Jie Zhang, Ting Zhang, Wen-Jing Wang, Ya-Hui Cao:
A novel offloading approach of IoT user perception task based on quantum behavior particle swarm optimization. 577-594
- Luca Gagliardelli, Luca Zecchini, Luca Ferretti, Domenico Beneventano, Giovanni Simonini, Sonia Bergamaschi, Mirko Orsini, Luca Magnotta, Emma Mescoli, Andrea Livaldi, Nicola Gessa, Piero De Sabbata, Gianluca D'Agosta, Fabrizio Paolucci, Fabio Moretti:
A big data platform exploiting auditable tokenization to promote good practices inside local energy communities. 595-610
- Zhongyang Wang, Du Xu:
Online optimization of intelligent reflecting surface-aided energy-efficient IoT-edge computing. 611-625
- Ece Isik-Polat, Gorkem Polat, Altan Koçyigit:
ARFED: Attack-Resistant Federated averaging based on outlier elimination. 626-650
- Jinhui Liu, Jiaming Wen, Bowen Zhang, Shunyu Dong, Bo Tang, Yong Yu:
A post quantum secure multi-party collaborative signature with deterability in the Industrial Internet of Things. 663-676
- Hendrik Nolte, Nicolai Spicher, Andrew Russel, Tim Ehlers, Sebastian Krey, Dagmar Krefting, Julian Kunkel:
Secure HPC: A workflow providing a secure partition on an HPC system. 677-691
- Ziming Zhang, Xiaolong Xu, Fu Xiao:
LGAN-DP: A novel differential private publication mechanism of trajectory data. 692-703
- Wei Han, Junchao Wang, Shike Hou, Tong Bai, Gwanggil Jeon, Joel J. P. C. Rodrigues:
An PPG signal and body channel based encryption method for WBANs. 704-712
- Sung-Jong Eun, Eun Joung Kim, Jung Yoon Kim:
Artificial intelligence-based personalized serious game for enhancing the physical and cognitive abilities of the elderly. 713-722
- Junwen Liu, Ziyun Xiao, Shiyong Lu, Dunren Che, Ming Dong, Changxin Bai:
Infrastructure-level Support for GPU-Enabled Deep Learning in DATAVIEW. 723-737
- Roop Singh, Mukesh Saraswat, Alaknanda Ashok, Himanshu Mittal, Ashish K. Tripathi, Avinash Chandra Pandey, Raju Pal:
From classical to soft computing based watermarking techniques: A comprehensive review. 738-754
- António Barreto, Hervé Paulino, João A. Silva, Nuno M. Preguiça:
PS-CRDTs: CRDTs in highly volatile environments. 755-767
- Lixiang Yuan, Siyang Yu, ZhiBang Yang, Mingxing Duan, Kenli Li:
A data balancing approach based on generative adversarial network. 768-776
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.