default search action
Future Generation Computer Systems, Volume 116
Volume 116, March 2021
- Telli Faez:
Future Generation Computer Systems: Publisher's Note: In recognition of Prof. Peter Sloot on his retirement as Editor-in-Chief. iii
- Aron Kondoro, Imed Ben Dhaou, Hannu Tenhunen, Nerey H. Mvungi:
Real time performance analysis of secure IoT protocols for microgrid communication. 1-12 - Biagio Cosenza, Nikita Popov, Ben H. H. Juurlink, Paul Richmond, Mozhgan Kabiri Chimeh, Carmine Spagnuolo, Gennaro Cordasco, Vittorio Scarano:
Easy and efficient agent-based simulations with the OpenABL language and compiler. 61-75 - Jianguo Ren, Chunming Zhang, Qihong Hao:
A theoretical method to evaluate honeynet potency. 76-85 - Wadee Alhalabi, Jari Jussila, Kamal Mansur Jambi, Anna Visvizi, Hafsa Qureshi, Miltiadis D. Lytras, Areej Malibari, Raniah Samir Adham:
Social mining for terroristic behavior detection through Arabic tweets characterization. 132-144 - Damián Fernández-Cerero, F. Javier Ortega, Agnieszka Jakóbik, Alejandro Fernández-Montes:
DISCERNER: Dynamic selection of resource manager in hyper-scale cloud-computing data centres. 190-199 - Fatih Semiz, Faruk Polat:
Incremental multi-agent path finding. 220-233 - Mario García Valdez, Juan Julián Merelo Guervós:
A container-based cloud-native architecture for the reproducible execution of multi-population optimization algorithms. 234-252 - Chaobo He, Hai Liu, Yong Tang, Shuangyin Liu, Xiang Fei, Qiwei Cheng, Hanchao Li:
Similarity preserving overlapping community detection in signed networks. 275-290 - Lun Meng, Feng Ji, Yao Sun, Tao Wang:
Detecting anomalies in microservices with execution trace comparison. 291-301 - Achini Adikari, Gihan Gamage, Daswin De Silva, Nishan Mills, Sze-Meng Jojo Wong, Damminda Alahakoon:
A self structuring artificial intelligence framework for deep emotions modeling and analysis on the social web. 302-315 - Chih-Hsuan Chen, Shuo-Han Chen, Yu-Pei Liang, Tseng-Yi Chen, Tsan-sheng Hsu, Hsin-Wen Wei, Wei-Kuan Shih:
Facilitating external sorting on SMR-based large-scale storage systems. 333-348 - Haodong Bian, Jianqiang Huang, Lingbin Liu, Dongqiang Huang, Xiaoying Wang:
ALBUS: A method for efficiently processing SpMV using SIMD and Load balancing. 371-392 - Borja Bordel, Ramón Alcarria, Tomás Robles:
Denial of Chain: Evaluation and prediction of a novel cyberattack in Blockchain-supported systems. 426-439 - Madichetty Sreenivasulu, M. Sridevi:
A novel method for identifying the damage assessment tweets during disaster. 440-454
- Yi-Ming Guo, Zhen-Ling Huang, Ji Guo, Xing-Rong Guo, Hua Li, Meng-Yu Liu, Safa Ezzeddine, Mpeoane Judith Nkeli:
A bibliometric analysis and visualization of blockchain. 316-332
- Fethi A. Rabhi, Madhushi Niluka Bandara, Kun Lu, Saif Dewan:
Design of an innovative IT platform for analytics knowledge management. 209-219
- Defu Qiu, Lixin Zheng, Jianqing Zhu, Detian Huang:
Multiple improved residual networks for medical image super-resolution. 200-208
- Xiaoyun Xie, Hui Liu, Minglei Shu, Qing Zhu, Anpeng Huang, Xiangpu Kong, Yinglong Wang:
A multi-stage denoising framework for ambulatory ECG signal based on domain knowledge and motion artifact detection. 103-116 - Elham Khodabandehloo, Daniele Riboni, Abbas Alimohammadi:
HealthXAI: Collaborative and explainable AI for supporting early diagnosis of cognitive decline. 168-189
- Bram Steenwinckel, Dieter De Paepe, Sander Vanden Hautte, Pieter Heyvaert, Mohamed Bentefrit, Pieter Moens, Anastasia Dimou, Bruno Van Den Bossche, Filip De Turck, Sofie Van Hoecke, Femke Ongenae:
FLAGS: A methodology for adaptive anomaly detection and root cause analysis on sensor data streams by fusing expert knowledge with machine learning. 30-48 - Danilo Dessì, Francesco Osborne, Diego Reforgiato Recupero, Davide Buscaldi, Enrico Motta:
Generating knowledge graphs by employing Natural Language Processing and Machine Learning techniques within the scholarly domain. 253-264 - Nicolas Tempelmeier, Elena Demidova:
Linking OpenStreetMap with knowledge graphs - Link discovery for schema-agnostic volunteered geographic information. 349-364
- Roni Mateless, Oren Tsur, Robert Moskovitch:
Pkg2Vec: Hierarchical package embedding for code authorship attribution. 49-60 - Theodoros Apostolopoulos, Vasilios Katos, Kim-Kwang Raymond Choo, Constantinos Patsakis:
Resurrecting anti-virtualization and anti-debugging: Unhooking your hooks. 393-405
- Veronika Lesch, Christian Krupitzer, Kevin Stubenrauch, Nico Keil, Christian Becker, Samuel Kounev, Michele Segata:
A comparison of mechanisms for compensating negative impacts of system integration. 117-131
- Mamoun Alazab, Seung-Hun Hong, Jenny Ng:
Louder bark with no bite: Privacy protection through the regulation of mandatory data breach notification in Australia. 22-29 - Bakkiam David Deebak, Fadi M. Al-Turjman:
Lightweight authentication for IoT/Cloud-based forensics in intelligent data computing. 406-425
- Zhuo Bi, Wenju Huang:
Human action identification by a quality-guided fusion of multi-model feature. 13-21 - Xialin Zhang, Lingkun Lian, Fukang Zhu:
Parameter fitting of variogram based on hybrid algorithm of particle swarm and artificial fish swarm. 265-274 - Fang Ji, Heqing Zhang, Zijiang Zhu, Weihuang Dai:
Blog text quality assessment using a 3D CNN-based statistical framework. 365-370
- Md. Muzakkir Hussain, M. M. Sufyan Beg:
CODE-V: Multi-hop computation offloading in Vehicular Fog Computing. 86-102
- Zhao Li, Yuying Xing, Jiaming Huang, Haobo Wang, Jianliang Gao, Guoxian Yu:
Large-scale online multi-view graph neural network and applications. 145-155 - Xiangjie Kong, Jiaxing Li, Luna Wang, Guojiang Shen, Yiming Sun, Ivan Lee:
Recurrent-DC: A deep representation clustering model for university profiling based on academic graph. 156-167
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.