default search action
Future Generation Computer Systems, Volume 99
Volume 99, October 2019
- Peng Zeng, Zhaowei Wang, Zhengyi Jia, Linghe Kong, Dong Li, Xi Jin:
Time-slotted software-defined Industrial Ethernet for real-time Quality of Service in Industry 4.0. 1-10
- Igor Cesar Gonzalez Ribeiro, Célio Albuquerque, Antônio A. de A. Rocha, Diego G. Passos:
THOR: A framework to build an advanced metering infrastructure resilient to DAP failures in smart grids. 11-26 - Rafael Brundo Uriarte, Rocco De Nicola, Vincenzo Scoca, Francesco Tiezzi:
Defining and guaranteeing dynamic service levels in clouds. 27-40
- Tingting Chai, Shitala Prasad, Shenghui Wang:
Boosting palmprint identification with gender information using DeepNet. 41-53
- Raúl Gracia Tinedo, Josep Sampé, Gerard París, Marc Sánchez Artigas, Pedro García López, Yosef Moatti:
Software-defined object storage in multi-tenant environments. 54-72
- Wei Zheng, Chengxin Zhang, Eric W. Bell, Yang Zhang:
I-TASSER gateway: A protein structure and function prediction server powered by XSEDE. 73-85
- Mutaz Barika, Saurabh Kumar Garg, Andrew Chan, Rodrigo N. Calheiros, Rajiv Ranjan:
IoTSim-Stream: Modelling stream graph application in cloud simulation. 86-105 - Jingting Xue, Chunxiang Xu, Lanhua Bai:
DStore: A distributed system for outsourced data storage and retrieval. 106-114
- Jesús Blanco, Andrés García, Valentín Cañas:
Analysis and improvements of the pseudorandom number generation in passive UHF-RFID tags. 115-123
- V. Venkataramanan, S. Lakshmi:
Hardware co simulation of LTE physical layer for mobile network applications. 124-133
- Kai Fan, Huiyue Xu, Longxiang Gao, Hui Li, Yintang Yang:
Efficient and privacy preserving access control scheme for fog-enabled IoT. 134-142
- Yan Zhan, Pandu R. Tadikamalla, James A. Craft, Jiansha Lu, Jijun Yuan, Zhi Pei, Shiyun Li:
Human reliability study on the door operation from the view of Deep Machine Learning. 143-153
- Lichen Cheng, Jiqiang Liu, Chunhua Su, Kaitai Liang, Guangquan Xu, Wei Wang:
Polynomial-based modifiable blockchain structure for removing fraud transactions. 154-163
- Domenico Cotroneo, Roberto Natella, Stefano Rosiello:
Overload control for virtual network functions under CPU contention. 164-176
- Xiaofen Wang, Hong-Ning Dai, Ke Zhang:
Secure and flexible economic data sharing protocol based on ID-based dynamic exclusive broadcast encryption in economic system. 177-185
- Jingqiang Chen, Hai Zhuge:
Extractive summarization of documents with images based on multi-modal RNN. 186-196
- Polona Stefanic, Matej Cigale, Andrew C. Jones, Louise Knight, Ian J. Taylor, Cristiana Istrate, George Suciu, Alexandre Ulisses, Vlado Stankovski, Salman Taherizadeh, Guadalupe Flores Salado, Spiros Koulouzis, Paul Martin, Zhiming Zhao:
SWITCH workbench: A novel approach for the development and deployment of time-critical microservice-based cloud-native applications. 197-212
- Ali Elmahmudi, Hassan Ugail:
Deep face recognition using imperfect facial data. 213-225
- M. Shamim Hossain, Xinghui You, Wenjing Xiao, Jiayi Lu, Enmin Song:
QoS-oriented multimedia transmission using multipath routing. 226-234
- Swagatika Devi, Manmath Narayan Sahoo, Khan Muhammad, Weiping Ding, Sambit Bakshi:
Hiding medical information in brain MR images without affecting accuracy of classifying pathological brain. 235-246
- Muhammad Habib Ur Rehman, Ibrar Yaqoob, Khaled Salah, Muhammad Imran, Prem Prakash Jayaraman, Charith Perera:
The role of big data analytics in industrial Internet of Things. 247-259
- Faiez Zalila, Stéphanie Challita, Philippe Merle:
Model-driven cloud resource management with OCCIware. 260-277
- Inés Sittón-Candanedo, Ricardo S. Alonso, Juan M. Corchado, Sara Rodríguez-González, Roberto Casado-Vara:
A review of edge computing reference architectures and a new global edge proposal. 278-294
- Wei Chen, Jincai Chen, Fuhao Zou, Yuan-Fang Li, Ping Lu, Qiang Wang, Wei Zhao:
Vector and line quantization for billion-scale similarity search on GPUs. 295-307
- Michel Krämer, Sven Frese, Arjan Kuijper:
Implementing secure applications in smart city clouds using microservices. 308-320
- Hamed Vahdat-Nejad, Elham Asani, Zohreh Mahmoodian, Mohammad Hossein Mohseni:
Context-aware computing for mobile crowd sensing: A survey. 321-332
- Alan Woodley, Ling-Xiang Tang, Shlomo Geva, Richi Nayak, Timothy Chappell:
Parallel K-Tree: A multicore, multinode solution to extreme clustering. 333-345
- Xianlong Zhao, Kexin Yang, Qimei Chen, Duo Peng, Hao Jiang, Xianze Xu, Xinzhuo Shuang:
Deep learning based mobile data offloading in mobile edge computing systems. 346-355
- Antonio Celesti, Davide Mulfari, Antonino Galletta, Maria Fazio, Lorenzo Carnevale, Massimo Villari:
A study on container virtualization for guarantee quality of service in Cloud-of-Things. 356-364
- Ayesha Siddiqua, Munam Ali Shah, Hasan Ali Khattak, Ikram Ud Din, Mohsen Guizani:
iCAFE: Intelligent Congestion Avoidance and Fast Emergency services. 365-375
- Afaf Mousa, Jamal Bentahar, Omar Alam:
Context-aware composite SaaS using feature model. 376-390
- Onat Güngör, Baris Aksanli, Reyhan Aydogan:
Algorithm selection and combining multiple learners for residential energy prediction. 391-400
- Penghao Sun, Yuxiang Hu, Julong Lan, Le Tian, Min Chen:
TIDE: Time-relevant deep reinforcement learning for routing optimization. 401-409
- Maryam Imani:
Adaptive signal representation and multi-scale decomposition for panchromatic and multispectral image fusion. 410-424
- Nada El Kassem, Liqun Chen, Rachid El Bansarkhani, Ali El Kaafarani, Jan Camenisch, Patrick Hough, Paulo Martins, Leonel Sousa:
More efficient, provably-secure direct anonymous attestation from lattices. 425-458
- Junhua Zhang, Dong Yuan, Lizhen Cui, Bing Bing Zhou:
A highly efficient algorithm towards optimal data storage and regeneration cost in multiple clouds. 459-472
- Ruowei Xiao, Zhanwei Wu, Dongyu Wang:
A Finite-State-Machine model driven service composition architecture for internet of things rapid prototyping. 473-488
- Ali Broumandnia:
The 3D modular chaotic map to digital color image encryption. 489-499
- Fanyu Bu, Xin Wang:
A smart agriculture IoT system based on deep reinforcement learning. 500-507 - Jing Gao, Peng Li, Zhikui Chen:
A canonical polyadic deep convolutional computation model for big data feature learning in Internet of Things. 508-516
- Min Yu, Jianguo Jiang, Gang Li, Chenzhe Lou, Yunzheng Liu, Chao Liu, Weiqing Huang:
Malicious documents detection for business process management based on multi-layer abstract model. 517-526
- Aldiyar Salkenov, Susmit Bagchi:
Cloud based autonomous monitoring and administration of heterogeneous distributed systems using mobile agents. 527-557
- Guanghui Han, Xiabi Liu, Heye Zhang, Guangyuan Zheng, Nouman Qadeer Soomro, Murong Wang, Weihua Liu:
Hybrid resampling and multi-feature fusion for automatic recognition of cavity imaging sign in lung CT. 558-570
- Seyed Asgary Ghasempouri, Behrouz Tork Ladani:
Modeling trust and reputation systems in hostile environments. 571-592 - Tahiry M. Rabehaja, Shantanu Pal, Michael Hitchens:
Design and implementation of a secure and flexible access-right delegation for resource constrained environments. 593-608
- Dapeng Wu, Lingli Deng, Honggang Wang, Keyu Liu, Ruyan Wang:
Similarity Aware Safety Multimedia Data Transmission Mechanism for Internet of Vehicles. 609-623
- Renan Souza, Vítor Silva, José J. Camata, Alvaro L. G. A. Coutinho, Patrick Valduriez, Marta Mattoso:
Keeping track of user steering actions in dynamic workflows. 624-643
- Davy Preuveneers, Elisabeth Ilie Zudor:
Special Issue: Big Data for context-aware applications and intelligent environments. 644-645 - Valeria Cardellini, Gabriele Mencagli, Domenico Talia, Massimo Torquati:
New Landscapes of the Data Stream Processing in the era of Fog Computing. 646-650
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.