default search action
Future Generation Computer Systems, Volume 151
Volume 151, February 2024
- Yahui Wang, Hongchang Chen, Shuxin Liu, Kai Wang, Yuxiang Hu:
Geo-aware graph-augmented self-attention network for individual mobility prediction. 1-11
- Afia Anjum, Paul Agbaje, Arkajyoti Mitra, Emmanuel Oseghale, Ebelechukwu Nwafor, Habeeb Olufowobi:
Towards named data networking technology: Emerging applications, use cases, and challenges for secure data communication. 12-31
- Shiwen Zhang, Jiayi He, Wei Liang, Keqin Li:
MMDS: A secure and verifiable multimedia data search scheme for cloud-assisted edge computing. 32-44 - Hongtai Guo, Zhangbing Zhou, Deng Zhao, Walid Gaaloul:
EGNN: Energy-efficient anomaly detection for IoT multivariate time series data using graph neural network. 45-56 - Zhigang Jin, Junyi Zhou, Bing Li, Xiaodong Wu, Chenxu Duan:
FL-IIDS: A novel federated learning-based incremental intrusion detection system. 57-70 - Hyunseo Park, Gyeong Ho Lee, Jaeseob Han, Jun Kyun Choi:
Multiclass autoencoder-based active learning for sensor-based human activity recognition. 71-84 - Jungwon Seo, Sooyong Park:
SBAC: Substitution cipher access control based on blockchain for protecting personal data in metaverse. 85-97
- Shuo Shang, Bingsheng He, Lizhe Wang:
Introduction to distributed and parallel processing of big spatiotemporal data. 98-99
- Spyridon Chouliaras, Stelios Sotiriadis:
Towards constrained optimization of cloud applications: A hybrid approach. 100-110 - Mingkang Chen, Jingtao Sun, Kento Aida, Atsuko Takefusa:
Weather-aware object detection method for maritime surveillance systems. 111-123
- Zhiwei Ye, Jun Luo, Wen Zhou, Mingwei Wang, Qiyi He:
An ensemble framework with improved hybrid breeding optimization-based feature selection for intrusion detection. 124-136
- Dominik Olszewski, Marcin Iwanowski, Waldemar Graniszewski:
Dimensionality reduction for detection of anomalies in the IoT traffic data. 137-151 - Hang Zhang, Jinsong Wang, Hongwei Zhang, Chao Bu:
Security computing resource allocation based on deep reinforcement learning in serverless multi-cloud edge computing. 152-161 - Norah Alsaeed, Farrukh Nadeem, Faisal Albalwy:
A scalable and lightweight group authentication framework for Internet of Medical Things using integrated blockchain and fog computing. 162-181 - Bo Cui, Yun Hu:
BSELA: A Blockchain Simulator with Event-Layered Architecture. 182-195 - Zeynep Turgut, Arzu Gorgulu Kakisim:
An explainable hybrid deep learning architecture for WiFi-based indoor localization in Internet of Things environment. 196-213
- Huanhuan Hou, Siti Nuraishah Agos Jawaddi, Azlan B. Ismail:
Energy efficient task scheduling based on deep reinforcement learning in cloud environment: A specialized review. 214-231
- Wei Qin, Haiming Chen, Lei Wang, Yinshui Xia, Alfredo Nascita, Antonio Pescapè:
MCOTM: Mobility-aware computation offloading and task migration for edge computing in industrial IoT. 232-241
- Luying Wang, Anfeng Liu, Neal N. Xiong, Shaobo Zhang, Tian Wang, Mianxiong Dong:
SD-SRF: An Intelligent Service Deployment Scheme for Serverless-operated Cloud-Edge Computing in 6G Networks. 242-259
- Serdar Metin, Can C. Özturan:
Quantised and Simulated Max-min Fairness in Blockchain Ecosystems. 260-271
- Retraction notice to "Research on agricultural supply chain system with double chain architecture based on blockchain technology" [Future Generation Computer Systems 86 (2018) 641-649]. 272
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.