0167-739X

Future Generation Computer Systems (FGCS) - Volume 101 论文列表

本期论文列表
Editorial Board

Modified deep residual network architecture deployed on serverless framework of IoT platform based on human activity recognition application

A Relevance-based approach for Big Data Exploration

GTSIM-POP: Game theory based secure incentive mechanism and patient-optimized privacy-preserving packet forwarding scheme in m-healthcare social networks

Evaluating impacts of traffic migration and virtual network functions consolidation on power aware resource allocation algorithms

Deep convolutional tree networks

Tradeoff gain and loss optimization against man-in-the-middle attacks based on game theoretic model

Data-driven ontology generation and evolution towards intelligent service in manufacturing systems

Multilayer overlapping community detection using multi-objective optimization

Edge cloud resource expansion and shrinkage based on workload for minimizing the cost

Developing an ontology schema for enriching and linking digital media assets

Verifiable ranked search over encrypted data with forward and backward privacy

Crypto-ransomware early detection model using novel incremental bagging with enhanced semi-random subspace selection

Analysis and modeling of wireless channel characteristics for Internet of Things scene based on geometric features

Value-based cloud price modeling for segmented business to business market

Scalable and dynamic replica consistency maintenance for edge-cloud system

Henry gas solubility optimization: A novel physics-based algorithm

Breast mass detection from the digitized X-ray mammograms based on the combination of deep active learning and self-paced learning

A scalable method of parallel tasks after the extension of machine systems based on equal change rate

Value-based utility implementation in software-defined testbed for sensor data traffic management

CMSS: Sketching based reliable tracking of large network flows

TSH: Easy-to-be distributed partitioning for large-scale graphs

Deadline-constrained workflow scheduling in IaaS clouds with multi-resource packing

Optimizing the performance of optimization in the cloud environment–An intelligent auto-scaling approach

SLA-aware optimal resource allocation for service-oriented networks

Predicting supply chain risks using machine learning: The trade-off between performance and interpretability

Iterated two-phase local search for the Set-Union Knapsack Problem

A conceptual model for quality of experience management to provide context-aware eHealth services

Latency-aware failover strategies for containerized web applications in distributed clouds

Adaptive energy-aware scheduling method in a meteorological cloud

A greedy-proof incentive-compatible mechanism for group recruitment in mobile crowd sensing

A new strategy based on approximate dynamic programming to maximize the net revenue of IaaS cloud providers with limited resources

Placing big graph into cloud for parallel processing with a two-phase community-aware approach

Online travel mode detection method using automated machine learning and feature engineering

Congestion control vs. link failure: TCP behavior in mmWave connected vehicular networks

An approach for iris contact lens detection and classification using ensemble of customized DenseNet and SVM

Mapping heterogeneous research infrastructure metadata into a unified catalogue for use in a generic virtual research environment

A cloud-agnostic queuing system to support the implementation of deadline-based application execution policies

REMEDI central — expanding and sustaining a medical device community

Support for full life cycle cloud-native application management: Dynamic TOSCA and SWITCH IDE

An efficient linkable group signature for payer tracing in anonymous cryptocurrencies

Seal imprint verification via feature analysis and classifications

Enhancing the security of FinTech applications with map-based graphical password authentication

Energy and cost aware scheduling with batch processing for instance-intensive IoT workflows in clouds

Dynamic digest based authentication for client–server systems using biometric verification

A secure privacy preserving deduplication scheme for cloud computing

A novel two-dimensional ECG feature extraction and classification algorithm based on convolution neural network for human authentication

Mono and multi-modal biometric systems assessment by a common black box testing framework

Securing Spatial Data Infrastructures for Distributed Smart City applications and services

GREYC-Hashing: Combining biometrics and secret for enhancing the security of protected templates

An enhanced hybrid image watermarking scheme for security of medical and non-medical images based on DWT and 2-D SVD

uBaaS: A unified blockchain as a service platform

Measuring the impact of burst buffers on data-intensive scientific workflows

MPI jobs within MPI jobs: A practical way of enabling task-level fault-tolerance in HPC workflows

Smart healthcare framework for ambient assisted living using IoMT and big data analytics techniques

Automated synthesis of mediators for middleware-layer protocol interoperability in the IoT

A PUF-based mutual authentication scheme for Cloud-Edges IoT systems

Iris: Secure reliable live-streaming with opportunistic mobile edge cloud offloading

Two-in-one oblivious signatures

Biometric data on the edge for secure, smart and user tailored access to cloud services

Trust management in a blockchain based fog computing platform with trustless smart oracles

Detection of multiple-mix-attack malicious nodes using perceptron-based trust in IoT networks

Context-aware System for Dynamic Privacy Risk Inference: Application to smart IoT environments

Cross-platform rating prediction method based on review topic

Two-factor authentication in industrial Internet-of-Things: Attacks, evaluation and new construction

A survey on quality-assurance approximate stream processing and applications

Meteor: Optimizing spark-on-yarn for short applications

Mitigating stragglers to avoid QoS violation for time-critical applications through dynamic server blacklisting

MOBT: A kleptographically-secure hierarchical-deterministic wallet for multiple offline Bitcoin transactions

Socio-spatial influence maximization in location-based social networks

A comparative analysis of machine learning models for quality pillar assessment of SaaS services by multi-class text classification of users’ reviews

A short-term energy prediction system based on edge computing for smart city

Adaptive interface ecosystems in smart cities control systems

SecLAP: Secure and lightweight RFID authentication protocol for Medical IoT

A novel framework for data acquisition and ubiquitous communication provisioning in smart cities

Enacting open science by D4Science

The Science Gateways Community Institute: Collaborations and efforts on international scale

SciSpace: A scientific collaboration workspace for geo-distributed HPC data centers

Tiered data management system: Accelerating data processing on HPC systems

Performance analysis and optimization for coverage enhancement strategy of Narrow-band Internet of Things

Deep Learning for EEG motor imagery classification based on multi-layer CNNs feature fusion

A novel cascaded deep neural network for analyzing smart phone data for indoor localization

Automatic extraction and integration of behavioural indicators of malware for protection of cyber–physical networks

Privacy aware decentralized access control system

A blockchain-based clock synchronization Scheme in IoT

Research on logistics supply chain of iron and steel enterprises based on block chain technology

IoT information sharing security mechanism based on blockchain technology

Energy and performance aware fog computing: A case of DVFS and green renewable energy

Design of personnel big data management system based on blockchain

Sensor-based activity recognition: One picture is worth a thousand words

Integration of VANET and 5G Security: A review of design and implementation issues

An improved differential evolution algorithm using Archimedean spiral and neighborhood search based mutation approach for cluster analysis

Composing WoT services with uncertain data

Understanding the composition and evolution of terrorist group networks: A rough set approach

A framework for intelligent analysis of digital cardiotocographic signals from IoMT-based foetal monitoring