


default search action
Future Generation Computer Systems, Volume 159
Volume 159, 2024
- Yuanlong Liu, Hua Dai
, Qian Zhou, Pengyue Li, Xun Yi
, Geng Yang:
EPSMR: An efficient privacy-preserving semantic-aware multi-keyword ranked search scheme in cloud. 1-14 - Xinyuan Wang
, Yun Peng
, Hejiao Huang
, Xingchen Li:
Dodo: A scalable optimistic deterministic concurrency control protocol. 15-26 - Jose Rocher-Gonzalez
, Jesús Escudero-Sahuquillo
, Pedro Javier García
, Francisco J. Quiles, José Duato
:
A smart and novel approach for managing incast and in-network congestion through adaptive routing. 27-38 - Shuang Wang
, Jiawen Wu, Zian Yuan
, An Gao, Weitong Tony Chen:
Makespan minimization for workflows with multiple privacy levels. 39-50 - Zhuo Chen, Zhe Liu, Yang Zhou
:
Analyzing the blockchain mining strategy in Industrial Internet of Things: A game theoretical approach. 51-63 - Adla Padma, Mangayarkarasi Ramaiah:
GLSBIoT: GWO-based enhancement for lightweight scalable blockchain for IoT with trust based consensus. 64-76 - Junfeng Hao
, Peng Chen
, Juan Chen, Xi Li:
Multi-task federated learning-based system anomaly detection and multi-classification for microservices architecture. 77-90 - Asma AlKhalaf
, Farookh Khadeer Hussain:
EleVMate - A data-driven approach for 'on-the-fly' horizontal small datacentre scalability and VM starvation. 91-101 - Long Cheng, Xiaomin Chen, Zhiming Zhao:
Preface of special issue on Artificial Intelligence for time-critical computing systems. 102-104 - Lorenzo Rocutto
, Marco Maronese
, Daniele Dragoni
, Andrea Cavalli
, Carlo Cavazzoni
:
Comparing Adiabatic Quantum Computers for satellite images feature extraction. 105-113 - Shanika I Nanayakkara
, Shiva Raj Pokhrel
, Gang Li:
Understanding global aggregation and optimization of federated learning. 114-133 - Edgar Huaranga-Junco
, Salvador González-Gerpe
, Manuel Castillo-Cara
, Andrea Cimmino, Raúl García-Castro
:
From cloud and fog computing to federated-fog computing: A comparative analysis of computational resources in real-time IoT applications based on semantic interoperability. 134-150 - Congqin Yi, Xiaoyu Zhao
, Qinqin Sun, Zhenhua Wang:
Assessing the accuracy of remote sensing data products: A multi-granular spatial sampling method. 151-160 - Berkan Oztas
, Deniz Cetinkaya, Festus Adedoyin, Marcin Budka, Gökhan Aksu, Huseyin Dogan:
Transaction monitoring in anti-money laundering: A qualitative analysis and points of view from industry. 161-171 - Mahawish Fatima
, Osama M. Hussain Rehman, Saqib Ali, Moazzam Fareed Niazi
:
ELIDS: Ensemble Feature Selection for Lightweight IDS against DDoS Attacks in Resource-Constrained IoT Environment. 172-187 - François Tessier
, Venkatram Vishwanath
, Emmanuel Jeannot:
Adding topology and memory awareness in data aggregation algorithms. 188-203 - Lin Yuan
, Shengguo Sun, Qinhu Zhang, Hai-Tao Li, Zhen Shen, Chunyu Hu, Xiaogang Zhao, Lan Ye, Chun-Hou Zheng, De-Shuang Huang:
Identification of ferroptosis-related lncRNAs for predicting prognosis and immunotherapy response in non-small cell lung cancer. 204-220 - Efstratios Koukoutsis
, Kyriakos Hizanidis, Abhay Ram, George Vahala:
Quantum simulation of dissipation for Maxwell equations in dispersive media. 221-229 - Sudip Vhaduri
, Sayanton V. Dibbo
, Alexa Muratyan
, William Cheung:
mWIoTAuth: Multi-wearable data-driven implicit IoT authentication. 230-242 - Aito Higashida, Kazuto Ando
, Mario Rüttgers, Andreas Lintermann, Makoto Tsubokura:
Robustness evaluation of large-scale machine learning-based reduced order models for reproducing flow fields. 243-254 - Abdenacer Naouri, Huansheng Ning
, Nabil Abdelkader Nouri
, Amar Khelloufi
, Abdelkarim Ben Sada, Salim Naouri, Attia Qammar, Sahraoui Dhelim
:
Maximizing UAV fog deployment efficiency for critical rescue operations: A multi-objective optimization approach. 255-271 - Shihai Zhao
, Juncheng Pu
, Xiaodong Fu
, Li Liu
, Fei Dai:
Byzantine-robust federated learning with ensemble incentive mechanism. 272-283 - Iftekhar Ahmed, Marshall Scott Poole, Emily Norman, Elizabeth Simpson:
An analysis of scientific group collaboration at JLESC. 284-289 - Jannatun Noor
, Rizwanul Hoque Ratul
, Md. Samiul Basher, Jarif Ahmed Soumik, Sakib Sadman
, Niloy Julious Rozario, Rezwana Reaz
, Sriram Chellappan, A. B. M. Alim Al Islam
:
Secure Processing-aware Media Storage and Archival (SPMSA). 290-306 - Ranran Chen
, Feng Li
, Daniel Luna, Isuru Ranawaka, Fengguang Song
, Sudhakar Pamidighantam
, Xu Liang
, Yao Liang
:
Asynchronous modeling workflows in CyberWater with on-demand HPC/Cloud access. 307-322 - Loris Belcastro, Jesús Carretero, Domenico Talia:
Edge-Cloud Solutions for Big Data Analysis and Distributed Machine Learning - 1. 323-326 - Abhishek Verma
, Sachin Kumar Verma, Avinash Chandra Pandey
, Jyoti Grover
, Girish Sharma
:
Li-MSD: A lightweight mitigation solution for DAO insider attack in RPL-based IoT. 327-339 - Hualong Huang
, Zhekai Duan
, Wenhan Zhan
, Geyong Min
, Kai Peng
:
Optimal service caching, pricing and task partitioning in mobile edge computing federation. 340-352 - Diana Carrizales-Espinoza, Dante D. Sánchez-Gallegos, José Luis González Compeán
, Jesús Carretero:
StructMesh: A storage framework for serverless computing continuum. 353-369 - Ling Sun
, Kaiyuan Li, Ming Yin, Rui Li
, Mengli Xiao, Xiaoliang Fang:
Identifying a selection mechanism of distribution channel for the supply chain: The barriers to the application of web 3.0. 370-378 - Binglei Guo
, Junqi Wu, Yonglin Pu, Jun Zhang, Jiong Yu:
Energy consumption estimation and profiling for queries in distributed database systems based on a bottom-up comprehensive energy model. 379-394 - Xingxing Li, Guangqin Hu, Weidong Li
, Xuejie Zhang
:
Fair multiresource allocation with access constraint in cloud-edge systems. 395-410 - Tullio Basaglia, Zane W. Bell, Daniele D'Agostino
, Paul V. Dressendorfer, Simone Giani, Maria Grazia Pia, Paolo Saracco:
Geant4: A game changer in high energy physics and related applicative fields. 411-422 - Moreno Marzolla
, Giovanni Birolo
, Gabriele D'Angelo
, Piero Fariselli
:
Parallel intersection counting on shared-memory multiprocessors and GPUs. 423-431 - Tokito Murata, Kenichi Kourai
:
Parallel and consistent live checkpointing and restoration of split-memory VMs. 432-443 - Poornima Nookala
, Kyle Chard
, Ioan Raicu:
X-OpenMP - eXtreme fine-grained tasking using lock-less work stealing. 444-458 - Mohammad Daryaie Zanjani
, Mehdi Hosseinzadeh Aghdam
:
The explainable structure of deep neural network for recommendation systems. 459-473 - Xin Liu
, Mario Rüttgers
, Alessio Quercia, Romain Egele, Elisabeth Pfaehler, Rushikesh Shende
, Marcel Aach, Wolfgang Schröder, Prasanna Balaprakash, Andreas Lintermann:
Refining computer tomography data with super-resolution networks to increase the accuracy of respiratory flow simulations. 474-488 - Floris-Jan Willemsen
, Richard Schoonhoven
, Jiri Filipovic, Jacob O. Tørring
, Rob van Nieuwpoort
, Ben van Werkhoven
:
A methodology for comparing optimization algorithms for auto-tuning. 489-504 - Patrick Langer, Stephan Altmüller, Elgar Fleisch, Filipe Barata:
CLAID: Closing the Loop on AI & Data Collection - A cross-platform transparent computing middleware framework for smart edge-cloud and digital biomarker applications. 505-521 - Hongxia Zhang, Luyao Cao, Neeraj Kumar, Jianyong Zhang
, Peiying Zhang
, Jian Wang
:
An improved DDPG-based privacy sensitive level protection computation offloading method in mobile edge computing. 522-532 - Hongyun Cai, Lijing Gao, Jiahao Wang, Fengyu Li:
Reliable incentive mechanism in hierarchical federated learning based on two-way reputation and contract theory. 533-544 - Soohyun Park, Hankyul Baek, Jung Won Yoon
, Youn Kyu Lee, Joongheon Kim
:
AQUA: Analytics-driven quantum neural network (QNN) user assistance for software validation. 545-556 - Wen-Yu Xi
, Ruheng Wang, Li Wang, Xiucai Ye, Mingyang Liu, Tetsuya Sakurai:
An interpretable deep learning model predicts RNA-small molecule binding sites. 557-566 - Ruihua Liu, Wufei Wu
, Xiaochuan Guo
, Gang Zeng
, Keqin Li
:
Replica fault-tolerant scheduling with time guarantee under energy constraint in fog computing. 567-579

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.