


default search action
Future Generation Computer Systems, Volume 83
Volume 83, June 2018
- Bo Liu, Xiaolin Chang, Zhen Han, Kishor S. Trivedi, Ricardo J. Rodríguez:

Model-based sensitivity analysis of IaaS cloud availability. 1-13 - Anubhav Choudhary, Indrajeet Gupta

, Vishakha Singh
, Prasanta K. Jana:
A GSA based hybrid algorithm for bi-objective workflow scheduling in cloud computing. 14-26 - Longting Zhu, Jigang Wu, Guiyuan Jiang, Long Chen

, Siew-Kei Lam
:
Efficient hybrid multicast approach in wireless data center network. 27-36 - Fei Zhang, Xiaoming Fu

, Ramin Yahyapour
:
LayerMover: Fast virtual machine migration over WAN with three-layer image structure. 37-49 - Alfonso Pérez, Germán Moltó, Miguel Caballer, Amanda Calatrava

:
Serverless computing for container-based architectures. 50-59 - Ruijuan Zheng, Jing Chen, Mingchuan Zhang, Qingtao Wu, Junlong Zhu, Huiqiang Wang:

A collaborative analysis method of user abnormal behavior based on reputation voting in cloud environment. 60-74 - Esmail Asyabi, Mohsen Sharifi

, Azer Bestavros:
ppXen: A hypervisor CPU scheduler for mitigating performance variability in virtualized clouds. 75-84 - Haiyong Xu, Gangyi Jiang, Mei Yu, Ting Luo, Zongju Peng, Feng Shao, Hao Jiang:

3D visual discomfort predictor based on subjective perceived-constraint sparse representation in 3D display system. 85-94 - Haitao Wang, Lihua Song, Guomin Zhang, Hui Chen:

Timetable-aware opportunistic DTN routing for vehicular communications in battlefield environments. 95-103 - Yongjun Li, Zhen Zhang, You Peng, Hongzhi Yin

, Quanqing Xu:
Matching user accounts based on user generated content across social networks. 104-115 - Kostas Kolomvatsos:

An intelligent, uncertainty driven management scheme for software updates in pervasive IoT applications. 116-131 - Jia Jun Tay, M. L. Dennis Wong

, Ming Ming Wong, Cishen Zhang, Ismat Hijazin:
A tree search algorithm for low multiplicative complexity logic design. 132-143 - Bruno Silva, Marco A. S. Netto, Renato Luiz de Freitas Cunha

:
JobPruner: A machine learning assistant for exploring parameter spaces in HPC applications. 144-157 - Ajit Kumar

, K. S. Kuppusamy, Gnanasekaran Aghila:
FAMOUS: Forensic Analysis of MObile devices Using Scoring of application permissions. 158-172 - Li Ma, Wenyin Yang, Yingyu Huo, Yong Zhong:

Research on access control model of social network based on distributed logic. 173-182 - Wei Liu, Jing Wang, Arun Kumar Sangaiah

, Jian Yin:
Dynamic metric embedding model for point-of-interest prediction. 183-192 - Md. Shamsul Huda, Md. Rafiqul Islam

, Jemal H. Abawajy, John Yearwood, Mohammad Mehedi Hassan
, Giancarlo Fortino
:
A hybrid-multi filter-wrapper framework to identify run-time behaviour for fast malware detection. 193-207 - Tian Wang

, Jiyuan Zhou, Minzhe Huang, Md. Zakirul Alam Bhuiyan
, Anfeng Liu, Wenzheng Xu, Mande Xie:
Fog-based storage technology to fight with cyber threat. 208-218 - Keke Gai

, Meikang Qiu
, Meiqin Liu, Zenggang Xiong:
In-memory big data analytics under space constraints using dynamic programming. 219-227 - Satish Anamalamudi, Abdur Rashid Sangi, Mohammed Saeed Alkatheiri

, Ahmedin Mohammed Ahmed:
AODV routing protocol for Cognitive radio access based Internet of Things (IoT). 228-238 - John Panneerselvam

, Lu Liu
, Yao Lu
, Nick Antonopoulos:
An investigation into the impacts of task-level behavioural heterogeneity upon energy efficiency in Cloud datacentres. 239-249 - Wenyin Yang, Guojun Wang, Kim-Kwang Raymond Choo

, Shuhong Chen
:
HEPart: A balanced hypergraph partitioning algorithm for big data applications. 250-268 - Qi Han, Yinghui Zhang, Hui Li

:
Efficient and robust attribute-based encryption supporting access policy hiding in Internet of Things. 269-277 - Elahe Naserian

, Xinheng Wang
, Keshav P. Dahal
, Zhi Wang, Zaijian Wang:
Personalized location prediction for group travellers from spatial-temporal trajectories. 278-292 - Hui Lin, Jia Hu, Chuanfeng Xu, Jianfeng Ma, Mengyang Yu:

DTRM: A new reputation mechanism to enhance data trustworthiness for high-performance cloud computing. 293-302 - Wei Zhang, Xinchang Zhang, Huiling Shi, Longquan Zhou:

An efficient latency monitoring scheme in software defined networks. 303-309 - Lihua Jian, Xiaomin Yang, Zhili Zhou, Kai Zhou, Kai Liu

:
Multi-scale image fusion through rolling guidance filter. 310-325 - Kewei Sha

, Wei Wei, T. Andrew Yang, Zhiwei Wang, Weisong Shi
:
On security challenges and open issues in Internet of Things. 326-337 - Jebaveerasingh Jebadurai

, J. Dinesh Peter
:
Super-resolution of retinal images using multi-kernel SVR for IoT healthcare applications. 338-346 - Dan Liao, Gang Sun

, Guanghua Yang, Victor I. Chang
:
Energy-efficient virtual content distribution network provisioning in cloud-based data centers. 347-357 - Hoang Long Nguyen, Jai E. Jung:

SocioScope: A framework for understanding Internet of Social Knowledge. 358-365 - Enas W. Abdulhay, Arunkumar N.

, Kumaravelu Narasimhan, Elamaran Vellaiappan
, Venkatraman V.:
Gait and tremor investigation using machine learning techniques for the diagnosis of Parkinson disease. 366-373
- Kim-Kwang Raymond Choo

, Yongtang Shi, Zengqiang Chen:
Measurements and security of complex networks and systems: Research advances and challenges. 374-375 - Min Liu, Zhen Xiong, Yue Ma, Peng Zhang, Jianliang Wu, Xingqin Qi

:
DPRank centrality: Finding important vertices based on random walks with a new defined transition matrix. 376-389 - Ryan Ghanbari, Mahdi Jalili

, Xinghuo Yu
:
Correlation of cascade failures and centrality measures in complex networks. 390-400 - Marin Lujak

, Stefano Giordani
:
Centrality measures for evacuation: Finding agile evacuation routes. 401-412 - Sebastian Wandelt

, Xiaoqian Sun, Massimiliano Zanin
, Shlomo Havlin:
QRE: Quick Robustness Estimation for large complex networks. 413-424 - Jinqiang Li, Shuming Zhou, Xuequn Li, Xiaowang Li:

An insertion-deletion-compensation model with Poisson process for scale-free networks. 425-430 - Weifeng Pan

, Bing Li, Jing Liu, Yutao Ma, Bo Hu:
Analyzing the structure of Java software systems by weighted K-core decomposition. 431-444 - Huiqiu Lin, Weihua Yang:

A conditional edge connectivity of double-orbit networks. 445-449 - Yinkui Li, Yongtang Shi, Xiaofeng Gu:

Spectrum bounds for the scattering number, integrity, tenacity of regular graphs. 450-453 - Jingcheng Fu, Jianwen Li

, Yawei Niu, Guanghui Wang, Jianliang Wu:
Multipolarization versus unification in community networks. 454-460 - Jing Jian Li, Bo Ling

:
Symmetric graphs and interconnection networks. 461-467 - Jingjing Wang, Xiaoguang Han

, Zengqiang Chen, Qing Zhang:
Model matching of input/output asynchronous sequential machines based on the semi-tensor product of matrices. 468-475 - Yizhi Ren, Gang Wang, Lanping Yu, Benyun Shi

, Weitong Hu, Zhen Wang:
Rigorous or tolerant: The effect of different reputation attitudes in complex networks. 476-484 - Sadaf Monajemi, Saeid Sanei, Sim Heng Ong:

Information reliability in complex multitask networks. 485-495 - Shah Fahd

, Mehreen Afzal
, Haider Abbas
, Mian Muhammad Waseem Iqbal
, Salman Waheed
:
Correlation power analysis of modes of encryption in AES and its countermeasures. 496-509 - Bassam Jamil Mohd

, Thaier Hayajneh
, Khalil Mustafa Ahmad Yousef
, Zaid Abu Khalaf, Md. Zakirul Alam Bhuiyan
:
Hardware design and modeling of lightweight block ciphers for secure communications. 510-521 - Jerline Sheebha Anni

, Arun Kumar Sangaiah
:
Wireless Integrated Sensor Network: Boundary Intellect system for elephant detection via cognitive theory and Fuzzy Cognitive Maps. 522-534 - Gustavo Gonzalez Granadillo, Samuel Dubus, Alexander Motzek, Joaquín García

, Ender Alvarez, Matteo Merialdo, Serge Papillon, Hervé Debar
:
Dynamic risk management response system to handle cyber threats. 535-552
- Santosh Kumar

, Sanjay Kumar Singh
:
Monitoring of pet animal in smart cities using animal biometrics. 553-563 - Junping Xie, Minhua Yang, Jinhai Li

, Zhong Zheng
:
Rule acquisition and optimal scale selection in multi-scale formal decision contexts and their applications to smart city. 564-581 - Vangipuram Radhakrishna, Shadi A. Aljawarneh

, Puligadda Veereswara Kumar
, Vinjamuri Janaki
:
A novel fuzzy similarity measure and prevalence estimation approach for similarity profiled temporal association pattern mining. 582-595 - M. Shamim Hossain

, Ghulam Muhammad
, Wadood Abdul
, Biao Song, Brij B. Gupta
:
Cloud-assisted secure video transmission and sharing framework for smart cities. 596-606 - Xiong Li

, Jianwei Niu
, Saru Kumari
, Fan Wu
, Kim-Kwang Raymond Choo
:
A robust biometrics based three-factor authentication scheme for Global Mobility Networks in smart city. 607-618 - Vasileios A. Memos

, Kostas E. Psannis
, Yutaka Ishibashi, Byung-Gyu Kim
, Brij B. Gupta
:
An Efficient Algorithm for Media-based Surveillance System (EAMSuS) in IoT Smart City Framework. 619-628 - Prosanta Gope, Ruhul Amin

, SK Hafizul Islam, Neeraj Kumar
, Vinod Kumar Bhalla:
Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment. 629-637 - M. Mazhar Rathore

, Anand Paul
, Awais Ahmad, Naveen K. Chilamkurti
, Won-Hwa Hong, HyunCheol Seo
:
Real-time secure communication for Smart City in high-speed Big Data environment. 638-652 - Logesh Ravi

, V. Subramaniyaswamy
, Vijayakumar Varadharajan
, Xiao-Zhi Gao, V. Indragandhi
:
A hybrid quantum-induced swarm intelligence clustering for the urban trip recommendation in smart city. 653-673

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














