Stop the war!
Остановите войну!
for scientists:
default search action
Future Generation Computer Systems, Volume 84
Volume 84, July 2018
- Changxi Liu, Hailong Yang, Rui Wang, Zhongzhi Luan, Depei Qian:
T1000: Mitigating the memory footprint of convolution neural networks with decomposition and re-fusion. 1-10 - Shridhar G. Domanal, G. Ram Mohana Reddy:
An efficient cost optimized scheduling for spot instances in heterogeneous cloud environment. 11-21 - Adrián Castelló, Rafael Mayo, Kevin Sala, Vicenç Beltran, Pavan Balaji, Antonio J. Peña:
On the adequacy of lightweight thread approaches for high-level parallel programming models. 22-31 - Yahya Hassanzadeh-Nazarabadi, Alptekin Küpçü, Öznur Özkasap:
Decentralized and locality aware replication method for DHT-based P2P storage systems. 32-46 - Dariush Abbasinezhad-Mood, Morteza Nikooghadam:
Design and hardware implementation of a security-enhanced elliptic curve cryptography based lightweight authentication scheme for smart grid communications. 47-57 - Bin Li, Qinglei Zhou, Xueming Si:
Mimic computing for password recovery. 58-77 - Falak Nawaz, Naeem Khalid Janjua, Omar Khadeer Hussain, Farookh Khadeer Hussain, Elizabeth Chang, Morteza Saberi:
Event-driven approach for predictive and proactive management of SLA violations in the Cloud of Things. 78-97 - Huixi Li, Wenjun Li, Haodong Wang, Jianxin Wang:
An optimization of virtual machine selection and placement by using memory content similarity for server consolidation in cloud. 98-107 - Troy C. Kohwalter, Leonardo Murta, Esteban Clua:
Filtering irrelevant sequential data out of game session telemetry though similarity collapses. 108-122
- Pandi Vijayakumar, Victor Chang, L. Jegatha Deborah, Bharat S. Rawal Kshatriya:
Key management and key distribution for secure group communication in mobile and cloud network. 123-125 - Zitao Chen, Wei Ren, Yi Ren, Kim-Kwang Raymond Choo:
LiReK: A lightweight and real-time key establishment scheme for wearable embedded devices by gestures or motions. 126-138 - Muhammad Al-Qurishi, Sk. Md. Mizanur Rahman, M. Shamim Hossain, Ahmad Almogren, Majed A. AlRubaian, Atif Alamri, Mabrook Al-Rakhami, Brij B. Gupta:
An efficient key agreement protocol for Sybil-precaution in online social networks. 139-148 - Xiong Li, Fan Wu, Muhammad Khurram Khan, Lili Xu, Jian Shen, Minho Jo:
A secure chaotic map-based remote authentication scheme for telecare medicine information systems. 149-159 - Yang Yang, Xianghan Zheng, Ximeng Liu, Shangping Zhong, Victor Chang:
Cross-domain dynamic anonymous authenticated group key management with symptom-matching for e-health social system. 160-176 - Yukun Zhou, Dan Feng, Yu Hua, Wen Xia, Min Fu, Fangting Huang, Yucheng Zhang:
A similarity-aware encrypted deduplication scheme with flexible access control in the cloud. 177-189 - Cheng Guo, Ningqi Luo, Md. Zakirul Alam Bhuiyan, Yingmo Jie, Yuanfang Chen, Bin Feng, Muhammad Alam:
Key-aggregate authentication cryptosystem for data sharing in dynamic cloud storage. 190-199 - Rifaqat Ali, Arup Kumar Pal, Saru Kumari, Marimuthu Karuppiah, Mauro Conti:
A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring. 200-215 - SK Hafizul Islam, Mohammad S. Obaidat, Pandi Vijayakumar, Enas W. Abdulhay, Fagen Li, M. Krishna Chaitanya Reddy:
A robust and efficient password-based conditional privacy preserving authentication and group-key agreement protocol for VANETs. 216-227 - Xin Su, Aniello Castiglione, Christian Esposito, Chang Choi:
Power domain NOMA to support group communication in public safety networks. 228-238 - Qi Feng, Debiao He, Sherali Zeadally, Huaqun Wang:
Anonymous biometrics-based authentication scheme with key distribution for mobile multi-server environment. 239-251
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.