


Остановите войну!
for scientists:


default search action
Future Generation Computer Systems, Volume 99
Volume 99, October 2019
- Peng Zeng
, Zhaowei Wang, Zhengyi Jia, Linghe Kong, Dong Li, Xi Jin:
Time-slotted software-defined Industrial Ethernet for real-time Quality of Service in Industry 4.0. 1-10
- Igor Cesar Gonzalez Ribeiro, Célio Albuquerque
, Antônio A. de A. Rocha
, Diego G. Passos
:
THOR: A framework to build an advanced metering infrastructure resilient to DAP failures in smart grids. 11-26 - Rafael Brundo Uriarte
, Rocco De Nicola
, Vincenzo Scoca, Francesco Tiezzi
:
Defining and guaranteeing dynamic service levels in clouds. 27-40
- Tingting Chai
, Shitala Prasad, Shenghui Wang:
Boosting palmprint identification with gender information using DeepNet. 41-53
- Raúl Gracia Tinedo, Josep Sampé, Gerard París
, Marc Sánchez Artigas, Pedro García López, Yosef Moatti:
Software-defined object storage in multi-tenant environments. 54-72
- Wei Zheng
, Chengxin Zhang, Eric W. Bell
, Yang Zhang
:
I-TASSER gateway: A protein structure and function prediction server powered by XSEDE. 73-85
- Mutaz Barika
, Saurabh Kumar Garg
, Andrew Chan, Rodrigo N. Calheiros, Rajiv Ranjan:
IoTSim-Stream: Modelling stream graph application in cloud simulation. 86-105 - Jingting Xue, Chunxiang Xu, Lanhua Bai:
DStore: A distributed system for outsourced data storage and retrieval. 106-114
- Jesús Blanco
, Andrés García
, Valentín Cañas
:
Analysis and improvements of the pseudorandom number generation in passive UHF-RFID tags. 115-123
- V. Venkataramanan
, S. Lakshmi:
Hardware co simulation of LTE physical layer for mobile network applications. 124-133
- Kai Fan
, Huiyue Xu, Longxiang Gao, Hui Li, Yintang Yang:
Efficient and privacy preserving access control scheme for fog-enabled IoT. 134-142
- Yan Zhan, Pandu R. Tadikamalla, James A. Craft, Jiansha Lu, Jijun Yuan, Zhi Pei
, Shiyun Li:
Human reliability study on the door operation from the view of Deep Machine Learning. 143-153
- Lichen Cheng, Jiqiang Liu, Chunhua Su, Kaitai Liang
, Guangquan Xu, Wei Wang:
Polynomial-based modifiable blockchain structure for removing fraud transactions. 154-163
- Domenico Cotroneo, Roberto Natella
, Stefano Rosiello
:
Overload control for virtual network functions under CPU contention. 164-176
- Xiaofen Wang, Hong-Ning Dai
, Ke Zhang
:
Secure and flexible economic data sharing protocol based on ID-based dynamic exclusive broadcast encryption in economic system. 177-185
- Jingqiang Chen, Hai Zhuge
:
Extractive summarization of documents with images based on multi-modal RNN. 186-196
- Polona Stefanic, Matej Cigale, Andrew C. Jones, Louise Knight
, Ian J. Taylor, Cristiana Istrate, George Suciu, Alexandre Ulisses, Vlado Stankovski
, Salman Taherizadeh, Guadalupe Flores Salado, Spiros Koulouzis
, Paul Martin, Zhiming Zhao
:
SWITCH workbench: A novel approach for the development and deployment of time-critical microservice-based cloud-native applications. 197-212
- Ali Elmahmudi
, Hassan Ugail:
Deep face recognition using imperfect facial data. 213-225
- M. Shamim Hossain, Xinghui You, Wenjing Xiao, Jiayi Lu, Enmin Song:
QoS-oriented multimedia transmission using multipath routing. 226-234
- Swagatika Devi, Manmath Narayan Sahoo, Khan Muhammad, Weiping Ding, Sambit Bakshi
:
Hiding medical information in brain MR images without affecting accuracy of classifying pathological brain. 235-246
- Muhammad Habib Ur Rehman
, Ibrar Yaqoob
, Khaled Salah, Muhammad Imran, Prem Prakash Jayaraman
, Charith Perera:
The role of big data analytics in industrial Internet of Things. 247-259
- Faiez Zalila, Stéphanie Challita, Philippe Merle
:
Model-driven cloud resource management with OCCIware. 260-277
- Inés Sittón-Candanedo, Ricardo S. Alonso
, Juan M. Corchado
, Sara Rodríguez-González, Roberto Casado-Vara
:
A review of edge computing reference architectures and a new global edge proposal. 278-294
- Wei Chen, Jincai Chen, Fuhao Zou, Yuan-Fang Li
, Ping Lu, Qiang Wang, Wei Zhao:
Vector and line quantization for billion-scale similarity search on GPUs. 295-307
- Michel Krämer
, Sven Frese, Arjan Kuijper:
Implementing secure applications in smart city clouds using microservices. 308-320
- Hamed Vahdat-Nejad, Elham Asani, Zohreh Mahmoodian, Mohammad Hossein Mohseni:
Context-aware computing for mobile crowd sensing: A survey. 321-332
- Alan Woodley
, Ling-Xiang Tang, Shlomo Geva, Richi Nayak
, Timothy Chappell:
Parallel K-Tree: A multicore, multinode solution to extreme clustering. 333-345
- Xianlong Zhao, Kexin Yang, Qimei Chen
, Duo Peng, Hao Jiang, Xianze Xu, Xinzhuo Shuang:
Deep learning based mobile data offloading in mobile edge computing systems. 346-355
- Antonio Celesti
, Davide Mulfari
, Antonino Galletta
, Maria Fazio
, Lorenzo Carnevale
, Massimo Villari:
A study on container virtualization for guarantee quality of service in Cloud-of-Things. 356-364
- Ayesha Siddiqua, Munam Ali Shah
, Hasan Ali Khattak
, Ikram Ud Din
, Mohsen Guizani:
iCAFE: Intelligent Congestion Avoidance and Fast Emergency services. 365-375
- Afaf Mousa, Jamal Bentahar, Omar Alam:
Context-aware composite SaaS using feature model. 376-390
- Onat Güngör
, Baris Aksanli, Reyhan Aydogan
:
Algorithm selection and combining multiple learners for residential energy prediction. 391-400
- Penghao Sun, Yuxiang Hu, Julong Lan, Le Tian, Min Chen
:
TIDE: Time-relevant deep reinforcement learning for routing optimization. 401-409
- Maryam Imani
:
Adaptive signal representation and multi-scale decomposition for panchromatic and multispectral image fusion. 410-424
- Nada El Kassem
, Liqun Chen
, Rachid El Bansarkhani, Ali El Kaafarani, Jan Camenisch, Patrick Hough, Paulo Martins, Leonel Sousa
:
More efficient, provably-secure direct anonymous attestation from lattices. 425-458
- Junhua Zhang, Dong Yuan, Lizhen Cui, Bing Bing Zhou:
A highly efficient algorithm towards optimal data storage and regeneration cost in multiple clouds. 459-472
- Ruowei Xiao, Zhanwei Wu
, Dongyu Wang:
A Finite-State-Machine model driven service composition architecture for internet of things rapid prototyping. 473-488
- Ali Broumandnia
:
The 3D modular chaotic map to digital color image encryption. 489-499
- Fanyu Bu, Xin Wang:
A smart agriculture IoT system based on deep reinforcement learning. 500-507 - Jing Gao, Peng Li, Zhikui Chen:
A canonical polyadic deep convolutional computation model for big data feature learning in Internet of Things. 508-516
- Min Yu
, Jianguo Jiang, Gang Li
, Chenzhe Lou, Yunzheng Liu, Chao Liu, Weiqing Huang:
Malicious documents detection for business process management based on multi-layer abstract model. 517-526
- Aldiyar Salkenov
, Susmit Bagchi
:
Cloud based autonomous monitoring and administration of heterogeneous distributed systems using mobile agents. 527-557
- Guanghui Han
, Xiabi Liu, Heye Zhang, Guangyuan Zheng, Nouman Qadeer Soomro, Murong Wang, Weihua Liu:
Hybrid resampling and multi-feature fusion for automatic recognition of cavity imaging sign in lung CT. 558-570
- Seyed Asgary Ghasempouri, Behrouz Tork Ladani
:
Modeling trust and reputation systems in hostile environments. 571-592 - Tahiry M. Rabehaja, Shantanu Pal, Michael Hitchens
:
Design and implementation of a secure and flexible access-right delegation for resource constrained environments. 593-608
- Dapeng Wu
, Lingli Deng, Honggang Wang
, Keyu Liu, Ruyan Wang:
Similarity Aware Safety Multimedia Data Transmission Mechanism for Internet of Vehicles. 609-623
- Renan Souza, Vítor Silva, José J. Camata, Alvaro L. G. A. Coutinho, Patrick Valduriez, Marta Mattoso:
Keeping track of user steering actions in dynamic workflows. 624-643
- Davy Preuveneers, Elisabeth Ilie Zudor
:
Special Issue: Big Data for context-aware applications and intelligent environments. 644-645 - Valeria Cardellini
, Gabriele Mencagli, Domenico Talia, Massimo Torquati
:
New Landscapes of the Data Stream Processing in the era of Fog Computing. 646-650

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.