![](https://dblp.uni-trier.de/img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://fanyv88.com/img/search.dark.16x16.png)
default search action
Future Generation Computer Systems, Volume 115
Volume 115, February 2021
- Adarsh Kumar, Kriti Sharma
, Harvinder Singh, Sagar Gupta Naugriya, Sukhpal Singh Gill
, Rajkumar Buyya
:
A drone-based networked system and methods for combating coronavirus disease (COVID-19) pandemic. 1-19 - Juan Carlos Salinas-Hilburg, Marina Zapater, José Manuel Moya
, José L. Ayala
:
Fast energy estimation framework for long-running applications. 20-33
- Alan Briones
, Adrià Mallorquí
, Agustín Zaballos, Ramon Martín de Pozuelo:
Adaptive and aggressive transport protocol to provide QoS in cloud data exchange over Long Fat Networks. 34-44
- Milosz Ciznicki
, Krzysztof Kurowski, Jan Weglarz
:
Energy and performance improvements in stencil computations on multi-node HPC systems with different network and communication topologies. 45-58
- Jianhang Zhou
, Qi Zhang, Bob Zhang
:
An automatic multi-view disease detection system via Collective Deep Region-based Feature Representation. 59-75
- Qianren Mao
, Xi Li, Hao Peng
, Jianxin Li, Dongxiao He, Shu Guo, Min He, Lihong Wang:
Event prediction based on evolutionary event ontology knowledge. 76-89
- (Withdrawn) Intelligent edge computing based on machine learning for smart city. 90-99
- Fahimeh Hajizadeh
, Mohammadreza Binesh Marvasti, Seyyed Amir Asghari
, Mostafa Abbas Mollaei
, Amir M. Rahmani
:
Configurable DSI partitioned approximate multiplier. 100-114
- Mordechai Guri:
MAGNETO: Covert channel between air-gapped systems and nearby smartphones via CPU-generated magnetic fields. 115-125 - Özgür Yürekten
, Mehmet Demirci:
SDN-based cyber defense: A survey. 126-149
- Roger Pueyo Centelles
, Roc Meseguer
, Felix Freitag
, Leandro Navarro
, Sergio F. Ochoa
, Rodrigo M. Santos
:
LoRaMoto: A communication system to provide safety awareness among civilians after an earthquake. 150-170
- Hisham A. Kholidy:
Autonomous mitigation of cyber risks in the Cyber-Physical Systems. 171-187
- Saeed Mirpour Marzuni, Abdorreza Savadi
, Adel Nadjaran Toosi, Mahmoud Naghibzadeh:
Cross-MapReduce: Data transfer reduction in geo-distributed MapReduce. 188-200 - Dabiah Ahmed Alboaneen
, Hugo Tianfield, Yan Zhang, Bernardi Pranggono
:
A metaheuristic method for joint task scheduling and virtual machine placement in cloud data centers. 201-212 - Emiliano Casalicchio
, Gabriele Gualandi:
ASiMOV: A self-protecting control application for the smart factory. 213-235
- Wenjie Feng
, Shenghua Liu, Christos Faloutsos, Bryan Hooi, Huawei Shen, Xueqi Cheng:
EagleMine: Vision-guided Micro-clusters recognition and collective anomaly detection. 236-250
- Matteo Repetto, Alessandro Carrega
, Riccardo Rapuzzi
:
An architecture to manage security operations for digital service chains. 251-266
- Mumin Cebe, Kemal Akkaya:
Communication-efficient certificate revocation management for Advanced Metering Infrastructure and IoT Integration. 267-278 - Mohammad Ehsan Basiri
, Shahla Nemati, Moloud Abdar
, Erik Cambria
, U. Rajendra Acharya
:
ABCDM: An Attention-based Bidirectional CNN-RNN Deep Model for sentiment analysis. 279-294
- Yan Zhang, Kun Wang, Lei He:
Editorial for FGCS special issue: Computation Intelligence for Energy Internet. 295-297
- Tao Song, Honghua Zhao, Zhi Liu, Hao Liu, Yuanyuan Hu, Dianmin Sun:
Intelligent human hand gesture recognition by local-global fusing quality-aware features. 298-303
- Yongjun Ren, Yan Leng, Jian Qi, Pradip Kumar Sharma
, Jin Wang, Zafer Al-Makhadmeh, Amr Tolba
:
Multiple cloud storage mechanism based on blockchain in smart homes. 304-313
- Ahmed Falah, Lei Pan, Md. Shamsul Huda, Shiva Raj Pokhrel
, Adnan Anwar
:
Improving malicious PDF classifier with feature engineering: A data-driven approach. 314-326
- Shudong Wang, Gaowei Liu, Xinzeng Wang, Yuanyuan Zhang, Sicheng He, Yulin Zhang:
TagSNP-set selection for genotyping using integrated data. 327-334
- Babar Shahzaad
, Athman Bouguettaya, Sajib Mistry
, Azadeh Ghari Neiat:
Resilient composition of drone services for delivery. 335-350 - Majid Makki, Dimitri Van Landuyt
, Bert Lagaisse
, Wouter Joosen:
Thread-level resource consumption control of tenant custom code in a shared JVM for multi-tenant SaaS. 351-364
- Sunggon Kim
, Jaehyun Han, Hyeonsang Eom, Yongseok Son:
Improving I/O performance in distributed file systems for flash-based SSDs by access pattern reshaping. 365-373
- Faizana Naeem
, Mujahid Mohsin, Usman Rauf, Liaqat Ali Khan:
Formal approach to thwart against drone discovery attacks: A taxonomy of novel 3D obfuscation mechanisms. 374-386 - José Tomás Martínez Garre
, Manuel Gil Pérez
, Antonio Ruiz-Martínez
:
A novel Machine Learning-based approach for the detection of SSH botnet infection. 387-396
- Xiaonan Wang, Xingwei Wang, Yanli Li:
NDN-based IoT with Edge computing. 397-405 - Meng Li
, Chhagan Lal, Mauro Conti
, Donghui Hu:
LEChain: A blockchain-based lawful evidence management scheme for digital forensics. 406-420
- Charilaos Skandylas, Narges Khakpour
:
Design and Implementation of Self-Protecting systems: A Formal Approach. 421-437
- Ramin Toosi
, Mohammad Ali Akhaee:
Time-frequency analysis of keystroke dynamics for user authentication. 438-447 - Jing Chen, Jiong Chen, Kun He, Ruiying Du:
SeCrowd: Efficient secure interactive crowdsourcing via permission-based signatures. 448-458 - Martina Sestak
, Marjan Hericko, Tatjana Welzer-Druzovec, Muhamed Turkanovic:
Applying k-vertex cardinality constraints on a Neo4j graph database. 459-474 - Hongbo Zhu, Guangjie Han
, Peng Yang, Wenbo Zhang, Chuan Lin, Hai Zhao:
Functional-realistic CT image super-resolution for early-stage pulmonary nodule detection. 475-485
- Hong Zhong, Yiyuan Zhou, Qingyang Zhang
, Yan Xu, Jie Cui:
An efficient and outsourcing-supported attribute-based access control scheme for edge-enabled smart healthcare. 486-496
- Miao Zhang, Yong Peng, Mei Yang, Quanjun Yin, Xu Xie:
A discrete PSO-based static load balancing algorithm for distributed simulations in a cloud environment. 497-516
- Martin Husák
, Václav Bartos
, Pavol Sokol
, Andrej Gajdos
:
Predictive methods in cyber defense: Current experience and research challenges. 517-530
- Wenyi Tang, Ling Tian, Xu Zheng, Guangchun Luo, Zaobo He:
Susceptible user search for defending opinion manipulation. 531-541
- Jianliang Wei, Fei Meng:
How opinion distortion appears in super-influencer dominated social network. 542-552
- Qiang Wang, Fucai Zhou, Jian Xu
, Zifeng Xu:
Efficient verifiable databases with additional insertion and deletion operations in cloud computing. 553-567 - Timothy R. McIntosh
, Paul A. Watters
, A. S. M. Kayes
, Alex Ng, Yi-Ping Phoebe Chen
:
Enforcing situation-aware access control to build malware-resilient file systems. 568-582 - Gang Yu, Yi Wang
, Min Hu, Lihua Shi, Zeyu Mao, Vijayan Sugumaran
:
RIOMS: An intelligent system for operation and maintenance of urban roads using spatio-temporal data in smart cities. 583-609
- Shitong Mao
, Aliaa Sabry, Yassin Khalifa
, James L. Coyle, Ervin Sejdic:
Estimation of laryngeal closure duration during swallowing without invasive X-rays. 610-618
- Viraaji Mothukuri, Reza M. Parizi, Seyedamin Pouriyeh, Yan Huang, Ali Dehghantanha, Gautam Srivastava:
A survey on security and privacy of federated learning. 619-640
- Bander Ali Saleh Al-rimy, Mohd Aizaini Maarof, Mamoun Alazab
, Syed Zainudeen Mohd Shaid, Fuad A. Ghaleb
, Abdulmohsen Almalawi, Abdullah Marish Ali
, Tawfik Al Hadhrami:
Redundancy Coefficient Gradual Up-weighting-based Mutual Information Feature Selection technique for Crypto-ransomware early detection. 641-658
- Zar Bakht Imtiaz
, Awais Manzoor
, Saif ul Islam
, Malik Ali Judge
, Kim-Kwang Raymond Choo
, Joel J. P. C. Rodrigues
:
Discovering communities from disjoint complex networks using Multi-Layer Ant Colony Optimization. 659-670
- Jian Liu, Yuanmin Duan, Yuedong Wu, Rui Chen, Liang Chen, Geng Chen:
Information flow perception modeling and optimization of Internet of Things for cloud services. 671-679
- Shaker H. Ali El-Sappagh
, Hager Saleh
, Radhya Sahal, Tamer AbuHmed
, S. M. Riazul Islam
, Farman Ali
, Eslam Amer
:
Alzheimer's disease progression detection model based on an early fusion of cost-effective multimodal data. 680-699
- Mostafa Mehrabi, Nasser Giacaman, Oliver Sinnen
:
Unified programming concepts for unobtrusive integration of cloud-based and local parallel computing. 700-719 - Maroua Masmoudi, Sana Ben Abdallah Ben Lamine
, Hajer Baazaoui Zghal
, Bernard Archimède, Mohamed-Hedi Karray:
Knowledge hypergraph-based approach for data integration and querying: Application to Earth Observation. 720-740
- Santiago Felici-Castell
, Miguel García-Pineda
, Jaume Segura-Garcia, Rafael Fayos-Jordan
, Jesús López Ballester:
Adaptive live video streaming on low-cost wireless multihop networks for road traffic surveillance in smart cities. 741-755
- P. Mohamed Shakeel, S. Baskar, Hassan Fouad
, Gunasekaran Manogaran, Vijayalakshmi Saravanan, Carlos Enrique Montenegro-Marín
:
Internet of things forensic data analysis using machine learning to identify roots of data scavenging. 756-768
- Mohamad Arafeh, Paolo Ceravolo, Azzam Mourad
, Ernesto Damiani, Emanuele Bellini:
Ontology based recommender system using social network data. 769-779 - Ritu Singhal
, Archana Singhal
:
A feedback-based combinatorial fair economical double auction resource allocation model for cloud computing. 780-797 - Ali Daud, Faizan Abbas, Tehmina Amjad
, Abdulrahman A. Alshdadi
, Jalal S. Alowibdi:
Finding rising stars through hot topics detection. 798-813 - Iván García-Cobo
, Héctor D. Menéndez:
Designing large quantum key distribution networks via medoid-based algorithms. 814-824
- Bin Pu, Ningbo Zhu, Kenli Li, Shengli Li
:
Fetal cardiac cycle detection in multi-resource echocardiograms using hybrid classification framework. 825-836
- Kun Zhan, Chaoxi Niu:
Mutual teaching for graph convolutional networks. 837-843
- Syed Ibrahim Imtiaz, Saif ur Rehman, Abdul Rehman Javed
, Zunera Jalil
, Xuan Liu
, Waleed S. Alnumay
:
DeepAMD: Detection and identification of Android malware using high-efficient Deep Artificial Neural Network. 844-856
- Christopher Bayliss
, Javier Panadero
, Laura Calvet, Joan Manuel Marquès:
Reliability in volunteer computing micro-blogging services. 857-871
- Dehua Zhang
, Sha Lou:
The application research of neural network and BP algorithm in stock price pattern classification and prediction. 872-879
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
![](https://fanyv88.com/img/new-feature-top-right.156x64.png)