default search action
Future Generation Computer Systems, Volume 159
Volume 159, 2024
- Yuanlong Liu, Hua Dai, Qian Zhou, Pengyue Li, Xun Yi, Geng Yang:
EPSMR: An efficient privacy-preserving semantic-aware multi-keyword ranked search scheme in cloud. 1-14 - Xinyuan Wang, Yun Peng, Hejiao Huang, Xingchen Li:
Dodo: A scalable optimistic deterministic concurrency control protocol. 15-26 - Jose Rocher-Gonzalez, Jesús Escudero-Sahuquillo, Pedro Javier García, Francisco J. Quiles, José Duato:
A smart and novel approach for managing incast and in-network congestion through adaptive routing. 27-38 - Shuang Wang, Jiawen Wu, Zian Yuan, An Gao, Weitong Tony Chen:
Makespan minimization for workflows with multiple privacy levels. 39-50 - Zhuo Chen, Zhe Liu, Yang Zhou:
Analyzing the blockchain mining strategy in Industrial Internet of Things: A game theoretical approach. 51-63 - Adla Padma, Mangayarkarasi Ramaiah:
GLSBIoT: GWO-based enhancement for lightweight scalable blockchain for IoT with trust based consensus. 64-76 - Junfeng Hao, Peng Chen, Juan Chen, Xi Li:
Multi-task federated learning-based system anomaly detection and multi-classification for microservices architecture. 77-90 - Asma AlKhalaf, Farookh Khadeer Hussain:
EleVMate - A data-driven approach for 'on-the-fly' horizontal small datacentre scalability and VM starvation. 91-101 - Long Cheng, Xiaomin Chen, Zhiming Zhao:
Preface of special issue on Artificial Intelligence for time-critical computing systems. 102-104 - Lorenzo Rocutto, Marco Maronese, Daniele Dragoni, Andrea Cavalli, Carlo Cavazzoni:
Comparing Adiabatic Quantum Computers for satellite images feature extraction. 105-113 - Shanika I Nanayakkara, Shiva Raj Pokhrel, Gang Li:
Understanding global aggregation and optimization of federated learning. 114-133 - Edgar Huaranga-Junco, Salvador González-Gerpe, Manuel Castillo-Cara, Andrea Cimmino, Raúl García-Castro:
From cloud and fog computing to federated-fog computing: A comparative analysis of computational resources in real-time IoT applications based on semantic interoperability. 134-150 - Congqin Yi, Xiaoyu Zhao, Qinqin Sun, Zhenhua Wang:
Assessing the accuracy of remote sensing data products: A multi-granular spatial sampling method. 151-160 - Berkan Oztas, Deniz Cetinkaya, Festus Adedoyin, Marcin Budka, Gökhan Aksu, Huseyin Dogan:
Transaction monitoring in anti-money laundering: A qualitative analysis and points of view from industry. 161-171 - Mahawish Fatima, Osama M. Hussain Rehman, Saqib Ali, Moazzam Fareed Niazi:
ELIDS: Ensemble Feature Selection for Lightweight IDS against DDoS Attacks in Resource-Constrained IoT Environment. 172-187 - François Tessier, Venkatram Vishwanath, Emmanuel Jeannot:
Adding topology and memory awareness in data aggregation algorithms. 188-203 - Lin Yuan, Shengguo Sun, Qinhu Zhang, Hai-Tao Li, Zhen Shen, Chunyu Hu, Xiaogang Zhao, Lan Ye, Chun-Hou Zheng, De-Shuang Huang:
Identification of ferroptosis-related lncRNAs for predicting prognosis and immunotherapy response in non-small cell lung cancer. 204-220 - Efstratios Koukoutsis, Kyriakos Hizanidis, Abhay Ram, George Vahala:
Quantum simulation of dissipation for Maxwell equations in dispersive media. 221-229 - Sudip Vhaduri, Sayanton V. Dibbo, Alexa Muratyan, William Cheung:
mWIoTAuth: Multi-wearable data-driven implicit IoT authentication. 230-242 - Aito Higashida, Kazuto Ando, Mario Rüttgers, Andreas Lintermann, Makoto Tsubokura:
Robustness evaluation of large-scale machine learning-based reduced order models for reproducing flow fields. 243-254 - Abdenacer Naouri, Huansheng Ning, Nabil Abdelkader Nouri, Amar Khelloufi, Abdelkarim Ben Sada, Salim Naouri, Attia Qammar, Sahraoui Dhelim:
Maximizing UAV fog deployment efficiency for critical rescue operations: A multi-objective optimization approach. 255-271 - Shihai Zhao, Juncheng Pu, Xiaodong Fu, Li Liu, Fei Dai:
Byzantine-robust federated learning with ensemble incentive mechanism. 272-283 - Iftekhar Ahmed, Marshall Scott Poole, Emily Norman, Elizabeth Simpson:
An analysis of scientific group collaboration at JLESC. 284-289 - Jannatun Noor, Rizwanul Hoque Ratul, Md. Samiul Basher, Jarif Ahmed Soumik, Sakib Sadman, Niloy Julious Rozario, Rezwana Reaz, Sriram Chellappan, A. B. M. Alim Al Islam:
Secure Processing-aware Media Storage and Archival (SPMSA). 290-306 - Ranran Chen, Feng Li, Daniel Luna, Isuru Ranawaka, Fengguang Song, Sudhakar Pamidighantam, Xu Liang, Yao Liang:
Asynchronous modeling workflows in CyberWater with on-demand HPC/Cloud access. 307-322 - Loris Belcastro, Jesús Carretero, Domenico Talia:
Edge-Cloud Solutions for Big Data Analysis and Distributed Machine Learning - 1. 323-326 - Abhishek Verma, Sachin Kumar Verma, Avinash Chandra Pandey, Jyoti Grover, Girish Sharma:
Li-MSD: A lightweight mitigation solution for DAO insider attack in RPL-based IoT. 327-339 - Hualong Huang, Zhekai Duan, Wenhan Zhan, Geyong Min, Kai Peng:
Optimal service caching, pricing and task partitioning in mobile edge computing federation. 340-352 - Diana Carrizales-Espinoza, Dante D. Sánchez-Gallegos, José Luis González Compeán, Jesús Carretero:
StructMesh: A storage framework for serverless computing continuum. 353-369 - Ling Sun, Kaiyuan Li, Ming Yin, Rui Li, Mengli Xiao, Xiaoliang Fang:
Identifying a selection mechanism of distribution channel for the supply chain: The barriers to the application of web 3.0. 370-378 - Binglei Guo, Junqi Wu, Yonglin Pu, Jun Zhang, Jiong Yu:
Energy consumption estimation and profiling for queries in distributed database systems based on a bottom-up comprehensive energy model. 379-394 - Xingxing Li, Guangqin Hu, Weidong Li, Xuejie Zhang:
Fair multiresource allocation with access constraint in cloud-edge systems. 395-410 - Tullio Basaglia, Zane W. Bell, Daniele D'Agostino, Paul V. Dressendorfer, Simone Giani, Maria Grazia Pia, Paolo Saracco:
Geant4: A game changer in high energy physics and related applicative fields. 411-422 - Moreno Marzolla, Giovanni Birolo, Gabriele D'Angelo, Piero Fariselli:
Parallel intersection counting on shared-memory multiprocessors and GPUs. 423-431 - Tokito Murata, Kenichi Kourai:
Parallel and consistent live checkpointing and restoration of split-memory VMs. 432-443 - Poornima Nookala, Kyle Chard, Ioan Raicu:
X-OpenMP - eXtreme fine-grained tasking using lock-less work stealing. 444-458 - Mohammad Daryaie Zanjani, Mehdi Hosseinzadeh Aghdam:
The explainable structure of deep neural network for recommendation systems. 459-473 - Xin Liu, Mario Rüttgers, Alessio Quercia, Romain Egele, Elisabeth Pfaehler, Rushikesh Shende, Marcel Aach, Wolfgang Schröder, Prasanna Balaprakash, Andreas Lintermann:
Refining computer tomography data with super-resolution networks to increase the accuracy of respiratory flow simulations. 474-488 - Floris-Jan Willemsen, Richard Schoonhoven, Jiri Filipovic, Jacob O. Tørring, Rob van Nieuwpoort, Ben van Werkhoven:
A methodology for comparing optimization algorithms for auto-tuning. 489-504 - Patrick Langer, Stephan Altmüller, Elgar Fleisch, Filipe Barata:
CLAID: Closing the Loop on AI & Data Collection - A cross-platform transparent computing middleware framework for smart edge-cloud and digital biomarker applications. 505-521 - Hongxia Zhang, Luyao Cao, Neeraj Kumar, Jianyong Zhang, Peiying Zhang, Jian Wang:
An improved DDPG-based privacy sensitive level protection computation offloading method in mobile edge computing. 522-532 - Hongyun Cai, Lijing Gao, Jiahao Wang, Fengyu Li:
Reliable incentive mechanism in hierarchical federated learning based on two-way reputation and contract theory. 533-544 - Soohyun Park, Hankyul Baek, Jung Won Yoon, Youn Kyu Lee, Joongheon Kim:
AQUA: Analytics-driven quantum neural network (QNN) user assistance for software validation. 545-556 - Wen-Yu Xi, Ruheng Wang, Li Wang, Xiucai Ye, Mingyang Liu, Tetsuya Sakurai:
An interpretable deep learning model predicts RNA-small molecule binding sites. 557-566 - Ruihua Liu, Wufei Wu, Xiaochuan Guo, Gang Zeng, Keqin Li:
Replica fault-tolerant scheduling with time guarantee under energy constraint in fog computing. 567-579
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.