


default search action
Future Generation Computer Systems, Volume 159
Volume 159, 2024
- Yuanlong Liu, Hua Dai

, Qian Zhou, Pengyue Li, Xun Yi
, Geng Yang:
EPSMR: An efficient privacy-preserving semantic-aware multi-keyword ranked search scheme in cloud. 1-14 - Xinyuan Wang

, Yun Peng
, Hejiao Huang
, Xingchen Li:
Dodo: A scalable optimistic deterministic concurrency control protocol. 15-26 - Jose Rocher-Gonzalez

, Jesús Escudero-Sahuquillo
, Pedro Javier García
, Francisco J. Quiles, José Duato
:
A smart and novel approach for managing incast and in-network congestion through adaptive routing. 27-38 - Shuang Wang

, Jiawen Wu, Zian Yuan
, An Gao, Weitong Tony Chen:
Makespan minimization for workflows with multiple privacy levels. 39-50 - Zhuo Chen, Zhe Liu, Yang Zhou

:
Analyzing the blockchain mining strategy in Industrial Internet of Things: A game theoretical approach. 51-63 - Adla Padma

, Mangayarkarasi Ramaiah
:
GLSBIoT: GWO-based enhancement for lightweight scalable blockchain for IoT with trust based consensus. 64-76 - Junfeng Hao

, Peng Chen
, Juan Chen, Xi Li:
Multi-task federated learning-based system anomaly detection and multi-classification for microservices architecture. 77-90 - Asma AlKhalaf

, Farookh Khadeer Hussain:
EleVMate - A data-driven approach for 'on-the-fly' horizontal small datacentre scalability and VM starvation. 91-101 - Long Cheng, Xiaomin Chen, Zhiming Zhao:

Preface of special issue on Artificial Intelligence for time-critical computing systems. 102-104 - Lorenzo Rocutto

, Marco Maronese
, Daniele Dragoni
, Andrea Cavalli
, Carlo Cavazzoni
:
Comparing Adiabatic Quantum Computers for satellite images feature extraction. 105-113 - Shanika Iroshi Nanayakkara

, Shiva Raj Pokhrel
, Gang Li:
Understanding global aggregation and optimization of federated learning. 114-133 - Edgar Huaranga-Junco

, Salvador González-Gerpe
, Manuel Castillo-Cara
, Andrea Cimmino, Raúl García-Castro
:
From cloud and fog computing to federated-fog computing: A comparative analysis of computational resources in real-time IoT applications based on semantic interoperability. 134-150 - Congqin Yi, Xiaoyu Zhao

, Qinqin Sun, Zhenhua Wang:
Assessing the accuracy of remote sensing data products: A multi-granular spatial sampling method. 151-160 - Berkan Oztas

, Deniz Cetinkaya, Festus Adedoyin, Marcin Budka, Gökhan Aksu, Huseyin Dogan:
Transaction monitoring in anti-money laundering: A qualitative analysis and points of view from industry. 161-171 - Mahawish Fatima

, Osama M. Hussain Rehman, Saqib Ali, Moazzam Fareed Niazi
:
ELIDS: Ensemble Feature Selection for Lightweight IDS against DDoS Attacks in Resource-Constrained IoT Environment. 172-187 - François Tessier

, Venkatram Vishwanath
, Emmanuel Jeannot:
Adding topology and memory awareness in data aggregation algorithms. 188-203 - Lin Yuan

, Shengguo Sun, Qinhu Zhang, Hai-Tao Li, Zhen Shen, Chunyu Hu
, Xiaogang Zhao, Lan Ye, Chun-Hou Zheng, De-Shuang Huang:
Identification of ferroptosis-related lncRNAs for predicting prognosis and immunotherapy response in non-small cell lung cancer. 204-220 - Efstratios Koukoutsis

, Kyriakos Hizanidis, Abhay Ram, George Vahala
:
Quantum simulation of dissipation for Maxwell equations in dispersive media. 221-229 - Sudip Vhaduri

, Sayanton V. Dibbo
, Alexa Muratyan
, William Cheung:
mWIoTAuth: Multi-wearable data-driven implicit IoT authentication. 230-242 - Aito Higashida, Kazuto Ando

, Mario Rüttgers, Andreas Lintermann, Makoto Tsubokura
:
Robustness evaluation of large-scale machine learning-based reduced order models for reproducing flow fields. 243-254 - Abdenacer Naouri, Huansheng Ning

, Nabil Abdelkader Nouri
, Amar Khelloufi
, Abdelkarim Ben Sada
, Salim Naouri, Attia Qammar, Sahraoui Dhelim
:
Maximizing UAV fog deployment efficiency for critical rescue operations: A multi-objective optimization approach. 255-271 - Shihai Zhao

, Juncheng Pu
, Xiaodong Fu
, Li Liu
, Fei Dai:
Byzantine-robust federated learning with ensemble incentive mechanism. 272-283 - Iftekhar Ahmed, Marshall Scott Poole, Emily Norman, Elizabeth Simpson:

An analysis of scientific group collaboration at JLESC. 284-289 - Jannatun Noor

, Rizwanul Hoque Ratul
, Md. Samiul Basher, Jarif Ahmed Soumik, Sakib Sadman
, Niloy Julious Rozario, Rezwana Reaz
, Sriram Chellappan, A. B. M. Alim Al Islam
:
Secure Processing-aware Media Storage and Archival (SPMSA). 290-306 - Ranran Chen

, Feng Li
, Daniel Luna, Isuru Ranawaka, Fengguang Song
, Sudhakar Pamidighantam
, Xu Liang
, Yao Liang
:
Asynchronous modeling workflows in CyberWater with on-demand HPC/Cloud access. 307-322 - Loris Belcastro, Jesús Carretero, Domenico Talia:

Edge-Cloud Solutions for Big Data Analysis and Distributed Machine Learning - 1. 323-326 - Abhishek Verma

, Sachin Kumar Verma, Avinash Chandra Pandey
, Jyoti Grover
, Girish Sharma
:
Li-MSD: A lightweight mitigation solution for DAO insider attack in RPL-based IoT. 327-339 - Hualong Huang

, Zhekai Duan
, Wenhan Zhan
, Geyong Min
, Kai Peng
:
Optimal service caching, pricing and task partitioning in mobile edge computing federation. 340-352 - Diana Carrizales-Espinoza

, Dante D. Sánchez-Gallegos
, José Luis González Compeán
, Jesús Carretero:
StructMesh: A storage framework for serverless computing continuum. 353-369 - Ling Sun

, Kaiyuan Li, Ming Yin, Rui Li
, Mengli Xiao, Xiaoliang Fang:
Identifying a selection mechanism of distribution channel for the supply chain: The barriers to the application of web 3.0. 370-378 - Binglei Guo

, Junqi Wu, Yonglin Pu, Jun Zhang, Jiong Yu:
Energy consumption estimation and profiling for queries in distributed database systems based on a bottom-up comprehensive energy model. 379-394 - Xingxing Li, Guangqin Hu, Weidong Li

, Xuejie Zhang
:
Fair multiresource allocation with access constraint in cloud-edge systems. 395-410 - Tullio Basaglia, Zane W. Bell, Daniele D'Agostino

, Paul V. Dressendorfer, Simone Giani, Maria Grazia Pia, Paolo Saracco:
Geant4: A game changer in high energy physics and related applicative fields. 411-422 - Moreno Marzolla

, Giovanni Birolo
, Gabriele D'Angelo
, Piero Fariselli
:
Parallel intersection counting on shared-memory multiprocessors and GPUs. 423-431 - Tokito Murata, Kenichi Kourai

:
Parallel and consistent live checkpointing and restoration of split-memory VMs. 432-443 - Poornima Nookala

, Kyle Chard
, Ioan Raicu:
X-OpenMP - eXtreme fine-grained tasking using lock-less work stealing. 444-458 - Mohammad Daryaie Zanjani

, Mehdi Hosseinzadeh Aghdam
:
The explainable structure of deep neural network for recommendation systems. 459-473 - Xin Liu

, Mario Rüttgers
, Alessio Quercia, Romain Egele, Elisabeth Pfaehler, Rushikesh Shende
, Marcel Aach
, Wolfgang Schröder, Prasanna Balaprakash, Andreas Lintermann:
Refining computer tomography data with super-resolution networks to increase the accuracy of respiratory flow simulations. 474-488 - Floris-Jan Willemsen

, Richard Schoonhoven
, Jiri Filipovic, Jacob O. Tørring
, Rob van Nieuwpoort
, Ben van Werkhoven
:
A methodology for comparing optimization algorithms for auto-tuning. 489-504 - Patrick Langer, Stephan Altmüller, Elgar Fleisch, Filipe Barata

:
CLAID: Closing the Loop on AI & Data Collection - A cross-platform transparent computing middleware framework for smart edge-cloud and digital biomarker applications. 505-521 - Hongxia Zhang, Luyao Cao, Neeraj Kumar, Jianyong Zhang

, Peiying Zhang
, Jian Wang
:
An improved DDPG-based privacy sensitive level protection computation offloading method in mobile edge computing. 522-532 - Hongyun Cai, Lijing Gao, Jiahao Wang, Fengyu Li:

Reliable incentive mechanism in hierarchical federated learning based on two-way reputation and contract theory. 533-544 - Soohyun Park, Hankyul Baek, Jung Won Yoon

, Youn Kyu Lee, Joongheon Kim
:
AQUA: Analytics-driven quantum neural network (QNN) user assistance for software validation. 545-556 - Wen-Yu Xi

, Ruheng Wang, Li Wang, Xiucai Ye
, Mingyang Liu, Tetsuya Sakurai:
An interpretable deep learning model predicts RNA-small molecule binding sites. 557-566 - Ruihua Liu, Wufei Wu

, Xiaochuan Guo
, Gang Zeng
, Keqin Li
:
Replica fault-tolerant scheduling with time guarantee under energy constraint in fog computing. 567-579

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














