default search action
Future Generation Computer Systems, Volume 85
Volume 85, August 2018
- Zi Wang, Zhiwei Zhao, Geyong Min, Xinyuan Huang, Qiang Ni, Rong Wang:
User mobility aware task assignment for Mobile Edge Computing. 1-8 - Yan Wang, Zhensen Wu, Yuanjian Zhu, Pei Zhang:
Research on anomaly detection algorithm based on generalization latency of telecommunication network. 9-18 - Zulfiqar Ali, M. Shamim Hossain, Ghulam Muhammad, Arun Kumar Sangaiah:
An intelligent healthcare system for detection and classification to discriminate vocal fold disorders. 19-28 - Yazeed Alabdulkarim, Sumita Barahmand, Shahram Ghandeharizadeh:
BG: A scalable benchmark for interactive social networking actions. 29-38 - Jiachen Yang, Chang Wang, Qiming Zhao, Bin Jiang, Zhihan Lv, Arun Kumar Sangaiah:
Marine surveying and mapping system based on Cloud Computing and Internet of Things. 39-50 - Yujie Li, Huimin Lu, Yoshiki Nakayama, Hyoungseop Kim, Seiichi Serikawa:
Automatic road detection system for an air-land amphibious car drone. 51-59 - Ciprian-Octavian Truica, Jérôme Darmont, Alexandru Boicea, Florin Radulescu:
Benchmarking top-k keyword and top-k document processing with T2K2 and T2K2D2. 60-75 - Zulfiqar Ali, M. Shamim Hossain, Ghulam Muhammad, Ihsan Ullah, Hamid R. Abachi, Atif Alamri:
Edge-centric multimodal authentication system using encrypted biometric templates. 76-87 - Hamed Haddad Pajouh, Ali Dehghantanha, Raouf Khayami, Kim-Kwang Raymond Choo:
A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting. 88-96 - Abdullah Mohammed Al-Faifi, Biao Song, Mohammad Mehedi Hassan, Atif Alamri, Abdu Gumaei:
Performance prediction model for cloud service selection from smart data. 97-106 - Yongfeng Cui, Yuankun Ma, Zhongyuan Zhao, Ya Li, Wei Liu, Wanneng Shu:
Research on data fusion algorithm and anti-collision algorithm based on internet of things. 107-115 - Gang Sun, Yayu Li, Yao Li, Dan Liao, Victor Chang:
Low-latency orchestration for workflow-oriented service function chain in edge computing. 116-128 - (Withdrawn) A hybrid whale optimization algorithm based on local search strategy for the permutation flow shop scheduling problem. 129-145
- Qian Wang, Wei Xiong, Yin Zhang, Ning Pan, Zhuo Yu, Enmin Song, Chih-Cheng Hung:
Remote analysis of myocardial fiber information in vivo assisted by cloud computing. 146-159 - Venkatesan Rajinikanth, Nilanjan Dey, Suresh Chandra Satapathy, Amira S. Ashour:
An approach to examine Magnetic Resonance Angiography based on Tsallis entropy and deformable snake model. 160-172 - Getzi Jeba Leelipushpam Paulraj, Sharmila Anand John Francis, J. Dinesh Peter, Immanuel John Raja Jebadurai:
Resource-aware virtual machine migration in IoT cloud. 173-183 - U. Raghavendra, N. Shyamasunder Bhat, Anjan Gudigar, U. Rajendra Acharya:
Automated system for the detection of thoracolumbar fractures using a CNN architecture. 184-189 - Keke Gai, Meikang Qiu, Zenggang Xiong, Meiqin Liu:
Privacy-preserving multi-channel communication in Edge-of-Things. 190-200 - Liwen Ma, Jiaji Wu, Chunyuan Li:
Localization of a high-speed train using a speed model based on the gradient descent algorithm. 201-209 - Junnan Li, ZhiHui Lu, Wei Zhang, Jie Wu, Hao Qiang, Bo Li, Patrick C. K. Hung:
SERAC3: Smart and economical resource allocation for big data clusters in community clouds. 210-221 - Dongzhan Zhang, Wenjing Yan, Bugingo Emmanuel, Wei Zheng, Jinjun Chen:
A benchmark approach and its toolkit for online scheduling of multiple deadline-constrained workflows in big-data processing systems. 222-234 - Riccardo Rapuzzi, Matteo Repetto:
Building situational awareness for network threats in fog/edge computing: Emerging paradigms beyond the security perimeter model. 235-249
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.