Match!
Future Generation Computer Systems
IF
5.77
Papers
5562
Papers 6302
1 page of 631 pages (6,302 results)
Newest
#1Wei Xuan (JLU: Jilin University)
#2Guangqiang You (JLU: Jilin University)
Abstract Pancreatic cancer is one of the deadliest types of cancer and its prognosis is extremely poor in the present scenario. Automatic pancreatic tumor image segmentation is often provided by computer-aided screening (CAD), diagnosis and quantitative evaluations in radiology images such as CT and MRI. Tumor classification through these methods can also help to track, predict and endorse customized therapy as a part of effective treatment, without invasions of cancer. Nowadays, neural networks...
Source
#1Jens Saenger (Rolf C. Hagen Group)
#2Wojciech Mazurczyk (Warsaw University of Technology)H-Index: 22
Last. Luca CaviglioneH-Index: 15
view all 4 authors...
Abstract Information hiding is increasingly used to implement covert channels, to exfiltrate data or to perform attacks in a stealthy manner. Another important usage deals with privacy, for instance, to bypass limitations imposed by a regime, to prevent censorship or to share information in sensitive scenarios such as those dealing with cyber defense. In this perspective, the paper investigates how VoIP communications can be used as a methodology to enhance privacy. Specifically, we propose to h...
Source
#1Shimin Li (Wenzhou University)H-Index: 2
#2Kun-Huang Chen (Wenzhou University)H-Index: 25
Last. Seyedali Mirjalili (Griffith University)H-Index: 35
view all 5 authors...
Abstract In this paper, a new stochastic optimizer, which is called slime mould algorithm (SMA), is proposed based upon the oscillation mode of slime mould in nature. The proposed SMA has several new features with a unique mathematical model that uses adaptive weights to simulate the process of producing positive and negative feedback of the propagation wave of slime mould based on bio-oscillator to form the optimal path for connecting food with excellent exploratory ability and exploitation pro...
6 CitationsSource
#2Stefano Iannucci (MSU: Mississippi State University)H-Index: 6
Last. Ioana Banicescu (MSU: Mississippi State University)H-Index: 12
view all 3 authors...
Abstract This paper introduces an autonomic method to optimize Feature Selection (FS) in autonomic systems while also presenting a taxonomy of FS techniques. Feature selection is a dimension reduction technique that has been proven to lead to improved performance by avoiding overfitting and to address complexity, thus providing faster and cost-effective algorithms. To be successful, the current FS methods are heavily reliant on two key elements: (1) a well defined and static learning objective, ...
Source
#1Jongseong Kim (Sejong University)H-Index: 1
#2Unil Yun (Sejong University)H-Index: 25
Last. Philippe Fournier-Viger (HIT: Harbin Institute of Technology)H-Index: 15
view all 5 authors...
Abstract High average utility pattern mining has been proposed to overcome the demerits of high utility pattern mining. Since high average utility pattern mining can extract more valuable patterns than high utility pattern mining, many related researches are being actively conducted. However, most studies in high average utility pattern mining have only focused on mining in static databases not dynamic databases. In addition, the methods of previous studies with dynamic databases consume a huge ...
Source
#1Naram Mhaisen (Qatar University)
#2Noora Fetais (Qatar University)H-Index: 2
Last. Mohsen Guizani (Qatar University)H-Index: 48
view all 5 authors...
Abstract Traceability and autonomous business logic execution are highly desirable features in IoT monitoring applications. Traceability enables verifying signals’ history for security or analytical purposes. On the other hand, the autonomous execution of pre-defined rules establishes trust between parties involved in such applications and improves the efficiency of their workflow. Smart Contracts (SCs) firmly guarantee these two requirements due to the blockchain’s immutable distributed ledger ...
Source
#1Jixian Zhang (Yunnan University)H-Index: 2
#2Xutao Yang (Yunnan University)
Last. Weidong Li (Yunnan University)H-Index: 6
view all 6 authors...
Abstract Multidimensional resource allocation is a hot topic in cloud computing, but current cloud platforms support only fixed resource allocation, that is, the user resource requirements are consistent throughout the usage period, which may cause a waste of resources and reduce the revenue of resource providers. Therefore, time-varying multidimensional resource allocation and the corresponding pricing mechanism represent a new challenge in cloud computing. We address the problem of online time...
Source
Abstract The rapid growth in computation and processing power of end-user devices has transitioned network functionalities from the core network to the Fog, thus, reducing response times and ultimately improving user experience. The Information-Centric Networking paradigm aims to transform conventional content caching and delivery approaches by enabling Fog nodes to participate in both forwarding and caching. In this work, a Fog caching design scheme is presented for applications such as Interne...
Source
Abstract The pairing of traditional multicore processors with accelerators of various forms (e.g., graphics engines, reconfigurable logic) can be referred to generally as architecturally diverse systems. Our interest in this work is truly diverse systems, in which more than one accelerator is used in the execution of an application. These systems have the potential for substantial performance gains relative to multicores alone; however, they pose significant difficulties when it comes to applica...
Source
Abstract Cloud computing environment support resource sharing as cloud service over the internet. It enables the users to outsource data into the cloud server that can be accessed remotely from various devices distributed geographically. Accessing resources from the cloud causes various security issues as the attackers try to illegally access the data. The distributed denial of service (DDoS) attack is one of the security concern in the cloud server. DDoS is a kind of cyber attack which disrupt ...
Source
12345678910
Top fields of study
Distributed computing
Architecture
Grid
Computer science
Scalability
Real-time computing
Cloud computing