Future Generation Computer Systems
IF
6.13
Papers
6,512
Papers 6,445
1 page of 645 pages (6,445 results)
Newest
#1Jianhui Mou (Yantai University)
#2Duan Peiyong (Yantai University)
Last. Junqing Li (SDNU: Shandong Normal University)H-Index: 34
view all 5 authors...
Abstract null null Distributed scheduling problem, a novel model of intelligent manufacturing, urgently needs new scheduling methods to meet the dynamic market demand. The inverse scheduling in a distributed shop greatly impacts both its energy consumption and productivity. This paper proposes the energy-efficient distributed permutation flow-shop inverse scheduling problem to minimize adjustment and energy consumption simultaneously. This model contains some realistic constraints, controllable ...
Source
Source
#1Xiaoming Li (SZU: Shenzhen University)H-Index: 132
#2Hao Liu (SZU: Shenzhen University)
Last. Zhihan Lv (Uppsala University)H-Index: 59
view all 6 authors...
Abstract null null The study aims to conduct big data analysis (BDA) on the massive data generated in the smart city Internet of things (IoT), make the smart city change to the direction of fine governance and efficient and safe data processing. Aiming at the multi-source data collected in the smart city, the study introduces the deep learning (DL) algorithm while using BDA, and puts forward the distributed parallelism strategy of convolutional neural network (CNN). Meantime, the digital twins (...
Source
#1Fuhong Song (Southwest Jiaotong University)H-Index: 3
#2Huanlai Xing (Southwest Jiaotong University)H-Index: 15
Last. Ke Li (Southwest Jiaotong University)H-Index: 69
view all 6 authors...
Abstract null null This paper studies the problem of offloading an application consisting of dependent tasks in multi-access edge computing (MEC). This problem is challenging because multiple conflicting objectives exist, e.g., the completion time, energy consumption, and computation overhead should be optimized simultaneously. Recently, some reinforcement learning (RL) based methods have been proposed to address the problem. However, these methods, called single-objective RLs (SORLs), define th...
Source
#1Shiwei Xu (HAU: Huazhong Agricultural University)
#2Xiaowen Cai (HAU: Huazhong Agricultural University)H-Index: 1
Last. Jianying Zhou (SUTD: Singapore University of Technology and Design)H-Index: 53
view all 7 authors...
Abstract null null Consortium blockchain has been widely used in different scenarios, where blockchain members demand that their uploaded data could be audited based on data range under their identities without exposing the data themselves. However, so far, current solutions only support simple (e.g., standard-range) privacy-preserving data auditing, and can not be used in multi-party scenarios. To address the problem, we propose zkrpChain, which focuses on protection of the integrity and privac...
Source
#1Sergio Gonzalo (Open University of Catalonia)
#2Joan Manuel Marquès (Open University of Catalonia)H-Index: 13
Last. Laura Calvet (Open University of Catalonia)H-Index: 9
view all 5 authors...
Abstract null null Volunteer Computing is a type of large-scale distributed system formed aggregating computers voluntarily donated by volunteers. These computers are usually off-the-self heterogeneous resources belonging to different administrative authorities (users) that have an uncertain behavior regarding connectivity and failure. Thus, the resource allocation methods in such systems are highly dependent on the availability of resources. On one hand, resources tend to be scarce, but on the ...
Source
#1Gustavo André Setti Cassel (Universidade do Vale do Rio dos Sinos)
#2Vinicius Facco Rodrigues (Universidade do Vale do Rio dos Sinos)H-Index: 7
Last. Cristiano André da Costa (Universidade do Vale do Rio dos Sinos)H-Index: 19
view all 6 authors...
Abstract null null Serverless computing, or Function as a Service (FaaS), represents a research trend where applications are built and deployed as a group of stateless functions. Although initially proposed for the cloud, serverless computing has also found its place on Internet of Things (IoT) while bringing functions closer to the devices, in order to reduce latency and avoid unnecessary energy and resource consumption. It is interesting that solutions can work in an integrated manner on edge,...
Source
#1Lin Liu (Beihang University)
#2Wei-Tek Tsai (Beihang University)H-Index: 58
view all 5 authors...
Abstract null null Anomaly detection for smart contracts can effectively prevent hidden security risks such as financial fraud, illegal financing, and money laundering. Ethereum is currently the largest platform for smart contracts, and anomaly detection is imminent. However, the data related to smart contracts is huge and contains complex objects and relationships. It is impossible to extract high-order attributes and low efficiency using traditional methods. The key to reduce fraud is extracti...
Source
#1Steffen Wendzel (Rolf C. Hagen Group)H-Index: 1
#2Wojciech Mazurczyk (Warsaw University of Technology)H-Index: 29
Last. Amir Houmansadr (UMass: University of Massachusetts Amherst)H-Index: 28
view all 4 authors...
Abstract null null This special issue was desired to foster the progress in research on the development of novel defense methods in information security, especially for sophisticated and networked/hyper-connected systems, including those within IoT and CPS scenarios.
Source
#1Hu Sheng (Dalian Jiaotong University)
#2Xiaodong Qi (Dalian Jiaotong University)
Abstract null null The traditional digital signal processing technology in electronic information engineering has many issues, such as redundant data, low data utilization and so on. To end these issues, this paper proposed a new digital signal processing technology based on distributed cloud computing in electronic information engineering. From the data collection, data analysis, data classification, data mining, effective information storage and other aspects of conventional digital signal, th...
Source
12345678910
Top fields of study
This website uses cookies.
We use cookies to improve your online experience. By continuing to use our website we assume you agree to the placement of these cookies.
To learn more, you can find in our Privacy Policy.