nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A foggy research future: Advances and future opportunities in fog computing research
|
Choo, Kim-Kwang Raymond |
|
2018 |
|
P2 |
p. 677-679 |
artikel |
2 |
A framework for simulating large scale cloud infrastructures
|
Filelis-Papadopoulos, Christos K. |
|
|
|
P2 |
p. 703-714 |
artikel |
3 |
An efficient access control scheme with outsourcing capability and attribute update for fog computing
|
Zhang, Peng |
|
2018 |
|
P2 |
p. 753-762 |
artikel |
4 |
An empirical study for evaluating the performance of multi-cloud APIs
|
Ré, Reginaldo |
|
|
|
P2 |
p. 726-738 |
artikel |
5 |
An integrated information lifecycle management framework for exploiting social network data to identify dynamic large crowd concentration events in smart cities applications
|
Kousiouris, George |
|
2018 |
|
P2 |
p. 516-530 |
artikel |
6 |
Anonymous and secure aggregation scheme in fog-based public cloud computing
|
Wang, Huaqun |
|
2018 |
|
P2 |
p. 712-719 |
artikel |
7 |
An SVM-based collaborative filtering approach for Top-N web services recommendation
|
Ren, Lifang |
|
2018 |
|
P2 |
p. 531-543 |
artikel |
8 |
A reliable IoT system for Personal Healthcare Devices
|
Woo, Min Woo |
|
2018 |
|
P2 |
p. 626-640 |
artikel |
9 |
Attribute-based cloud storage with secure provenance over encrypted data
|
Cui, Hui |
|
|
|
P2 |
p. 461-472 |
artikel |
10 |
Automatically deriving cost models for structured parallel processes using hylomorphisms
|
Castro, David |
|
|
|
P2 |
p. 653-668 |
artikel |
11 |
A variant of password authenticated key exchange protocol
|
Zhang, Yuexin |
|
2018 |
|
P2 |
p. 699-711 |
artikel |
12 |
Bitcoin-based fair payments for outsourcing computations of fog devices
|
Huang, Hui |
|
2018 |
|
P2 |
p. 850-858 |
artikel |
13 |
CCA-secure ABE with outsourced decryption for fog computing
|
Zuo, Cong |
|
2018 |
|
P2 |
p. 730-738 |
artikel |
14 |
Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing
|
Jiang, Yinhao |
|
2018 |
|
P2 |
p. 720-729 |
artikel |
15 |
Context-Aware Multifaceted Trust Framework For Evaluating Trustworthiness of Cloud Providers
|
Alhanahnah, Mohannad |
|
|
|
P2 |
p. 488-499 |
artikel |
16 |
Controlling and filtering users data in Intelligent Transportation System
|
Gosman, Catalin |
|
2018 |
|
P2 |
p. 807-816 |
artikel |
17 |
CUIDATS: An RFID–WSN hybrid monitoring system for smart health care environments
|
Adame, Toni |
|
2018 |
|
P2 |
p. 602-615 |
artikel |
18 |
Data service generation framework from heterogeneous printed forms using semantic link discovery
|
Yu, Han |
|
|
|
P2 |
p. 514-527 |
artikel |
19 |
Dendron : Genetic trees driven rule induction for network intrusion detection systems
|
Papamartzivanos, Dimitrios |
|
|
|
P2 |
p. 558-574 |
artikel |
20 |
Digital forensic intelligence: Data subsets and Open Source Intelligence (DFINT + OSINT): A timely and cohesive mix
|
Quick, Darren |
|
2018 |
|
P2 |
p. 558-567 |
artikel |
21 |
Editorial Board
|
|
|
2018 |
|
P2 |
p. IFC |
artikel |
22 |
Editorial Board
|
|
|
|
|
P2 |
p. IFC |
artikel |
23 |
Energy modeling in cloud simulation frameworks
|
Makaratzis, Antonios T. |
|
|
|
P2 |
p. 715-725 |
artikel |
24 |
Erlang-based desynchronized urban traffic simulation for high-performance computing systems
|
Turek, Wojciech |
|
|
|
P2 |
p. 645-652 |
artikel |
25 |
Exploiting smart e-Health gateways at the edge of healthcare Internet-of-Things: A fog computing approach
|
Rahmani, Amir M. |
|
2018 |
|
P2 |
p. 641-658 |
artikel |
26 |
Exploring the relationship between architectures and management policies in the design of NUCA-based chip multicore systems
|
Bartolini, Sandro |
|
2018 |
|
P2 |
p. 481-501 |
artikel |
27 |
Finding parallel functional pearls: Automatic parallel recursion scheme detection in Haskell functions via anti-unification
|
Barwell, Adam D. |
|
|
|
P2 |
p. 669-686 |
artikel |
28 |
Free the Conqueror! Refactoring divide-and-conquer functions
|
Kozsik, Tamás |
|
|
|
P2 |
p. 687-699 |
artikel |
29 |
Hybrid privacy-preserving clinical decision support system in fog–cloud computing
|
Liu, Ximeng |
|
2018 |
|
P2 |
p. 825-837 |
artikel |
30 |
Hybrid scheduling algorithm in early warning systems
|
Visheratin, Alexander A. |
|
|
|
P2 |
p. 630-642 |
artikel |
31 |
Internet-of-Things and big data for smarter healthcare: From device to architecture, applications and analytics
|
Firouzi, Farshad |
|
2018 |
|
P2 |
p. 583-586 |
artikel |
32 |
Internet of Things security and forensics: Challenges and opportunities
|
Conti, Mauro |
|
2018 |
|
P2 |
p. 544-546 |
artikel |
33 |
Leveraging content similarity among VMI files to allocate virtual machines in cloud
|
Li, Huixi |
|
|
|
P2 |
p. 528-542 |
artikel |
34 |
Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges
|
Roman, Rodrigo |
|
2018 |
|
P2 |
p. 680-698 |
artikel |
35 |
Parallel ant colony optimization on multi-core SIMD CPUs
|
Zhou, Yi |
|
|
|
P2 |
p. 473-487 |
artikel |
36 |
Performance study and enhancement of multichannel access methods in the future generation VHT WLAN
|
Mammeri, Souhila |
|
|
|
P2 |
p. 543-557 |
artikel |
37 |
Position based cryptography with location privacy: A step for Fog Computing
|
Yang, Rupeng |
|
2018 |
|
P2 |
p. 799-806 |
artikel |
38 |
Power transmission and workload balancing policies in eHealth mobile cloud computing scenarios
|
Pagán, Josué |
|
2018 |
|
P2 |
p. 587-601 |
artikel |
39 |
Privacy-preserved big data analysis based on asymmetric imputation kernels and multiside similarities
|
Chen, Bo-Wei |
|
2018 |
|
P2 |
p. 859-866 |
artikel |
40 |
Privacy preserving cloud data auditing with efficient key update
|
Li, Yannan |
|
2018 |
|
P2 |
p. 789-798 |
artikel |
41 |
Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing
|
Koo, Dongyoung |
|
2018 |
|
P2 |
p. 739-752 |
artikel |
42 |
Privacy-preserving protocols for secure and reliable data aggregation in IoT-enabled Smart Metering systems
|
Tonyali, Samet |
|
2018 |
|
P2 |
p. 547-557 |
artikel |
43 |
Proactive defense mechanisms for the software-defined Internet of Things with non-patchable vulnerabilities
|
Ge, Mengmeng |
|
2018 |
|
P2 |
p. 568-582 |
artikel |
44 |
Resource provisioning for data-intensive applications with deadline constraints on hybrid clouds using Aneka
|
Nadjaran Toosi, Adel |
|
|
|
P2 |
p. 765-775 |
artikel |
45 |
Reward-based Markov chain analysis adaptive global resource management for inter-cloud computing
|
Chang, Ben-Jye |
|
|
|
P2 |
p. 588-603 |
artikel |
46 |
Scalable parallel simulation of dynamical processes on large stochastic Kronecker graphs
|
Bochenina, Klavdiya |
|
2018 |
|
P2 |
p. 502-515 |
artikel |
47 |
Scheduling dynamic workloads in multi-tenant scientific workflow as a service platforms
|
Rodriguez, Maria A. |
|
|
|
P2 |
p. 739-750 |
artikel |
48 |
Secure intelligent traffic light control using fog computing
|
Liu, Jian |
|
2018 |
|
P2 |
p. 817-824 |
artikel |
49 |
Software defined neighborhood area network for smart grid applications
|
Nafi, Nazmus S. |
|
|
|
P2 |
p. 500-513 |
artikel |
50 |
Special Issue: Recent trends in cloud computing
|
Gravvanis, George A. |
|
|
|
P2 |
p. 700-702 |
artikel |
51 |
Special section on functional paradigm for high performance computing
|
Byrski, Aleksander |
|
|
|
P2 |
p. 643-644 |
artikel |
52 |
Storage tier-aware replicative data reorganization with prioritization for efficient workload processing
|
Spivak, Anton |
|
|
|
P2 |
p. 618-629 |
artikel |
53 |
Towards a scenario-based solution for extreme metocean event simulation applying urgent computing
|
Kalyuzhnaya, Anna V. |
|
|
|
P2 |
p. 604-617 |
artikel |
54 |
Towards a service-oriented cyber–physical systems of systems for smart city mobility applications
|
Elshenawy, Mohamed |
|
|
|
P2 |
p. 575-587 |
artikel |
55 |
Towards fog-driven IoT eHealth: Promises and challenges of IoT in medicine and healthcare
|
Farahani, Bahar |
|
2018 |
|
P2 |
p. 659-676 |
artikel |
56 |
Towards leakage-resilient fine-grained access control in fog computing
|
Yu, Zuoxia |
|
2018 |
|
P2 |
p. 763-777 |
artikel |
57 |
Universal and secure object ownership transfer protocol for the Internet of Things
|
Ray, Biplob R. |
|
2018 |
|
P2 |
p. 838-849 |
artikel |
58 |
Unobtrusive detection of body movements during sleep using Wi-Fi received signal strength with model adaptation technique
|
Ammae, Osamu |
|
2018 |
|
P2 |
p. 616-625 |
artikel |
59 |
Verifiable searchable encryption with aggregate keys for data sharing system
|
Liu, Zheli |
|
2018 |
|
P2 |
p. 778-788 |
artikel |
60 |
VM reassignment in hybrid clouds for large decentralised companies: A multi-objective challenge
|
Saber, Takfarinas |
|
|
|
P2 |
p. 751-764 |
artikel |