Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             60 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A foggy research future: Advances and future opportunities in fog computing research Choo, Kim-Kwang Raymond
2018
P2 p. 677-679
artikel
2 A framework for simulating large scale cloud infrastructures Filelis-Papadopoulos, Christos K.

P2 p. 703-714
artikel
3 An efficient access control scheme with outsourcing capability and attribute update for fog computing Zhang, Peng
2018
P2 p. 753-762
artikel
4 An empirical study for evaluating the performance of multi-cloud APIs Ré, Reginaldo

P2 p. 726-738
artikel
5 An integrated information lifecycle management framework for exploiting social network data to identify dynamic large crowd concentration events in smart cities applications Kousiouris, George
2018
P2 p. 516-530
artikel
6 Anonymous and secure aggregation scheme in fog-based public cloud computing Wang, Huaqun
2018
P2 p. 712-719
artikel
7 An SVM-based collaborative filtering approach for Top-N web services recommendation Ren, Lifang
2018
P2 p. 531-543
artikel
8 A reliable IoT system for Personal Healthcare Devices Woo, Min Woo
2018
P2 p. 626-640
artikel
9 Attribute-based cloud storage with secure provenance over encrypted data Cui, Hui

P2 p. 461-472
artikel
10 Automatically deriving cost models for structured parallel processes using hylomorphisms Castro, David

P2 p. 653-668
artikel
11 A variant of password authenticated key exchange protocol Zhang, Yuexin
2018
P2 p. 699-711
artikel
12 Bitcoin-based fair payments for outsourcing computations of fog devices Huang, Hui
2018
P2 p. 850-858
artikel
13 CCA-secure ABE with outsourced decryption for fog computing Zuo, Cong
2018
P2 p. 730-738
artikel
14 Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing Jiang, Yinhao
2018
P2 p. 720-729
artikel
15 Context-Aware Multifaceted Trust Framework For Evaluating Trustworthiness of Cloud Providers Alhanahnah, Mohannad

P2 p. 488-499
artikel
16 Controlling and filtering users data in Intelligent Transportation System Gosman, Catalin
2018
P2 p. 807-816
artikel
17 CUIDATS: An RFID–WSN hybrid monitoring system for smart health care environments Adame, Toni
2018
P2 p. 602-615
artikel
18 Data service generation framework from heterogeneous printed forms using semantic link discovery Yu, Han

P2 p. 514-527
artikel
19 Dendron : Genetic trees driven rule induction for network intrusion detection systems Papamartzivanos, Dimitrios

P2 p. 558-574
artikel
20 Digital forensic intelligence: Data subsets and Open Source Intelligence (DFINT + OSINT): A timely and cohesive mix Quick, Darren
2018
P2 p. 558-567
artikel
21 Editorial Board 2018
P2 p. IFC
artikel
22 Editorial Board
P2 p. IFC
artikel
23 Energy modeling in cloud simulation frameworks Makaratzis, Antonios T.

P2 p. 715-725
artikel
24 Erlang-based desynchronized urban traffic simulation for high-performance computing systems Turek, Wojciech

P2 p. 645-652
artikel
25 Exploiting smart e-Health gateways at the edge of healthcare Internet-of-Things: A fog computing approach Rahmani, Amir M.
2018
P2 p. 641-658
artikel
26 Exploring the relationship between architectures and management policies in the design of NUCA-based chip multicore systems Bartolini, Sandro
2018
P2 p. 481-501
artikel
27 Finding parallel functional pearls: Automatic parallel recursion scheme detection in Haskell functions via anti-unification Barwell, Adam D.

P2 p. 669-686
artikel
28 Free the Conqueror! Refactoring divide-and-conquer functions Kozsik, Tamás

P2 p. 687-699
artikel
29 Hybrid privacy-preserving clinical decision support system in fog–cloud computing Liu, Ximeng
2018
P2 p. 825-837
artikel
30 Hybrid scheduling algorithm in early warning systems Visheratin, Alexander A.

P2 p. 630-642
artikel
31 Internet-of-Things and big data for smarter healthcare: From device to architecture, applications and analytics Firouzi, Farshad
2018
P2 p. 583-586
artikel
32 Internet of Things security and forensics: Challenges and opportunities Conti, Mauro
2018
P2 p. 544-546
artikel
33 Leveraging content similarity among VMI files to allocate virtual machines in cloud Li, Huixi

P2 p. 528-542
artikel
34 Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges Roman, Rodrigo
2018
P2 p. 680-698
artikel
35 Parallel ant colony optimization on multi-core SIMD CPUs Zhou, Yi

P2 p. 473-487
artikel
36 Performance study and enhancement of multichannel access methods in the future generation VHT WLAN Mammeri, Souhila

P2 p. 543-557
artikel
37 Position based cryptography with location privacy: A step for Fog Computing Yang, Rupeng
2018
P2 p. 799-806
artikel
38 Power transmission and workload balancing policies in eHealth mobile cloud computing scenarios Pagán, Josué
2018
P2 p. 587-601
artikel
39 Privacy-preserved big data analysis based on asymmetric imputation kernels and multiside similarities Chen, Bo-Wei
2018
P2 p. 859-866
artikel
40 Privacy preserving cloud data auditing with efficient key update Li, Yannan
2018
P2 p. 789-798
artikel
41 Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing Koo, Dongyoung
2018
P2 p. 739-752
artikel
42 Privacy-preserving protocols for secure and reliable data aggregation in IoT-enabled Smart Metering systems Tonyali, Samet
2018
P2 p. 547-557
artikel
43 Proactive defense mechanisms for the software-defined Internet of Things with non-patchable vulnerabilities Ge, Mengmeng
2018
P2 p. 568-582
artikel
44 Resource provisioning for data-intensive applications with deadline constraints on hybrid clouds using Aneka Nadjaran Toosi, Adel

P2 p. 765-775
artikel
45 Reward-based Markov chain analysis adaptive global resource management for inter-cloud computing Chang, Ben-Jye

P2 p. 588-603
artikel
46 Scalable parallel simulation of dynamical processes on large stochastic Kronecker graphs Bochenina, Klavdiya
2018
P2 p. 502-515
artikel
47 Scheduling dynamic workloads in multi-tenant scientific workflow as a service platforms Rodriguez, Maria A.

P2 p. 739-750
artikel
48 Secure intelligent traffic light control using fog computing Liu, Jian
2018
P2 p. 817-824
artikel
49 Software defined neighborhood area network for smart grid applications Nafi, Nazmus S.

P2 p. 500-513
artikel
50 Special Issue: Recent trends in cloud computing Gravvanis, George A.

P2 p. 700-702
artikel
51 Special section on functional paradigm for high performance computing Byrski, Aleksander

P2 p. 643-644
artikel
52 Storage tier-aware replicative data reorganization with prioritization for efficient workload processing Spivak, Anton

P2 p. 618-629
artikel
53 Towards a scenario-based solution for extreme metocean event simulation applying urgent computing Kalyuzhnaya, Anna V.

P2 p. 604-617
artikel
54 Towards a service-oriented cyber–physical systems of systems for smart city mobility applications Elshenawy, Mohamed

P2 p. 575-587
artikel
55 Towards fog-driven IoT eHealth: Promises and challenges of IoT in medicine and healthcare Farahani, Bahar
2018
P2 p. 659-676
artikel
56 Towards leakage-resilient fine-grained access control in fog computing Yu, Zuoxia
2018
P2 p. 763-777
artikel
57 Universal and secure object ownership transfer protocol for the Internet of Things Ray, Biplob R.
2018
P2 p. 838-849
artikel
58 Unobtrusive detection of body movements during sleep using Wi-Fi received signal strength with model adaptation technique Ammae, Osamu
2018
P2 p. 616-625
artikel
59 Verifiable searchable encryption with aggregate keys for data sharing system Liu, Zheli
2018
P2 p. 778-788
artikel
60 VM reassignment in hybrid clouds for large decentralised companies: A multi-objective challenge Saber, Takfarinas

P2 p. 751-764
artikel
                             60 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland