Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             65 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Adaptive learning of aggregate analytics under dynamic workloads Savva, Fotis

109 C p. 317-330
artikel
2 A game-theoretic approach for cost-aware load balancing in distributed systems Kishor, Avadh

109 C p. 29-44
artikel
3 A hybrid analysis of LBSN data to early detect anomalies in crowd dynamics Redondo, Rebeca P. Díaz

109 C p. 83-94
artikel
4 A hybrid encryption technique for Secure-GLOR: The adaptive secure routing protocol for dynamic wireless mesh networks Nanda, Ashish

109 C p. 521-530
artikel
5 A hybrid model-free approach for the near-optimal intrusion response control of non-stationary systems Iannucci, Stefano

109 C p. 111-124
artikel
6 A knowledge-based deep learning method for ECG signal delineation Wang, Jilong

109 C p. 56-66
artikel
7 A methodology for conducting efficient sanitization of HTTP training datasets Díaz-Verdejo, Jesús E.

109 C p. 67-82
artikel
8 A methodology for the design and deployment of distributed cyber–physical systems for smart environments Tanganelli, Giacomo

109 C p. 420-430
artikel
9 An accurate and efficient web service QoS prediction model with wide-range awareness Chen, Zhen

109 C p. 275-292
artikel
10 Analysis of healthcare big data Lv, Zhihan

109 C p. 103-110
artikel
11 An effective random statistical method for Indoor Positioning System using WiFi fingerprinting Ninh, Duong Bao

109 C p. 238-248
artikel
12 An efficient data integrity auditing protocol for cloud computing Garg, Neenu

109 C p. 306-316
artikel
13 A network-based method with privacy-preserving for identifying influential providers in large healthcare service systems Qi, Xiaoyu

109 C p. 293-305
artikel
14 A new approach in reject inference of using ensemble learning based on global semi-supervised framework Liu, Yan

109 C p. 382-391
artikel
15 A novel trust mechanism based on Fog Computing in Sensor–Cloud System Wang, Tian

109 C p. 573-582
artikel
16 A parallelized disjunctive query based searchable encryption scheme for big data Tahir, Shahzaib

109 C p. 583-592
artikel
17 Automated classification of social network messages into Smart Cities dimensions Bencke, Luciana

109 C p. 218-237
artikel
18 Big Data Analytics and Artificial Intelligence for Cyber Crime Investigation and Prevention Shalaginov, Andrii

109 C p. 702-703
artikel
19 Bio-AKA: An efficient fingerprint based two factor user authentication and key agreement scheme Bian, Weixin

109 C p. 45-55
artikel
20 CCoDaMiC: A framework for Coherent Coordination of Data Migration and Computation platforms Dehury, Chinmaya Kumar

109 C p. 1-16
artikel
21 Cloud toolkit for Provider assessment, optimized Application Cloudification and deployment on IaaS Psychas, A.

109 C p. 657-667
artikel
22 Cognitive-inspired Computing: Advances and Novel Applications Zhu, Rongbo

109 C p. 706-709
artikel
23 Community-Centric Brokerage-Aware Access Control for Online Social Networks Asim, Yousra

109 C p. 469-478
artikel
24 Content-based multi-source encrypted image retrieval in clouds with privacy preservation Shen, Meng

109 C p. 621-632
artikel
25 Deep reinforcement learning for traffic signal control under disturbances: A case study on Sunway city, Malaysia Rasheed, Faizan

109 C p. 431-445
artikel
26 Designing an efficient clustering strategy for combined Fog-to-Cloud scenarios Asensio, A.

109 C p. 392-406
artikel
27 Desynchronization in distributed Ant Colony Optimization in HPC environment Starzec, Mateusz

109 C p. 125-133
artikel
28 Detection of time series patterns and periodicity of cloud computing workloads St-Onge, Cédric

109 C p. 249-261
artikel
29 Economic feasibility of virtual operators in 5G via network slicing Sacoto-Cabrera, Erwin J.

109 C p. 172-187
artikel
30 Editorial Board
109 C p. ii
artikel
31 Efficient cloud-aided verifiable secret sharing scheme with batch verification for smart cities Shen, Jian

109 C p. 450-456
artikel
32 Enhancing performance of IoT applications with load prediction and cloud elasticity da Rosa Righi, Rodrigo

109 C p. 689-701
artikel
33 Feature data processing: Making medical data fit deep neural networks Xu, Yingying

109 C p. 149-157
artikel
34 Find my trustworthy fogs: A fuzzy-based trust evaluation framework Rahman, Fatin Hamadah

109 C p. 562-572
artikel
35 Fine-grained access control based on Trusted Execution Environment Fan, Yongkai

109 C p. 551-561
artikel
36 Grouping sentences as better language unit for extractive text summarization Cao, Mengyun

109 C p. 331-359
artikel
37 G-SEAP: Analyzing and characterizing soft-error aware approximation in GPGPUs Wei, Xiaohui

109 C p. 262-274
artikel
38 Hidden the true identity and dating characteristics based on quick private matching in mobile social networks Luo, Entao

109 C p. 633-641
artikel
39 iFlask: Isolate flask security system from dangerous execution environment by using ARM TrustZone Zhang, Diming

109 C p. 531-537
artikel
40 IoMT-based computational approach for detecting brain tumor Khan, Shah Rukh

109 C p. 360-367
artikel
41 IoT-BSFCAN: A smart context-aware system in IoT-Cloud using mobile-fogging Deebak, B.D.

109 C p. 368-381
artikel
42 IoT device location information storage system based on blockchain Li, Defeng

109 C p. 95-102
artikel
43 MAPE-K/MAPE-SAC: An interaction framework for adaptive systems with security assurance cases Jahan, Sharmin

109 C p. 197-209
artikel
44 Mission possible: Unify HPC and Big Data stacks towards application-defined blobs at the storage layer Matri, Pierre

109 C p. 668-677
artikel
45 MobiGyges: A mobile hidden volume for preventing data loss, improving storage utilization, and avoiding device reboot Feng, Wendi

109 C p. 158-171
artikel
46 MR-I MaxMin-scalable two-phase border based knowledge hiding technique using MapReduce Sharma, Shivani

109 C p. 538-550
artikel
47 On Byzantine fault tolerance in multi-master Kubernetes clusters Diouf, Gor Mack

109 C p. 407-419
artikel
48 Optimization of privacy-utility trade-offs under informational self-determination Asikis, Thomas

109 C p. 488-499
artikel
49 Path prediction in IoT systems through Markov Chain algorithm Piccialli, Francesco

109 C p. 210-217
artikel
50 Petri net-based methods for analyzing structural security in e-commerce business processes Yu, Wangyang

109 C p. 611-620
artikel
51 Privacy-preserving matrix product based static mutual exclusive roles constraints violation detection in interoperable role-based access control Liu, Meng

109 C p. 457-468
artikel
52 Private collaborative filtering under untrusted recommender server Xiong, Ping

109 C p. 511-520
artikel
53 QASEC: A secured data communication scheme for mobile Ad-hoc networks Usman, Muhammad

109 C p. 604-610
artikel
54 Seamless computing in industrial systems using container orchestration Gogouvitis, Spyridon V.

109 C p. 678-688
artikel
55 Security in Cognitive Radio Network: Defense against Primary User Emulation attacks using Genetic Artificial Bee Colony (GABC) algorithm Elghamrawy, Sally M.

109 C p. 479-487
artikel
56 Security, Trust and Privacy in Cyber (STPCyber): Future trends and challenges Nanda, Priyadarsi

109 C p. 446-449
artikel
57 Sleep staging by bidirectional long short-term memory convolution neural network Chen, Xueyan

109 C p. 188-196
artikel
58 Smart heating in collaborative and reasoning-enabled housing units Bourelos, P.

109 C p. 644-656
artikel
59 Smart vehicle forensics: Challenges and case study Le-Khac, Nhien-An

109 C p. 500-510
artikel
60 SneakLeak+: Large-scale klepto apps analysis Bhandari, Shweta

109 C p. 593-603
artikel
61 Special Issue: Intelligent Edge, Fog and Internet of Things (IoT)-based Services Enokido, Tomoya

109 C p. 710-711
artikel
62 Special Issue on Fog and Cloud Computing for Cooperative Information System Management: Challenges and Opportunities Gaaloul, Walid

109 C p. 704-705
artikel
63 Special Issue on High Performance Services Computing and Internet Technologies Tserpes, Konstantinos

109 C p. 642-643
artikel
64 System delay optimization for Mobile Edge Computing Xiao, Surong

109 C p. 17-28
artikel
65 Task optimization and scheduling of distributed cyber–physical system based on improved ant colony algorithm Yi, Na

109 C p. 134-148
artikel
                             65 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland