Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             83 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Adaptive routing protocol for mobile ad hoc networks Rupérez Cañas, Delfín
2013
9 p. 817-827
artikel
2 A distributed protocol for privacy preserving aggregation with non-permanent participants Benkaouz, Yahya
2013
9 p. 893-912
artikel
3 A fully distributed learning algorithm for power allocation in heterogeneous networks El Hammouti, Hajar
2019
9 p. 1287-1303
artikel
4 Airtime ping–pong effect characterization in IEEE 802.11s wireless mesh networks Abid, Mohamed Riduan
2013
9 p. 913-937
artikel
5 A job scheduling algorithm based on rock hyrax optimization in cloud computing Singhal, Saurabh

9 p. 2115-2142
artikel
6 A methodology pruning the search space of six compiler transformations by addressing them together as one problem and by exploiting the hardware architecture details Kelefouras, Vasilios
2017
9 p. 865-888
artikel
7 A model-based infrastructure for the specification and runtime execution of self-adaptive IoT architectures Alfonso, Iván

9 p. 1883-1906
artikel
8 A multi-objective load balancing algorithm for virtual machine placement in cloud data centers based on machine learning Ghasemi, Arezoo

9 p. 2049-2072
artikel
9 Analysing environmental impact of large-scale events in public spaces with cross-domain multimodal data fusion De, Suparna

9 p. 1959-1981
artikel
10 An architectural style for scalable choreography-based microservice-oriented distributed systems Filippone, Gianluca

9 p. 1933-1956
artikel
11 An effective data collection algorithm for wireless sensor network Lasheng, Yu
2012
9 p. 723-738
artikel
12 An energy-efficient load distribution framework for SDN controllers Priyadarsini, Madhukrishna

9 p. 2073-2098
artikel
13 An energy efficient multi-mobile agent itinerary planning approach in wireless sensor networks Alsboui, Tariq

9 p. 2093-2113
artikel
14 An insight into cloud forensic readiness by leading cloud service providers: a survey Sanda, Pranitha

9 p. 2005-2030
artikel
15 Anomalies and similarities among consensus numbers of variously-relaxed queues Talmage, Edward
2018
9 p. 1349-1368
artikel
16 A novel and efficient salp swarm algorithm for large-scale QoS-aware service composition selection Li, Jun

9 p. 2031-2051
artikel
17 A novel rough value set categorical clustering technique for supplier base management Uddin, Jamal

9 p. 2061-2091
artikel
18 A novel routing method in hybrid DTN–MANET networks in the critical situations Pirzadi, Somaye

9 p. 2137-2156
artikel
19 A parallel text clustering method using Spark and hashing Ben HajKacem, Mohamed Aymen

9 p. 2007-2031
artikel
20 A program slicing-based method for effective detection of coincidentally correct test cases Feyzi, Farid
2018
9 p. 927-969
artikel
21 Architecting decentralized control in large-scale self-adaptive systems Andersson, Jesper

9 p. 1849-1882
artikel
22 A self-learning bee colony and genetic algorithm hybrid for cloud manufacturing services Li, Tianhua

9 p. 1977-2003
artikel
23 A set of measures designed to identify overlapped instances in software defect prediction Gupta, Shivani
2017
9 p. 889-914
artikel
24 A systematic mapping study on automated analysis of privacy policies Del Alamo, Jose M.

9 p. 2053-2076
artikel
25 A system for effectively predicting flight delays based on IoT data Aljubairy, Abdulwahab

9 p. 2025-2048
artikel
26 Automation of service-based security-aware business processes in the Cloud Lins, Fernando
2015
9 p. 847-870
artikel
27 Autonomic power management with self-healing in server clusters under QoS constraints Entrialgo, Joaquín
2015
9 p. 871-894
artikel
28 Bio-signal data sharing security through watermarking: a technical survey Sharma, N.

9 p. 1883-1917
artikel
29 Cloud infrastructure planning considering different redundancy mechanisms Sousa, Erica
2017
9 p. 841-864
artikel
30 Comparison of analytical and ML-based models for predicting CPU–GPU data transfer time Riahi, Ali

9 p. 2099-2116
artikel
31 Competitive clustering of stochastic communication patterns on a ring Avin, Chen
2018
9 p. 1369-1390
artikel
32 Context-aware recommender system using trust network El Yebdri, Zeyneb

9 p. 1919-1937
artikel
33 Continuous QoS-aware adaptation of Cloud-IoT application placements Herrera, Juan Luis

9 p. 2037-2059
artikel
34 DAIP: a delay-efficient and availability-aware IoT application placement in fog environments Dadashi, Morteza

9 p. 2007-2035
artikel
35 Designing and implementing a Big Data benchmark in a financial context: application to a cash management use case Sfaxi, Lilia

9 p. 1983-2005
artikel
36 Detecting bad information in mobile wireless networks based on the wireless application protocol Zhang, Weizhe
2013
9 p. 855-874
artikel
37 Development of global specification for dynamically adaptive software Zhao, Yongwang
2013
9 p. 785-816
artikel
38 E-D2HCP: enhanced distributed dynamic host configuration protocol García Villalba, L. J.
2013
9 p. 777-791
artikel
39 Editorial foreword
9 p. 1879-1882
artikel
40 Editorial, special issue of NETYS 2015 Bouajjani, Ahmed
2019
9 p. 1225-1226
artikel
41 Editorial to special issue: computer and network applications for ubiquitous computing Kim, Tai-hoon
2014
9 p. 775-776
artikel
42 Energy efficient UAV enabled harvesting with beamforming for clustered SDWSN Subaselvi, S.

9 p. 2077-2100
artikel
43 Energy-makespan optimization of workflow scheduling in fog–cloud computing Ijaz, Samia

9 p. 2033-2059
artikel
44 EPiC: efficient privacy-preserving counting for MapReduce Vo-Huu, Triet Dang
2018
9 p. 1265-1286
artikel
45 Essential Particle Swarm Optimization queen with Tabu Search for MKP resolution Ktari, Raida
2013
9 p. 897-921
artikel
46 Evaluation of the computational efficacy in GPU-accelerated simulations of spiking neurons Fujita, Kazuhisa
2018
9 p. 907-926
artikel
47 Failure prediction of tasks in the cloud at an earlier stage: a solution based on domain information mining Liu, Chunhong

9 p. 2001-2023
artikel
48 Finding large $$k$$-clubs in undirected graphs Chang, Maw-Shang
2012
9 p. 739-758
artikel
49 FreeRec: an anonymous and distributed personalization architecture Boutet, Antoine
2013
9 p. 961-980
artikel
50 GoSCAN: Decentralized scalable data clustering Mashayekhi, Hoda
2012
9 p. 759-784
artikel
51 GPU-based matrix-free finite element solver exploiting symmetry of elemental matrices Kiran, Utpal

9 p. 1941-1965
artikel
52 Green Service Level Agreement (GSLA) framework for cloud computing Goyal, Sudhir
2016
9 p. 949-963
artikel
53 Grid resource discovery based on distributed learning automata Hasanzadeh, Mohammad
2013
9 p. 909-922
artikel
54 Guided self-organization through an entropy-based self-advising approach Kalantari, Somayeh

9 p. 2101-2136
artikel
55 HW/SW co-design of reconfigurable hardware-based genetic algorithm in FPGAs applicable to a variety of problems Nambiar, Vishnu P.
2013
9 p. 863-896
artikel
56 Identifying the optimal level of parallelism in transactional memory applications Didona, Diego
2013
9 p. 939-959
artikel
57 Identity-based deniable authentication for ad hoc networks Li, Fagen
2013
9 p. 843-853
artikel
58 Improving resource location with locally precomputed partial random walks López Millán, Víctor M.
2013
9 p. 871-891
artikel
59 International revenue share fraud prediction on the 5G edge using federated learning Ferreira, Luís

9 p. 1907-1932
artikel
60 Levering object-oriented knowledge for service-oriented proficiency Stubbings, Gary
2013
9 p. 817-835
artikel
61 More efficient key-hash based fingerprint remote authentication scheme using mobile device Khan, Muhammad Khurram
2013
9 p. 793-816
artikel
62 On the complexity of linearizability Hamza, Jad
2018
9 p. 1227-1240
artikel
63 On understanding price-QoS war for competitive market and confused consumers Ait Omar, Driss
2018
9 p. 1327-1348
artikel
64 Optimal torus exploration by oblivious robots Devismes, Stéphane
2018
9 p. 1241-1264
artikel
65 Osprey: a heterogeneous search framework for spatial-temporal similarity Dai, Hao

9 p. 1949-1975
artikel
66 Policy expressions and the bottom-up design of computing policies Reaz, Rezwana
2018
9 p. 1307-1326
artikel
67 Popularity versus quality: analyzing and predicting the success of highly rated crowdfunded projects on Amazon Sharma, Vishal

9 p. 1939-1958
artikel
68 Process interoperability in healthcare systems with dynamic semantic web services Khan, Wajahat Ali
2013
9 p. 837-862
artikel
69 Programming guidelines for improving software resiliency against soft-errors without performance overhead Arasteh, Bahman
2018
9 p. 971-1003
artikel
70 Retraction Note to: New probabilistic models for managing user’s locations in PCS networks Saleh, Ahmed I.
2015
9 p. 981
artikel
71 Reusing training data with generative/discriminative hybrid model for practical acceleration-based activity recognition Kong, Quan
2013
9 p. 875-895
artikel
72 Revising history for cost-informed process improvement Low, W. Z.
2015
9 p. 895-921
artikel
73 Scalability approaches for causal multicast: a survey Juan-Marín, Rubén de
2015
9 p. 923-947
artikel
74 Source identification for mobile devices, based on wavelet transforms combined with sensor imperfections Sandoval Orozco, A. L.
2013
9 p. 829-841
artikel
75 Special issue on Architecting Dependable Multi-paradigm Computing Systems Scandurra, Patrizia

9 p. 1847
artikel
76 Special issue on NETYS selected papers Gramoli, Vincent
2015
9 p. 869-870
artikel
77 Special issue on NETYS’17 selected papers Benkaouz, Yahya
2019
9 p. 1305
artikel
78 Time and activity sequence prediction of business process instances Polato, Mirko
2018
9 p. 1005-1031
artikel
79 Trends in continuous evaluation of software architectures Soares, Rodrigo C.

9 p. 1957-1980
artikel
80 Uniform reliable broadcast in anonymous distributed systems with fair lossy channels Tang, Jian

9 p. 1967-1999
artikel
81 Using MCRDR based Agile approach for expert system development Han, Soyeon Caren
2013
9 p. 897-908
artikel
82 Weighted clustering of attributed multi-graphs Papadopoulos, Andreas
2016
9 p. 813-840
artikel
83 X-IoT: a model-driven approach to support IoT application portability across IoT platforms Corradini, Flavio

9 p. 1981-2005
artikel
                             83 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland