nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Adaptive routing protocol for mobile ad hoc networks
|
Rupérez Cañas, Delfín |
|
2013 |
|
9 |
p. 817-827 |
artikel |
2 |
A distributed protocol for privacy preserving aggregation with non-permanent participants
|
Benkaouz, Yahya |
|
2013 |
|
9 |
p. 893-912 |
artikel |
3 |
A fully distributed learning algorithm for power allocation in heterogeneous networks
|
El Hammouti, Hajar |
|
2019 |
|
9 |
p. 1287-1303 |
artikel |
4 |
Airtime ping–pong effect characterization in IEEE 802.11s wireless mesh networks
|
Abid, Mohamed Riduan |
|
2013 |
|
9 |
p. 913-937 |
artikel |
5 |
A job scheduling algorithm based on rock hyrax optimization in cloud computing
|
Singhal, Saurabh |
|
|
|
9 |
p. 2115-2142 |
artikel |
6 |
A methodology pruning the search space of six compiler transformations by addressing them together as one problem and by exploiting the hardware architecture details
|
Kelefouras, Vasilios |
|
2017 |
|
9 |
p. 865-888 |
artikel |
7 |
A model-based infrastructure for the specification and runtime execution of self-adaptive IoT architectures
|
Alfonso, Iván |
|
|
|
9 |
p. 1883-1906 |
artikel |
8 |
A multi-objective load balancing algorithm for virtual machine placement in cloud data centers based on machine learning
|
Ghasemi, Arezoo |
|
|
|
9 |
p. 2049-2072 |
artikel |
9 |
Analysing environmental impact of large-scale events in public spaces with cross-domain multimodal data fusion
|
De, Suparna |
|
|
|
9 |
p. 1959-1981 |
artikel |
10 |
An architectural style for scalable choreography-based microservice-oriented distributed systems
|
Filippone, Gianluca |
|
|
|
9 |
p. 1933-1956 |
artikel |
11 |
An effective data collection algorithm for wireless sensor network
|
Lasheng, Yu |
|
2012 |
|
9 |
p. 723-738 |
artikel |
12 |
An energy-efficient load distribution framework for SDN controllers
|
Priyadarsini, Madhukrishna |
|
|
|
9 |
p. 2073-2098 |
artikel |
13 |
An energy efficient multi-mobile agent itinerary planning approach in wireless sensor networks
|
Alsboui, Tariq |
|
|
|
9 |
p. 2093-2113 |
artikel |
14 |
An insight into cloud forensic readiness by leading cloud service providers: a survey
|
Sanda, Pranitha |
|
|
|
9 |
p. 2005-2030 |
artikel |
15 |
Anomalies and similarities among consensus numbers of variously-relaxed queues
|
Talmage, Edward |
|
2018 |
|
9 |
p. 1349-1368 |
artikel |
16 |
A novel and efficient salp swarm algorithm for large-scale QoS-aware service composition selection
|
Li, Jun |
|
|
|
9 |
p. 2031-2051 |
artikel |
17 |
A novel rough value set categorical clustering technique for supplier base management
|
Uddin, Jamal |
|
|
|
9 |
p. 2061-2091 |
artikel |
18 |
A novel routing method in hybrid DTN–MANET networks in the critical situations
|
Pirzadi, Somaye |
|
|
|
9 |
p. 2137-2156 |
artikel |
19 |
A parallel text clustering method using Spark and hashing
|
Ben HajKacem, Mohamed Aymen |
|
|
|
9 |
p. 2007-2031 |
artikel |
20 |
A program slicing-based method for effective detection of coincidentally correct test cases
|
Feyzi, Farid |
|
2018 |
|
9 |
p. 927-969 |
artikel |
21 |
Architecting decentralized control in large-scale self-adaptive systems
|
Andersson, Jesper |
|
|
|
9 |
p. 1849-1882 |
artikel |
22 |
A self-learning bee colony and genetic algorithm hybrid for cloud manufacturing services
|
Li, Tianhua |
|
|
|
9 |
p. 1977-2003 |
artikel |
23 |
A set of measures designed to identify overlapped instances in software defect prediction
|
Gupta, Shivani |
|
2017 |
|
9 |
p. 889-914 |
artikel |
24 |
A systematic mapping study on automated analysis of privacy policies
|
Del Alamo, Jose M. |
|
|
|
9 |
p. 2053-2076 |
artikel |
25 |
A system for effectively predicting flight delays based on IoT data
|
Aljubairy, Abdulwahab |
|
|
|
9 |
p. 2025-2048 |
artikel |
26 |
Automation of service-based security-aware business processes in the Cloud
|
Lins, Fernando |
|
2015 |
|
9 |
p. 847-870 |
artikel |
27 |
Autonomic power management with self-healing in server clusters under QoS constraints
|
Entrialgo, Joaquín |
|
2015 |
|
9 |
p. 871-894 |
artikel |
28 |
Bio-signal data sharing security through watermarking: a technical survey
|
Sharma, N. |
|
|
|
9 |
p. 1883-1917 |
artikel |
29 |
Cloud infrastructure planning considering different redundancy mechanisms
|
Sousa, Erica |
|
2017 |
|
9 |
p. 841-864 |
artikel |
30 |
Comparison of analytical and ML-based models for predicting CPU–GPU data transfer time
|
Riahi, Ali |
|
|
|
9 |
p. 2099-2116 |
artikel |
31 |
Competitive clustering of stochastic communication patterns on a ring
|
Avin, Chen |
|
2018 |
|
9 |
p. 1369-1390 |
artikel |
32 |
Context-aware recommender system using trust network
|
El Yebdri, Zeyneb |
|
|
|
9 |
p. 1919-1937 |
artikel |
33 |
Continuous QoS-aware adaptation of Cloud-IoT application placements
|
Herrera, Juan Luis |
|
|
|
9 |
p. 2037-2059 |
artikel |
34 |
DAIP: a delay-efficient and availability-aware IoT application placement in fog environments
|
Dadashi, Morteza |
|
|
|
9 |
p. 2007-2035 |
artikel |
35 |
Designing and implementing a Big Data benchmark in a financial context: application to a cash management use case
|
Sfaxi, Lilia |
|
|
|
9 |
p. 1983-2005 |
artikel |
36 |
Detecting bad information in mobile wireless networks based on the wireless application protocol
|
Zhang, Weizhe |
|
2013 |
|
9 |
p. 855-874 |
artikel |
37 |
Development of global specification for dynamically adaptive software
|
Zhao, Yongwang |
|
2013 |
|
9 |
p. 785-816 |
artikel |
38 |
E-D2HCP: enhanced distributed dynamic host configuration protocol
|
García Villalba, L. J. |
|
2013 |
|
9 |
p. 777-791 |
artikel |
39 |
Editorial foreword
|
|
|
|
|
9 |
p. 1879-1882 |
artikel |
40 |
Editorial, special issue of NETYS 2015
|
Bouajjani, Ahmed |
|
2019 |
|
9 |
p. 1225-1226 |
artikel |
41 |
Editorial to special issue: computer and network applications for ubiquitous computing
|
Kim, Tai-hoon |
|
2014 |
|
9 |
p. 775-776 |
artikel |
42 |
Energy efficient UAV enabled harvesting with beamforming for clustered SDWSN
|
Subaselvi, S. |
|
|
|
9 |
p. 2077-2100 |
artikel |
43 |
Energy-makespan optimization of workflow scheduling in fog–cloud computing
|
Ijaz, Samia |
|
|
|
9 |
p. 2033-2059 |
artikel |
44 |
EPiC: efficient privacy-preserving counting for MapReduce
|
Vo-Huu, Triet Dang |
|
2018 |
|
9 |
p. 1265-1286 |
artikel |
45 |
Essential Particle Swarm Optimization queen with Tabu Search for MKP resolution
|
Ktari, Raida |
|
2013 |
|
9 |
p. 897-921 |
artikel |
46 |
Evaluation of the computational efficacy in GPU-accelerated simulations of spiking neurons
|
Fujita, Kazuhisa |
|
2018 |
|
9 |
p. 907-926 |
artikel |
47 |
Failure prediction of tasks in the cloud at an earlier stage: a solution based on domain information mining
|
Liu, Chunhong |
|
|
|
9 |
p. 2001-2023 |
artikel |
48 |
Finding large $$k$$-clubs in undirected graphs
|
Chang, Maw-Shang |
|
2012 |
|
9 |
p. 739-758 |
artikel |
49 |
FreeRec: an anonymous and distributed personalization architecture
|
Boutet, Antoine |
|
2013 |
|
9 |
p. 961-980 |
artikel |
50 |
GoSCAN: Decentralized scalable data clustering
|
Mashayekhi, Hoda |
|
2012 |
|
9 |
p. 759-784 |
artikel |
51 |
GPU-based matrix-free finite element solver exploiting symmetry of elemental matrices
|
Kiran, Utpal |
|
|
|
9 |
p. 1941-1965 |
artikel |
52 |
Green Service Level Agreement (GSLA) framework for cloud computing
|
Goyal, Sudhir |
|
2016 |
|
9 |
p. 949-963 |
artikel |
53 |
Grid resource discovery based on distributed learning automata
|
Hasanzadeh, Mohammad |
|
2013 |
|
9 |
p. 909-922 |
artikel |
54 |
Guided self-organization through an entropy-based self-advising approach
|
Kalantari, Somayeh |
|
|
|
9 |
p. 2101-2136 |
artikel |
55 |
HW/SW co-design of reconfigurable hardware-based genetic algorithm in FPGAs applicable to a variety of problems
|
Nambiar, Vishnu P. |
|
2013 |
|
9 |
p. 863-896 |
artikel |
56 |
Identifying the optimal level of parallelism in transactional memory applications
|
Didona, Diego |
|
2013 |
|
9 |
p. 939-959 |
artikel |
57 |
Identity-based deniable authentication for ad hoc networks
|
Li, Fagen |
|
2013 |
|
9 |
p. 843-853 |
artikel |
58 |
Improving resource location with locally precomputed partial random walks
|
López Millán, Víctor M. |
|
2013 |
|
9 |
p. 871-891 |
artikel |
59 |
International revenue share fraud prediction on the 5G edge using federated learning
|
Ferreira, Luís |
|
|
|
9 |
p. 1907-1932 |
artikel |
60 |
Levering object-oriented knowledge for service-oriented proficiency
|
Stubbings, Gary |
|
2013 |
|
9 |
p. 817-835 |
artikel |
61 |
More efficient key-hash based fingerprint remote authentication scheme using mobile device
|
Khan, Muhammad Khurram |
|
2013 |
|
9 |
p. 793-816 |
artikel |
62 |
On the complexity of linearizability
|
Hamza, Jad |
|
2018 |
|
9 |
p. 1227-1240 |
artikel |
63 |
On understanding price-QoS war for competitive market and confused consumers
|
Ait Omar, Driss |
|
2018 |
|
9 |
p. 1327-1348 |
artikel |
64 |
Optimal torus exploration by oblivious robots
|
Devismes, Stéphane |
|
2018 |
|
9 |
p. 1241-1264 |
artikel |
65 |
Osprey: a heterogeneous search framework for spatial-temporal similarity
|
Dai, Hao |
|
|
|
9 |
p. 1949-1975 |
artikel |
66 |
Policy expressions and the bottom-up design of computing policies
|
Reaz, Rezwana |
|
2018 |
|
9 |
p. 1307-1326 |
artikel |
67 |
Popularity versus quality: analyzing and predicting the success of highly rated crowdfunded projects on Amazon
|
Sharma, Vishal |
|
|
|
9 |
p. 1939-1958 |
artikel |
68 |
Process interoperability in healthcare systems with dynamic semantic web services
|
Khan, Wajahat Ali |
|
2013 |
|
9 |
p. 837-862 |
artikel |
69 |
Programming guidelines for improving software resiliency against soft-errors without performance overhead
|
Arasteh, Bahman |
|
2018 |
|
9 |
p. 971-1003 |
artikel |
70 |
Retraction Note to: New probabilistic models for managing user’s locations in PCS networks
|
Saleh, Ahmed I. |
|
2015 |
|
9 |
p. 981 |
artikel |
71 |
Reusing training data with generative/discriminative hybrid model for practical acceleration-based activity recognition
|
Kong, Quan |
|
2013 |
|
9 |
p. 875-895 |
artikel |
72 |
Revising history for cost-informed process improvement
|
Low, W. Z. |
|
2015 |
|
9 |
p. 895-921 |
artikel |
73 |
Scalability approaches for causal multicast: a survey
|
Juan-Marín, Rubén de |
|
2015 |
|
9 |
p. 923-947 |
artikel |
74 |
Source identification for mobile devices, based on wavelet transforms combined with sensor imperfections
|
Sandoval Orozco, A. L. |
|
2013 |
|
9 |
p. 829-841 |
artikel |
75 |
Special issue on Architecting Dependable Multi-paradigm Computing Systems
|
Scandurra, Patrizia |
|
|
|
9 |
p. 1847 |
artikel |
76 |
Special issue on NETYS selected papers
|
Gramoli, Vincent |
|
2015 |
|
9 |
p. 869-870 |
artikel |
77 |
Special issue on NETYS’17 selected papers
|
Benkaouz, Yahya |
|
2019 |
|
9 |
p. 1305 |
artikel |
78 |
Time and activity sequence prediction of business process instances
|
Polato, Mirko |
|
2018 |
|
9 |
p. 1005-1031 |
artikel |
79 |
Trends in continuous evaluation of software architectures
|
Soares, Rodrigo C. |
|
|
|
9 |
p. 1957-1980 |
artikel |
80 |
Uniform reliable broadcast in anonymous distributed systems with fair lossy channels
|
Tang, Jian |
|
|
|
9 |
p. 1967-1999 |
artikel |
81 |
Using MCRDR based Agile approach for expert system development
|
Han, Soyeon Caren |
|
2013 |
|
9 |
p. 897-908 |
artikel |
82 |
Weighted clustering of attributed multi-graphs
|
Papadopoulos, Andreas |
|
2016 |
|
9 |
p. 813-840 |
artikel |
83 |
X-IoT: a model-driven approach to support IoT application portability across IoT platforms
|
Corradini, Flavio |
|
|
|
9 |
p. 1981-2005 |
artikel |