nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
An opportunistic routing based on symmetrical traffic distribution in vehicular networks
|
Mirjazaee, Nassim |
|
2015 |
47 |
C |
p. 1-12 12 p. |
artikel |
2 |
Assessing and managing the information and communication risk of power generation
|
Baiardi, F. |
|
2015 |
47 |
C |
p. 286-298 13 p. |
artikel |
3 |
A two-stage feature selection method with its application
|
Zhao, Xuehua |
|
2015 |
47 |
C |
p. 114-125 12 p. |
artikel |
4 |
Automated detection and segmentation of drusen in retinal fundus images
|
Mittal, Deepti |
|
2015 |
47 |
C |
p. 82-95 14 p. |
artikel |
5 |
Automatic modulation format/bit-rate classification and signal-to-noise ratio estimation using asynchronous delay-tap sampling
|
Khan, Faisal Nadeem |
|
2015 |
47 |
C |
p. 126-133 8 p. |
artikel |
6 |
Awareness and reaction strategies for critical infrastructure protection
|
Cazorla, Lorena |
|
2015 |
47 |
C |
p. 299-317 19 p. |
artikel |
7 |
Cloud-based power estimation and power-aware scheduling for embedded systems
|
Chen, Da-Ren |
|
2015 |
47 |
C |
p. 204-221 18 p. |
artikel |
8 |
Design and simulation of a parallel adaptive arbiter for maximum CPU utilization using multi-core processors
|
Akhtar, M. Nishat |
|
2015 |
47 |
C |
p. 51-68 18 p. |
artikel |
9 |
Detecting stealthy attacks: Efficient monitoring of suspicious activities on computer networks
|
Kalutarage, Harsha K. |
|
2015 |
47 |
C |
p. 327-344 18 p. |
artikel |
10 |
Distributed consolidation of virtual machines for power efficiency in heterogeneous cloud data centers
|
Khani, Hadi |
|
2015 |
47 |
C |
p. 173-185 13 p. |
artikel |
11 |
Editorial Board
|
|
|
2015 |
47 |
C |
p. IFC- 1 p. |
artikel |
12 |
Introduction to the Special Section on “Cloud computing: Current advances and new research trends”
|
Gomes, Danielo G. |
|
2015 |
47 |
C |
p. 135-137 3 p. |
artikel |
13 |
Introduction to the special section on critical systems modelling and security
|
Garcia-Alfaro, Joaquin |
|
2015 |
47 |
C |
p. 255-257 3 p. |
artikel |
14 |
Multiple camera in car audio–visual speech recognition using phonetic and visemic information
|
Biswas, Astik |
|
2015 |
47 |
C |
p. 35-50 16 p. |
artikel |
15 |
Novel energy and SLA efficient resource management heuristics for consolidation of virtual machines in cloud data centers
|
Arianyan, Ehsan |
|
2015 |
47 |
C |
p. 222-240 19 p. |
artikel |
16 |
On kernel acceleration of electromagnetic solvers via hardware emulation
|
Tarek Ibn Ziad, M. |
|
2015 |
47 |
C |
p. 96-113 18 p. |
artikel |
17 |
On synergies of cyber and physical security modelling in vulnerability assessment of railway systems
|
Marrone, Stefano |
|
2015 |
47 |
C |
p. 275-285 11 p. |
artikel |
18 |
Password systems: Design and implementation
|
Dini, Gianluca |
|
2015 |
47 |
C |
p. 318-326 9 p. |
artikel |
19 |
Q-aware: Quality of service based cloud resource provisioning
|
Singh, Sukhpal |
|
2015 |
47 |
C |
p. 138-160 23 p. |
artikel |
20 |
Resource management in cloud computing: Taxonomy, prospects, and challenges
|
Mustafa, Saad |
|
2015 |
47 |
C |
p. 186-203 18 p. |
artikel |
21 |
Security analysis of socio-technical physical systems
|
Lenzini, Gabriele |
|
2015 |
47 |
C |
p. 258-274 17 p. |
artikel |
22 |
Selecting optimal countermeasures for attacks against critical systems using the attack volume model and the RORI index
|
Gonzalez-Granadillo, G. |
|
2015 |
47 |
C |
p. 13-34 22 p. |
artikel |
23 |
Tradeoff between energy and user experience for multimedia cloud computing
|
Liu, Yunchang |
|
2015 |
47 |
C |
p. 161-172 12 p. |
artikel |
24 |
Use of proactive and reactive hotspot detection technique to reduce the number of virtual machine migration and energy consumption in cloud data center
|
Shaw, Subhadra Bose |
|
2015 |
47 |
C |
p. 241-254 14 p. |
artikel |
25 |
Workload modeling for resource usage analysis and simulation in cloud computing
|
Magalhães, Deborah |
|
2015 |
47 |
C |
p. 69-81 13 p. |
artikel |