Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             79 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A Blockchain-based and resource-aware process execution engine Sturm, Christian

100 C p. 19-34
artikel
2 A blockchain-based fog computing framework for activity recognition as an application to e-Healthcare services Islam, Naveed

100 C p. 569-578
artikel
3 A cost-sensitive meta-learning classifier: SPFCNN-Miner Zhao, Linchang

100 C p. 1031-1043
artikel
4 A data type inference method based on long short-term memory by improved feature for weakness analysis in binary code Jeong, Junho

100 C p. 1044-1052
artikel
5 A general AI-defined attention network for predicting CDN performance Li, Junnan

100 C p. 759-769
artikel
6 Agent-based simulation of unmanned aerial vehicles in civilian applications: A systematic literature review and research directions Mualla, Yazan

100 C p. 344-364
artikel
7 A lighten CNN-LSTM model for speaker verification on embedded devices Zhao, Zitian

100 C p. 751-758
artikel
8 A lightweight authentication scheme with privacy protection for smart grid communications Zhang, Liping

100 C p. 770-778
artikel
9 An efficient blind filter: Location privacy protection and the access control in FinTech Li, Zhidan

100 C p. 797-810
artikel
10 An enhanced priority-based scheduling heuristic for DAG applications with temporal unpredictability in task execution and data transmission Zhang, Xinbo

100 C p. 428-439
artikel
11 A new approach for mobile robot localization based on an online IoT system Dourado Junior, Carlos M.J.M.

100 C p. 859-881
artikel
12 An intelligent incentive mechanism for coverage of data collection in cognitive internet of things Liu, Yuxin

100 C p. 701-714
artikel
13 A novel approach to steganography based on the properties of Catalan numbers and Dyck words Saračević, Muzafer

100 C p. 186-197
artikel
14 A novel next new point-of-interest recommendation system based on simulated user travel decision-making process Jiao, Xu

100 C p. 982-993
artikel
15 A self-adaptive and fault-tolerant routing algorithm for wireless sensor networks in microgrids Rui, Lanlan

100 C p. 35-45
artikel
16 A simple and generic paradigm for creating complex networks using the strategy of vertex selecting-and-pairing Wang, Shuangyan

100 C p. 994-1004
artikel
17 A unified two-parallel-branch deep neural network for joint gland contour and segmentation learning Wang, Linbo

100 C p. 316-324
artikel
18 CoCoA++: Delay gradient based congestion control for Internet of Things Rathod, Vishal

100 C p. 1053-1072
artikel
19 Collaborative SLA and reputation-based trust management in cloud federations Papadakis-Vlachopapadopoulos, Konstantinos

100 C p. 498-512
artikel
20 Constructing distributed time-critical applications using cognitive enabled services Simpkin, Chris

100 C p. 70-85
artikel
21 Consumer-facing technology fraud: Economics, attack methods and potential solutions Ali, Mohammed Aamir

100 C p. 408-427
artikel
22 CyberShip-IoT: A dynamic and adaptive SDN-based security policy enforcement framework for ships Sahay, Rishikesh

100 C p. 736-750
artikel
23 Data recovery algorithm under intrusion attack for energy internet Deng, Song

100 C p. 109-121
artikel
24 Deep neural network architectures for social services diagnosis in smart cities Serrano, Emilio

100 C p. 122-131
artikel
25 Degree-biased random walk for large-scale network embedding Zhang, Yunyi

100 C p. 198-209
artikel
26 DUSKG: A fine-grained knowledge graph for effective personalized service recommendation Wang, Haifang

100 C p. 600-617
artikel
27 Dynamic multi-objective optimized replica placement and migration strategies for SaaS applications in edge cloud Li, Chunlin

100 C p. 921-937
artikel
28 Dynamic multi-workflow scheduling: A deadline and cost-aware approach for commercial clouds Arabnejad, Vahid

100 C p. 98-108
artikel
29 Edge-based stochastic network model reveals structural complexity of edges Zhai, Xuemeng

100 C p. 1073-1087
artikel
30 Editorial Board
100 C p. ii
artikel
31 Efficient data packet transmission algorithm for IPV6 mobile vehicle network based on fast switching model with time difference Liang, Wei

100 C p. 132-143
artikel
32 Efficient quantum-based security protocols for information sharing and data protection in 5G networks EL-Latif, Ahmed A. Abd

100 C p. 893-906
artikel
33 Elastic and cost-effective data carrier architecture for smart contract in blockchain Liu, Xiaolong

100 C p. 590-599
artikel
34 Energy-Efficient IoT Service Composition for Concurrent Timed Applications Sun, Mengyu

100 C p. 1017-1030
artikel
35 FCA-based knowledge representation and local generalized linear models to address relevance and diversity in diverse social images Benavent, Xaro

100 C p. 250-265
artikel
36 GC-Wise: A Self-adaptive approach for memory-performance efficiency in Java VMs Simão, J.

100 C p. 674-688
artikel
37 Graph-based and scenario-driven microservice analysis, retrieval, and testing Ma, Shang-Pin

100 C p. 724-735
artikel
38 How to make a digital currency on a blockchain stable Saito, Kenji

100 C p. 58-69
artikel
39 Identifying malicious social media contents using multi-view Context-Aware active learning Das Bhattacharjee, Sreyasee

100 C p. 365-379
artikel
40 Improving fog computing performance via F og-2- F og collaboration Al-khafajiy, Mohammed

100 C p. 266-280
artikel
41 InsideNet: A tool for characterizing convolutional neural networks Muñoz-Martínez, Francisco

100 C p. 298-315
artikel
42 Integrating selective undo of feature-based modeling operations for real-time collaborative CAD systems Lv, Xiao

100 C p. 473-497
artikel
43 KEcruiser: A novel control flow protection for kernel extensions Tian, Donghai

100 C p. 1-9
artikel
44 Lifetime-aware real-time task scheduling on fault-tolerant mixed-criticality embedded systems Cao, Kun

100 C p. 165-175
artikel
45 LoC — A new financial loan management system based on smart contracts Wang, Hao

100 C p. 648-655
artikel
46 Machine learning in the Internet of Things: Designed techniques for smart cities Din, Ikram Ud

100 C p. 826-843
artikel
47 Measuring and rating the energy-efficiency of servers von Kistowski, Jóakim

100 C p. 579-589
artikel
48 Mobile crowdsensing: A survey on privacy-preservation, task management, assignment models, and incentives mechanisms Khan, Fazlullah

100 C p. 456-472
artikel
49 Multiobjective feature selection for microarray data via distributed parallel algorithms Cao, Bin

100 C p. 952-981
artikel
50 Mutation operator integrated ant colony optimization based domestic appliance scheduling for lucrative demand side management Silva, Bhagya Nathali

100 C p. 557-568
artikel
51 Neural network architecture based on gradient boosting for IoT traffic prediction Lopez-Martin, Manuel

100 C p. 656-673
artikel
52 On hybrid network coding for visual traffic surveillance Ling, Chih Wei

100 C p. 440-455
artikel
53 Perception layer security in Internet of Things Khattak, Hasan Ali

100 C p. 144-164
artikel
54 Pipeline-integrity: Scaling the use of authenticated data structures up to the cloud Pennino, Diego

100 C p. 618-647
artikel
55 Profiling the scheduling decisions for handling critical paths in deadline-constrained cloud workflows Taal, Arie

100 C p. 237-249
artikel
56 Realizing integrated prioritized service in the Hadoop cloud system Yeh, Tsozen

100 C p. 176-185
artikel
57 Recommending heterogeneous resources for science gateway applications based on custom templates composition Antequera, Ronny Bazan

100 C p. 281-297
artikel
58 Resource allocation and computation offloading with data security for mobile edge computing Elgendy, Ibrahim A.

100 C p. 531-541
artikel
59 RF-based drone detection and identification using deep learning approaches: An initiative towards a large open source drone database Al-Sa’d, Mohammad F.

100 C p. 86-97
artikel
60 Robust secure communication protocol for smart healthcare system with FPGA implementation Sureshkumar, Venkatasamy

100 C p. 938-951
artikel
61 RRSD: A file replication method for ensuring data reliability and reducing storage consumption in a dynamic Cloud-P2P environment Sun, ShengYao

100 C p. 844-858
artikel
62 Runtime evaluation of cognitive systems for non-deterministic multiple output classification problems Gopalakrishna, Aravind Kota

100 C p. 1005-1016
artikel
63 Secure conjunctive multi-keyword ranked search over encrypted cloud data for multiple data owners Yin, Hui

100 C p. 689-700
artikel
64 Secure virtual machine placement in cloud data centers Agarwal, Amit

100 C p. 210-222
artikel
65 Securing IoTs in distributed blockchain: Analysis, requirements and open issues Moin, Sana

100 C p. 325-343
artikel
66 Smart electronic gastroscope system using a cloud–edge collaborative framework Ding, Shuai

100 C p. 395-407
artikel
67 Social event decomposition for constructing knowledge graph Nguyen, Hoang Long

100 C p. 10-18
artikel
68 Spatio-temporal context-aware collaborative QoS prediction Zhou, Qimin

100 C p. 46-57
artikel
69 Stackelberg model based game theory approach for assortment and selling price planning for small scale online retailers Saberi, Zahra

100 C p. 1088-1102
artikel
70 Statistical modeling of keystroke dynamics samples for the generation of synthetic datasets Migdal, Denis

100 C p. 907-920
artikel
71 Survey of agent-based cloud computing applications De la Prieta, Fernando

100 C p. 223-236
artikel
72 Three party secure data transmission in IoT networks through design of a lightweight authenticated key agreement scheme Ostad-Sharif, Arezou

100 C p. 882-892
artikel
73 Towards extending the SWITCH platform for time-critical, cloud-based CUDA applications: Job scheduling parameters influencing performance Knight, Louise

100 C p. 542-556
artikel
74 Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset Koroniotis, Nickolaos

100 C p. 779-796
artikel
75 Unsupervised multi-stage attack detection framework without details on single-stage attacks Shin, Jinmyeong

100 C p. 811-825
artikel
76 Unsupervised multi-view non-negative for law data feature learning with dual graph-regularization in smart Internet of Things Qiu, Xiru

100 C p. 523-530
artikel
77 Virtual machine allocation and migration based on performance-to-power ratio in energy-efficient clouds Ruan, Xiaojun

100 C p. 380-394
artikel
78 Wale: A solution to share libraries in Docker containers D’Urso, Fabio

100 C p. 513-522
artikel
79 Witness-based searchable encryption with optimal overhead for cloud-edge computing Chen, Yu-Chi

100 C p. 715-723
artikel
                             79 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland