Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             95 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A blockchain-based clock synchronization Scheme in IoT Fan, Kai

101 C p. 524-533
artikel
2 A cloud-agnostic queuing system to support the implementation of deadline-based application execution policies Kiss, Tamas

101 C p. 99-111
artikel
3 A comparative analysis of machine learning models for quality pillar assessment of SaaS services by multi-class text classification of users’ reviews Raza, Muhammad

101 C p. 341-371
artikel
4 A conceptual model for quality of experience management to provide context-aware eHealth services da Silva, Madalena Pereira

101 C p. 1041-1061
artikel
5 Adaptive energy-aware scheduling method in a meteorological cloud Hao, Yongsheng

101 C p. 1142-1157
artikel
6 Adaptive interface ecosystems in smart cities control systems Sánchez, Antonio J.

101 C p. 605-620
artikel
7 A framework for intelligent analysis of digital cardiotocographic signals from IoMT-based foetal monitoring Lu, Yu

101 C p. 1130-1141
artikel
8 A greedy-proof incentive-compatible mechanism for group recruitment in mobile crowd sensing Suliman, Ahmed

101 C p. 1158-1167
artikel
9 Analysis and modeling of wireless channel characteristics for Internet of Things scene based on geometric features Shi, Guolong

101 C p. 492-501
artikel
10 An approach for iris contact lens detection and classification using ensemble of customized DenseNet and SVM Choudhary, Meenakshi

101 C p. 1259-1270
artikel
11 An efficient linkable group signature for payer tracing in anonymous cryptocurrencies Zhang, Lingyue

101 C p. 29-38
artikel
12 An enhanced hybrid image watermarking scheme for security of medical and non-medical images based on DWT and 2-D SVD Araghi, Tanya Koohpayeh

101 C p. 1223-1246
artikel
13 A new strategy based on approximate dynamic programming to maximize the net revenue of IaaS cloud providers with limited resources Yue, Wenying

101 C p. 1168-1186
artikel
14 An improved differential evolution algorithm using Archimedean spiral and neighborhood search based mutation approach for cluster analysis Tarkhaneh, Omid

101 C p. 921-939
artikel
15 A novel cascaded deep neural network for analyzing smart phone data for indoor localization Hassan, Md Rafiul

101 C p. 760-769
artikel
16 A novel framework for data acquisition and ubiquitous communication provisioning in smart cities Ahuja, Kiran

101 C p. 785-803
artikel
17 A novel two-dimensional ECG feature extraction and classification algorithm based on convolution neural network for human authentication Hammad, Mohamed

101 C p. 180-196
artikel
18 A PUF-based mutual authentication scheme for Cloud-Edges IoT systems Barbareschi, Mario

101 C p. 246-261
artikel
19 A Relevance-based approach for Big Data Exploration Bagozi, Ada

101 C p. 51-69
artikel
20 A scalable method of parallel tasks after the extension of machine systems based on equal change rate Zeng, Guosun

101 C p. 680-693
artikel
21 A secure privacy preserving deduplication scheme for cloud computing Fan, Yongkai

101 C p. 127-135
artikel
22 A short-term energy prediction system based on edge computing for smart city Luo, Haidong

101 C p. 444-457
artikel
23 A survey on quality-assurance approximate stream processing and applications Wei, Xiaohui

101 C p. 1062-1080
artikel
24 Automated synthesis of mediators for middleware-layer protocol interoperability in the IoT Bouloukakis, Georgios

101 C p. 1271-1294
artikel
25 Automatic extraction and integration of behavioural indicators of malware for protection of cyber–physical networks Huda, Shamsul

101 C p. 1247-1258
artikel
26 Biometric data on the edge for secure, smart and user tailored access to cloud services Barra, Silvio

101 C p. 534-541
artikel
27 Breast mass detection from the digitized X-ray mammograms based on the combination of deep active learning and self-paced learning Shen, Rongbo

101 C p. 668-679
artikel
28 CMSS: Sketching based reliable tracking of large network flows Cafaro, Massimo

101 C p. 770-784
artikel
29 Composing WoT services with uncertain data Awad, Samir

101 C p. 940-950
artikel
30 Congestion control vs. link failure: TCP behavior in mmWave connected vehicular networks Na, Woongsoo

101 C p. 1213-1222
artikel
31 Context-aware System for Dynamic Privacy Risk Inference Bou Chaaya, Karam

101 C p. 1096-1111
artikel
32 Cross-platform rating prediction method based on review topic Zhang, Huibing

101 C p. 236-245
artikel
33 Crypto-ransomware early detection model using novel incremental bagging with enhanced semi-random subspace selection Al-rimy, Bander Ali Saleh

101 C p. 476-491
artikel
34 Data-driven ontology generation and evolution towards intelligent service in manufacturing systems Huang, Chengxi

101 C p. 197-207
artikel
35 Deadline-constrained workflow scheduling in IaaS clouds with multi-resource packing Zhu, Zhaomeng

101 C p. 880-893
artikel
36 Deep convolutional tree networks Amory, Abduljawad A.

101 C p. 152-168
artikel
37 Deep Learning for EEG motor imagery classification based on multi-layer CNNs feature fusion Amin, Syed Umar

101 C p. 542-554
artikel
38 Design of personnel big data management system based on blockchain Chen, Jian

101 C p. 1122-1129
artikel
39 Detection of multiple-mix-attack malicious nodes using perceptron-based trust in IoT networks Liu, Liang

101 C p. 865-879
artikel
40 Developing an ontology schema for enriching and linking digital media assets Gutiérrez, Yoan

101 C p. 381-397
artikel
41 Dynamic digest based authentication for client–server systems using biometric verification Babamir, Faezeh Sadat

101 C p. 112-126
artikel
42 Edge cloud resource expansion and shrinkage based on workload for minimizing the cost Li, Chunlin

101 C p. 327-340
artikel
43 Editorial Board
101 C p. ii
artikel
44 Enacting open science by D4Science Assante, M.

101 C p. 555-563
artikel
45 Energy and cost aware scheduling with batch processing for instance-intensive IoT workflows in clouds Wen, Yiping

101 C p. 39-50
artikel
46 Energy and performance aware fog computing: A case of DVFS and green renewable energy Toor, Asfa

101 C p. 1112-1121
artikel
47 Enhancing the security of FinTech applications with map-based graphical password authentication Meng, Weizhi

101 C p. 1018-1027
artikel
48 Evaluating impacts of traffic migration and virtual network functions consolidation on power aware resource allocation algorithms Hejja, Khaled

101 C p. 83-98
artikel
49 GREYC-Hashing: Combining biometrics and secret for enhancing the security of protected templates Atighehchi, Kevin

101 C p. 819-830
artikel
50 GTSIM-POP: Game theory based secure incentive mechanism and patient-optimized privacy-preserving packet forwarding scheme in m-healthcare social networks Zhou, Jun

101 C p. 70-82
artikel
51 Henry gas solubility optimization: A novel physics-based algorithm Hashim, Fatma A.

101 C p. 646-667
artikel
52 Integration of VANET and 5G Security: A review of design and implementation issues Hussain, Rasheed

101 C p. 843-864
artikel
53 IoT information sharing security mechanism based on blockchain technology Si, Haiping

101 C p. 1028-1040
artikel
54 Iris: Secure reliable live-streaming with opportunistic mobile edge cloud offloading Martins, Rolando

101 C p. 272-292
artikel
55 Iterated two-phase local search for the Set-Union Knapsack Problem Wei, Zequn

101 C p. 1005-1017
artikel
56 Latency-aware failover strategies for containerized web applications in distributed clouds Aldwyan, Yasser

101 C p. 1081-1095
artikel
57 Mapping heterogeneous research infrastructure metadata into a unified catalogue for use in a generic virtual research environment Martin, Paul

101 C p. 1-13
artikel
58 Measuring the impact of burst buffers on data-intensive scientific workflows Ferreira da Silva, Rafael

101 C p. 208-220
artikel
59 Meteor: Optimizing spark-on-yarn for short applications Zhang, Hong

101 C p. 262-271
artikel
60 Mitigating stragglers to avoid QoS violation for time-critical applications through dynamic server blacklisting Ouyang, Xue

101 C p. 831-842
artikel
61 MOBT: A kleptographically-secure hierarchical-deterministic wallet for multiple offline Bitcoin transactions Wang, Haiyu

101 C p. 315-326
artikel
62 Modified deep residual network architecture deployed on serverless framework of IoT platform based on human activity recognition application Keshavarzian, Alireza

101 C p. 14-28
artikel
63 Mono and multi-modal biometric systems assessment by a common black box testing framework Cabana, Antoine

101 C p. 293-303
artikel
64 MPI jobs within MPI jobs: A practical way of enabling task-level fault-tolerance in HPC workflows Wozniak, Justin M.

101 C p. 576-589
artikel
65 Multilayer overlapping community detection using multi-objective optimization Shahmoradi, M.R.

101 C p. 221-235
artikel
66 Online travel mode detection method using automated machine learning and feature engineering F. de S. Soares, Elton

101 C p. 1201-1212
artikel
67 Optimizing the performance of optimization in the cloud environment–An intelligent auto-scaling approach Simic, Visnja

101 C p. 909-920
artikel
68 Performance analysis and optimization for coverage enhancement strategy of Narrow-band Internet of Things Wang, Xiangming

101 C p. 434-443
artikel
69 Placing big graph into cloud for parallel processing with a two-phase community-aware approach Hu, Kekun

101 C p. 1187-1200
artikel
70 Predicting supply chain risks using machine learning: The trade-off between performance and interpretability Baryannis, George

101 C p. 993-1004
artikel
71 Privacy aware decentralized access control system Shafeeq, Sehrish

101 C p. 420-433
artikel
72 REMEDI central — expanding and sustaining a medical device community Stirm, Claire

101 C p. 372-380
artikel
73 Research on logistics supply chain of iron and steel enterprises based on block chain technology Yang, Aimin

101 C p. 635-645
artikel
74 Scalable and dynamic replica consistency maintenance for edge-cloud system Li, Chunlin

101 C p. 590-604
artikel
75 SciSpace: A scientific collaboration workspace for geo-distributed HPC data centers Khan, Awais

101 C p. 398-409
artikel
76 Seal imprint verification via feature analysis and classifications Chung, Wei-Ho

101 C p. 458-466
artikel
77 SecLAP: Secure and lightweight RFID authentication protocol for Medical IoT Aghili, Seyed Farhad

101 C p. 621-634
artikel
78 Securing Spatial Data Infrastructures for Distributed Smart City applications and services Chaturvedi, Kanishk

101 C p. 723-736
artikel
79 Sensor-based activity recognition: One picture is worth a thousand words Riboni, Daniele

101 C p. 709-722
artikel
80 SLA-aware optimal resource allocation for service-oriented networks Baktır, Ahmet Cihat

101 C p. 959-974
artikel
81 Smart healthcare framework for ambient assisted living using IoMT and big data analytics techniques Syed, Liyakathunisa

101 C p. 136-151
artikel
82 Socio-spatial influence maximization in location-based social networks Hosseinpour, Mohammad

101 C p. 304-314
artikel
83 Support for full life cycle cloud-native application management: Dynamic TOSCA and SWITCH IDE Štefanič, Polona

101 C p. 975-982
artikel
84 The Science Gateways Community Institute: Collaborations and efforts on international scale Gesing, Sandra

101 C p. 951-958
artikel
85 Tiered data management system: Accelerating data processing on HPC systems Cheng, Peng

101 C p. 894-908
artikel
86 Tradeoff gain and loss optimization against man-in-the-middle attacks based on game theoretic model Jie, Yingmo

101 C p. 169-179
artikel
87 Trust management in a blockchain based fog computing platform with trustless smart oracles Kochovski, Petar

101 C p. 747-759
artikel
88 TSH: Easy-to-be distributed partitioning for large-scale graphs Wang, Ning

101 C p. 804-818
artikel
89 Two-factor authentication in industrial Internet-of-Things: Attacks, evaluation and new construction Li, Wenting

101 C p. 694-708
artikel
90 Two-in-one oblivious signatures Tso, Raylin

101 C p. 467-475
artikel
91 uBaaS: A unified blockchain as a service platform Lu, Qinghua

101 C p. 564-575
artikel
92 Understanding the composition and evolution of terrorist group networks: A rough set approach Loia, Vincenzo

101 C p. 983-992
artikel
93 Value-based cloud price modeling for segmented business to business market Wu, Caesar

101 C p. 502-523
artikel
94 Value-based utility implementation in software-defined testbed for sensor data traffic management Alipio, Melchizedek I.

101 C p. 737-746
artikel
95 Verifiable ranked search over encrypted data with forward and backward privacy Najafi, Aniseh

101 C p. 410-419
artikel
                             95 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland