nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A blockchain-based clock synchronization Scheme in IoT
|
Fan, Kai |
|
|
101 |
C |
p. 524-533 |
artikel |
2 |
A cloud-agnostic queuing system to support the implementation of deadline-based application execution policies
|
Kiss, Tamas |
|
|
101 |
C |
p. 99-111 |
artikel |
3 |
A comparative analysis of machine learning models for quality pillar assessment of SaaS services by multi-class text classification of users’ reviews
|
Raza, Muhammad |
|
|
101 |
C |
p. 341-371 |
artikel |
4 |
A conceptual model for quality of experience management to provide context-aware eHealth services
|
da Silva, Madalena Pereira |
|
|
101 |
C |
p. 1041-1061 |
artikel |
5 |
Adaptive energy-aware scheduling method in a meteorological cloud
|
Hao, Yongsheng |
|
|
101 |
C |
p. 1142-1157 |
artikel |
6 |
Adaptive interface ecosystems in smart cities control systems
|
Sánchez, Antonio J. |
|
|
101 |
C |
p. 605-620 |
artikel |
7 |
A framework for intelligent analysis of digital cardiotocographic signals from IoMT-based foetal monitoring
|
Lu, Yu |
|
|
101 |
C |
p. 1130-1141 |
artikel |
8 |
A greedy-proof incentive-compatible mechanism for group recruitment in mobile crowd sensing
|
Suliman, Ahmed |
|
|
101 |
C |
p. 1158-1167 |
artikel |
9 |
Analysis and modeling of wireless channel characteristics for Internet of Things scene based on geometric features
|
Shi, Guolong |
|
|
101 |
C |
p. 492-501 |
artikel |
10 |
An approach for iris contact lens detection and classification using ensemble of customized DenseNet and SVM
|
Choudhary, Meenakshi |
|
|
101 |
C |
p. 1259-1270 |
artikel |
11 |
An efficient linkable group signature for payer tracing in anonymous cryptocurrencies
|
Zhang, Lingyue |
|
|
101 |
C |
p. 29-38 |
artikel |
12 |
An enhanced hybrid image watermarking scheme for security of medical and non-medical images based on DWT and 2-D SVD
|
Araghi, Tanya Koohpayeh |
|
|
101 |
C |
p. 1223-1246 |
artikel |
13 |
A new strategy based on approximate dynamic programming to maximize the net revenue of IaaS cloud providers with limited resources
|
Yue, Wenying |
|
|
101 |
C |
p. 1168-1186 |
artikel |
14 |
An improved differential evolution algorithm using Archimedean spiral and neighborhood search based mutation approach for cluster analysis
|
Tarkhaneh, Omid |
|
|
101 |
C |
p. 921-939 |
artikel |
15 |
A novel cascaded deep neural network for analyzing smart phone data for indoor localization
|
Hassan, Md Rafiul |
|
|
101 |
C |
p. 760-769 |
artikel |
16 |
A novel framework for data acquisition and ubiquitous communication provisioning in smart cities
|
Ahuja, Kiran |
|
|
101 |
C |
p. 785-803 |
artikel |
17 |
A novel two-dimensional ECG feature extraction and classification algorithm based on convolution neural network for human authentication
|
Hammad, Mohamed |
|
|
101 |
C |
p. 180-196 |
artikel |
18 |
A PUF-based mutual authentication scheme for Cloud-Edges IoT systems
|
Barbareschi, Mario |
|
|
101 |
C |
p. 246-261 |
artikel |
19 |
A Relevance-based approach for Big Data Exploration
|
Bagozi, Ada |
|
|
101 |
C |
p. 51-69 |
artikel |
20 |
A scalable method of parallel tasks after the extension of machine systems based on equal change rate
|
Zeng, Guosun |
|
|
101 |
C |
p. 680-693 |
artikel |
21 |
A secure privacy preserving deduplication scheme for cloud computing
|
Fan, Yongkai |
|
|
101 |
C |
p. 127-135 |
artikel |
22 |
A short-term energy prediction system based on edge computing for smart city
|
Luo, Haidong |
|
|
101 |
C |
p. 444-457 |
artikel |
23 |
A survey on quality-assurance approximate stream processing and applications
|
Wei, Xiaohui |
|
|
101 |
C |
p. 1062-1080 |
artikel |
24 |
Automated synthesis of mediators for middleware-layer protocol interoperability in the IoT
|
Bouloukakis, Georgios |
|
|
101 |
C |
p. 1271-1294 |
artikel |
25 |
Automatic extraction and integration of behavioural indicators of malware for protection of cyber–physical networks
|
Huda, Shamsul |
|
|
101 |
C |
p. 1247-1258 |
artikel |
26 |
Biometric data on the edge for secure, smart and user tailored access to cloud services
|
Barra, Silvio |
|
|
101 |
C |
p. 534-541 |
artikel |
27 |
Breast mass detection from the digitized X-ray mammograms based on the combination of deep active learning and self-paced learning
|
Shen, Rongbo |
|
|
101 |
C |
p. 668-679 |
artikel |
28 |
CMSS: Sketching based reliable tracking of large network flows
|
Cafaro, Massimo |
|
|
101 |
C |
p. 770-784 |
artikel |
29 |
Composing WoT services with uncertain data
|
Awad, Samir |
|
|
101 |
C |
p. 940-950 |
artikel |
30 |
Congestion control vs. link failure: TCP behavior in mmWave connected vehicular networks
|
Na, Woongsoo |
|
|
101 |
C |
p. 1213-1222 |
artikel |
31 |
Context-aware System for Dynamic Privacy Risk Inference
|
Bou Chaaya, Karam |
|
|
101 |
C |
p. 1096-1111 |
artikel |
32 |
Cross-platform rating prediction method based on review topic
|
Zhang, Huibing |
|
|
101 |
C |
p. 236-245 |
artikel |
33 |
Crypto-ransomware early detection model using novel incremental bagging with enhanced semi-random subspace selection
|
Al-rimy, Bander Ali Saleh |
|
|
101 |
C |
p. 476-491 |
artikel |
34 |
Data-driven ontology generation and evolution towards intelligent service in manufacturing systems
|
Huang, Chengxi |
|
|
101 |
C |
p. 197-207 |
artikel |
35 |
Deadline-constrained workflow scheduling in IaaS clouds with multi-resource packing
|
Zhu, Zhaomeng |
|
|
101 |
C |
p. 880-893 |
artikel |
36 |
Deep convolutional tree networks
|
Amory, Abduljawad A. |
|
|
101 |
C |
p. 152-168 |
artikel |
37 |
Deep Learning for EEG motor imagery classification based on multi-layer CNNs feature fusion
|
Amin, Syed Umar |
|
|
101 |
C |
p. 542-554 |
artikel |
38 |
Design of personnel big data management system based on blockchain
|
Chen, Jian |
|
|
101 |
C |
p. 1122-1129 |
artikel |
39 |
Detection of multiple-mix-attack malicious nodes using perceptron-based trust in IoT networks
|
Liu, Liang |
|
|
101 |
C |
p. 865-879 |
artikel |
40 |
Developing an ontology schema for enriching and linking digital media assets
|
Gutiérrez, Yoan |
|
|
101 |
C |
p. 381-397 |
artikel |
41 |
Dynamic digest based authentication for client–server systems using biometric verification
|
Babamir, Faezeh Sadat |
|
|
101 |
C |
p. 112-126 |
artikel |
42 |
Edge cloud resource expansion and shrinkage based on workload for minimizing the cost
|
Li, Chunlin |
|
|
101 |
C |
p. 327-340 |
artikel |
43 |
Editorial Board
|
|
|
|
101 |
C |
p. ii |
artikel |
44 |
Enacting open science by D4Science
|
Assante, M. |
|
|
101 |
C |
p. 555-563 |
artikel |
45 |
Energy and cost aware scheduling with batch processing for instance-intensive IoT workflows in clouds
|
Wen, Yiping |
|
|
101 |
C |
p. 39-50 |
artikel |
46 |
Energy and performance aware fog computing: A case of DVFS and green renewable energy
|
Toor, Asfa |
|
|
101 |
C |
p. 1112-1121 |
artikel |
47 |
Enhancing the security of FinTech applications with map-based graphical password authentication
|
Meng, Weizhi |
|
|
101 |
C |
p. 1018-1027 |
artikel |
48 |
Evaluating impacts of traffic migration and virtual network functions consolidation on power aware resource allocation algorithms
|
Hejja, Khaled |
|
|
101 |
C |
p. 83-98 |
artikel |
49 |
GREYC-Hashing: Combining biometrics and secret for enhancing the security of protected templates
|
Atighehchi, Kevin |
|
|
101 |
C |
p. 819-830 |
artikel |
50 |
GTSIM-POP: Game theory based secure incentive mechanism and patient-optimized privacy-preserving packet forwarding scheme in m-healthcare social networks
|
Zhou, Jun |
|
|
101 |
C |
p. 70-82 |
artikel |
51 |
Henry gas solubility optimization: A novel physics-based algorithm
|
Hashim, Fatma A. |
|
|
101 |
C |
p. 646-667 |
artikel |
52 |
Integration of VANET and 5G Security: A review of design and implementation issues
|
Hussain, Rasheed |
|
|
101 |
C |
p. 843-864 |
artikel |
53 |
IoT information sharing security mechanism based on blockchain technology
|
Si, Haiping |
|
|
101 |
C |
p. 1028-1040 |
artikel |
54 |
Iris: Secure reliable live-streaming with opportunistic mobile edge cloud offloading
|
Martins, Rolando |
|
|
101 |
C |
p. 272-292 |
artikel |
55 |
Iterated two-phase local search for the Set-Union Knapsack Problem
|
Wei, Zequn |
|
|
101 |
C |
p. 1005-1017 |
artikel |
56 |
Latency-aware failover strategies for containerized web applications in distributed clouds
|
Aldwyan, Yasser |
|
|
101 |
C |
p. 1081-1095 |
artikel |
57 |
Mapping heterogeneous research infrastructure metadata into a unified catalogue for use in a generic virtual research environment
|
Martin, Paul |
|
|
101 |
C |
p. 1-13 |
artikel |
58 |
Measuring the impact of burst buffers on data-intensive scientific workflows
|
Ferreira da Silva, Rafael |
|
|
101 |
C |
p. 208-220 |
artikel |
59 |
Meteor: Optimizing spark-on-yarn for short applications
|
Zhang, Hong |
|
|
101 |
C |
p. 262-271 |
artikel |
60 |
Mitigating stragglers to avoid QoS violation for time-critical applications through dynamic server blacklisting
|
Ouyang, Xue |
|
|
101 |
C |
p. 831-842 |
artikel |
61 |
MOBT: A kleptographically-secure hierarchical-deterministic wallet for multiple offline Bitcoin transactions
|
Wang, Haiyu |
|
|
101 |
C |
p. 315-326 |
artikel |
62 |
Modified deep residual network architecture deployed on serverless framework of IoT platform based on human activity recognition application
|
Keshavarzian, Alireza |
|
|
101 |
C |
p. 14-28 |
artikel |
63 |
Mono and multi-modal biometric systems assessment by a common black box testing framework
|
Cabana, Antoine |
|
|
101 |
C |
p. 293-303 |
artikel |
64 |
MPI jobs within MPI jobs: A practical way of enabling task-level fault-tolerance in HPC workflows
|
Wozniak, Justin M. |
|
|
101 |
C |
p. 576-589 |
artikel |
65 |
Multilayer overlapping community detection using multi-objective optimization
|
Shahmoradi, M.R. |
|
|
101 |
C |
p. 221-235 |
artikel |
66 |
Online travel mode detection method using automated machine learning and feature engineering
|
F. de S. Soares, Elton |
|
|
101 |
C |
p. 1201-1212 |
artikel |
67 |
Optimizing the performance of optimization in the cloud environment–An intelligent auto-scaling approach
|
Simic, Visnja |
|
|
101 |
C |
p. 909-920 |
artikel |
68 |
Performance analysis and optimization for coverage enhancement strategy of Narrow-band Internet of Things
|
Wang, Xiangming |
|
|
101 |
C |
p. 434-443 |
artikel |
69 |
Placing big graph into cloud for parallel processing with a two-phase community-aware approach
|
Hu, Kekun |
|
|
101 |
C |
p. 1187-1200 |
artikel |
70 |
Predicting supply chain risks using machine learning: The trade-off between performance and interpretability
|
Baryannis, George |
|
|
101 |
C |
p. 993-1004 |
artikel |
71 |
Privacy aware decentralized access control system
|
Shafeeq, Sehrish |
|
|
101 |
C |
p. 420-433 |
artikel |
72 |
REMEDI central — expanding and sustaining a medical device community
|
Stirm, Claire |
|
|
101 |
C |
p. 372-380 |
artikel |
73 |
Research on logistics supply chain of iron and steel enterprises based on block chain technology
|
Yang, Aimin |
|
|
101 |
C |
p. 635-645 |
artikel |
74 |
Scalable and dynamic replica consistency maintenance for edge-cloud system
|
Li, Chunlin |
|
|
101 |
C |
p. 590-604 |
artikel |
75 |
SciSpace: A scientific collaboration workspace for geo-distributed HPC data centers
|
Khan, Awais |
|
|
101 |
C |
p. 398-409 |
artikel |
76 |
Seal imprint verification via feature analysis and classifications
|
Chung, Wei-Ho |
|
|
101 |
C |
p. 458-466 |
artikel |
77 |
SecLAP: Secure and lightweight RFID authentication protocol for Medical IoT
|
Aghili, Seyed Farhad |
|
|
101 |
C |
p. 621-634 |
artikel |
78 |
Securing Spatial Data Infrastructures for Distributed Smart City applications and services
|
Chaturvedi, Kanishk |
|
|
101 |
C |
p. 723-736 |
artikel |
79 |
Sensor-based activity recognition: One picture is worth a thousand words
|
Riboni, Daniele |
|
|
101 |
C |
p. 709-722 |
artikel |
80 |
SLA-aware optimal resource allocation for service-oriented networks
|
Baktır, Ahmet Cihat |
|
|
101 |
C |
p. 959-974 |
artikel |
81 |
Smart healthcare framework for ambient assisted living using IoMT and big data analytics techniques
|
Syed, Liyakathunisa |
|
|
101 |
C |
p. 136-151 |
artikel |
82 |
Socio-spatial influence maximization in location-based social networks
|
Hosseinpour, Mohammad |
|
|
101 |
C |
p. 304-314 |
artikel |
83 |
Support for full life cycle cloud-native application management: Dynamic TOSCA and SWITCH IDE
|
Štefanič, Polona |
|
|
101 |
C |
p. 975-982 |
artikel |
84 |
The Science Gateways Community Institute: Collaborations and efforts on international scale
|
Gesing, Sandra |
|
|
101 |
C |
p. 951-958 |
artikel |
85 |
Tiered data management system: Accelerating data processing on HPC systems
|
Cheng, Peng |
|
|
101 |
C |
p. 894-908 |
artikel |
86 |
Tradeoff gain and loss optimization against man-in-the-middle attacks based on game theoretic model
|
Jie, Yingmo |
|
|
101 |
C |
p. 169-179 |
artikel |
87 |
Trust management in a blockchain based fog computing platform with trustless smart oracles
|
Kochovski, Petar |
|
|
101 |
C |
p. 747-759 |
artikel |
88 |
TSH: Easy-to-be distributed partitioning for large-scale graphs
|
Wang, Ning |
|
|
101 |
C |
p. 804-818 |
artikel |
89 |
Two-factor authentication in industrial Internet-of-Things: Attacks, evaluation and new construction
|
Li, Wenting |
|
|
101 |
C |
p. 694-708 |
artikel |
90 |
Two-in-one oblivious signatures
|
Tso, Raylin |
|
|
101 |
C |
p. 467-475 |
artikel |
91 |
uBaaS: A unified blockchain as a service platform
|
Lu, Qinghua |
|
|
101 |
C |
p. 564-575 |
artikel |
92 |
Understanding the composition and evolution of terrorist group networks: A rough set approach
|
Loia, Vincenzo |
|
|
101 |
C |
p. 983-992 |
artikel |
93 |
Value-based cloud price modeling for segmented business to business market
|
Wu, Caesar |
|
|
101 |
C |
p. 502-523 |
artikel |
94 |
Value-based utility implementation in software-defined testbed for sensor data traffic management
|
Alipio, Melchizedek I. |
|
|
101 |
C |
p. 737-746 |
artikel |
95 |
Verifiable ranked search over encrypted data with forward and backward privacy
|
Najafi, Aniseh |
|
|
101 |
C |
p. 410-419 |
artikel |