nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Abnormal behavior detection using resource level to service level metrics mapping in virtualized systems
|
Benmakrelouf, Souhila |
|
|
102 |
C |
p. 680-700 |
artikel |
2 |
A cloud-edge based data security architecture for sharing and analysing cyber threat information
|
Chadwick, David W |
|
|
102 |
C |
p. 710-722 |
artikel |
3 |
A decentralised approach for link inference in large signed graphs
|
Muzammal, Muhammad |
|
|
102 |
C |
p. 827-837 |
artikel |
4 |
A decentralised approach to privacy preserving trajectory mining
|
Talat, Romana |
|
|
102 |
C |
p. 382-392 |
artikel |
5 |
A deep learning approach for atrial fibrillation signals classification based on convolutional and modified Elman neural network
|
Wang, Jibin |
|
|
102 |
C |
p. 670-679 |
artikel |
6 |
ADeLe: A description language for approximate hardware
|
Felzmann, Isaías B. |
|
|
102 |
C |
p. 245-258 |
artikel |
7 |
A general framework based on dynamic multi-objective evolutionary algorithms for handling feature drifts on data streams
|
Sahmoud, Shaaban |
|
|
102 |
C |
p. 42-52 |
artikel |
8 |
Agent-based Internet of Things: State-of-the-art and research challenges
|
Savaglio, Claudio |
|
|
102 |
C |
p. 1038-1053 |
artikel |
9 |
AI-enabled emotion-aware robot: The fusion of smart clothing, edge clouds and robotics
|
Yang, Jun |
|
|
102 |
C |
p. 701-709 |
artikel |
10 |
A machine learning approach for packet loss prediction in science flows
|
Giannakou, Anna |
|
|
102 |
C |
p. 190-197 |
artikel |
11 |
Analytical modeling of performance indices under epistemic uncertainty applied to cloud computing systems
|
Antonelli, Fabio |
|
|
102 |
C |
p. 746-761 |
artikel |
12 |
Analyzing urban mobility paths based on users’ activity in social networks
|
Rodríguez, L. |
|
|
102 |
C |
p. 333-346 |
artikel |
13 |
An efficient Lightweight integrated Blockchain (ELIB) model for IoT security and privacy
|
Mohanty, Sachi Nandan |
|
|
102 |
C |
p. 1027-1037 |
artikel |
14 |
A new chain coding mechanism for compression stimulated by a virtual environment of a predator–prey ecosystem
|
Dhou, Khaldoon |
|
|
102 |
C |
p. 650-669 |
artikel |
15 |
A new optimization algorithm for non-stationary time series prediction based on recurrent neural networks
|
Zhang, Yulai |
|
|
102 |
C |
p. 738-745 |
artikel |
16 |
A non-canonical hybrid metaheuristic approach to adaptive data stream classification
|
Ghomeshi, Hossein |
|
|
102 |
C |
p. 127-139 |
artikel |
17 |
An optimal delay aware task assignment scheme for wireless SDN networked edge cloudlets
|
G., S.S. Chalapathi |
|
|
102 |
C |
p. 862-875 |
artikel |
18 |
A novel data-driven robust framework based on machine learning and knowledge graph for disease classification
|
Lei, Zhenfeng |
|
|
102 |
C |
p. 534-548 |
artikel |
19 |
A novel machine natural language mediation for semantic document exchange in smart city
|
Qin, Peng |
|
|
102 |
C |
p. 810-826 |
artikel |
20 |
A positional keyword-based approach to inferring fine-grained message formats
|
Jiang, Jiaojiao |
|
|
102 |
C |
p. 369-381 |
artikel |
21 |
ARIES: Evaluation of a reliable and privacy-preserving European identity management framework
|
Bernabe, Jorge Bernal |
|
|
102 |
C |
p. 409-425 |
artikel |
22 |
A social emotion classification approach using multi-model fusion
|
Xu, Guangxia |
|
|
102 |
C |
p. 347-356 |
artikel |
23 |
A stealthy covert storage channel for asymmetric surveillance VoLTE endpoints
|
Zhang, Quanxin |
|
|
102 |
C |
p. 472-480 |
artikel |
24 |
A UAV-assisted CH election framework for secure data collection in wireless sensor networks
|
Wang, G. |
|
|
102 |
C |
p. 152-162 |
artikel |
25 |
Automating orthogonal defect classification using machine learning algorithms
|
Lopes, Fábio |
|
|
102 |
C |
p. 932-947 |
artikel |
26 |
Averaged dependence estimators for DoS attack detection in IoT networks
|
Baig, Zubair A. |
|
|
102 |
C |
p. 198-209 |
artikel |
27 |
Blockchain data-based cloud data integrity protection mechanism
|
Wei, PengCheng |
|
|
102 |
C |
p. 902-911 |
artikel |
28 |
BOOTABLE: Bioinformatics benchmark tool suite for applications and hardware
|
Hanussek, Maximilian |
|
|
102 |
C |
p. 1016-1026 |
artikel |
29 |
Cervical cancer classification using convolutional neural networks and extreme learning machines
|
Ghoneim, Ahmed |
|
|
102 |
C |
p. 643-649 |
artikel |
30 |
Cognitive multi-agent empowering mobile edge computing for resource caching and collaboration
|
Wang, Rui |
|
|
102 |
C |
p. 66-74 |
artikel |
31 |
Concurrent container scheduling on heterogeneous clusters with multi-resource constraints
|
Hu, Yang |
|
|
102 |
C |
p. 562-573 |
artikel |
32 |
Congestion avoidance transmission mechanism based on two-dimensional forwarding
|
Chen, Wenlong |
|
|
102 |
C |
p. 1-13 |
artikel |
33 |
CO-STAR: A collaborative prediction service for short-term trends on continuous spatio-temporal data
|
Ding, Weilong |
|
|
102 |
C |
p. 481-493 |
artikel |
34 |
CUDA-JMI: Acceleration of feature selection on heterogeneous systems
|
González-Domínguez, Jorge |
|
|
102 |
C |
p. 426-436 |
artikel |
35 |
Deep learning to filter SMS Spam
|
Roy, Pradeep Kumar |
|
|
102 |
C |
p. 524-533 |
artikel |
36 |
Dissecting Ponzi schemes on Ethereum: Identification, analysis, and impact
|
Bartoletti, Massimo |
|
|
102 |
C |
p. 259-277 |
artikel |
37 |
3D multi-UAV cooperative velocity-aware motion planning
|
Hu, Yujiao |
|
|
102 |
C |
p. 762-774 |
artikel |
38 |
ECDSA weak randomness in Bitcoin
|
Wang, Ziyu |
|
|
102 |
C |
p. 507-513 |
artikel |
39 |
Editorial Board
|
|
|
|
102 |
C |
p. ii |
artikel |
40 |
Energy-efficient and quality-aware VM consolidation method
|
Li, Zhihua |
|
|
102 |
C |
p. 789-809 |
artikel |
41 |
Enhancing the classification of social media opinions by optimizing the structural information
|
Vairetti, Carla |
|
|
102 |
C |
p. 838-846 |
artikel |
42 |
Exploiting potential of deep neural networks by layer-wise fine-grained parallelism
|
Jiang, Wenbin |
|
|
102 |
C |
p. 210-221 |
artikel |
43 |
Exploring the cognitive process for service task in smart home: A robot service mechanism
|
Zhang, Ying |
|
|
102 |
C |
p. 588-602 |
artikel |
44 |
Fast and effective Big Data exploration by clustering
|
Ianni, Michele |
|
|
102 |
C |
p. 84-94 |
artikel |
45 |
GLR: A graph-based latent representation model for successive POI recommendation
|
Lu, Yi-Shu |
|
|
102 |
C |
p. 230-244 |
artikel |
46 |
π -Hub: Large-scale video learning, storage, and retrieval on heterogeneous hardware platforms
|
Tang, Jie |
|
|
102 |
C |
p. 514-523 |
artikel |
47 |
Improving locality of explicit one-step methods on GPUs by tiling across stages and time steps
|
Korch, Matthias |
|
|
102 |
C |
p. 889-901 |
artikel |
48 |
Incentive evolutionary game model for opportunistic social networks
|
Wang, Eric Ke |
|
|
102 |
C |
p. 14-29 |
artikel |
49 |
Integrating aspect analysis and local outlier factor for intelligent review spam detection
|
You, Lan |
|
|
102 |
C |
p. 163-172 |
artikel |
50 |
Intelligence and security in big 5G-oriented IoNT: An overview
|
Al-Turjman, Fadi |
|
|
102 |
C |
p. 357-368 |
artikel |
51 |
Intelligent task prediction and computation offloading based on mobile-edge cloud computing
|
Miao, Yiming |
|
|
102 |
C |
p. 925-931 |
artikel |
52 |
Interactive three-dimensional visualization of network intrusion detection data for machine learning
|
Zong, Wei |
|
|
102 |
C |
p. 292-306 |
artikel |
53 |
Internet of Knowledge
|
Choi, Chang |
|
|
102 |
C |
p. 948-949 |
artikel |
54 |
Investigation in the influences of public opinion indicators on vegetable prices by corpora construction and WeChat article analysis
|
Li, Youzhu |
|
|
102 |
C |
p. 876-888 |
artikel |
55 |
IoT network slicing on virtual layers of homogeneous data for improved algorithm operation in smart buildings
|
Casado-Vara, Roberto |
|
|
102 |
C |
p. 965-977 |
artikel |
56 |
Knowledge elicitation based on genetic programming for non destructive testing of critical aerospace systems
|
D’Angelo, Gianni |
|
|
102 |
C |
p. 633-642 |
artikel |
57 |
Managing a pool of rules for credit card fraud detection by a Game Theory based approach
|
Gianini, Gabriele |
|
|
102 |
C |
p. 549-561 |
artikel |
58 |
Metamorphic data sources: A user-centric paradigm to consume linked data in interactive workspaces
|
Desolda, Giuseppe |
|
|
102 |
C |
p. 992-1015 |
artikel |
59 |
Mining high occupancy itemsets
|
Deng, Zhi-Hong |
|
|
102 |
C |
p. 222-229 |
artikel |
60 |
Monte Carlo computer simulation of a camera system for proton beam range verification in cancer treatment
|
Sun, Xiao-Li |
|
|
102 |
C |
p. 978-991 |
artikel |
61 |
MudraChain: Blockchain-based framework for automated cheque clearance in financial institutions
|
Kabra, Naman |
|
|
102 |
C |
p. 574-587 |
artikel |
62 |
Neural network based multi-objective evolutionary algorithm for dynamic workflow scheduling in cloud computing
|
Ismayilov, Goshgar |
|
|
102 |
C |
p. 307-322 |
artikel |
63 |
On the use of distributed semantics of tweet metadata for user age prediction
|
Pandya, Abhinay |
|
|
102 |
C |
p. 437-452 |
artikel |
64 |
Optimization of lightweight task offloading strategy for mobile edge computing based on deep reinforcement learning
|
Lu, Haifeng |
|
|
102 |
C |
p. 847-861 |
artikel |
65 |
Optimization of uplink rate and fronthaul compression in cloud radio access networks
|
Yu, Heejung |
|
|
102 |
C |
p. 465-471 |
artikel |
66 |
Osmotic computing-based service migration and resource scheduling in Mobile Augmented Reality Networks (MARN)
|
Sharma, Vishal |
|
|
102 |
C |
p. 723-737 |
artikel |
67 |
Performance analysis of single board computer clusters
|
Basford, Philip J. |
|
|
102 |
C |
p. 278-291 |
artikel |
68 |
Performance evaluation of elephant flow predictors in data center networking
|
Bezerra, Jeandro de M. |
|
|
102 |
C |
p. 952-964 |
artikel |
69 |
Physical layer security based on NOMA and AJ for MISOSE channels with an untrusted relay
|
Yu, Heejung |
|
|
102 |
C |
p. 611-618 |
artikel |
70 |
PoRX: A reputation incentive scheme for blockchain consensus of IIoT
|
Wang, Eric Ke |
|
|
102 |
C |
p. 140-151 |
artikel |
71 |
Privacy preserving remote multi-server biometric authentication using cancelable biometrics and secret sharing
|
Kaur, Harkeerat |
|
|
102 |
C |
p. 30-41 |
artikel |
72 |
PR-KELM: Icing level prediction for transmission lines in smart grid
|
Chen, Yunliang |
|
|
102 |
C |
p. 75-83 |
artikel |
73 |
PTCP: A priority-based transport control protocol for timeout mitigation in commodity data center
|
Ruan, Chang |
|
|
102 |
C |
p. 619-632 |
artikel |
74 |
Q-learning based collaborative cache allocation in mobile edge computing
|
Chien, Wei-Che |
|
|
102 |
C |
p. 603-610 |
artikel |
75 |
Quantifying the adaptability of workflow-based service compositions
|
Botangen, Khavee Agustus |
|
|
102 |
C |
p. 95-111 |
artikel |
76 |
Raphtory: Streaming analysis of distributed temporal graphs
|
Steer, Benjamin |
|
|
102 |
C |
p. 453-464 |
artikel |
77 |
Reducing network cost of data repair in erasure-coded cross-datacenter storage
|
Bao, Han |
|
|
102 |
C |
p. 494-506 |
artikel |
78 |
Secure Cloud-Edge Deployments, with Trust
|
Forti, Stefano |
|
|
102 |
C |
p. 775-788 |
artikel |
79 |
Semantic-aware data quality assessment for image big data
|
Liu, Yu |
|
|
102 |
C |
p. 53-65 |
artikel |
80 |
Special issue on future networks & pervasive systems
|
Yasar, Ansar-Ul-Haque |
|
|
102 |
C |
p. 950-951 |
artikel |
81 |
Static malware detection and attribution in android byte-code through an end-to-end deep system
|
Amin, Muhammad |
|
|
102 |
C |
p. 112-126 |
artikel |
82 |
TD-Root: A trustworthy decentralized DNS root management architecture based on permissioned blockchain
|
He, Guobiao |
|
|
102 |
C |
p. 912-924 |
artikel |
83 |
The evolution of structural balance in time-varying signed networks
|
Liu, Hua |
|
|
102 |
C |
p. 403-408 |
artikel |
84 |
Towards automated feature engineering for credit card fraud detection using multi-perspective HMMs
|
Lucas, Yvan |
|
|
102 |
C |
p. 393-402 |
artikel |
85 |
Two-stage game theoretical framework for IaaS market share dynamics
|
Taghavi, Mona |
|
|
102 |
C |
p. 173-189 |
artikel |
86 |
Unbalanced private set intersection cardinality protocol with low communication cost
|
Lv, Siyi |
|
|
102 |
C |
p. 1054-1061 |
artikel |
87 |
Wide-grained capsule network with sentence-level feature to detect meteorological event in social network
|
Shi, Kaize |
|
|
102 |
C |
p. 323-332 |
artikel |