Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             87 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Abnormal behavior detection using resource level to service level metrics mapping in virtualized systems Benmakrelouf, Souhila

102 C p. 680-700
artikel
2 A cloud-edge based data security architecture for sharing and analysing cyber threat information Chadwick, David W

102 C p. 710-722
artikel
3 A decentralised approach for link inference in large signed graphs Muzammal, Muhammad

102 C p. 827-837
artikel
4 A decentralised approach to privacy preserving trajectory mining Talat, Romana

102 C p. 382-392
artikel
5 A deep learning approach for atrial fibrillation signals classification based on convolutional and modified Elman neural network Wang, Jibin

102 C p. 670-679
artikel
6 ADeLe: A description language for approximate hardware Felzmann, Isaías B.

102 C p. 245-258
artikel
7 A general framework based on dynamic multi-objective evolutionary algorithms for handling feature drifts on data streams Sahmoud, Shaaban

102 C p. 42-52
artikel
8 Agent-based Internet of Things: State-of-the-art and research challenges Savaglio, Claudio

102 C p. 1038-1053
artikel
9 AI-enabled emotion-aware robot: The fusion of smart clothing, edge clouds and robotics Yang, Jun

102 C p. 701-709
artikel
10 A machine learning approach for packet loss prediction in science flows Giannakou, Anna

102 C p. 190-197
artikel
11 Analytical modeling of performance indices under epistemic uncertainty applied to cloud computing systems Antonelli, Fabio

102 C p. 746-761
artikel
12 Analyzing urban mobility paths based on users’ activity in social networks Rodríguez, L.

102 C p. 333-346
artikel
13 An efficient Lightweight integrated Blockchain (ELIB) model for IoT security and privacy Mohanty, Sachi Nandan

102 C p. 1027-1037
artikel
14 A new chain coding mechanism for compression stimulated by a virtual environment of a predator–prey ecosystem Dhou, Khaldoon

102 C p. 650-669
artikel
15 A new optimization algorithm for non-stationary time series prediction based on recurrent neural networks Zhang, Yulai

102 C p. 738-745
artikel
16 A non-canonical hybrid metaheuristic approach to adaptive data stream classification Ghomeshi, Hossein

102 C p. 127-139
artikel
17 An optimal delay aware task assignment scheme for wireless SDN networked edge cloudlets G., S.S. Chalapathi

102 C p. 862-875
artikel
18 A novel data-driven robust framework based on machine learning and knowledge graph for disease classification Lei, Zhenfeng

102 C p. 534-548
artikel
19 A novel machine natural language mediation for semantic document exchange in smart city Qin, Peng

102 C p. 810-826
artikel
20 A positional keyword-based approach to inferring fine-grained message formats Jiang, Jiaojiao

102 C p. 369-381
artikel
21 ARIES: Evaluation of a reliable and privacy-preserving European identity management framework Bernabe, Jorge Bernal

102 C p. 409-425
artikel
22 A social emotion classification approach using multi-model fusion Xu, Guangxia

102 C p. 347-356
artikel
23 A stealthy covert storage channel for asymmetric surveillance VoLTE endpoints Zhang, Quanxin

102 C p. 472-480
artikel
24 A UAV-assisted CH election framework for secure data collection in wireless sensor networks Wang, G.

102 C p. 152-162
artikel
25 Automating orthogonal defect classification using machine learning algorithms Lopes, Fábio

102 C p. 932-947
artikel
26 Averaged dependence estimators for DoS attack detection in IoT networks Baig, Zubair A.

102 C p. 198-209
artikel
27 Blockchain data-based cloud data integrity protection mechanism Wei, PengCheng

102 C p. 902-911
artikel
28 BOOTABLE: Bioinformatics benchmark tool suite for applications and hardware Hanussek, Maximilian

102 C p. 1016-1026
artikel
29 Cervical cancer classification using convolutional neural networks and extreme learning machines Ghoneim, Ahmed

102 C p. 643-649
artikel
30 Cognitive multi-agent empowering mobile edge computing for resource caching and collaboration Wang, Rui

102 C p. 66-74
artikel
31 Concurrent container scheduling on heterogeneous clusters with multi-resource constraints Hu, Yang

102 C p. 562-573
artikel
32 Congestion avoidance transmission mechanism based on two-dimensional forwarding Chen, Wenlong

102 C p. 1-13
artikel
33 CO-STAR: A collaborative prediction service for short-term trends on continuous spatio-temporal data Ding, Weilong

102 C p. 481-493
artikel
34 CUDA-JMI: Acceleration of feature selection on heterogeneous systems González-Domínguez, Jorge

102 C p. 426-436
artikel
35 Deep learning to filter SMS Spam Roy, Pradeep Kumar

102 C p. 524-533
artikel
36 Dissecting Ponzi schemes on Ethereum: Identification, analysis, and impact Bartoletti, Massimo

102 C p. 259-277
artikel
37 3D multi-UAV cooperative velocity-aware motion planning Hu, Yujiao

102 C p. 762-774
artikel
38 ECDSA weak randomness in Bitcoin Wang, Ziyu

102 C p. 507-513
artikel
39 Editorial Board
102 C p. ii
artikel
40 Energy-efficient and quality-aware VM consolidation method Li, Zhihua

102 C p. 789-809
artikel
41 Enhancing the classification of social media opinions by optimizing the structural information Vairetti, Carla

102 C p. 838-846
artikel
42 Exploiting potential of deep neural networks by layer-wise fine-grained parallelism Jiang, Wenbin

102 C p. 210-221
artikel
43 Exploring the cognitive process for service task in smart home: A robot service mechanism Zhang, Ying

102 C p. 588-602
artikel
44 Fast and effective Big Data exploration by clustering Ianni, Michele

102 C p. 84-94
artikel
45 GLR: A graph-based latent representation model for successive POI recommendation Lu, Yi-Shu

102 C p. 230-244
artikel
46 π -Hub: Large-scale video learning, storage, and retrieval on heterogeneous hardware platforms Tang, Jie

102 C p. 514-523
artikel
47 Improving locality of explicit one-step methods on GPUs by tiling across stages and time steps Korch, Matthias

102 C p. 889-901
artikel
48 Incentive evolutionary game model for opportunistic social networks Wang, Eric Ke

102 C p. 14-29
artikel
49 Integrating aspect analysis and local outlier factor for intelligent review spam detection You, Lan

102 C p. 163-172
artikel
50 Intelligence and security in big 5G-oriented IoNT: An overview Al-Turjman, Fadi

102 C p. 357-368
artikel
51 Intelligent task prediction and computation offloading based on mobile-edge cloud computing Miao, Yiming

102 C p. 925-931
artikel
52 Interactive three-dimensional visualization of network intrusion detection data for machine learning Zong, Wei

102 C p. 292-306
artikel
53 Internet of Knowledge Choi, Chang

102 C p. 948-949
artikel
54 Investigation in the influences of public opinion indicators on vegetable prices by corpora construction and WeChat article analysis Li, Youzhu

102 C p. 876-888
artikel
55 IoT network slicing on virtual layers of homogeneous data for improved algorithm operation in smart buildings Casado-Vara, Roberto

102 C p. 965-977
artikel
56 Knowledge elicitation based on genetic programming for non destructive testing of critical aerospace systems D’Angelo, Gianni

102 C p. 633-642
artikel
57 Managing a pool of rules for credit card fraud detection by a Game Theory based approach Gianini, Gabriele

102 C p. 549-561
artikel
58 Metamorphic data sources: A user-centric paradigm to consume linked data in interactive workspaces Desolda, Giuseppe

102 C p. 992-1015
artikel
59 Mining high occupancy itemsets Deng, Zhi-Hong

102 C p. 222-229
artikel
60 Monte Carlo computer simulation of a camera system for proton beam range verification in cancer treatment Sun, Xiao-Li

102 C p. 978-991
artikel
61 MudraChain: Blockchain-based framework for automated cheque clearance in financial institutions Kabra, Naman

102 C p. 574-587
artikel
62 Neural network based multi-objective evolutionary algorithm for dynamic workflow scheduling in cloud computing Ismayilov, Goshgar

102 C p. 307-322
artikel
63 On the use of distributed semantics of tweet metadata for user age prediction Pandya, Abhinay

102 C p. 437-452
artikel
64 Optimization of lightweight task offloading strategy for mobile edge computing based on deep reinforcement learning Lu, Haifeng

102 C p. 847-861
artikel
65 Optimization of uplink rate and fronthaul compression in cloud radio access networks Yu, Heejung

102 C p. 465-471
artikel
66 Osmotic computing-based service migration and resource scheduling in Mobile Augmented Reality Networks (MARN) Sharma, Vishal

102 C p. 723-737
artikel
67 Performance analysis of single board computer clusters Basford, Philip J.

102 C p. 278-291
artikel
68 Performance evaluation of elephant flow predictors in data center networking Bezerra, Jeandro de M.

102 C p. 952-964
artikel
69 Physical layer security based on NOMA and AJ for MISOSE channels with an untrusted relay Yu, Heejung

102 C p. 611-618
artikel
70 PoRX: A reputation incentive scheme for blockchain consensus of IIoT Wang, Eric Ke

102 C p. 140-151
artikel
71 Privacy preserving remote multi-server biometric authentication using cancelable biometrics and secret sharing Kaur, Harkeerat

102 C p. 30-41
artikel
72 PR-KELM: Icing level prediction for transmission lines in smart grid Chen, Yunliang

102 C p. 75-83
artikel
73 PTCP: A priority-based transport control protocol for timeout mitigation in commodity data center Ruan, Chang

102 C p. 619-632
artikel
74 Q-learning based collaborative cache allocation in mobile edge computing Chien, Wei-Che

102 C p. 603-610
artikel
75 Quantifying the adaptability of workflow-based service compositions Botangen, Khavee Agustus

102 C p. 95-111
artikel
76 Raphtory: Streaming analysis of distributed temporal graphs Steer, Benjamin

102 C p. 453-464
artikel
77 Reducing network cost of data repair in erasure-coded cross-datacenter storage Bao, Han

102 C p. 494-506
artikel
78 Secure Cloud-Edge Deployments, with Trust Forti, Stefano

102 C p. 775-788
artikel
79 Semantic-aware data quality assessment for image big data Liu, Yu

102 C p. 53-65
artikel
80 Special issue on future networks & pervasive systems Yasar, Ansar-Ul-Haque

102 C p. 950-951
artikel
81 Static malware detection and attribution in android byte-code through an end-to-end deep system Amin, Muhammad

102 C p. 112-126
artikel
82 TD-Root: A trustworthy decentralized DNS root management architecture based on permissioned blockchain He, Guobiao

102 C p. 912-924
artikel
83 The evolution of structural balance in time-varying signed networks Liu, Hua

102 C p. 403-408
artikel
84 Towards automated feature engineering for credit card fraud detection using multi-perspective HMMs Lucas, Yvan

102 C p. 393-402
artikel
85 Two-stage game theoretical framework for IaaS market share dynamics Taghavi, Mona

102 C p. 173-189
artikel
86 Unbalanced private set intersection cardinality protocol with low communication cost Lv, Siyi

102 C p. 1054-1061
artikel
87 Wide-grained capsule network with sentence-level feature to detect meteorological event in social network Shi, Kaize

102 C p. 323-332
artikel
                             87 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland