nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Abstracting PROV provenance graphs: A validity-preserving approach
|
Missier, P. |
|
|
111 |
C |
p. 352-367 |
artikel |
2 |
A citizen science exploration of the X-ray transient sky using the EXTraS science gateway
|
D’Agostino, Daniele |
|
|
111 |
C |
p. 806-818 |
artikel |
3 |
Adaptive virtual machine consolidation framework based on performance-to-power ratio in cloud data centers
|
Ding, Weichao |
|
|
111 |
C |
p. 254-270 |
artikel |
4 |
Aerial image classification by learning quality-aware spatial pyramid model
|
Huang, Fenghua |
|
|
111 |
C |
p. 271-277 |
artikel |
5 |
A Fog caching scheme enabled by ICN for IoT environments
|
Hua, Yining |
|
|
111 |
C |
p. 82-95 |
artikel |
6 |
A framework for topological based map building: A solution to autonomous robot navigation in smart cities
|
Islam, Naveed |
|
|
111 |
C |
p. 644-653 |
artikel |
7 |
Aggregate in my way: Privacy-preserving data aggregation without trusted authority in ICN
|
Xu, Chang |
|
|
111 |
C |
p. 107-116 |
artikel |
8 |
A green, energy, and trust-aware multi-objective cloud coalition formation approach
|
Hadjres, Souad |
|
|
111 |
C |
p. 52-67 |
artikel |
9 |
A lossless compression and encryption mechanism for remote monitoring of ECG data using Huffman coding and CBC-AES
|
Hameed, Mustafa Emad |
|
|
111 |
C |
p. 829-840 |
artikel |
10 |
A machine learning forensics technique to detect post-processing in digital videos
|
Sandoval Orozco, Ana Lucila |
|
|
111 |
C |
p. 199-212 |
artikel |
11 |
An adaptive deep learning model to differentiate syndromes of infectious fever in smart medicine
|
Liu, Zhuo |
|
|
111 |
C |
p. 853-858 |
artikel |
12 |
An approach for realistically simulating the performance of scientific applications on high performance computing systems
|
Mohammed, Ali |
|
|
111 |
C |
p. 617-633 |
artikel |
13 |
An online auction mechanism for time-varying multidimensional resource allocation in clouds
|
Zhang, Jixian |
|
|
111 |
C |
p. 27-38 |
artikel |
14 |
An optimal support vector machine based classification model for sentimental analysis of online product reviews
|
Vijayaragavan, P. |
|
|
111 |
C |
p. 234-240 |
artikel |
15 |
A novel text mining approach for scholar information extraction from web content in Chinese
|
Xie, Xia |
|
|
111 |
C |
p. 859-872 |
artikel |
16 |
A secure cloud-edges computing architecture for metagenomics analysis
|
Verderame, Luca |
|
|
111 |
C |
p. 919-930 |
artikel |
17 |
A secure data deletion scheme for IoT devices through key derivation encryption and data analysis
|
Xiong, Jinbo |
|
|
111 |
C |
p. 741-753 |
artikel |
18 |
A sustainable collaboratory for coastal resilience research
|
Yuan, Shuai |
|
|
111 |
C |
p. 786-792 |
artikel |
19 |
Autonomic Feature Selection using Computational Intelligence
|
Day, Patrick |
|
|
111 |
C |
p. 68-81 |
artikel |
20 |
CAPre: Code-Analysis based Prefetching for Persistent Object Stores
|
Touma, Rizkallah |
|
|
111 |
C |
p. 491-506 |
artikel |
21 |
Challenges to be addressed to realize Internet of Things solutions for smart environments
|
Patrono, Luigi |
|
|
111 |
C |
p. 873-878 |
artikel |
22 |
CLOSURE: A cloud scientific workflow scheduling algorithm based on attack–defense game model
|
Wang, Yawen |
|
|
111 |
C |
p. 460-474 |
artikel |
23 |
Computation of the normalising constant for product-form models of distributed systems with synchronisation
|
Balsamo, Simonetta |
|
|
111 |
C |
p. 475-490 |
artikel |
24 |
Contextual filtering and prioritization of computer application logs for security situational awareness
|
Cinque, Marcello |
|
|
111 |
C |
p. 668-680 |
artikel |
25 |
Detection and diagnosis of chronic kidney disease using deep learning-based heterogeneous modified artificial neural network
|
Ma, Fuzhe |
|
|
111 |
C |
p. 17-26 |
artikel |
26 |
Detection and diagnosis of pancreatic tumor using deep learning-based hierarchical convolutional neural network on the internet of medical things platform
|
Xuan, Wei |
|
|
111 |
C |
p. 132-142 |
artikel |
27 |
Economics of computing services: An overview of economic motivated solutions to Cloud Computing
|
Altmann, Jörn |
|
|
111 |
C |
p. 931-933 |
artikel |
28 |
ECSNeT++ : A simulator for distributed stream processing on edge and cloud environments
|
Amarasinghe, Gayashan |
|
|
111 |
C |
p. 401-418 |
artikel |
29 |
Editorial Board
|
|
|
|
111 |
C |
p. ii |
artikel |
30 |
Efficient development of high performance data analytics in Python
|
Álvarez Cid-Fuentes, Javier |
|
|
111 |
C |
p. 570-581 |
artikel |
31 |
Efficient orchestration of Node-RED IoT workflows using a Vector Symbolic Architecture
|
Simpkin, Chris |
|
|
111 |
C |
p. 117-131 |
artikel |
32 |
Energy and memory-aware software pipelining streaming applications on NoC-based MPSoCs
|
Tariq, Umair Ullah |
|
|
111 |
C |
p. 1-16 |
artikel |
33 |
Erratum to “Smart Health Monitoring and Management System: Toward autonomous wearable sensing for Internet of Things using Big Data Analytics” [Future Gener. Comput. Syst. 91 (2019) 611–619]
|
Din, Sadia |
|
|
111 |
C |
p. 939 |
artikel |
34 |
Experimenting with smart contracts for access control and delegation in IoT
|
Tapas, Nachiket |
|
|
111 |
C |
p. 324-338 |
artikel |
35 |
FTLink: Efficient and flexible link fault tolerance scheme for data plane in Software-Defined Networking
|
Hu, Tao |
|
|
111 |
C |
p. 381-400 |
artikel |
36 |
Handling missing values for mining gradual patterns from NoSQL graph databases
|
Shah, Faaiz |
|
|
111 |
C |
p. 523-538 |
artikel |
37 |
Heart disease identification from patients’ social posts, machine learning solution on Spark
|
Ahmed, Hager |
|
|
111 |
C |
p. 714-722 |
artikel |
38 |
HSE-Voting: A secure high-efficiency electronic voting scheme based on homomorphic signcryption
|
Fan, Xingyue |
|
|
111 |
C |
p. 754-762 |
artikel |
39 |
Human capital evaluation in knowledge-based organizations based on big data analytics
|
Nicolaescu, Sergiu Stefan |
|
|
111 |
C |
p. 654-667 |
artikel |
40 |
ICN with edge for 5G: Exploiting in-network caching in ICN-based edge computing for 5G networks
|
Ullah, Rehmat |
|
|
111 |
C |
p. 159-174 |
artikel |
41 |
Improving Distance-Join Query processing with Voronoi-Diagram based partitioning in SpatialHadoop
|
García-García, Francisco |
|
|
111 |
C |
p. 723-740 |
artikel |
42 |
Intelligent city intelligent medical sharing technology based on internet of things technology
|
Zhao, Xin |
|
|
111 |
C |
p. 226-233 |
artikel |
43 |
Known unknowns: Indeterminacy in authentication in IoT
|
Heydari, Mohammad |
|
|
111 |
C |
p. 278-287 |
artikel |
44 |
Managing authentication and authorization in distributed science gateway middleware
|
Christie, Marcus A. |
|
|
111 |
C |
p. 780-785 |
artikel |
45 |
MARS: A multi-level array representation for simulation data
|
Kim, Minsoo |
|
|
111 |
C |
p. 419-434 |
artikel |
46 |
Mitigating malicious packets attack via vulnerability-aware heterogeneous network devices assignment
|
Ai, Jianjian |
|
|
111 |
C |
p. 841-852 |
artikel |
47 |
Model-based evaluation of combinations of Shuffle and Diversity MTD techniques on the cloud
|
Alavizadeh, Hooman |
|
|
111 |
C |
p. 507-522 |
artikel |
48 |
Modeling and analysis of medical resource allocation based on Timed Colored Petri net
|
Yu, Wangyang |
|
|
111 |
C |
p. 368-374 |
artikel |
49 |
Multi-population differential evolution-assisted Harris hawks optimization: Framework and case studies
|
Chen, Hao |
|
|
111 |
C |
p. 175-198 |
artikel |
50 |
Multi-view face recognition using deep neural networks
|
Zhao, Feng |
|
|
111 |
C |
p. 375-380 |
artikel |
51 |
One scan based high average-utility pattern mining in static and dynamic databases
|
Kim, Jongseong |
|
|
111 |
C |
p. 143-158 |
artikel |
52 |
Optimizing synchronization mechanism for block-based file systems using persistent memory
|
Yang, Chaoshu |
|
|
111 |
C |
p. 288-299 |
artikel |
53 |
Performance analysis and optimality results for data-locality aware tasks scheduling with replicated inputs
|
Beaumont, Olivier |
|
|
111 |
C |
p. 582-598 |
artikel |
54 |
PROUD: Verifiable Privacy-preserving Outsourced Attribute Based SignCryption supporting access policy Update for cloud assisted IoT applications
|
Belguith, Sana |
|
|
111 |
C |
p. 899-918 |
artikel |
55 |
PUC: Packet Update Caching for energy efficient IoT-based Information-Centric Networking
|
Din, Ikram Ud |
|
|
111 |
C |
p. 634-643 |
artikel |
56 |
Retraction notice to “Energy-aware resource management for uplink non-orthogonal multiple access: Multi-agent deep reinforcement learning” [Future Gener. Comput. Syst. 105 (2020) 684–694]
|
Li, Yingfang |
|
|
111 |
C |
p. 940 |
artikel |
57 |
Retraction notice to “High-resolution ultrasound Images in gouty arthritis to Evaluate Relationship between tophi and bone erosion” [Future Gener. Comput. Syst. 98 (2019) 131–134]
|
Yao, Qingrong |
|
|
111 |
C |
p. 938 |
artikel |
58 |
Retraction notice to “Inhibition of KRAS gene mutation on non-small cell lung cancer and its effect on circulating tumor cells” [Future Gener. Comput. Syst. 98 (2019) 104–108]
|
Ji, Yanli |
|
|
111 |
C |
p. 937 |
artikel |
59 |
Scheduling Internet of Things requests to minimize latency in hybrid Fog–Cloud computing
|
Aburukba, Raafat O. |
|
|
111 |
C |
p. 539-551 |
artikel |
60 |
Secure medical data transmission using a fusion of bit mask oriented genetic algorithm, encryption and steganography
|
Pandey, Hari Mohan |
|
|
111 |
C |
p. 213-225 |
artikel |
61 |
Security and trust in cloud application life-cycle management
|
Albanese, Massimiliano |
|
|
111 |
C |
p. 934-936 |
artikel |
62 |
Semantic-based privacy settings negotiation and management
|
Sanchez, Odnan Ref |
|
|
111 |
C |
p. 879-898 |
artikel |
63 |
Slime mould algorithm: A new method for stochastic optimization
|
Li, Shimin |
|
|
111 |
C |
p. 300-323 |
artikel |
64 |
Smart Digital Signatures (SDS): A post-quantum digital signature scheme for distributed ledgers
|
Shahid, Furqan |
|
|
111 |
C |
p. 241-253 |
artikel |
65 |
Smart-troubleshooting connected devices: Concept, challenges and opportunities
|
Caporuscio, Mauro |
|
|
111 |
C |
p. 681-697 |
artikel |
66 |
SMusket: Spark-based DNA error correction on distributed-memory systems
|
Expósito, Roberto R. |
|
|
111 |
C |
p. 698-713 |
artikel |
67 |
Supporting poverty-stricken college students in smart campus
|
Wu, Fan |
|
|
111 |
C |
p. 599-616 |
artikel |
68 |
The DEEDS platform: Support for integrated data and computing across the research lifecycle
|
HewaNadungodage, Chandima |
|
|
111 |
C |
p. 793-805 |
artikel |
69 |
The Social Media Macroscope: A science gateway for research using social media data
|
Yun, Joseph T. |
|
|
111 |
C |
p. 819-828 |
artikel |
70 |
To chain or not to chain: A reinforcement learning approach for blockchain-enabled IoT monitoring applications
|
Mhaisen, Naram |
|
|
111 |
C |
p. 39-51 |
artikel |
71 |
Top- k closed co-occurrence patterns mining with differential privacy over multiple streams
|
Wang, Jinyan |
|
|
111 |
C |
p. 339-351 |
artikel |
72 |
Toward monetizing personal data: A two-sided market analysis
|
Bataineh, Ahmed Saleh |
|
|
111 |
C |
p. 435-459 |
artikel |
73 |
Towards sFlow and adaptive polling sampling for deep learning based DDoS detection in SDN
|
Ujjan, Raja Majid Ali |
|
|
111 |
C |
p. 763-779 |
artikel |
74 |
VoIP network covert channels to enhance privacy and information sharing
|
Saenger, Jens |
|
|
111 |
C |
p. 96-106 |
artikel |
75 |
WolfGraph: The edge-centric graph processing on GPU
|
Zhu, Huanzhou |
|
|
111 |
C |
p. 552-569 |
artikel |