nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Adaptive request scheduling for the I/O forwarding layer using reinforcement learning
|
Bez, Jean Luca |
|
|
112 |
C |
p. 1156-1169 |
artikel |
2 |
A fully automated approach to a complete Semantic Table Interpretation
|
Cremaschi, Marco |
|
|
112 |
C |
p. 478-500 |
artikel |
3 |
An efficient dataflow accelerator for scientific applications
|
Ye, Xiaochun |
|
|
112 |
C |
p. 580-588 |
artikel |
4 |
An interoperable semantic service toolset with domain ontology for automated decision support in the end-of-life domain
|
Pease, Sarogini Grace |
|
|
112 |
C |
p. 848-858 |
artikel |
5 |
A novel deep learning method for query task execution time prediction in graph database
|
Chu, Zheng |
|
|
112 |
C |
p. 534-548 |
artikel |
6 |
Apollon: Towards a citizen science methodology for urban environmental monitoring
|
Longo, Antonella |
|
|
112 |
C |
p. 899-912 |
artikel |
7 |
A review of sentiment analysis research in Arabic language
|
Oueslati, Oumaima |
|
|
112 |
C |
p. 408-430 |
artikel |
8 |
A smart energy and reliability aware scheduling algorithm for workflow execution in DVFS-enabled cloud environment
|
Hassan, Hadeer A. |
|
|
112 |
C |
p. 431-448 |
artikel |
9 |
A systematic map on verification and validation of emergent behavior in software engineering research
|
Brings, Jennifer |
|
|
112 |
C |
p. 1010-1037 |
artikel |
10 |
Augmented whale feature selection for IoT attacks: Structure, analysis and applications
|
Mafarja, Majdi |
|
|
112 |
C |
p. 18-40 |
artikel |
11 |
A wearable system for cardiopulmonary assessment and personalized respiratory training
|
Cui, Jiajia |
|
|
112 |
C |
p. 1131-1140 |
artikel |
12 |
Blockchain-based semi-autonomous ransomware
|
Delgado-Mohatar, Oscar |
|
|
112 |
C |
p. 589-603 |
artikel |
13 |
Blockchain voting: Publicly verifiable online voting protocol without trusted tallying authorities
|
Yang, Xuechao |
|
|
112 |
C |
p. 859-874 |
artikel |
14 |
bwSlicer: A bandwidth slicing framework for cloud data centers
|
Al-Dulaimy, Auday |
|
|
112 |
C |
p. 767-784 |
artikel |
15 |
Capturing and Analyzing Provenance from Spark-based Scientific Workflows with SAMbA-RaP
|
Guedes, Thaylon |
|
|
112 |
C |
p. 658-669 |
artikel |
16 |
City space type recognition by leveraging deeply-learned topological features
|
Liu, Sufang |
|
|
112 |
C |
p. 624-629 |
artikel |
17 |
Cost effective stream workflow scheduling to handle application structural changes
|
Barika, Mutaz |
|
|
112 |
C |
p. 348-361 |
artikel |
18 |
Curious Containers: A framework for computational reproducibility in life sciences with support for Deep Learning applications
|
Jansen, Christoph |
|
|
112 |
C |
p. 209-227 |
artikel |
19 |
DADIM: A distance adjustment dynamic influence map model
|
Lu, Xiaofeng |
|
|
112 |
C |
p. 1122-1130 |
artikel |
20 |
DCEM: A data cell evolution model for service composition based on bigraph theory
|
Lu, Jiawei |
|
|
112 |
C |
p. 330-347 |
artikel |
21 |
Deep Parametric Active Contour Model for Neurofibromatosis Segmentation
|
Wu, Xiangqiong |
|
|
112 |
C |
p. 58-66 |
artikel |
22 |
Delegated content erasure in IPFS
|
Politou, Eugenia |
|
|
112 |
C |
p. 956-964 |
artikel |
23 |
Design and application of fog computing and Internet of Things service platform for smart city
|
Zhang, Changhao |
|
|
112 |
C |
p. 630-640 |
artikel |
24 |
Designing a GPU-parallel algorithm for raw SAR data compression: A focus on parallel performance estimation
|
Romano, Diego |
|
|
112 |
C |
p. 695-708 |
artikel |
25 |
Developing accurate and scalable simulators of production workflow management systems with WRENCH
|
Casanova, Henri |
|
|
112 |
C |
p. 162-175 |
artikel |
26 |
Dynamic power optimization for secondary wearable biosensors in e-healthcare leveraging cognitive WBSNs with imperfect spectrum sensing
|
Zhang, Long |
|
|
112 |
C |
p. 67-92 |
artikel |
27 |
Dynamic redirection of real-time data streams for elastic stream computing
|
Sun, Dawei |
|
|
112 |
C |
p. 193-208 |
artikel |
28 |
Editorial Board
|
|
|
|
112 |
C |
p. ii |
artikel |
29 |
Editorial for FGCS Special issue on “Time-critical Applications on Software-defined Infrastructures”
|
Zhao, Zhiming |
|
|
112 |
C |
p. 1170-1171 |
artikel |
30 |
Efficient and fair Wi-Fi and LTE-U coexistence via communications over content centric networking
|
Chi, Kuo |
|
|
112 |
C |
p. 297-306 |
artikel |
31 |
Empirical evaluation of Linked Data visualization tools
|
Desimoni, Federico |
|
|
112 |
C |
p. 258-282 |
artikel |
32 |
English text quality analysis based on recurrent neural network and semantic segmentation
|
Luo, Xiaoyu |
|
|
112 |
C |
p. 507-511 |
artikel |
33 |
Enhanced Lightning Network (off-chain)-based micropayment in IoT ecosystems
|
Robert, Jérémy |
|
|
112 |
C |
p. 283-296 |
artikel |
34 |
Enhancing cyber–physical systems with hybrid smart city cyber security architecture for secure public data-smart network
|
Sengan, Sudhakar |
|
|
112 |
C |
p. 724-737 |
artikel |
35 |
Establishing effective communications in disaster affected areas and artificial intelligence based detection using social media platform
|
Raza, Mohsin |
|
|
112 |
C |
p. 1057-1069 |
artikel |
36 |
Estimation of the foetal heart rate baseline based on singular spectrum analysis and empirical mode decomposition
|
Lu, Yu |
|
|
112 |
C |
p. 126-135 |
artikel |
37 |
Exploring the computational cost of machine learning at the edge for human-centric Internet of Things
|
Gómez-Carmona, Oihane |
|
|
112 |
C |
p. 670-683 |
artikel |
38 |
Extending the OpenCHK Model with advanced checkpoint features
|
Maroñas, Marcos |
|
|
112 |
C |
p. 738-750 |
artikel |
39 |
Fair and cache blocking aware warp scheduling for concurrent kernel execution on GPU
|
Zhao, Chen |
|
|
112 |
C |
p. 1093-1105 |
artikel |
40 |
Fast load balance parallel graph analytics with an automatic graph data structure selection algorithm
|
Sun, Jiawen |
|
|
112 |
C |
p. 612-623 |
artikel |
41 |
Forecasting power-efficiency related key performance indicators for modern data centers using LSTMs
|
Shoukourian, Hayk |
|
|
112 |
C |
p. 362-382 |
artikel |
42 |
Game theoretic interpretability for learning based preoperative gliomas grading
|
Ma, Laifa |
|
|
112 |
C |
p. 1-10 |
artikel |
43 |
Heterogeneity-aware elastic provisioning in cloud-assisted edge computing systems
|
Li, Chunlin |
|
|
112 |
C |
p. 1106-1121 |
artikel |
44 |
High-quality topological structures selection for smart city land spatial understanding and governance
|
Xu, Zhiyi |
|
|
112 |
C |
p. 709-714 |
artikel |
45 |
HIVE: A cross-platform, modular visualization framework for large-scale data sets
|
Ono, Kenji |
|
|
112 |
C |
p. 875-883 |
artikel |
46 |
Honing and proofing Astrophysical codes on the road to Exascale. Experiences from code modernization on many-core systems
|
Cielo, Salvatore |
|
|
112 |
C |
p. 93-107 |
artikel |
47 |
Human satisfaction as the ultimate goal in ridesharing
|
Levinger, Chaya |
|
|
112 |
C |
p. 176-184 |
artikel |
48 |
Image quality assessment model based on multi-feature fusion of energy Internet of Things
|
Zhu, Hongpeng |
|
|
112 |
C |
p. 501-506 |
artikel |
49 |
Image retrieval via learning content-based deep quality model towards big data
|
Yang, Yikun |
|
|
112 |
C |
p. 243-249 |
artikel |
50 |
Improved Long Short-Term Memory based anomaly detection with concept drift adaptive method for supporting IoT services
|
Xu, Rongbin |
|
|
112 |
C |
p. 228-242 |
artikel |
51 |
Improved routing in dynamic environments with moving obstacles using a hybrid Fuzzy-Genetic algorithm
|
Fatemi Aghda, Seyed Ali |
|
|
112 |
C |
p. 250-257 |
artikel |
52 |
Indistinguishability and unextractablility of password-based authentication in blockchain
|
Huang, Xinyi |
|
|
112 |
C |
p. 561-566 |
artikel |
53 |
Iota Tangle: A cryptocurrency to communicate Internet-of-Things data
|
Silvano, Wellington Fernandes |
|
|
112 |
C |
p. 307-319 |
artikel |
54 |
IoT embedded cloud-based intelligent power quality monitoring system for industrial drive application
|
Raja Singh, R. |
|
|
112 |
C |
p. 884-898 |
artikel |
55 |
Job scheduling for distributed machine learning in optical WAN
|
Liu, Ling |
|
|
112 |
C |
p. 549-560 |
artikel |
56 |
Lightweight privacy preserving data aggregation with batch verification for smart grid
|
Guo, Cheng |
|
|
112 |
C |
p. 512-523 |
artikel |
57 |
MeltdownDetector: A runtime approach for detecting meltdown attacks
|
Akyildiz, Taha Atahan |
|
|
112 |
C |
p. 136-147 |
artikel |
58 |
MSGC: Multi-scale grid clustering by fusing analytical granularity and visual cognition for detecting hierarchical spatial patterns
|
Gui, Zhipeng |
|
|
112 |
C |
p. 1038-1056 |
artikel |
59 |
Multi-entity sentiment analysis using self-attention based hierarchical dilated convolutional neural network
|
Gan, Chenquan |
|
|
112 |
C |
p. 116-125 |
artikel |
60 |
Multi-resident type recognition based on ambient sensors activity
|
Li, Qingjuan |
|
|
112 |
C |
p. 108-115 |
artikel |
61 |
New Parallel and Distributed Tools and Algorithms for Life Sciences
|
Carretero, Jesus |
|
|
112 |
C |
p. 1174-1176 |
artikel |
62 |
Ontology-driven aspect-based sentiment analysis classification: An infodemiological case study regarding infectious diseases in Latin America
|
García-Díaz, José Antonio |
|
|
112 |
C |
p. 641-657 |
artikel |
63 |
Open Visualization Environment (OVE): A web framework for scalable rendering of data visualizations
|
Fernando, Senaka |
|
|
112 |
C |
p. 785-799 |
artikel |
64 |
Optimizing sensors placement in complex networks for localization of hidden signal source: A review
|
Paluch, Robert |
|
|
112 |
C |
p. 1070-1092 |
artikel |
65 |
Outsourced privacy-aware task allocation with flexible expressions in crowdsourcing
|
Xu, Jie |
|
|
112 |
C |
p. 383-393 |
artikel |
66 |
PAChain: Private, authenticated & auditable consortium blockchain and its implementation
|
Yuen, Tsz Hon |
|
|
112 |
C |
p. 913-929 |
artikel |
67 |
Participatory intercomparison strategy for terrestrial carbon cycle models based on a service-oriented architecture
|
Yue, Songshan |
|
|
112 |
C |
p. 449-466 |
artikel |
68 |
Performance and energy consumption of HPC workloads on a cluster based on Arm ThunderX2 CPU
|
Mantovani, Filippo |
|
|
112 |
C |
p. 800-818 |
artikel |
69 |
PPCensor: Architecture for real-time pornography detection in video streaming
|
Mallmann, Jackson |
|
|
112 |
C |
p. 945-955 |
artikel |
70 |
QHSE: An efficient privacy-preserving scheme for blockchain-based transactions
|
Bai, Shuangjie |
|
|
112 |
C |
p. 930-944 |
artikel |
71 |
QoE-aware user allocation in edge computing systems with dynamic QoS
|
Lai, Phu |
|
|
112 |
C |
p. 684-694 |
artikel |
72 |
Randomized nonlinear one-class support vector machines with bounded loss function to detect of outliers for large scale IoT data
|
Razzak, Imran |
|
|
112 |
C |
p. 715-723 |
artikel |
73 |
REHAB-C: Recommendations for Energy HABits Change
|
Sardianos, Christos |
|
|
112 |
C |
p. 394-407 |
artikel |
74 |
RL-OPRA: Reinforcement Learning for Online and Proactive Resource Allocation of crowdsourced live videos
|
Baccour, Emna |
|
|
112 |
C |
p. 982-995 |
artikel |
75 |
Safety integrity through self-adaptation for multi-sensor event detection: Methodology and case-study
|
Flammini, Francesco |
|
|
112 |
C |
p. 965-981 |
artikel |
76 |
Secure healthcare monitoring framework integrating NDN-based IoT with edge cloud
|
Wang, Xiaonan |
|
|
112 |
C |
p. 320-329 |
artikel |
77 |
Self-assemble-featured Internet of Things
|
Lemoine, Frédéric |
|
|
112 |
C |
p. 41-57 |
artikel |
78 |
Self-supervised network traffic management for DDoS mitigation within the ISP domain
|
Ko, Ili |
|
|
112 |
C |
p. 524-533 |
artikel |
79 |
Semi-automatic validation of cycle-accurate simulation infrastructures: The case for gem5-x86
|
Cebrian, Juan M. |
|
|
112 |
C |
p. 832-847 |
artikel |
80 |
Slow-movement particle swarm optimization algorithms for scheduling security-critical tasks in resource-limited mobile edge computing
|
Zhang, Yi |
|
|
112 |
C |
p. 148-161 |
artikel |
81 |
Special issue on “Data Exploration in the Web 3.0 Age”
|
Atzori, Maurizio |
|
|
112 |
C |
p. 1177-1179 |
artikel |
82 |
Special Issue on FinTech Security and Privacy
|
Yeh, Kuo-Hui |
|
|
112 |
C |
p. 1172-1173 |
artikel |
83 |
Special issue on Trusted Cloud-Edges Computations
|
Ardagna, Claudio A. |
|
|
112 |
C |
p. 1180-1183 |
artikel |
84 |
Swarms on the 3-sphere for online clustering of multivariate time series and data streams
|
Crnkić, Aladin |
|
|
112 |
C |
p. 11-17 |
artikel |
85 |
The road to DNS privacy
|
Yan, Zhiwei |
|
|
112 |
C |
p. 604-611 |
artikel |
86 |
Throughput optimization for Storm-based processing of stream data on clouds
|
Cao, Huiyan |
|
|
112 |
C |
p. 567-579 |
artikel |
87 |
Topic-based crossing-workflow fragment discovery
|
Zhou, Zhangbing |
|
|
112 |
C |
p. 1141-1155 |
artikel |
88 |
Toward a correct and optimal time-aware cloud resource allocation to business processes
|
Ben Halima, Rania |
|
|
112 |
C |
p. 751-766 |
artikel |
89 |
Towards enhanced MRI by using a multiple back end programming framework
|
Garcia-Blas, Javier |
|
|
112 |
C |
p. 467-477 |
artikel |
90 |
Trust based multi-agent cooperative load balancing system (TCLBS)
|
Premarathne, U.S. |
|
|
112 |
C |
p. 185-192 |
artikel |
91 |
Tweet recommender model using adaptive neuro-fuzzy inference system
|
Jain, Deepak Kumar |
|
|
112 |
C |
p. 996-1009 |
artikel |
92 |
Worker recruitment with cost and time constraints in Mobile Crowd Sensing
|
Lu, An-qi |
|
|
112 |
C |
p. 819-831 |
artikel |