Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             64 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 ABCDM: An Attention-based Bidirectional CNN-RNN Deep Model for sentiment analysis Basiri, Mohammad Ehsan

115 C p. 279-294
artikel
2 Adaptive and aggressive transport protocol to provide QoS in cloud data exchange over Long Fat Networks Briones, Alan

115 C p. 34-44
artikel
3 Adaptive live video streaming on low-cost wireless multihop networks for road traffic surveillance in smart cities Felici-Castell, Santiago

115 C p. 741-755
artikel
4 A discrete PSO-based static load balancing algorithm for distributed simulations in a cloud environment Miao, Zhang

115 C p. 497-516
artikel
5 A drone-based networked system and methods for combating coronavirus disease (COVID-19) pandemic Kumar, Adarsh

115 C p. 1-19
artikel
6 A feedback-based combinatorial fair economical double auction resource allocation model for cloud computing Singhal, Ritu

115 C p. 780-797
artikel
7 Alzheimer’s disease progression detection model based on an early fusion of cost-effective multimodal data El-Sappagh, Shaker

115 C p. 680-699
artikel
8 A metaheuristic method for joint task scheduling and virtual machine placement in cloud data centers Alboaneen, Dabiah

115 C p. 201-212
artikel
9 An architecture to manage security operations for digital service chains Repetto, Matteo

115 C p. 251-266
artikel
10 An automatic multi-view disease detection system via Collective Deep Region-based Feature Representation Zhou, Jianhang

115 C p. 59-75
artikel
11 An efficient and outsourcing-supported attribute-based access control scheme for edge-enabled smart healthcare Zhong, Hong

115 C p. 486-496
artikel
12 A novel Machine Learning-based approach for the detection of SSH botnet infection Martínez Garre, José Tomás

115 C p. 387-396
artikel
13 Applying k-vertex cardinality constraints on a Neo4j graph database Šestak, Martina

115 C p. 459-474
artikel
14 ASiMOV: A self-protecting control application for the smart factory Casalicchio, Emiliano

115 C p. 213-235
artikel
15 A survey on security and privacy of federated learning Mothukuri, Viraaji

115 C p. 619-640
artikel
16 Autonomous mitigation of cyber risks in the Cyber–Physical Systems Kholidy, Hisham A.

115 C p. 171-187
artikel
17 Communication-efficient certificate revocation management for Advanced Metering Infrastructure and IoT Integration Cebe, Mumin

115 C p. 267-278
artikel
18 Configurable DSI partitioned approximate multiplier Hajizadeh, Fahimeh

115 C p. 100-114
artikel
19 Cross-MapReduce: Data transfer reduction in geo-distributed MapReduce Marzuni, Saeed Mirpour

115 C p. 188-200
artikel
20 DeepAMD: Detection and identification of Android malware using high-efficient Deep Artificial Neural Network Imtiaz, Syed Ibrahim

115 C p. 844-856
artikel
21 Design and Implementation of Self-Protecting systems: A Formal Approach Skandylas, Charilaos

115 C p. 421-437
artikel
22 Designing large quantum key distribution networks via medoid-based algorithms García-Cobo, Iván

115 C p. 814-824
artikel
23 Discovering communities from disjoint complex networks using Multi-Layer Ant Colony Optimization Imtiaz, Zar Bakht

115 C p. 659-670
artikel
24 EagleMine: Vision-guided Micro-clusters recognition and collective anomaly detection Feng, Wenjie

115 C p. 236-250
artikel
25 Editorial Board
115 C p. ii
artikel
26 Editorial for FGCS special issue: Computation Intelligence for Energy Internet Zhang, Yan

115 C p. 295-297
artikel
27 Efficient verifiable databases with additional insertion and deletion operations in cloud computing Wang, Qiang

115 C p. 553-567
artikel
28 Energy and performance improvements in stencil computations on multi-node HPC systems with different network and communication topologies Ciżnicki, Miłosz

115 C p. 45-58
artikel
29 Enforcing situation-aware access control to build malware-resilient file systems McIntosh, Timothy

115 C p. 568-582
artikel
30 Estimation of laryngeal closure duration during swallowing without invasive X-rays Mao, Shitong

115 C p. 610-618
artikel
31 Event prediction based on evolutionary event ontology knowledge Mao, Qianren

115 C p. 76-89
artikel
32 Fast energy estimation framework for long-running applications Salinas-Hilburg, Juan Carlos

115 C p. 20-33
artikel
33 Fetal cardiac cycle detection in multi-resource echocardiograms using hybrid classification framework Pu, Bin

115 C p. 825-836
artikel
34 Finding rising stars through hot topics detection Daud, Ali

115 C p. 798-813
artikel
35 Formal approach to thwart against drone discovery attacks: A taxonomy of novel 3D obfuscation mechanisms Naeem, Faizana

115 C p. 374-386
artikel
36 Functional-realistic CT image super-resolution for early-stage pulmonary nodule detection Zhu, Hongbo

115 C p. 475-485
artikel
37 How opinion distortion appears in super-influencer dominated social network Wei, Jianliang

115 C p. 542-552
artikel
38 Improving I/O performance in distributed file systems for flash-based SSDs by access pattern reshaping Kim, Sunggon

115 C p. 365-373
artikel
39 Improving malicious PDF classifier with feature engineering: A data-driven approach Falah, Ahmed

115 C p. 314-326
artikel
40 Information flow perception modeling and optimization of Internet of Things for cloud services Liu, Jian

115 C p. 671-679
artikel
41 Intelligent human hand gesture recognition by local–global fusing quality-aware features Song, Tao

115 C p. 298-303
artikel
42 Internet of things forensic data analysis using machine learning to identify roots of data scavenging Shakeel, P. Mohamed

115 C p. 756-768
artikel
43 Knowledge hypergraph-based approach for data integration and querying: Application to Earth Observation Masmoudi, Maroua

115 C p. 720-740
artikel
44 LEChain: A blockchain-based lawful evidence management scheme for digital forensics Li, Meng

115 C p. 406-420
artikel
45 LoRaMoto: A communication system to provide safety awareness among civilians after an earthquake Pueyo Centelles, Roger

115 C p. 150-170
artikel
46 MAGNETO: Covert channel between air-gapped systems and nearby smartphones via CPU-generated magnetic fields Guri, Mordechai

115 C p. 115-125
artikel
47 Multiple cloud storage mechanism based on blockchain in smart homes Ren, Yongjun

115 C p. 304-313
artikel
48 Mutual teaching for graph convolutional networks Zhan, Kun

115 C p. 837-843
artikel
49 NDN-based IoT with Edge computing Wang, Xiaonan

115 C p. 397-405
artikel
50 Ontology based recommender system using social network data Arafeh, Mohamad

115 C p. 769-779
artikel
51 Predictive methods in cyber defense: Current experience and research challenges Husák, Martin

115 C p. 517-530
artikel
52 Redundancy Coefficient Gradual Up-weighting-based Mutual Information Feature Selection technique for Crypto-ransomware early detection Al-rimy, Bander Ali Saleh

115 C p. 641-658
artikel
53 Reliability in volunteer computing micro-blogging services Bayliss, Christopher

115 C p. 857-871
artikel
54 Resilient composition of drone services for delivery Shahzaad, Babar

115 C p. 335-350
artikel
55 RETRACTED: Intelligent edge computing based on machine learning for smart city Lv, Zhihan

115 C p. 90-99
artikel
56 RIOMS: An intelligent system for operation and maintenance of urban roads using spatio-temporal data in smart cities Yu, Gang

115 C p. 583-609
artikel
57 SDN-based cyber defense: A survey Yurekten, Ozgur

115 C p. 126-149
artikel
58 SeCrowd: Efficient secure interactive crowdsourcing via permission-based signatures Chen, Jing

115 C p. 448-458
artikel
59 Susceptible user search for defending opinion manipulation Tang, Wenyi

115 C p. 531-541
artikel
60 TagSNP-set selection for genotyping using integrated data Wang, Shudong

115 C p. 327-334
artikel
61 The application research of neural network and BP algorithm in stock price pattern classification and prediction Zhang, Dehua

115 C p. 872-879
artikel
62 Thread-level resource consumption control of tenant custom code in a shared JVM for multi-tenant SaaS Makki, Majid

115 C p. 351-364
artikel
63 Time–frequency analysis of keystroke dynamics for user authentication Toosi, Ramin

115 C p. 438-447
artikel
64 Unified programming concepts for unobtrusive integration of cloud-based and local parallel computing Mehrabi, Mostafa

115 C p. 700-719
artikel
                             64 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland