Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             42 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A double-blockchain solution for agricultural sampled data security in Internet of Things network Ren, Wei

117 C p. 453-461
artikel
2 Aesthetic assessment of website design based on multimodal fusion Liu, Xin

117 C p. 433-438
artikel
3 A fast and scalable authentication scheme in IOT for smart living Li, Jianhua

117 C p. 125-137
artikel
4 Akka framework based on the Actor model for executing distributed Fog Computing applications Srirama, Satish Narayana

117 C p. 439-452
artikel
5 An affective learning-based system for diagnosis and personalized management of diabetes mellitus Omisore, Olatunji Mumini

117 C p. 273-290
artikel
6 An efficient identity-based proxy signcryption using lattice Zhu, Hongfei

117 C p. 321-327
artikel
7 An ensemble machine learning approach through effective feature extraction to classify fake news Hakak, Saqib

117 C p. 47-58
artikel
8 An evolutionary fuzzy scheduler for multi-objective resource allocation in fog computing Wu, Chu-ge

117 C p. 498-509
artikel
9 An identification strategy for unknown attack through the joint learning of space–time features Wang, Huan

117 C p. 145-154
artikel
10 An intelligent vehicle image segmentation and quality assessment model Qu, Zehui

117 C p. 426-432
artikel
11 A reputation score policy and Bayesian game theory based incentivized mechanism for DDoS attacks mitigation and cyber defense Dahiya, Amrita

117 C p. 193-204
artikel
12 Artificial intelligence for securing industrial-based cyber–physical systems Lv, Zhihan

117 C p. 291-298
artikel
13 Chaotic improved PICEA-g-based multi-objective optimization for workflow scheduling in cloud environment Paknejad, Peyman

117 C p. 12-28
artikel
14 Complicated robot activity recognition by quality-aware deep reinforcement learning Li, Xing

117 C p. 480-485
artikel
15 Cryptographic Framework for Role Control Remedy: A Secure Role Engineering mechanism for Single Authority Organizations Rashid, Aqsa

117 C p. 245-258
artikel
16 Data quality-aware task offloading in Mobile Edge Computing: An Optimal Stopping Theory approach Alghamdi, Ibrahim

117 C p. 462-479
artikel
17 Deep Graph neural network-based spammer detection under the perspective of heterogeneous cyberspace Guo, Zhiwei

117 C p. 205-218
artikel
18 Detecting impersonation attacks in cloud computing environments using a centric user profiling approach Kholidy, Hisham A.

117 C p. 299-320
artikel
19 Dynamic fog-to-fog offloading in SDN-based fog computing systems Phan, Linh-An

117 C p. 486-497
artikel
20 Editorial Board
117 C p. ii
artikel
21 Embedding reactive behavior into artifact-centric business process models Oriol, Xavier

117 C p. 97-110
artikel
22 End-to-end online performance data capture and analysis for scientific workflows Papadimitriou, George

117 C p. 387-400
artikel
23 Energy-aware scheduling in edge computing with a clustering method Hao, Yongsheng

117 C p. 259-272
artikel
24 Entity-aware capsule network for multi-class classification of big data: A deep learning approach Jaiswal, Amit Kumar

117 C p. 1-11
artikel
25 Formal approach to thwart against insider attacks: A bio-inspired auto-resilient policy regulation framework Rauf, Usman

117 C p. 412-425
artikel
26 Future DNA computing device and accompanied tool stack: Towards high-throughput computation Yan, Shankai

117 C p. 111-124
artikel
27 Graph convolutional networks for graphs containing missing features Taguchi, Hibiki

117 C p. 155-168
artikel
28 Handwriting dynamics assessment using deep neural network for early identification of Parkinson’s disease Kamran, Iqra

117 C p. 234-244
artikel
29 Hiding sensitive information in eHealth datasets Wu, Jimmy Ming-Tai

117 C p. 169-180
artikel
30 Improving University Faculty Evaluations via multi-view Knowledge Graph Lin, Qika

117 C p. 181-192
artikel
31 I-Scheduler: Iterative scheduling for distributed stream processing systems Eskandari, Leila

117 C p. 219-233
artikel
32 Less-is-Better Protection (LBP) for memory errors in kNNs classifiers Liu, Shanshan

117 C p. 401-411
artikel
33 Multi-view clustering toward aerial images by combining spectral analysis and local refinement Xu, Yuanjin

117 C p. 138-144
artikel
34 Neural machine translating from natural language to SPARQL Yin, Xiaoyu

117 C p. 510-519
artikel
35 Online cloud resource prediction via scalable window waveform sampling on classified workloads Wang, Xiaogang

117 C p. 338-358
artikel
36 Predictive data analysis approach for securing medical data in smart grid healthcare systems Tolba, Amr

117 C p. 87-96
artikel
37 Privacy-preserving blockchain-based federated learning for traffic flow prediction Qi, Yuanhang

117 C p. 328-337
artikel
38 Self-improving system integration: Mastering continuous change Bellman, Kirstie

117 C p. 29-46
artikel
39 SpecMiner: Heuristic-based mining of service behavioral models from interaction traces Kabir, Muhammad Ashad

117 C p. 59-71
artikel
40 Time-constrained and network-aware containers scheduling in GPU era Rodrigues, Leonardo Rosa

117 C p. 72-86
artikel
41 Towards user-centric, switching cost-aware fog node selection strategies Rejiba, Zeineb

117 C p. 359-368
artikel
42 Using deep ensemble for influenza-like illness consultation rate prediction Kristiani, Endah

117 C p. 369-386
artikel
                             42 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland