nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A highly efficient chain code for compression using an agent-based modeling simulation of territories in biological beavers
|
Dhou, Khaldoon |
|
|
118 |
C |
p. 1-13 |
artikel |
2 |
AI-guided resource allocation and rescue decision system for medical applications
|
Yu, Ye |
|
|
118 |
C |
p. 485-491 |
artikel |
3 |
A low-cost physical location discovery scheme for large-scale Internet of Things in smart city through joint use of vehicles and UAVs
|
Teng, Haojun |
|
|
118 |
C |
p. 310-326 |
artikel |
4 |
Building the Internet of Things platform for smart maternal healthcare services with wearable devices and cloud computing
|
Li, Xiaoqing |
|
|
118 |
C |
p. 282-296 |
artikel |
5 |
Causal and Δ -causal broadcast in opportunistic networks
|
Guidec, Frédéric |
|
|
118 |
C |
p. 142-156 |
artikel |
6 |
Corrigendum to “CyberShip-IoT: A Dynamic and Adaptive SDN-Based Security Policy Enforcement Framework for Ships” [Future Gener. Comput. Syst. 100 (2019) 736–750]
|
Sahay, Rishikesh |
|
|
118 |
C |
p. 492-494 |
artikel |
7 |
Corrigendum to “Lightweight self-organising distributed monitoring of Fog infrastructures” [Future Gener. Comput. Syst. 114 (2020) 605–618]
|
Forti, Stefano |
|
|
118 |
C |
p. 495 |
artikel |
8 |
DAD: A Distributed Anomaly Detection system using ensemble one-class statistical learning in edge networks
|
Moustafa, Nour |
|
|
118 |
C |
p. 240-251 |
artikel |
9 |
Deflated reputation using multiplicative long short-term memory neural networks
|
Ma, Yixuan |
|
|
118 |
C |
p. 198-207 |
artikel |
10 |
DIDDOS: An approach for detection and identification of Distributed Denial of Service (DDoS) cyberattacks using Gated Recurrent Units (GRU)
|
Rehman, Saif ur |
|
|
118 |
C |
p. 453-466 |
artikel |
11 |
Do-Care: A dynamic ontology reasoning based healthcare monitoring system
|
Elhadj, Hadda Ben |
|
|
118 |
C |
p. 417-431 |
artikel |
12 |
Early detection of cyberbullying on social media networks
|
López-Vizcaíno, Manuel F. |
|
|
118 |
C |
p. 219-229 |
artikel |
13 |
Editorial Board
|
|
|
|
118 |
C |
p. ii |
artikel |
14 |
Effects of hidden layer sizing on CNN fine-tuning
|
Marrone, Stefano |
|
|
118 |
C |
p. 48-55 |
artikel |
15 |
Efficient and reliable forensics using intelligent edge computing
|
Razaque, Abdul |
|
|
118 |
C |
p. 230-239 |
artikel |
16 |
FLAS: A combination of proactive and reactive auto-scaling architecture for distributed services
|
Rampérez, Víctor |
|
|
118 |
C |
p. 56-72 |
artikel |
17 |
Future generation of service-oriented computing systems
|
Yangui, Sami |
|
|
118 |
C |
p. 252-256 |
artikel |
18 |
Generation of overlapping clusters constructing suitable graph for crime report analysis
|
Das, Ankur |
|
|
118 |
C |
p. 339-357 |
artikel |
19 |
Graph-CAT: Graph Co-Attention Networks via local and global attribute augmentations
|
Yang, Liang |
|
|
118 |
C |
p. 170-179 |
artikel |
20 |
Holistic thermal-aware workload management and infrastructure control for heterogeneous data centers using machine learning
|
MirhoseiniNejad, SeyedMorteza |
|
|
118 |
C |
p. 208-218 |
artikel |
21 |
Image/video aesthetic quality management based on fusing 3D CNN and shallow features
|
Jiang, Yujia |
|
|
118 |
C |
p. 118-123 |
artikel |
22 |
Influence maximization in social graphs based on community structure and node coverage gain
|
Wang, Zhixiao |
|
|
118 |
C |
p. 327-338 |
artikel |
23 |
Intelligent Dynamic Malware Detection using Machine Learning in IP Reputation for Forensics Data Analytics
|
Usman, Nighat |
|
|
118 |
C |
p. 124-141 |
artikel |
24 |
It’s about Thyme: On the design and implementation of a time-aware reactive storage system for pervasive edge computing environments
|
Silva, João A. |
|
|
118 |
C |
p. 14-36 |
artikel |
25 |
Learning hierarchical face representation to enhance HCI among medical robots
|
Sun, Dianmin |
|
|
118 |
C |
p. 180-186 |
artikel |
26 |
Massive-scale carbon pollution control and biological fusion under big data context
|
Liu, Yi |
|
|
118 |
C |
p. 257-262 |
artikel |
27 |
Massive-scale graph-clustering-based data management based on multi-metrics
|
Hu, Su |
|
|
118 |
C |
p. 432-437 |
artikel |
28 |
Multi-channel, convolutional attention based neural model for automated diagnostic coding of unstructured patient discharge summaries
|
Mayya, Veena |
|
|
118 |
C |
p. 374-391 |
artikel |
29 |
Multi-modal aggression identification using Convolutional Neural Network and Binary Particle Swarm Optimization
|
Kumari, Kirti |
|
|
118 |
C |
p. 187-197 |
artikel |
30 |
Multi-robot path planning in wireless sensor networks based on jump mechanism PSO and safety gap obstacle avoidance
|
Tian, Shasha |
|
|
118 |
C |
p. 37-47 |
artikel |
31 |
On the optimality of Concurrent Container Clusters Scheduling over heterogeneous smart environments
|
Asensio, A. |
|
|
118 |
C |
p. 157-169 |
artikel |
32 |
On unlinkability and denial of service attacks resilience of whistleblower platforms
|
Phetsouvanh, Silivanxay |
|
|
118 |
C |
p. 438-452 |
artikel |
33 |
Panoramic visual perception and identification of architectural cityscape elements in a virtual-reality environment
|
Zhang, Ruo-Xi |
|
|
118 |
C |
p. 107-117 |
artikel |
34 |
Performance evaluation of Hyperledger Fabric-enabled framework for pervasive peer-to-peer energy trading in smart Cyber–Physical Systems
|
Lohachab, Ankur |
|
|
118 |
C |
p. 392-416 |
artikel |
35 |
Proactive, uncertainty-driven queries management at the edge
|
Kolomvatsos, Kostas |
|
|
118 |
C |
p. 75-93 |
artikel |
36 |
Programming framework and infrastructure for self-adaptation and optimized evolution method for microservice systems in cloud–edge environments
|
He, Xiang |
|
|
118 |
C |
p. 263-281 |
artikel |
37 |
Scalable multi-channel dilated CNN–BiLSTM model with attention mechanism for Chinese textual sentiment analysis
|
Gan, Chenquan |
|
|
118 |
C |
p. 297-309 |
artikel |
38 |
Security and Energy-aware Collaborative Task Offloading in D2D communication
|
Li, Zhongjin |
|
|
118 |
C |
p. 358-373 |
artikel |
39 |
Special issue on workflows in support of large-scale science
|
Ferreira da Silva, Rafael |
|
|
118 |
C |
p. 73-74 |
artikel |
40 |
Tracking sentiment towards news entities from Arabic news on social media
|
Al-Laith, Ali |
|
|
118 |
C |
p. 467-484 |
artikel |
41 |
Using deep belief network to demote web spam
|
Zhuang, Xu |
|
|
118 |
C |
p. 94-106 |
artikel |