Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             42 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A distributed Monte Carlo based linear algebra solver applied to the analysis of large complex networks Magalhães, Filipe

127 C p. 320-330
artikel
2 A formal analysis of performance-security tradeoffs under frequent task reconfigurations Alhozaimy, Sarah

127 C p. 252-262
artikel
3 AI-assisted Computer Network Operations testbed for Nature-Inspired Cyber Security based adaptive defense simulation and analysis Shandilya, Shishir Kumar

127 C p. 297-308
artikel
4 A lightweight supervised intrusion detection mechanism for IoT networks Roy, Souradip

127 C p. 276-285
artikel
5 An adaptive federated learning scheme with differential privacy preserving Wu, Xiang

127 C p. 362-372
artikel
6 An Anti-Malicious Task Allocation Mechanism in Crowdsensing Systems Wu, Xiaocan

127 C p. 347-361
artikel
7 An end-to-end deep learning model for robust smooth filtering identification Zhang, Yujin

127 C p. 263-275
artikel
8 Anonymous Traceability protocol based on Group Signature for Blockchain Gong, Bei

127 C p. 160-167
artikel
9 A privacy-protected intelligent crowdsourcing application of IoT based on the reinforcement learning Ren, Yingying

127 C p. 56-69
artikel
10 A Q-learning approach for the autoscaling of scientific workflows in the Cloud Garí, Yisel

127 C p. 168-180
artikel
11 A secure and lightweight certificateless hybrid signcryption scheme for Internet of Things Gong, Bei

127 C p. 23-30
artikel
12 Autoencoder-based feature construction for IoT attacks clustering Haseeb, Junaid

127 C p. 487-502
artikel
13 Automated evolutionary approach for the design of composite machine learning pipelines Nikitin, Nikolay O.

127 C p. 109-125
artikel
14 A wearable-based posture recognition system with AI-assisted approach for healthcare IoT Hong, Zhen

127 C p. 286-296
artikel
15 Blockchain-enabled feedback-based combinatorial double auction for cloud markets Ma, Xuyang

127 C p. 225-239
artikel
16 Byte embeddings for file fragment classification Haque, Md Enamul

127 C p. 448-461
artikel
17 Cost-effective crowdsourced join queries for entity resolution without prior knowledge Yin, Bo

127 C p. 240-251
artikel
18 CVFuzz: Detecting complexity vulnerabilities in OpenCL kernels via automated pathological input generation Li, Wentao

127 C p. 384-395
artikel
19 DAVINCI: online and Dynamic Adaptation of eVolvable vIrtual Network services over Cloud Infrastructures Lahlou, Laaziz

127 C p. 396-408
artikel
20 Discovering prerequisite relations from educational documents through word embeddings Gasparetti, Fabio

127 C p. 31-41
artikel
21 Editorial Board
127 C p. ii
artikel
22 Enabling cross-continent provider fairness in educational recommender systems Gómez, Elizabeth

127 C p. 435-447
artikel
23 Energy-efficient and secure mobile fog-based cloud for the Internet of Things Razaque, Abdul

127 C p. 1-13
artikel
24 Exploiting multi-level parallel metaheuristics and heterogeneous computing to boost phylogenetics Santander-Jiménez, Sergio

127 C p. 208-224
artikel
25 Fault localization based on wide & deep learning model by mining software behavior Wang, TianTian

127 C p. 309-319
artikel
26 Feature recognition of irregular pellet images by regularized Extreme Learning Machine in combination with fractal theory Liu, Weixing

127 C p. 92-108
artikel
27 FlexVF: Adaptive network device services in a virtualized environment Ekane, Brice

127 C p. 14-22
artikel
28 Guest Editorial of the FGCS Special Issue on Advances in Intelligent Systems for Online Education Bonnin, Geoffray

127 C p. 331-333
artikel
29 Hybrid market-based resources allocation in Mobile Edge Computing systems under stochastic information Huang, Xiaowen

127 C p. 80-91
artikel
30 Is it a good move? Mining effective tutoring strategies from human–human tutorial dialogues Lin, Jionghao

127 C p. 194-207
artikel
31 Lattice-based public key searchable encryption with fine-grained access control for edge computing Wang, Peng

127 C p. 373-383
artikel
32 Learning behaviours data in programming education: Community analysis and outcome prediction with cleaned data Mai, Tai Tan

127 C p. 42-55
artikel
33 Load balancing with traffic isolation in data center networks Zhang, Tao

127 C p. 126-141
artikel
34 Network embedding based link prediction in dynamic networks Tripathi, Shashi Prakash

127 C p. 409-420
artikel
35 Optimal data placement strategy considering capacity limitation and load balancing in geographically distributed cloud Li, Chunlin

127 C p. 142-159
artikel
36 Prostate cancer classification from ultrasound and MRI images using deep learning based Explainable Artificial Intelligence Hassan, Md. Rafiul

127 C p. 462-472
artikel
37 PSO-weighted random forest for attractive tourism spots recommendation Zhang, Yuran

127 C p. 421-425
artikel
38 Radial Basis Function Network with Differential Privacy Bugshan, Neda

127 C p. 473-486
artikel
39 Real-time epileptic seizure recognition using Bayesian genetic whale optimizer and adaptive machine learning Anter, Ahmed M.

127 C p. 426-434
artikel
40 Reliable customer analysis using federated learning and exploring deep-attention edge intelligence Ahmed, Usman

127 C p. 70-79
artikel
41 Scenario prediction of public health emergencies using infectious disease dynamics model and dynamic Bayes Gao, Shan

127 C p. 334-346
artikel
42 XSRU-IoMT: Explainable simple recurrent units for threat detection in Internet of Medical Things networks Khan, Izhar Ahmed

127 C p. 181-193
artikel
                             42 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland