nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A guide to design uncertainty-aware self-adaptive components in Cyber–Physical Systems
|
Al-Ali, Rima |
|
|
128 |
C |
p. 466-489 |
artikel |
2 |
AHP based relay selection strategy for energy harvesting wireless sensor networks
|
Wan, Jie |
|
|
128 |
C |
p. 36-44 |
artikel |
3 |
A multi-level collaborative framework for elastic stream computing systems
|
Sun, Dawei |
|
|
128 |
C |
p. 117-131 |
artikel |
4 |
An effective hybrid collaborative algorithm for energy-efficient distributed permutation flow-shop inverse scheduling
|
Mou, Jianhui |
|
|
128 |
C |
p. 521-537 |
artikel |
5 |
A new detection method for LDoS attacks based on data mining
|
Tang, Dan |
|
|
128 |
C |
p. 73-87 |
artikel |
6 |
A platform for integrating heterogeneous data and developing smart city applications
|
Pereira, Jorge |
|
|
128 |
C |
p. 552-566 |
artikel |
7 |
Application of new digital signal processing technology based on distributed cloud computing in electronic information engineering
|
Sheng, Hu |
|
|
128 |
C |
p. 443-450 |
artikel |
8 |
A systematic review of intelligent assistants
|
Islas-Cota, Eduardo |
|
|
128 |
C |
p. 45-62 |
artikel |
9 |
A trusted proof mechanism of data source for smart city
|
Liu, Jianli |
|
|
128 |
C |
p. 349-364 |
artikel |
10 |
Auction method to prevent bid-rigging strategies in mobile blockchain edge computing resource allocation
|
Qiu, Hao |
|
|
128 |
C |
p. 1-15 |
artikel |
11 |
A user-oriented model for Oracles’ Gas price prediction
|
Pierro, Giuseppe Antonio |
|
|
128 |
C |
p. 142-157 |
artikel |
12 |
Big data analysis of the Internet of Things in the digital twins of smart city based on deep learning
|
Li, Xiaoming |
|
|
128 |
C |
p. 167-177 |
artikel |
13 |
Blockchain-enabled fraud discovery through abnormal smart contract detection on Ethereum
|
Liu, Lin |
|
|
128 |
C |
p. 158-166 |
artikel |
14 |
CLARA: A novel clustering-based resource-allocation mechanism for exploiting low-availability complementarities of voluntarily contributed nodes
|
Gonzalo, Sergio |
|
|
128 |
C |
p. 248-264 |
artikel |
15 |
Communication-efficient hierarchical federated learning for IoT heterogeneous systems with imbalanced data
|
Abdellatif, Alaa Awad |
|
|
128 |
C |
p. 406-419 |
artikel |
16 |
Constructing a prior-dependent graph for data clustering and dimension reduction in the edge of AIoT
|
Guo, Tan |
|
|
128 |
C |
p. 381-394 |
artikel |
17 |
Context and auto-interaction are all you need: Towards context embedding based QoS prediction via automatic feature interaction for high quality cloud API delivery
|
Chen, Zhen |
|
|
128 |
C |
p. 265-281 |
artikel |
18 |
Continual representation learning for node classification in power-law graphs
|
Lombardo, Gianfranco |
|
|
128 |
C |
p. 420-428 |
artikel |
19 |
Discrete bacterial foraging optimization for community detection in networks
|
Yang, Bo |
|
|
128 |
C |
p. 192-204 |
artikel |
20 |
Distributed workflows with Jupyter
|
Colonnelli, Iacopo |
|
|
128 |
C |
p. 282-298 |
artikel |
21 |
Editorial Board
|
|
|
|
128 |
C |
p. ii |
artikel |
22 |
Efficient algorithms for victim item selection in privacy-preserving utility mining
|
Jangra, Shalini |
|
|
128 |
C |
p. 219-234 |
artikel |
23 |
Efficient privacy-preserving data replication in fog-enabled IoT
|
Sarwar, Kinza |
|
|
128 |
C |
p. 538-551 |
artikel |
24 |
Emerging topics in defending networked systems
|
Wendzel, Steffen |
|
|
128 |
C |
p. 317-319 |
artikel |
25 |
Fairness-oriented computation offloading for cloud-assisted edge computing
|
Guo, Kai |
|
|
128 |
C |
p. 132-141 |
artikel |
26 |
Federated intelligence of anomaly detection agent in IoTMD-enabled Diabetes Management Control System
|
Astillo, Philip Virgil |
|
|
128 |
C |
p. 395-405 |
artikel |
27 |
GRU-based deep learning approach for network intrusion alert prediction
|
Ansari, Mohammad Samar |
|
|
128 |
C |
p. 235-247 |
artikel |
28 |
Handling missing data in near real-time environmental monitoring: A system and a review of selected methods
|
Zhang, Yifan |
|
|
128 |
C |
p. 63-72 |
artikel |
29 |
Non-interactive verifiable privacy-preserving federated learning
|
Xu, Yi |
|
|
128 |
C |
p. 365-380 |
artikel |
30 |
Offloading dependent tasks in multi-access edge computing: A multi-objective reinforcement learning approach
|
Song, Fuhong |
|
|
128 |
C |
p. 333-348 |
artikel |
31 |
Outage analysis of mmWave-NOMA transmission in the presence of LOS and NLOS paths
|
Pishvaei, Seyed Mahmoud |
|
|
128 |
C |
p. 88-101 |
artikel |
32 |
PEWOBS: An efficient Bayesian network learning approach based on permutation and extensible ordering-based search
|
Xu, Ruihong |
|
|
128 |
C |
p. 505-520 |
artikel |
33 |
Reconfigurable content-addressable memory (CAM) on FPGAs: A tutorial and survey
|
Irfan, Muhammad |
|
|
128 |
C |
p. 451-465 |
artikel |
34 |
Retraction notice to “A hybrid whale optimization algorithm based on local search strategy for the permutation flow shop scheduling problem” [Future Gener. Comput. Syst. 85 (2018) 129–145]
|
Abdel-Basset, Mohamed |
|
|
128 |
C |
p. 567 |
artikel |
35 |
Retraction notice to “Internet of Things (IoT) and its impact on supply chain: A framework for building smart, secure and efficient systems” [Future Gener. Comput. Syst. 86 (2018) 614–628]
|
Abdel-Basset, Mohamed |
|
|
128 |
C |
p. 568 |
artikel |
36 |
Retraction notice to “Three-way decisions based on neutrosophic sets and AHP-QFD framework for supplier selection problem” [Future Gener. Comput. Syst. 89 (2018) 19–30]
|
Abdel-Basset, Mohamed |
|
|
128 |
C |
p. 569 |
artikel |
37 |
RLDS: An explainable residual learning diagnosis system for fetal congenital heart disease
|
Qiao, Sibo |
|
|
128 |
C |
p. 205-218 |
artikel |
38 |
Scalable adaptive optimizations for stream-based workflows in multi-HPC-clusters and cloud infrastructures
|
Liang, Liang |
|
|
128 |
C |
p. 102-116 |
artikel |
39 |
Serverless computing for Internet of Things: A systematic literature review
|
Cassel, Gustavo André Setti |
|
|
128 |
C |
p. 299-316 |
artikel |
40 |
SHA 3 and Keccak variants computation speeds on constrained devices
|
Vandervelden, Thibaut |
|
|
128 |
C |
p. 28-35 |
artikel |
41 |
Towards fully verifiable forward secure privacy preserving keyword search for IoT outsourced data
|
Liu, Yaru |
|
|
128 |
C |
p. 178-191 |
artikel |
42 |
Vehicular traffic flow prediction using deployed traffic counters in a city
|
Almeida, Ana |
|
|
128 |
C |
p. 429-442 |
artikel |
43 |
WfCommons: A framework for enabling scientific workflow research and development
|
Coleman, Tainã |
|
|
128 |
C |
p. 16-27 |
artikel |
44 |
Workload forecasting and energy state estimation in cloud data centres: ML-centric approach
|
Khan, Tahseen |
|
|
128 |
C |
p. 320-332 |
artikel |
45 |
zkrpChain: Towards multi-party privacy-preserving data auditing for consortium blockchains based on zero-knowledge range proofs
|
Xu, Shiwei |
|
|
128 |
C |
p. 490-504 |
artikel |