nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Accelerating agent-based demand-responsive transport simulations with GPUs
|
Saprykin, Aleksandr |
|
|
131 |
C |
p. 43-58 |
artikel |
2 |
A survey on blockchain for big data: Approaches, opportunities, and future directions
|
Deepa, N. |
|
|
131 |
C |
p. 209-226 |
artikel |
3 |
Blockchain-based random auditor committee for integrity verification
|
Chen, Lanxiang |
|
|
131 |
C |
p. 183-193 |
artikel |
4 |
CHChain: Secure and parallel crowdsourcing driven by hybrid blockchain
|
Tong, Wei |
|
|
131 |
C |
p. 279-291 |
artikel |
5 |
Communication-efficient distributed AI strategies for the IoT edge
|
Mwase, Christine |
|
|
131 |
C |
p. 292-308 |
artikel |
6 |
Deep neural networks with attention mechanism for monocular depth estimation on embedded devices
|
Liu, Siping |
|
|
131 |
C |
p. 137-150 |
artikel |
7 |
Disaster emergency response framework for smart buildings
|
Saini, Kanika |
|
|
131 |
C |
p. 106-120 |
artikel |
8 |
Editorial Board
|
|
|
|
131 |
C |
p. ii |
artikel |
9 |
Effect of Hyper-Threading in Latency-Critical Multithreaded Cloud Applications and Utilization Analysis of the Major System Resources
|
Pons, Lucía |
|
|
131 |
C |
p. 194-208 |
artikel |
10 |
Enabling machine learning-ready HPC ensembles with Merlin
|
Peterson, J. Luc |
|
|
131 |
C |
p. 255-268 |
artikel |
11 |
Imbalanced data classification: A KNN and generative adversarial networks-based hybrid approach for intrusion detection
|
Ding, Hongwei |
|
|
131 |
C |
p. 240-254 |
artikel |
12 |
Improving QoS through network isolation in PaaS
|
Di Stefano, Alessandro |
|
|
131 |
C |
p. 91-105 |
artikel |
13 |
Max–min fairness based faucet design for blockchains
|
Metin, Serdar |
|
|
131 |
C |
p. 18-27 |
artikel |
14 |
Micro multi-strategy multi-objective artificial bee colony algorithm for microgrid energy optimization
|
Peng, Hu |
|
|
131 |
C |
p. 59-74 |
artikel |
15 |
MLS-ABAC: Efficient Multi-Level Security Attribute-Based Access Control scheme
|
Aghili, Seyed Farhad |
|
|
131 |
C |
p. 75-90 |
artikel |
16 |
PANDA: Lightweight non-interactive privacy-preserving data aggregation for constrained devices
|
Wang, Mei |
|
|
131 |
C |
p. 28-42 |
artikel |
17 |
Privacy and security-aware workflow scheduling in a hybrid cloud
|
Lei, Jian |
|
|
131 |
C |
p. 269-278 |
artikel |
18 |
QoS-aware placement of microservices-based IoT applications in Fog computing environments
|
Pallewatta, Samodha |
|
|
131 |
C |
p. 121-136 |
artikel |
19 |
Resource scheduling and provisioning for processing of dynamic stream workflows under latency constraints
|
Brown, Alexander |
|
|
131 |
C |
p. 166-182 |
artikel |
20 |
SDN-based fog and cloud interplay for stream processing
|
Rzepka, Michał |
|
|
131 |
C |
p. 1-17 |
artikel |
21 |
Smart-3DM: Data-driven decision making using smart edge computing in hetero-crowdsensing environment
|
Lamaazi, Hanane |
|
|
131 |
C |
p. 151-165 |
artikel |
22 |
Towards identifying context-enriched multimodal behavioral patterns for digital phenotyping of human behaviors
|
Moura, Ivan |
|
|
131 |
C |
p. 227-239 |
artikel |