nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A blockchain-adaptive contractual approach for multi-contracting organizational entities
|
Adjei-Arthur, Bonsu |
|
|
132 |
C |
p. 93-107 |
artikel |
2 |
A distributed geospatial publish/subscribe system on Apache Spark
|
Livaja, Ivan |
|
|
132 |
C |
p. 282-298 |
artikel |
3 |
A feature selection-based method for DDoS attack flow classification
|
Zhou, Lu |
|
|
132 |
C |
p. 67-79 |
artikel |
4 |
A SIMD algorithm for the detection of epistatic interactions of any order
|
Ponte-Fernández, Christian |
|
|
132 |
C |
p. 108-123 |
artikel |
5 |
Attention-based deep neural network for driver behavior recognition
|
Xiao, Weichu |
|
|
132 |
C |
p. 152-161 |
artikel |
6 |
BA-RMKABSE: Blockchain-aided Ranked Multi-keyword Attribute-based Searchable Encryption with Hiding Policy for Smart Health System
|
Su, Jian |
|
|
132 |
C |
p. 299-309 |
artikel |
7 |
Beyond TPC-DS, a benchmark for Big Data OLAP systems (BDOLAP-Bench)
|
Tardío, Roberto |
|
|
132 |
C |
p. 136-151 |
artikel |
8 |
Deadline-constrained energy-aware workflow scheduling in geographically distributed cloud data centers
|
Hussain, Mehboob |
|
|
132 |
C |
p. 211-222 |
artikel |
9 |
DPLRS: Distributed Population Learning Rate Schedule
|
Wei, Jia |
|
|
132 |
C |
p. 40-50 |
artikel |
10 |
Editorial Board
|
|
|
|
132 |
C |
p. ii |
artikel |
11 |
Enabling efficient privacy-preserving subgraph isomorphic query over graphs
|
Cong, Linhao |
|
|
132 |
C |
p. 1-10 |
artikel |
12 |
Exploratory machine learning modeling of adaptive and maladaptive personality traits from passively sensed behavior
|
Yan, Runze |
|
|
132 |
C |
p. 266-281 |
artikel |
13 |
FGMD: A robust detector against adversarial attacks in the IoT network
|
Jiang, Hongling |
|
|
132 |
C |
p. 194-210 |
artikel |
14 |
Hatch: Self-distributing systems for data centers
|
Rodrigues-Filho, Roberto |
|
|
132 |
C |
p. 80-92 |
artikel |
15 |
Identifying Ethereum traffic based on an active node library and DEVp2p features
|
Hu, Xiaoyan |
|
|
132 |
C |
p. 162-177 |
artikel |
16 |
iRECOVer: Patch your IoT on-the-fly
|
Maroof, Uzma |
|
|
132 |
C |
p. 178-193 |
artikel |
17 |
Leveraging conditional generative models in a general explanation framework of classifier decisions
|
Charachon, Martin |
|
|
132 |
C |
p. 223-238 |
artikel |
18 |
LogSC: Model-based one-sided communication performance estimation
|
Wang, Ziheng |
|
|
132 |
C |
p. 25-39 |
artikel |
19 |
Quantune: Post-training quantization of convolutional neural networks using extreme gradient boosting for fast deployment
|
Lee, Jemin |
|
|
132 |
C |
p. 124-135 |
artikel |
20 |
Real-time network intrusion detection using deferred decision and hybrid classifier
|
Kim, Taehoon |
|
|
132 |
C |
p. 51-66 |
artikel |
21 |
SemanticPeer: A distributional semantic peer-to-peer lookup protocol for large content spaces at internet-scale
|
Zaarour, Tarek |
|
|
132 |
C |
p. 239-253 |
artikel |
22 |
TIIA: A blockchain-enabled Threat Intelligence Integrity Audit scheme for IIoT
|
Zhang, Wenbo |
|
|
132 |
C |
p. 254-265 |
artikel |
23 |
Truthful auction mechanisms for resource allocation in the Internet of Vehicles with public blockchain networks
|
Zhang, Jixian |
|
|
132 |
C |
p. 11-24 |
artikel |