nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A blockchain-driven data exchange model in multi-domain IoT with controllability and parallelity
|
Tong, Wei |
|
|
135 |
C |
p. 85-94 |
artikel |
2 |
Accurate road information warning framework for intelligent vehicles based on resource allocation
|
Wang, Xiaonan |
|
|
135 |
C |
p. 95-104 |
artikel |
3 |
A multi-sensor architecture combining human pose estimation and real-time location systems for workflow monitoring on hybrid operating suites
|
Rodrigues, Vinicius F. |
|
|
135 |
C |
p. 283-298 |
artikel |
4 |
An edge–fog architecture for distributed 3D reconstruction
|
Vidal, Vinicius F. |
|
|
135 |
C |
p. 146-158 |
artikel |
5 |
An ultrasound standard plane detection model of fetal head based on multi-task learning and hybrid knowledge graph
|
Zhao, Lei |
|
|
135 |
C |
p. 234-243 |
artikel |
6 |
A state-of-the-art survey on solving non-IID data in Federated Learning
|
Ma, Xiaodong |
|
|
135 |
C |
p. 244-258 |
artikel |
7 |
A survey of human-in-the-loop for machine learning
|
Wu, Xingjiao |
|
|
135 |
C |
p. 364-381 |
artikel |
8 |
A two-stage container management in the cloud for optimizing the load balancing and migration cost
|
Zhang, Weiwen |
|
|
135 |
C |
p. 303-314 |
artikel |
9 |
BARA: A blockchain-aided auction-based resource allocation in edge computing enabled industrial internet of things
|
Baranwal, Gaurav |
|
|
135 |
C |
p. 333-347 |
artikel |
10 |
Blockchain-based identity management and access control framework for open banking ecosystem
|
Liao, Chia-Hung |
|
|
135 |
C |
p. 450-466 |
artikel |
11 |
Boosting Cyber-Threat Intelligence via Collaborative Intrusion Detection
|
Guarascio, Massimo |
|
|
135 |
C |
p. 30-43 |
artikel |
12 |
DWT-CV: Dense weight transfer-based cross validation strategy for model selection in biomedical data analysis
|
Cheng, Jianhong |
|
|
135 |
C |
p. 20-29 |
artikel |
13 |
Dynamic Co-Attention Networks for multi-horizon forecasting in multivariate time series
|
He, Xiaoyu |
|
|
135 |
C |
p. 72-84 |
artikel |
14 |
Editorial Board
|
|
|
|
135 |
C |
p. ii |
artikel |
15 |
Energy-SLA-aware genetic algorithm for edge–cloud integrated computation offloading in vehicular networks
|
Materwala, Huned |
|
|
135 |
C |
p. 205-222 |
artikel |
16 |
Extending lifetime of Wireless Nano-Sensor Networks: An energy efficient distributed routing algorithm for Internet of Nano-Things
|
Gulec, Omer |
|
|
135 |
C |
p. 382-393 |
artikel |
17 |
Fog node discovery and selection: A Systematic literature review
|
Bukhari, Afnan |
|
|
135 |
C |
p. 114-128 |
artikel |
18 |
GARLSched: Generative adversarial deep reinforcement learning task scheduling optimization for large-scale high performance computing systems
|
Li, Jingbo |
|
|
135 |
C |
p. 259-269 |
artikel |
19 |
HPCP-QCWOA: High Performance Clustering Protocol based on Quantum Clone Whale Optimization Algorithm in Integrated Energy System
|
Liu, Yang |
|
|
135 |
C |
p. 315-332 |
artikel |
20 |
Improving IoT data availability via feedback- and voting-based anomaly imputation
|
Li, Liying |
|
|
135 |
C |
p. 194-204 |
artikel |
21 |
Inference-aware convolutional neural network pruning
|
Choudhary, Tejalal |
|
|
135 |
C |
p. 44-56 |
artikel |
22 |
Information management for trust computation on resource-constrained IoT devices
|
Bradbury, Matthew |
|
|
135 |
C |
p. 348-363 |
artikel |
23 |
Intrusion detection in wireless sensor network using enhanced empirical based component analysis
|
Zhiqiang, Liu |
|
|
135 |
C |
p. 181-193 |
artikel |
24 |
Job scheduling for big data analytical applications in clouds: A taxonomy study
|
Kang, Youyou |
|
|
135 |
C |
p. 129-145 |
artikel |
25 |
MeterSSD: Scale and rotate invariance lightweight detector
|
Han, Dong |
|
|
135 |
C |
p. 223-233 |
artikel |
26 |
M2FaaS: Transparent and fault tolerant FaaSification of Node.js monolith code blocks
|
Pedratscher, Stefan |
|
|
135 |
C |
p. 57-71 |
artikel |
27 |
Near-optimal responsive traffic engineering in software defined networks based on deep learning
|
Salman, Mohammed I. |
|
|
135 |
C |
p. 172-180 |
artikel |
28 |
Optimizing data placement and size configuration for morphable NVM based SPM in embedded multicore systems
|
Long, Linbo |
|
|
135 |
C |
p. 270-282 |
artikel |
29 |
Performance analysis of task-based multi-frontal sparse linear solvers: Structure matters
|
Cogo Miletto, Marcelo |
|
|
135 |
C |
p. 409-425 |
artikel |
30 |
Preface of Special Issue on Advanced techniques and emerging trends in Smart Cyber–Physical Systems
|
Varadarajan, Vijayakumar |
|
|
135 |
C |
p. 299-302 |
artikel |
31 |
RKD-VNE: Virtual network embedding algorithm assisted by resource knowledge description and deep reinforcement learning in IIoT scenario
|
Zhang, Peiying |
|
|
135 |
C |
p. 426-437 |
artikel |
32 |
Size-efficient sparse population for strictly structured quantum genetic algorithm
|
Kim, Jun Suk |
|
|
135 |
C |
p. 159-171 |
artikel |
33 |
Squeeze: Efficient compact fractals for tensor core GPUs
|
Quezada, Felipe A. |
|
|
135 |
C |
p. 10-19 |
artikel |
34 |
The devil is in the detail: Generating system call whitelist for Linux seccomp
|
Xing, Yunlong |
|
|
135 |
C |
p. 105-113 |
artikel |
35 |
Towards drivers’ safety with multi-criteria car navigation systems
|
Solé, Leonardo |
|
|
135 |
C |
p. 1-9 |
artikel |
36 |
WBATimeNet: A deep neural network approach for VM Live Migration in the cloud
|
Mangalampalli, Ashish |
|
|
135 |
C |
p. 438-449 |
artikel |
37 |
Workload-optimized sensor data store for industrial IoT gateways
|
Choi, Kihan |
|
|
135 |
C |
p. 394-408 |
artikel |