Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             30 results found
no title author magazine year volume issue page(s) type
1 A blockchain-based application for genomic access and variant discovery using smart contracts and homomorphic encryption Mohammed Yakubu, Abukari

137 C p. 234-247
article
2 Accelerating kNN search in high dimensional datasets on FPGA by reducing external memory access Song, Xiaojia

137 C p. 189-200
article
3 A fingerprint-based localization algorithm based on LSTM and data expansion method for sparse samples Jia, Bing

137 C p. 380-393
article
4 A fuzzy logic technique for virtual sensor networks Caroprese, Luciano

137 C p. 302-322
article
5 A location-based privacy-preserving oblivious sharing scheme for indoor navigation Yang, Huijie

137 C p. 42-52
article
6 A multi-class workflow ensemble management system using on-demand and spot instances in cloud Zolfaghari, Behrooz

137 C p. 97-110
article
7 An edge–cloud integrated framework for flexible and dynamic stream analytics Wang, Xin

137 C p. 323-335
article
8 An intelligent collaboration framework of IoT applications based on event logic graph Zhu, Min

137 C p. 31-41
article
9 An online auction-based incentive mechanism for soft-deadline tasks in Collaborative Edge Computing He, Xingqiu

137 C p. 1-13
article
10 AutoTrust: A privacy-enhanced trust-based intrusion detection approach for internet of smart things Awan, Kamran Ahmad

137 C p. 288-301
article
11 BTG: A Bridge to Graph machine learning in telecommunications fraud detection Hu, Xinxin

137 C p. 274-287
article
12 Cloud-BlackBox: Toward practical recording and tracking of VM swarms for multifaceted cloud inspection Choi, Sang-Hoon

137 C p. 219-233
article
13 Deep neural network based UAV deployment and dynamic power control for 6G-Envisioned intelligent warehouse logistics system Zhai, Daosen

137 C p. 164-172
article
14 Deep reinforcement learning for energy and time optimized scheduling of precedence-constrained tasks in edge–cloud computing environments Jayanetti, Amanda

137 C p. 14-30
article
15 Deep Reinforcement Learning for energy-aware task offloading in join SDN-Blockchain 5G massive IoT edge network Sellami, Bassem

137 C p. 363-379
article
16 Deep understanding of big geospatial data for self-driving: Data, technologies, and systems Wang, Haiyan

137 C p. 146-163
article
17 3D genome assisted protein–protein interaction prediction Guo, Zehua

137 C p. 87-96
article
18 DQN based user association control in hierarchical mobile edge computing systems for mobile IoT services Lee, Yunseong

137 C p. 53-69
article
19 Editorial Board
137 C p. ii
article
20 Fed-DR-Filter: Using global data representation to reduce the impact of noisy labels on the performance of federated learning Duan, Shaoming

137 C p. 336-348
article
21 High-efficient hierarchical federated learning on non-IID data with progressive collaboration Cai, Yunyun

137 C p. 111-128
article
22 Modeling feature interactions for context-aware QoS prediction of IoT services Chen, Yuanyi

137 C p. 173-185
article
23 Path selection for link failure protection in hybrid SDNs Li, Jiahui

137 C p. 201-215
article
24 PMMSA: Security analysis system for android wearable applications based on permission matching and malware similarity analysis Kong, Ke

137 C p. 349-362
article
25 PROMENADE: A big data platform for handling city complex networks with dynamic graphs Colarusso, Carmine

137 C p. 129-145
article
26 Real-time power optimization for application server clusters based on Mixed-Integer Programming Xiong, Zhi

137 C p. 260-273
article
27 Region aware dynamic task scheduling and resource virtualization for load balancing in IoT–fog multi-cloud environment Kanbar, Asan Baker

137 C p. 70-86
article
28 Special Issue on Artificial Intelligence-of-Things (AIoT): Opportunities, Challenges, and Solutions-Part I: Artificial Intelligence Applications in Various Fields Wei, Wei

137 C p. 216-218
article
29 Special Issue on Artificial Intelligence-of-Things (AIoT): Opportunities, Challenges, and Solutions-Part II: Artificial-Intelligence-Powered Internet of Things Wei, Wei

137 C p. 186-188
article
30 Stealthy attack detection method based on Multi-feature long short-term memory prediction model Wang, Jiexi

137 C p. 248-259
article
                             30 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands