nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A collaborative semantic framework based on activities for the development of applications in Smart Home living labs
|
Rodríguez-Gallego, Cristina |
|
|
140 |
C |
p. 450-465 |
artikel |
2 |
Adversarial attacks on deep learning networks in image classification based on Smell Bees Optimization Algorithm
|
Mohamed Ben Ali, Yamina |
|
|
140 |
C |
p. 185-195 |
artikel |
3 |
A machine learning method to variable classification in OpenMP
|
Shen, Yuanyuan |
|
|
140 |
C |
p. 67-78 |
artikel |
4 |
An adaptive DNN inference acceleration framework with end–edge–cloud collaborative computing
|
Liu, Guozhi |
|
|
140 |
C |
p. 422-435 |
artikel |
5 |
An advanced Internet-of-Drones System with Blockchain for improving quality of service of Search and Rescue: A feasibility study
|
Nguyen, Tri |
|
|
140 |
C |
p. 36-52 |
artikel |
6 |
An efficient data collection algorithm for partitioned wireless sensor networks
|
Min, Gongshun |
|
|
140 |
C |
p. 53-66 |
artikel |
7 |
ANNA: Accelerating Neural Network Accelerator through software-hardware co-design for vertical applications in edge systems
|
Li, Chuanyou |
|
|
140 |
C |
p. 91-103 |
artikel |
8 |
Cloud-native alternating directions solver for isogeometric analysis
|
Gurgul, Grzegorz |
|
|
140 |
C |
p. 151-172 |
artikel |
9 |
Coalition based utility and efficiency optimization for multi-task federated learning in Internet of Vehicles
|
Li, Zejun |
|
|
140 |
C |
p. 196-208 |
artikel |
10 |
DAG block: Trust aware load balanced routing and lightweight authentication encryption in WSN
|
M., Revanesh |
|
|
140 |
C |
p. 402-421 |
artikel |
11 |
Deep Multi-Input Multi-Stream Ordinal Model for age estimation: Based on spatial attention learning
|
Kong, Chang |
|
|
140 |
C |
p. 173-184 |
artikel |
12 |
DESC-IDS: Towards an efficient real-time automotive intrusion detection system based on deep evolving stream clustering
|
Cheng, Pengzhou |
|
|
140 |
C |
p. 266-281 |
artikel |
13 |
EdgeVPN: Self-organizing layer-2 virtual edge networks
|
Subratie, Kensworth |
|
|
140 |
C |
p. 104-116 |
artikel |
14 |
Editorial Board
|
|
|
|
140 |
C |
p. ii |
artikel |
15 |
EOS: An efficient obstacle segmentation for blind guiding
|
Ma, Yinan |
|
|
140 |
C |
p. 117-128 |
artikel |
16 |
False data injection threats in active distribution systems: A comprehensive survey
|
Husnoo, Muhammad Akbar |
|
|
140 |
C |
p. 344-364 |
artikel |
17 |
FLoRa: Sequential fuzzy extractor based physical layer key generation for LPWAN
|
Han, Biao |
|
|
140 |
C |
p. 253-265 |
artikel |
18 |
Identifying patterns in multiple biomarkers to diagnose diabetic foot using an explainable genetic programming-based approach
|
D’Angelo, Gianni |
|
|
140 |
C |
p. 138-150 |
artikel |
19 |
MagBox: Keep the risk functions running safely in a magic box
|
Li, YongGang |
|
|
140 |
C |
p. 282-298 |
artikel |
20 |
Model compression and privacy preserving framework for federated learning
|
Zhu, Xi |
|
|
140 |
C |
p. 376-389 |
artikel |
21 |
Multimodal semantic communication accelerated bidirectional caching for 6G MEC
|
Wang, Chaowei |
|
|
140 |
C |
p. 225-237 |
artikel |
22 |
Multi-round auction-based resource allocation for edge computing: Maximizing social welfare
|
Xiao, Jianmao |
|
|
140 |
C |
p. 365-375 |
artikel |
23 |
Multi-server assisted data sharing supporting secure deduplication for metaverse healthcare systems
|
Zhang, Tao |
|
|
140 |
C |
p. 299-310 |
artikel |
24 |
Near-optimal multi-accelerator architectures for predictive maintenance at the edge
|
Koraei, Mostafa |
|
|
140 |
C |
p. 331-343 |
artikel |
25 |
Opportunistic capacity based resource allocation for 6G wireless systems with network slicing
|
Huang, Jie |
|
|
140 |
C |
p. 390-401 |
artikel |
26 |
Orfeon: An AIOps framework for the goal-driven operationalization of distributed analytical pipelines
|
Díaz-de-Arcaya, Josu |
|
|
140 |
C |
p. 18-35 |
artikel |
27 |
Reinforcement learning based energy-neutral operation for hybrid EH powered TBAN
|
Zhang, Lei |
|
|
140 |
C |
p. 311-320 |
artikel |
28 |
RoofSplit: An edge computing framework with heterogeneous nodes collaboration considering optimal CNN model splitting
|
Huang, Yu |
|
|
140 |
C |
p. 79-90 |
artikel |
29 |
Searchable and secure edge pre-cache scheme for intelligent 6G wireless systems
|
Wang, Chen |
|
|
140 |
C |
p. 129-137 |
artikel |
30 |
Semantic models for IoT sensing to infer environment–wellness relationships
|
Zappatore, Marco |
|
|
140 |
C |
p. 1-17 |
artikel |
31 |
TEBDS: A Trusted Execution Environment-and-Blockchain-supported IoT data sharing system
|
Xie, Hui |
|
|
140 |
C |
p. 321-330 |
artikel |
32 |
The vendor-agnostic EMPAIA platform for integrating AI applications into digital pathology infrastructures
|
Jansen, Christoph |
|
|
140 |
C |
p. 209-224 |
artikel |
33 |
Transparent serverless execution of Python multiprocessing applications
|
Arjona, Aitor |
|
|
140 |
C |
p. 436-449 |
artikel |
34 |
UWPEE: Using UAV and wavelet packet energy entropy to predict traffic-based attacks under limited communication, computing and caching for 6G wireless systems
|
Xie, Zichao |
|
|
140 |
C |
p. 238-252 |
artikel |