Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             57 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A big data platform exploiting auditable tokenization to promote good practices inside local energy communities Gagliardelli, Luca

141 C p. 595-610
artikel
2 A blockchain based access control scheme with hidden policy and attribute Wu, Nannan

141 C p. 186-196
artikel
3 A collaborative scheduling method for cloud computing heterogeneous workflows based on deep reinforcement learning Chen, Genxin

141 C p. 284-297
artikel
4 A data balancing approach based on generative adversarial network Yuan, Lixiang

141 C p. 768-776
artikel
5 A homomorphic approach for security and privacy preservation of Smart Airports Malik, Haroon

141 C p. 500-513
artikel
6 AI-based sound source localization system with higher accuracy Yang, Xu

141 C p. 1-15
artikel
7 An extended analytical framework for heterogeneous implementations of light cryptographic algorithms Damaj, Issam W.

141 C p. 154-172
artikel
8 A novel offloading approach of IoT user perception task based on quantum behavior particle swarm optimization Chen, Lu

141 C p. 577-594
artikel
9 An PPG signal and body channel based encryption method for WBANs Han, Wei

141 C p. 704-712
artikel
10 A peer-to-peer file storage and sharing system based on consortium blockchain Peng, Shaoliang

141 C p. 197-204
artikel
11 A post quantum secure multi-party collaborative signature with deterability in the Industrial Internet of Things Liu, Jinhui

141 C p. 663-676
artikel
12 Application of deep reinforcement learning in attacking and protecting structural features-based malicious PDF detector Jiang, Tian

141 C p. 325-338
artikel
13 A reliability and truth-aware based online digital data auction mechanism for cybersecurity in MCS Yu, Jiayi

141 C p. 526-541
artikel
14 ARFED: Attack-Resistant Federated averaging based on outlier elimination Isik-Polat, Ece

141 C p. 626-650
artikel
15 A robust feature reinforcement framework for heterogeneous graphs neural networks Wang, Zehao

141 C p. 143-153
artikel
16 Artificial intelligence-based personalized serious game for enhancing the physical and cognitive abilities of the elderly Eun, Sung-Jong

141 C p. 713-722
artikel
17 A scalable and energy efficient GPU thread map for m -simplex domains Navarro, Cristóbal A.

141 C p. 651-662
artikel
18 A scalable, secure, and semantically interoperable client for cloud-enabled Demand Response Cimmino, Andrea

141 C p. 54-66
artikel
19 BiLSTM deep neural network model for imbalanced medical data of IoT systems Woźniak, Marcin

141 C p. 489-499
artikel
20 Blockchain-based trust mechanism for digital twin empowered Industrial Internet of Things A., Sasikumar

141 C p. 16-27
artikel
21 Blockchain-escorted distributed deep learning with collaborative model aggregation towards 6G networks Ma, Zhaowei

141 C p. 555-566
artikel
22 BS-Join: A novel and efficient mixed batch-stream join method for spatiotemporal data management in Flink Ji, Hangxu

141 C p. 67-80
artikel
23 Characterizing and optimizing Kernel resource isolation for containers Wang, Kun

141 C p. 218-229
artikel
24 Cloud–edge collaboration-based bi-level optimal scheduling for intelligent healthcare systems Su, Xin

141 C p. 28-39
artikel
25 Combating medical noisy labels by disentangled distribution learning and consistency regularization Zhou, Yi

141 C p. 567-576
artikel
26 Compact global association based adaptive routing framework for personnel behavior understanding Shi, Lei

141 C p. 514-525
artikel
27 DeGTeC: A deep graph-temporal clustering framework for data-parallel job characterization in data centers Liang, Yi

141 C p. 81-95
artikel
28 Designing secure business processes for blockchains with SecBPMN2BC Köpke, Julius

141 C p. 382-398
artikel
29 Editorial Board
141 C p. ii
artikel
30 End-to-end slices to orchestrate resources and services in the cloud-to-edge continuum Tusa, Francesco

141 C p. 473-488
artikel
31 Explainable indoor localization of BLE devices through RSSI using recursive continuous wavelet transformation and XGBoost classifier Kamal, A.H.M.

141 C p. 230-242
artikel
32 FedDOVe: A Federated Deep Q-learning-based Offloading for Vehicular fog computing Sethi, Vivek

141 C p. 96-105
artikel
33 From classical to soft computing based watermarking techniques: A comprehensive review Singh, Roop

141 C p. 738-754
artikel
34 GP-NFSP: Decentralized task offloading for mobile edge computing with independent reinforcement learning Hou, Jiaxin

141 C p. 205-217
artikel
35 Improving Density Peaks Clustering through GPU acceleration Liu, Zhuojin

141 C p. 399-413
artikel
36 Infrastructure-level Support for GPU-Enabled Deep Learning in DATAVIEW Liu, Junwen

141 C p. 723-737
artikel
37 LGAN-DP: A novel differential private publication mechanism of trajectory data Zhang, Ziming

141 C p. 692-703
artikel
38 Multi-Access Edge Computing assisted ultra-low energy scheduling and harvesting in multi-hop Wireless Sensor and Actuator Network for energy neutral self-sustainable Next-gen Cyber-Physical System Mishra, Ayaskanta

141 C p. 298-324
artikel
39 Multi-agent deep reinforcement learning for online request scheduling in edge cooperation networks Zhang, Yaqiang

141 C p. 258-268
artikel
40 Multi-search-routes-based methods for minimizing makespan of homogeneous and heterogeneous resources in Cloud computing Zhou, Guangyao

141 C p. 414-432
artikel
41 Online optimization of intelligent reflecting surface-aided energy-efficient IoT-edge computing Wang, Zhongyang

141 C p. 611-625
artikel
42 On the application of active learning for efficient and effective IoT botnet detection Guerra-Manzanares, Alejandro

141 C p. 40-53
artikel
43 Ontology-based approach to real-time risk management and cyber-situational awareness Sánchez-Zas, Carmen

141 C p. 462-472
artikel
44 Optimized power control strategy in Massive MIMO for distributed IoT networks Lee, Byung Moo

141 C p. 433-447
artikel
45 Practical fully leakage resilient signatures with auxiliary inputs Cai, Cailing

141 C p. 448-461
artikel
46 PS-CRDTs: CRDTs in highly volatile environments Barreto, António

141 C p. 755-767
artikel
47 PSDCE: Physiological signal-based double chaotic encryption for instantaneous E-healthcare services Wang, Junchao

141 C p. 116-128
artikel
48 Reinforcement learning-based cost-efficient service function chaining with CoMP zero-forcing beamforming in edge networks Wang, Kan

141 C p. 355-368
artikel
49 RUAD: Unsupervised anomaly detection in HPC systems Molan, Martin

141 C p. 542-554
artikel
50 Secure HPC: A workflow providing a secure partition on an HPC system Nolte, Hendrik

141 C p. 677-691
artikel
51 SkyFlow: Heterogeneous streaming for skyline computation using FlowGraph and SYCL Romero, Jose Carlos

141 C p. 269-283
artikel
52 SPsync: Lightweight multi-terminal big spatiotemporal data synchronization solution Zhang, Weisheng

141 C p. 106-115
artikel
53 The DAG blockchain: A secure edge assisted honeypot for attack detection and multi-controller based load balancing in SDN 5G Abdulqadder, Ihsan H.

141 C p. 339-354
artikel
54 The view on systems monitoring and its requirements from future Cloud-to-Thing applications and infrastructures Volpert, Simon

141 C p. 243-257
artikel
55 Towards cost-effective and robust AI microservice deployment in edge computing environments Wu, Chunrong

141 C p. 129-142
artikel
56 User-centric base station clustering and resource allocation for cell-edge users in 6G ultra-dense networks Su, Yuhan

141 C p. 173-185
artikel
57 Workload categorization for hazardous industries: The semantic modelling of multi-modal physiological data König, Jemma L.

141 C p. 369-381
artikel
                             57 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland