Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             30 results found
no title author magazine year volume issue page(s) type
1 A blockchain-based signature exchange protocol for metaverse Chen, Jiahui

142 C p. 237-247
article
2 A comparative study of adversarial training methods for neural models of source code Li, Zhen

142 C p. 165-181
article
3 Adaptive elasticity policies for staging-based in situ visualization Wang, Zhe

142 C p. 75-89
article
4 A novel system for medical equipment supply chain traceability based on alliance chain and attribute and role access control Li, Jiatao

142 C p. 195-211
article
5 A secured big-data sharing platform for materials genome engineering: State-of-the-art, challenges and architecture Wang, Ran

142 C p. 59-74
article
6 BSKM-FC: Blockchain-based secured key management in a fog computing environment Gowda, Naveen Chandra

142 C p. 276-291
article
7 DP-TrajGAN: A privacy-aware trajectory generation model with differential privacy Zhang, Jing

142 C p. 25-40
article
8 Dual-attention assisted deep reinforcement learning algorithm for energy-efficient resource allocation in Industrial Internet of Things Wang, Ying

142 C p. 150-164
article
9 Editorial Board
142 C p. ii
article
10 Fusion of blockchain and IoT in scientific publishing: Taxonomy, tools, and future directions Tanwar, Sudeep

142 C p. 248-275
article
11 Globus automation services: Research process automation across the space–time continuum Chard, Ryan

142 C p. 393-409
article
12 HAMLET: A framework for Human-centered AutoML via Structured Argumentation Francia, Matteo

142 C p. 182-194
article
13 Hasse sensitivity level: A sensitivity-aware trajectory privacy-enhanced framework with Reinforcement Learning Zhang, Jing

142 C p. 301-313
article
14 HCL-Classifier: CNN and LSTM based hybrid malware classifier for Internet of Things (IoT) Abdullah, Muhammed Amin

142 C p. 41-58
article
15 Human activity recognition using marine predators algorithm with deep learning Helmi, Ahmed M.

142 C p. 340-350
article
16 Intent-based network slicing for SDN vertical services with assurance: Context, design and preliminary experiments Martini, B.

142 C p. 101-116
article
17 Latency-constrained DNN architecture learning for edge systems using zerorized batch normalization Huai, Shuo

142 C p. 314-327
article
18 Less is not more: We need rich datasets to explore Versluis, Laurens

142 C p. 117-130
article
19 MAG-D: A multivariate attention network based approach for cloud workload forecasting Patel, Yashwant Singh

142 C p. 376-392
article
20 Multi-scale image–text matching network for scene and spatio-temporal images Yu, Runde

142 C p. 292-300
article
21 New method of vehicle cooperative communication based on fuzzy logic and signaling game strategy Zhang, De-Gan

142 C p. 131-149
article
22 Nextflow in Bioinformatics: Executors Performance Comparison Using Genomics Data Spišaková, Viktória

142 C p. 328-339
article
23 PP–GSM: Privacy-preserving graphical security model for security assessment as a service Lee, Dongwon

142 C p. 351-363
article
24 Progressive unsupervised video person re-identification with accumulative motion and tracklet spatial–temporal correlation Yang, Yuanfeng

142 C p. 90-100
article
25 SecurePrivChain: A decentralized framework for securing the global model using cryptography Sanam, Kahkishan

142 C p. 364-375
article
26 Self-adaptive reconstruction for compressed sensing based ECG acquisition in wireless body area network Zhang, Li-bo

142 C p. 228-236
article
27 Semantic modeling and design patterns for IoT ecosystems Potena, Domenico

142 C p. 1-3
article
28 The stream data warehouse: Page replacement algorithms and quality of service metrics Gorawski, M.

142 C p. 212-227
article
29 Towards containerized, reuse-oriented AI deployment platforms for cognitive IoT applications Veiga, Tiago

142 C p. 4-13
article
30 Using remote GPU virtualization techniques to enhance edge computing devices Cecilia, José M.

142 C p. 14-24
article
                             30 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands