Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             50 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 AccessChain: An access control framework to protect data access in blockchain enabled supply chain Sarfaraz, Aaliya

148 C p. 380-394
artikel
2 Active learning in multi-label image classification with graph convolutional network embedding Xie, Xiurui

148 C p. 56-65
artikel
3 A fusion recommendation model based on mutual information and attention learning in heterogeneous social networks Jiang, Liang

148 C p. 128-138
artikel
4 A lightweight remote attestation using PUFs and hash-based signatures for low-end IoT devices Román, Roberto

148 C p. 425-435
artikel
5 AM-IF: Adaptive Multi-Path Interest Forwarding in named data networking Abdi, Fatemeh

148 C p. 564-583
artikel
6 An adaptive auto-scaling framework for cloud resource provisioning Chouliaras, Spyridon

148 C p. 173-183
artikel
7 An effective heterogeneous information network representation learning framework Han, Zhongming

148 C p. 66-78
artikel
8 An efficient adaptive cache management scheme for named data networks Reshadinezhad, Amir

148 C p. 79-92
artikel
9 An Optimized Privacy Information Exchange Schema for Explainable AI Empowered WiMAX-based IoT networks Chithaluru, Premkumar

148 C p. 225-239
artikel
10 Artificial immunity based distributed and fast anomaly detection for Industrial Internet of Things Li, Beibei

148 C p. 367-379
artikel
11 Blockchain-enabled device command operation security for Industrial Internet of Things Fu, Luxia

148 C p. 280-297
artikel
12 Building digital twins of cities using the Inter Model Broker framework Lohman, Walter

148 C p. 501-513
artikel
13 Concurrent experimentation in NCSLab: A scalable approach for online laboratories Lei, Zhongcheng

148 C p. 139-149
artikel
14 Cooperative behavior in blockchain-based complementary currency networks through time: The Sarafu case study Ba, Cheick Tidiane

148 C p. 266-279
artikel
15 Crowd-enabled multiple Pareto-optimal queries for multi-criteria decision-making services Yin, Bo

148 C p. 342-356
artikel
16 DeepVulSeeker: A novel vulnerability identification framework via code graph structure and pre-training mechanism Wang, Jin

148 C p. 15-26
artikel
17 Dependent tasks offloading in mobile edge computing: A multi-objective evolutionary optimization strategy Gong, Yanqi

148 C p. 314-325
artikel
18 Differential privacy in deep learning: Privacy and beyond Wang, Yanling

148 C p. 408-424
artikel
19 Edge-enabled federated sequential recommendation with knowledge-aware Transformer Wei, Shanming

148 C p. 610-622
artikel
20 EdgeSimPy: Python-based modeling and simulation of edge computing resource management policies Souza, Paulo S.

148 C p. 446-459
artikel
21 Editorial Board
148 C p. ii
artikel
22 Embedded real-time objects’ hardness classification for robotic grippers Amin, Youssef

148 C p. 211-224
artikel
23 Energy-efficient computation offloading strategy with task priority in cloud assisted multi-access edge computing He, Zhenli

148 C p. 298-313
artikel
24 Energy-efficient task scheduling for mobile edge computing with virtual machine I/O interference Lu, Baoshan

148 C p. 538-549
artikel
25 HA-D3QN: Embedding virtual private cloud in cloud data centers with heuristic assisted deep reinforcement learning Chen, Meng

148 C p. 1-14
artikel
26 HeterPS: Distributed deep learning with reinforcement learning based scheduling in heterogeneous environments Liu, Ji

148 C p. 106-117
artikel
27 HIDE-Healthcare IoT Data Trust ManagEment: Attribute centric intelligent privacy approach Ullah, Fasee

148 C p. 326-341
artikel
28 H2M: Exploiting Heterogeneous Shared Memory Architectures Klinkenberg, Jannis

148 C p. 39-55
artikel
29 Human-to-human interaction behaviors sensing based on complex-valued neural network using Wi-Fi channel state information Yang, Xiaobo

148 C p. 160-172
artikel
30 IDDANet: An Input-Driven Dynamic Adaptive Network ensemble method for edge intelligence Mo, Zijia

148 C p. 436-445
artikel
31 Indexing legacy data-sets for global access and processing in multi-cloud environments Orzechowski, Michał

148 C p. 150-159
artikel
32 Internet of Things design patterns modeling proven correct by construction: Application to aged care solution Tounsi, Imen

148 C p. 395-407
artikel
33 KubeAdaptor: A docking framework for workflow containerization on Kubernetes Shan, Chenggang

148 C p. 584-599
artikel
34 Making applications faster by asynchronous execution: Slowing down processes or relaxing MPI collectives Afzal, Ayesha

148 C p. 472-487
artikel
35 Novel supply chain vulnerability detection based on heterogeneous-graph-driven hash similarity in IoT Ye, Guodong

148 C p. 201-210
artikel
36 Pelican Optimization Algorithm with Federated Learning Driven Attack Detection model in Internet of Things environment Al-Wesabi, Fahd N.

148 C p. 118-127
artikel
37 Privacy-preserving activity recognition using multimodal sensors in smart office Zhang, Xiangying

148 C p. 27-38
artikel
38 Privacy-preserving malware detection in Android-based IoT devices through federated Markov chains D’Angelo, Gianni

148 C p. 93-105
artikel
39 Profiling and optimization of Python-based social sciences applications on HPC systems by means of task and data parallelism Szustak, Lukasz

148 C p. 623-635
artikel
40 Quantum annealing solution for the unrelated parallel machine scheduling with priorities and delay of task switching on machines Orts, F.

148 C p. 514-523
artikel
41 Reinforcement learning with smart contracts on blockchains Davarakis, Theodoros-Thirimachos

148 C p. 550-563
artikel
42 Retraction notice to “Multi-spectral and panchromatic image fusion approach using stationary wavelet transform and swarm flower pollination optimization for remote sensing applications” [Future Gener. Comput. Syst. 88 (2018) 501–511] Gharbia, Reham

148 C p. 636
artikel
43 Security and privacy concerns in cloud-based scientific and business workflows: A systematic review Soveizi, Nafiseh

148 C p. 184-200
artikel
44 Self-supervised contrastive representation learning for large-scale trajectories Li, Shuzhe

148 C p. 357-366
artikel
45 SPAE: Lifelong disk failure prediction via end-to-end GAN-based anomaly detection with ensemble update Liu, Yu

148 C p. 460-471
artikel
46 Sub-Entity Embedding for inductive spatio-temporal knowledge graph completion Wan, Guojia

148 C p. 240-249
artikel
47 Survey on Federated Learning enabling indoor navigation for industry 4.0 in B5G Alsamhi, Saeed Hamood

148 C p. 250-265
artikel
48 Towards accurate and privacy-preserving localization using anchor quality assessment in Internet of Things Zuo, Fang

148 C p. 524-537
artikel
49 Towards sustainable agriculture: A lightweight hybrid model and cloud-based collection of datasets for efficient leaf disease detection Thai, Huy-Tan

148 C p. 488-500
artikel
50 Union label smoothing adversarial training: Recognize small perturbation attacks and reject larger perturbation attacks balanced Huang, Jinshu

148 C p. 600-609
artikel
                             50 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland