nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
AccessChain: An access control framework to protect data access in blockchain enabled supply chain
|
Sarfaraz, Aaliya |
|
|
148 |
C |
p. 380-394 |
artikel |
2 |
Active learning in multi-label image classification with graph convolutional network embedding
|
Xie, Xiurui |
|
|
148 |
C |
p. 56-65 |
artikel |
3 |
A fusion recommendation model based on mutual information and attention learning in heterogeneous social networks
|
Jiang, Liang |
|
|
148 |
C |
p. 128-138 |
artikel |
4 |
A lightweight remote attestation using PUFs and hash-based signatures for low-end IoT devices
|
Román, Roberto |
|
|
148 |
C |
p. 425-435 |
artikel |
5 |
AM-IF: Adaptive Multi-Path Interest Forwarding in named data networking
|
Abdi, Fatemeh |
|
|
148 |
C |
p. 564-583 |
artikel |
6 |
An adaptive auto-scaling framework for cloud resource provisioning
|
Chouliaras, Spyridon |
|
|
148 |
C |
p. 173-183 |
artikel |
7 |
An effective heterogeneous information network representation learning framework
|
Han, Zhongming |
|
|
148 |
C |
p. 66-78 |
artikel |
8 |
An efficient adaptive cache management scheme for named data networks
|
Reshadinezhad, Amir |
|
|
148 |
C |
p. 79-92 |
artikel |
9 |
An Optimized Privacy Information Exchange Schema for Explainable AI Empowered WiMAX-based IoT networks
|
Chithaluru, Premkumar |
|
|
148 |
C |
p. 225-239 |
artikel |
10 |
Artificial immunity based distributed and fast anomaly detection for Industrial Internet of Things
|
Li, Beibei |
|
|
148 |
C |
p. 367-379 |
artikel |
11 |
Blockchain-enabled device command operation security for Industrial Internet of Things
|
Fu, Luxia |
|
|
148 |
C |
p. 280-297 |
artikel |
12 |
Building digital twins of cities using the Inter Model Broker framework
|
Lohman, Walter |
|
|
148 |
C |
p. 501-513 |
artikel |
13 |
Concurrent experimentation in NCSLab: A scalable approach for online laboratories
|
Lei, Zhongcheng |
|
|
148 |
C |
p. 139-149 |
artikel |
14 |
Cooperative behavior in blockchain-based complementary currency networks through time: The Sarafu case study
|
Ba, Cheick Tidiane |
|
|
148 |
C |
p. 266-279 |
artikel |
15 |
Crowd-enabled multiple Pareto-optimal queries for multi-criteria decision-making services
|
Yin, Bo |
|
|
148 |
C |
p. 342-356 |
artikel |
16 |
DeepVulSeeker: A novel vulnerability identification framework via code graph structure and pre-training mechanism
|
Wang, Jin |
|
|
148 |
C |
p. 15-26 |
artikel |
17 |
Dependent tasks offloading in mobile edge computing: A multi-objective evolutionary optimization strategy
|
Gong, Yanqi |
|
|
148 |
C |
p. 314-325 |
artikel |
18 |
Differential privacy in deep learning: Privacy and beyond
|
Wang, Yanling |
|
|
148 |
C |
p. 408-424 |
artikel |
19 |
Edge-enabled federated sequential recommendation with knowledge-aware Transformer
|
Wei, Shanming |
|
|
148 |
C |
p. 610-622 |
artikel |
20 |
EdgeSimPy: Python-based modeling and simulation of edge computing resource management policies
|
Souza, Paulo S. |
|
|
148 |
C |
p. 446-459 |
artikel |
21 |
Editorial Board
|
|
|
|
148 |
C |
p. ii |
artikel |
22 |
Embedded real-time objects’ hardness classification for robotic grippers
|
Amin, Youssef |
|
|
148 |
C |
p. 211-224 |
artikel |
23 |
Energy-efficient computation offloading strategy with task priority in cloud assisted multi-access edge computing
|
He, Zhenli |
|
|
148 |
C |
p. 298-313 |
artikel |
24 |
Energy-efficient task scheduling for mobile edge computing with virtual machine I/O interference
|
Lu, Baoshan |
|
|
148 |
C |
p. 538-549 |
artikel |
25 |
HA-D3QN: Embedding virtual private cloud in cloud data centers with heuristic assisted deep reinforcement learning
|
Chen, Meng |
|
|
148 |
C |
p. 1-14 |
artikel |
26 |
HeterPS: Distributed deep learning with reinforcement learning based scheduling in heterogeneous environments
|
Liu, Ji |
|
|
148 |
C |
p. 106-117 |
artikel |
27 |
HIDE-Healthcare IoT Data Trust ManagEment: Attribute centric intelligent privacy approach
|
Ullah, Fasee |
|
|
148 |
C |
p. 326-341 |
artikel |
28 |
H2M: Exploiting Heterogeneous Shared Memory Architectures
|
Klinkenberg, Jannis |
|
|
148 |
C |
p. 39-55 |
artikel |
29 |
Human-to-human interaction behaviors sensing based on complex-valued neural network using Wi-Fi channel state information
|
Yang, Xiaobo |
|
|
148 |
C |
p. 160-172 |
artikel |
30 |
IDDANet: An Input-Driven Dynamic Adaptive Network ensemble method for edge intelligence
|
Mo, Zijia |
|
|
148 |
C |
p. 436-445 |
artikel |
31 |
Indexing legacy data-sets for global access and processing in multi-cloud environments
|
Orzechowski, Michał |
|
|
148 |
C |
p. 150-159 |
artikel |
32 |
Internet of Things design patterns modeling proven correct by construction: Application to aged care solution
|
Tounsi, Imen |
|
|
148 |
C |
p. 395-407 |
artikel |
33 |
KubeAdaptor: A docking framework for workflow containerization on Kubernetes
|
Shan, Chenggang |
|
|
148 |
C |
p. 584-599 |
artikel |
34 |
Making applications faster by asynchronous execution: Slowing down processes or relaxing MPI collectives
|
Afzal, Ayesha |
|
|
148 |
C |
p. 472-487 |
artikel |
35 |
Novel supply chain vulnerability detection based on heterogeneous-graph-driven hash similarity in IoT
|
Ye, Guodong |
|
|
148 |
C |
p. 201-210 |
artikel |
36 |
Pelican Optimization Algorithm with Federated Learning Driven Attack Detection model in Internet of Things environment
|
Al-Wesabi, Fahd N. |
|
|
148 |
C |
p. 118-127 |
artikel |
37 |
Privacy-preserving activity recognition using multimodal sensors in smart office
|
Zhang, Xiangying |
|
|
148 |
C |
p. 27-38 |
artikel |
38 |
Privacy-preserving malware detection in Android-based IoT devices through federated Markov chains
|
D’Angelo, Gianni |
|
|
148 |
C |
p. 93-105 |
artikel |
39 |
Profiling and optimization of Python-based social sciences applications on HPC systems by means of task and data parallelism
|
Szustak, Lukasz |
|
|
148 |
C |
p. 623-635 |
artikel |
40 |
Quantum annealing solution for the unrelated parallel machine scheduling with priorities and delay of task switching on machines
|
Orts, F. |
|
|
148 |
C |
p. 514-523 |
artikel |
41 |
Reinforcement learning with smart contracts on blockchains
|
Davarakis, Theodoros-Thirimachos |
|
|
148 |
C |
p. 550-563 |
artikel |
42 |
Retraction notice to “Multi-spectral and panchromatic image fusion approach using stationary wavelet transform and swarm flower pollination optimization for remote sensing applications” [Future Gener. Comput. Syst. 88 (2018) 501–511]
|
Gharbia, Reham |
|
|
148 |
C |
p. 636 |
artikel |
43 |
Security and privacy concerns in cloud-based scientific and business workflows: A systematic review
|
Soveizi, Nafiseh |
|
|
148 |
C |
p. 184-200 |
artikel |
44 |
Self-supervised contrastive representation learning for large-scale trajectories
|
Li, Shuzhe |
|
|
148 |
C |
p. 357-366 |
artikel |
45 |
SPAE: Lifelong disk failure prediction via end-to-end GAN-based anomaly detection with ensemble update
|
Liu, Yu |
|
|
148 |
C |
p. 460-471 |
artikel |
46 |
Sub-Entity Embedding for inductive spatio-temporal knowledge graph completion
|
Wan, Guojia |
|
|
148 |
C |
p. 240-249 |
artikel |
47 |
Survey on Federated Learning enabling indoor navigation for industry 4.0 in B5G
|
Alsamhi, Saeed Hamood |
|
|
148 |
C |
p. 250-265 |
artikel |
48 |
Towards accurate and privacy-preserving localization using anchor quality assessment in Internet of Things
|
Zuo, Fang |
|
|
148 |
C |
p. 524-537 |
artikel |
49 |
Towards sustainable agriculture: A lightweight hybrid model and cloud-based collection of datasets for efficient leaf disease detection
|
Thai, Huy-Tan |
|
|
148 |
C |
p. 488-500 |
artikel |
50 |
Union label smoothing adversarial training: Recognize small perturbation attacks and reject larger perturbation attacks balanced
|
Huang, Jinshu |
|
|
148 |
C |
p. 600-609 |
artikel |