nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Adding topology and memory awareness in data aggregation algorithms
|
Tessier, François |
|
|
159 |
C |
p. 188-203 |
artikel |
2 |
A methodology for comparing optimization algorithms for auto-tuning
|
Willemsen, Floris-Jan |
|
|
159 |
C |
p. 489-504 |
artikel |
3 |
Analyzing the blockchain mining strategy in Industrial Internet of Things: A game theoretical approach
|
Chen, Zhuo |
|
|
159 |
C |
p. 51-63 |
artikel |
4 |
An analysis of scientific group collaboration at JLESC
|
Ahmed, Iftekhar |
|
|
159 |
C |
p. 284-289 |
artikel |
5 |
An improved DDPG-based privacy sensitive level protection computation offloading method in mobile edge computing
|
Zhang, Hongxia |
|
|
159 |
C |
p. 522-532 |
artikel |
6 |
An interpretable deep learning model predicts RNA–small molecule binding sites
|
Xi, Wenyu |
|
|
159 |
C |
p. 557-566 |
artikel |
7 |
AQUA: Analytics-driven quantum neural network (QNN) user assistance for software validation
|
Park, Soohyun |
|
|
159 |
C |
p. 545-556 |
artikel |
8 |
A smart and novel approach for managing incast and in-network congestion through adaptive routing
|
Rocher-Gonzalez, Jose |
|
|
159 |
C |
p. 27-38 |
artikel |
9 |
Assessing the accuracy of remote sensing data products: A multi-granular spatial sampling method
|
Yi, Congqin |
|
|
159 |
C |
p. 151-160 |
artikel |
10 |
Asynchronous modeling workflows in CyberWater with on-demand HPC/Cloud access
|
Chen, Ranran |
|
|
159 |
C |
p. 307-322 |
artikel |
11 |
Byzantine-robust federated learning with ensemble incentive mechanism
|
Zhao, Shihai |
|
|
159 |
C |
p. 272-283 |
artikel |
12 |
CLAID: Closing the Loop on AI & Data Collection — A cross-platform transparent computing middleware framework for smart edge-cloud and digital biomarker applications
|
Langer, Patrick |
|
|
159 |
C |
p. 505-521 |
artikel |
13 |
Comparing Adiabatic Quantum Computers for satellite images feature extraction
|
Rocutto, Lorenzo |
|
|
159 |
C |
p. 105-113 |
artikel |
14 |
Dodo: A scalable optimistic deterministic concurrency control protocol
|
Wang, Xinyuan |
|
|
159 |
C |
p. 15-26 |
artikel |
15 |
Edge-Cloud Solutions for Big Data Analysis and Distributed Machine Learning - 1
|
Belcastro, Loris |
|
|
159 |
C |
p. 323-326 |
artikel |
16 |
Editorial Board
|
|
|
|
159 |
C |
p. ii |
artikel |
17 |
EleVMate — A data-driven approach for ‘on-the-fly’ horizontal small datacentre scalability and VM starvation
|
Alkhalaf, Asma |
|
|
159 |
C |
p. 91-101 |
artikel |
18 |
ELIDS: Ensemble Feature Selection for Lightweight IDS against DDoS Attacks in Resource-Constrained IoT Environment
|
Fatima, Mahawish |
|
|
159 |
C |
p. 172-187 |
artikel |
19 |
Energy consumption estimation and profiling for queries in distributed database systems based on a bottom-up comprehensive energy model
|
Guo, Binglei |
|
|
159 |
C |
p. 379-394 |
artikel |
20 |
EPSMR: An efficient privacy-preserving semantic-aware multi-keyword ranked search scheme in cloud
|
Liu, Yuanlong |
|
|
159 |
C |
p. 1-14 |
artikel |
21 |
Fair multiresource allocation with access constraint in cloud–edge systems
|
Li, Xingxing |
|
|
159 |
C |
p. 395-410 |
artikel |
22 |
From cloud and fog computing to federated-fog computing: A comparative analysis of computational resources in real-time IoT applications based on semantic interoperability
|
Huaranga-Junco, Edgar |
|
|
159 |
C |
p. 134-150 |
artikel |
23 |
Geant4: A game changer in high energy physics and related applicative fields
|
Basaglia, Tullio |
|
|
159 |
C |
p. 411-422 |
artikel |
24 |
GLSBIoT: GWO-based enhancement for lightweight scalable blockchain for IoT with trust based consensus
|
Padma, Adla |
|
|
159 |
C |
p. 64-76 |
artikel |
25 |
Identification of ferroptosis-related lncRNAs for predicting prognosis and immunotherapy response in non-small cell lung cancer
|
Yuan, Lin |
|
|
159 |
C |
p. 204-220 |
artikel |
26 |
Identifying a selection mechanism of distribution channel for the supply chain: The barriers to the application of web 3.0
|
Sun, Ling |
|
|
159 |
C |
p. 370-378 |
artikel |
27 |
Li-MSD: A lightweight mitigation solution for DAO insider attack in RPL-based IoT
|
Verma, Abhishek |
|
|
159 |
C |
p. 327-339 |
artikel |
28 |
Makespan minimization for workflows with multiple privacy levels
|
Wang, Shuang |
|
|
159 |
C |
p. 39-50 |
artikel |
29 |
Maximizing UAV fog deployment efficiency for critical rescue operations: A multi-objective optimization approach
|
Naouri, Abdenacer |
|
|
159 |
C |
p. 255-271 |
artikel |
30 |
Multi-task federated learning-based system anomaly detection and multi-classification for microservices architecture
|
Hao, Junfeng |
|
|
159 |
C |
p. 77-90 |
artikel |
31 |
mWIoTAuth: Multi-wearable data-driven implicit IoT authentication
|
Vhaduri, Sudip |
|
|
159 |
C |
p. 230-242 |
artikel |
32 |
Optimal service caching, pricing and task partitioning in mobile edge computing federation
|
Huang, Hualong |
|
|
159 |
C |
p. 340-352 |
artikel |
33 |
Parallel and consistent live checkpointing and restoration of split-memory VMs
|
Murata, Tokito |
|
|
159 |
C |
p. 432-443 |
artikel |
34 |
Parallel intersection counting on shared-memory multiprocessors and GPUs
|
Marzolla, Moreno |
|
|
159 |
C |
p. 423-431 |
artikel |
35 |
Preface of special issue on Artificial Intelligence for time-critical computing systems
|
Cheng, Long |
|
|
159 |
C |
p. 102-104 |
artikel |
36 |
Quantum simulation of dissipation for Maxwell equations in dispersive media
|
Koukoutsis, Efstratios |
|
|
159 |
C |
p. 221-229 |
artikel |
37 |
Refining computer tomography data with super-resolution networks to increase the accuracy of respiratory flow simulations
|
Liu, Xin |
|
|
159 |
C |
p. 474-488 |
artikel |
38 |
Reliable incentive mechanism in hierarchical federated learning based on two-way reputation and contract theory
|
Cai, Hongyun |
|
|
159 |
C |
p. 533-544 |
artikel |
39 |
Replica fault-tolerant scheduling with time guarantee under energy constraint in fog computing
|
Liu, Ruihua |
|
|
159 |
C |
p. 567-579 |
artikel |
40 |
Robustness evaluation of large-scale machine learning-based reduced order models for reproducing flow fields
|
Higashida, Aito |
|
|
159 |
C |
p. 243-254 |
artikel |
41 |
Secure Processing-aware Media Storage and Archival (SPMSA)
|
Noor, Jannatun |
|
|
159 |
C |
p. 290-306 |
artikel |
42 |
StructMesh: A storage framework for serverless computing continuum
|
Carrizales-Espinoza, Diana |
|
|
159 |
C |
p. 353-369 |
artikel |
43 |
The explainable structure of deep neural network for recommendation systems
|
Zanjani, Mohammad Daryaie |
|
|
159 |
C |
p. 459-473 |
artikel |
44 |
Transaction monitoring in anti-money laundering: A qualitative analysis and points of view from industry
|
Oztas, Berkan |
|
|
159 |
C |
p. 161-171 |
artikel |
45 |
Understanding global aggregation and optimization of federated learning
|
Nanayakkara, Shanika Iroshi |
|
|
159 |
C |
p. 114-133 |
artikel |
46 |
X-OpenMP — eXtreme fine-grained tasking using lock-less work stealing
|
Nookala, Poornima |
|
|
159 |
C |
p. 444-458 |
artikel |