nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Accelerating Maximal Bicliques Enumeration with GPU on large scale network
|
Wu, Chunqi |
|
|
161 |
C |
p. 601-613 |
artikel |
2 |
A cross-modal high-resolution image generation approach based on cloud-terminal collaboration for low-altitude intelligent network
|
Jiao, Minghai |
|
|
161 |
C |
p. 686-700 |
artikel |
3 |
A dynamic multi-objective evolutionary algorithm with variable stepsize and dual prediction strategies
|
Peng, Hu |
|
|
161 |
C |
p. 390-403 |
artikel |
4 |
Agile Optimization Framework: A framework for tensor operator optimization in neural network
|
Zhou, Mingwei |
|
|
161 |
C |
p. 432-444 |
artikel |
5 |
An exploration of online-simulation-driven portfolio scheduling in Workflow Management Systems
|
McDonald, Jesse |
|
|
161 |
C |
p. 345-360 |
artikel |
6 |
An integrated model based on deep learning classifiers and pre-trained transformer for phishing URL detection
|
Do, Nguyet Quang |
|
|
161 |
C |
p. 269-285 |
artikel |
7 |
A prototype-assisted clustered federated learning for big data security and privacy preservation
|
Jiang, Yalan |
|
|
161 |
C |
p. 376-389 |
artikel |
8 |
A read-efficient and write-optimized hash table for Intel Optane DC Persistent Memory
|
Li, Zexuan |
|
|
161 |
C |
p. 49-65 |
artikel |
9 |
A survey on checkpointing strategies: Should we always checkpoint à la Young/Daly?
|
Bautista-Gomez, Leonardo |
|
|
161 |
C |
p. 315-328 |
artikel |
10 |
A two-stage budget-feasible mechanism for mobile crowdsensing based on maximum user revenue routing
|
Zhang, Jixian |
|
|
161 |
C |
p. 201-213 |
artikel |
11 |
Benchmarking parallel programming for single-board computers
|
Hoffmann, Renato B. |
|
|
161 |
C |
p. 119-134 |
artikel |
12 |
ChatOps for microservice systems: A low-code approach using service composition and large language models
|
Wang, Sheng-Kai |
|
|
161 |
C |
p. 518-530 |
artikel |
13 |
Clusterslice: Slicing resources for zero-touch Kubernetes-based experimentation
|
Mamatas, Lefteris |
|
|
161 |
C |
p. 1-10 |
artikel |
14 |
CTF-DDI: Constrained tensor factorization for drug–drug interactions prediction
|
Han, Guosheng |
|
|
161 |
C |
p. 26-34 |
artikel |
15 |
CUPID: An efficient spatio-temporal data engine
|
Wu, Hang |
|
|
161 |
C |
p. 531-544 |
artikel |
16 |
Deciphering the abundance of immune cells in glomerular endothelium of Alport syndrome kidneys using the deconvolution algorithm CONVdeconv
|
Sun, Yizhou |
|
|
161 |
C |
p. 496-501 |
artikel |
17 |
DeFuseDTI: Interpretable drug target interaction prediction model with dual-branch encoder and multiview fusion
|
Feng, Bao-Ming |
|
|
161 |
C |
p. 239-247 |
artikel |
18 |
Digital Twin and federated learning enabled cyberthreat detection system for IoT networks
|
Salim, Mikail Mohammed |
|
|
161 |
C |
p. 701-713 |
artikel |
19 |
Distributed asynchronous rendezvous planning on the line for multi-agent systems
|
Ozsoyeller, Deniz |
|
|
161 |
C |
p. 35-48 |
artikel |
20 |
3DSGIMD: An accurate and interpretable molecular property prediction method using 3D spatial graph focusing network and structure-based feature fusion
|
Tian, Yanan |
|
|
161 |
C |
p. 189-200 |
artikel |
21 |
DTRE: A model for predicting drug-target interactions of endometrial cancer based on heterogeneous graph
|
Li, Meng |
|
|
161 |
C |
p. 478-486 |
artikel |
22 |
Editorial Board
|
|
|
|
161 |
C |
p. ii |
artikel |
23 |
Efficient and scalable covariate drift detection in machine learning systems with serverless computing
|
Céspedes Sisniega, Jaime |
|
|
161 |
C |
p. 174-188 |
artikel |
24 |
Energy-aware virtual machine placement based on a holistic thermal model for cloud data centers
|
Lin, Jianpeng |
|
|
161 |
C |
p. 302-314 |
artikel |
25 |
Enterprise architecture-based metamodel for machine learning projects and its management
|
Takeuchi, Hironori |
|
|
161 |
C |
p. 135-145 |
artikel |
26 |
Extreme-scale workflows: A perspective from the JLESC international community
|
Yildiz, Orcun |
|
|
161 |
C |
p. 502-513 |
artikel |
27 |
Fault-tolerant deep learning inference on CPU-GPU integrated edge devices with TEEs
|
Xu, Hongjian |
|
|
161 |
C |
p. 404-414 |
artikel |
28 |
FRESH: Fault-tolerant Real-time Scheduler for Heterogeneous multiprocessor platforms
|
Moulik, Sanjay |
|
|
161 |
C |
p. 214-225 |
artikel |
29 |
Harnessing federated learning for anomaly detection in supercomputer nodes
|
Farooq, Emmen |
|
|
161 |
C |
p. 673-685 |
artikel |
30 |
Hierarchical sharding blockchain storage solution for edge computing
|
Li, Cong |
|
|
161 |
C |
p. 162-173 |
artikel |
31 |
Identification and model construction of survival-associated proteins for pancreatic cancer based on deep learning
|
Chen, Ying |
|
|
161 |
C |
p. 487-495 |
artikel |
32 |
Integrating fully homomorphic encryption to enhance the security of blockchain applications
|
Wu, Xiaohua |
|
|
161 |
C |
p. 467-477 |
artikel |
33 |
Integrating quantum computing resources into scientific HPC ecosystems
|
Beck, Thomas |
|
|
161 |
C |
p. 11-25 |
artikel |
34 |
Investigation on cellular LTE C-V2X network serving vehicular data traffic in realistic urban scenarios
|
Mir, Zeeshan Hameed |
|
|
161 |
C |
p. 66-80 |
artikel |
35 |
IoT-driven blockchain to manage the healthcare supply chain and protect medical records
|
Rizzardi, Alessandra |
|
|
161 |
C |
p. 415-431 |
artikel |
36 |
MedT2T: An adaptive pointer constrain generating method for a new medical text-to-table task
|
Zhao, Wang |
|
|
161 |
C |
p. 586-600 |
artikel |
37 |
Minimum-energy virtual machine placement using embedded sensors and machine learning
|
Moocheet, N. |
|
|
161 |
C |
p. 85-94 |
artikel |
38 |
MURE: Multi-layer real-time livestock management architecture with unmanned aerial vehicles using deep reinforcement learning
|
Tian, Xinyu |
|
|
161 |
C |
p. 454-466 |
artikel |
39 |
On the choice of physical constraints in artificial neural networks for predicting flow fields
|
Puri, Rishabh |
|
|
161 |
C |
p. 361-375 |
artikel |
40 |
ORR-CP-ABE: A secure and efficient outsourced attribute-based encryption scheme with decryption results reuse
|
Tao, Yu |
|
|
161 |
C |
p. 559-571 |
artikel |
41 |
PoAh 2.0: AI-empowered dynamic authentication based adaptive blockchain consensus for IoMT-edge workflow
|
Dutta, Joy |
|
|
161 |
C |
p. 655-672 |
artikel |
42 |
Portability and scalability evaluation of large-scale statistical modeling and prediction software through HPC-ready containers
|
Abdulah, Sameh |
|
|
161 |
C |
p. 248-258 |
artikel |
43 |
PowerTrain: Fast, generalizable time and power prediction models to optimize DNN training on accelerated edges
|
S.K., Prashanthi |
|
|
161 |
C |
p. 329-344 |
artikel |
44 |
Privacy-preserving edge federated learning for intelligent mobile-health systems
|
Aminifar, Amin |
|
|
161 |
C |
p. 625-637 |
artikel |
45 |
Reciprocal Federated Learning Framework: Balancing incentives for model and data owners
|
Xu, Han |
|
|
161 |
C |
p. 146-161 |
artikel |
46 |
Revolutionizing machine learning: Blockchain-based crowdsourcing for transparent and fair labeled datasets supply
|
Xu, Haitao |
|
|
161 |
C |
p. 106-118 |
artikel |
47 |
Scalability through Pulverisation: Declarative deployment reconfiguration at runtime
|
Farabegoli, Nicolas |
|
|
161 |
C |
p. 545-558 |
artikel |
48 |
Self-adaptive asynchronous federated optimizer with adversarial sharpness-aware minimization
|
Zhang, Xiongtao |
|
|
161 |
C |
p. 638-654 |
artikel |
49 |
Serverless computing in the cloud-to-edge continuum
|
Puliafito, Carlo |
|
|
161 |
C |
p. 514-517 |
artikel |
50 |
SHIELD: A Secure Heuristic Integrated Environment for Load Distribution in Rural-AI
|
Kaushal, Ashish |
|
|
161 |
C |
p. 286-301 |
artikel |
51 |
Special Issue on Digital Twin for Future Networks and Emerging IoT Applications (DT4IoT)
|
Hakiri, Akram |
|
|
161 |
C |
p. 81-84 |
artikel |
52 |
Speeding up the communications on a cluster using MPI by means of Software Defined Networks
|
Gomariz-Martínez, Pablo |
|
|
161 |
C |
p. 614-624 |
artikel |
53 |
ST-TrajGAN: A synthetic trajectory generation algorithm for privacy preservation
|
Ma, Xuebin |
|
|
161 |
C |
p. 226-238 |
artikel |
54 |
TITE: A transformer-based deep reinforcement learning approach for traffic engineering in hybrid SDN with dynamic traffic
|
Lin, Bin |
|
|
161 |
C |
p. 95-105 |
artikel |
55 |
TransGINmer: Identifying viral sequences from metagenomes with self-attention and Graph Isomorphism Network
|
Wang, Jianan |
|
|
161 |
C |
p. 445-453 |
artikel |
56 |
TriStack enables accurate identification of antimicrobial and anti-inflammatory peptides by combining machine learning and deep learning approaches
|
Han, Jiyun |
|
|
161 |
C |
p. 259-268 |
artikel |
57 |
VESBELT: An energy-efficient and low-latency aware task offloading in Maritime Internet-of-Things networks using ensemble neural networks
|
Ghoshal, Sudip Chandra |
|
|
161 |
C |
p. 572-585 |
artikel |