Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             95 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Adaptive incremental transfer learning for efficient performance modeling of big data workloads Garralda-Barrio, Mariano

166 C p.
artikel
2 Adaptive Stochastic Gradient Descent (SGD) for erratic datasets Dagal, Idriss

166 C p.
artikel
3 A decentralized asynchronous federated learning framework for edge devices Wang, Bin

166 C p.
artikel
4 Advancing anomaly detection in computational workflows with active learning Raghavan, Krishnan

166 C p.
artikel
5 Advancing cuffless arterial blood pressure estimation: A patient-specific optimized approach reducing computational requirements González-Nóvoa, José A.

166 C p.
artikel
6 A Framework for testing Federated Learning algorithms using an edge-like environment Schwanck, Felipe Machado

166 C p.
artikel
7 A hierarchical control for application placement and load distribution in Edge Computing Maia, Adyson M.

166 C p.
artikel
8 AISAW: An adaptive interference-aware scheduling algorithm for acceleration of deep learning workloads training on distributed heterogeneous systems Bi, Yushen

166 C p.
artikel
9 A Kubernetes-based scheme for efficient resource allocation in containerized workflow Liu, Danyang

166 C p.
artikel
10 A mask guided cross data augmentation method for industrial defect detection Wang, Xubin

166 C p.
artikel
11 An efficient blockchain for decentralized ABAC policy decision point Hu, Qiwei

166 C p.
artikel
12 An enhanced list scheduling algorithm for heterogeneous computing using an optimized Predictive Cost Matrix Wang, Min

166 C p.
artikel
13 A protocol generation model for protocol-unknown IoT devices Gao, Zheng

166 C p.
artikel
14 Artificial intelligence integration for extension of big data for decision-making Fatnassi, khaoula

166 C p.
artikel
15 A sampling-based acceleration method for heterogeneous chiplet NoC simulations Xiong, Ruoting

166 C p.
artikel
16 Automated generation of deployment descriptors for managing microservices-based applications in the cloud to edge continuum DesLauriers, James

166 C p.
artikel
17 A vehicular edge computing offloading and task caching solution based on spatiotemporal prediction Zhu, Lin

166 C p.
artikel
18 Blockchain and digital twin empowered edge caching for D2D wireless networks Du, Jianbo

166 C p.
artikel
19 Blockchain and timely auction mechanism-based spectrum management Zhang, Hongyi

166 C p.
artikel
20 Click-level supervision for online action detection extended from SCOAD Zhang, Xing

166 C p.
artikel
21 Contribution prediction in federated learning via client behavior evaluation Al-Saedi, Ahmed A.

166 C p.
artikel
22 Cooperative metric learning-based hybrid transformer for automatic recognition of standard echocardiographic multi-views Li, Yiran

166 C p.
artikel
23 CyberAIBot: Artificial Intelligence in an intrusion detection system for CyberSecurity in the IoT Serrano, Will

166 C p.
artikel
24 Devising an actor-based middleware support to federated learning experiments and systems Bechini, Alessio

166 C p.
artikel
25 Distributed and heterogeneous tensor–vector contraction algorithms for high performance computing Martinez-Ferrer, Pedro J.

166 C p.
artikel
26 DLST-MQTT: Dynamic and lightweight security over topics MQTT De Rango, Floriano

166 C p.
artikel
27 DP-LTGAN: Differentially private trajectory publishing via Locally-aware Transformer-based GAN Zhang, R.

166 C p.
artikel
28 Dual-channel meta-federated graph learning with robust aggregation and privacy enhancement Huang, Jingtong

166 C p.
artikel
29 Dynamic neighborhood grouping-based multi-objective scheduling algorithm for workflow in hybrid cloud Guo, Yulin

166 C p.
artikel
30 EC5: Edge–cloud collaborative computing framework with compressive communication Tan, Jingwei

166 C p.
artikel
31 Editorial Board
166 C p.
artikel
32 Efficient distributed matrix for resolving computational intensity in remote sensing Zou, Weitao

166 C p.
artikel
33 Efficient Number Theoretic Transform accelerator on the versal platform powered by the AI Engine Bao, Zhenshan

166 C p.
artikel
34 Energy-aware scheduling and two-tier coordinated load balancing for streaming applications in apache flink Li, Hongjian

166 C p.
artikel
35 Enhancing E-business in industry 4.0: Integrating fog/edge computing with Data LakeHouse for IIoT Routaib, Hayat

166 C p.
artikel
36 Enhancing IoT security: Assessing instantaneous communication trust to detect man-in-the-middle attacks Basri, Rabeya

166 C p.
artikel
37 Enhancing performance of machine learning tasks on edge-cloud infrastructures: A cross-domain Internet of Things based framework Almurshed, Osama

166 C p.
artikel
38 ENNigma: A framework for Private Neural Networks Barbosa, Pedro

166 C p.
artikel
39 Ensuring the federation correctness: Formal verification of Federated Learning in industrial cyber-physical systems Guendouzi, Badra Souhila

166 C p.
artikel
40 Enterprise architecture of IoT-based applications: A review Li, Xuemei

166 C p.
artikel
41 Evolutionary optimization of spatially-distributed multi-sensors placement for indoor surveillance environments with security levels Moreno-Saavedra, Luis M.

166 C p.
artikel
42 FedCOLA: Federated learning with heterogeneous feature concatenation and local acceleration for non-IID data Chung, Wu-Chun

166 C p.
artikel
43 FedDSHAR: A dual-strategy federated learning approach for human activity recognition amid noise label user Lin, Ziqian

166 C p.
artikel
44 FedShufde: A privacy preserving framework of federated learning for edge-based smart UAV delivery system Yao, Aiting

166 C p.
artikel
45 Finding BERT errors by clustering activation vectors Andreopoulos, William B.

166 C p.
artikel
46 Flexible hybrid post-quantum bidirectional multi-factor authentication and key agreement framework using ECC and KEM Braeken, A.

166 C p.
artikel
47 Flow timeout matters: Investigating the impact of active and idle timeouts on the performance of machine learning models in detecting security threats Janati Idrissi, Meryem

166 C p.
artikel
48 Formal definition and implementation of reproducibility tenets for computational workflows Pritchard, Nicholas J.

166 C p.
artikel
49 Forward-Secure multi-user and verifiable dynamic searchable encryption scheme within a zero-trust environment Xu, Zhihao

166 C p.
artikel
50 Fuzzy energy management strategies for energy harvesting IoT nodes based on a digital twin concept Prauzek, Michal

166 C p.
artikel
51 Generating hard Ising instances with planted solutions using post-quantum cryptographic protocols Mandrà, Salvatore

166 C p.
artikel
52 GPartition-store: A multi-group collaborative parallel data storage mechanism for permissioned blockchain sharding Qiu, Lin

166 C p.
artikel
53 HephaestusForge: Optimal microservice deployment across the Compute Continuum via Reinforcement Learning Santos, José

166 C p.
artikel
54 Hybrid deep learning-based cyberthreat detection and IoMT data authentication model in smart healthcare Kumar, Manish

166 C p.
artikel
55 Integrating scientific single-page applications with DevSecOps Drane, Lance

166 C p.
artikel
56 Integrita: A BFT distributed storage system Taheri Boshrooyeh, Sanaz

166 C p.
artikel
57 IoVST: An anomaly detection method for IoV based on spatiotemporal feature fusion Cao, Jinhui

166 C p.
artikel
58 KDRSFL: A knowledge distillation resistance transfer framework for defending model inversion attacks in split federated learning Chen, Renlong

166 C p.
artikel
59 Leveraging local and global relationships for corrupted label detection Lam, Phong

166 C p.
artikel
60 LightMOT: Lightweight and anchor-free solution for tracking multiple objects in dense populations Karthikeyan, P

166 C p.
artikel
61 LineJLocRepair: A line-level method for Automated Vulnerability Repair based on joint training Hou, Jing

166 C p.
artikel
62 Machine Learning-Based Attack Detection for the Internet of Things Bikila, Dawit Dejene

166 C p.
artikel
63 MHSC: A meta-heuristic method to optimize throughput and energy using sensitivity rate computing Delavar, Arash Ghorbannia

166 C p.
artikel
64 MSCPR: A maintainable vector commitment-based stateless cryptocurrency system with privacy preservation and regulatory compliance Yang, Xingyu

166 C p.
artikel
65 Multilayer multivariate forecasting network for precise resource utilization prediction in edge data centers Tripathi, Shivani

166 C p.
artikel
66 Multi-Tree Genetic Programming with Elite Recombination for dynamic task scheduling of satellite edge computing Zhang, Changzhen

166 C p.
artikel
67 Optimizing mobile blockchain networks: A game theoretical approach to cooperative multi-terminal computation Pan, Lin

166 C p.
artikel
68 Parallel software design of large-scale diamond-structured crystals molecular dynamics simulation Liang, Jianguo

166 C p.
artikel
69 PHiFL-TL: Personalized hierarchical federated learning using transfer learning Afzali, Afsaneh

166 C p.
artikel
70 PLangRec: Deep-learning model to predict the programming language from a single line of code Rodriguez-Prieto, Oscar

166 C p.
artikel
71 Prompting Robotic Modalities (PRM): A structured architecture for centralizing language models in complex systems Benjdira, Bilel

166 C p.
artikel
72 PSPL: A Ponzi scheme smart contracts detection approach via compressed sensing oversampling-based peephole LSTM Wang, Lei

166 C p.
artikel
73 Quantum machine learning algorithms for anomaly detection: A review Corli, Sebastiano

166 C p.
artikel
74 QuantuneV2: Compiler-based local metric-driven mixed precision quantization for practical embedded AI applications Kim, Jeongseok

166 C p.
artikel
75 RADiCe: A Risk Analysis Framework for Data Centers Mastenbroek, Fabian

166 C p.
artikel
76 Raising user awareness through unsupervised clustering of energy consumption habits Marcello, Francesca

166 C p.
artikel
77 Regularity-driven pattern extraction and analysis approach by the pre-pruning technique without pattern loss Kim, Heonho

166 C p.
artikel
78 Regulating CPU temperature with thermal-aware scheduling using a reduced order learning thermal model Dowling, Anthony

166 C p.
artikel
79 Remote sensing revolutionizing agriculture: Toward a new frontier Wang, Xiaoding

166 C p.
artikel
80 SAS: Speculative Locality Aware Scheduling for I/O intensive scientific analysis in clouds Zahir, Ali

166 C p.
artikel
81 Scalable compute continuum Cardellini, Valeria

166 C p.
artikel
82 Scheduling energy-constrained parallel applications in heterogeneous systems Xu, Hongzhi

166 C p.
artikel
83 SecDS: A security-aware DAG task scheduling strategy for edge computing Long, Linbo

166 C p.
artikel
84 Secure blockchain-based reputation system for IIoT-enabled retail industry with resistance to sybil attack Zhao, Wenjia

166 C p.
artikel
85 Secure integration of 5G in industrial networks: State of the art, challenges and opportunities Michaelides, Sotiris

166 C p.
artikel
86 Service-driven dynamic QoS on-demand routing algorithm She, Hao

166 C p.
artikel
87 Smart contract-based public integrity auditing for cloud storage against malicious auditors Tian, Hui

166 C p.
artikel
88 Straggler mitigation via hierarchical scheduling in elastic stream computing systems Wu, Minghui

166 C p.
artikel
89 TEMPORISE: Extracting semantic representations of varied input executions for silent data corruption evaluation Ma, Junchi

166 C p.
artikel
90 Towards efficient privacy-preserving conjunctive keywords search over encrypted cloud data Liu, Yaru

166 C p.
artikel
91 UD-LDP: A Technique for optimally catalyzing user driven Local Differential Privacy Thedchanamoorthy, Gnanakumar

166 C p.
artikel
92 Uncertainty-aware scheduling for effective data collection from environmental IoT devices through LEO satellites Xu, Haoran

166 C p.
artikel
93 Using binary hash tree-based encryption to secure a deep learning model and generated images for social media applications Rohhila, Soniya

166 C p.
artikel
94 VLCQ: Post-training quantization for deep neural networks using variable length coding Abdel-Salam, Reem

166 C p.
artikel
95 WFE-Tab: Overcoming limitations of TabPFN in IIoT-MEC environments with a weighted fusion ensemble-TabPFN model for improved IDS performance Ruiz-Villafranca, Sergio

166 C p.
artikel
                             95 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland