Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             42 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A cyber-enabled visual inspection system for rail corrugation Li, Qingyong
2018
79 P1 p. 374-382
artikel
2 Advance reservation access control using software-defined networking and tokens Chung, Joaquin
2018
79 P1 p. 225-234
artikel
3 A learning automata-based ensemble resource usage prediction algorithm for cloud computing environment Rahmanian, Ali Asghar
2018
79 P1 p. 54-71
artikel
4 A novel cost-efficient approach for deadline-constrained workflow scheduling by dynamic provisioning of resources Singh, Vishakha
2018
79 P1 p. 95-110
artikel
5 A novel optimized vertical handover framework for seamless networking integration in cyber-enabled systems Li, Xiaohong
2018
79 P1 p. 417-430
artikel
6 A novel statistical technique for intrusion detection systems Kabir, Enamul
2018
79 P1 p. 303-318
artikel
7 An over-the-air key establishment protocol using keyless cryptography Zhang, Yuexin
2018
79 P1 p. 284-294
artikel
8 ARMOR: A trust-based privacy-preserving framework for decentralized friend recommendation in online social networks Ma, Xindi
2018
79 P1 p. 82-94
artikel
9 Automated multi-level malware detection system based on reconstructed semantic view of executables using machine learning techniques at VMM M.A., Ajay Kumara
2018
79 P1 p. 431-446
artikel
10 Bridging the gap between peak and average loads on science networks Nickolay, Sam
2018
79 P1 p. 169-179
artikel
11 Circumventing iOS security mechanisms for APT forensic investigations: A security taxonomy for cloud apps D’Orazio, Christian J.
2018
79 P1 p. 247-261
artikel
12 Cloud computing based bushfire prediction for cyber–physical emergency applications Garg, Saurabh
2018
79 P1 p. 354-363
artikel
13 Configuring in-memory cluster computing using random forest Bei, Zhendong
2018
79 P1 p. 1-15
artikel
14 CoreFlow: Enriching Bro security events using network traffic monitoring data Koning, Ralph
2018
79 P1 p. 235-242
artikel
15 Cybermatics: Advanced Strategy and Technology for Cyber-Enabled Systems and Applications Zhou, Xiaokang
2018
79 P1 p. 350-353
artikel
16 Distributed data-driven platform for urgent decision making in cardiological ambulance control Kovalchuk, Sergey V.
2018
79 P1 p. 144-154
artikel
17 Editorial Board 2018
79 P1 p. IFC
artikel
18 Editorial INDIS special section FGCS Grosso, Paola
2018
79 P1 p. 166-168
artikel
19 Enabling intent to configure scientific networks for high performance demands Kiran, Mariam
2018
79 P1 p. 205-214
artikel
20 Energy-efficient data transfers in radio astronomy with software UDP RDMA Lenkiewicz, Przemyslaw
2018
79 P1 p. 215-224
artikel
21 Enhancing large-scale docking simulation on heterogeneous systems: An MPI vs rCUDA study Imbernón, Baldomero
2018
79 P1 p. 26-37
artikel
22 Event recommendation in social networks based on reverse random walk and participant scale control Mo, Yijun
2018
79 P1 p. 383-395
artikel
23 Geo-QTI: A quality aware truthful incentive mechanism for cyber–physical enabled Geographic crowdsensing Dai, Wei
2018
79 P1 p. 447-459
artikel
24 Holistic approach to management of IT infrastructure for environmental monitoring and decision support systems with urgent computing capabilities Balis, Bartosz
2018
79 P1 p. 128-143
artikel
25 Hunting for DOM-Based XSS vulnerabilities in mobile cloud-based online social network Gupta, Shashank
2018
79 P1 p. 319-336
artikel
26 Integration of numerical model and cloud computing Chen, Chong
2018
79 P1 p. 396-407
artikel
27 Maximizing the performance of scientific data transfer by optimizing the interface between parallel file systems and advanced research networks Mills, Nicholas
2018
79 P1 p. 190-198
artikel
28 mdtmFTP and its evaluation on ESNET SDN testbed Zhang, Liang
2018
79 P1 p. 199-204
artikel
29 Multimodel agent-based simulation environment for mass-gatherings and pedestrian dynamics Karbovskii, Vladislav
2018
79 P1 p. 155-165
artikel
30 Network measurement for 100 GbE network links using multicore processors Wu, Xiaoban
2018
79 P1 p. 180-189
artikel
31 Norm-based deontic logic for access control, some computational results Sun, Xin
2018
79 P1 p. 295-302
artikel
32 Overlap community detection using spectral algorithm based on node convergence degree Li, Weimin
2018
79 P1 p. 408-416
artikel
33 PAT: A precise reward scheme achieving anonymity and traceability for crowdcomputing in public clouds Wang, Huaqun
2018
79 P1 p. 262-270
artikel
34 PPDP: An efficient and privacy-preserving disease prediction scheme in cloud-based e-Healthcare system Zhang, Chuan
2018
79 P1 p. 16-25
artikel
35 Price forecasting for spot instances in Cloud computing Cai, Zhicheng
2018
79 P1 p. 38-53
artikel
36 Privacy-preserving personal data operation on mobile cloud—Chances and challenges over advanced persistent threat Au, Man Ho
2018
79 P1 p. 337-349
artikel
37 Regression based performance modeling and provisioning for NoSQL cloud databases Farias, Victor A.E.
2018
79 P1 p. 72-81
artikel
38 Reprint of “A robust reliable energy-aware urgent computing resource allocation for flash-flood ensemble forecasting on HPC infrastructures for decision support” Leong, Siew Hoon
2018
79 P1 p. 114-127
artikel
39 Scalable and secure access control policy update for outsourced big data Fugkeaw, Somchart
2018
79 P1 p. 364-373
artikel
40 Special Issue on Advanced Persistent Threat Chen, Jiageng
2018
79 P1 p. 243-246
artikel
41 The flexible and privacy-preserving proximity detection in mobile social network Ye, Ayong
2018
79 P1 p. 271-283
artikel
42 Urgent computing for decision support in critical situations Boukhanovsky, Alexander V.
2018
79 P1 p. 111-113
artikel
                             42 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland