Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             52 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A computational model to support in-network data analysis in federated ecosystems Zamani, Ali Reza
2018
80 C p. 342-354
artikel
2 Adaptive composition in dynamic service environments Barakat, Lina
2018
80 C p. 215-228
artikel
3 AFT: Adaptive and fault tolerant peer-to-peer overlay—A user-centric solution for data sharing Poenaru, Andrei
2018
80 C p. 583-595
artikel
4 A novel face recognition algorithm via weighted kernel sparse representation Liu, Xingang
2018
80 C p. 653-663
artikel
5 A robust and anonymous patient monitoring system using wireless medical sensor networks Amin, Ruhul
2018
80 C p. 483-495
artikel
6 A service-oriented framework for collating retail intelligence Anderson, Mark
2018
80 C p. 400-408
artikel
7 A Sybil attack detection scheme for a forest wildfire monitoring application Jan, Mian Ahmad
2018
80 C p. 613-626
artikel
8 A traceability chain algorithm for artificial neural networks using T–S fuzzy cognitive maps in blockchain Chen, Rui-Yang
2018
80 C p. 198-210
artikel
9 Automatic security verification of mobile app configurations Costa, Gabriele
2018
80 C p. 519-536
artikel
10 BPMN 2.0: The state of support and implementation Geiger, Matthias
2018
80 C p. 250-262
artikel
11 Cloud-based scalable object detection and classification in video streams Yaseen, Muhammad Usman
2018
80 C p. 286-298
artikel
12 Eagle+: A fast incremental approach to automaton and table online updates for cloud services Li, Jianxin
2018
80 C p. 275-285
artikel
13 Editorial Board 2018
80 C p. IFC
artikel
14 Efficient finer-grained incremental processing with MapReduce for big data Zhang, Liang
2018
80 C p. 102-111
artikel
15 Energy-aware and multi-resource overload probability constraint-based virtual machine dynamic consolidation method Li, Zhihua
2018
80 C p. 139-156
artikel
16 Energy-aware composition for wireless sensor networks as a service Zhou, Zhangbing
2018
80 C p. 299-310
artikel
17 Evaluation of transaction authentication methods for online banking Kiljan, Sven
2018
80 C p. 430-447
artikel
18 Expert system for nutrition care process of older adults Cioara, Tudor
2018
80 C p. 368-383
artikel
19 Forensic engineering for resolving ownership problem of reusable IP core generated during high level synthesis Sengupta, Anirban
2018
80 C p. 29-46
artikel
20 Full integrity and freshness for cloud data Jin, Hao
2018
80 C p. 640-652
artikel
21 HB + DB : Distance bounding meets human based authentication Pagnin, Elena
2018
80 C p. 627-639
artikel
22 Information-centric framework for the Internet of Things (IoT): Traffic modeling & optimization Al-Turjman, Fadi
2018
80 C p. 63-75
artikel
23 InOt-RePCoN: Forecasting user behavioural trend in large-scale cloud environments Panneerselvam, John
2018
80 C p. 322-341
artikel
24 Loom: Complex large-scale visual insight for large hybrid IT infrastructure management Brook, James
2018
80 C p. 47-62
artikel
25 Matching federation identities, the eduGAIN and STORK approach Torroglosa, Elena
2018
80 C p. 126-138
artikel
26 MidSHM: A Middleware for WSN-based SHM Application using Service-Oriented Architecture Sahni, Yuvraj
2018
80 C p. 263-274
artikel
27 Multimodal biometric Identity Based Encryption Sarier, Neyire Deniz
2018
80 C p. 112-125
artikel
28 On the design and analysis of protocols for Personal Health Record storage on Personal Data Server devices Belyaev, Kirill
2018
80 C p. 467-482
artikel
29 Owner based malware discrimination Han, Lansheng
2018
80 C p. 496-504
artikel
30 Partitioning big graph with respect to arbitrary proportions in a streaming manner Hu, Ke-kun
2018
80 C p. 1-11
artikel
31 Pattern graph tracking-based stock price prediction using big data Jeon, Seungwoo
2018
80 C p. 171-187
artikel
32 Performance comparison of intrusion detection systems and application of machine learning to Snort system Shah, Syed Ali Raza
2018
80 C p. 157-170
artikel
33 Privacy-based recommendation mechanism in mobile participatory sensing systems using crowdsourced users’ preferences Liu, Rui
2018
80 C p. 76-88
artikel
34 Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry Qiu, Meikang
2018
80 C p. 421-429
artikel
35 Programmable architecture based on Software Defined Network for Internet of Things: Connected Dominated Sets approach Bendouda, Djamila
2018
80 C p. 188-197
artikel
36 QoS-aware automatic syntactic service composition problem: Complexity and resolution Gabrel, Virginie
2018
80 C p. 311-321
artikel
37 Reprint of “LBBSRT: An efficient SDN load balancing scheme based on server response time” Zhong, Hong
2018
80 C p. 409-416
artikel
38 Reprint of “You can’t touch this: Consumer-centric android application repackaging detection” Gurulian, Iakovos
2018
80 C p. 537-545
artikel
39 Risk analysis of Android applications: A user-centric solution Dini, Gianluca
2018
80 C p. 505-518
artikel
40 Secure and anonymous decentralized Bitcoin mixing Ziegeldorf, Jan Henrik
2018
80 C p. 448-466
artikel
41 Security, privacy and trust of user-centric solutions Akram, Raja Naeem
2018
80 C p. 417-420
artikel
42 Self-adaptive cloud monitoring with online anomaly detection Wang, Tao
2018
80 C p. 89-101
artikel
43 Service-Oriented System Engineering Bessis, Nik
2018
80 C p. 211-214
artikel
44 Single-pass based efficient erasable pattern mining using list data structure on dynamic incremental databases Lee, Gangin
2018
80 C p. 12-28
artikel
45 S-InTime: A social cloud analytical service oriented system Piccialli, Francesco
2018
80 C p. 229-241
artikel
46 Social collaborative service recommendation approach based on user’s trust and domain-specific expertise Kalaï, Ahlem
2018
80 C p. 355-367
artikel
47 Speed control of mobile chargers serving wireless rechargeable networks Chen, Feiyu
2018
80 C p. 242-249
artikel
48 Testing of transactional services in NoSQL key-value databases González-Aparicio, María Teresa
2018
80 C p. 384-399
artikel
49 Time-based low emission zones preserving drivers’ privacy Jardí-Cedó, Roger
2018
80 C p. 558-571
artikel
50 Trusted mobile computing: An overview of existing solutions Bouazzouni, Mohamed Amine
2018
80 C p. 596-612
artikel
51 XSACd—Cross-domain resource sharing & access control for smart environments Fysarakis, Konstantinos
2018
80 C p. 572-582
artikel
52 Your WiFi is leaking: What do your mobile apps gossip about you? Atkinson, John S.
2018
80 C p. 546-557
artikel
                             52 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland