nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A benchmark approach and its toolkit for online scheduling of multiple deadline-constrained workflows in big-data processing systems
|
Zhang, Dongzhan |
|
|
85 |
C |
p. 222-234 |
artikel |
2 |
A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting
|
HaddadPajouh, Hamed |
|
|
85 |
C |
p. 88-96 |
artikel |
3 |
An approach to examine Magnetic Resonance Angiography based on Tsallis entropy and deformable snake model
|
Rajinikanth, V. |
|
|
85 |
C |
p. 160-172 |
artikel |
4 |
An intelligent healthcare system for detection and classification to discriminate vocal fold disorders
|
Ali, Zulfiqar |
|
|
85 |
C |
p. 19-28 |
artikel |
5 |
Automated system for the detection of thoracolumbar fractures using a CNN architecture
|
Raghavendra, U. |
|
|
85 |
C |
p. 184-189 |
artikel |
6 |
Automatic road detection system for an air–land amphibious car drone
|
Li, Yujie |
|
|
85 |
C |
p. 51-59 |
artikel |
7 |
Benchmarking top- k keyword and top- k document processing with T 2 K 2 and T 2 K 2 D 2
|
Truică, Ciprian-Octavian |
|
|
85 |
C |
p. 60-75 |
artikel |
8 |
BG: A scalable benchmark for interactive social networking actions
|
Alabdulkarim, Yazeed |
|
|
85 |
C |
p. 29-38 |
artikel |
9 |
Building situational awareness for network threats in fog/edge computing: Emerging paradigms beyond the security perimeter model
|
Rapuzzi, R. |
|
|
85 |
C |
p. 235-249 |
artikel |
10 |
Edge-centric multimodal authentication system using encrypted biometric templates
|
Ali, Zulfiqar |
|
|
85 |
C |
p. 76-87 |
artikel |
11 |
Editorial Board
|
|
|
|
85 |
C |
p. ii |
artikel |
12 |
Localization of a high-speed train using a speed model based on the gradient descent algorithm
|
Ma, Liwen |
|
|
85 |
C |
p. 201-209 |
artikel |
13 |
Low-latency orchestration for workflow-oriented service function chain in edge computing
|
Sun, Gang |
|
|
85 |
C |
p. 116-128 |
artikel |
14 |
Marine surveying and mapping system based on Cloud Computing and Internet of Things
|
Yang, Jiachen |
|
|
85 |
C |
p. 39-50 |
artikel |
15 |
Performance prediction model for cloud service selection from smart data
|
Al-Faifi, Abdullah Mohammed |
|
|
85 |
C |
p. 97-106 |
artikel |
16 |
Privacy-preserving multi-channel communication in Edge-of-Things
|
Gai, Keke |
|
|
85 |
C |
p. 190-200 |
artikel |
17 |
Remote analysis of myocardial fiber information in vivo assisted by cloud computing
|
Wang, Qian |
|
|
85 |
C |
p. 146-159 |
artikel |
18 |
Research on anomaly detection algorithm based on generalization latency of telecommunication network
|
Wang, Yan |
|
|
85 |
C |
p. 9-18 |
artikel |
19 |
Research on data fusion algorithm and anti-collision algorithm based on internet of things
|
Cui, Yongfeng |
|
|
85 |
C |
p. 107-115 |
artikel |
20 |
Resource-aware virtual machine migration in IoT cloud
|
Paulraj, Getzi Jeba Leelipushpam |
|
|
85 |
C |
p. 173-183 |
artikel |
21 |
RETRACTED: A hybrid whale optimization algorithm based on local search strategy for the permutation flow shop scheduling problem
|
Abdel-Basset, Mohamed |
|
|
85 |
C |
p. 129-145 |
artikel |
22 |
SERAC3: Smart and economical resource allocation for big data clusters in community clouds
|
Li, Junnan |
|
|
85 |
C |
p. 210-221 |
artikel |
23 |
User mobility aware task assignment for Mobile Edge Computing
|
Wang, Zi |
|
|
85 |
C |
p. 1-8 |
artikel |