Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             133 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A cloud-based remote sensing data production system Yan, Jining

86 C p. 1154-1166
artikel
2 Acoustic sensor networks in the Internet of Things applications Kamruzzaman, Joarder

86 C p. 1167-1169
artikel
3 Adaptive RTO for handshaking-based MAC protocols in underwater acoustic networks Chen, YanKun

86 C p. 1185-1192
artikel
4 A deep learning approach for ECG-based heartbeat classification for arrhythmia detection Sannino, G.

86 C p. 446-455
artikel
5 A distributed load balancing and admission control algorithm based on Fuzzy type-2 and Game theory for large-scale SaaS cloud architectures Iranpour, Eiman

86 C p. 81-98
artikel
6 A distributed sensor management for large-scale IoT indoor acoustic surveillance Hilal, Allaa R.

86 C p. 1170-1184
artikel
7 Aging-related performance anomalies in the apache storm stream processing system Ficco, Massimo

86 C p. 975-994
artikel
8 A hybrid model of Internet of Things and cloud computing to manage big data in health services applications Elhoseny, Mohamed

86 C p. 1383-1394
artikel
9 A hyper-heuristic cost optimisation approach for Scientific Workflow Scheduling in cloud computing Alkhanak, Ehab Nabiel

86 C p. 480-506
artikel
10 A key distribution scheme for secure communication in acoustic sensor networks Hamid, Md. Abdul

86 C p. 1209-1217
artikel
11 Algorithms and data structures to accelerate network analysis Ros-Giralt, Jordi

86 C p. 535-545
artikel
12 Android Unikernel: Gearing mobile code offloading towards edge computing Wu, Song

86 C p. 694-703
artikel
13 An efficient data delivery mechanism for AUV-based Ad hoc UASNs Karmakar, Gour

86 C p. 1193-1208
artikel
14 An efficient joint compression and sparsity estimation matching pursuit algorithm for artificial intelligence application Yao, Shihong

86 C p. 603-613
artikel
15 An efficient multi-party scheme for privacy preserving collaborative filtering for healthcare recommender system Kaur, Harmanjeet

86 C p. 297-307
artikel
16 An experimental survey on big data frameworks Inoubli, Wissem

86 C p. 546-564
artikel
17 An indicative opinion generation model for short texts on social networks Zhao, Qingjuan

86 C p. 1471-1480
artikel
18 A novel context-aware recommendation algorithm with two-level SVD in social networks Cui, Laizhong

86 C p. 1459-1470
artikel
19 A novel routing algorithm for IoT cloud based on hash offset tree Han, Zhijie

86 C p. 456-463
artikel
20 A performance modeling framework for lambda architecture based applications Gribaudo, M.

86 C p. 1032-1041
artikel
21 A personalized authoritative user-based recommendation for social tagging Wei, Jianliang

86 C p. 355-361
artikel
22 A predictive approach for the efficient distribution of agent-based systems on a hybrid-cloud Labba, Chahrazed

86 C p. 750-764
artikel
23 A Resource Co-Allocation method for load-balance scheduling over big data platforms Dou, Wanchun

86 C p. 1064-1075
artikel
24 A security authorization scheme for smart home Internet of Things devices Chifor, Bogdan-Cosmin

86 C p. 740-749
artikel
25 A sufficient and necessary temporal violation handling point selection strategy in cloud workflow Xu, Rongbin

86 C p. 464-479
artikel
26 A trust centric optimal service ranking approach for cloud service selection Somu, Nivethitha

86 C p. 234-252
artikel
27 Attribute-based handshake protocol for mobile healthcare social networks Liu, Yi

86 C p. 873-880
artikel
28 Aura: An incentive-driven ad-hoc IoT cloud framework for proximal mobile computation offloading Hasan, Ragib

86 C p. 821-835
artikel
29 BDEv 3.0: Energy efficiency and microarchitectural characterization of Big Data processing frameworks Veiga, Jorge

86 C p. 565-581
artikel
30 Beaconing Control strategy based on Game Theory in mobile crowdsensing Yang, Yongjian

86 C p. 222-233
artikel
31 Big data analytics for mitigating broadcast storm in Vehicular Content Centric networks Wahid, Abdul

86 C p. 1301-1320
artikel
32 Big data analytics for sustainability Lv, Zhihan

86 C p. 1238-1241
artikel
33 Big Data and Internet of Things—Fusion for different services and its impacts Sun, Gang

86 C p. 1368-1370
artikel
34 Big Data fingerprinting information analytics for sustainability Kobusińska, Anna

86 C p. 1321-1337
artikel
35 Biometric touchstroke authentication by fuzzy proximity of touch locations Alpar, Orcan

86 C p. 71-80
artikel
36 Blockchain based hybrid network architecture for the smart city Sharma, Pradip Kumar

86 C p. 650-655
artikel
37 Brownian Motus and Clustered Binary Insertion Sort methods: An efficient progress over traditional methods Goel, Shubham

86 C p. 266-280
artikel
38 Causal consistency algorithms for partially replicated and fully replicated systems Hsu, Ta-Yuan

86 C p. 1118-1133
artikel
39 CenLocShare: A centralized privacy-preserving location-sharing system for mobile online social networks Xiao, Xi

86 C p. 863-872
artikel
40 Certain types of M -fuzzifying matroids: A fundamental look at the security protocols in RFID and IoT Yang, Shao-Jun

86 C p. 582-590
artikel
41 CHIS: A big data infrastructure to manage digital cultural items Castiglione, Aniello

86 C p. 1134-1145
artikel
42 Classifying online Job Advertisements through Machine Learning Boselli, Roberto

86 C p. 319-328
artikel
43 Cloud and IoT based disease prediction and diagnosis system for healthcare using Fuzzy neural classifier Kumar, Priyan Malarvizhi

86 C p. 527-534
artikel
44 Cloud infrastructure provenance collection and management to reproduce scientific workflows execution Hasham, Khawar

86 C p. 799-820
artikel
45 CloudIntell: An intelligent malware detection system Ali Mirza, Qublai K.

86 C p. 1042-1053
artikel
46 Clustering big IoT data by metaheuristic optimized mini-batch and parallel partition-based DGC in Hadoop Tang, Rui

86 C p. 1395-1412
artikel
47 Clustering learning model of CCTV image pattern for producing road hazard meteorological information Lee, Jiwan

86 C p. 1338-1350
artikel
48 Collaborative analysis model for trending images on social networks Hossain, M. Shamim

86 C p. 855-862
artikel
49 CoMe4ACloud: An end-to-end framework for autonomic Cloud systems Al-Shara, Zakarea

86 C p. 339-354
artikel
50 Component-oriented access control—Application servers meet tuple spaces for the masses Belyaev, Kirill

86 C p. 726-739
artikel
51 Construct the prediction model for China agricultural output value based on the optimization neural network of fruit fly optimization algorithm Han, Shi-Zhuan

86 C p. 663-669
artikel
52 Convergence of IoT and product lifecycle management in medical health care Sodhro, Ali Hassan

86 C p. 380-391
artikel
53 Corrigendum to “Secure and efficient data collaboration with hierarchical attribute-based encryption in cloud computing” [Future Gener. Comput. Syst. 72 (2017) 239–249] Huang, Qinlong

86 C p. 1534
artikel
54 Data-driven accurate design of variable blank holder force in sheet forming under interval uncertainty using sequential approximate multi-objective optimization Feng, Yixiong

86 C p. 1242-1250
artikel
55 Deep sentiment hashing for text retrieval in social CIoT Zhou, Ke

86 C p. 362-371
artikel
56 Designing hybrid graph model and algorithmic analysis of workflow decomposition in mobile distributed systems Ali, Ihtisham

86 C p. 145-161
artikel
57 Design of four-band multispectral imaging system with one single-sensor Sun, Bangyong

86 C p. 670-679
artikel
58 Edge cognitive computing based smart healthcare system Chen, Min

86 C p. 403-411
artikel
59 Editorial Board
86 C p. ii
artikel
60 Editorial: New developments in cloud and IoT Younas, Muhammad

86 C p. 723-725
artikel
61 Efficient cache resource aggregation using adaptive multi-level exclusive caching policies Cheng, Yuxia

86 C p. 964-974
artikel
62 Efficient service discovery in decentralized online social networks Yuan, Bo

86 C p. 775-791
artikel
63 Energy-efficient hadoop for big data analytics and computing: A systematic review and research insights Wu, WenTai

86 C p. 1351-1367
artikel
64 Enhancing privacy through uniform grid and caching in location-based services Zhang, Shaobo

86 C p. 881-892
artikel
65 Envy-free auction mechanism for VM pricing and allocation in clouds Yang, Bo

86 C p. 680-693
artikel
66 Evolutionary task allocation in Internet of Things-based application domains Khalil, Enan A.

86 C p. 121-133
artikel
67 Evolving priority rules for resource constrained project scheduling problem with genetic programming Đumić, Mateja

86 C p. 211-221
artikel
68 Experimental and quantitative analysis of server power model for cloud data centers Lin, Weiwei

86 C p. 940-950
artikel
69 Fine and coarse grained composition and adaptation of spark applications Shmeis, Zeinab

86 C p. 629-640
artikel
70 Gait-based Human identification using acoustic sensor and deep neural network Wang, Yingxue

86 C p. 1228-1237
artikel
71 Green IT scheduling for data center powered with renewable energy Grange, Léo

86 C p. 99-120
artikel
72 HIB-tree: An efficient index method for the big data analytics of large-scale human activity trajectories Chen, Xu

86 C p. 1269-1278
artikel
73 Image steganography using uncorrelated color space and its application for security of visual contents in online social networks Muhammad, Khan

86 C p. 951-960
artikel
74 Improving Quality of Experience in multimedia Internet of Things leveraging machine learning on big data Huang, Xiaohong

86 C p. 1413-1423
artikel
75 Improving the Effectiveness of Burst Buffers for Big Data Processing in HPC Systems with Eley Yildiz, Orcun

86 C p. 308-318
artikel
76 Incremental term representation learning for social network analysis Peng, Hao

86 C p. 1503-1512
artikel
77 In-Mapper combiner based MapReduce algorithm for processing of big climate data Manogaran, Gunasekaran

86 C p. 433-445
artikel
78 Investigation on the injuries of drivers and copilots in rear-end crashes between trucks based on real world accident data in China Peng, Yong

86 C p. 1251-1258
artikel
79 IOT and big data based cooperative logistical delivery scheduling method and cloud robot system Zhu, Dingju

86 C p. 709-715
artikel
80 “I wasn’t there”—Deniable, privacy-aware scheme for decentralized Location-based Services Dimitriou, Tassos

86 C p. 253-265
artikel
81 Keeping up with storage: Decentralized, write-enabled dynamic geo-replication Matri, Pierre

86 C p. 1093-1105
artikel
82 Maximizing positive influence spread in online social networks via fluid dynamics Wang, Feng

86 C p. 1491-1502
artikel
83 MEnSuS: An efficient scheme for energy management with sustainability of cloud data centers in edge–cloud environment Aujla, Gagangeet Singh

86 C p. 1279-1300
artikel
84 Minimizing SLA violation and power consumption in Cloud data centers using adaptive energy-aware algorithms Zhou, Zhou

86 C p. 836-850
artikel
85 Mining of marital distress from microblogging social networks: A case study on Sina Weibo Mao, Kaili

86 C p. 1481-1490
artikel
86 Modeling the Scalability of Real-Time Online Interactive Applications on Clouds Meiländer, Dominik

86 C p. 1019-1031
artikel
87 Modelling and developing conflict-aware scheduling on large-scale data centres Wang, Bin

86 C p. 995-1007
artikel
88 Multimedia story creation on social networks Amato, Flora

86 C p. 412-420
artikel
89 Multi-objective linear programming games and applications in supply chain competition Ji, Ying

86 C p. 591-597
artikel
90 Multiobjective recommendation optimization via utilizing distributed parallel algorithm Cao, Bin

86 C p. 1259-1268
artikel
91 Multiple watermarking technique for securing online social network contents using Back Propagation Neural Network Singh, Amit Kumar

86 C p. 926-939
artikel
92 NMCDA: A framework for evaluating cloud computing services Abdel-Basset, Mohamed

86 C p. 12-29
artikel
93 Online entropy-based discretization for data streaming classification Ramírez-Gallego, S.

86 C p. 59-70
artikel
94 On the limitations of existing notions of location privacy Dong, Kai

86 C p. 1513-1522
artikel
95 Optimization of dynamic spot-checking for collusion tolerance in grid computing Levitin, Gregory

86 C p. 30-38
artikel
96 Optimization of signal quality over comfortability of textile electrodes for ECG monitoring in fog computing based medical applications Wu, Wanqing

86 C p. 515-526
artikel
97 Power-aware performance analysis of self-adaptive resource management in IaaS clouds Ataie, Ehsan

86 C p. 134-144
artikel
98 PP: Popularity-based Proactive Data Recovery for HDFS RAID systems Wu, Suzhen

86 C p. 1146-1153
artikel
99 PRECISE: Identity-based private data sharing with conditional proxy re-encryption in online social networks Huang, Qinlong

86 C p. 1523-1533
artikel
100 Predicting host CPU utilization in the cloud using evolutionary neural networks Mason, Karl

86 C p. 162-173
artikel
101 Privacy-aware cloud service selection approach based on P-Spec policy models and privacy sensitivities Meng, Yunfei

86 C p. 1-11
artikel
102 Privacy-preserving fusion of IoT and big data for e-health Yang, Yang

86 C p. 1437-1455
artikel
103 QoS-aware Big service composition using MapReduce based evolutionary algorithm with guided mutation Jatoth, Chandrashekar

86 C p. 1008-1018
artikel
104 Quantum digital signature for the access control of sensitive data in the big data era Qiu, Lirong

86 C p. 372-379
artikel
105 Real-time bio-signal-processing of students based on an Intelligent algorithm for Internet of Things to assess engagement levels in a classroom Kim, Pyoung Won

86 C p. 716-722
artikel
106 Recent research in computational intelligence paradigms into security and privacy for online social networks (OSNs) Gupta, B.B.

86 C p. 851-854
artikel
107 Research on detection methods based on Doc2vec abnormal comments Chang, Wenbing

86 C p. 656-662
artikel
108 Research on internet information mining based on agent algorithm Wu, Shaofei

86 C p. 598-602
artikel
109 Resilient service provisioning in cloud based data centers Al-Ayyoub, Mahmoud

86 C p. 765-774
artikel
110 RETRACTED: Internet of Things (IoT) and its impact on supply chain: A framework for building smart, secure and efficient systems Abdel-Basset, Mohamed

86 C p. 614-628
artikel
111 RETRACTED: Research on agricultural supply chain system with double chain architecture based on blockchain technology Leng, Kaijun

86 C p. 641-649
artikel
112 RM-BDP: Resource management for Big Data platforms Pop, Florin

86 C p. 961-963
artikel
113 SCAI-SVSC: Smart clothing for effective interaction with a sustainable vital sign collection Hu, Long

86 C p. 329-338
artikel
114 Secure fine-grained spatio-temporal Top- k queries in TMWSNs Ma, Xingpo

86 C p. 174-184
artikel
115 Self-evolving intelligent algorithms for facilitating data interoperability in IoT environments Nawaratne, Rashmika

86 C p. 421-432
artikel
116 Sensing and Actuation as a Service Delivery Model in Cloud Edge centric Internet of Things Satpathy, Suchismita

86 C p. 281-296
artikel
117 Sensor attack detection using history based pairwise inconsistency Yang, Kang

86 C p. 392-402
artikel
118 SFaaS: Keeping an eye on IoT fusion environment with security fusion as a service Kuo, Chien-Ting

86 C p. 1424-1436
artikel
119 Side-channel security analysis of UOV signature for cloud-based Internet of Things Yi, Haibo

86 C p. 704-708
artikel
120 Social media security and trustworthiness: Overview and new direction Zhang, Zhiyong

86 C p. 914-925
artikel
121 Social networking big data: Opportunities, solutions, and challenges Peng, Sancheng

86 C p. 1456-1458
artikel
122 Social networking data analysis tools & challenges Sapountzi, Androniki

86 C p. 893-913
artikel
123 Software architecture and algorithm for reliable RPC for geo-distributed mobile computing systems Khan, Asmat Ullah

86 C p. 185-198
artikel
124 SP-Partitioner: A novel partition method to handle intermediate data skew in spark streaming Liu, Guipeng

86 C p. 1054-1063
artikel
125 Sustainable software products—Towards assessment criteria for resource and energy efficiency Kern, Eva

86 C p. 199-210
artikel
126 Three-level performance optimization for heterogeneous systems based on software prefetching under power constraints Wang, Zhuowei

86 C p. 51-58
artikel
127 Throughput analysis of cognitive wireless acoustic sensor networks with energy harvesting Tang, Kun

86 C p. 1218-1227
artikel
128 Tomogravity space based traffic matrix estimation in data center networks Liu, Guiyan

86 C p. 39-50
artikel
129 Towards IoT data classification through semantic features Antunes, Mário

86 C p. 792-798
artikel
130 Towards practical white-box lightweight block cipher implementations for IoTs Zhou, Lu

86 C p. 507-514
artikel
131 Using a multi-agent system and artificial intelligence for monitoring and improving the cloud performance and security Grzonka, Daniel

86 C p. 1106-1117
artikel
132 Using machine learning to optimize parallelism in big data applications Hernández, Álvaro Brandón

86 C p. 1076-1092
artikel
133 Video big data in smart city: Background construction and optimization for surveillance video processing Tian, Ling

86 C p. 1371-1382
artikel
                             133 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland