nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A cloud-based remote sensing data production system
|
Yan, Jining |
|
|
86 |
C |
p. 1154-1166 |
artikel |
2 |
Acoustic sensor networks in the Internet of Things applications
|
Kamruzzaman, Joarder |
|
|
86 |
C |
p. 1167-1169 |
artikel |
3 |
Adaptive RTO for handshaking-based MAC protocols in underwater acoustic networks
|
Chen, YanKun |
|
|
86 |
C |
p. 1185-1192 |
artikel |
4 |
A deep learning approach for ECG-based heartbeat classification for arrhythmia detection
|
Sannino, G. |
|
|
86 |
C |
p. 446-455 |
artikel |
5 |
A distributed load balancing and admission control algorithm based on Fuzzy type-2 and Game theory for large-scale SaaS cloud architectures
|
Iranpour, Eiman |
|
|
86 |
C |
p. 81-98 |
artikel |
6 |
A distributed sensor management for large-scale IoT indoor acoustic surveillance
|
Hilal, Allaa R. |
|
|
86 |
C |
p. 1170-1184 |
artikel |
7 |
Aging-related performance anomalies in the apache storm stream processing system
|
Ficco, Massimo |
|
|
86 |
C |
p. 975-994 |
artikel |
8 |
A hybrid model of Internet of Things and cloud computing to manage big data in health services applications
|
Elhoseny, Mohamed |
|
|
86 |
C |
p. 1383-1394 |
artikel |
9 |
A hyper-heuristic cost optimisation approach for Scientific Workflow Scheduling in cloud computing
|
Alkhanak, Ehab Nabiel |
|
|
86 |
C |
p. 480-506 |
artikel |
10 |
A key distribution scheme for secure communication in acoustic sensor networks
|
Hamid, Md. Abdul |
|
|
86 |
C |
p. 1209-1217 |
artikel |
11 |
Algorithms and data structures to accelerate network analysis
|
Ros-Giralt, Jordi |
|
|
86 |
C |
p. 535-545 |
artikel |
12 |
Android Unikernel: Gearing mobile code offloading towards edge computing
|
Wu, Song |
|
|
86 |
C |
p. 694-703 |
artikel |
13 |
An efficient data delivery mechanism for AUV-based Ad hoc UASNs
|
Karmakar, Gour |
|
|
86 |
C |
p. 1193-1208 |
artikel |
14 |
An efficient joint compression and sparsity estimation matching pursuit algorithm for artificial intelligence application
|
Yao, Shihong |
|
|
86 |
C |
p. 603-613 |
artikel |
15 |
An efficient multi-party scheme for privacy preserving collaborative filtering for healthcare recommender system
|
Kaur, Harmanjeet |
|
|
86 |
C |
p. 297-307 |
artikel |
16 |
An experimental survey on big data frameworks
|
Inoubli, Wissem |
|
|
86 |
C |
p. 546-564 |
artikel |
17 |
An indicative opinion generation model for short texts on social networks
|
Zhao, Qingjuan |
|
|
86 |
C |
p. 1471-1480 |
artikel |
18 |
A novel context-aware recommendation algorithm with two-level SVD in social networks
|
Cui, Laizhong |
|
|
86 |
C |
p. 1459-1470 |
artikel |
19 |
A novel routing algorithm for IoT cloud based on hash offset tree
|
Han, Zhijie |
|
|
86 |
C |
p. 456-463 |
artikel |
20 |
A performance modeling framework for lambda architecture based applications
|
Gribaudo, M. |
|
|
86 |
C |
p. 1032-1041 |
artikel |
21 |
A personalized authoritative user-based recommendation for social tagging
|
Wei, Jianliang |
|
|
86 |
C |
p. 355-361 |
artikel |
22 |
A predictive approach for the efficient distribution of agent-based systems on a hybrid-cloud
|
Labba, Chahrazed |
|
|
86 |
C |
p. 750-764 |
artikel |
23 |
A Resource Co-Allocation method for load-balance scheduling over big data platforms
|
Dou, Wanchun |
|
|
86 |
C |
p. 1064-1075 |
artikel |
24 |
A security authorization scheme for smart home Internet of Things devices
|
Chifor, Bogdan-Cosmin |
|
|
86 |
C |
p. 740-749 |
artikel |
25 |
A sufficient and necessary temporal violation handling point selection strategy in cloud workflow
|
Xu, Rongbin |
|
|
86 |
C |
p. 464-479 |
artikel |
26 |
A trust centric optimal service ranking approach for cloud service selection
|
Somu, Nivethitha |
|
|
86 |
C |
p. 234-252 |
artikel |
27 |
Attribute-based handshake protocol for mobile healthcare social networks
|
Liu, Yi |
|
|
86 |
C |
p. 873-880 |
artikel |
28 |
Aura: An incentive-driven ad-hoc IoT cloud framework for proximal mobile computation offloading
|
Hasan, Ragib |
|
|
86 |
C |
p. 821-835 |
artikel |
29 |
BDEv 3.0: Energy efficiency and microarchitectural characterization of Big Data processing frameworks
|
Veiga, Jorge |
|
|
86 |
C |
p. 565-581 |
artikel |
30 |
Beaconing Control strategy based on Game Theory in mobile crowdsensing
|
Yang, Yongjian |
|
|
86 |
C |
p. 222-233 |
artikel |
31 |
Big data analytics for mitigating broadcast storm in Vehicular Content Centric networks
|
Wahid, Abdul |
|
|
86 |
C |
p. 1301-1320 |
artikel |
32 |
Big data analytics for sustainability
|
Lv, Zhihan |
|
|
86 |
C |
p. 1238-1241 |
artikel |
33 |
Big Data and Internet of Things—Fusion for different services and its impacts
|
Sun, Gang |
|
|
86 |
C |
p. 1368-1370 |
artikel |
34 |
Big Data fingerprinting information analytics for sustainability
|
Kobusińska, Anna |
|
|
86 |
C |
p. 1321-1337 |
artikel |
35 |
Biometric touchstroke authentication by fuzzy proximity of touch locations
|
Alpar, Orcan |
|
|
86 |
C |
p. 71-80 |
artikel |
36 |
Blockchain based hybrid network architecture for the smart city
|
Sharma, Pradip Kumar |
|
|
86 |
C |
p. 650-655 |
artikel |
37 |
Brownian Motus and Clustered Binary Insertion Sort methods: An efficient progress over traditional methods
|
Goel, Shubham |
|
|
86 |
C |
p. 266-280 |
artikel |
38 |
Causal consistency algorithms for partially replicated and fully replicated systems
|
Hsu, Ta-Yuan |
|
|
86 |
C |
p. 1118-1133 |
artikel |
39 |
CenLocShare: A centralized privacy-preserving location-sharing system for mobile online social networks
|
Xiao, Xi |
|
|
86 |
C |
p. 863-872 |
artikel |
40 |
Certain types of M -fuzzifying matroids: A fundamental look at the security protocols in RFID and IoT
|
Yang, Shao-Jun |
|
|
86 |
C |
p. 582-590 |
artikel |
41 |
CHIS: A big data infrastructure to manage digital cultural items
|
Castiglione, Aniello |
|
|
86 |
C |
p. 1134-1145 |
artikel |
42 |
Classifying online Job Advertisements through Machine Learning
|
Boselli, Roberto |
|
|
86 |
C |
p. 319-328 |
artikel |
43 |
Cloud and IoT based disease prediction and diagnosis system for healthcare using Fuzzy neural classifier
|
Kumar, Priyan Malarvizhi |
|
|
86 |
C |
p. 527-534 |
artikel |
44 |
Cloud infrastructure provenance collection and management to reproduce scientific workflows execution
|
Hasham, Khawar |
|
|
86 |
C |
p. 799-820 |
artikel |
45 |
CloudIntell: An intelligent malware detection system
|
Ali Mirza, Qublai K. |
|
|
86 |
C |
p. 1042-1053 |
artikel |
46 |
Clustering big IoT data by metaheuristic optimized mini-batch and parallel partition-based DGC in Hadoop
|
Tang, Rui |
|
|
86 |
C |
p. 1395-1412 |
artikel |
47 |
Clustering learning model of CCTV image pattern for producing road hazard meteorological information
|
Lee, Jiwan |
|
|
86 |
C |
p. 1338-1350 |
artikel |
48 |
Collaborative analysis model for trending images on social networks
|
Hossain, M. Shamim |
|
|
86 |
C |
p. 855-862 |
artikel |
49 |
CoMe4ACloud: An end-to-end framework for autonomic Cloud systems
|
Al-Shara, Zakarea |
|
|
86 |
C |
p. 339-354 |
artikel |
50 |
Component-oriented access control—Application servers meet tuple spaces for the masses
|
Belyaev, Kirill |
|
|
86 |
C |
p. 726-739 |
artikel |
51 |
Construct the prediction model for China agricultural output value based on the optimization neural network of fruit fly optimization algorithm
|
Han, Shi-Zhuan |
|
|
86 |
C |
p. 663-669 |
artikel |
52 |
Convergence of IoT and product lifecycle management in medical health care
|
Sodhro, Ali Hassan |
|
|
86 |
C |
p. 380-391 |
artikel |
53 |
Corrigendum to “Secure and efficient data collaboration with hierarchical attribute-based encryption in cloud computing” [Future Gener. Comput. Syst. 72 (2017) 239–249]
|
Huang, Qinlong |
|
|
86 |
C |
p. 1534 |
artikel |
54 |
Data-driven accurate design of variable blank holder force in sheet forming under interval uncertainty using sequential approximate multi-objective optimization
|
Feng, Yixiong |
|
|
86 |
C |
p. 1242-1250 |
artikel |
55 |
Deep sentiment hashing for text retrieval in social CIoT
|
Zhou, Ke |
|
|
86 |
C |
p. 362-371 |
artikel |
56 |
Designing hybrid graph model and algorithmic analysis of workflow decomposition in mobile distributed systems
|
Ali, Ihtisham |
|
|
86 |
C |
p. 145-161 |
artikel |
57 |
Design of four-band multispectral imaging system with one single-sensor
|
Sun, Bangyong |
|
|
86 |
C |
p. 670-679 |
artikel |
58 |
Edge cognitive computing based smart healthcare system
|
Chen, Min |
|
|
86 |
C |
p. 403-411 |
artikel |
59 |
Editorial Board
|
|
|
|
86 |
C |
p. ii |
artikel |
60 |
Editorial: New developments in cloud and IoT
|
Younas, Muhammad |
|
|
86 |
C |
p. 723-725 |
artikel |
61 |
Efficient cache resource aggregation using adaptive multi-level exclusive caching policies
|
Cheng, Yuxia |
|
|
86 |
C |
p. 964-974 |
artikel |
62 |
Efficient service discovery in decentralized online social networks
|
Yuan, Bo |
|
|
86 |
C |
p. 775-791 |
artikel |
63 |
Energy-efficient hadoop for big data analytics and computing: A systematic review and research insights
|
Wu, WenTai |
|
|
86 |
C |
p. 1351-1367 |
artikel |
64 |
Enhancing privacy through uniform grid and caching in location-based services
|
Zhang, Shaobo |
|
|
86 |
C |
p. 881-892 |
artikel |
65 |
Envy-free auction mechanism for VM pricing and allocation in clouds
|
Yang, Bo |
|
|
86 |
C |
p. 680-693 |
artikel |
66 |
Evolutionary task allocation in Internet of Things-based application domains
|
Khalil, Enan A. |
|
|
86 |
C |
p. 121-133 |
artikel |
67 |
Evolving priority rules for resource constrained project scheduling problem with genetic programming
|
Đumić, Mateja |
|
|
86 |
C |
p. 211-221 |
artikel |
68 |
Experimental and quantitative analysis of server power model for cloud data centers
|
Lin, Weiwei |
|
|
86 |
C |
p. 940-950 |
artikel |
69 |
Fine and coarse grained composition and adaptation of spark applications
|
Shmeis, Zeinab |
|
|
86 |
C |
p. 629-640 |
artikel |
70 |
Gait-based Human identification using acoustic sensor and deep neural network
|
Wang, Yingxue |
|
|
86 |
C |
p. 1228-1237 |
artikel |
71 |
Green IT scheduling for data center powered with renewable energy
|
Grange, Léo |
|
|
86 |
C |
p. 99-120 |
artikel |
72 |
HIB-tree: An efficient index method for the big data analytics of large-scale human activity trajectories
|
Chen, Xu |
|
|
86 |
C |
p. 1269-1278 |
artikel |
73 |
Image steganography using uncorrelated color space and its application for security of visual contents in online social networks
|
Muhammad, Khan |
|
|
86 |
C |
p. 951-960 |
artikel |
74 |
Improving Quality of Experience in multimedia Internet of Things leveraging machine learning on big data
|
Huang, Xiaohong |
|
|
86 |
C |
p. 1413-1423 |
artikel |
75 |
Improving the Effectiveness of Burst Buffers for Big Data Processing in HPC Systems with Eley
|
Yildiz, Orcun |
|
|
86 |
C |
p. 308-318 |
artikel |
76 |
Incremental term representation learning for social network analysis
|
Peng, Hao |
|
|
86 |
C |
p. 1503-1512 |
artikel |
77 |
In-Mapper combiner based MapReduce algorithm for processing of big climate data
|
Manogaran, Gunasekaran |
|
|
86 |
C |
p. 433-445 |
artikel |
78 |
Investigation on the injuries of drivers and copilots in rear-end crashes between trucks based on real world accident data in China
|
Peng, Yong |
|
|
86 |
C |
p. 1251-1258 |
artikel |
79 |
IOT and big data based cooperative logistical delivery scheduling method and cloud robot system
|
Zhu, Dingju |
|
|
86 |
C |
p. 709-715 |
artikel |
80 |
“I wasn’t there”—Deniable, privacy-aware scheme for decentralized Location-based Services
|
Dimitriou, Tassos |
|
|
86 |
C |
p. 253-265 |
artikel |
81 |
Keeping up with storage: Decentralized, write-enabled dynamic geo-replication
|
Matri, Pierre |
|
|
86 |
C |
p. 1093-1105 |
artikel |
82 |
Maximizing positive influence spread in online social networks via fluid dynamics
|
Wang, Feng |
|
|
86 |
C |
p. 1491-1502 |
artikel |
83 |
MEnSuS: An efficient scheme for energy management with sustainability of cloud data centers in edge–cloud environment
|
Aujla, Gagangeet Singh |
|
|
86 |
C |
p. 1279-1300 |
artikel |
84 |
Minimizing SLA violation and power consumption in Cloud data centers using adaptive energy-aware algorithms
|
Zhou, Zhou |
|
|
86 |
C |
p. 836-850 |
artikel |
85 |
Mining of marital distress from microblogging social networks: A case study on Sina Weibo
|
Mao, Kaili |
|
|
86 |
C |
p. 1481-1490 |
artikel |
86 |
Modeling the Scalability of Real-Time Online Interactive Applications on Clouds
|
Meiländer, Dominik |
|
|
86 |
C |
p. 1019-1031 |
artikel |
87 |
Modelling and developing conflict-aware scheduling on large-scale data centres
|
Wang, Bin |
|
|
86 |
C |
p. 995-1007 |
artikel |
88 |
Multimedia story creation on social networks
|
Amato, Flora |
|
|
86 |
C |
p. 412-420 |
artikel |
89 |
Multi-objective linear programming games and applications in supply chain competition
|
Ji, Ying |
|
|
86 |
C |
p. 591-597 |
artikel |
90 |
Multiobjective recommendation optimization via utilizing distributed parallel algorithm
|
Cao, Bin |
|
|
86 |
C |
p. 1259-1268 |
artikel |
91 |
Multiple watermarking technique for securing online social network contents using Back Propagation Neural Network
|
Singh, Amit Kumar |
|
|
86 |
C |
p. 926-939 |
artikel |
92 |
NMCDA: A framework for evaluating cloud computing services
|
Abdel-Basset, Mohamed |
|
|
86 |
C |
p. 12-29 |
artikel |
93 |
Online entropy-based discretization for data streaming classification
|
Ramírez-Gallego, S. |
|
|
86 |
C |
p. 59-70 |
artikel |
94 |
On the limitations of existing notions of location privacy
|
Dong, Kai |
|
|
86 |
C |
p. 1513-1522 |
artikel |
95 |
Optimization of dynamic spot-checking for collusion tolerance in grid computing
|
Levitin, Gregory |
|
|
86 |
C |
p. 30-38 |
artikel |
96 |
Optimization of signal quality over comfortability of textile electrodes for ECG monitoring in fog computing based medical applications
|
Wu, Wanqing |
|
|
86 |
C |
p. 515-526 |
artikel |
97 |
Power-aware performance analysis of self-adaptive resource management in IaaS clouds
|
Ataie, Ehsan |
|
|
86 |
C |
p. 134-144 |
artikel |
98 |
PP: Popularity-based Proactive Data Recovery for HDFS RAID systems
|
Wu, Suzhen |
|
|
86 |
C |
p. 1146-1153 |
artikel |
99 |
PRECISE: Identity-based private data sharing with conditional proxy re-encryption in online social networks
|
Huang, Qinlong |
|
|
86 |
C |
p. 1523-1533 |
artikel |
100 |
Predicting host CPU utilization in the cloud using evolutionary neural networks
|
Mason, Karl |
|
|
86 |
C |
p. 162-173 |
artikel |
101 |
Privacy-aware cloud service selection approach based on P-Spec policy models and privacy sensitivities
|
Meng, Yunfei |
|
|
86 |
C |
p. 1-11 |
artikel |
102 |
Privacy-preserving fusion of IoT and big data for e-health
|
Yang, Yang |
|
|
86 |
C |
p. 1437-1455 |
artikel |
103 |
QoS-aware Big service composition using MapReduce based evolutionary algorithm with guided mutation
|
Jatoth, Chandrashekar |
|
|
86 |
C |
p. 1008-1018 |
artikel |
104 |
Quantum digital signature for the access control of sensitive data in the big data era
|
Qiu, Lirong |
|
|
86 |
C |
p. 372-379 |
artikel |
105 |
Real-time bio-signal-processing of students based on an Intelligent algorithm for Internet of Things to assess engagement levels in a classroom
|
Kim, Pyoung Won |
|
|
86 |
C |
p. 716-722 |
artikel |
106 |
Recent research in computational intelligence paradigms into security and privacy for online social networks (OSNs)
|
Gupta, B.B. |
|
|
86 |
C |
p. 851-854 |
artikel |
107 |
Research on detection methods based on Doc2vec abnormal comments
|
Chang, Wenbing |
|
|
86 |
C |
p. 656-662 |
artikel |
108 |
Research on internet information mining based on agent algorithm
|
Wu, Shaofei |
|
|
86 |
C |
p. 598-602 |
artikel |
109 |
Resilient service provisioning in cloud based data centers
|
Al-Ayyoub, Mahmoud |
|
|
86 |
C |
p. 765-774 |
artikel |
110 |
RETRACTED: Internet of Things (IoT) and its impact on supply chain: A framework for building smart, secure and efficient systems
|
Abdel-Basset, Mohamed |
|
|
86 |
C |
p. 614-628 |
artikel |
111 |
RETRACTED: Research on agricultural supply chain system with double chain architecture based on blockchain technology
|
Leng, Kaijun |
|
|
86 |
C |
p. 641-649 |
artikel |
112 |
RM-BDP: Resource management for Big Data platforms
|
Pop, Florin |
|
|
86 |
C |
p. 961-963 |
artikel |
113 |
SCAI-SVSC: Smart clothing for effective interaction with a sustainable vital sign collection
|
Hu, Long |
|
|
86 |
C |
p. 329-338 |
artikel |
114 |
Secure fine-grained spatio-temporal Top- k queries in TMWSNs
|
Ma, Xingpo |
|
|
86 |
C |
p. 174-184 |
artikel |
115 |
Self-evolving intelligent algorithms for facilitating data interoperability in IoT environments
|
Nawaratne, Rashmika |
|
|
86 |
C |
p. 421-432 |
artikel |
116 |
Sensing and Actuation as a Service Delivery Model in Cloud Edge centric Internet of Things
|
Satpathy, Suchismita |
|
|
86 |
C |
p. 281-296 |
artikel |
117 |
Sensor attack detection using history based pairwise inconsistency
|
Yang, Kang |
|
|
86 |
C |
p. 392-402 |
artikel |
118 |
SFaaS: Keeping an eye on IoT fusion environment with security fusion as a service
|
Kuo, Chien-Ting |
|
|
86 |
C |
p. 1424-1436 |
artikel |
119 |
Side-channel security analysis of UOV signature for cloud-based Internet of Things
|
Yi, Haibo |
|
|
86 |
C |
p. 704-708 |
artikel |
120 |
Social media security and trustworthiness: Overview and new direction
|
Zhang, Zhiyong |
|
|
86 |
C |
p. 914-925 |
artikel |
121 |
Social networking big data: Opportunities, solutions, and challenges
|
Peng, Sancheng |
|
|
86 |
C |
p. 1456-1458 |
artikel |
122 |
Social networking data analysis tools & challenges
|
Sapountzi, Androniki |
|
|
86 |
C |
p. 893-913 |
artikel |
123 |
Software architecture and algorithm for reliable RPC for geo-distributed mobile computing systems
|
Khan, Asmat Ullah |
|
|
86 |
C |
p. 185-198 |
artikel |
124 |
SP-Partitioner: A novel partition method to handle intermediate data skew in spark streaming
|
Liu, Guipeng |
|
|
86 |
C |
p. 1054-1063 |
artikel |
125 |
Sustainable software products—Towards assessment criteria for resource and energy efficiency
|
Kern, Eva |
|
|
86 |
C |
p. 199-210 |
artikel |
126 |
Three-level performance optimization for heterogeneous systems based on software prefetching under power constraints
|
Wang, Zhuowei |
|
|
86 |
C |
p. 51-58 |
artikel |
127 |
Throughput analysis of cognitive wireless acoustic sensor networks with energy harvesting
|
Tang, Kun |
|
|
86 |
C |
p. 1218-1227 |
artikel |
128 |
Tomogravity space based traffic matrix estimation in data center networks
|
Liu, Guiyan |
|
|
86 |
C |
p. 39-50 |
artikel |
129 |
Towards IoT data classification through semantic features
|
Antunes, Mário |
|
|
86 |
C |
p. 792-798 |
artikel |
130 |
Towards practical white-box lightweight block cipher implementations for IoTs
|
Zhou, Lu |
|
|
86 |
C |
p. 507-514 |
artikel |
131 |
Using a multi-agent system and artificial intelligence for monitoring and improving the cloud performance and security
|
Grzonka, Daniel |
|
|
86 |
C |
p. 1106-1117 |
artikel |
132 |
Using machine learning to optimize parallelism in big data applications
|
Hernández, Álvaro Brandón |
|
|
86 |
C |
p. 1076-1092 |
artikel |
133 |
Video big data in smart city: Background construction and optimization for surveillance video processing
|
Tian, Ling |
|
|
86 |
C |
p. 1371-1382 |
artikel |