nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A component based unified architecture for utility service in cloud
|
Habiba, Mansura |
|
|
87 |
C |
p. 725-742 |
artikel |
2 |
A crowdsourcing-based topic model for service matchmaking in Internet of Things
|
Liu, Yezheng |
|
|
87 |
C |
p. 186-197 |
artikel |
3 |
Adaptive selection of dynamic VM consolidation algorithm using neural network for cloud resource management
|
Witanto, Joseph Nathanael |
|
|
87 |
C |
p. 35-42 |
artikel |
4 |
A decision theoretic framework for selecting source location privacy aware routing protocols in wireless sensor networks
|
Gu, Chen |
|
|
87 |
C |
p. 514-526 |
artikel |
5 |
AFIRM: Adaptive forwarding based link recovery for mobility support in NDN/IoT networks
|
Meddeb, Maroua |
|
|
87 |
C |
p. 351-363 |
artikel |
6 |
Age-related Macular Degeneration detection using deep convolutional neural network
|
Tan, Jen Hong |
|
|
87 |
C |
p. 127-135 |
artikel |
7 |
Agreement-based credibility assessment and task replication in human computation systems
|
Ponciano, Lesandro |
|
|
87 |
C |
p. 159-170 |
artikel |
8 |
A heterogeneous mobile cloud computing model for hybrid clouds
|
Alonso-Monsalve, Saúl |
|
|
87 |
C |
p. 651-666 |
artikel |
9 |
A load-aware resource allocation and task scheduling for the emerging cloudlet system
|
Zhang, Feifei |
|
|
87 |
C |
p. 438-456 |
artikel |
10 |
A multi-layered performance analysis for cloud-based topic detection and tracking in Big Data applications
|
Wang, Meisong |
|
|
87 |
C |
p. 580-590 |
artikel |
11 |
An online learning model based on episode mining for workload prediction in cloud
|
Amiri, Maryam |
|
|
87 |
C |
p. 83-101 |
artikel |
12 |
A novel machine learning approach for scene text extraction
|
Ansari, Ghulam Jillani |
|
|
87 |
C |
p. 328-340 |
artikel |
13 |
Answering differentially private queries for continual datasets release
|
Zhu, Tianqing |
|
|
87 |
C |
p. 816-827 |
artikel |
14 |
A performance brokerage for heterogeneous clouds
|
O’Loughlin, John |
|
|
87 |
C |
p. 831-845 |
artikel |
15 |
A prediction system of Sybil attack in social network using deep-regression model
|
Al-Qurishi, Muhammad |
|
|
87 |
C |
p. 743-753 |
artikel |
16 |
A resilient and distributed near real-time traffic forecasting application for Fog computing environments
|
Pérez, Juan Luis |
|
|
87 |
C |
p. 198-212 |
artikel |
17 |
Automating smart recommendation from natural language API descriptions via representation learning
|
Xiong, Wei |
|
|
87 |
C |
p. 382-391 |
artikel |
18 |
BDWatchdog: Real-time monitoring and profiling of Big Data applications and frameworks
|
Enes, Jonatan |
|
|
87 |
C |
p. 420-437 |
artikel |
19 |
Big data analysis for brain tumor detection: Deep convolutional neural networks
|
Amin, Javeria |
|
|
87 |
C |
p. 290-297 |
artikel |
20 |
Big Data for Internet of Things: A Survey
|
Ge, Mouzhi |
|
|
87 |
C |
p. 601-614 |
artikel |
21 |
Bridging data-capacity gap in big data storage
|
Bhat, Wasim Ahmad |
|
|
87 |
C |
p. 538-548 |
artikel |
22 |
Building edge intelligence for online activity recognition in service-oriented IoT systems
|
Huang, Zhenqiu |
|
|
87 |
C |
p. 557-567 |
artikel |
23 |
Cloudy in guifi.net: Establishing and sustaining a community cloud as open commons
|
Baig, Roger |
|
|
87 |
C |
p. 868-887 |
artikel |
24 |
Comparison of WSN and IoT approaches for a real-time monitoring system of meal distribution trolleys: A case study
|
Morillo, Pedro |
|
|
87 |
C |
p. 242-250 |
artikel |
25 |
Constructing independent spanning trees with height n on the n -dimensional crossed cube
|
Cheng, Baolei |
|
|
87 |
C |
p. 404-415 |
artikel |
26 |
Decentralized self-adaptation for elastic Data Stream Processing
|
Cardellini, Valeria |
|
|
87 |
C |
p. 171-185 |
artikel |
27 |
Distributed nearest neighbor classification for large-scale multi-label data on spark
|
Gonzalez-Lopez, Jorge |
|
|
87 |
C |
p. 66-82 |
artikel |
28 |
Eavesdrop with PoKeMon: Position free keystroke monitoring using acoustic data
|
Fang, Yuyi |
|
|
87 |
C |
p. 704-711 |
artikel |
29 |
Economics of Computing Services: A literature survey about technologies for an economy of fungible cloud services
|
Altmann, Jörn |
|
|
87 |
C |
p. 828-830 |
artikel |
30 |
Editorial Board
|
|
|
|
87 |
C |
p. ii |
artikel |
31 |
Emerging trends, issues and challenges in Internet of Things, Big Data and cloud computing
|
Kobusińska, Anna |
|
|
87 |
C |
p. 416-419 |
artikel |
32 |
End-to-end energy models for Edge Cloud-based IoT platforms: Application to data stream analysis in IoT
|
Li, Yunbo |
|
|
87 |
C |
p. 667-678 |
artikel |
33 |
Enhancing network capacity by weakening community structure in scale-free network
|
Cai, Jun |
|
|
87 |
C |
p. 765-771 |
artikel |
34 |
Enhancing transient fault tolerance in embedded systems through an OS task level redundancy approach
|
Asghari, Seyyed Amir |
|
|
87 |
C |
p. 58-65 |
artikel |
35 |
Establishing User-centric Cloud Service Registries
|
Slawik, Mathias |
|
|
87 |
C |
p. 846-867 |
artikel |
36 |
Flexible IoT security middleware for end-to-end cloud–fog communication
|
Mukherjee, Bidyut |
|
|
87 |
C |
p. 688-703 |
artikel |
37 |
Heterogeneous 3-D ICs as a platform for hybrid energy harvesting in IoT systems
|
Vaisband, Boris |
|
|
87 |
C |
p. 152-158 |
artikel |
38 |
Hierarchical decomposition method and combination forecasting scheme for access load on public map service platforms
|
Li, Rui |
|
|
87 |
C |
p. 213-227 |
artikel |
39 |
Hybrid knowledge fusion and inference on cloud environment
|
Tai, Chih-Hua |
|
|
87 |
C |
p. 568-579 |
artikel |
40 |
Identifying worst-case user scenarios for performance testing of web applications using Markov-chain workload models
|
Ahmad, Tanwir |
|
|
87 |
C |
p. 910-920 |
artikel |
41 |
Image search scheme over encrypted database
|
Ye, Jun |
|
|
87 |
C |
p. 251-258 |
artikel |
42 |
Improving security in cloud by formal modeling of IaaS resources
|
Amato, Flora |
|
|
87 |
C |
p. 754-764 |
artikel |
43 |
Incremental encoding for erasure-coded cross-datacenters cloud storage
|
Xu, Fangliang |
|
|
87 |
C |
p. 527-537 |
artikel |
44 |
Leakage resilient ID-based proxy re-encryption scheme for access control in fog computing
|
Wang, Zhiwei |
|
|
87 |
C |
p. 679-685 |
artikel |
45 |
Mining multiple spatial–temporal paths from social media data
|
Yao, Hong |
|
|
87 |
C |
p. 782-791 |
artikel |
46 |
Model-driven development of data intensive applications over cloud resources
|
Tolosana-Calasanz, Rafael |
|
|
87 |
C |
p. 888-909 |
artikel |
47 |
Modeling of cross-disciplinary collaboration for potential field discovery and recommendation based on scholarly big data
|
Liang, Wei |
|
|
87 |
C |
p. 591-600 |
artikel |
48 |
Multi-criteria based zone head selection in Internet of Things based wireless sensor networks
|
Farman, Haleem |
|
|
87 |
C |
p. 364-371 |
artikel |
49 |
Multi-threaded learning control mechanism for neural networks
|
Połap, Dawid |
|
|
87 |
C |
p. 16-34 |
artikel |
50 |
New directions in mobile, hybrid, and heterogeneous clouds for cyberinfrastructures
|
Carretero, Jesus |
|
|
87 |
C |
p. 615-617 |
artikel |
51 |
Novel SDN architecture for smart MPLS Traffic Engineering-DiffServ Aware management
|
Bahnasse, Ayoub |
|
|
87 |
C |
p. 115-126 |
artikel |
52 |
Offloading in fog computing for IoT: Review, enabling technologies, and research opportunities
|
Aazam, Mohammad |
|
|
87 |
C |
p. 278-289 |
artikel |
53 |
Optimizing security and quality of service in a real-time operating system using multi-objective Bat algorithm
|
Zineddine, Mhamed |
|
|
87 |
C |
p. 102-114 |
artikel |
54 |
Paving the way towards high-level parallel pattern interfaces for data stream processing
|
del Rio Astorga, David |
|
|
87 |
C |
p. 228-241 |
artikel |
55 |
Performance modelling and verification of cloud-based auto-scaling policies
|
Evangelidis, Alexandros |
|
|
87 |
C |
p. 629-638 |
artikel |
56 |
PiCo: High-performance data analytics pipelines in modern C + +
|
Misale, Claudia |
|
|
87 |
C |
p. 392-403 |
artikel |
57 |
Predicting cloud performance for HPC applications before deployment
|
Mariani, Giovanni |
|
|
87 |
C |
p. 618-628 |
artikel |
58 |
Privacy-preserving machine learning with multiple data providers
|
Li, Ping |
|
|
87 |
C |
p. 341-350 |
artikel |
59 |
Privacy-preserving wireless communications using bipartite matching in social big data
|
Qiu, Meikang |
|
|
87 |
C |
p. 772-781 |
artikel |
60 |
Privacy-protected statistics publication over social media user trajectory streams
|
Wang, Shuo |
|
|
87 |
C |
p. 792-802 |
artikel |
61 |
Profiling distributed graph processing systems through visual analytics
|
Arleo, Alessio |
|
|
87 |
C |
p. 43-57 |
artikel |
62 |
RConf(PD): Automated resource configuration of complex services in the cloud
|
Prasad, Abhinandan S. |
|
|
87 |
C |
p. 639-650 |
artikel |
63 |
Recent advances in security and privacy in Social Big Data
|
Zhang, Jun |
|
|
87 |
C |
p. 686-687 |
artikel |
64 |
Recommender systems based on multiple social networks correlation
|
Yu, Wei |
|
|
87 |
C |
p. 312-327 |
artikel |
65 |
RIMS: A Real-time and Intelligent Monitoring System for live-broadcasting platforms
|
Li, Yangfan |
|
|
87 |
C |
p. 259-266 |
artikel |
66 |
Secure policy execution using reusable garbled circuit in the cloud
|
Alam, Masoom |
|
|
87 |
C |
p. 488-501 |
artikel |
67 |
Security-oriented opportunistic data forwarding in Mobile Social Networks
|
Wu, Dapeng |
|
|
87 |
C |
p. 803-815 |
artikel |
68 |
Simplifying self-adaptive and power-aware computing with Nornir
|
De Sensi, Daniele |
|
|
87 |
C |
p. 136-151 |
artikel |
69 |
Structure-aware Mashup service Clustering for cloud-based Internet of Things using genetic algorithm based clustering algorithm
|
Pan, Weifeng |
|
|
87 |
C |
p. 267-277 |
artikel |
70 |
The optimization for recurring queries in big data analysis system with MapReduce
|
Zhang, Bin |
|
|
87 |
C |
p. 549-556 |
artikel |
71 |
Thermal benchmarking and modeling for HPC using big data applications
|
Taneja, Shubbhi |
|
|
87 |
C |
p. 372-381 |
artikel |
72 |
Towards a proper service placement in combined Fog-to-Cloud (F2C) architectures
|
Souza, V.B. |
|
|
87 |
C |
p. 1-15 |
artikel |
73 |
Toward service selection for workflow reconfiguration:An interface-based computing solution
|
Gao, Honghao |
|
|
87 |
C |
p. 298-311 |
artikel |
74 |
Towards increasing reliability of clouds environments with RESTful web services
|
Kobusińska, Anna |
|
|
87 |
C |
p. 502-513 |
artikel |
75 |
Towards provisioning hybrid virtual networks in federated cloud data centers
|
Sun, Gang |
|
|
87 |
C |
p. 457-469 |
artikel |
76 |
Verifiable keyword search for secure big data-based mobile healthcare networks with fine-grained authorization control
|
Chen, Zehong |
|
|
87 |
C |
p. 712-724 |
artikel |
77 |
VM instance selection for deadline constraint job on agent-based interconnected cloud
|
Fan, Chih-Tien |
|
|
87 |
C |
p. 470-487 |
artikel |