nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A collaborative filtering recommendation method based on discrete quantum-inspired shuffled frog leaping algorithms in social networks
|
Li, Wenjuan |
|
|
88 |
C |
p. 262-270 |
artikel |
2 |
Agricultural research recommendation algorithm based on consumer preference model of e-commerce
|
Zhu, Qian |
|
|
88 |
C |
p. 151-155 |
artikel |
3 |
A high-performance virtual machine filesystem monitor in cloud-assisted cognitive IoT
|
Zhan, Dongyang |
|
|
88 |
C |
p. 209-219 |
artikel |
4 |
An efficient fuzzy c-means approach based on canonical polyadic decomposition for clustering big data in IoT
|
Bu, Fanyu |
|
|
88 |
C |
p. 675-682 |
artikel |
5 |
An evolutionary algorithm for roadside unit deployment with betweenness centrality preprocessing
|
Moura, Douglas L.L. |
|
|
88 |
C |
p. 776-784 |
artikel |
6 |
An improved NBA-based STEP design intention feature recognition
|
Jian, Chengfeng |
|
|
88 |
C |
p. 357-362 |
artikel |
7 |
An improved NSGA-III algorithm with adaptive mutation operator for Big Data optimization problems
|
Yi, Jiao-Hong |
|
|
88 |
C |
p. 571-585 |
artikel |
8 |
An intelligent/cognitive model of task scheduling for IoT applications in cloud computing environment
|
Basu, Sayantani |
|
|
88 |
C |
p. 254-261 |
artikel |
9 |
An ontology for heterogeneous resources management interoperability and HPC in the cloud
|
Castañé, Gabriel G. |
|
|
88 |
C |
p. 373-384 |
artikel |
10 |
A novel deep learning method for aircraft landing speed prediction based on cloud-based sensor data
|
Tong, Chao |
|
|
88 |
C |
p. 552-558 |
artikel |
11 |
A novel ITÖ Algorithm for influence maximization in the large-scale social networks
|
Wang, Yufeng |
|
|
88 |
C |
p. 755-763 |
artikel |
12 |
A novel parallel distance metric-based approach for diversified ranking on large graphs
|
Li, Jin |
|
|
88 |
C |
p. 79-91 |
artikel |
13 |
Appearance based pedestrians’ gender recognition by employing stacked auto encoders in deep learning
|
Raza, Mudassar |
|
|
88 |
C |
p. 28-39 |
artikel |
14 |
A sparse representation based pansharpening method
|
Yang, Xiaomin |
|
|
88 |
C |
p. 385-399 |
artikel |
15 |
A two-stage locality-sensitive hashing based approach for privacy-preserving mobile service recommendation in cross-platform edge environment
|
Qi, Lianyong |
|
|
88 |
C |
p. 636-643 |
artikel |
16 |
Augmenting computing capabilities at the edge by jointly exploiting mobile devices: A survey
|
Hirsch, Matías |
|
|
88 |
C |
p. 644-662 |
artikel |
17 |
A unified framework for automated inspection of handheld safety critical devices in production assemblies
|
Rehmat, Muhammad Asim |
|
|
88 |
C |
p. 342-356 |
artikel |
18 |
Bi-directional channel modeling for implantable UHF–RFID transceivers in brain–computer interface applications
|
Al Ajrawi, Shams |
|
|
88 |
C |
p. 683-692 |
artikel |
19 |
Bioinspired Algorithms in Complex Ephemeral Environments
|
Camacho, David |
|
|
88 |
C |
p. 732-734 |
artikel |
20 |
Chaos-based robust method of zero-watermarking for medical signals
|
Ali, Zulfiqar |
|
|
88 |
C |
p. 400-412 |
artikel |
21 |
Classification of compressed and uncompressed text documents
|
Bhushan, S.N. Bharath |
|
|
88 |
C |
p. 614-623 |
artikel |
22 |
CoAP-based group mobility management protocol for the Internet-of-Things in WBAN environment
|
Gohar, Moneeb |
|
|
88 |
C |
p. 309-318 |
artikel |
23 |
Compulsory traceable ciphertext-policy attribute-based encryption against privilege abuse in fog computing
|
Qiao, Huidong |
|
|
88 |
C |
p. 107-116 |
artikel |
24 |
Corrigendum to “Fuzzy adaptive cognitive stimulation therapy generation for Alzheimer’s sufferers: Towards a pervasive dementia care monitoring platform” [Future Gener. Comput. Syst. 88 (2018) 479–490]
|
Navarro, Javier |
|
|
88 |
C |
p. 730-731 |
artikel |
25 |
Depth sensor based human detection for indoor surveillance
|
Hu, Tao |
|
|
88 |
C |
p. 540-551 |
artikel |
26 |
Design and implementation of Intelligent transplanting system based on photoelectric sensor and PLC
|
Xin, Jin |
|
|
88 |
C |
p. 127-139 |
artikel |
27 |
DESRP: An efficient differential evolution algorithm for stochastic demand-oriented resource placement in heterogeneous clouds
|
Liu, Yang |
|
|
88 |
C |
p. 234-242 |
artikel |
28 |
Detecting performance anomalies in scientific workflows using hierarchical temporal memory
|
Rodriguez, Maria A. |
|
|
88 |
C |
p. 624-635 |
artikel |
29 |
DWARM: A wear-aware memory management scheme for in-memory file systems
|
Wu, Lin |
|
|
88 |
C |
p. 1-15 |
artikel |
30 |
Dynamic reconfiguration of service-oriented resources in cyber–physical production systems by a process-independent approach with multiple criteria and multiple resource management operations
|
Engelsberger, Maximilian |
|
|
88 |
C |
p. 424-441 |
artikel |
31 |
Editorial Board
|
|
|
|
88 |
C |
p. ii |
artikel |
32 |
Energy and connectivity aware resource optimization of nodes traffic distribution in smart home networks
|
Asghari, Vahid |
|
|
88 |
C |
p. 559-570 |
artikel |
33 |
Energy efficient and load balanced priority queue algorithm for Wireless Body Area Network
|
Ambigavathi, M. |
|
|
88 |
C |
p. 586-593 |
artikel |
34 |
Evolutionary deployment and local search-based movements of 0th responders in disaster scenarios
|
Reina, D.G. |
|
|
88 |
C |
p. 61-78 |
artikel |
35 |
Evolutionary solutions for resources management in multiple clouds: State-of-the-art and future directions
|
de Carvalho, Juliana Oliveira |
|
|
88 |
C |
p. 284-296 |
artikel |
36 |
Evolving IoT networks by the confluence of MEC and LP-WAN paradigms
|
Sanchez-Iborra, Ramon |
|
|
88 |
C |
p. 199-208 |
artikel |
37 |
Extending labeled mobile network traffic data by three levels traffic identification fusion
|
Liu, Zhen |
|
|
88 |
C |
p. 453-466 |
artikel |
38 |
Fast and peer-to-peer vital signal learning system for cloud-based healthcare
|
Xie, Rongjun |
|
|
88 |
C |
p. 220-233 |
artikel |
39 |
Fog-cloud based cyber-physical system for distinguishing, detecting and preventing mosquito borne diseases
|
Sood, Sandeep K. |
|
|
88 |
C |
p. 764-775 |
artikel |
40 |
From ephemeral computing to deep bioinspired algorithms: New trends and applications
|
Camacho, David |
|
|
88 |
C |
p. 735-746 |
artikel |
41 |
Fuzzy adaptive cognitive stimulation therapy generation for Alzheimer’s sufferers: Towards a pervasive dementia care monitoring platform
|
Navarro, Javier |
|
|
88 |
C |
p. 479-490 |
artikel |
42 |
Guided dynamic particle swarm optimization for optimizing digital image watermarking in industry applications
|
Zheng, Zhigao |
|
|
88 |
C |
p. 92-106 |
artikel |
43 |
Harris corner detection on a NUMA manycore
|
Haggui, Olfa |
|
|
88 |
C |
p. 442-452 |
artikel |
44 |
High-Performance Computing for Big Data Processing
|
Wu, Yulei |
|
|
88 |
C |
p. 693-695 |
artikel |
45 |
ICAuth: A secure and scalable owner delegated inter-cloud authorization
|
Sultan, Nazatul Haque |
|
|
88 |
C |
p. 319-332 |
artikel |
46 |
Improving consumer satisfaction in smart cities using edge computing and caching: A case study of date fruits classification
|
Hossain, M. Shamim |
|
|
88 |
C |
p. 333-341 |
artikel |
47 |
Internet of Things (IoT): Operating System, Applications and Protocols Design, and Validation Techniques
|
Zikria, Yousaf Bin |
|
|
88 |
C |
p. 699-706 |
artikel |
48 |
Iterated Greedy algorithm for performing community detection in social networks
|
Sánchez-Oro, Jesús |
|
|
88 |
C |
p. 785-791 |
artikel |
49 |
Let nature decide its nature: On the design of collaborative hyperheuristics for decentralized ephemeral environments
|
Martinez, Aritz |
|
|
88 |
C |
p. 792-805 |
artikel |
50 |
Low-power portable devices for metagenomics analysis: Fog computing makes bioinformatics ready for the Internet of Things
|
Merelli, Ivan |
|
|
88 |
C |
p. 467-478 |
artikel |
51 |
Measuring stream processing systems adaptability under dynamic workloads
|
Hidalgo, Nicolas |
|
|
88 |
C |
p. 413-423 |
artikel |
52 |
Mining of productive periodic-frequent patterns for IoT data analytics
|
Ismail, Walaa N. |
|
|
88 |
C |
p. 512-523 |
artikel |
53 |
Multi-information location data fusion system of railway signal based on cloud computing
|
Gong, Peng |
|
|
88 |
C |
p. 594-598 |
artikel |
54 |
On blockchain and its integration with IoT. Challenges and opportunities
|
Reyna, Ana |
|
|
88 |
C |
p. 173-190 |
artikel |
55 |
On the optimal tuning and placement of FEC codecs within multicasting trees for resilient publish/subscribe services in edge-IoT architectures
|
Esposito, Christian |
|
|
88 |
C |
p. 140-150 |
artikel |
56 |
Pairing based anonymous and secure key agreement protocol for smart grid edge computing infrastructure
|
Mahmood, Khalid |
|
|
88 |
C |
p. 491-500 |
artikel |
57 |
Parallel processing algorithm for railway signal fault diagnosis data based on cloud computing
|
Cao, Yuan |
|
|
88 |
C |
p. 279-283 |
artikel |
58 |
QRFence: A flexible and scalable QR link security detection framework for Android devices
|
Song, Jun |
|
|
88 |
C |
p. 663-674 |
artikel |
59 |
Recent advances in Big Data Analytics, Internet of Things and Machine Learning
|
Martis, Roshan Joy |
|
|
88 |
C |
p. 696-698 |
artikel |
60 |
Research on agricultural monitoring system based on convolutional neural network
|
Chen, Jinbo |
|
|
88 |
C |
p. 271-278 |
artikel |
61 |
Research on divider losses with high-speed photography for foxtail millet harvesting
|
Du, Xinwu |
|
|
88 |
C |
p. 55-60 |
artikel |
62 |
Research on security of information sharing in Internet of Things based on key algorithm
|
Wei, Pengcheng |
|
|
88 |
C |
p. 599-605 |
artikel |
63 |
Resource allocation of wireless backhaul in heterogeneous network based on the large-scale MIMO
|
Wang, Yang |
|
|
88 |
C |
p. 117-126 |
artikel |
64 |
RETRACTED: Multi-spectral and panchromatic image fusion approach using stationary wavelet transform and swarm flower pollination optimization for remote sensing applications
|
Gharbia, Reham |
|
|
88 |
C |
p. 501-511 |
artikel |
65 |
Secure data deduplication using secret sharing schemes over cloud
|
Singh, Priyanka |
|
|
88 |
C |
p. 156-167 |
artikel |
66 |
Security and trust issues in Fog computing: A survey
|
Zhang, PeiYun |
|
|
88 |
C |
p. 16-27 |
artikel |
67 |
Software Defined Network-based control system for an efficient traffic management for emergency situations in smart cities
|
Rego, Albert |
|
|
88 |
C |
p. 243-253 |
artikel |
68 |
Sparsity estimation matching pursuit algorithm based on restricted isometry property for signal reconstruction
|
Yao, Shihong |
|
|
88 |
C |
p. 747-754 |
artikel |
69 |
Stag hunt and trust emergence in social networks
|
Zhou, Lu |
|
|
88 |
C |
p. 168-172 |
artikel |
70 |
Strategies and systems towards grids and clouds integration:A DBMS-based solution
|
Mariotti, Mirko |
|
|
88 |
C |
p. 718-729 |
artikel |
71 |
Supporting user authorization queries in RBAC systems by role–permission reassignment
|
Lu, Jianfeng |
|
|
88 |
C |
p. 707-717 |
artikel |
72 |
The CloudSME simulation platform and its applications: A generic multi-cloud platform for developing and executing commercial cloud-based simulations
|
Taylor, Simon J.E. |
|
|
88 |
C |
p. 524-539 |
artikel |
73 |
Toward integrated Cloud–Fog networks for efficient IoT provisioning: Key challenges and solutions
|
Peng, Limei |
|
|
88 |
C |
p. 606-613 |
artikel |
74 |
Towards thermal-aware Hadoop clusters
|
Zhou, Yi |
|
|
88 |
C |
p. 40-54 |
artikel |
75 |
Transferring a petabyte in a day
|
Kettimuthu, Rajkumar |
|
|
88 |
C |
p. 191-198 |
artikel |
76 |
Vehicular datacenter modeling for cloud computing: Considering capacity and leave rate of vehicles
|
Kim, Taesik |
|
|
88 |
C |
p. 363-372 |
artikel |
77 |
Viper: A module for communication-layer determinism and scaling in low-latency stream processing
|
Walulya, Ivan |
|
|
88 |
C |
p. 297-308 |
artikel |