Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             64 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A Cloud-based platform for the emulation of complex cybersecurity scenarios Furfaro, Angelo

89 C p. 791-803
artikel
2 A cloud service adaptive framework based on reliable resource allocation Liu, Dan

89 C p. 455-463
artikel
3 A fog computing based concept drift adaptive process mining framework for mobile APPs Huang, Tao

89 C p. 670-684
artikel
4 A gray-box performance model for Apache Spark Chao, Zemin

89 C p. 58-67
artikel
5 A highly cost-effective task scheduling strategy for very large graph computation Cheng, Yongli

89 C p. 698-712
artikel
6 AIEM: AI-enabled affective experience management Qian, Yongfeng

89 C p. 438-445
artikel
7 A locality-aware shuffle optimization on fat-tree data centers Wang, Jihe

89 C p. 31-43
artikel
8 An adaptive control momentum method as an optimizer in the cloud Ding, Jianhao

89 C p. 192-200
artikel
9 Analyzing scientific context of researchers and communities by using complex network and semantic technologies Horta, Vitor

89 C p. 584-605
artikel
10 Android single sign-on security: Issues, taxonomy and directions Liu, Xing

89 C p. 402-420
artikel
11 An early detection of low rate DDoS attack to SDN based data center networks using information distance metrics Sahoo, Kshira Sagar

89 C p. 685-697
artikel
12 An online auction mechanism for cloud computing resource allocation and pricing based on user evaluation and cost Zhang, Jixian

89 C p. 286-299
artikel
13 A novel fuzzy deep-learning approach to traffic flow prediction with uncertain spatial–temporal data features Chen, Weihong

89 C p. 78-88
artikel
14 A parallel self-organizing overlapping community detection algorithm based on swarm intelligence for large scale complex networks Sun, Hanlin

89 C p. 265-285
artikel
15 Application-aware end-to-end delay and message loss estimation in Internet of Things (IoT) — MQTT-SN protocols Guha Roy, Deepsubhra

89 C p. 300-316
artikel
16 A programmable policy engine to facilitate time-efficient science DMZ management Xu, Chen

89 C p. 515-524
artikel
17 A real time computer aided object detection of nasopharyngeal carcinoma using genetic algorithm and artificial neural network based on Haar feature fear Mohammed, Mazin Abed

89 C p. 539-547
artikel
18 A self-adaptive point-of-interest recommendation algorithm based on a multi-order Markov model Liu, Shudong

89 C p. 506-514
artikel
19 A self-organized resource provisioning for cloud block storage Ravandi, Babak

89 C p. 765-776
artikel
20 A smart artificial bee colony algorithm with distance-fitness-based neighbor search and its application Cui, Laizhong

89 C p. 478-493
artikel
21 A thin client friendly trusted execution framework for infrastructure-as-a-service clouds Khan, Imran

89 C p. 239-248
artikel
22 Balancing flow table occupancy and link utilization in software-defined networks Guo, Zehua

89 C p. 213-223
artikel
23 Benchmarking big data architectures for social networks data processing using public cloud platforms Persico, Valerio

89 C p. 98-109
artikel
24 Blockchain for digital rights management Ma, Zhaofeng

89 C p. 746-764
artikel
25 Calibers: A bandwidth calendaring paradigm for science workflows Alali, Fatma

89 C p. 736-745
artikel
26 CANF: Clustering and anomaly detection method using nearest and farthest neighbor Faroughi, Azadeh

89 C p. 166-177
artikel
27 Commodity single board computer clusters and their applications Johnston, Steven J.

89 C p. 201-212
artikel
28 Comparing time series with machine learning-based prediction approaches for violation management in cloud SLAs Hussain, Walayat

89 C p. 464-477
artikel
29 Congestion control in high-speed lossless data center networks: A survey Huang, Shan

89 C p. 360-374
artikel
30 Constraint verification failure recovery in web service composition Laleh, Touraj

89 C p. 387-401
artikel
31 Context-aware data quality assessment for big data Ardagna, Danilo

89 C p. 548-562
artikel
32 Cooperative indoor positioning with factor graph based on FIM for wireless sensor network Hu, Enwen

89 C p. 126-136
artikel
33 Cuckoo search algorithm with dynamic feedback information Cheng, Jiatang

89 C p. 317-334
artikel
34 Data driven business rule generation based on fog computing Zhang, Yifei

89 C p. 494-505
artikel
35 Detection of advanced persistent threat using machine-learning correlation analysis Ghafir, Ibrahim

89 C p. 349-359
artikel
36 DMPO: Dynamic mobility-aware partial offloading in mobile edge computing Yu, Fangxiaoqi

89 C p. 722-735
artikel
37 Dynamic fine-tuning stacked auto-encoder neural network for weather forecast Lin, Szu-Yin

89 C p. 446-454
artikel
38 Dynamic L-RNN recovery of missing data in IoMT applications Turabieh, Hamza

89 C p. 575-583
artikel
39 Editorial Board
89 C p. ii
artikel
40 Establishing Core Concepts for Information-Powered Collaborations Trani, Luca

89 C p. 421-437
artikel
41 Feature selection for IoT based on maximal information coefficient Sun, Guanglu

89 C p. 606-616
artikel
42 FRP: A novel fast rerouting protocol with multi-link-failure recovery for mission-critical WSN Riaz, Shehroz

89 C p. 148-165
artikel
43 Identifying cyber threats to mobile-IoT applications in edge computing paradigm Abawajy, Jemal

89 C p. 525-538
artikel
44 Idle block based methods for cloud workflow scheduling with preemptive and non-preemptive tasks Chen, Long

89 C p. 659-669
artikel
45 Influence maximization in large social networks: Heuristics, models and parameters N., Sumith

89 C p. 777-790
artikel
46 Iris Recognition Using Multi-Algorithmic Approaches for Cognitive Internet of things (CIoT) Framework Gad, Ramadan

89 C p. 178-191
artikel
47 Machine learning based heterogeneous web advertisements detection using a diverse feature set Shaqoor Nengroo, Ab

89 C p. 68-77
artikel
48 Opportunistic Edge Computing: Concepts, opportunities and research challenges Olaniyan, Richard

89 C p. 633-645
artikel
49 Predatory Search-based Chaos Turbo Particle Swarm Optimisation (PS-CTPSO): A new particle swarm optimisation algorithm for Web service combination problems Xu, Xiaolong

89 C p. 375-386
artikel
50 PrivBox: Verifiable decentralized reputation system for online marketplaces Azad, Muhammad Ajmal

89 C p. 44-57
artikel
51 Proactive caching for edge computing-enabled industrial mobile wireless networks Li, Xiaomin

89 C p. 89-97
artikel
52 RETRACTED: Three-way decisions based on neutrosophic sets and AHP-QFD framework for supplier selection problem Abdel-Basset, Mohamed

89 C p. 19-30
artikel
53 Self-healing group key distribution protocol in wireless sensor networks for secure IoT communications Guo, Hua

89 C p. 713-721
artikel
54 Semantic interoperability and pattern classification for a service-oriented architecture in pregnancy care Moreira, Mário W.L.

89 C p. 137-147
artikel
55 Smart government framework with geo-crowdsourcing and social media analysis Witanto, Joseph Nathanael

89 C p. 1-9
artikel
56 Smartphone based intelligent indoor positioning using fuzzy logic Orujov, F.

89 C p. 335-348
artikel
57 Taxonomy and analysis of security protocols for Internet of Things Das, Ashok Kumar

89 C p. 110-125
artikel
58 Topic recommendation for authors as a link prediction problem Aslan, Serpil

89 C p. 249-264
artikel
59 Toward a smart data transfer node Liu, Zhengchun

89 C p. 10-18
artikel
60 T3-Scheduler: A topology and Traffic aware two-level Scheduler for stream processing systems in a heterogeneous cluster Eskandari, Leila

89 C p. 617-632
artikel
61 Using behavioral features in tablet-based auditory emotion recognition studies Carneiro, Davide

89 C p. 646-658
artikel
62 Using trust and local reputation for group formation in the Cloud of Things Fortino, G.

89 C p. 804-815
artikel
63 Visualizing large knowledge graphs: A performance analysis Gómez-Romero, Juan

89 C p. 224-238
artikel
64 Why wait? Let us start computing while the data is still on the wire Bhattacharyya, Shilpi

89 C p. 563-574
artikel
                             64 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland