nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A Cloud-based platform for the emulation of complex cybersecurity scenarios
|
Furfaro, Angelo |
|
|
89 |
C |
p. 791-803 |
artikel |
2 |
A cloud service adaptive framework based on reliable resource allocation
|
Liu, Dan |
|
|
89 |
C |
p. 455-463 |
artikel |
3 |
A fog computing based concept drift adaptive process mining framework for mobile APPs
|
Huang, Tao |
|
|
89 |
C |
p. 670-684 |
artikel |
4 |
A gray-box performance model for Apache Spark
|
Chao, Zemin |
|
|
89 |
C |
p. 58-67 |
artikel |
5 |
A highly cost-effective task scheduling strategy for very large graph computation
|
Cheng, Yongli |
|
|
89 |
C |
p. 698-712 |
artikel |
6 |
AIEM: AI-enabled affective experience management
|
Qian, Yongfeng |
|
|
89 |
C |
p. 438-445 |
artikel |
7 |
A locality-aware shuffle optimization on fat-tree data centers
|
Wang, Jihe |
|
|
89 |
C |
p. 31-43 |
artikel |
8 |
An adaptive control momentum method as an optimizer in the cloud
|
Ding, Jianhao |
|
|
89 |
C |
p. 192-200 |
artikel |
9 |
Analyzing scientific context of researchers and communities by using complex network and semantic technologies
|
Horta, Vitor |
|
|
89 |
C |
p. 584-605 |
artikel |
10 |
Android single sign-on security: Issues, taxonomy and directions
|
Liu, Xing |
|
|
89 |
C |
p. 402-420 |
artikel |
11 |
An early detection of low rate DDoS attack to SDN based data center networks using information distance metrics
|
Sahoo, Kshira Sagar |
|
|
89 |
C |
p. 685-697 |
artikel |
12 |
An online auction mechanism for cloud computing resource allocation and pricing based on user evaluation and cost
|
Zhang, Jixian |
|
|
89 |
C |
p. 286-299 |
artikel |
13 |
A novel fuzzy deep-learning approach to traffic flow prediction with uncertain spatial–temporal data features
|
Chen, Weihong |
|
|
89 |
C |
p. 78-88 |
artikel |
14 |
A parallel self-organizing overlapping community detection algorithm based on swarm intelligence for large scale complex networks
|
Sun, Hanlin |
|
|
89 |
C |
p. 265-285 |
artikel |
15 |
Application-aware end-to-end delay and message loss estimation in Internet of Things (IoT) — MQTT-SN protocols
|
Guha Roy, Deepsubhra |
|
|
89 |
C |
p. 300-316 |
artikel |
16 |
A programmable policy engine to facilitate time-efficient science DMZ management
|
Xu, Chen |
|
|
89 |
C |
p. 515-524 |
artikel |
17 |
A real time computer aided object detection of nasopharyngeal carcinoma using genetic algorithm and artificial neural network based on Haar feature fear
|
Mohammed, Mazin Abed |
|
|
89 |
C |
p. 539-547 |
artikel |
18 |
A self-adaptive point-of-interest recommendation algorithm based on a multi-order Markov model
|
Liu, Shudong |
|
|
89 |
C |
p. 506-514 |
artikel |
19 |
A self-organized resource provisioning for cloud block storage
|
Ravandi, Babak |
|
|
89 |
C |
p. 765-776 |
artikel |
20 |
A smart artificial bee colony algorithm with distance-fitness-based neighbor search and its application
|
Cui, Laizhong |
|
|
89 |
C |
p. 478-493 |
artikel |
21 |
A thin client friendly trusted execution framework for infrastructure-as-a-service clouds
|
Khan, Imran |
|
|
89 |
C |
p. 239-248 |
artikel |
22 |
Balancing flow table occupancy and link utilization in software-defined networks
|
Guo, Zehua |
|
|
89 |
C |
p. 213-223 |
artikel |
23 |
Benchmarking big data architectures for social networks data processing using public cloud platforms
|
Persico, Valerio |
|
|
89 |
C |
p. 98-109 |
artikel |
24 |
Blockchain for digital rights management
|
Ma, Zhaofeng |
|
|
89 |
C |
p. 746-764 |
artikel |
25 |
Calibers: A bandwidth calendaring paradigm for science workflows
|
Alali, Fatma |
|
|
89 |
C |
p. 736-745 |
artikel |
26 |
CANF: Clustering and anomaly detection method using nearest and farthest neighbor
|
Faroughi, Azadeh |
|
|
89 |
C |
p. 166-177 |
artikel |
27 |
Commodity single board computer clusters and their applications
|
Johnston, Steven J. |
|
|
89 |
C |
p. 201-212 |
artikel |
28 |
Comparing time series with machine learning-based prediction approaches for violation management in cloud SLAs
|
Hussain, Walayat |
|
|
89 |
C |
p. 464-477 |
artikel |
29 |
Congestion control in high-speed lossless data center networks: A survey
|
Huang, Shan |
|
|
89 |
C |
p. 360-374 |
artikel |
30 |
Constraint verification failure recovery in web service composition
|
Laleh, Touraj |
|
|
89 |
C |
p. 387-401 |
artikel |
31 |
Context-aware data quality assessment for big data
|
Ardagna, Danilo |
|
|
89 |
C |
p. 548-562 |
artikel |
32 |
Cooperative indoor positioning with factor graph based on FIM for wireless sensor network
|
Hu, Enwen |
|
|
89 |
C |
p. 126-136 |
artikel |
33 |
Cuckoo search algorithm with dynamic feedback information
|
Cheng, Jiatang |
|
|
89 |
C |
p. 317-334 |
artikel |
34 |
Data driven business rule generation based on fog computing
|
Zhang, Yifei |
|
|
89 |
C |
p. 494-505 |
artikel |
35 |
Detection of advanced persistent threat using machine-learning correlation analysis
|
Ghafir, Ibrahim |
|
|
89 |
C |
p. 349-359 |
artikel |
36 |
DMPO: Dynamic mobility-aware partial offloading in mobile edge computing
|
Yu, Fangxiaoqi |
|
|
89 |
C |
p. 722-735 |
artikel |
37 |
Dynamic fine-tuning stacked auto-encoder neural network for weather forecast
|
Lin, Szu-Yin |
|
|
89 |
C |
p. 446-454 |
artikel |
38 |
Dynamic L-RNN recovery of missing data in IoMT applications
|
Turabieh, Hamza |
|
|
89 |
C |
p. 575-583 |
artikel |
39 |
Editorial Board
|
|
|
|
89 |
C |
p. ii |
artikel |
40 |
Establishing Core Concepts for Information-Powered Collaborations
|
Trani, Luca |
|
|
89 |
C |
p. 421-437 |
artikel |
41 |
Feature selection for IoT based on maximal information coefficient
|
Sun, Guanglu |
|
|
89 |
C |
p. 606-616 |
artikel |
42 |
FRP: A novel fast rerouting protocol with multi-link-failure recovery for mission-critical WSN
|
Riaz, Shehroz |
|
|
89 |
C |
p. 148-165 |
artikel |
43 |
Identifying cyber threats to mobile-IoT applications in edge computing paradigm
|
Abawajy, Jemal |
|
|
89 |
C |
p. 525-538 |
artikel |
44 |
Idle block based methods for cloud workflow scheduling with preemptive and non-preemptive tasks
|
Chen, Long |
|
|
89 |
C |
p. 659-669 |
artikel |
45 |
Influence maximization in large social networks: Heuristics, models and parameters
|
N., Sumith |
|
|
89 |
C |
p. 777-790 |
artikel |
46 |
Iris Recognition Using Multi-Algorithmic Approaches for Cognitive Internet of things (CIoT) Framework
|
Gad, Ramadan |
|
|
89 |
C |
p. 178-191 |
artikel |
47 |
Machine learning based heterogeneous web advertisements detection using a diverse feature set
|
Shaqoor Nengroo, Ab |
|
|
89 |
C |
p. 68-77 |
artikel |
48 |
Opportunistic Edge Computing: Concepts, opportunities and research challenges
|
Olaniyan, Richard |
|
|
89 |
C |
p. 633-645 |
artikel |
49 |
Predatory Search-based Chaos Turbo Particle Swarm Optimisation (PS-CTPSO): A new particle swarm optimisation algorithm for Web service combination problems
|
Xu, Xiaolong |
|
|
89 |
C |
p. 375-386 |
artikel |
50 |
PrivBox: Verifiable decentralized reputation system for online marketplaces
|
Azad, Muhammad Ajmal |
|
|
89 |
C |
p. 44-57 |
artikel |
51 |
Proactive caching for edge computing-enabled industrial mobile wireless networks
|
Li, Xiaomin |
|
|
89 |
C |
p. 89-97 |
artikel |
52 |
RETRACTED: Three-way decisions based on neutrosophic sets and AHP-QFD framework for supplier selection problem
|
Abdel-Basset, Mohamed |
|
|
89 |
C |
p. 19-30 |
artikel |
53 |
Self-healing group key distribution protocol in wireless sensor networks for secure IoT communications
|
Guo, Hua |
|
|
89 |
C |
p. 713-721 |
artikel |
54 |
Semantic interoperability and pattern classification for a service-oriented architecture in pregnancy care
|
Moreira, Mário W.L. |
|
|
89 |
C |
p. 137-147 |
artikel |
55 |
Smart government framework with geo-crowdsourcing and social media analysis
|
Witanto, Joseph Nathanael |
|
|
89 |
C |
p. 1-9 |
artikel |
56 |
Smartphone based intelligent indoor positioning using fuzzy logic
|
Orujov, F. |
|
|
89 |
C |
p. 335-348 |
artikel |
57 |
Taxonomy and analysis of security protocols for Internet of Things
|
Das, Ashok Kumar |
|
|
89 |
C |
p. 110-125 |
artikel |
58 |
Topic recommendation for authors as a link prediction problem
|
Aslan, Serpil |
|
|
89 |
C |
p. 249-264 |
artikel |
59 |
Toward a smart data transfer node
|
Liu, Zhengchun |
|
|
89 |
C |
p. 10-18 |
artikel |
60 |
T3-Scheduler: A topology and Traffic aware two-level Scheduler for stream processing systems in a heterogeneous cluster
|
Eskandari, Leila |
|
|
89 |
C |
p. 617-632 |
artikel |
61 |
Using behavioral features in tablet-based auditory emotion recognition studies
|
Carneiro, Davide |
|
|
89 |
C |
p. 646-658 |
artikel |
62 |
Using trust and local reputation for group formation in the Cloud of Things
|
Fortino, G. |
|
|
89 |
C |
p. 804-815 |
artikel |
63 |
Visualizing large knowledge graphs: A performance analysis
|
Gómez-Romero, Juan |
|
|
89 |
C |
p. 224-238 |
artikel |
64 |
Why wait? Let us start computing while the data is still on the wire
|
Bhattacharyya, Shilpi |
|
|
89 |
C |
p. 563-574 |
artikel |