nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A context-sensitive offloading system using machine-learning classification algorithms for mobile cloud environment
|
Junior, Warley |
|
|
90 |
C |
p. 503-520 |
artikel |
2 |
A data locality based scheduler to enhance MapReduce performance in heterogeneous environments
|
Naik, Nenavath Srinivas |
|
|
90 |
C |
p. 423-434 |
artikel |
3 |
A distributed PSO-based exploration algorithm for a UAV network assisting a disaster scenario
|
Sánchez-García, J. |
|
|
90 |
C |
p. 129-148 |
artikel |
4 |
A framework for on-line timing error detection in software systems
|
Cinque, Marcello |
|
|
90 |
C |
p. 521-538 |
artikel |
5 |
A hierarchical structure for optimal resource allocation in geographically distributed clouds
|
Ziafat, Hasan |
|
|
90 |
C |
p. 539-568 |
artikel |
6 |
A multistage protocol for aggregated queries in distributed cloud databases with privacy protection
|
Kelarev, Andrei |
|
|
90 |
C |
p. 368-380 |
artikel |
7 |
An advanced decision model enabling two-way initiative offloading in edge computing
|
Yin, Zhida |
|
|
90 |
C |
p. 39-48 |
artikel |
8 |
Analysis of student behavior in learning management systems through a Big Data framework
|
Cantabella, Magdalena |
|
|
90 |
C |
p. 262-272 |
artikel |
9 |
An approach for the secure management of hybrid cloud–edge environments
|
Celesti, Antonio |
|
|
90 |
C |
p. 1-19 |
artikel |
10 |
AndrODet: An adaptive Android obfuscation detector
|
Mirzaei, O. |
|
|
90 |
C |
p. 240-261 |
artikel |
11 |
Application of multiresolution analysis for automated detection of brain abnormality using MR images: A comparative study
|
Gudigar, Anjan |
|
|
90 |
C |
p. 359-367 |
artikel |
12 |
A Real-time Linked Dataspace for the Internet of Things: Enabling “Pay-As-You-Go” Data Management in Smart Environments
|
Curry, Edward |
|
|
90 |
C |
p. 405-422 |
artikel |
13 |
Automated diagnosis of celiac disease using DWT and nonlinear features with video capsule endoscopy images
|
Koh, Joel En Wei |
|
|
90 |
C |
p. 86-93 |
artikel |
14 |
Autonomic computation offloading in mobile edge for IoT applications
|
Alam, Md Golam Rabiul |
|
|
90 |
C |
p. 149-157 |
artikel |
15 |
Bigdata logs analysis based on seq2seq networks for cognitive Internet of Things
|
Wu, Pin |
|
|
90 |
C |
p. 477-488 |
artikel |
16 |
CalmWPC: A buffer management to calm down write performance cliff for NAND flash-based storage systems
|
Sun, Hui |
|
|
90 |
C |
p. 461-476 |
artikel |
17 |
Classification of ransomware families with machine learning based on N -gram of opcodes
|
Zhang, Hanqi |
|
|
90 |
C |
p. 211-221 |
artikel |
18 |
Cognitive spammer: A Framework for PageRank analysis with Split by Over-sampling and Train by Under-fitting
|
Makkar, Aaisha |
|
|
90 |
C |
p. 381-404 |
artikel |
19 |
Combining Edge and Cloud computing for low-power, cost-effective metagenomics analysis
|
D’Agostino, Daniele |
|
|
90 |
C |
p. 79-85 |
artikel |
20 |
CPS data streams analytics based on machine learning for Cloud and Fog Computing: A survey
|
Fei, Xiang |
|
|
90 |
C |
p. 435-450 |
artikel |
21 |
Double verification protocol via secret sharing for low-cost RFID tags
|
Liu, Y. |
|
|
90 |
C |
p. 118-128 |
artikel |
22 |
DRTHIS: Deep ransomware threat hunting and intelligence system at the fog layer
|
Homayoun, Sajad |
|
|
90 |
C |
p. 94-104 |
artikel |
23 |
Editorial Board
|
|
|
|
90 |
C |
p. ii |
artikel |
24 |
Efficient distribution of requests in federated cloud computing environments utilizing statistical multiplexing
|
Habibi, Moslem |
|
|
90 |
C |
p. 451-460 |
artikel |
25 |
Enabling technologies for fog computing in healthcare IoT systems
|
Mutlag, Ammar Awad |
|
|
90 |
C |
p. 62-78 |
artikel |
26 |
iRobot-Factory: An intelligent robot factory based on cognitive manufacturing and edge computing
|
Hu, Long |
|
|
90 |
C |
p. 569-577 |
artikel |
27 |
Kernel Tuner: A search-optimizing GPU code auto-tuner
|
van Werkhoven, Ben |
|
|
90 |
C |
p. 347-358 |
artikel |
28 |
Locality-aware and load-balanced static task scheduling for MapReduce
|
Selvitopi, Oguz |
|
|
90 |
C |
p. 49-61 |
artikel |
29 |
LPTD: Achieving lightweight and privacy-preserving truth discovery in CIoT
|
Zhang, Chuan |
|
|
90 |
C |
p. 175-184 |
artikel |
30 |
One-pass lossless data hiding and compression of remote sensing data
|
Carpentieri, Bruno |
|
|
90 |
C |
p. 222-239 |
artikel |
31 |
Optimizing distributed data stream processing by tracing
|
Zvara, Zoltán |
|
|
90 |
C |
p. 578-591 |
artikel |
32 |
Performance modeling for MPI applications with low overhead fine-grained profiling
|
Lu, Gangzhao |
|
|
90 |
C |
p. 317-326 |
artikel |
33 |
Privacy-preserving governmental data publishing: A fog-computing-based differential privacy approach
|
Piao, Chunhui |
|
|
90 |
C |
p. 158-174 |
artikel |
34 |
QoS-aware cloud service composition using eagle strategy
|
Gavvala, Siva Kumar |
|
|
90 |
C |
p. 273-290 |
artikel |
35 |
Renovating blockchain with distributed databases: An open source system
|
Muzammal, Muhammad |
|
|
90 |
C |
p. 105-117 |
artikel |
36 |
Research challenges in nextgen service orchestration
|
Vaquero, Luis M. |
|
|
90 |
C |
p. 20-38 |
artikel |
37 |
RETRACTED: A framework for risk assessment, management and evaluation: Economic tool for quantifying risks in supply chain
|
Abdel-Basset, Mohamed |
|
|
90 |
C |
p. 489-502 |
artikel |
38 |
Secure distributed adaptive bin packing algorithm for cloud storage
|
Mohiuddin, Irfan |
|
|
90 |
C |
p. 307-316 |
artikel |
39 |
Semantic Web Services Composition in the astrophysics domain: Issues and solutions
|
Louge, Thierry |
|
|
90 |
C |
p. 185-197 |
artikel |
40 |
Simultaneous denoising and moving object detection using low rank approximation
|
B., Shijila |
|
|
90 |
C |
p. 198-210 |
artikel |
41 |
Two-factor authentication for trusted third party free dispersed storage
|
Esiner, Ertem |
|
|
90 |
C |
p. 291-306 |
artikel |
42 |
Workflow scheduling applying adaptable and dynamic fragmentation (WSADF) based on runtime conditions in cloud computing
|
Momenzadeh, Zahra |
|
|
90 |
C |
p. 327-346 |
artikel |