Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             60 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Action recognition using optimized deep autoencoder and CNN for surveillance data streams of non-stationary environments Ullah, Amin

96 C p. 386-397
artikel
2 Activity-based model for medium-sized cities considering external activity–travel: Enhancing FEATHERS framework Baqueri, Syed Fazal Abbas

96 C p. 51-63
artikel
3 A machine learning-based FinTech cyber threat attribution framework using high-level indicators of compromise Noor, Umara

96 C p. 227-242
artikel
4 An analytic computation-driven algorithm for Decentralized Multicore Systems Lin, Yezhi

96 C p. 101-110
artikel
5 An edge computing-enabled computation offloading method with privacy preservation for internet of connected vehicles Xu, Xiaolong

96 C p. 89-100
artikel
6 An energy efficient IoT data compression approach for edge machine learning Azar, Joseph

96 C p. 168-175
artikel
7 An energy-efficient, QoS-aware and cost-effective scheduling approach for real-time workflow applications in cloud computing systems utilizing DVFS and approximate computations Stavrinides, Georgios L.

96 C p. 216-226
artikel
8 An integrated approach for intrinsic plagiarism detection AlSallal, Muna

96 C p. 700-712
artikel
9 A reliable adaptive forwarding approach in named data networking Rezaeifar, Zeinab

96 C p. 538-551
artikel
10 A review of the smart world Liu, Hong

96 C p. 678-691
artikel
11 A sector-based random routing scheme for protecting the source location privacy in WSNs for the Internet of Things He, Yu

96 C p. 438-448
artikel
12 A self-managed Mesos cluster for data analytics with QoS guarantees López-Huguet, Sergio

96 C p. 449-461
artikel
13 A semantic-based correlation approach for detecting hybrid and low-level APTs Lajevardi, Amir Mohammadzade

96 C p. 64-88
artikel
14 A tale of three systems: Case studies on the application of architectural tactics for cyber-foraging Lewis, Grace

96 C p. 119-147
artikel
15 A user experience environment model for human activity simulation Ko, Ilju

96 C p. 660-666
artikel
16 Bayesian network based weighted APT attack paths modeling in cloud computing Zimba, Aaron

96 C p. 525-537
artikel
17 BIGSEA: A Big Data analytics platform for public transportation information Alic, Andy S.

96 C p. 243-269
artikel
18 BTEM: Belief based trust evaluation mechanism for Wireless Sensor Networks Anwar, Raja Waseem

96 C p. 605-616
artikel
19 Combining humans and machines for the future: A novel procedure to predict human interest Ahmed, Tanveer

96 C p. 713-730
artikel
20 Competition in data-based service provision: Nash equilibrium characterization Guijarro, Luis

96 C p. 35-50
artikel
21 DC coefficient recovery for JPEG images in ubiquitous communication systems Qiu, Han

96 C p. 23-31
artikel
22 DEED: Dynamic Energy-Efficient Data offloading for IoT applications under unstable channel conditions Yan, Hui

96 C p. 425-437
artikel
23 Designing collaborative blockchained signature-based intrusion detection in IoT environments Li, Wenjuan

96 C p. 481-489
artikel
24 Determinants of behavioral intention to use the Personalized Location-based Mobile Tourism Application: An empirical study by integrating TAM with ISSM Chen, Chia-Chen

96 C p. 628-638
artikel
25 EATDDS: Energy-aware middleware for wireless sensor and actuator networks Al-Roubaiey, Anas

96 C p. 196-206
artikel
26 Editorial Board
96 C p. ii
artikel
27 Editorial for Special issue of FGCS special issue on “Benchmarking big data systems” Sakr, Sherif

96 C p. 32-34
artikel
28 Energy-efficient crypto acceleration with HW/SW co-design for HTTPS Xiao, Chunhua

96 C p. 336-347
artikel
29 Enhancing Network Visibility and Security through Tensor Analysis Baskaran, Muthu M.

96 C p. 207-215
artikel
30 Evolving graph construction for successive recommendation in event-based social networks Liu, Shenghao

96 C p. 502-514
artikel
31 Feasibility analysis of Inter-Pulse Intervals based solutions for cryptographic token generation by two electrocardiogram sensors Ortiz-Martin, Lara

96 C p. 283-296
artikel
32 Fork-free hybrid consensus with flexible Proof-of-Activity Liu, Zhiqiang

96 C p. 515-524
artikel
33 Immersive human–computer interactive virtual environment using large-scale display system Wang, Xiuhui

96 C p. 649-659
artikel
34 Implementation of an Intelligent Indoor Environmental Monitoring and management system in cloud Yang, Chao-Tung

96 C p. 731-749
artikel
35 Incorporating URL embedding into ensemble clustering to detect web anomalies Li, Bo

96 C p. 176-184
artikel
36 Intelligent conditional collaborative private data sharing Bianchi, Giuseppe

96 C p. 1-10
artikel
37 Intelligent distributed routing scheme based on social similarity for mobile social networks Xu, Fang

96 C p. 472-480
artikel
38 IoT-enabled smart grid via SM: An overview Al-Turjman, Fadi

96 C p. 579-590
artikel
39 LACO: Lightweight Three-Factor Authentication, Access Control and Ownership Transfer Scheme for E-Health Systems in IoT Aghili, Seyed Farhad

96 C p. 410-424
artikel
40 MCA-V2I: A Multi-hop Clustering Approach over Vehicle-to-Internet communication for improving VANETs performances Senouci, Oussama

96 C p. 309-323
artikel
41 Missing data resilient decision-making for healthcare IoT through personalization: A case study on maternal health Azimi, Iman

96 C p. 297-308
artikel
42 Mobile-aware service function chain migration in cloud–fog computing Zhao, Dongcheng

96 C p. 591-604
artikel
43 Modeling public mood and emotion: Blog and news sentiment and socio-economic phenomena Chen, Mu-Yen

96 C p. 692-699
artikel
44 Multi-lingual geoparsing based on machine translation Chen, Xu

96 C p. 667-677
artikel
45 One secure data integrity verification scheme for cloud storage Fan, Yongkai

96 C p. 376-385
artikel
46 Page-sharing-based virtual machine packing with multi-resource constraints to reduce network traffic in migration for clouds Li, Huixi

96 C p. 462-471
artikel
47 PAU: Privacy Assessment method with Uncertainty consideration for cloud-based vehicular networks Feng, Xia

96 C p. 368-375
artikel
48 Performance analysis of machine learning classifiers on improved concept vector space models Kastrati, Zenun

96 C p. 552-562
artikel
49 Power law based foundation for the measurement of discrimination information for human knowledge representation Xu, Zheng

96 C p. 617-627
artikel
50 Privacy-preserving and sparsity-aware location-based prediction method for collaborative recommender systems Meng, Shunmei

96 C p. 324-335
artikel
51 Probabilistic normed load monitoring in large scale distributed systems using mobile agents Ali, Moazam

96 C p. 148-167
artikel
52 PTAS: Privacy-preserving Thin-client Authentication Scheme in blockchain-based PKI Jiang, Wenbo

96 C p. 185-195
artikel
53 Quality of Service (QoS)-driven resource provisioning for large-scale graph processing in cloud computing environments: Graph Processing-as-a-Service (GPaaS) Heidari, Safiollah

96 C p. 490-501
artikel
54 Reducing the price of resource provisioning using EC2 spot instances with prediction models Fabra, Javier

96 C p. 348-367
artikel
55 SoC-based computing infrastructures for scientific applications and commercial services: Performance and economic evaluations D’Agostino, Daniele

96 C p. 11-22
artikel
56 Software defined network management for dynamic smart GRID traffic Cokic, Mita

96 C p. 270-282
artikel
57 Task migration for mobile edge computing using deep reinforcement learning Zhang, Cheng

96 C p. 111-118
artikel
58 Towards interactive networking: Runtime message inference approach for incompatible protocol updates in IoT environments Son, Heesuk

96 C p. 563-578
artikel
59 Urban data management system: Towards Big Data analytics for Internet of Things based smart urban environment using customized Hadoop Babar, Muhammad

96 C p. 398-409
artikel
60 User role identification based on social behavior and networking analysis for information dissemination Zhou, Xiaokang

96 C p. 639-648
artikel
                             60 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland