nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Action recognition using optimized deep autoencoder and CNN for surveillance data streams of non-stationary environments
|
Ullah, Amin |
|
|
96 |
C |
p. 386-397 |
artikel |
2 |
Activity-based model for medium-sized cities considering external activity–travel: Enhancing FEATHERS framework
|
Baqueri, Syed Fazal Abbas |
|
|
96 |
C |
p. 51-63 |
artikel |
3 |
A machine learning-based FinTech cyber threat attribution framework using high-level indicators of compromise
|
Noor, Umara |
|
|
96 |
C |
p. 227-242 |
artikel |
4 |
An analytic computation-driven algorithm for Decentralized Multicore Systems
|
Lin, Yezhi |
|
|
96 |
C |
p. 101-110 |
artikel |
5 |
An edge computing-enabled computation offloading method with privacy preservation for internet of connected vehicles
|
Xu, Xiaolong |
|
|
96 |
C |
p. 89-100 |
artikel |
6 |
An energy efficient IoT data compression approach for edge machine learning
|
Azar, Joseph |
|
|
96 |
C |
p. 168-175 |
artikel |
7 |
An energy-efficient, QoS-aware and cost-effective scheduling approach for real-time workflow applications in cloud computing systems utilizing DVFS and approximate computations
|
Stavrinides, Georgios L. |
|
|
96 |
C |
p. 216-226 |
artikel |
8 |
An integrated approach for intrinsic plagiarism detection
|
AlSallal, Muna |
|
|
96 |
C |
p. 700-712 |
artikel |
9 |
A reliable adaptive forwarding approach in named data networking
|
Rezaeifar, Zeinab |
|
|
96 |
C |
p. 538-551 |
artikel |
10 |
A review of the smart world
|
Liu, Hong |
|
|
96 |
C |
p. 678-691 |
artikel |
11 |
A sector-based random routing scheme for protecting the source location privacy in WSNs for the Internet of Things
|
He, Yu |
|
|
96 |
C |
p. 438-448 |
artikel |
12 |
A self-managed Mesos cluster for data analytics with QoS guarantees
|
López-Huguet, Sergio |
|
|
96 |
C |
p. 449-461 |
artikel |
13 |
A semantic-based correlation approach for detecting hybrid and low-level APTs
|
Lajevardi, Amir Mohammadzade |
|
|
96 |
C |
p. 64-88 |
artikel |
14 |
A tale of three systems: Case studies on the application of architectural tactics for cyber-foraging
|
Lewis, Grace |
|
|
96 |
C |
p. 119-147 |
artikel |
15 |
A user experience environment model for human activity simulation
|
Ko, Ilju |
|
|
96 |
C |
p. 660-666 |
artikel |
16 |
Bayesian network based weighted APT attack paths modeling in cloud computing
|
Zimba, Aaron |
|
|
96 |
C |
p. 525-537 |
artikel |
17 |
BIGSEA: A Big Data analytics platform for public transportation information
|
Alic, Andy S. |
|
|
96 |
C |
p. 243-269 |
artikel |
18 |
BTEM: Belief based trust evaluation mechanism for Wireless Sensor Networks
|
Anwar, Raja Waseem |
|
|
96 |
C |
p. 605-616 |
artikel |
19 |
Combining humans and machines for the future: A novel procedure to predict human interest
|
Ahmed, Tanveer |
|
|
96 |
C |
p. 713-730 |
artikel |
20 |
Competition in data-based service provision: Nash equilibrium characterization
|
Guijarro, Luis |
|
|
96 |
C |
p. 35-50 |
artikel |
21 |
DC coefficient recovery for JPEG images in ubiquitous communication systems
|
Qiu, Han |
|
|
96 |
C |
p. 23-31 |
artikel |
22 |
DEED: Dynamic Energy-Efficient Data offloading for IoT applications under unstable channel conditions
|
Yan, Hui |
|
|
96 |
C |
p. 425-437 |
artikel |
23 |
Designing collaborative blockchained signature-based intrusion detection in IoT environments
|
Li, Wenjuan |
|
|
96 |
C |
p. 481-489 |
artikel |
24 |
Determinants of behavioral intention to use the Personalized Location-based Mobile Tourism Application: An empirical study by integrating TAM with ISSM
|
Chen, Chia-Chen |
|
|
96 |
C |
p. 628-638 |
artikel |
25 |
EATDDS: Energy-aware middleware for wireless sensor and actuator networks
|
Al-Roubaiey, Anas |
|
|
96 |
C |
p. 196-206 |
artikel |
26 |
Editorial Board
|
|
|
|
96 |
C |
p. ii |
artikel |
27 |
Editorial for Special issue of FGCS special issue on “Benchmarking big data systems”
|
Sakr, Sherif |
|
|
96 |
C |
p. 32-34 |
artikel |
28 |
Energy-efficient crypto acceleration with HW/SW co-design for HTTPS
|
Xiao, Chunhua |
|
|
96 |
C |
p. 336-347 |
artikel |
29 |
Enhancing Network Visibility and Security through Tensor Analysis
|
Baskaran, Muthu M. |
|
|
96 |
C |
p. 207-215 |
artikel |
30 |
Evolving graph construction for successive recommendation in event-based social networks
|
Liu, Shenghao |
|
|
96 |
C |
p. 502-514 |
artikel |
31 |
Feasibility analysis of Inter-Pulse Intervals based solutions for cryptographic token generation by two electrocardiogram sensors
|
Ortiz-Martin, Lara |
|
|
96 |
C |
p. 283-296 |
artikel |
32 |
Fork-free hybrid consensus with flexible Proof-of-Activity
|
Liu, Zhiqiang |
|
|
96 |
C |
p. 515-524 |
artikel |
33 |
Immersive human–computer interactive virtual environment using large-scale display system
|
Wang, Xiuhui |
|
|
96 |
C |
p. 649-659 |
artikel |
34 |
Implementation of an Intelligent Indoor Environmental Monitoring and management system in cloud
|
Yang, Chao-Tung |
|
|
96 |
C |
p. 731-749 |
artikel |
35 |
Incorporating URL embedding into ensemble clustering to detect web anomalies
|
Li, Bo |
|
|
96 |
C |
p. 176-184 |
artikel |
36 |
Intelligent conditional collaborative private data sharing
|
Bianchi, Giuseppe |
|
|
96 |
C |
p. 1-10 |
artikel |
37 |
Intelligent distributed routing scheme based on social similarity for mobile social networks
|
Xu, Fang |
|
|
96 |
C |
p. 472-480 |
artikel |
38 |
IoT-enabled smart grid via SM: An overview
|
Al-Turjman, Fadi |
|
|
96 |
C |
p. 579-590 |
artikel |
39 |
LACO: Lightweight Three-Factor Authentication, Access Control and Ownership Transfer Scheme for E-Health Systems in IoT
|
Aghili, Seyed Farhad |
|
|
96 |
C |
p. 410-424 |
artikel |
40 |
MCA-V2I: A Multi-hop Clustering Approach over Vehicle-to-Internet communication for improving VANETs performances
|
Senouci, Oussama |
|
|
96 |
C |
p. 309-323 |
artikel |
41 |
Missing data resilient decision-making for healthcare IoT through personalization: A case study on maternal health
|
Azimi, Iman |
|
|
96 |
C |
p. 297-308 |
artikel |
42 |
Mobile-aware service function chain migration in cloud–fog computing
|
Zhao, Dongcheng |
|
|
96 |
C |
p. 591-604 |
artikel |
43 |
Modeling public mood and emotion: Blog and news sentiment and socio-economic phenomena
|
Chen, Mu-Yen |
|
|
96 |
C |
p. 692-699 |
artikel |
44 |
Multi-lingual geoparsing based on machine translation
|
Chen, Xu |
|
|
96 |
C |
p. 667-677 |
artikel |
45 |
One secure data integrity verification scheme for cloud storage
|
Fan, Yongkai |
|
|
96 |
C |
p. 376-385 |
artikel |
46 |
Page-sharing-based virtual machine packing with multi-resource constraints to reduce network traffic in migration for clouds
|
Li, Huixi |
|
|
96 |
C |
p. 462-471 |
artikel |
47 |
PAU: Privacy Assessment method with Uncertainty consideration for cloud-based vehicular networks
|
Feng, Xia |
|
|
96 |
C |
p. 368-375 |
artikel |
48 |
Performance analysis of machine learning classifiers on improved concept vector space models
|
Kastrati, Zenun |
|
|
96 |
C |
p. 552-562 |
artikel |
49 |
Power law based foundation for the measurement of discrimination information for human knowledge representation
|
Xu, Zheng |
|
|
96 |
C |
p. 617-627 |
artikel |
50 |
Privacy-preserving and sparsity-aware location-based prediction method for collaborative recommender systems
|
Meng, Shunmei |
|
|
96 |
C |
p. 324-335 |
artikel |
51 |
Probabilistic normed load monitoring in large scale distributed systems using mobile agents
|
Ali, Moazam |
|
|
96 |
C |
p. 148-167 |
artikel |
52 |
PTAS: Privacy-preserving Thin-client Authentication Scheme in blockchain-based PKI
|
Jiang, Wenbo |
|
|
96 |
C |
p. 185-195 |
artikel |
53 |
Quality of Service (QoS)-driven resource provisioning for large-scale graph processing in cloud computing environments: Graph Processing-as-a-Service (GPaaS)
|
Heidari, Safiollah |
|
|
96 |
C |
p. 490-501 |
artikel |
54 |
Reducing the price of resource provisioning using EC2 spot instances with prediction models
|
Fabra, Javier |
|
|
96 |
C |
p. 348-367 |
artikel |
55 |
SoC-based computing infrastructures for scientific applications and commercial services: Performance and economic evaluations
|
D’Agostino, Daniele |
|
|
96 |
C |
p. 11-22 |
artikel |
56 |
Software defined network management for dynamic smart GRID traffic
|
Cokic, Mita |
|
|
96 |
C |
p. 270-282 |
artikel |
57 |
Task migration for mobile edge computing using deep reinforcement learning
|
Zhang, Cheng |
|
|
96 |
C |
p. 111-118 |
artikel |
58 |
Towards interactive networking: Runtime message inference approach for incompatible protocol updates in IoT environments
|
Son, Heesuk |
|
|
96 |
C |
p. 563-578 |
artikel |
59 |
Urban data management system: Towards Big Data analytics for Internet of Things based smart urban environment using customized Hadoop
|
Babar, Muhammad |
|
|
96 |
C |
p. 398-409 |
artikel |
60 |
User role identification based on social behavior and networking analysis for information dissemination
|
Zhou, Xiaokang |
|
|
96 |
C |
p. 639-648 |
artikel |