nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Accelerating in-memory transaction processing using general purpose graphics processing units
|
Gao, Lan |
|
2019 |
97 |
C |
p. 836-848 |
artikel |
2 |
A comparative analysis of emerging approaches for securing java software with Intel SGX
|
Coppolino, Luigi |
|
2019 |
97 |
C |
p. 620-633 |
artikel |
3 |
A critical analysis of an IoT—aware AAL system for elderly monitoring
|
Almeida, Aitor |
|
2019 |
97 |
C |
p. 598-619 |
artikel |
4 |
A framework and a performance assessment for serverless MapReduce on AWS Lambda
|
Giménez-Alventosa, V. |
|
2019 |
97 |
C |
p. 259-274 |
artikel |
5 |
An adaptive multi-level caching strategy for Distributed Database System
|
Lu, Feng |
|
2019 |
97 |
C |
p. 61-68 |
artikel |
6 |
Analysis of Doddington zoo classification for user dependent template update: Application to keystroke dynamics recognition
|
Mhenni, Abir |
|
2019 |
97 |
C |
p. 210-218 |
artikel |
7 |
An integrated approach for multi-objective optimisation and MCDM of energy internet under uncertainty
|
Hong, Zhaoxi |
|
2019 |
97 |
C |
p. 90-104 |
artikel |
8 |
A novel directional and non-local-convergent particle swarm optimization based workflow scheduling in cloud–edge environment
|
Xie, Ying |
|
2019 |
97 |
C |
p. 361-378 |
artikel |
9 |
A novel electrocardiogram feature extraction approach for cardiac arrhythmia classification
|
Marinho, Leandro B. |
|
2019 |
97 |
C |
p. 564-577 |
artikel |
10 |
A novel integrity measurement method based on copy-on-write for region in virtual machine
|
Li, Shupan |
|
2019 |
97 |
C |
p. 714-726 |
artikel |
11 |
A novel method for parallel indexing of real time geospatial big data generated by IoT devices
|
Limkar, Suresh V. |
|
2019 |
97 |
C |
p. 433-452 |
artikel |
12 |
A proposal for bridging application layer protocols to HTTP on IoT solutions
|
da Cruz, Mauro A.A. |
|
2019 |
97 |
C |
p. 145-152 |
artikel |
13 |
A provenance-based heuristic for preserving results confidentiality in cloud-based scientific workflows
|
Guerine, Marcos |
|
2019 |
97 |
C |
p. 697-713 |
artikel |
14 |
A secure IoT cloud storage system with fine-grained access control and decryption key exposure resistance
|
Xu, Shengmin |
|
2019 |
97 |
C |
p. 284-294 |
artikel |
15 |
Bicycle traffic and its interaction with motorized traffic in an agent-based transport simulation framework
|
Ziemke, Dominik |
|
2019 |
97 |
C |
p. 30-40 |
artikel |
16 |
Block withholding game among bitcoin mining pools
|
Toroghi Haghighat, Alireza |
|
2019 |
97 |
C |
p. 482-491 |
artikel |
17 |
Business process outsourcing to cloud containers: How to find the optimal deployment?
|
Boukadi, Khouloud |
|
2019 |
97 |
C |
p. 397-408 |
artikel |
18 |
Calculating the trust of providers through the construction weighted Sec-SLA
|
Silva, Ademir |
|
2019 |
97 |
C |
p. 873-886 |
artikel |
19 |
CL-ADSP: Cross-Layer Adaptive Data Scheduling Policy in Mobile Ad-hoc Networks
|
Sharma, Varun Kumar |
|
2019 |
97 |
C |
p. 530-563 |
artikel |
20 |
Cloud service recommendation based on unstructured textual information
|
Jiang, Yuanchun |
|
2019 |
97 |
C |
p. 387-396 |
artikel |
21 |
Coflow scheduling algorithm based density peaks clustering
|
Li, Chenghao |
|
2019 |
97 |
C |
p. 805-813 |
artikel |
22 |
Container-based fog computing architecture and energy-balancing scheduling algorithm for energy IoT
|
Luo, Juan |
|
2019 |
97 |
C |
p. 50-60 |
artikel |
23 |
Data-driven main color map feature learning, design and simulation for smart ethnic cloth
|
Hu, Tao |
|
2019 |
97 |
C |
p. 153-164 |
artikel |
24 |
DDoS detection and defense mechanism based on cognitive-inspired computing in SDN
|
Cui, Jie |
|
2019 |
97 |
C |
p. 275-283 |
artikel |
25 |
Decentralized attribute-based conjunctive keyword search scheme with online/offline encryption and outsource decryption for cloud computing
|
Xu, Qian |
|
2019 |
97 |
C |
p. 306-326 |
artikel |
26 |
Deep reinforcement learning with its application for lung cancer detection in medical Internet of Things
|
Liu, Zhuo |
|
2019 |
97 |
C |
p. 1-9 |
artikel |
27 |
Deterrence and prevention-based model to mitigate information security insider threats in organisations
|
Safa, Nader Sohrabi |
|
2019 |
97 |
C |
p. 587-597 |
artikel |
28 |
Edge computing: A survey
|
Khan, Wazir Zada |
|
2019 |
97 |
C |
p. 219-235 |
artikel |
29 |
Editorial Board
|
|
|
2019 |
97 |
C |
p. ii |
artikel |
30 |
EMA-RPL: Energy and mobility aware routing for the Internet of Mobile Things
|
Bouaziz, Maha |
|
2019 |
97 |
C |
p. 247-258 |
artikel |
31 |
Energy production predication via Internet of Thing based machine learning system
|
Rebouças Filho, Pedro P. |
|
2019 |
97 |
C |
p. 180-193 |
artikel |
32 |
Evaluation and efficiency comparison of evolutionary algorithms for service placement optimization in fog architectures
|
Guerrero, Carlos |
|
2019 |
97 |
C |
p. 131-144 |
artikel |
33 |
Extending molecular docking desktop applications with cloud computing support and analysis of results
|
Temelkovski, Damjan |
|
2019 |
97 |
C |
p. 814-824 |
artikel |
34 |
Extensible persistence as a service for containers
|
Mohamed, Mohamed |
|
2019 |
97 |
C |
p. 10-20 |
artikel |
35 |
Extension of MIH for FPMIPv6 (EMIH-FPMIPv6) to support optimized heterogeneous handover
|
Guan, Jianfeng |
|
2019 |
97 |
C |
p. 775-791 |
artikel |
36 |
Fast congestion-free consistent flow forwarding rules update in software defined networking
|
Li, Pan |
|
2019 |
97 |
C |
p. 743-754 |
artikel |
37 |
Harris hawks optimization: Algorithm and applications
|
Heidari, Ali Asghar |
|
2019 |
97 |
C |
p. 849-872 |
artikel |
38 |
IBRIDIA: A hybrid solution for processing big logistics data
|
AlShaer, Mohammed |
|
2019 |
97 |
C |
p. 792-804 |
artikel |
39 |
Integrity verification of Docker containers for a lightweight cloud environment
|
De Benedictis, Marco |
|
2019 |
97 |
C |
p. 236-246 |
artikel |
40 |
LISA: Visible light based initialization and SMS based authentication of constrained IoT devices
|
Perković, Toni |
|
2019 |
97 |
C |
p. 105-118 |
artikel |
41 |
LPCMsim: A Lightweight Phase Change Memory Simulator
|
He, Zaihong |
|
2019 |
97 |
C |
p. 661-673 |
artikel |
42 |
Machine-Learning based analysis and classification of Android malware signatures
|
Martín, Ignacio |
|
2019 |
97 |
C |
p. 295-305 |
artikel |
43 |
Mobile malware attacks: Review, taxonomy & future directions
|
Qamar, Attia |
|
2019 |
97 |
C |
p. 887-909 |
artikel |
44 |
Multi-fidelity deep neural networks for adaptive inference in the internet of multimedia things
|
Leroux, Sam |
|
2019 |
97 |
C |
p. 355-360 |
artikel |
45 |
Multi-objective resource allocation for Edge Cloud based robotic workflow in smart factory
|
Afrin, Mahbuba |
|
2019 |
97 |
C |
p. 119-130 |
artikel |
46 |
Network entity characterization and attack prediction
|
Bartos, Vaclav |
|
2019 |
97 |
C |
p. 674-686 |
artikel |
47 |
Pairwise comparison learning based bearing health quantitative modeling and its application in service life prediction
|
Cui, Jin |
|
2019 |
97 |
C |
p. 578-586 |
artikel |
48 |
Parallelization of large-scale drug–protein binding experiments
|
Michail, Dimitrios |
|
2019 |
97 |
C |
p. 492-502 |
artikel |
49 |
Partially policy-hidden attribute-based broadcast encryption with secure delegation in edge computing
|
Xiong, Hu |
|
2019 |
97 |
C |
p. 453-461 |
artikel |
50 |
Performance evaluation of a Fog-assisted IoT solution for e-Health applications
|
Vilela, Pedro H. |
|
2019 |
97 |
C |
p. 379-386 |
artikel |
51 |
Privacy preservation in blockchain based IoT systems: Integration issues, prospects, challenges, and future research directions
|
Hassan, Muneeb Ul |
|
2019 |
97 |
C |
p. 512-529 |
artikel |
52 |
Security and privacy based access control model for internet of connected vehicles
|
Habib, Muhammad Asif |
|
2019 |
97 |
C |
p. 687-696 |
artikel |
53 |
Security modeling and efficient computation offloading for service workflow in mobile edge computing
|
Huang, Binbin |
|
2019 |
97 |
C |
p. 755-774 |
artikel |
54 |
Smart devices in the social loops: Criteria and algorithms for the creation of the social links
|
Atzori, Luigi |
|
2019 |
97 |
C |
p. 327-339 |
artikel |
55 |
Smart fog based workflow for traffic control networks
|
Wu, Qiang |
|
2019 |
97 |
C |
p. 825-835 |
artikel |
56 |
Socially-aware congestion control in ad-hoc networks: Current status and the way forward
|
Liaqat, Hannan Bin |
|
2019 |
97 |
C |
p. 634-660 |
artikel |
57 |
Soft-biometrics encoding conditional GAN for synthesis of NIR periocular images
|
Tapia, Juan E. |
|
2019 |
97 |
C |
p. 503-511 |
artikel |
58 |
Software defined deduplicated replica management in scale-out storage systems
|
Murugan, Muthukumar |
|
2019 |
97 |
C |
p. 340-354 |
artikel |
59 |
State and runtime-aware scheduling in elastic stream computing systems
|
Sun, Dawei |
|
2019 |
97 |
C |
p. 194-209 |
artikel |
60 |
STRATFram: A framework for describing and evaluating elasticity strategies for service-based business processes in the cloud
|
Jrad, Aicha Ben |
|
2019 |
97 |
C |
p. 69-89 |
artikel |
61 |
Tac-U: A traffic balancing scheme over licensed and unlicensed bands for Tactile Internet
|
Su, Yuhan |
|
2019 |
97 |
C |
p. 41-49 |
artikel |
62 |
Technology roadmap for building a smart city: An exploring study on methodology
|
Lu, Hsi-Peng |
|
2019 |
97 |
C |
p. 727-742 |
artikel |
63 |
The intelligent obstacle sensing and recognizing method based on D–S evidence theory for UGV
|
Zhao, Yibing |
|
2019 |
97 |
C |
p. 21-29 |
artikel |
64 |
Trust enforcement through self-adapting cloud workflow orchestration
|
El-Kassabi, Hadeel T. |
|
2019 |
97 |
C |
p. 462-481 |
artikel |
65 |
UAV-enabled healthcare architecture: Issues and challenges
|
Ullah, Sana |
|
2019 |
97 |
C |
p. 425-432 |
artikel |
66 |
Wavelet OFDM with Overlap FDE for non-Gaussian channels in precoded NOMA based systems
|
Khan, Arsla |
|
2019 |
97 |
C |
p. 165-179 |
artikel |
67 |
Wi-Fi frequency selection concept for effective coverage in collapsed structures
|
Khan, Muhammad Faizan |
|
2019 |
97 |
C |
p. 409-424 |
artikel |