nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A canonical polyadic deep convolutional computation model for big data feature learning in Internet of Things
|
Gao, Jing |
|
|
99 |
C |
p. 508-516 |
artikel |
2 |
Adaptive signal representation and multi-scale decomposition for panchromatic and multispectral image fusion
|
Imani, Maryam |
|
|
99 |
C |
p. 410-424 |
artikel |
3 |
A Finite-State-Machine model driven service composition architecture for internet of things rapid prototyping
|
Xiao, Ruowei |
|
|
99 |
C |
p. 473-488 |
artikel |
4 |
A highly efficient algorithm towards optimal data storage and regeneration cost in multiple clouds
|
Zhang, Junhua |
|
|
99 |
C |
p. 459-472 |
artikel |
5 |
Algorithm selection and combining multiple learners for residential energy prediction
|
Güngör, Onat |
|
|
99 |
C |
p. 391-400 |
artikel |
6 |
Analysis and improvements of the pseudorandom number generation in passive UHF-RFID tags
|
Blanco, Jesús |
|
|
99 |
C |
p. 115-123 |
artikel |
7 |
A review of edge computing reference architectures and a new global edge proposal
|
Sittón-Candanedo, Inés |
|
|
99 |
C |
p. 278-294 |
artikel |
8 |
A smart agriculture IoT system based on deep reinforcement learning
|
Bu, Fanyu |
|
|
99 |
C |
p. 500-507 |
artikel |
9 |
A study on container virtualization for guarantee quality of service in Cloud-of-Things
|
Celesti, Antonio |
|
|
99 |
C |
p. 356-364 |
artikel |
10 |
Boosting palmprint identification with gender information using DeepNet
|
Chai, Tingting |
|
|
99 |
C |
p. 41-53 |
artikel |
11 |
Cloud based autonomous monitoring and administration of heterogeneous distributed systems using mobile agents
|
Salkenov, Aldiyar |
|
|
99 |
C |
p. 527-557 |
artikel |
12 |
Context-aware composite SaaS using feature model
|
Mousa, Afaf |
|
|
99 |
C |
p. 376-390 |
artikel |
13 |
Context-aware computing for mobile crowd sensing: A survey
|
Vahdat-Nejad, Hamed |
|
|
99 |
C |
p. 321-332 |
artikel |
14 |
Deep face recognition using imperfect facial data
|
Elmahmudi, Ali |
|
|
99 |
C |
p. 213-225 |
artikel |
15 |
Deep learning based mobile data offloading in mobile edge computing systems
|
Zhao, Xianlong |
|
|
99 |
C |
p. 346-355 |
artikel |
16 |
Defining and guaranteeing dynamic service levels in clouds
|
Uriarte, Rafael Brundo |
|
|
99 |
C |
p. 27-40 |
artikel |
17 |
Design and implementation of a secure and flexible access-right delegation for resource constrained environments
|
Rabehaja, Tahiry |
|
|
99 |
C |
p. 593-608 |
artikel |
18 |
DStore: A distributed system for outsourced data storage and retrieval
|
Xue, Jingting |
|
|
99 |
C |
p. 106-114 |
artikel |
19 |
Editorial Board
|
|
|
|
99 |
C |
p. ii |
artikel |
20 |
Efficient and privacy preserving access control scheme for fog-enabled IoT
|
Fan, Kai |
|
|
99 |
C |
p. 134-142 |
artikel |
21 |
Extractive summarization of documents with images based on multi-modal RNN
|
Chen, Jingqiang |
|
|
99 |
C |
p. 186-196 |
artikel |
22 |
Hardware co simulation of LTE physical layer for mobile network applications
|
Venkataramanan, V. |
|
|
99 |
C |
p. 124-133 |
artikel |
23 |
Hiding medical information in brain MR images without affecting accuracy of classifying pathological brain
|
Devi, Swagatika |
|
|
99 |
C |
p. 235-246 |
artikel |
24 |
Human reliability study on the door operation from the view of Deep Machine Learning
|
Zhan, Yan |
|
|
99 |
C |
p. 143-153 |
artikel |
25 |
Hybrid resampling and multi-feature fusion for automatic recognition of cavity imaging sign in lung CT
|
Han, Guanghui |
|
|
99 |
C |
p. 558-570 |
artikel |
26 |
iCAFE: Intelligent Congestion Avoidance and Fast Emergency services
|
Siddiqua, Ayesha |
|
|
99 |
C |
p. 365-375 |
artikel |
27 |
Implementing secure applications in smart city clouds using microservices
|
Krämer, Michel |
|
|
99 |
C |
p. 308-320 |
artikel |
28 |
IoTSim-Stream: Modelling stream graph application in cloud simulation
|
Barika, Mutaz |
|
|
99 |
C |
p. 86-105 |
artikel |
29 |
I-TASSER gateway: A protein structure and function prediction server powered by XSEDE
|
Zheng, Wei |
|
|
99 |
C |
p. 73-85 |
artikel |
30 |
Keeping track of user steering actions in dynamic workflows
|
Souza, Renan |
|
|
99 |
C |
p. 624-643 |
artikel |
31 |
Malicious documents detection for business process management based on multi-layer abstract model
|
Yu, Min |
|
|
99 |
C |
p. 517-526 |
artikel |
32 |
Model-driven cloud resource management with OCCIware
|
Zalila, Faiez |
|
|
99 |
C |
p. 260-277 |
artikel |
33 |
Modeling trust and reputation systems in hostile environments
|
Ghasempouri, Seyed Asgary |
|
|
99 |
C |
p. 571-592 |
artikel |
34 |
More efficient, provably-secure direct anonymous attestation from lattices
|
El Kassem, Nada |
|
|
99 |
C |
p. 425-458 |
artikel |
35 |
New Landscapes of the Data Stream Processing in the era of Fog Computing
|
Cardellini, Valeria |
|
|
99 |
C |
p. 646-650 |
artikel |
36 |
Overload control for virtual network functions under CPU contention
|
Cotroneo, Domenico |
|
|
99 |
C |
p. 164-176 |
artikel |
37 |
Parallel K-Tree: A multicore, multinode solution to extreme clustering
|
Woodley, Alan |
|
|
99 |
C |
p. 333-345 |
artikel |
38 |
Polynomial-based modifiable blockchain structure for removing fraud transactions
|
Cheng, Lichen |
|
|
99 |
C |
p. 154-163 |
artikel |
39 |
QoS-oriented multimedia transmission using multipath routing
|
Hossain, M. Shamim |
|
|
99 |
C |
p. 226-234 |
artikel |
40 |
Secure and flexible economic data sharing protocol based on ID-based dynamic exclusive broadcast encryption in economic system
|
Wang, Xiaofen |
|
|
99 |
C |
p. 177-185 |
artikel |
41 |
Similarity Aware Safety Multimedia Data Transmission Mechanism for Internet of Vehicles
|
Wu, Dapeng |
|
|
99 |
C |
p. 609-623 |
artikel |
42 |
Software-defined object storage in multi-tenant environments
|
Gracia-Tinedo, Raúl |
|
|
99 |
C |
p. 54-72 |
artikel |
43 |
Special Issue: Big Data for context-aware applications and intelligent environments
|
Preuveneers, Davy |
|
|
99 |
C |
p. 644-645 |
artikel |
44 |
SWITCH workbench: A novel approach for the development and deployment of time-critical microservice-based cloud-native applications
|
Štefanič, Polona |
|
|
99 |
C |
p. 197-212 |
artikel |
45 |
The 3D modular chaotic map to digital color image encryption
|
Broumandnia, Ali |
|
|
99 |
C |
p. 489-499 |
artikel |
46 |
The role of big data analytics in industrial Internet of Things
|
ur Rehman, Muhammad Habib |
|
|
99 |
C |
p. 247-259 |
artikel |
47 |
THOR: A framework to build an advanced metering infrastructure resilient to DAP failures in smart grids
|
Ribeiro, Igor C.G. |
|
|
99 |
C |
p. 11-26 |
artikel |
48 |
TIDE: Time-relevant deep reinforcement learning for routing optimization
|
Sun, Penghao |
|
|
99 |
C |
p. 401-409 |
artikel |
49 |
Time-slotted software-defined Industrial Ethernet for real-time Quality of Service in Industry 4.0
|
Zeng, Peng |
|
|
99 |
C |
p. 1-10 |
artikel |
50 |
Vector and line quantization for billion-scale similarity search on GPUs
|
Chen, Wei |
|
|
99 |
C |
p. 295-307 |
artikel |