nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A comprehensive study of simulation frameworks and research directions in fog computing
|
Gill, Monika |
|
|
40 |
C |
p. |
artikel |
2 |
A comprehensive survey on the Multiple Traveling Salesman Problem: Applications, approaches and taxonomy
|
Cheikhrouhou, Omar |
|
|
40 |
C |
p. |
artikel |
3 |
Adaptive user interfaces and universal usability through plasticity of user interface design
|
Miraz, Mahdi H. |
|
|
40 |
C |
p. |
artikel |
4 |
Affective recommender systems in the educational field. A systematic literature review
|
Salazar, Camilo |
|
|
40 |
C |
p. |
artikel |
5 |
Aiming at methods’ wider adoption: Applicability determinants and metrics
|
Leszczyna, Rafał |
|
|
40 |
C |
p. |
artikel |
6 |
Anonymity on blockchain based e-cash protocols—A survey
|
Andola, Nitish |
|
|
40 |
C |
p. |
artikel |
7 |
A survey of low-latency transmission strategies in software defined networking
|
Yan, Binghao |
|
|
40 |
C |
p. |
artikel |
8 |
A survey of multidisciplinary domains contributing to affective computing
|
Arya, Resham |
|
|
40 |
C |
p. |
artikel |
9 |
A survey on deep learning and its applications
|
Dong, Shi |
|
|
40 |
C |
p. |
artikel |
10 |
A survey on semi-structured web data manipulations by non-expert users
|
Tekli, Gilbert |
|
|
40 |
C |
p. |
artikel |
11 |
A systematic literature review on prototyping with Arduino: Applications, challenges, advantages, and limitations
|
Kondaveeti, Hari Kishan |
|
|
40 |
C |
p. |
artikel |
12 |
A systematic review on Deep Learning approaches for IoT security
|
Aversano, Lerina |
|
|
40 |
C |
p. |
artikel |
13 |
Clustering protocols in wireless sensor network: A survey, classification, issues, and future directions
|
Rawat, Piyush |
|
|
40 |
C |
p. |
artikel |
14 |
Comparative analysis of Android and iOS from security viewpoint
|
Garg, Shivi |
|
|
40 |
C |
p. |
artikel |
15 |
Conceptual and empirical comparison of dimensionality reduction algorithms (PCA, KPCA, LDA, MDS, SVD, LLE, ISOMAP, LE, ICA, t-SNE)
|
Anowar, Farzana |
|
|
40 |
C |
p. |
artikel |
16 |
Content and link-structure perspective of ranking webpages: A review
|
Ali, Fayyaz |
|
|
40 |
C |
p. |
artikel |
17 |
Cyber security training for critical infrastructure protection: A literature review
|
Chowdhury, Nabin |
|
|
40 |
C |
p. |
artikel |
18 |
Eco-assessment software: A quantitative review involving papers and patents
|
Spreafico, Christian |
|
|
40 |
C |
p. |
artikel |
19 |
Editorial Board
|
|
|
|
40 |
C |
p. |
artikel |
20 |
Energy, performance and cost efficient cloud datacentres: A survey
|
Khan, Ayaz Ali |
|
|
40 |
C |
p. |
artikel |
21 |
Financial fraud detection applying data mining techniques: A comprehensive review from 2009 to 2019
|
Al-Hashedi, Khaled Gubran |
|
|
40 |
C |
p. |
artikel |
22 |
In praise of homomorphisms
|
Hell, Pavol |
|
|
40 |
C |
p. |
artikel |
23 |
Machine learning algorithms for social media analysis: A survey
|
T.K., Balaji |
|
|
40 |
C |
p. |
artikel |
24 |
Machine Learning and Deep Learning in smart manufacturing: The Smart Grid paradigm
|
Kotsiopoulos, Thanasis |
|
|
40 |
C |
p. |
artikel |
25 |
Malicious application detection in android — A systematic literature review
|
Sharma, Tejpal |
|
|
40 |
C |
p. |
artikel |
26 |
Neurological and physiological measures to evaluate the usability and user-experience (UX) of information systems: A systematic literature review
|
Zaki, Tarannum |
|
|
40 |
C |
p. |
artikel |
27 |
New trends in influence maximization models
|
Azaouzi, Mehdi |
|
|
40 |
C |
p. |
artikel |
28 |
Role of machine learning in medical research: A survey
|
Garg, Arunim |
|
|
40 |
C |
p. |
artikel |
29 |
Strategies based on various aspects of clustering in wireless sensor networks using classical, optimization and machine learning techniques: Review, taxonomy, research findings, challenges and future directions
|
Amutha, J. |
|
|
40 |
C |
p. |
artikel |
30 |
Summarization of legal documents: Where are we now and the way forward
|
Jain, Deepali |
|
|
40 |
C |
p. |
artikel |
31 |
Survey on 3D face reconstruction from uncalibrated images
|
Morales, Araceli |
|
|
40 |
C |
p. |
artikel |
32 |
Taxonomy, state-of-the-art, challenges and applications of visual understanding: A review
|
Khanday, Nadeem Yousuf |
|
|
40 |
C |
p. |
artikel |
33 |
The importance of selecting clustering parameters in VANETs: A survey
|
Kaur, Ravneet |
|
|
40 |
C |
p. |
artikel |
34 |
Towards Resilient Method: An exhaustive survey of fault tolerance methods in the cloud computing environment
|
Shahid, Muhammad Asim |
|
|
40 |
C |
p. |
artikel |
35 |
Vulnerability retrospection of security solutions for software-defined Cyber–Physical System against DDoS and IoT-DDoS attacks
|
Snehi, Manish |
|
|
40 |
C |
p. |
artikel |