nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A configuration scheme for connectivity-aware mobile P2P networks for efficient mobile cloud-based video streaming services
|
Lee, Hyung Soo |
|
2013 |
16 |
4 |
p. 745-756 |
artikel |
2 |
A framework for SLA management in cloud computing for informed decision making
|
Hammadi, Adil |
|
2012 |
16 |
4 |
p. 961-977 |
artikel |
3 |
A fuzzy-based reliability system for knowledge sharing between robots in P2P JXTA-overlay platform
|
Spaho, Evjola |
|
2012 |
16 |
4 |
p. 933-945 |
artikel |
4 |
A MapReduce task scheduling algorithm for deadline constraints
|
Tang, Zhuo |
|
2012 |
16 |
4 |
p. 651-662 |
artikel |
5 |
An Adaptive Hybrid OLAP Architecture with optimized memory access patterns
|
Riha, Lubomir |
|
2012 |
16 |
4 |
p. 663-677 |
artikel |
6 |
A novel construction of SDVS with secure disavowability
|
Yang, Bo |
|
2013 |
16 |
4 |
p. 807-815 |
artikel |
7 |
Asymmetrical topology and entropy-based heterogeneous link for many-core massive data communication
|
Liu, Yu-hang |
|
2013 |
16 |
4 |
p. 679-691 |
artikel |
8 |
A systematic method to design strong designated verifier signature without random oracles
|
Tian, Haibo |
|
2013 |
16 |
4 |
p. 817-827 |
artikel |
9 |
Distributed-based massive processing of activity logs for efficient user modeling in a Virtual Campus
|
Caballé, Santi |
|
2013 |
16 |
4 |
p. 829-844 |
artikel |
10 |
Efficient leakage-resilient public key encryption from DDH assumption
|
Li, Sujuan |
|
2013 |
16 |
4 |
p. 797-806 |
artikel |
11 |
Efficient push-based packet scheduling for Peer-to-Peer live streaming
|
Liu, Ning |
|
2013 |
16 |
4 |
p. 767-777 |
artikel |
12 |
Enabling richer statistical MANET simulations through cluster computing
|
Arora, Deepali |
|
2013 |
16 |
4 |
p. 989-1003 |
artikel |
13 |
End-to-end security scheme for Machine Type Communication based on Generic Authentication Architecture
|
Zhang, Wujun |
|
2013 |
16 |
4 |
p. 861-871 |
artikel |
14 |
Erratum to: Mobile image sensors for object detection using color segmentation
|
Kim, Sang-Hoon |
|
2013 |
16 |
4 |
p. 765 |
artikel |
15 |
Hierarchical semantic information modeling and ontology for bird ecology
|
Gorrepati, Rajani Reddy |
|
2013 |
16 |
4 |
p. 779-786 |
artikel |
16 |
Interconnecting Federated Clouds by Using Publish-Subscribe Service
|
Esposito, Christian |
|
2013 |
16 |
4 |
p. 887-903 |
artikel |
17 |
Mobile image sensors for object detection using color segmentation
|
Kim, Sang-Hoon |
|
2013 |
16 |
4 |
p. 757-763 |
artikel |
18 |
Ontology as a Service (OaaS): extracting and replacing sub-ontologies on the cloud
|
Flahive, Andrew |
|
2012 |
16 |
4 |
p. 947-960 |
artikel |
19 |
ORTHRUS: a lightweighted block-level cloud storage system
|
Wan, Jian |
|
2012 |
16 |
4 |
p. 625-638 |
artikel |
20 |
Outsourcing computation of modular exponentiations in cloud computing
|
Ma, Xu |
|
2013 |
16 |
4 |
p. 787-796 |
artikel |
21 |
PPAS: privacy protection authentication scheme for VANET
|
Zhu, Hui |
|
2013 |
16 |
4 |
p. 873-886 |
artikel |
22 |
Proxy based seamless connection management method in mobile cloud computing
|
Lee, DaeWon |
|
2013 |
16 |
4 |
p. 733-744 |
artikel |
23 |
Quorum-based synchronization protocols for multimedia replicas
|
Ohkawara, Tadateru |
|
2013 |
16 |
4 |
p. 979-988 |
artikel |
24 |
Selecting skyline services for QoS-aware composition by upgrading MapReduce paradigm
|
Wu, Jian |
|
2013 |
16 |
4 |
p. 693-706 |
artikel |
25 |
Simultaneous authentication and secrecy in identity-based data upload to cloud
|
Qin, Bo |
|
2013 |
16 |
4 |
p. 845-859 |
artikel |
26 |
SNUAGE: an efficient platform-as-a-service security framework for the cloud
|
Itani, Wassim |
|
2012 |
16 |
4 |
p. 707-724 |
artikel |
27 |
Software Service Signature (S3) for authentication in cloud computing
|
Xu, Li |
|
2013 |
16 |
4 |
p. 905-914 |
artikel |
28 |
Towards a conceptualization of ETL and physical storage of semantic data warehouses as a service
|
Berkani, Nabila |
|
2013 |
16 |
4 |
p. 915-931 |
artikel |
29 |
Trust management on user behavioral patterns for a mobile cloud computing
|
Kim, Mucheol |
|
2013 |
16 |
4 |
p. 725-731 |
artikel |
30 |
VRAA: virtualized resource auction and allocation based on incentive and penalty
|
Jiang, Congfeng |
|
2012 |
16 |
4 |
p. 639-650 |
artikel |