nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A continuous playing scheme on RESTful web service
|
Kim, Kuinam J. |
|
2016 |
19 |
1 |
p. 379-387 |
artikel |
2 |
A decentralized fault tolerance model based on level of performance for grid environment
|
Rebbah, Mohammed |
|
2015 |
19 |
1 |
p. 13-27 |
artikel |
3 |
A feature selection approach to find optimal feature subsets for the network intrusion detection system
|
Kang, Seung-Ho |
|
2016 |
19 |
1 |
p. 325-333 |
artikel |
4 |
A forensic acquisition and analysis system for IaaS
|
Alqahtany, Saad |
|
2015 |
19 |
1 |
p. 439-453 |
artikel |
5 |
A grid based simulation environment for agent-based models with vast parameter spaces
|
Yang, Chao |
|
2015 |
19 |
1 |
p. 183-195 |
artikel |
6 |
A knee-based multi-objective evolutionary algorithm: an extension to network system optimization design problem
|
Sudeng, Sufian |
|
2015 |
19 |
1 |
p. 411-425 |
artikel |
7 |
A methodology for developing clinical collaborative communication systems
|
Park, Hwa Gyoo |
|
2015 |
19 |
1 |
p. 223-235 |
artikel |
8 |
An efficient approach to collaborative simulation of variable structure systems on multi-core machines
|
Yang, Chen |
|
2015 |
19 |
1 |
p. 29-46 |
artikel |
9 |
An energy-efficient load balancing scheme to extend lifetime in wireless sensor networks
|
Kim, Hye-Young |
|
2016 |
19 |
1 |
p. 279-283 |
artikel |
10 |
A novel evaluation framework for improving trust level of Infrastructure as a Service
|
Alabool, Hamzeh Mohammad |
|
2015 |
19 |
1 |
p. 389-410 |
artikel |
11 |
Automatic facial emotion recognition using weber local descriptor for e-Healthcare system
|
Alhussein, Musaed |
|
2016 |
19 |
1 |
p. 99-108 |
artikel |
12 |
Beacon-based active media control interface in indoor ubiquitous computing environment
|
Sung, Yunsick |
|
2016 |
19 |
1 |
p. 547-556 |
artikel |
13 |
Belief propagation decoding assisted on-the-fly Gaussian elimination for short LT codes
|
Cheong, Hoyoung |
|
2016 |
19 |
1 |
p. 309-314 |
artikel |
14 |
Consistency maintenance of Do and Undo/Redo operations in real-time collaborative bitmap editing systems
|
Gao, Liping |
|
2015 |
19 |
1 |
p. 255-267 |
artikel |
15 |
Continuous and transparent multimodal authentication: reviewing the state of the art
|
Al Abdulwahid, Abdulwahid |
|
2015 |
19 |
1 |
p. 455-474 |
artikel |
16 |
Data security rules/regulations based classification of file data using TsF-kNN algorithm
|
Zardari, Munwar Ali |
|
2016 |
19 |
1 |
p. 349-368 |
artikel |
17 |
Demographic variables and risk factors in computer-crime: an empirical assessment
|
Choi, Kyung-shick |
|
2016 |
19 |
1 |
p. 369-377 |
artikel |
18 |
Detecting for high speed flying object using image processing on target place
|
Cho, Changhee |
|
2016 |
19 |
1 |
p. 285-292 |
artikel |
19 |
Distributed denial-of-service attacks against HTTP/2 services
|
Adi, Erwin |
|
2016 |
19 |
1 |
p. 79-86 |
artikel |
20 |
Dynamic load balancing on heterogeneous clusters for parallel ant colony optimization
|
Llanes, Antonio |
|
2016 |
19 |
1 |
p. 1-11 |
artikel |
21 |
Dynamic multimedia transmission control virtual machine using weighted Round-Robin
|
Park, Sanghyun |
|
2016 |
19 |
1 |
p. 293-300 |
artikel |
22 |
Effects of patent indicators on national technological level: concentrated on mobile communication, network, and convergence technologies
|
Oh, Jong-Hak |
|
2016 |
19 |
1 |
p. 519-528 |
artikel |
23 |
Efficient chameleon hashing-based privacy-preserving auditing in cloud storage
|
Zhang, Jianhong |
|
2015 |
19 |
1 |
p. 47-56 |
artikel |
24 |
Efficient top-k similarity document search utilizing distributed file systems and cosine similarity
|
Alewiwi, Mahmoud |
|
2015 |
19 |
1 |
p. 109-126 |
artikel |
25 |
Elastic resource provisioning for scientific workflow scheduling in cloud under budget and deadline constraints
|
Shi, Jiyuan |
|
2016 |
19 |
1 |
p. 167-182 |
artikel |
26 |
Face recognition from a single image per person using deep architecture neural networks
|
Zhuo, Tian |
|
2015 |
19 |
1 |
p. 73-77 |
artikel |
27 |
Factors affecting the continuous use of cloud service: focused on security risks
|
Park, Seong-Taek |
|
2015 |
19 |
1 |
p. 485-495 |
artikel |
28 |
Fast implementation of block ciphers and PRNGs in Maxwell GPU architecture
|
Lee, Wai-Kong |
|
2016 |
19 |
1 |
p. 335-347 |
artikel |
29 |
Frequent pagesets from web log by enhanced weighted association rule mining
|
Malarvizhi, S. P. |
|
2015 |
19 |
1 |
p. 269-277 |
artikel |
30 |
Geographical information system parallelization for spatial big data processing: a review
|
Zhao, Lingjun |
|
2015 |
19 |
1 |
p. 139-152 |
artikel |
31 |
High-dimentional data authentication protocol based on hash chain for Hadoop systems
|
Jeong, Yoon-Su |
|
2015 |
19 |
1 |
p. 475-484 |
artikel |
32 |
IPad: ID-based public auditing for the outsourced data in the standard model
|
Zhang, Jianhong |
|
2015 |
19 |
1 |
p. 127-138 |
artikel |
33 |
Meta-operation conflict resolution for human–human interaction in collaborative feature-based CAD systems
|
Cheng, Yuan |
|
2016 |
19 |
1 |
p. 237-253 |
artikel |
34 |
Monte Carlo simulations of settlement dynamics in GPUs
|
Millán, Emmanuel N. |
|
2015 |
19 |
1 |
p. 557-566 |
artikel |
35 |
Multiple-domain marine data utilization structure for e-navigation
|
Park, Daewon |
|
2016 |
19 |
1 |
p. 301-308 |
artikel |
36 |
PEDAL: a dynamic analysis tool for efficient concurrency bug reproduction in big data environment
|
Hu, Yan |
|
2016 |
19 |
1 |
p. 153-166 |
artikel |
37 |
PHR open platform based smart health service using distributed object group framework
|
Chung, Kyungyong |
|
2016 |
19 |
1 |
p. 505-517 |
artikel |
38 |
Proposing and verifying a security protocol for hash function-based IoT communication system
|
Han, Kun-Hee |
|
2016 |
19 |
1 |
p. 497-504 |
artikel |
39 |
Robust audio fingerprinting using peak-pair-based hash of non-repeating foreground audio in a real environment
|
Kim, Hyoung-Gook |
|
2015 |
19 |
1 |
p. 315-323 |
artikel |
40 |
Scrutiny of unruly and abuse in wireless networks to mitigate physical layer threats using discriminate based misbehavior prevention
|
Ratna, S. Raja |
|
2016 |
19 |
1 |
p. 87-97 |
artikel |
41 |
Similarity (range and kNN) queries processing on an Intel Xeon Phi coprocessor
|
Toledo, Carlos M. |
|
2015 |
19 |
1 |
p. 57-71 |
artikel |
42 |
SIMPLE: a simplifying-ensembling framework for parallel community detection from large networks
|
Wu, Zhiang |
|
2015 |
19 |
1 |
p. 211-221 |
artikel |
43 |
Task scheduling for MapReduce in heterogeneous networks
|
Wang, Jia |
|
2015 |
19 |
1 |
p. 197-210 |
artikel |
44 |
Techniques and countermeasures of website/wireless traffic analysis and fingerprinting
|
Ghaleb, Taher Ahmed |
|
2015 |
19 |
1 |
p. 427-438 |
artikel |
45 |
The analysis and application of an educational programming language (RUR-PLE) for a pre-introductory computer science course
|
Yoon, IlKyu |
|
2016 |
19 |
1 |
p. 529-546 |
artikel |