nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A chaos-based keyed hash function based on fixed point representation
|
Teh, Je Sen |
|
2018 |
22 |
2 |
p. 649-660 |
artikel |
2 |
A comparative study on spiking neural network encoding schema: implemented with cloud computing
|
Almomani, Ammar |
|
2019 |
22 |
2 |
p. 419-433 |
artikel |
3 |
A generic approach for integrity verification of big data
|
Saxena, Rajat |
|
2018 |
22 |
2 |
p. 529-540 |
artikel |
4 |
An energy-efficient task scheduling algorithm for heterogeneous cloud computing systems
|
Panda, Sanjaya K. |
|
2018 |
22 |
2 |
p. 509-527 |
artikel |
5 |
A novel water pressure change optimization technique for solving scheduling problem in cloud computing
|
Nasr, Aida A. |
|
2018 |
22 |
2 |
p. 601-617 |
artikel |
6 |
Approximation guarantees of evolutionary optimization on the minimum crossing spanning tree problem
|
Zhang, Jianping |
|
2018 |
22 |
2 |
p. 409-417 |
artikel |
7 |
A programmable shared-memory system for an array of processing-in-memory devices
|
Lee, Sangkuen |
|
2018 |
22 |
2 |
p. 385-398 |
artikel |
8 |
A real-time and reliable dynamic migration model for concurrent taskflow in a GPU cluster
|
Fang, Yuling |
|
2018 |
22 |
2 |
p. 585-599 |
artikel |
9 |
Async-LCAM: a lock contention aware messenger for Ceph distributed storage system
|
Jeong, Bodon |
|
2018 |
22 |
2 |
p. 373-384 |
artikel |
10 |
Crowdcloud: a crowdsourced system for cloud infrastructure
|
Hosseini, Mahmood |
|
2018 |
22 |
2 |
p. 455-470 |
artikel |
11 |
Design and implementation of skiplist-based key-value store on non-volatile memory
|
Chen, Qichen |
|
2019 |
22 |
2 |
p. 361-371 |
artikel |
12 |
Energy-aware RAID scheduling methods in distributed storage applications
|
Pirahandeh, Mehdi |
|
2018 |
22 |
2 |
p. 445-454 |
artikel |
13 |
Failure prediction using machine learning in a virtualised HPC system and application
|
Mohammed, Bashir |
|
2019 |
22 |
2 |
p. 471-485 |
artikel |
14 |
Flow data processing paradigm and its application in smart city using a cluster analysis approach
|
Zou, Xiang |
|
2018 |
22 |
2 |
p. 435-444 |
artikel |
15 |
General correlation coefficient based agglomerative clustering
|
Pandove, Divya |
|
2018 |
22 |
2 |
p. 553-583 |
artikel |
16 |
Network-aware energy saving multi-objective optimization in virtualized data centers
|
Al-Tarazi, Motassem |
|
2018 |
22 |
2 |
p. 635-647 |
artikel |
17 |
Optimizing communication performance in scale-out storage system
|
Song, Uiseok |
|
2018 |
22 |
2 |
p. 335-346 |
artikel |
18 |
Secure and efficient proxy re-encryption scheme based on key-homomorphic constrained PRFs in cloud computing
|
Luo, Wei |
|
2018 |
22 |
2 |
p. 541-551 |
artikel |
19 |
Spark-IDPP: high-throughput and scalable prediction of intrinsically disordered protein regions with Spark clusters on the Cloud
|
Małysiak-Mrozek, Bożena |
|
2018 |
22 |
2 |
p. 487-508 |
artikel |
20 |
Strategies for data stream mining method applied in anomaly detection
|
Sun, Ruxia |
|
2018 |
22 |
2 |
p. 399-408 |
artikel |
21 |
TASM: technocrat ARIMA and SVR model for workload prediction of web applications in cloud
|
Singh, Parminder |
|
2018 |
22 |
2 |
p. 619-633 |
artikel |
22 |
Understanding the performance of storage class memory file systems in the NUMA architecture
|
Kim, Jangwoong |
|
2018 |
22 |
2 |
p. 347-360 |
artikel |