Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             210 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A bio-inspired leader election protocol for cognitive radio networks Murmu, Mahendra Kumar
2018
22 supplement-1 p. 1665-1678
artikel
2 Accurate detection of user interest data in cloud computing environment Yu, Qiang
2017
22 supplement-1 p. 1169-1178
artikel
3 A cloud-based virtual caregiver for elderly people in a cyber physical IoT system Rahman, Md. Abdur
2018
22 supplement-1 p. 2317-2330
artikel
4 A cloud system model employing random space vector pulse width modulation for noise reduction in VSI fed induction motor Mohan Das, R.
2018
22 supplement-1 p. 347-360
artikel
5 A distributed IDS architecture model for Smart Home systems Gajewski, Mariusz
2017
22 supplement-1 p. 1739-1749
artikel
6 A distributed incremental information acquisition model for large-scale text data Sun, Shengtao
2017
22 supplement-1 p. 2383-2394
artikel
7 A FCM cluster: cloud networking model for intelligent transportation in the city of Macau Cai, Zhiming
2017
22 supplement-1 p. 1219-1228
artikel
8 A hierarchical clustering based method to evaluate reuse of rare earth tailings under cloud computing environment Ren, Yongjun
2018
22 supplement-1 p. 1805-1814
artikel
9 A hybrid technique for gender classification with SLBP and HOG features Annalakshmi, M.
2018
22 supplement-1 p. 11-20
artikel
10 A localization and tracking scheme for target gangs based on big data of Wi-Fi locations Zhao, Fan
2018
22 supplement-1 p. 1679-1690
artikel
11 A mobile assisted coverage hole patching scheme based on particle swarm optimization for WSNs Wang, Jin
2017
22 supplement-1 p. 1787-1795
artikel
12 A mutual refinement technique for big data retrieval using hash tag graph Prasanth, T.
2017
22 supplement-1 p. 2027-2037
artikel
13 Analysis on key dimension’s measurement error in high speed computing Zhang, Jin
2017
22 supplement-1 p. 769-779
artikel
14 Analyzing and visualizing comprehensive and personalized online product reviews Kim, Jooyoung
2018
22 supplement-1 p. 2115-2128
artikel
15 An augmented approach for pseudo-free groups in smart cyber-physical system Kumar, M. V. Ranjith
2018
22 supplement-1 p. 673-692
artikel
16 An automated and intelligent Parkinson disease monitoring system using wearable computing and cloud technology Almogren, Ahmad
2018
22 supplement-1 p. 2309-2316
artikel
17 An effective pose invariant face recognition system with the aid of ABC optimized ANFIS Anantha Padmanabhan, S.
2018
22 supplement-1 p. 177-187
artikel
18 An effective task scheduling algorithm based on dynamic energy management and efficient resource utilization in green cloud computing environment Lu, Yong
2017
22 supplement-1 p. 513-520
artikel
19 An efficient categorization of liver cirrhosis using convolution neural networks for health informatics Suganya, R.
2017
22 supplement-1 p. 47-56
artikel
20 An efficient DDoS detection based on SU-Genetic feature selection Wang, Chundong
2018
22 supplement-1 p. 2505-2515
artikel
21 An efficient personalized trust based hybrid recommendation (TBHR) strategy for e-learning system in cloud computing Bhaskaran, S.
2017
22 supplement-1 p. 1137-1149
artikel
22 An efficient scheduling multimedia transcoding method for DASH streaming in cloud environment Ma, Linh Van
2017
22 supplement-1 p. 1043-1053
artikel
23 An empirical study on the influential factors affecting continuous usage of mobile cloud service Park, Seong-Taek
2017
22 supplement-1 p. 1873-1887
artikel
24 A new computing environment for collective privacy protection from constrained healthcare devices to IoT cloud services Elmisery, Ahmed M.
2017
22 supplement-1 p. 1611-1638
artikel
25 A new DOA estimation algorithm based on compressed sensing Yong, Zhang
2018
22 supplement-1 p. 895-903
artikel
26 A new GLoSM embedded virtual machine model for big data services in cloud storage systems Kalai Arasan, K.
2018
22 supplement-1 p. 399-405
artikel
27 A new recommendation algorithm combined with spectral clustering and transfer learning Li, Xiang
2017
22 supplement-1 p. 1151-1167
artikel
28 An improved anonymous authentication scheme for distributed mobile cloud computing services Chaudhry, Shehzad Ashraf
2017
22 supplement-1 p. 1595-1609
artikel
29 An improved model based on genetic algorithm for detecting intrusion in mobile ad hoc network Bharathisindhu, P.
2018
22 supplement-1 p. 265-275
artikel
30 An iterative sampling method for online aggregation Zhang, Zhiqiang
2017
22 supplement-1 p. 2471-2484
artikel
31 Anomaly detection model based on data stream clustering Yin, Chunyong
2017
22 supplement-1 p. 1729-1738
artikel
32 Anonymous and formally verified dual signature based online e-voting protocol Saqib, Malik Najmus
2018
22 supplement-1 p. 1703-1716
artikel
33 An optimized service broker routing policy based on differential evolution algorithm in fog/cloud environment Manasrah, Ahmad M.
2017
22 supplement-1 p. 1639-1653
artikel
34 A novel disk I/O scheduling framework of virtualized storage system Li, Dingding
2018
22 supplement-1 p. 2395-2405
artikel
35 A novel improved deep convolutional neural network model for medical image fusion Xia, Kai-jian
2018
22 supplement-1 p. 1515-1527
artikel
36 A novel scheme for safeguarding confidentiality in public clouds for service users of cloud computing Thillaiarasu, N.
2017
22 supplement-1 p. 1179-1188
artikel
37 A novel SMLR-PSO model to estimate the chlorophyll content in the crops using hyperspectral satellite images Nandibewoor, Archana
2018
22 supplement-1 p. 443-450
artikel
38 Anti load disturbance method for AC servo motor power system Lv, Haoliang
2018
22 supplement-1 p. 2273-2283
artikel
39 A parameter based growing ensemble of self-organizing maps for outlier detection in healthcare Elmougy, Samir
2017
22 supplement-1 p. 2437-2460
artikel
40 A performance comparison of linux containers and virtual machines using Docker and KVM Chae, MinSu
2017
22 supplement-1 p. 1765-1775
artikel
41 Application of computerized numerical modeling in multi-state wet wheel hub heat simulations Liu, Sheng
2018
22 supplement-1 p. 1569-1580
artikel
42 Application of low impact development technology in rainwater drainage system reconstruction project Hu, Pengbo
2017
22 supplement-1 p. 533-543
artikel
43 Apriori semantic processing orienting at the business English parallel corpus characteristics in business contract Xin, Lu
2018
22 supplement-1 p. 2263-2271
artikel
44 A rational data delivery framework for disaster-inspired internet of nano-things (IoNT) in practice Al-Turjman, Fadi
2017
22 supplement-1 p. 1751-1763
artikel
45 A real-time operating system supporting distributed shared memory for embedded control systems Tamura, Yuji
2017
22 supplement-1 p. 989-998
artikel
46 A silhouette based novel algorithm for object detection and tracking using information fusion of video frames Jiang, Xiaoping
2018
22 supplement-1 p. 391-398
artikel
47 A simulation analysis method based on PSO-RBF model and its application Fei, Xi
2018
22 supplement-1 p. 2255-2261
artikel
48 Assembly sequence planning method based on particle swarm algorithm Wu, Yu-jia
2017
22 supplement-1 p. 835-846
artikel
49 Assessment of recommendation trust for access control in open networks Zhao, Bin
2018
22 supplement-1 p. 565-571
artikel
50 Association rules and deep learning for cryptographic algorithm in privacy preserving data mining Rajesh, N.
2018
22 supplement-1 p. 119-131
artikel
51 A study on secure user authentication and authorization in OAuth protocol Chae, Cheol-Joo
2017
22 supplement-1 p. 1991-1999
artikel
52 A survey of deep learning-based network anomaly detection Kwon, Donghwoon
2017
22 supplement-1 p. 949-961
artikel
53 A unified framework of trust prediction based on message passing Oh, Hyun-Kyo
2018
22 supplement-1 p. 2049-2061
artikel
54 Automatic segmentation of coronary lumen based on minimum path and image fusion from cardiac computed tomography images Liu, Liu
2018
22 supplement-1 p. 1559-1568
artikel
55 Big data and rule-based recommendation system in Internet of Things Jeong, Hanjo
2017
22 supplement-1 p. 1837-1846
artikel
56 B+-tree construction on massive data with Hadoop Ngu, Huynh Cong Viet
2017
22 supplement-1 p. 1011-1021
artikel
57 Bucket-size balancing locality sensitive hashing using the map reduce paradigm Lee, Kyung Mi
2017
22 supplement-1 p. 1959-1971
artikel
58 Building the intelligent transportation systems based on the computation of driving velocity law of blasting fly-rock Huang, Yong-hui
2017
22 supplement-1 p. 759-768
artikel
59 Cause-chain analysis of coal-mine gas explosion accident based on Bayesian network model Li, Xiangong
2018
22 supplement-1 p. 1549-1557
artikel
60 Chaotic social spider algorithm for load balance aware task scheduling in cloud computing Arul Xavier, V. M.
2018
22 supplement-1 p. 287-297
artikel
61 Chatbot-based heathcare service with a knowledge base for cloud computing Chung, Kyungyong
2018
22 supplement-1 p. 1925-1937
artikel
62 Classification of sentence level sentiment analysis using cloud machine learning techniques Arulmurugan, R.
2017
22 supplement-1 p. 1199-1209
artikel
63 Cloud-assisted privacy-preserving profile-matching scheme under multiple keys in mobile social network Gao, Chong-zhi
2018
22 supplement-1 p. 1655-1663
artikel
64 Cloud based u-healthcare network with QoS guarantee for mobile health service Chung, Kyungyong
2017
22 supplement-1 p. 2001-2015
artikel
65 Cluster and cloud computing framework for scientific metrology in flow control Wang, Yumin
2017
22 supplement-1 p. 1189-1198
artikel
66 Cluster-based distributed architecture for prediction of student’s performance in higher education Ramanathan, L.
2018
22 supplement-1 p. 1329-1344
artikel
67 Cluster based effective prediction approach for improving the curable rate of lymphatic filariasis affected patients Rajagopal, Renuka Devi
2018
22 supplement-1 p. 197-205
artikel
68 Cluster based-image descriptors and fractional hybrid optimization for medical image retrieval Yadav, Poonam
2018
22 supplement-1 p. 1345-1359
artikel
69 Clustered entropy computing: a holoentropy based encoding scheme for high efficient computing systems Munagala, Venkatesh
2018
22 supplement-1 p. 1429-1441
artikel
70 Collaborative data analytics for smart buildings: opportunities and models Lazarova-Molnar, Sanja
2017
22 supplement-1 p. 1065-1077
artikel
71 Correction to: Runtime self-monitoring approach of business process compliance in cloud environments Barnawi, Ahmed
2018
22 supplement-1 p. 2541
artikel
72 Cryptanalysis of lattice-based key exchange on small integer solution problem and its improvement Jing, Zhengjun
2018
22 supplement-1 p. 1717-1727
artikel
73 Customized video service system design and implementation: from taste to image-based consuming method Park, Hyojin
2017
22 supplement-1 p. 999-1009
artikel
74 Depth from defocus (DFD) based on VFISTA optimization algorithm in micro/nanometer vision Liu, Yongjun
2018
22 supplement-1 p. 1459-1467
artikel
75 Design and development of exponential lion algorithm for optimal allocation of cluster resources in cloud Devagnanam, J.
2018
22 supplement-1 p. 1385-1400
artikel
76 Design and implement a cross layer verification framework (CLVF) for detecting and preventing blackhole and wormhole attack in wireless ad-hoc networks for cloud environment Jagadeesan, S.
2018
22 supplement-1 p. 299-310
artikel
77 Design and implementation of an analytical framework for interference aware job scheduling on Apache Spark platform Wang, Kewen
2017
22 supplement-1 p. 2223-2237
artikel
78 Design and implementation of initial OpenSHMEM on PCIe NTB based cloud computing Shim, Cheol
2018
22 supplement-1 p. 1815-1826
artikel
79 Design and implementation of OpenGL SC 2.0 rendering pipeline Baek, Nakhoon
2017
22 supplement-1 p. 931-936
artikel
80 Design of intelligent carpooling program based on big data analysis and multi-information perception Zhou, Guiliang
2017
22 supplement-1 p. 521-532
artikel
81 Design of network threat detection and classification based on machine learning on cloud computing Kim, Hyunjoo
2018
22 supplement-1 p. 2341-2350
artikel
82 Detecting sensitive data leakage via inter-applications on Android using a hybrid analysis technique Cam, Nguyen Tan
2017
22 supplement-1 p. 1055-1064
artikel
83 Detection and prevention of black hole and selective forwarding attack in clustered WSN with Active Trust Mehetre, Deepak C.
2018
22 supplement-1 p. 1313-1328
artikel
84 Detection of DoS attacks in cloud networks using intelligent rule based classification system Rajendran, Rakesh
2018
22 supplement-1 p. 423-434
artikel
85 Development of a medical big-data mining process using topic modeling Song, Chang-Woo
2017
22 supplement-1 p. 1949-1958
artikel
86 Development of healthcare service model using physical information data based on cluster sensing technology Kim, Bong-Hyun
2017
22 supplement-1 p. 1847-1859
artikel
87 Diabetes prediction in healthcare systems using machine learning algorithms on Hadoop cluster Yuvaraj, N.
2017
22 supplement-1 p. 1-9
artikel
88 Distortion less secret image sharing scheme for Internet of Things system Li, Li
2017
22 supplement-1 p. 2293-2307
artikel
89 Distributed SVM face recognition based on Hadoop Zhang, Boping
2017
22 supplement-1 p. 827-834
artikel
90 Dragonfly optimization and constraint measure-based load balancing in cloud computing Polepally, Vijayakumar
2017
22 supplement-1 p. 1099-1111
artikel
91 DSM: a dynamic scheduling method for concurrent workflows in cloud environment Xue, Shengjun
2017
22 supplement-1 p. 693-706
artikel
92 Dyadic product and crow lion algorithm based coefficient generation for privacy protection on cloud George, Ashok
2018
22 supplement-1 p. 1277-1288
artikel
93 Dynamic data driven big data cooperative control scheme with virtual visualization for mobile multimedia communication Yin, Xiang-dong
2018
22 supplement-1 p. 1541-1548
artikel
94 Dynamic data-driven learning for self-healing avionics Imai, Shigeru
2017
22 supplement-1 p. 2187-2210
artikel
95 Efficient parallel implementation of DDDAS inference using an ensemble Kalman filter with shrinkage covariance matrix estimation Nino-Ruiz, Elias D.
2017
22 supplement-1 p. 2211-2221
artikel
96 Energy and cluster based efficient routing for broadcasting in mobile ad hoc networks Venu, Sivakumar
2018
22 supplement-1 p. 661-671
artikel
97 Enhanced continuous and discrete multi objective particle swarm optimization for text summarization Priya, V.
2018
22 supplement-1 p. 229-240
artikel
98 Enhancing the accuracy of static analysis for detecting sensitive data leakage in Android by using dynamic analysis Tuan, Ly Hoang
2017
22 supplement-1 p. 1079-1085
artikel
99 Evaluation of software quality-in-use attributes based on analysis network process Kim, Seung-Hee
2018
22 supplement-1 p. 2101-2114
artikel
100 Evolutionary energy balanced ant colony algorithm based on WSNs Chen, Yegang
2017
22 supplement-1 p. 609-621
artikel
101 Expected value model of bus gas station site layout problem with fuzzy demand in supplementary fuel using genetic algorithm Wei, Ming
2017
22 supplement-1 p. 809-818
artikel
102 Exposed body component-based harmful image detection in ubiquitous sensor data Jang, Seok-Woo
2018
22 supplement-1 p. 1899-1910
artikel
103 Face recognition algorithm based on wavelet transform and local linear embedding Zhou, Yan
2018
22 supplement-1 p. 1529-1540
artikel
104 Fast attack detection system using log analysis and attack tree generation Kim, Duhoe
2018
22 supplement-1 p. 1827-1835
artikel
105 FDLA: Fractional Dragonfly based Load balancing Algorithm in cluster cloud model Ashok Kumar, C.
2018
22 supplement-1 p. 1401-1414
artikel
106 FFBF: cluster-based Fuzzy Firefly Bayes Filter for noise identification and removal from grayscale images Kumar, S. Vijaya
2018
22 supplement-1 p. 1289-1311
artikel
107 Fitting a cluster of line images under central catadioptric camera Duan, Huixian
2017
22 supplement-1 p. 781-793
artikel
108 Gesture recognition based on modified adaptive orthogonal matching pursuit algorithm Li, Bei
2017
22 supplement-1 p. 503-512
artikel
109 Handling high web access utility mining using intelligent hybrid hill climbing algorithm based tree construction Tamilselvi, T.
2018
22 supplement-1 p. 145-155
artikel
110 High performance feature selection algorithms using filter method for cloud-based recommendation system Muthusankar, D.
2018
22 supplement-1 p. 311-322
artikel
111 High-speed vision extraction based on the CamShift algorithm Zhang, ChunYu
2017
22 supplement-1 p. 555-564
artikel
112 Histogram difference with Fuzzy rule base modeling for gradual shot boundary detection in video cloud applications Kethsy Prabavathy, A.
2017
22 supplement-1 p. 1211-1218
artikel
113 Hybrid evolutionary computing algorithms and statistical methods based optimal fragmentation in smart cloud networks Rani, K. Sasi Kala
2017
22 supplement-1 p. 241-254
artikel
114 Hybrid metaheuristic algorithm for improving the efficiency of data clustering Mageshkumar, C.
2018
22 supplement-1 p. 435-442
artikel
115 Hybrid routing algorithm for improving path selection in sustainable network Jayanthi, N.
2018
22 supplement-1 p. 323-334
artikel
116 Identification of PIWI-interacting RNA modules by weighted correlation network analysis Liu, Yajun
2017
22 supplement-1 p. 707-717
artikel
117 Implementation of flexible denim nickel copper rip stop textile antenna for medical application Thangaselvi, E.
2018
22 supplement-1 p. 635-645
artikel
118 Implementing self adaptiveness in whale optimization for cluster head section in Internet of Things Reddy, M. Praveen Kumar
2018
22 supplement-1 p. 1361-1372
artikel
119 Improved continuous query plan with cluster weighted dominant querying in synthetic datasets Madhankumar, M.
2017
22 supplement-1 p. 1239-1246
artikel
120 Improved security and routing path learning in MANETs using Beer–Quiche game theoritical model in cloud computing Sathiya, D.
2018
22 supplement-1 p. 21-31
artikel
121 Improvement of malware detection and classification using API call sequence alignment and visualization Kim, Hyunjoo
2017
22 supplement-1 p. 921-929
artikel
122 Information security model of block chain based on intrusion sensing in the IoT environment Li, Daming
2018
22 supplement-1 p. 451-468
artikel
123 Instance selection and feature extraction using cuttlefish optimization algorithm and principal component analysis using decision tree Suganthi, M.
2018
22 supplement-1 p. 89-101
artikel
124 Intelligent computation techniques for optimization of the shortest path in an asynchronous network-on-chip Ilamathi, K.
2018
22 supplement-1 p. 335-346
artikel
125 Intelligent distribution characteristic analysis of heavy metals in reservoir sediments Min, Wang
2018
22 supplement-1 p. 2285-2292
artikel
126 Intelligent early warning model of early-stage overflow based on dynamic clustering Liang, Haibo
2017
22 supplement-1 p. 481-492
artikel
127 IoT based fall detection and ambient assisted system for the elderly Chandra, I.
2018
22 supplement-1 p. 2517-2525
artikel
128 Iot based real time trafic control using cloud computing Vardhana, M.
2018
22 supplement-1 p. 2495-2504
artikel
129 Layered constraint united scheduling model of multi-line lock Pan, Xiang
2017
22 supplement-1 p. 859-870
artikel
130 LDAP: a lightweight deduplication and auditing protocol for secure data storage in cloud environment Daniel, Esther
2017
22 supplement-1 p. 1247-1258
artikel
131 Linear and non-linear proximal support vector machine classifiers for wind speed prediction Ranganayaki, V.
2018
22 supplement-1 p. 379-390
artikel
132 Locating the critical slip surface in a slope stability analysis by enhanced fireworks algorithm Xiao, Zeyun
2017
22 supplement-1 p. 719-729
artikel
133 Lossless and robust privacy preservation of association rules in data sanitization Navale, Geeta S.
2018
22 supplement-1 p. 1415-1428
artikel
134 Low-quality multivariate spatio-temporal serial data preprocessing Yu, Tao
2017
22 supplement-1 p. 2357-2370
artikel
135 Map-Reduce framework based cluster architecture for academic student’s performance prediction using cumulative dragonfly based neural network VeeraManickam, M. R. M.
2018
22 supplement-1 p. 1259-1275
artikel
136 Maximum data collection rate routing for data gather trees with data aggregation in rechargeable wireless sensor networks Lin, Haifeng
2017
22 supplement-1 p. 597-607
artikel
137 MCCFG: an MOF-based multiple condition control flow graph for automatic test case generation Son, Hyun Seung
2016
22 supplement-1 p. 2461-2470
artikel
138 Memory-aware TLP throttling and cache bypassing for GPUs Zhang, Jun
2017
22 supplement-1 p. 871-883
artikel
139 Minimizing movement for network connectivity in mobile sensor networks: an adaptive approach Jagtap, Arvind Madhukar
2018
22 supplement-1 p. 1373-1383
artikel
140 Mirrored and hybrid disk arrays and their reliability Thomasian, Alexander
2018
22 supplement-1 p. 2485-2494
artikel
141 Mitigating combinatorial attacks in node to node communication using high level security measures based on analysis of efficiency factor through regression and deviation Gayathri, V. M.
2018
22 supplement-1 p. 165-176
artikel
142 Modeling and analysis for stock return movements along with exchange rates and interest rates in Markov regime-switching models Kim, Suyi
2017
22 supplement-1 p. 2039-2048
artikel
143 More efficient and effective tricks for deep action recognition Liu, Zheyuan
2017
22 supplement-1 p. 819-826
artikel
144 Moving average multi directional local features for speaker recognition Mahmood, Awais
2018
22 supplement-1 p. 2145-2157
artikel
145 Multi-biometric authentication system using finger vein and iris in cloud computing Ilankumaran, S.
2018
22 supplement-1 p. 103-117
artikel
146 Novel routing protocol scheme for real-time applications in mobile Ad Hoc networks Lee, Dong Chun
2017
22 supplement-1 p. 977-988
artikel
147 Online energy-efficient deployment based on equivalent continuous DFS for large-scale web cluster Xiong, Zhi
2018
22 supplement-1 p. 583-596
artikel
148 Online handwritten signature verification based on the most stable feature and partition Yang, Li
2018
22 supplement-1 p. 1691-1701
artikel
149 On the role of message broker middleware for many-task computing on a big-data platform Nguyen, Cao Ngoc
2018
22 supplement-1 p. 2527-2540
artikel
150 On the use of chaotic iterations to design keyed hash function Lin, Zhuosheng
2017
22 supplement-1 p. 905-919
artikel
151 Optimized energy efficient route assigning method using related node discovery algorithm in MANET Aruna, R.
2018
22 supplement-1 p. 469-479
artikel
152 Optimized neural network for spectrum prediction using genetic algorithm in cognitive radio networks Supraja, P.
2018
22 supplement-1 p. 157-163
artikel
153 Optimized state update for mobile games in cloud networks Kim, Hye-Young
2017
22 supplement-1 p. 1035-1041
artikel
154 Optimized traffic control and data processing using IoT Kuppusamy, P.
2018
22 supplement-1 p. 2169-2178
artikel
155 Outsourced privacy-preserving C4.5 decision tree algorithm over horizontally and vertically partitioned dataset among multiple parties Li, Ye
2017
22 supplement-1 p. 1581-1593
artikel
156 Parallel image search application based on online hashing hierarchical ranking Li, Xiaofei
2018
22 supplement-1 p. 1469-1478
artikel
157 Parameter estimation of P-III distribution based on GA using rejection and interpolation mechanism She, Wei
2018
22 supplement-1 p. 2159-2167
artikel
158 Performance evaluation of revised virtual resources allocation scheme in network function virtualization (NFV) networks Kim, Hyuncheol
2018
22 supplement-1 p. 2331-2339
artikel
159 Performance evaluation of support vector machine classification approaches in data mining Chidambaram, S.
2018
22 supplement-1 p. 189-196
artikel
160 Performance optimization and evaluation for parallel processing of big data in earth system models Wang, Yuzhu
2017
22 supplement-1 p. 2371-2381
artikel
161 Prediction of software fault-prone classes using an unsupervised hybrid SOM algorithm Viji, C.
2018
22 supplement-1 p. 133-143
artikel
162 Priority-based scheduling using best channel in 6TiSCH networks Lee, Tsung-Han
2017
22 supplement-1 p. 1023-1033
artikel
163 Probabilistic classification techniques to perform geographical labeling of web objects AnjanKumar, K. N.
2018
22 supplement-1 p. 277-285
artikel
164 PRODA: improving parallel programs on GPUs through dependency analysis Wei, Xiong
2017
22 supplement-1 p. 2129-2144
artikel
165 Prognostic evaluation of multimodal biometric traits recognition based human face, finger print and iris images using ensembled SVM classifier Raja, J.
2018
22 supplement-1 p. 215-228
artikel
166 Prototype implementation of the OpenGL ES 2.0 shading language offline compiler Baek, Nakhoon
2017
22 supplement-1 p. 943-948
artikel
167 Providing profiling information for OpenGL ES application programs Kim, Kuinam J.
2017
22 supplement-1 p. 937-941
artikel
168 Quantum-inspired immune clonal algorithm for railway empty cars optimization based on revenue management and time efficiency Jing, Yun
2017
22 supplement-1 p. 545-554
artikel
169 Research on abnormal data detection method of web browser in cloud computing environment Duan, Xindong
2017
22 supplement-1 p. 1229-1238
artikel
170 Research on concurrency comparison modeling based on $$\uppi $$π calculus in future computer technology Bu, Hao
2018
22 supplement-1 p. 623-634
artikel
171 Research on coordinated scheduling of multiple systems and single jobs based on improved particle swarm optimization Lei, Dingyou
2018
22 supplement-1 p. 1443-1458
artikel
172 Research on the single image super-resolution method based on sparse Bayesian estimation Yang, Yong-qiang
2018
22 supplement-1 p. 1505-1513
artikel
173 Research on the thermal network optimization of wet axle based on high performance computing and wireless data transmission Liu, Sheng
2018
22 supplement-1 p. 1479-1493
artikel
174 Research trend analysis on convergence and joint research of Korea using scientific papers Yoo, Suhyeon
2017
22 supplement-1 p. 1939-1948
artikel
175 Residual Sarsa algorithm with function approximation Qiming, Fu
2017
22 supplement-1 p. 795-807
artikel
176 Resource recommendation via user tagging behavior analysis Liu, Haibo
2017
22 supplement-1 p. 885-894
artikel
177 Revamping data access privacy preservation method against inside attacks in wireless sensor networks Babu, S. Sathees
2018
22 supplement-1 p. 65-75
artikel
178 Safe and convenient personal authentication method using Moiré 3D authentication based on biometric authentication Kang, Hyeok
2017
22 supplement-1 p. 2017-2026
artikel
179 Safety analysis of traffic flow characteristics of highway tunnel based on artificial intelligence flow net algorithm Tian, Lingling
2018
22 supplement-1 p. 573-582
artikel
180 Scalable distributed data cube computation for large-scale multidimensional data analysis on a Spark cluster Lee, Suan
2018
22 supplement-1 p. 2063-2087
artikel
181 Scalable top-k keyword search in relational databases Xu, Yanwei
2017
22 supplement-1 p. 731-747
artikel
182 Score level multibiometrics fusion approach for healthcare El-Latif, Ahmed A. Abd
2017
22 supplement-1 p. 2425-2436
artikel
183 Secure provable data possession scheme with replication support in the cloud using Tweaks Ali, S. Ahamed
2017
22 supplement-1 p. 1113-1123
artikel
184 Semantic feature hierarchical clustering algorithm based on improved regional merging strategy yu-feng, Yao
2018
22 supplement-1 p. 1495-1503
artikel
185 Semantic query graph based SPARQL generation from natural language questions Song, Shengli
2017
22 supplement-1 p. 847-858
artikel
186 Semantics-based sensitive topic diffusion detection framework towards privacy aware online social networks Valliyammai, Chinnaiah
2018
22 supplement-1 p. 407-422
artikel
187 Smart hardware hybrid secure searchable encryption in cloud with IoT privacy management for smart home system Liu, Hua
2017
22 supplement-1 p. 1125-1135
artikel
188 Software defect prediction techniques using metrics based on neural network classifier Jayanthi, R.
2018
22 supplement-1 p. 77-88
artikel
189 Spatial task management method for location privacy aware crowdsourcing Li, Yan
2017
22 supplement-1 p. 1797-1803
artikel
190 Splicing image forgery identification based on artificial neural network approach and texture features Abrahim, Araz Rajab
2018
22 supplement-1 p. 647-660
artikel
191 Study of spectral reflectance reconstruction based on regularization matrix R method Wang, Ke
2017
22 supplement-1 p. 493-502
artikel
192 Task scheduling in a cloud computing environment using HGPSO algorithm Senthil Kumar, A. M.
2018
22 supplement-1 p. 2179-2185
artikel
193 Testing the consistency of business data objects using extended static testing of CRUD matrices Bures, Miroslav
2017
22 supplement-1 p. 963-976
artikel
194 The dynamic model of pulverized coal and waste plastic bonded together in flight combustion process Liu, Jihui
2017
22 supplement-1 p. 749-757
artikel
195 The resource running time manager for integrated environment Jung, Daeyong
2017
22 supplement-1 p. 1777-1786
artikel
196 The study on how to remove the shadow area for WSN based indoor disaster monitoring system Jung, Gang Hee
2017
22 supplement-1 p. 1973-1984
artikel
197 The study on the application of virtual reality in adapted physical education Kang, Sunyoung
2018
22 supplement-1 p. 2351-2355
artikel
198 The supporting system for disabled person with the artificial hand controlled by muscle sensor Jeong, Seungdo
2018
22 supplement-1 p. 1889-1898
artikel
199 Transit-hub: a smart public transportation decision support system with multi-timescale analytical services Sun, Fangzhou
2018
22 supplement-1 p. 2239-2254
artikel
200 Triple referee incentive mechanism for secure mobile adhoc networks Vedhavathy, T. R.
2018
22 supplement-1 p. 255-264
artikel
201 Trust based resource selection with optimization technique Saravana Kumar, E.
2018
22 supplement-1 p. 207-213
artikel
202 Turtle edge encoding and flood fill based image compression scheme Arockia Raj, Y.
2018
22 supplement-1 p. 361-377
artikel
203 Upkeeping secrecy in information extraction using ‘k’ division graph based postulates Kumar, B. Santhosh
2018
22 supplement-1 p. 57-63
artikel
204 Verifying a secure authentication protocol for IoT medical devices Bae, Woo-Sik
2017
22 supplement-1 p. 1985-1990
artikel
205 Visual and textual features based email spam classification using S-Cuckoo search and hybrid kernel support vector machine Kumaresan, T.
2017
22 supplement-1 p. 33-46
artikel
206 Visualization of security event logs across multiple networks and its application to a CSOC Song, Boyeon
2017
22 supplement-1 p. 1861-1872
artikel
207 Who is answering whom? Finding “Reply-To” relations in group chats with deep bidirectional LSTM networks Guo, Gaoyang
2018
22 supplement-1 p. 2089-2100
artikel
208 Whole procedure heterogeneous multiprocessors low-power optimization at algorithm-level Wang, Zhuowei
2018
22 supplement-1 p. 2407-2423
artikel
209 Word recommendation for English composition using big corpus data processing Lee, Keon Myung
2018
22 supplement-1 p. 1911-1924
artikel
210 W-Scheduler: whale optimization for task scheduling in cloud computing Sreenu, Karnam
2017
22 supplement-1 p. 1087-1098
artikel
                             210 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland