nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A collaboration of deadline and budget constraints for task scheduling in cloud computing
|
Alworafi, Mokhtar A. |
|
|
23 |
2 |
p. 1073-1083 |
artikel |
2 |
A comprehensive and systematic review of the load balancing mechanisms in the Internet of Things
|
Pourghebleh, Behrouz |
|
|
23 |
2 |
p. 641-661 |
artikel |
3 |
A hybrid fog-cloud approach for securing the Internet of Things
|
Maharaja, Rajaputhri |
|
|
23 |
2 |
p. 451-459 |
artikel |
4 |
Alzheimer’s disease detection using skeleton data recorded with Kinect camera
|
Seifallahi, Mahmoud |
|
|
23 |
2 |
p. 1469-1481 |
artikel |
5 |
A memetic grouping genetic algorithm for cost efficient VM placement in multi-cloud environment
|
Rashida, Seyedeh Yasaman |
|
|
23 |
2 |
p. 797-836 |
artikel |
6 |
An elastic controller using Colored Petri Nets in cloud computing environment
|
Shahidinejad, Ali |
|
|
23 |
2 |
p. 1045-1071 |
artikel |
7 |
An energy-aware scheduling algorithm for big data applications in Spark
|
Li, Hongjian |
|
|
23 |
2 |
p. 593-609 |
artikel |
8 |
A new outlier rejection methodology for supporting load forecasting in smart grids based on big data
|
Rabie, Asmaa H. |
|
|
23 |
2 |
p. 509-535 |
artikel |
9 |
An identity-based online/offline secure cloud storage auditing scheme
|
Rabaninejad, Reyhaneh |
|
|
23 |
2 |
p. 1455-1468 |
artikel |
10 |
An integrated rule based intrusion detection system: analysis on UNSW-NB15 data set and the real time online dataset
|
Kumar, Vikash |
|
|
23 |
2 |
p. 1397-1418 |
artikel |
11 |
An MDE-based approach for self-adaptive RTES model generation
|
Ben Said, Mouna |
|
|
23 |
2 |
p. 925-951 |
artikel |
12 |
A novel packet exchanging strategy for preventing HoL-blocking in fat-trees
|
Mohtavipour, Seyed Mehdi |
|
|
23 |
2 |
p. 461-482 |
artikel |
13 |
Approaches of enhancing interoperations among high performance computing and big data analytics via augmentation
|
Pathak, Ajeet Ram |
|
|
23 |
2 |
p. 953-988 |
artikel |
14 |
A predictive model for the identification of learning styles in MOOC environments
|
Hmedna, Brahim |
|
|
23 |
2 |
p. 1303-1328 |
artikel |
15 |
Artificial neural networks based techniques for anomaly detection in Apache Spark
|
Alnafessah, Ahmad |
|
|
23 |
2 |
p. 1345-1360 |
artikel |
16 |
A survey: ICT enabled energy efficiency techniques for big data applications
|
Arora, Sumedha |
|
|
23 |
2 |
p. 775-796 |
artikel |
17 |
AutoBahn: a concurrency control framework for non-volatile file buffer
|
Jang, Hyeongwon |
|
|
23 |
2 |
p. 895-910 |
artikel |
18 |
Benchmarking the contention aware nature inspired metaheuristic task scheduling algorithms
|
Mishra, Abhishek |
|
|
23 |
2 |
p. 537-553 |
artikel |
19 |
Classified enhancement model for big data storage reliability based on Boolean satisfiability problem
|
Huang, Hong |
|
|
23 |
2 |
p. 483-492 |
artikel |
20 |
Cloud-assisted green IoT-enabled comprehensive framework for wildfire monitoring
|
Kaur, Harkiran |
|
|
23 |
2 |
p. 1149-1162 |
artikel |
21 |
Cloud datacenter workload estimation using error preventive time series forecasting models
|
Kumar, Jitendra |
|
|
23 |
2 |
p. 1363-1379 |
artikel |
22 |
Comprehensive regression-based model to predict performance of general-purpose graphics processing unit
|
Shafiabadi, Mohammad Hossein |
|
|
23 |
2 |
p. 1505-1516 |
artikel |
23 |
Correction to: Artificial neural networks based techniques for anomaly detection in Apache Spark
|
Alnafessah, Ahmad |
|
|
23 |
2 |
p. 1361-1362 |
artikel |
24 |
COWCache: effective flash caching for Copy-on-Write virtual disks
|
Fu, Jianyu |
|
|
23 |
2 |
p. 623-639 |
artikel |
25 |
DDoS attack prevention using collaborative approach for cloud computing
|
Saxena, Rajat |
|
|
23 |
2 |
p. 1329-1344 |
artikel |
26 |
Detection of premature ventricular contraction (PVC) using linear and nonlinear techniques: an experimental study
|
Mazidi, Mohammad Hadi |
|
|
23 |
2 |
p. 759-774 |
artikel |
27 |
Economic impact of energy saving techniques in cloud server
|
Ahmad, Bilal |
|
|
23 |
2 |
p. 611-621 |
artikel |
28 |
ELM-NET, a closer to practice approach for classifying the big data using multiple independent ELMs
|
Shokrzade, Amin |
|
|
23 |
2 |
p. 735-757 |
artikel |
29 |
Energy-aware scheduling using slack reclamation for cluster systems
|
Maurya, Ashish Kumar |
|
|
23 |
2 |
p. 911-923 |
artikel |
30 |
Energy-efficient scheme based on user task characteristic in virtual cloud platform
|
Dong, Shi |
|
|
23 |
2 |
p. 1125-1135 |
artikel |
31 |
Entropy-based outlier detection using spark
|
Feng, Guilan |
|
|
23 |
2 |
p. 409-419 |
artikel |
32 |
Evaluation and comparison of OpenDayLight and open networking operating system in software-defined networking
|
Badotra, Sumit |
|
|
23 |
2 |
p. 1281-1291 |
artikel |
33 |
Exploring the parallel capabilities of GPU: Berlekamp-Massey algorithm case study
|
Ali, Hanan |
|
|
23 |
2 |
p. 1007-1024 |
artikel |
34 |
Flexible device compositions and dynamic resource sharing in PCIe interconnected clusters using Device Lending
|
Markussen, Jonas |
|
|
23 |
2 |
p. 1211-1234 |
artikel |
35 |
Fusion of medical images using deep belief networks
|
Kaur, Manjit |
|
|
23 |
2 |
p. 1439-1453 |
artikel |
36 |
General spin-up time distribution for energy-aware IaaS cloud service models
|
Chitsaz, Behzad |
|
|
23 |
2 |
p. 1293-1301 |
artikel |
37 |
Gossip based fault tolerant protocol in distributed transactional memory using quorum based replication system
|
Chatterjee, Moumita |
|
|
23 |
2 |
p. 1103-1124 |
artikel |
38 |
Hybrid dual-objective parallel genetic algorithm for heterogeneous multiprocessor scheduling
|
Saroja, S. |
|
|
23 |
2 |
p. 441-450 |
artikel |
39 |
HydraFS: an efficient NUMA-aware in-memory file system
|
Wu, Ting |
|
|
23 |
2 |
p. 705-724 |
artikel |
40 |
Identity-based encryption with authorized equivalence test for cloud-assisted IoT
|
Elhabob, Rashad |
|
|
23 |
2 |
p. 1085-1101 |
artikel |
41 |
Image classification on IoT edge devices: profiling and modeling
|
Abdel Magid, Salma |
|
|
23 |
2 |
p. 1025-1043 |
artikel |
42 |
Improving resource allocation in software-defined networks using clustering
|
Sarbazi, Mahdi |
|
|
23 |
2 |
p. 1199-1210 |
artikel |
43 |
IoT based framework for the detection of vehicle accident
|
Dashora, Chirag |
|
|
23 |
2 |
p. 1235-1250 |
artikel |
44 |
KPN-based parallelization of Wu–Manber algorithm on multi-core machines
|
Aldwairi, Monther |
|
|
23 |
2 |
p. 725-734 |
artikel |
45 |
MAHA: Migration-based Adaptive Heuristic Algorithm for Large-scale Network Simulations
|
Ibrahim, Muhammad |
|
|
23 |
2 |
p. 1251-1266 |
artikel |
46 |
Methodology and optimization for implementing cluster-based parallel geospatial algorithms with a case study
|
Huang, Fang |
|
|
23 |
2 |
p. 673-704 |
artikel |
47 |
MILP formulations for spatio-temporal thermal-aware scheduling in Cloud and HPC datacenters
|
Pierson, Jean-Marc |
|
|
23 |
2 |
p. 421-439 |
artikel |
48 |
Network Reconfiguration Algorithm (NRA) for scheduling communication-intensive graphs in heterogeneous computing environment
|
Masood, Anum |
|
|
23 |
2 |
p. 1419-1438 |
artikel |
49 |
NvPD: novel parallel edit distance algorithm, correctness, and performance evaluation
|
Sadiq, Muhammad Umair |
|
|
23 |
2 |
p. 879-894 |
artikel |
50 |
On scheduling transaction in grid computing using cuckoo search-ant colony optimization considering load
|
Mahato, Dharmendra Prasad |
|
|
23 |
2 |
p. 1483-1504 |
artikel |
51 |
Optimizing virtual machine placement in IaaS data centers: taxonomy, review and open issues
|
Talebian, Hamid |
|
|
23 |
2 |
p. 837-878 |
artikel |
52 |
Priority-based task scheduling method over cloudlet using a swarm intelligence algorithm
|
Milan, Sara Tabagchi |
|
|
23 |
2 |
p. 663-671 |
artikel |
53 |
Product’s behaviour recommendations using free text: an aspect based sentiment analysis approach
|
Nawaz, Asif |
|
|
23 |
2 |
p. 1267-1279 |
artikel |
54 |
QoS provisioning framework for service-oriented internet of things (IoT)
|
Badawy, Mahmoud M. |
|
|
23 |
2 |
p. 575-591 |
artikel |
55 |
Reliable stream data processing for elastic distributed stream processing systems
|
Wei, Xiaohui |
|
|
23 |
2 |
p. 555-574 |
artikel |
56 |
Security aware dynamic scheduling algorithm (SADSA) for real-time applications on grid
|
Singh, Surendra |
|
|
23 |
2 |
p. 989-1005 |
artikel |
57 |
Service selection mechanisms in the Internet of Things (IoT): a systematic and comprehensive study
|
Li, Yunyan |
|
|
23 |
2 |
p. 1163-1183 |
artikel |
58 |
Solving a trillion unknowns per second with HPGMG on Sunway TaihuLight
|
Ma, Wenjing |
|
|
23 |
2 |
p. 493-507 |
artikel |
59 |
Stochastic QoE-aware optimization of multisource multimedia content delivery for mobile cloud
|
Saleem, Muhammad |
|
|
23 |
2 |
p. 1381-1396 |
artikel |
60 |
Task scheduling in cloud computing using particle swarm optimization with time varying inertia weight strategies
|
Huang, Xingwang |
|
|
23 |
2 |
p. 1137-1147 |
artikel |
61 |
The role of structured and unstructured data managing mechanisms in the Internet of things
|
Azad, Poopak |
|
|
23 |
2 |
p. 1185-1198 |
artikel |