nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A correct-by-construction model for attribute-based access control
|
Gadouche, Hania |
|
|
23 |
3 |
p. 1517-1528 |
artikel |
2 |
A decentralized lightweight blockchain-based authentication mechanism for IoT systems
|
Khalid, Umair |
|
|
23 |
3 |
p. 2067-2087 |
artikel |
3 |
A game theoretic analysis of resource mining in blockchain
|
Singh, Rajani |
|
|
23 |
3 |
p. 2035-2046 |
artikel |
4 |
A model-driven engineering approach for the service integration of IoT systems
|
Alulema, Darwin |
|
|
23 |
3 |
p. 1937-1954 |
artikel |
5 |
An adaptation of a F-measure for automatic text summarization by extraction
|
Boudia, Mohamed Amine |
|
|
23 |
3 |
p. 2389-2398 |
artikel |
6 |
An effective HPSO-MGA optimization algorithm for dynamic resource allocation in cloud environment
|
Ramasamy, Vadivel |
|
|
23 |
3 |
p. 1711-1724 |
artikel |
7 |
An efficient data transmission approach using IAES-BE
|
Reddy, M. Indrasena |
|
|
23 |
3 |
p. 1633-1645 |
artikel |
8 |
An intelligent recommendation approach for online advertising based on hybrid deep neural network and parallel computing
|
Jiang, Zilong |
|
|
23 |
3 |
p. 1987-2000 |
artikel |
9 |
An optimization of distributed Voronoi-based collaboration for energy-efficient geographic routing in wireless sensor networks
|
Sridhar, M. |
|
|
23 |
3 |
p. 1741-1754 |
artikel |
10 |
Apache Spark Implementation of Whale Optimization Algorithm
|
AlJame, Maryam |
|
|
23 |
3 |
p. 2021-2034 |
artikel |
11 |
A route selection approach for variable data transmission in wireless sensor networks
|
Jain, Aarti |
|
|
23 |
3 |
p. 1697-1709 |
artikel |
12 |
AVARCIBER: a framework for assessing cybersecurity risks
|
Rea-Guaman, Angel Marcelo |
|
|
23 |
3 |
p. 1827-1843 |
artikel |
13 |
Blockchain-based database in an IoT environment: challenges, opportunities, and analysis
|
Tseng, Lewis |
|
|
23 |
3 |
p. 2151-2165 |
artikel |
14 |
Blockchain structures to guarantee logging integrity of a digital platform to support community-dwelling older adults
|
Rosa, Marco |
|
|
23 |
3 |
p. 1887-1898 |
artikel |
15 |
Comprehensive techniques of multi-GPU memory optimization for deep learning acceleration
|
Kim, Youngrang |
|
|
23 |
3 |
p. 2193-2204 |
artikel |
16 |
Computer vision based analysis and detection of defects in fruits causes due to nutrients deficiency
|
Yogesh, |
|
|
23 |
3 |
p. 1817-1826 |
artikel |
17 |
Conceptualization of smartphone usage and feature preferences among various demographics
|
Rashid, Ahmar |
|
|
23 |
3 |
p. 1855-1873 |
artikel |
18 |
Connecting domain-specific features to source code: towards the automatization of dashboard generation
|
Vázquez-Ingelmo, Andrea |
|
|
23 |
3 |
p. 1803-1816 |
artikel |
19 |
Data mining techniques for analyzing healthcare conditions of urban space-person lung using meta-heuristic optimized neural networks
|
Abugabah, Ahed |
|
|
23 |
3 |
p. 1781-1794 |
artikel |
20 |
Design and implementation of an I/O isolation scheme for key-value store on multiple solid-state drives
|
Kim, Hwajung |
|
|
23 |
3 |
p. 2301-2313 |
artikel |
21 |
Design of an adaptive GPU sharing and scheduling scheme in container-based cluster
|
Chen, Qichen |
|
|
23 |
3 |
p. 2179-2191 |
artikel |
22 |
Detecting dental problem related brain disease using intelligent bacterial optimized associative deep neural network
|
Mahmoud, Nourelhoda M. |
|
|
23 |
3 |
p. 1647-1657 |
artikel |
23 |
Developing computerized speech therapy system using metaheuristic optimized artificial cuckoo immune system
|
Alwadain, Ayed |
|
|
23 |
3 |
p. 1755-1767 |
artikel |
24 |
Development of data monitoring application based on IoT
|
Chen, Xu |
|
|
23 |
3 |
p. 1659-1667 |
artikel |
25 |
E-MHMS: enhanced MAC-based secure delay-aware healthcare monitoring system in WBAN
|
Sharmila, A. Helen |
|
|
23 |
3 |
p. 1725-1740 |
artikel |
26 |
Energy-efficiency virtual machine placement based on binary gravitational search algorithm
|
Abdessamia, Foudil |
|
|
23 |
3 |
p. 1577-1588 |
artikel |
27 |
Enhancement of fraternal K-median algorithm with CNN for high dropout probabilities to evolve optimal time-complexity
|
Nagaraj, Balakrishnan |
|
|
23 |
3 |
p. 2001-2008 |
artikel |
28 |
European strategy and legislation for cybersecurity: implications for Portugal
|
Carvalho, João Vidal |
|
|
23 |
3 |
p. 1845-1854 |
artikel |
29 |
Expertise-aware news feed updates recommendation: a random forest approach
|
Belkacem, Sami |
|
|
23 |
3 |
p. 2375-2388 |
artikel |
30 |
Formalizing and simulating cross-layer elasticity strategies in Cloud systems
|
Khebbeb, Khaled |
|
|
23 |
3 |
p. 1603-1631 |
artikel |
31 |
GARET: improving throughput using gas consumption-aware relocation in Ethereum sharding environments
|
Woo, Sangyeon |
|
|
23 |
3 |
p. 2235-2247 |
artikel |
32 |
Graph pattern matching with counting quantifiers and label-repetition constraints
|
Mahfoud, Houari |
|
|
23 |
3 |
p. 1529-1553 |
artikel |
33 |
High performance parallel KMP algorithm on a heterogeneous architecture
|
Park, Neungsoo |
|
|
23 |
3 |
p. 2205-2217 |
artikel |
34 |
HRM smart contracts on the blockchain: emulated vs native
|
Neiheiser, Ray |
|
|
23 |
3 |
p. 2105-2122 |
artikel |
35 |
Internet of things-based urban waste management system for smart cities using a Cuckoo Search Algorithm
|
Alqahtani, Fayez |
|
|
23 |
3 |
p. 1769-1780 |
artikel |
36 |
I/O resource isolation of public cloud serverless function runtimes for data-intensive applications
|
Kim, Jeongchul |
|
|
23 |
3 |
p. 2249-2259 |
artikel |
37 |
IoTBlockSIEM for information security incident management in the internet of things ecosystem
|
Miloslavskaya, Natalia |
|
|
23 |
3 |
p. 1911-1925 |
artikel |
38 |
Job placement using reinforcement learning in GPU virtualization environment
|
Oh, Jisun |
|
|
23 |
3 |
p. 2219-2234 |
artikel |
39 |
Lightweight memory tracing for hot data identification
|
Lee, Yunjae |
|
|
23 |
3 |
p. 2273-2285 |
artikel |
40 |
Low-overhead dynamic sharing of graphics memory space in GPU virtualization environments
|
Gu, Minwoo |
|
|
23 |
3 |
p. 2167-2178 |
artikel |
41 |
Multi-task learning based on question–answering style reviews for aspect category classification and aspect term extraction on GPU clusters
|
Wu, Hanqian |
|
|
23 |
3 |
p. 1973-1986 |
artikel |
42 |
OLAP operators for social network analysis
|
Ben Kraiem, Maha |
|
|
23 |
3 |
p. 2347-2374 |
artikel |
43 |
Parallel processing of spatial batch-queries using xBR+-trees in solid-state drives
|
Roumelis, George |
|
|
23 |
3 |
p. 1555-1575 |
artikel |
44 |
Replacing email protocols with blockchain-based smart contracts
|
González, José Chamadoira |
|
|
23 |
3 |
p. 1795-1801 |
artikel |
45 |
Research on sports video detection technology motion 3D reconstruction based on hidden Markov model
|
Lu, Yao |
|
|
23 |
3 |
p. 1899-1909 |
artikel |
46 |
RETRACTED ARTICLE: Framework for social tag recommendation using Lion Optimization Algorithm and collaborative filtering techniques
|
Wang, Tao |
|
|
23 |
3 |
p. 2009-2019 |
artikel |
47 |
RETRACTED ARTICLE: Intrusion detection and performance simulation based on improved sequential pattern mining algorithm
|
Wang, Yazi |
|
|
23 |
3 |
p. 1927-1936 |
artikel |
48 |
Safe farming as a service of blockchain-based supply chain management for improved transparency
|
Iqbal, Razi |
|
|
23 |
3 |
p. 2139-2150 |
artikel |
49 |
Secure data transmission on a distributed cloud server with the help of HMCA and data encryption using optimized CP-ABE-ECC
|
Vengala, Dilip Venkata Kumar |
|
|
23 |
3 |
p. 1683-1696 |
artikel |
50 |
Securing the LoRaWAN join procedure using blockchains
|
Danish, Syed Muhammad |
|
|
23 |
3 |
p. 2123-2138 |
artikel |
51 |
Security assurance of MongoDB in singularity LXCs: an elastic and convenient testbed using Linux containers to explore vulnerabilities
|
Dissanayaka, Akalanka Mailewa |
|
|
23 |
3 |
p. 1955-1971 |
artikel |
52 |
Social media mining, debate and feelings: digital public opinion’s reaction in five presidential elections in Latin America
|
López-López, Paulo Carlos |
|
|
23 |
3 |
p. 1875-1886 |
artikel |
53 |
Teeth infection and fatigue prediction using optimized neural networks and big data analytic tool
|
Hashem, Mohamed |
|
|
23 |
3 |
p. 1669-1682 |
artikel |
54 |
The limitations in the state-of-the-art counter-measures against the security threats in H-IoT
|
Qadri, Yazdan Ahmad |
|
|
23 |
3 |
p. 2047-2065 |
artikel |
55 |
Think big, start small: a good initiative to design green query optimizers
|
Dembele, Simon Pierre |
|
|
23 |
3 |
p. 2323-2345 |
artikel |
56 |
Towards an optimized distributed deep learning framework for a heterogeneous multi-GPU cluster
|
Kim, Youngrang |
|
|
23 |
3 |
p. 2287-2300 |
artikel |
57 |
Towards a Quality-of-Thing based approach for assigning things to federations
|
Maamar, Zakaria |
|
|
23 |
3 |
p. 1589-1602 |
artikel |
58 |
Towards building a blockchain framework for IoT
|
Pavithran, Deepa |
|
|
23 |
3 |
p. 2089-2103 |
artikel |
59 |
Towards predicting GPGPU performance for concurrent workloads in Multi-GPGPU environment
|
Kim, Sunggon |
|
|
23 |
3 |
p. 2261-2272 |
artikel |
60 |
WODII: a solution to process SPARQL queries over distributed data sources
|
Rabhi, Ahmed |
|
|
23 |
3 |
p. 2315-2322 |
artikel |