nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A comparative study on bio-inspired algorithms for sentiment analysis
|
Yadav, Ashima |
|
|
23 |
4 |
p. 2969-2989 |
artikel |
2 |
A density-based maximum margin machine classifier
|
Wang, Jinsong |
|
|
23 |
4 |
p. 3069-3078 |
artikel |
3 |
A hybrid formal verification approach for QoS-aware multi-cloud service composition
|
Souri, Alireza |
|
|
23 |
4 |
p. 2453-2470 |
artikel |
4 |
A hybrid multi-objective artificial bee colony algorithm for flexible task scheduling problems in cloud computing system
|
Li, Jun-qing |
|
|
23 |
4 |
p. 2483-2499 |
artikel |
5 |
A meta-heuristic based multi objective optimization for load distribution in cloud data center under varying workloads
|
Mishra, Shashank Kumar |
|
|
23 |
4 |
p. 3079-3093 |
artikel |
6 |
A multi-objective model for identifying valuable nodes in complex networks with minimum cost
|
Abdollahpouri, Alireza |
|
|
23 |
4 |
p. 2719-2733 |
artikel |
7 |
A multi-objective trade-off framework for cloud resource scheduling based on the Deep Q-network algorithm
|
Peng, Zhiping |
|
|
23 |
4 |
p. 2753-2767 |
artikel |
8 |
An anomaly-based framework for mitigating effects of DDoS attacks using a third party auditor in cloud computing environments
|
Mahdavi Hezavehi, Sasha |
|
|
23 |
4 |
p. 2609-2627 |
artikel |
9 |
An efficient load balancing system using adaptive dragonfly algorithm in cloud computing
|
Neelima, P. |
|
|
23 |
4 |
p. 2891-2899 |
artikel |
10 |
An energy-efficient algorithm for virtual machine placement optimization in cloud data centers
|
Azizi, Sadoon |
|
|
23 |
4 |
p. 3421-3434 |
artikel |
11 |
A new cost-effective mechanism for VM-to-user mapping in cloud data centers
|
Adabi, Sepideh |
|
|
23 |
4 |
p. 2425-2451 |
artikel |
12 |
A new method of emotional analysis based on CNN–BiLSTM hybrid neural network
|
Liu, Zi-xian |
|
|
23 |
4 |
p. 2901-2913 |
artikel |
13 |
An intelligent approach for predicting resource usage by combining decomposition techniques with NFTS network
|
Rashida, Seyedeh Yasaman |
|
|
23 |
4 |
p. 3435-3460 |
artikel |
14 |
A novel deep neural networks based path prediction
|
Joshi, Upasna |
|
|
23 |
4 |
p. 2915-2924 |
artikel |
15 |
A novel workflow scheduling with multi-criteria using particle swarm optimization for heterogeneous computing systems
|
Biswas, Tarun |
|
|
23 |
4 |
p. 3255-3271 |
artikel |
16 |
A scalable multiple pairwise protein sequence alignment acceleration using hybrid CPU–GPU approach
|
Alawneh, Luay |
|
|
23 |
4 |
p. 2677-2688 |
artikel |
17 |
A server-side accelerator framework for multi-core CPUs and Intel Xeon Phi co-processor systems
|
You, Guohua |
|
|
23 |
4 |
p. 2591-2608 |
artikel |
18 |
A survey and classification of the workload forecasting methods in cloud computing
|
Masdari, Mohammad |
|
|
23 |
4 |
p. 2399-2424 |
artikel |
19 |
A survey and taxonomy on workload scheduling and resource provisioning in hybrid clouds
|
Wang, Bo |
|
|
23 |
4 |
p. 2809-2834 |
artikel |
20 |
Bio-inspired virtual machine placement schemes in cloud computing environment: taxonomy, review, and future research directions
|
Masdari, Mohammad |
|
|
23 |
4 |
p. 2533-2563 |
artikel |
21 |
Budget aware scheduling algorithm for workflow applications in IaaS clouds
|
Kalyan Chakravarthi, K. |
|
|
23 |
4 |
p. 3405-3419 |
artikel |
22 |
Bullfighting extreme scenarios in efficient hyper-scale cluster computing
|
Fernández-Cerero, Damián |
|
|
23 |
4 |
p. 3387-3403 |
artikel |
23 |
Can machine learning model with static features be fooled: an adversarial machine learning approach
|
Taheri, Rahim |
|
|
23 |
4 |
p. 3233-3253 |
artikel |
24 |
Computer vision algorithms acceleration using graphic processors NVIDIA CUDA
|
Afif, Mouna |
|
|
23 |
4 |
p. 3335-3347 |
artikel |
25 |
Consistent hashing with bounded loads and virtual nodes-based load balancing strategy for proxy cache cluster
|
Xiang, Min |
|
|
23 |
4 |
p. 3139-3155 |
artikel |
26 |
DAIS: dynamic access and integration services framework for cloud-oriented storage systems
|
Kumar, Ajay |
|
|
23 |
4 |
p. 3289-3308 |
artikel |
27 |
DeMETER in clouds: detection of malicious external thread execution in runtime with machine learning in PaaS clouds
|
Sandıkkaya, Mehmet Tahir |
|
|
23 |
4 |
p. 2565-2578 |
artikel |
28 |
Design and evaluation of a biologically-inspired cloud elasticity framework
|
Ullah, Amjad |
|
|
23 |
4 |
p. 3095-3117 |
artikel |
29 |
Effective cache replacement strategy (ECRS) for real-time fog computing environment
|
Talaat, Fatma M. |
|
|
23 |
4 |
p. 3309-3333 |
artikel |
30 |
Efficient dynamic resource allocation method for cloud computing environment
|
Belgacem, Ali |
|
|
23 |
4 |
p. 2871-2889 |
artikel |
31 |
Efficient VM migrations using forecasting techniques in cloud computing: a comprehensive review
|
Masdari, Mohammad |
|
|
23 |
4 |
p. 2629-2658 |
artikel |
32 |
Elliptic curve Diffie–Hellman cryptosystem in big data cloud security
|
Subramanian, E. K. |
|
|
23 |
4 |
p. 3057-3067 |
artikel |
33 |
Energy-driven cloud simulation: existing surveys, simulation supports, impacts and challenges
|
Ismail, Azlan |
|
|
23 |
4 |
p. 3039-3055 |
artikel |
34 |
Energy-efficient offloading of real-time tasks using cloud computing
|
Elashri, Suzanne |
|
|
23 |
4 |
p. 3273-3288 |
artikel |
35 |
Enhancing the performance of decision tree-based packet classification algorithms using CPU cluster
|
Abbasi, Mahdi |
|
|
23 |
4 |
p. 3203-3219 |
artikel |
36 |
EPBLA: energy-efficient consolidation of virtual machines using learning automata in cloud data centers
|
Rasouli, Nayereh |
|
|
23 |
4 |
p. 3013-3027 |
artikel |
37 |
ExaRD: introducing a framework for empowerment of resource discovery to support distributed exascale computing systems with high consistency
|
Adibi, Elham |
|
|
23 |
4 |
p. 3349-3369 |
artikel |
38 |
Fair budget constrained workflow scheduling approach for heterogeneous clouds
|
Rizvi, Naela |
|
|
23 |
4 |
p. 3185-3201 |
artikel |
39 |
FCM–SVM based intrusion detection system for cloud computing environment
|
Jaber, Aws Naser |
|
|
23 |
4 |
p. 3221-3231 |
artikel |
40 |
HasFS: optimizing file system consistency mechanism on NVM-based hybrid storage architecture
|
Liu, Yubo |
|
|
23 |
4 |
p. 2501-2515 |
artikel |
41 |
Human action recognition with deep learning and structural optimization using a hybrid heuristic algorithm
|
Ozcan, Tayyip |
|
|
23 |
4 |
p. 2847-2860 |
artikel |
42 |
Improved water cycle algorithm with probabilistic neural network to solve classification problems
|
Alweshah, Mohammed |
|
|
23 |
4 |
p. 2703-2718 |
artikel |
43 |
Interference-aware parallelization for deep learning workload in GPU cluster
|
Geng, Xin |
|
|
23 |
4 |
p. 2689-2702 |
artikel |
44 |
Minimizing virtual machine migration probability in cloud computing environments
|
Jalali Moghaddam, Marjan |
|
|
23 |
4 |
p. 3029-3038 |
artikel |
45 |
Multi-level particle swarm optimisation and its parallel version for parameter optimisation of ensemble models: a case of sentiment polarity prediction
|
Budhi, Gregorius Satia |
|
|
23 |
4 |
p. 3371-3386 |
artikel |
46 |
OFFM-ANFIS analysis for flood prediction using mobile IoS, fog and cloud computing
|
Khanna, Nitin |
|
|
23 |
4 |
p. 2659-2676 |
artikel |
47 |
PAP: power aware prediction based framework to reduce disk energy consumption
|
Arora, Sumedha |
|
|
23 |
4 |
p. 3157-3174 |
artikel |
48 |
Performance consequence of user space file systems due to extensive CPU sharing in virtual environment
|
Bhatt, Gopi |
|
|
23 |
4 |
p. 3119-3137 |
artikel |
49 |
Private computation of the Schulze voting method over the cloud
|
Yadav, Vijay Kumar |
|
|
23 |
4 |
p. 2517-2531 |
artikel |
50 |
Process arrival pattern aware algorithms for acceleration of scatter and gather operations
|
Proficz, Jerzy |
|
|
23 |
4 |
p. 2735-2751 |
artikel |
51 |
Real time fall detection in fog computing scenario
|
Shrivastava, Rashmi |
|
|
23 |
4 |
p. 2861-2870 |
artikel |
52 |
Satisfaction aware QoS-based bidirectional service mapping in cloud environment
|
Neeraj, |
|
|
23 |
4 |
p. 2991-3011 |
artikel |
53 |
Secure and efficient publicly verifiable outsourcing of matrix multiplication in online mode
|
Erfan, Fatemeh |
|
|
23 |
4 |
p. 2835-2845 |
artikel |
54 |
Security aware index based quasi–identifier approach for privacy preservation of data sets for cloud applications
|
Sudhakar, Rayapati Venkata |
|
|
23 |
4 |
p. 2579-2589 |
artikel |
55 |
Semantically-enhanced information retrieval using multiple knowledge sources
|
Jiang, Yuncheng |
|
|
23 |
4 |
p. 2925-2944 |
artikel |
56 |
SLT based watermarking system for secure telemedicine
|
Rayachoti, Eswaraiah |
|
|
23 |
4 |
p. 3175-3184 |
artikel |
57 |
SPeCECA: a smart pervasive chatbot for emergency case assistance based on cloud computing
|
Ouerhani, Nourchène |
|
|
23 |
4 |
p. 2471-2482 |
artikel |
58 |
SysDroid: a dynamic ML-based android malware analyzer using system call traces
|
Ananya, A. |
|
|
23 |
4 |
p. 2789-2808 |
artikel |
59 |
The CiS2: a new metric for performance and energy trade-off in consolidated servers
|
Juiz, Carlos |
|
|
23 |
4 |
p. 2769-2788 |
artikel |
60 |
Utilization-aware energy-efficient virtual machine placement in cloud networks using NSGA-III meta-heuristic approach
|
Parvizi, Elnaz |
|
|
23 |
4 |
p. 2945-2967 |
artikel |