nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A dynamic VM provisioning and de-provisioning based cost-efficient deadline-aware scheduling algorithm for Big Data workflow applications in a cloud environment
|
Ahmad, Wakar |
|
|
24 |
1 |
p. 249-278 |
artikel |
2 |
Analysis of prediction algorithm for forest land spatial evolution trend in rural planning
|
Jiang, Xiujuan |
|
|
24 |
1 |
p. 195-203 |
artikel |
3 |
A novel hybrid antlion optimization algorithm for multi-objective task scheduling problems in cloud computing environments
|
Abualigah, Laith |
|
|
24 |
1 |
p. 205-223 |
artikel |
4 |
A secure, efficient and verifiable multimedia data sharing scheme in fog networking system
|
Tu, Yuanfei |
|
|
24 |
1 |
p. 225-247 |
artikel |
5 |
A Spark-based differential evolution with grouping topology model for large-scale global optimization
|
He, Zhihui |
|
|
24 |
1 |
p. 515-535 |
artikel |
6 |
A statistical class center based triangle area vector method for detection of denial of service attacks
|
Bhuvaneswari Amma, N. G. |
|
|
24 |
1 |
p. 393-415 |
artikel |
7 |
A survey on boosting IoT security and privacy through blockchain
|
Alfandi, Omar |
|
|
24 |
1 |
p. 37-55 |
artikel |
8 |
Battling against cyberattacks: towards pre-standardization of countermeasures
|
Nespoli, Pantaleone |
|
|
24 |
1 |
p. 57-81 |
artikel |
9 |
BDDT: use blockchain to facilitate IoT data transactions
|
Li, Hui |
|
|
24 |
1 |
p. 459-473 |
artikel |
10 |
Blockchain technology in supply chain management: an empirical study of the factors affecting user adoption/acceptance
|
Alazab, Moutaz |
|
|
24 |
1 |
p. 83-101 |
artikel |
11 |
Collective periodic pattern discovery for understanding human mobility
|
Shi, Tantan |
|
|
24 |
1 |
p. 141-157 |
artikel |
12 |
Development of benchmark automation suite and evaluation of various high-performance computing systems
|
Rho, Seungwoo |
|
|
24 |
1 |
p. 159-179 |
artikel |
13 |
Energy-saving traffic scheduling in backbone networks with software-defined networks
|
Lei, Junru |
|
|
24 |
1 |
p. 279-292 |
artikel |
14 |
Fuzzy logic based clustering algorithm for management in critical infrastructure
|
Kasmi, Ouafae |
|
|
24 |
1 |
p. 433-458 |
artikel |
15 |
MapReduce FCM clustering set algorithm
|
Mbyamm Kiki, Mesmin J |
|
|
24 |
1 |
p. 489-500 |
artikel |
16 |
MMHGE: detecting mild cognitive impairment based on multi-atlas multi-view hybrid graph convolutional networks and ensemble learning
|
Liu, Jin |
|
|
24 |
1 |
p. 103-113 |
artikel |
17 |
Multi-matrix verifiable computation
|
He, Yan |
|
|
24 |
1 |
p. 475-488 |
artikel |
18 |
ODRA: an outlier detection algorithm based on relevant attribute analysis method
|
Wahid, Abdul |
|
|
24 |
1 |
p. 569-585 |
artikel |
19 |
OMBM-ML: efficient memory bandwidth management for ensuring QoS and improving server utilization
|
Sung, Hanul |
|
|
24 |
1 |
p. 181-193 |
artikel |
20 |
Privacy preservation in e-health cloud: taxonomy, privacy requirements, feasibility analysis, and opportunities
|
Kanwal, Tehsin |
|
|
24 |
1 |
p. 293-317 |
artikel |
21 |
Rendering high-quality PK bitmap font in Linux environment
|
Majeed, Saima |
|
|
24 |
1 |
p. 559-568 |
artikel |
22 |
Resource provisioning using workload clustering in cloud computing environment: a hybrid approach
|
Shahidinejad, Ali |
|
|
24 |
1 |
p. 319-342 |
artikel |
23 |
Retail level Blockchain transformation for product supply chain using truffle development platform
|
Latif, Rana M. Amir |
|
|
24 |
1 |
p. 1-16 |
artikel |
24 |
Retraction Note to: A FCM cluster: cloud networking model for intelligent transportation in the city of Macau
|
Cai, Zhiming |
|
|
24 |
1 |
p. 587 |
artikel |
25 |
Retraction Note to: Mobile network intrusion detection for IoT system based on transfer learning algorithm
|
Deng, Lianbing |
|
|
24 |
1 |
p. 589 |
artikel |
26 |
SDN-based server clusters with dynamic load balancing and performance improvement
|
Chiang, Mei-Ling |
|
|
24 |
1 |
p. 537-558 |
artikel |
27 |
Service-oriented replication strategies for improving quality-of-service in cloud computing: a survey
|
Slimani, Sarra |
|
|
24 |
1 |
p. 361-392 |
artikel |
28 |
SNORT based early DDoS detection system using Opendaylight and open networking operating system in software defined networking
|
Badotra, Sumit |
|
|
24 |
1 |
p. 501-513 |
artikel |
29 |
Task replication to improve the reliability of running workflows on the cloud
|
Mousavi Nik, Samaneh Sadat |
|
|
24 |
1 |
p. 343-359 |
artikel |
30 |
TempoCode-IoT: temporal codebook-based encoding of flow features for intrusion detection in Internet of Things
|
Siddiqui, Abdul Jabbar |
|
|
24 |
1 |
p. 17-35 |
artikel |
31 |
TOP-Storm: A topology-based resource-aware scheduler for Stream Processing Engine
|
Muhammad, Asif |
|
|
24 |
1 |
p. 417-431 |
artikel |
32 |
Towards decomposition based multi-objective workflow scheduling for big data processing in clouds
|
Bugingo, Emmanuel |
|
|
24 |
1 |
p. 115-139 |
artikel |