Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             32 results found
no title author magazine year volume issue page(s) type
1 A dynamic VM provisioning and de-provisioning based cost-efficient deadline-aware scheduling algorithm for Big Data workflow applications in a cloud environment Ahmad, Wakar

24 1 p. 249-278
article
2 Analysis of prediction algorithm for forest land spatial evolution trend in rural planning Jiang, Xiujuan

24 1 p. 195-203
article
3 A novel hybrid antlion optimization algorithm for multi-objective task scheduling problems in cloud computing environments Abualigah, Laith

24 1 p. 205-223
article
4 A secure, efficient and verifiable multimedia data sharing scheme in fog networking system Tu, Yuanfei

24 1 p. 225-247
article
5 A Spark-based differential evolution with grouping topology model for large-scale global optimization He, Zhihui

24 1 p. 515-535
article
6 A statistical class center based triangle area vector method for detection of denial of service attacks Bhuvaneswari Amma, N. G.

24 1 p. 393-415
article
7 A survey on boosting IoT security and privacy through blockchain Alfandi, Omar

24 1 p. 37-55
article
8 Battling against cyberattacks: towards pre-standardization of countermeasures Nespoli, Pantaleone

24 1 p. 57-81
article
9 BDDT: use blockchain to facilitate IoT data transactions Li, Hui

24 1 p. 459-473
article
10 Blockchain technology in supply chain management: an empirical study of the factors affecting user adoption/acceptance Alazab, Moutaz

24 1 p. 83-101
article
11 Collective periodic pattern discovery for understanding human mobility Shi, Tantan

24 1 p. 141-157
article
12 Development of benchmark automation suite and evaluation of various high-performance computing systems Rho, Seungwoo

24 1 p. 159-179
article
13 Energy-saving traffic scheduling in backbone networks with software-defined networks Lei, Junru

24 1 p. 279-292
article
14 Fuzzy logic based clustering algorithm for management in critical infrastructure Kasmi, Ouafae

24 1 p. 433-458
article
15 MapReduce FCM clustering set algorithm Mbyamm Kiki, Mesmin J

24 1 p. 489-500
article
16 MMHGE: detecting mild cognitive impairment based on multi-atlas multi-view hybrid graph convolutional networks and ensemble learning Liu, Jin

24 1 p. 103-113
article
17 Multi-matrix verifiable computation He, Yan

24 1 p. 475-488
article
18 ODRA: an outlier detection algorithm based on relevant attribute analysis method Wahid, Abdul

24 1 p. 569-585
article
19 OMBM-ML: efficient memory bandwidth management for ensuring QoS and improving server utilization Sung, Hanul

24 1 p. 181-193
article
20 Privacy preservation in e-health cloud: taxonomy, privacy requirements, feasibility analysis, and opportunities Kanwal, Tehsin

24 1 p. 293-317
article
21 Rendering high-quality PK bitmap font in Linux environment Majeed, Saima

24 1 p. 559-568
article
22 Resource provisioning using workload clustering in cloud computing environment: a hybrid approach Shahidinejad, Ali

24 1 p. 319-342
article
23 Retail level Blockchain transformation for product supply chain using truffle development platform Latif, Rana M. Amir

24 1 p. 1-16
article
24 Retraction Note to: A FCM cluster: cloud networking model for intelligent transportation in the city of Macau Cai, Zhiming

24 1 p. 587
article
25 Retraction Note to: Mobile network intrusion detection for IoT system based on transfer learning algorithm Deng, Lianbing

24 1 p. 589
article
26 SDN-based server clusters with dynamic load balancing and performance improvement Chiang, Mei-Ling

24 1 p. 537-558
article
27 Service-oriented replication strategies for improving quality-of-service in cloud computing: a survey Slimani, Sarra

24 1 p. 361-392
article
28 SNORT based early DDoS detection system using Opendaylight and open networking operating system in software defined networking Badotra, Sumit

24 1 p. 501-513
article
29 Task replication to improve the reliability of running workflows on the cloud Mousavi Nik, Samaneh Sadat

24 1 p. 343-359
article
30 TempoCode-IoT: temporal codebook-based encoding of flow features for intrusion detection in Internet of Things Siddiqui, Abdul Jabbar

24 1 p. 17-35
article
31 TOP-Storm: A topology-based resource-aware scheduler for Stream Processing Engine Muhammad, Asif

24 1 p. 417-431
article
32 Towards decomposition based multi-objective workflow scheduling for big data processing in clouds Bugingo, Emmanuel

24 1 p. 115-139
article
                             32 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands