Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             59 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Adaptive Packet-size Control for Improved Throughput in Dynamic Access Networks Bany Salameh, Haythem

24 3 p. 1935-1944
artikel
2 A divide and conquer approach to deadline constrained cost-optimization workflow scheduling for the cloud Khojasteh Toussi, Ghazaleh

24 3 p. 1711-1733
artikel
3 A fault tolerant routing scheme for advanced metering infrastructure: an approach towards smart grid Mohapatra, Hitesh

24 3 p. 2193-2211
artikel
4 A hybrid block-based ensemble framework for the multi-class problem to react to different types of drifts Mahdi, Osama A.

24 3 p. 2327-2340
artikel
5 A microservices persistence technique for cloud-based online social data analysis Al-Obeidat, Feras

24 3 p. 2341-2353
artikel
6 A multi-layer trust-based middleware framework for handling interoperability issues in heterogeneous IOTs Abbasi, Mohammad Asad

24 3 p. 2133-2160
artikel
7 An effective meta-heuristic based multi-objective hybrid optimization method for workflow scheduling in cloud computing environment Kakkottakath Valappil Thekkepuryil, Jabir

24 3 p. 2367-2384
artikel
8 An efficient heterogeneous blockchain-based online/offline signcryption systems for internet of vehicles Elkhalil, Ahmed

24 3 p. 2051-2068
artikel
9 A new cloud-based classification methodology (CBCM) for efficient semantic web service discovery Alshafaey, Mohamed S.

24 3 p. 2269-2292
artikel
10 A novel controller placement algorithm based on network portioning concept and a hybrid discrete optimization algorithm for multi-controller software-defined networks Firouz, Nasrin

24 3 p. 2511-2544
artikel
11 A novel feature selection method for data mining tasks using hybrid Sine Cosine Algorithm and Genetic Algorithm Abualigah, Laith

24 3 p. 2161-2176
artikel
12 A path planning method based on the particle swarm optimization trained fuzzy neural network algorithm Liu, Xiao-huan

24 3 p. 1901-1915
artikel
13 A power and thermal-aware virtual machine management framework based on machine learning Xiao, Peng

24 3 p. 2231-2248
artikel
14 A request aware module using CS-IDR to reduce VM level collateral damages caused by DDoS attack in cloud environment Verma, Priyanka

24 3 p. 1917-1933
artikel
15 A robust blind medical image watermarking approach for telemedicine applications Kahlessenane, Fares

24 3 p. 2069-2082
artikel
16 Auto-scaling techniques for IoT-based cloud applications: a review Verma, Shveta

24 3 p. 2425-2459
artikel
17 Availability and reliability analysis of cloud computing under economic denial of sustainability (EDoS) attack: a semi-Markov approach Lalropuia, K. C.

24 3 p. 2177-2191
artikel
18 Building an efficient intrusion detection system using grasshopper optimization algorithm for anomaly detection Dwivedi, Shubhra

24 3 p. 1881-1900
artikel
19 Cloud-based intrusion detection using kernel fuzzy clustering and optimal type-2 fuzzy neural network Srilatha, Doddi

24 3 p. 2657-2672
artikel
20 CUDAQuat: new parallel framework for fast computation of quaternion moments for color images applications Hosny, Khalid M.

24 3 p. 2385-2406
artikel
21 Data replication schemes in cloud computing: a survey Shakarami, Ali

24 3 p. 2545-2579
artikel
22 Delay-aware optimization of energy consumption for task offloading in fog environments using metaheuristic algorithms Keshavarznejad, Maryam

24 3 p. 1825-1853
artikel
23 Distributed anomaly detection using concept drift detection based hybrid ensemble techniques in streamed network data Jain, Meenal

24 3 p. 2099-2114
artikel
24 DLBench: a comprehensive experimental evaluation of deep learning frameworks Elshawi, Radwa

24 3 p. 2017-2038
artikel
25 Dynamic provisioning with structure inspired selection and limitation of VMs based cost-time efficient workflow scheduling in the cloud Ndamlabin Mboula, Jean Etienne

24 3 p. 2697-2721
artikel
26 Early DGA-based botnet identification: pushing detection to the edges Zago, Mattia

24 3 p. 1695-1710
artikel
27 Efficient feature selection and classification through ensemble method for network intrusion detection on cloud computing Krishnaveni, S.

24 3 p. 1761-1779
artikel
28 Efficient TPA-based auditing scheme for secure cloud storage Shao, Bilin

24 3 p. 1989-2000
artikel
29 Energy and cost trade-off for computational tasks offloading in mobile multi-tenant clouds Patel, Yashwant Singh

24 3 p. 1793-1824
artikel
30 Energy-aware routing considering load balancing for SDN: a minimum graph-based Ant Colony Optimization Torkzadeh, Samaneh

24 3 p. 2293-2312
artikel
31 Enhancing service maintainability by monitoring and auditing SLA in cloud computing Viegas, Eduardo

24 3 p. 1659-1674
artikel
32 Fair hop-by-hop interest rate control to mitigate congestion in named data networks Touati, Haifa

24 3 p. 2213-2230
artikel
33 FastTTPS: fast approach for video transcoding time prediction and scheduling for HTTP adaptive streaming videos Agrawal, Prateek

24 3 p. 1605-1621
artikel
34 FFED: a novel strategy based on fast entropy to detect attacks against trust computing in cloud Guesmi, Houda

24 3 p. 1945-1954
artikel
35 Flow based anomaly intrusion detection system using ensemble classifier with Feature Impact Scale Jyothsna, V.

24 3 p. 2461-2478
artikel
36 Improving the fault-tolerance of software-defined networks with dynamic overlay agreement Hsieh, Hui-Ching

24 3 p. 2597-2614
artikel
37 Managing overloaded hosts for energy-efficiency in cloud data centers Yadav, Rahul

24 3 p. 2001-2015
artikel
38 MHB*T based dynamic data integrity auditing in cloud storage Luo, Wei

24 3 p. 2115-2132
artikel
39 Middleware-based multi-agent development environment for building and testing distributed intelligent systems Aguayo-Canela, Francisco José

24 3 p. 2313-2325
artikel
40 Mutual authentication scheme of IoT devices in fog computing environment Singh, Sunakshi

24 3 p. 1643-1657
artikel
41 Nash equilibrium and social optimization in cloud service systems with diverse users Fu, Liwei

24 3 p. 2039-2050
artikel
42 Novel trust evaluation using NSGA-III based adaptive neuro-fuzzy inference system Kaur, Jasleen

24 3 p. 1781-1792
artikel
43 Online sequential extreme studentized deviate tests for anomaly detection in streaming data with varying patterns Ryu, Minho

24 3 p. 1975-1987
artikel
44 OPSA: an optimized prediction based scheduling approach for scientific applications in cloud environment Kaur, Gurleen

24 3 p. 1955-1974
artikel
45 Performance evaluation of grouping and regrouping scheme for mitigating hidden station problem in IEEE 802.11ah network Gopinath, A. Justin

24 3 p. 1623-1642
artikel
46 PLB: a resilient and adaptive task scheduling scheme based on multi-queues for cloud environment Sharma, Gaurav

24 3 p. 2615-2637
artikel
47 Principal component based support vector machine (PC-SVM): a hybrid technique for software defect detection Mustaqeem, Mohd.

24 3 p. 2581-2595
artikel
48 Real time UAV path planning by parallel grey wolf optimization with align coefficient on CAN bus Jamshidi, Vahid

24 3 p. 2495-2509
artikel
49 Resource allocation mechanisms for maximizing provider’s revenue in infrastructure as a service (IaaS) cloud Shokri Habashi, Fateme

24 3 p. 2407-2423
artikel
50 SaMW: a probabilistic meta-heuristic algorithm for job scheduling in heterogeneous distributed systems powered by microservices Tychalas, Dimitrios

24 3 p. 1735-1759
artikel
51 ScalaParBiBit: scaling the binary biclustering in distributed-memory systems Fraguela, Basilio B.

24 3 p. 2249-2268
artikel
52 Security-SLA-guaranteed service function chain deployment in cloud-fog computing networks Zhao, Dongcheng

24 3 p. 2479-2494
artikel
53 Smart contract based policies for the Internet of Things Puri, Vikram

24 3 p. 1675-1694
artikel
54 TC3PoP: a time-cost compromised workflow scheduling heuristic customized for cloud environments Mollajafari, Morteza

24 3 p. 2639-2656
artikel
55 The importance of nature-inspired meta-heuristic algorithms for solving virtual machine consolidation problem in cloud environments Pourghebleh, Behrouz

24 3 p. 2673-2696
artikel
56 Truthful online double auction based dynamic resource provisioning for multi-objective trade-offs in IaaS clouds Patel, Yashwant Singh

24 3 p. 1855-1879
artikel
57 Using independent resource allocation strategies to solve conflicts of Hadoop distributed architecture in virtualization Hsu, Jin-Bang

24 3 p. 1583-1603
artikel
58 Virtual network function placement with bounded migrations Xie, Yanghao

24 3 p. 2355-2366
artikel
59 Wind power prediction based on neural network with optimization of adaptive multi-group salp swarm algorithm Pan, Jeng-Shyang

24 3 p. 2083-2098
artikel
                             59 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland