nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Adaptive Packet-size Control for Improved Throughput in Dynamic Access Networks
|
Bany Salameh, Haythem |
|
|
24 |
3 |
p. 1935-1944 |
artikel |
2 |
A divide and conquer approach to deadline constrained cost-optimization workflow scheduling for the cloud
|
Khojasteh Toussi, Ghazaleh |
|
|
24 |
3 |
p. 1711-1733 |
artikel |
3 |
A fault tolerant routing scheme for advanced metering infrastructure: an approach towards smart grid
|
Mohapatra, Hitesh |
|
|
24 |
3 |
p. 2193-2211 |
artikel |
4 |
A hybrid block-based ensemble framework for the multi-class problem to react to different types of drifts
|
Mahdi, Osama A. |
|
|
24 |
3 |
p. 2327-2340 |
artikel |
5 |
A microservices persistence technique for cloud-based online social data analysis
|
Al-Obeidat, Feras |
|
|
24 |
3 |
p. 2341-2353 |
artikel |
6 |
A multi-layer trust-based middleware framework for handling interoperability issues in heterogeneous IOTs
|
Abbasi, Mohammad Asad |
|
|
24 |
3 |
p. 2133-2160 |
artikel |
7 |
An effective meta-heuristic based multi-objective hybrid optimization method for workflow scheduling in cloud computing environment
|
Kakkottakath Valappil Thekkepuryil, Jabir |
|
|
24 |
3 |
p. 2367-2384 |
artikel |
8 |
An efficient heterogeneous blockchain-based online/offline signcryption systems for internet of vehicles
|
Elkhalil, Ahmed |
|
|
24 |
3 |
p. 2051-2068 |
artikel |
9 |
A new cloud-based classification methodology (CBCM) for efficient semantic web service discovery
|
Alshafaey, Mohamed S. |
|
|
24 |
3 |
p. 2269-2292 |
artikel |
10 |
A novel controller placement algorithm based on network portioning concept and a hybrid discrete optimization algorithm for multi-controller software-defined networks
|
Firouz, Nasrin |
|
|
24 |
3 |
p. 2511-2544 |
artikel |
11 |
A novel feature selection method for data mining tasks using hybrid Sine Cosine Algorithm and Genetic Algorithm
|
Abualigah, Laith |
|
|
24 |
3 |
p. 2161-2176 |
artikel |
12 |
A path planning method based on the particle swarm optimization trained fuzzy neural network algorithm
|
Liu, Xiao-huan |
|
|
24 |
3 |
p. 1901-1915 |
artikel |
13 |
A power and thermal-aware virtual machine management framework based on machine learning
|
Xiao, Peng |
|
|
24 |
3 |
p. 2231-2248 |
artikel |
14 |
A request aware module using CS-IDR to reduce VM level collateral damages caused by DDoS attack in cloud environment
|
Verma, Priyanka |
|
|
24 |
3 |
p. 1917-1933 |
artikel |
15 |
A robust blind medical image watermarking approach for telemedicine applications
|
Kahlessenane, Fares |
|
|
24 |
3 |
p. 2069-2082 |
artikel |
16 |
Auto-scaling techniques for IoT-based cloud applications: a review
|
Verma, Shveta |
|
|
24 |
3 |
p. 2425-2459 |
artikel |
17 |
Availability and reliability analysis of cloud computing under economic denial of sustainability (EDoS) attack: a semi-Markov approach
|
Lalropuia, K. C. |
|
|
24 |
3 |
p. 2177-2191 |
artikel |
18 |
Building an efficient intrusion detection system using grasshopper optimization algorithm for anomaly detection
|
Dwivedi, Shubhra |
|
|
24 |
3 |
p. 1881-1900 |
artikel |
19 |
Cloud-based intrusion detection using kernel fuzzy clustering and optimal type-2 fuzzy neural network
|
Srilatha, Doddi |
|
|
24 |
3 |
p. 2657-2672 |
artikel |
20 |
CUDAQuat: new parallel framework for fast computation of quaternion moments for color images applications
|
Hosny, Khalid M. |
|
|
24 |
3 |
p. 2385-2406 |
artikel |
21 |
Data replication schemes in cloud computing: a survey
|
Shakarami, Ali |
|
|
24 |
3 |
p. 2545-2579 |
artikel |
22 |
Delay-aware optimization of energy consumption for task offloading in fog environments using metaheuristic algorithms
|
Keshavarznejad, Maryam |
|
|
24 |
3 |
p. 1825-1853 |
artikel |
23 |
Distributed anomaly detection using concept drift detection based hybrid ensemble techniques in streamed network data
|
Jain, Meenal |
|
|
24 |
3 |
p. 2099-2114 |
artikel |
24 |
DLBench: a comprehensive experimental evaluation of deep learning frameworks
|
Elshawi, Radwa |
|
|
24 |
3 |
p. 2017-2038 |
artikel |
25 |
Dynamic provisioning with structure inspired selection and limitation of VMs based cost-time efficient workflow scheduling in the cloud
|
Ndamlabin Mboula, Jean Etienne |
|
|
24 |
3 |
p. 2697-2721 |
artikel |
26 |
Early DGA-based botnet identification: pushing detection to the edges
|
Zago, Mattia |
|
|
24 |
3 |
p. 1695-1710 |
artikel |
27 |
Efficient feature selection and classification through ensemble method for network intrusion detection on cloud computing
|
Krishnaveni, S. |
|
|
24 |
3 |
p. 1761-1779 |
artikel |
28 |
Efficient TPA-based auditing scheme for secure cloud storage
|
Shao, Bilin |
|
|
24 |
3 |
p. 1989-2000 |
artikel |
29 |
Energy and cost trade-off for computational tasks offloading in mobile multi-tenant clouds
|
Patel, Yashwant Singh |
|
|
24 |
3 |
p. 1793-1824 |
artikel |
30 |
Energy-aware routing considering load balancing for SDN: a minimum graph-based Ant Colony Optimization
|
Torkzadeh, Samaneh |
|
|
24 |
3 |
p. 2293-2312 |
artikel |
31 |
Enhancing service maintainability by monitoring and auditing SLA in cloud computing
|
Viegas, Eduardo |
|
|
24 |
3 |
p. 1659-1674 |
artikel |
32 |
Fair hop-by-hop interest rate control to mitigate congestion in named data networks
|
Touati, Haifa |
|
|
24 |
3 |
p. 2213-2230 |
artikel |
33 |
FastTTPS: fast approach for video transcoding time prediction and scheduling for HTTP adaptive streaming videos
|
Agrawal, Prateek |
|
|
24 |
3 |
p. 1605-1621 |
artikel |
34 |
FFED: a novel strategy based on fast entropy to detect attacks against trust computing in cloud
|
Guesmi, Houda |
|
|
24 |
3 |
p. 1945-1954 |
artikel |
35 |
Flow based anomaly intrusion detection system using ensemble classifier with Feature Impact Scale
|
Jyothsna, V. |
|
|
24 |
3 |
p. 2461-2478 |
artikel |
36 |
Improving the fault-tolerance of software-defined networks with dynamic overlay agreement
|
Hsieh, Hui-Ching |
|
|
24 |
3 |
p. 2597-2614 |
artikel |
37 |
Managing overloaded hosts for energy-efficiency in cloud data centers
|
Yadav, Rahul |
|
|
24 |
3 |
p. 2001-2015 |
artikel |
38 |
MHB*T based dynamic data integrity auditing in cloud storage
|
Luo, Wei |
|
|
24 |
3 |
p. 2115-2132 |
artikel |
39 |
Middleware-based multi-agent development environment for building and testing distributed intelligent systems
|
Aguayo-Canela, Francisco José |
|
|
24 |
3 |
p. 2313-2325 |
artikel |
40 |
Mutual authentication scheme of IoT devices in fog computing environment
|
Singh, Sunakshi |
|
|
24 |
3 |
p. 1643-1657 |
artikel |
41 |
Nash equilibrium and social optimization in cloud service systems with diverse users
|
Fu, Liwei |
|
|
24 |
3 |
p. 2039-2050 |
artikel |
42 |
Novel trust evaluation using NSGA-III based adaptive neuro-fuzzy inference system
|
Kaur, Jasleen |
|
|
24 |
3 |
p. 1781-1792 |
artikel |
43 |
Online sequential extreme studentized deviate tests for anomaly detection in streaming data with varying patterns
|
Ryu, Minho |
|
|
24 |
3 |
p. 1975-1987 |
artikel |
44 |
OPSA: an optimized prediction based scheduling approach for scientific applications in cloud environment
|
Kaur, Gurleen |
|
|
24 |
3 |
p. 1955-1974 |
artikel |
45 |
Performance evaluation of grouping and regrouping scheme for mitigating hidden station problem in IEEE 802.11ah network
|
Gopinath, A. Justin |
|
|
24 |
3 |
p. 1623-1642 |
artikel |
46 |
PLB: a resilient and adaptive task scheduling scheme based on multi-queues for cloud environment
|
Sharma, Gaurav |
|
|
24 |
3 |
p. 2615-2637 |
artikel |
47 |
Principal component based support vector machine (PC-SVM): a hybrid technique for software defect detection
|
Mustaqeem, Mohd. |
|
|
24 |
3 |
p. 2581-2595 |
artikel |
48 |
Real time UAV path planning by parallel grey wolf optimization with align coefficient on CAN bus
|
Jamshidi, Vahid |
|
|
24 |
3 |
p. 2495-2509 |
artikel |
49 |
Resource allocation mechanisms for maximizing provider’s revenue in infrastructure as a service (IaaS) cloud
|
Shokri Habashi, Fateme |
|
|
24 |
3 |
p. 2407-2423 |
artikel |
50 |
SaMW: a probabilistic meta-heuristic algorithm for job scheduling in heterogeneous distributed systems powered by microservices
|
Tychalas, Dimitrios |
|
|
24 |
3 |
p. 1735-1759 |
artikel |
51 |
ScalaParBiBit: scaling the binary biclustering in distributed-memory systems
|
Fraguela, Basilio B. |
|
|
24 |
3 |
p. 2249-2268 |
artikel |
52 |
Security-SLA-guaranteed service function chain deployment in cloud-fog computing networks
|
Zhao, Dongcheng |
|
|
24 |
3 |
p. 2479-2494 |
artikel |
53 |
Smart contract based policies for the Internet of Things
|
Puri, Vikram |
|
|
24 |
3 |
p. 1675-1694 |
artikel |
54 |
TC3PoP: a time-cost compromised workflow scheduling heuristic customized for cloud environments
|
Mollajafari, Morteza |
|
|
24 |
3 |
p. 2639-2656 |
artikel |
55 |
The importance of nature-inspired meta-heuristic algorithms for solving virtual machine consolidation problem in cloud environments
|
Pourghebleh, Behrouz |
|
|
24 |
3 |
p. 2673-2696 |
artikel |
56 |
Truthful online double auction based dynamic resource provisioning for multi-objective trade-offs in IaaS clouds
|
Patel, Yashwant Singh |
|
|
24 |
3 |
p. 1855-1879 |
artikel |
57 |
Using independent resource allocation strategies to solve conflicts of Hadoop distributed architecture in virtualization
|
Hsu, Jin-Bang |
|
|
24 |
3 |
p. 1583-1603 |
artikel |
58 |
Virtual network function placement with bounded migrations
|
Xie, Yanghao |
|
|
24 |
3 |
p. 2355-2366 |
artikel |
59 |
Wind power prediction based on neural network with optimization of adaptive multi-group salp swarm algorithm
|
Pan, Jeng-Shyang |
|
|
24 |
3 |
p. 2083-2098 |
artikel |