nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Adaptive learning style prediction in e-learning environment using levy flight distribution based CNN model
|
Alshmrany, Sami |
|
|
25 |
1 |
p. 523-536 |
artikel |
2 |
A fuzzy approach for optimal placement of IoT applications in fog-cloud computing
|
Tavousi, Farhad |
|
|
25 |
1 |
p. 303-320 |
artikel |
3 |
An analytical framework with border effects to estimate the connectivity performance of finite multihop networks in shadowing environments
|
Nagar, Jaiprakash |
|
|
25 |
1 |
p. 187-202 |
artikel |
4 |
An efficient scheduling algorithm using queuing system to minimize starvation of non-real-time secondary users in Cognitive Radio Network
|
Suganthi, N. |
|
|
25 |
1 |
p. 1-11 |
artikel |
5 |
A new clustering-based routing method in the mobile internet of things using a krill herd algorithm
|
Sadrishojaei, Mahyar |
|
|
25 |
1 |
p. 351-361 |
artikel |
6 |
A new traffic congestion prediction strategy (TCPS) based on edge computing
|
Kishk, Aya M. |
|
|
25 |
1 |
p. 49-75 |
artikel |
7 |
An in-depth and systematic literature review on the blockchain-based approaches for cloud computing
|
Gong, Jianhu |
|
|
25 |
1 |
p. 383-400 |
artikel |
8 |
A secure lossless recovery for medical images based on image encoding and data self-embedding
|
Gao, Hang |
|
|
25 |
1 |
p. 707-725 |
artikel |
9 |
A source-driven reinforcement learning-based Data reply strategy to reduce communication overhead in Named Data Networks (NDN)
|
Iqbal, Shahid Md. Asif |
|
|
25 |
1 |
p. 647-673 |
artikel |
10 |
A stacked deep learning approach to cyber-attacks detection in industrial systems: application to power system and gas pipeline systems
|
Wang, Wu |
|
|
25 |
1 |
p. 561-578 |
artikel |
11 |
Attack and improvement of the recent identity-based encryption with authorized equivalence test in cluster computing
|
Choi, Seongbong |
|
|
25 |
1 |
p. 633-646 |
artikel |
12 |
A two-stage virtual machine abnormal behavior-based anomaly detection mechanism
|
Zhang, Hancui |
|
|
25 |
1 |
p. 203-214 |
artikel |
13 |
Best-KFF: a multi-objective preemptive resource allocation policy for cloud computing systems
|
Fathalla, Ahmed |
|
|
25 |
1 |
p. 321-336 |
artikel |
14 |
Blockchain-assisted authentication and key agreement scheme for fog-based smart grid
|
Tomar, Ashish |
|
|
25 |
1 |
p. 451-468 |
artikel |
15 |
Blockchain-enabled real-time SLA monitoring for cloud-hosted services
|
Khan, Kashif Mehboob |
|
|
25 |
1 |
p. 537-559 |
artikel |
16 |
Combined use of coral reefs optimization and multi-agent deep Q-network for energy-aware resource provisioning in cloud data centers using DVFS technique
|
Asghari, Ali |
|
|
25 |
1 |
p. 119-140 |
artikel |
17 |
Cost-aware job scheduling for cloud instances using deep reinforcement learning
|
Cheng, Feng |
|
|
25 |
1 |
p. 619-631 |
artikel |
18 |
cuGimli: optimized implementation of the Gimli authenticated encryption and hash function on GPU for IoT applications
|
Han, KyungHyun |
|
|
25 |
1 |
p. 433-450 |
artikel |
19 |
Efficient cloud service ranking based on uncertain user requirements
|
Nejat, Mohammad Hossein |
|
|
25 |
1 |
p. 485-502 |
artikel |
20 |
Energy efficiency in cloud computing data center: a survey on hardware technologies
|
Katal, Avita |
|
|
25 |
1 |
p. 675-705 |
artikel |
21 |
Evaluation of adversarial machine learning tools for securing AI systems
|
Asha, S. |
|
|
25 |
1 |
p. 503-522 |
artikel |
22 |
Feasibility of P2P-STB based crowdsourcing to speed-up photo classification for natural disasters
|
Loor, Fernando |
|
|
25 |
1 |
p. 279-302 |
artikel |
23 |
Flexible identity-based remote data integrity checking for cloud storage with privacy preserving property
|
Ji, Yanyan |
|
|
25 |
1 |
p. 337-349 |
artikel |
24 |
Hybrid fragmentation of medical images’ attributes for multidimensional indexing
|
Safaei, Ali Asghar |
|
|
25 |
1 |
p. 215-230 |
artikel |
25 |
Indoor objects detection system implementation using multi-graphic processing units
|
Afif, Mouna |
|
|
25 |
1 |
p. 469-483 |
artikel |
26 |
K-Scheduler: dynamic intra-SM multitasking management with execution profiles on GPUs
|
Kim, Sejin |
|
|
25 |
1 |
p. 597-617 |
artikel |
27 |
LPM2DA: a lattice-based privacy-preserving multi-functional and multi-dimensional data aggregation scheme for smart grid
|
Darzi, Saleh |
|
|
25 |
1 |
p. 263-278 |
artikel |
28 |
Minimizing delay in content-centric networks using heuristics-based in-network caching
|
Kumar, Sumit |
|
|
25 |
1 |
p. 417-431 |
artikel |
29 |
Multi-objective Task Scheduling in cloud-fog computing using goal programming approach
|
Najafizadeh, Abbas |
|
|
25 |
1 |
p. 141-165 |
artikel |
30 |
Multi-objective workflow scheduling in cloud computing: trade-off between makespan and cost
|
Belgacem, Ali |
|
|
25 |
1 |
p. 579-595 |
artikel |
31 |
Noise-based cyberattacks generating fake P300 waves in brain–computer interfaces
|
Martínez Beltrán, Enrique Tomás |
|
|
25 |
1 |
p. 33-48 |
artikel |
32 |
Privacy-preserving content-based image retrieval in edge environment
|
Yan, Yuejing |
|
|
25 |
1 |
p. 363-381 |
artikel |
33 |
Replication management in peer-to-peer cloud storage systems
|
Majed, Ali |
|
|
25 |
1 |
p. 401-416 |
artikel |
34 |
Research on sports training model based on intelligent data aggregation processing in internet of things
|
Dan, Juan |
|
|
25 |
1 |
p. 727-734 |
artikel |
35 |
SHARE-ABE: an efficient and secure data sharing framework based on ciphertext-policy attribute-based encryption and Fog computing
|
Saidi, Ahmed |
|
|
25 |
1 |
p. 167-185 |
artikel |
36 |
Simulation-based regression analysis for the replenishment strategy of the crane & shuttle-based storage and retrieval system
|
Ma, Wenkai |
|
|
25 |
1 |
p. 77-89 |
artikel |
37 |
Software architecture for IoT-based health-care systems with cloud/fog service model
|
Hajvali, Masoumeh |
|
|
25 |
1 |
p. 91-118 |
artikel |
38 |
Task placement for crowd recognition in edge-cloud based urban intelligent video systems
|
Zhang, Gaofeng |
|
|
25 |
1 |
p. 249-262 |
artikel |
39 |
The optimal privacy strategy of cloud service based on evolutionary game
|
Sun, Pan Jun |
|
|
25 |
1 |
p. 13-31 |
artikel |
40 |
Towards the availability of video communication in artificial intelligence-based computer vision systems utilizing a multi-objective function
|
Sharrab, Yousef O. |
|
|
25 |
1 |
p. 231-247 |
artikel |