Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             40 results found
no title author magazine year volume issue page(s) type
1 Adaptive learning style prediction in e-learning environment using levy flight distribution based CNN model Alshmrany, Sami

25 1 p. 523-536
article
2 A fuzzy approach for optimal placement of IoT applications in fog-cloud computing Tavousi, Farhad

25 1 p. 303-320
article
3 An analytical framework with border effects to estimate the connectivity performance of finite multihop networks in shadowing environments Nagar, Jaiprakash

25 1 p. 187-202
article
4 An efficient scheduling algorithm using queuing system to minimize starvation of non-real-time secondary users in Cognitive Radio Network Suganthi, N.

25 1 p. 1-11
article
5 A new clustering-based routing method in the mobile internet of things using a krill herd algorithm Sadrishojaei, Mahyar

25 1 p. 351-361
article
6 A new traffic congestion prediction strategy (TCPS) based on edge computing Kishk, Aya M.

25 1 p. 49-75
article
7 An in-depth and systematic literature review on the blockchain-based approaches for cloud computing Gong, Jianhu

25 1 p. 383-400
article
8 A secure lossless recovery for medical images based on image encoding and data self-embedding Gao, Hang

25 1 p. 707-725
article
9 A source-driven reinforcement learning-based Data reply strategy to reduce communication overhead in Named Data Networks (NDN) Iqbal, Shahid Md. Asif

25 1 p. 647-673
article
10 A stacked deep learning approach to cyber-attacks detection in industrial systems: application to power system and gas pipeline systems Wang, Wu

25 1 p. 561-578
article
11 Attack and improvement of the recent identity-based encryption with authorized equivalence test in cluster computing Choi, Seongbong

25 1 p. 633-646
article
12 A two-stage virtual machine abnormal behavior-based anomaly detection mechanism Zhang, Hancui

25 1 p. 203-214
article
13 Best-KFF: a multi-objective preemptive resource allocation policy for cloud computing systems Fathalla, Ahmed

25 1 p. 321-336
article
14 Blockchain-assisted authentication and key agreement scheme for fog-based smart grid Tomar, Ashish

25 1 p. 451-468
article
15 Blockchain-enabled real-time SLA monitoring for cloud-hosted services Khan, Kashif Mehboob

25 1 p. 537-559
article
16 Combined use of coral reefs optimization and multi-agent deep Q-network for energy-aware resource provisioning in cloud data centers using DVFS technique Asghari, Ali

25 1 p. 119-140
article
17 Cost-aware job scheduling for cloud instances using deep reinforcement learning Cheng, Feng

25 1 p. 619-631
article
18 cuGimli: optimized implementation of the Gimli authenticated encryption and hash function on GPU for IoT applications Han, KyungHyun

25 1 p. 433-450
article
19 Efficient cloud service ranking based on uncertain user requirements Nejat, Mohammad Hossein

25 1 p. 485-502
article
20 Energy efficiency in cloud computing data center: a survey on hardware technologies Katal, Avita

25 1 p. 675-705
article
21 Evaluation of adversarial machine learning tools for securing AI systems Asha, S.

25 1 p. 503-522
article
22 Feasibility of P2P-STB based crowdsourcing to speed-up photo classification for natural disasters Loor, Fernando

25 1 p. 279-302
article
23 Flexible identity-based remote data integrity checking for cloud storage with privacy preserving property Ji, Yanyan

25 1 p. 337-349
article
24 Hybrid fragmentation of medical images’ attributes for multidimensional indexing Safaei, Ali Asghar

25 1 p. 215-230
article
25 Indoor objects detection system implementation using multi-graphic processing units Afif, Mouna

25 1 p. 469-483
article
26 K-Scheduler: dynamic intra-SM multitasking management with execution profiles on GPUs Kim, Sejin

25 1 p. 597-617
article
27 LPM2DA: a lattice-based privacy-preserving multi-functional and multi-dimensional data aggregation scheme for smart grid Darzi, Saleh

25 1 p. 263-278
article
28 Minimizing delay in content-centric networks using heuristics-based in-network caching Kumar, Sumit

25 1 p. 417-431
article
29 Multi-objective Task Scheduling in cloud-fog computing using goal programming approach Najafizadeh, Abbas

25 1 p. 141-165
article
30 Multi-objective workflow scheduling in cloud computing: trade-off between makespan and cost Belgacem, Ali

25 1 p. 579-595
article
31 Noise-based cyberattacks generating fake P300 waves in brain–computer interfaces Martínez Beltrán, Enrique Tomás

25 1 p. 33-48
article
32 Privacy-preserving content-based image retrieval in edge environment Yan, Yuejing

25 1 p. 363-381
article
33 Replication management in peer-to-peer cloud storage systems Majed, Ali

25 1 p. 401-416
article
34 Research on sports training model based on intelligent data aggregation processing in internet of things Dan, Juan

25 1 p. 727-734
article
35 SHARE-ABE: an efficient and secure data sharing framework based on ciphertext-policy attribute-based encryption and Fog computing Saidi, Ahmed

25 1 p. 167-185
article
36 Simulation-based regression analysis for the replenishment strategy of the crane & shuttle-based storage and retrieval system Ma, Wenkai

25 1 p. 77-89
article
37 Software architecture for IoT-based health-care systems with cloud/fog service model Hajvali, Masoumeh

25 1 p. 91-118
article
38 Task placement for crowd recognition in edge-cloud based urban intelligent video systems Zhang, Gaofeng

25 1 p. 249-262
article
39 The optimal privacy strategy of cloud service based on evolutionary game Sun, Pan Jun

25 1 p. 13-31
article
40 Towards the availability of video communication in artificial intelligence-based computer vision systems utilizing a multi-objective function Sharrab, Yousef O.

25 1 p. 231-247
article
                             40 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands