nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Achieving data privacy for decision support systems in times of massive data sharing
|
Fazal, Rabeeha |
|
|
25 |
5 |
p. 3037-3049 |
artikel |
2 |
A gradient-based optimization approach for task scheduling problem in cloud computing
|
Huang, Xingwang |
|
|
25 |
5 |
p. 3481-3497 |
artikel |
3 |
A high-efficiency learning model for virtual machine placement in mobile edge computing
|
Jian, Chengfeng |
|
|
25 |
5 |
p. 3051-3066 |
artikel |
4 |
An adaptive function placement in serverless computing
|
Xu, Donghong |
|
|
25 |
5 |
p. 3161-3174 |
artikel |
5 |
An enhanced privacy-preserving record linkage approach for multiple databases
|
Han, Shumin |
|
|
25 |
5 |
p. 3641-3652 |
artikel |
6 |
An enhanced smart card and dynamic ID based remote multi-server user authentication scheme
|
Andola, Nitish |
|
|
25 |
5 |
p. 3699-3717 |
artikel |
7 |
An exploration to graphics processing unit spot price prediction
|
Khan, Muhammad |
|
|
25 |
5 |
p. 3499-3515 |
artikel |
8 |
An improved multi-objective imperialist competitive algorithm for surgical case scheduling problem with switching and preparation times
|
Yu, Hui |
|
|
25 |
5 |
p. 3591-3616 |
artikel |
9 |
An intelligent system for blood donation process optimization - smart techniques for minimizing blood wastages
|
AlZu’bi, Shadi |
|
|
25 |
5 |
p. 3617-3627 |
artikel |
10 |
An intelligent technique for pattern-based clustering of continuous-valued datasets
|
Dhull, Anuradha |
|
|
25 |
5 |
p. 3231-3248 |
artikel |
11 |
An object detection algorithm based on the feature pyramid network and single shot multibox detector
|
Wang, Yanni |
|
|
25 |
5 |
p. 3313-3324 |
artikel |
12 |
A novel generalized fuzzy intelligence-based ant lion optimization for internet of things based disease prediction and diagnosis
|
Verma, Ankit |
|
|
25 |
5 |
p. 3283-3298 |
artikel |
13 |
Arrhythmia ventricular fibrillation classification on ECG signal using ensemble feature selection and deep neural network
|
Rajeshwari, M. R. |
|
|
25 |
5 |
p. 3085-3102 |
artikel |
14 |
A two-stage scheduling method for deadline-constrained task in cloud computing
|
He, Xiaojian |
|
|
25 |
5 |
p. 3265-3281 |
artikel |
15 |
A vector convolutional deep autonomous learning classifier for detection of cyber attacks
|
Amma, N. G. Bhuvaneswari |
|
|
25 |
5 |
p. 3447-3458 |
artikel |
16 |
Big data analytics for data-driven industry: a review of data sources, tools, challenges, solutions, and research directions
|
Ikegwu, Anayo Chukwu |
|
|
25 |
5 |
p. 3343-3387 |
artikel |
17 |
BigRC-EML: big-data based ransomware classification using ensemble machine learning
|
Aurangzeb, Sana |
|
|
25 |
5 |
p. 3405-3422 |
artikel |
18 |
Blockchain assisted privacy-preserving public auditable model for cloud environment with efficient user revocation
|
Mishra, Rahul |
|
|
25 |
5 |
p. 3103-3127 |
artikel |
19 |
Channel estimation in 5G multi input multi output wireless communication using optimized deep neural framework
|
Kapula, Prabhakara Rao |
|
|
25 |
5 |
p. 3517-3530 |
artikel |
20 |
Chromosomes identification based differential evolution (CIDE): a new bio-inspired variant for network intrusion detection
|
Nayer, Md. |
|
|
25 |
5 |
p. 3459-3480 |
artikel |
21 |
Clustering of mobile IoT nodes with support for scheduling of time-sensitive applications in fog and cloud layers
|
Akhound, Narges |
|
|
25 |
5 |
p. 3531-3559 |
artikel |
22 |
Correction: Mitigating the worst parent attack in RPL based internet of things
|
Sahay, Rashmi |
|
|
25 |
5 |
p. 3765 |
artikel |
23 |
Data replica placement approaches in fog computing: a review
|
Torabi, Esmaeil |
|
|
25 |
5 |
p. 3561-3589 |
artikel |
24 |
Efficient and privacy-preserving location-based services over the cloud
|
Yadav, Vijay Kumar |
|
|
25 |
5 |
p. 3175-3192 |
artikel |
25 |
Energy efficient load balancing hybrid priority assigned laxity algorithm in fog computing
|
Singh, Simar Preet |
|
|
25 |
5 |
p. 3325-3342 |
artikel |
26 |
Fisher linear discriminant and discrete global swarm based task scheduling in cloud environment
|
Ajitha, K. M. |
|
|
25 |
5 |
p. 3145-3160 |
artikel |
27 |
Generalized asset fairness mechanism for multi-resource fair allocation mechanism with two different types of resources
|
Zhang, Xuejie |
|
|
25 |
5 |
p. 3389-3403 |
artikel |
28 |
Historical data based approach to mitigate stragglers from the Reduce phase of MapReduce in a heterogeneous Hadoop cluster
|
Bawankule, Kamalakant Laxman |
|
|
25 |
5 |
p. 3193-3211 |
artikel |
29 |
Identity-based proof of retrievability meets with identity-based network coding
|
Chen, Yixin |
|
|
25 |
5 |
p. 3067-3083 |
artikel |
30 |
Improved security in cloud using sandpiper and extended equilibrium deep transfer learning based intrusion detection
|
Sreelatha, Gavini |
|
|
25 |
5 |
p. 3129-3144 |
artikel |
31 |
Improving network intrusion detection by identifying effective features based on probabilistic dependency trees and evolutionary algorithm
|
Ajdani, Mahdi |
|
|
25 |
5 |
p. 3299-3311 |
artikel |
32 |
Intelligent energy aware approaches for residential buildings: state-of-the-art review and future directions
|
Kaur, Simarjit |
|
|
25 |
5 |
p. 3653-3670 |
artikel |
33 |
Leveraging a cloud-native architecture to enable semantic interconnectedness of data for cyber threat intelligence
|
Ammi, Meryem |
|
|
25 |
5 |
p. 3629-3640 |
artikel |
34 |
MCPS: a mapping method for MAERI accelerator base on Cartesian Product based Convolution for DNN layers with sparse input feature map
|
Narimanjahan, Babak |
|
|
25 |
5 |
p. 3213-3230 |
artikel |
35 |
Novel bat algorithm for QoS-aware services composition in large scale internet of things
|
Kouicem, Amal |
|
|
25 |
5 |
p. 3683-3697 |
artikel |
36 |
Placement of IoT services in fog environment based on complex network features: a genetic-based approach
|
Azimzadeh, Masomeh |
|
|
25 |
5 |
p. 3423-3445 |
artikel |
37 |
RSM analysis based cloud access security broker: a systematic literature review
|
Ahmad, Shahnawaz |
|
|
25 |
5 |
p. 3733-3763 |
artikel |
38 |
SMAD: SMart assistant during and after a medical emergency case based on deep learning sentiment analysis
|
Ouerhani, Nourchène |
|
|
25 |
5 |
p. 3671-3681 |
artikel |
39 |
The research and analysis of efficiency of hardware usage base on HDFS
|
Liu, Yun |
|
|
25 |
5 |
p. 3719-3732 |
artikel |
40 |
Weighted spatial skyline queries with distributed dominance tests
|
Gavagsaz, Elaheh |
|
|
25 |
5 |
p. 3249-3264 |
artikel |