nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Adaptive parallel applications: from shared memory architectures to fog computing (2002–2022)
|
Galante, Guilherme |
|
|
25 |
6 |
p. 4439-4461 |
artikel |
2 |
Adaptive PCA-based feature drift detection using statistical measure
|
Agrahari, Supriya |
|
|
25 |
6 |
p. 4481-4494 |
artikel |
3 |
A framework for evaluating cloud computing services using AHP and TOPSIS approaches with interval valued spherical fuzzy sets
|
Monika, |
|
|
25 |
6 |
p. 4383-4396 |
artikel |
4 |
A mixed sine cosine butterfly optimization algorithm for global optimization and its application
|
Sharma, Sushmita |
|
|
25 |
6 |
p. 4573-4600 |
artikel |
5 |
An approach of multi-objective computing task offloading scheduling based NSGS for IOV in 5G
|
Zhang, Jie |
|
|
25 |
6 |
p. 4203-4219 |
artikel |
6 |
An efficient fuzzy inference system based approximated anisotropic diffusion for image de-noising
|
Thakur, Niveditta |
|
|
25 |
6 |
p. 4303-4323 |
artikel |
7 |
An efficient resource provisioning algorithm for workflow execution in cloud platform
|
Kumar, Madhu Sudan |
|
|
25 |
6 |
p. 4233-4255 |
artikel |
8 |
A new approach for mechanical parameter inversion analysis of roller compacted concrete dams using modified PSO and RBFNN
|
Zhang, Wenbing |
|
|
25 |
6 |
p. 4633-4652 |
artikel |
9 |
An identity-based public auditing protocol in cloud-assisted IoT
|
Ramezani, Asal |
|
|
25 |
6 |
p. 4339-4354 |
artikel |
10 |
An improved bacterial colony optimization using opposition-based learning for data clustering
|
Prakash, V. S. |
|
|
25 |
6 |
p. 4009-4025 |
artikel |
11 |
An intelligent cyber security phishing detection system using deep learning techniques
|
Mughaid, Ala |
|
|
25 |
6 |
p. 3819-3828 |
artikel |
12 |
A novel deep reinforcement learning scheme for task scheduling in cloud computing
|
Siddesha, K. |
|
|
25 |
6 |
p. 4171-4188 |
artikel |
13 |
A novel link-based Multi-objective Grey Wolf Optimizer for Appliances Energy Scheduling Problem
|
Makhadmeh, Sharif Naser |
|
|
25 |
6 |
p. 4355-4382 |
artikel |
14 |
A novel trust prediction approach for online social networks based on multifaceted feature similarity
|
Jethava, Gordhan |
|
|
25 |
6 |
p. 3829-3843 |
artikel |
15 |
A survey of blockchain applications in sustainable and smart cities
|
Makani, Shanmukha |
|
|
25 |
6 |
p. 3915-3936 |
artikel |
16 |
Attribute-based data access control scheme with secure revocation in fog computing for smart grid
|
Wu, Zhiwei |
|
|
25 |
6 |
p. 3899-3913 |
artikel |
17 |
Big data dimensionality reduction techniques in IoT: review, applications and open research challenges
|
Rani, Ridhima |
|
|
25 |
6 |
p. 4027-4049 |
artikel |
18 |
Blockchain-based secure data transmission for internet of underwater things
|
Razzaq, Abdul |
|
|
25 |
6 |
p. 4495-4514 |
artikel |
19 |
Clustering for smart cities in the internet of things: a review
|
Hosseinzadeh, Mehdi |
|
|
25 |
6 |
p. 4097-4127 |
artikel |
20 |
Correction: Towards a distributed SaaS management system in a multi-cloud environment
|
Ouchaou, Linda |
|
|
25 |
6 |
p. 4073 |
artikel |
21 |
Data governance through a multi-DLT architecture in view of the GDPR
|
Zichichi, Mirko |
|
|
25 |
6 |
p. 4515-4542 |
artikel |
22 |
Design and implementation of dynamic I/O control scheme for large scale distributed file systems
|
Kim, Sunggon |
|
|
25 |
6 |
p. 4423-4438 |
artikel |
23 |
Detecting malicious transactions in database using hybrid metaheuristic clustering and frequent sequential pattern mining
|
Jindal, Rajni |
|
|
25 |
6 |
p. 3937-3959 |
artikel |
24 |
DOCEA/D: Dual-Operator-based Constrained many-objective Evolutionary Algorithm based on Decomposition
|
Qasim, Syed Zaffar |
|
|
25 |
6 |
p. 4151-4169 |
artikel |
25 |
Efficient greedy heuristic approach for fault-tolerant distributed controller placement in scalable SDN architecture
|
Salam, Rakesh |
|
|
25 |
6 |
p. 4543-4572 |
artikel |
26 |
Energy-aware scientific workflow scheduling in cloud environment
|
Choudhary, Anita |
|
|
25 |
6 |
p. 3845-3874 |
artikel |
27 |
Federated recommenders: methods, challenges and future
|
Alamgir, Zareen |
|
|
25 |
6 |
p. 4075-4096 |
artikel |
28 |
Hash time locked contract based asset exchange solution for probabilistic public blockchains
|
Monika, |
|
|
25 |
6 |
p. 4189-4201 |
artikel |
29 |
Integration of blockchain and collaborative intrusion detection for secure data transactions in industrial IoT: a survey
|
Mathew, Sujith Samuel |
|
|
25 |
6 |
p. 4129-4149 |
artikel |
30 |
Lightweight image super-resolution with feature cheap convolution and attention mechanism
|
Yang, Xin |
|
|
25 |
6 |
p. 3977-3992 |
artikel |
31 |
Multi-level just-enough elasticity for MQTT brokers of Internet of Things applications
|
Pham, Linh Manh |
|
|
25 |
6 |
p. 3961-3976 |
artikel |
32 |
Multi-objective optimization-based privacy in data mining
|
Bhuyan, Hemanta Kumar |
|
|
25 |
6 |
p. 4275-4287 |
artikel |
33 |
Nash equilibrium and social optimization of a task offloading strategy with real-time virtual machine repair in an edge computing system
|
Guo, Xiaobing |
|
|
25 |
6 |
p. 3785-3797 |
artikel |
34 |
Natural language why-question in Business Intelligence applications: model and recommendation approach
|
Guessoum, Meriem Amel |
|
|
25 |
6 |
p. 3875-3898 |
artikel |
35 |
Optimized task scheduling in cloud computing using improved multi-verse optimizer
|
Otair, Mohammed |
|
|
25 |
6 |
p. 4221-4232 |
artikel |
36 |
PartEclat: an improved Eclat-based frequent itemset mining algorithm on spark clusters using partition technique
|
Raj, Shashi |
|
|
25 |
6 |
p. 4463-4480 |
artikel |
37 |
Performance analysis of P2P networks with malicious nodes
|
Ma, Zhanyou |
|
|
25 |
6 |
p. 4325-4337 |
artikel |
38 |
Performance evaluation of deep neural network on malware detection: visual feature approach
|
Anandhi, V. |
|
|
25 |
6 |
p. 4601-4615 |
artikel |
39 |
QoS-aware online scheduling of multiple workflows under task execution time uncertainty in clouds
|
Taghinezhad-Niar, Ahmad |
|
|
25 |
6 |
p. 3767-3784 |
artikel |
40 |
Real-time event detection and classification in social text steam using embedding
|
Singh, Tajinder |
|
|
25 |
6 |
p. 3799-3817 |
artikel |
41 |
Research on a new power distribution control strategy of hybrid energy storage system for hybrid electric vehicles based on the subtractive clustering and adaptive fuzzy neural network
|
Wang, Qi |
|
|
25 |
6 |
p. 4413-4422 |
artikel |
42 |
RS-chain: a decentralized reputation-sharing framework for group-buying industry via hybrid blockchain
|
Chen, Yungui |
|
|
25 |
6 |
p. 4617-4632 |
artikel |
43 |
Survey of Techniques on Data Leakage Protection and Methods to address the Insider threat
|
Herrera Montano, Isabel |
|
|
25 |
6 |
p. 4289-4302 |
artikel |
44 |
Towards a distributed SaaS management system in a multi-cloud environment
|
Ouchaou, Linda |
|
|
25 |
6 |
p. 4051-4071 |
artikel |
45 |
TPEL: Task possible execution level for effective scheduling in fog–cloud environment
|
Alizadeh, Mohammad Reza |
|
|
25 |
6 |
p. 4653-4672 |
artikel |
46 |
TRAP: task-resource adaptive pairing for efficient scheduling in fog computing
|
Kaur, Navjeet |
|
|
25 |
6 |
p. 4257-4273 |
artikel |
47 |
User behavior analysis based on edge evolutionary game model in social network
|
Chen, Jing |
|
|
25 |
6 |
p. 4397-4412 |
artikel |
48 |
Visualization of aspect-oriented programs using city transportation metaphor
|
Wedyan, Fadi |
|
|
25 |
6 |
p. 3993-4008 |
artikel |