Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             48 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Adaptive parallel applications: from shared memory architectures to fog computing (2002–2022) Galante, Guilherme

25 6 p. 4439-4461
artikel
2 Adaptive PCA-based feature drift detection using statistical measure Agrahari, Supriya

25 6 p. 4481-4494
artikel
3 A framework for evaluating cloud computing services using AHP and TOPSIS approaches with interval valued spherical fuzzy sets Monika,

25 6 p. 4383-4396
artikel
4 A mixed sine cosine butterfly optimization algorithm for global optimization and its application Sharma, Sushmita

25 6 p. 4573-4600
artikel
5 An approach of multi-objective computing task offloading scheduling based NSGS for IOV in 5G Zhang, Jie

25 6 p. 4203-4219
artikel
6 An efficient fuzzy inference system based approximated anisotropic diffusion for image de-noising Thakur, Niveditta

25 6 p. 4303-4323
artikel
7 An efficient resource provisioning algorithm for workflow execution in cloud platform Kumar, Madhu Sudan

25 6 p. 4233-4255
artikel
8 A new approach for mechanical parameter inversion analysis of roller compacted concrete dams using modified PSO and RBFNN Zhang, Wenbing

25 6 p. 4633-4652
artikel
9 An identity-based public auditing protocol in cloud-assisted IoT Ramezani, Asal

25 6 p. 4339-4354
artikel
10 An improved bacterial colony optimization using opposition-based learning for data clustering Prakash, V. S.

25 6 p. 4009-4025
artikel
11 An intelligent cyber security phishing detection system using deep learning techniques Mughaid, Ala

25 6 p. 3819-3828
artikel
12 A novel deep reinforcement learning scheme for task scheduling in cloud computing Siddesha, K.

25 6 p. 4171-4188
artikel
13 A novel link-based Multi-objective Grey Wolf Optimizer for Appliances Energy Scheduling Problem Makhadmeh, Sharif Naser

25 6 p. 4355-4382
artikel
14 A novel trust prediction approach for online social networks based on multifaceted feature similarity Jethava, Gordhan

25 6 p. 3829-3843
artikel
15 A survey of blockchain applications in sustainable and smart cities Makani, Shanmukha

25 6 p. 3915-3936
artikel
16 Attribute-based data access control scheme with secure revocation in fog computing for smart grid Wu, Zhiwei

25 6 p. 3899-3913
artikel
17 Big data dimensionality reduction techniques in IoT: review, applications and open research challenges Rani, Ridhima

25 6 p. 4027-4049
artikel
18 Blockchain-based secure data transmission for internet of underwater things Razzaq, Abdul

25 6 p. 4495-4514
artikel
19 Clustering for smart cities in the internet of things: a review Hosseinzadeh, Mehdi

25 6 p. 4097-4127
artikel
20 Correction: Towards a distributed SaaS management system in a multi-cloud environment Ouchaou, Linda

25 6 p. 4073
artikel
21 Data governance through a multi-DLT architecture in view of the GDPR Zichichi, Mirko

25 6 p. 4515-4542
artikel
22 Design and implementation of dynamic I/O control scheme for large scale distributed file systems Kim, Sunggon

25 6 p. 4423-4438
artikel
23 Detecting malicious transactions in database using hybrid metaheuristic clustering and frequent sequential pattern mining Jindal, Rajni

25 6 p. 3937-3959
artikel
24 DOCEA/D: Dual-Operator-based Constrained many-objective Evolutionary Algorithm based on Decomposition Qasim, Syed Zaffar

25 6 p. 4151-4169
artikel
25 Efficient greedy heuristic approach for fault-tolerant distributed controller placement in scalable SDN architecture Salam, Rakesh

25 6 p. 4543-4572
artikel
26 Energy-aware scientific workflow scheduling in cloud environment Choudhary, Anita

25 6 p. 3845-3874
artikel
27 Federated recommenders: methods, challenges and future Alamgir, Zareen

25 6 p. 4075-4096
artikel
28 Hash time locked contract based asset exchange solution for probabilistic public blockchains Monika,

25 6 p. 4189-4201
artikel
29 Integration of blockchain and collaborative intrusion detection for secure data transactions in industrial IoT: a survey Mathew, Sujith Samuel

25 6 p. 4129-4149
artikel
30 Lightweight image super-resolution with feature cheap convolution and attention mechanism Yang, Xin

25 6 p. 3977-3992
artikel
31 Multi-level just-enough elasticity for MQTT brokers of Internet of Things applications Pham, Linh Manh

25 6 p. 3961-3976
artikel
32 Multi-objective optimization-based privacy in data mining Bhuyan, Hemanta Kumar

25 6 p. 4275-4287
artikel
33 Nash equilibrium and social optimization of a task offloading strategy with real-time virtual machine repair in an edge computing system Guo, Xiaobing

25 6 p. 3785-3797
artikel
34 Natural language why-question in Business Intelligence applications: model and recommendation approach Guessoum, Meriem Amel

25 6 p. 3875-3898
artikel
35 Optimized task scheduling in cloud computing using improved multi-verse optimizer Otair, Mohammed

25 6 p. 4221-4232
artikel
36 PartEclat: an improved Eclat-based frequent itemset mining algorithm on spark clusters using partition technique Raj, Shashi

25 6 p. 4463-4480
artikel
37 Performance analysis of P2P networks with malicious nodes Ma, Zhanyou

25 6 p. 4325-4337
artikel
38 Performance evaluation of deep neural network on malware detection: visual feature approach Anandhi, V.

25 6 p. 4601-4615
artikel
39 QoS-aware online scheduling of multiple workflows under task execution time uncertainty in clouds Taghinezhad-Niar, Ahmad

25 6 p. 3767-3784
artikel
40 Real-time event detection and classification in social text steam using embedding Singh, Tajinder

25 6 p. 3799-3817
artikel
41 Research on a new power distribution control strategy of hybrid energy storage system for hybrid electric vehicles based on the subtractive clustering and adaptive fuzzy neural network Wang, Qi

25 6 p. 4413-4422
artikel
42 RS-chain: a decentralized reputation-sharing framework for group-buying industry via hybrid blockchain Chen, Yungui

25 6 p. 4617-4632
artikel
43 Survey of Techniques on Data Leakage Protection and Methods to address the Insider threat Herrera Montano, Isabel

25 6 p. 4289-4302
artikel
44 Towards a distributed SaaS management system in a multi-cloud environment Ouchaou, Linda

25 6 p. 4051-4071
artikel
45 TPEL: Task possible execution level for effective scheduling in fog–cloud environment Alizadeh, Mohammad Reza

25 6 p. 4653-4672
artikel
46 TRAP: task-resource adaptive pairing for efficient scheduling in fog computing Kaur, Navjeet

25 6 p. 4257-4273
artikel
47 User behavior analysis based on edge evolutionary game model in social network Chen, Jing

25 6 p. 4397-4412
artikel
48 Visualization of aspect-oriented programs using city transportation metaphor Wedyan, Fadi

25 6 p. 3993-4008
artikel
                             48 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland