Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             52 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A classification-based sensor data processing method for the internet of things assimilated wearable sensor technology Pradhan, Manas Ranjan

26 1 p. 807-822
artikel
2 A feature-based processing framework for real-time implementation of muscle fatigue measurement González-Zamora, P.

26 1 p. 385-394
artikel
3 A flow-based intrusion detection framework for internet of things networks Santos, Leonel

26 1 p. 37-57
artikel
4 A highly secured intrusion detection system for IoT using EXPSO-STFA feature selection for LAANN to detect attacks Jeyaselvi, M.

26 1 p. 559-574
artikel
5 A hybrid heuristics artificial intelligence feature selection for intrusion detection classifiers in cloud of things Sangaiah, Arun Kumar

26 1 p. 599-612
artikel
6 An empirical analysis of image augmentation against model inversion attack in federated learning Shin, Seunghyeon

26 1 p. 349-366
artikel
7 A new method of content distribution based on fuzzy logic and coalition graph games for VEC Zhang, De-gan

26 1 p. 701-717
artikel
8 An intelligent outlier detection with machine learning empowered big data analytics for mobile edge computing Mansour, Romany F.

26 1 p. 71-83
artikel
9 A review of smart contract-based platforms, applications, and challenges Sharma, Pratima

26 1 p. 395-421
artikel
10 A secure and flexible edge computing scheme for AI-driven industrial IoT Zhao, Yan

26 1 p. 283-301
artikel
11 A security evaluation model for multi-source heterogeneous systems based on IOT and edge computing Guo, Ziyu

26 1 p. 303-317
artikel
12 A task offloading algorithm for cloud-edge collaborative system based on Lyapunov optimization Gao, Jixun

26 1 p. 337-348
artikel
13 Automatic delay-sensitive applications quality of service improvement with deep flows discrimination in software defined networks Mohammadi, Ramin

26 1 p. 437-459
artikel
14 Blockchain-based incentive management framework for desktop clouds Yousafzai, Abdullah

26 1 p. 137-156
artikel
15 Blockchain for deep learning: review and open challenges Shafay, Muhammad

26 1 p. 197-221
artikel
16 Communication and aging aware application mapping for multicore based edge computing servers Ali, Javid

26 1 p. 223-235
artikel
17 Contention-aware container placement strategy for docker swarm with machine learning based clustering algorithms Chiang, Ron C.

26 1 p. 13-23
artikel
18 CoPUP: content popularity and user preferences aware content caching framework in mobile edge computing Yasir, Muhammad

26 1 p. 267-281
artikel
19 Correction: Static to dynamic transition of RPL protocol from IoT to IoV in static and mobile environments Garg, Sakshi

26 1 p. 863
artikel
20 Correction to: High-performance pseudo-anonymization of virtual power plant data on a CPU cluster Abbasi, Mahdi

26 1 p. 513
artikel
21 Deep reinforcement learning approach towards a smart parking architecture Awaisi, Kamran Sattar

26 1 p. 255-266
artikel
22 Design and realization of a secure multiplicative homomorphic encryption scheme for cloud services Zaraket, Christiana

26 1 p. 685-699
artikel
23 Design of cultural emperor penguin optimizer for energy-efficient resource scheduling in green cloud computing environment Mansour, Romany F.

26 1 p. 575-586
artikel
24 Detection and prediction of traffic accidents using deep learning techniques Azhar, Anique

26 1 p. 477-493
artikel
25 DMAIDPS: a distributed multi-agent intrusion detection and prevention system for cloud IoT environments Javadpour, Amir

26 1 p. 367-384
artikel
26 Edge computing-enabled green multisource fusion indoor positioning algorithm based on adaptive particle filter Li, Mengyao

26 1 p. 667-684
artikel
27 Energy efficient offloading mechanism using particle swarm optimization in 5G enabled edge nodes Bacanin, Nebojsa

26 1 p. 587-598
artikel
28 Energy efficient offloading scheme for MEC-based augmented reality system Ateya, Abdelhamied A.

26 1 p. 789-806
artikel
29 Enhancing quality of experience in mobile edge computing using deep learning based data offloading and cyberattack detection technique Hilal, Anwer Mustafa

26 1 p. 59-70
artikel
30 Enhancing vehicular edge computing system through cooperative computation offloading Lu, Yanfei

26 1 p. 771-788
artikel
31 ESPINA: efficient and secured protocol for emerging IoT network applications Bomgni, Alain Bertrand

26 1 p. 85-98
artikel
32 Floating Fog: extending fog computing to vast waters for aerial users Hassan, Najmul

26 1 p. 181-195
artikel
33 Fraud detection in the distributed graph database Srivastava, Sakshi

26 1 p. 515-537
artikel
34 High-performance pseudo-anonymization of virtual power plant data on a CPU cluster Abbasi, Mahdi

26 1 p. 495-512
artikel
35 Joint resource trading and computation offloading in blockchain enhanced D2D-assisted mobile edge computing Jing, Weipeng

26 1 p. 635-649
artikel
36 Knowledge defined networks on the edge for service function chaining and reactive traffic steering Rafiq, Adeel

26 1 p. 613-634
artikel
37 LiMPO: lightweight mobility prediction and offloading framework using machine learning for mobile edge computing Zaman, Sardar Khaliq uz

26 1 p. 99-117
artikel
38 Managing data security in fog computing in IoT devices using noise framework encryption with power probabilistic clustering algorithm Jalasri, M.

26 1 p. 823-836
artikel
39 Mapping and embedding infrastructure resource management in software defined networks Javadpour, Amir

26 1 p. 461-475
artikel
40 MECpVmS: an SLA aware energy-efficient virtual machine selection policy for green cloud computing Mandal, Riman

26 1 p. 651-665
artikel
41 Modeling and simulation of smart grid-aware edge computing federations Cárdenas, Román

26 1 p. 719-743
artikel
42 Password authentication key exchange based on key consensus for IoT security Zhao, Zongqu

26 1 p. 1-12
artikel
43 PI-sqrt: novel parallel implementations of in-place sequence rotation on multicore systems Hashem, Mervat

26 1 p. 539-557
artikel
44 Quality evaluation method of agricultural product packaging image based on structural similarity and MTF Quan, Li

26 1 p. 1-12
artikel
45 SFCSim: a network function virtualization resource allocation simulation platform Xu, Lingyi

26 1 p. 423-436
artikel
46 Smart sentiment analysis system for pain detection using cutting edge techniques in a smart healthcare framework Ghosh, Anay

26 1 p. 119-135
artikel
47 Static to dynamic transition of RPL protocol from IoT to IoV in static and mobile environments Garg, Sakshi

26 1 p. 847-862
artikel
48 Task processing optimization using cuckoo particle swarm (CPS) algorithm in cloud computing infrastructure Zavieh, Hadi

26 1 p. 745-769
artikel
49 TOS-LRPLM: a task value-aware offloading scheme in IoT edge computing system Sun, Jiayu

26 1 p. 319-335
artikel
50 Video transcoding at the edge: cost and feasibility perspective Bukhari, Syed Muhammad Ammar Hassan

26 1 p. 157-180
artikel
51 Workload time series prediction in storage systems: a deep learning based approach Ruan, Li

26 1 p. 25-35
artikel
52 Zone of trust: blockchain assisted IoT authentication to support cross-communication between bubbles of trusted IoTs Rashid, Aqsa

26 1 p. 237-254
artikel
                             52 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland