Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             52 results found
no title author magazine year volume issue page(s) type
1 A classification-based sensor data processing method for the internet of things assimilated wearable sensor technology Pradhan, Manas Ranjan

26 1 p. 807-822
article
2 A feature-based processing framework for real-time implementation of muscle fatigue measurement González-Zamora, P.

26 1 p. 385-394
article
3 A flow-based intrusion detection framework for internet of things networks Santos, Leonel

26 1 p. 37-57
article
4 A highly secured intrusion detection system for IoT using EXPSO-STFA feature selection for LAANN to detect attacks Jeyaselvi, M.

26 1 p. 559-574
article
5 A hybrid heuristics artificial intelligence feature selection for intrusion detection classifiers in cloud of things Sangaiah, Arun Kumar

26 1 p. 599-612
article
6 An empirical analysis of image augmentation against model inversion attack in federated learning Shin, Seunghyeon

26 1 p. 349-366
article
7 A new method of content distribution based on fuzzy logic and coalition graph games for VEC Zhang, De-gan

26 1 p. 701-717
article
8 An intelligent outlier detection with machine learning empowered big data analytics for mobile edge computing Mansour, Romany F.

26 1 p. 71-83
article
9 A review of smart contract-based platforms, applications, and challenges Sharma, Pratima

26 1 p. 395-421
article
10 A secure and flexible edge computing scheme for AI-driven industrial IoT Zhao, Yan

26 1 p. 283-301
article
11 A security evaluation model for multi-source heterogeneous systems based on IOT and edge computing Guo, Ziyu

26 1 p. 303-317
article
12 A task offloading algorithm for cloud-edge collaborative system based on Lyapunov optimization Gao, Jixun

26 1 p. 337-348
article
13 Automatic delay-sensitive applications quality of service improvement with deep flows discrimination in software defined networks Mohammadi, Ramin

26 1 p. 437-459
article
14 Blockchain-based incentive management framework for desktop clouds Yousafzai, Abdullah

26 1 p. 137-156
article
15 Blockchain for deep learning: review and open challenges Shafay, Muhammad

26 1 p. 197-221
article
16 Communication and aging aware application mapping for multicore based edge computing servers Ali, Javid

26 1 p. 223-235
article
17 Contention-aware container placement strategy for docker swarm with machine learning based clustering algorithms Chiang, Ron C.

26 1 p. 13-23
article
18 CoPUP: content popularity and user preferences aware content caching framework in mobile edge computing Yasir, Muhammad

26 1 p. 267-281
article
19 Correction: Static to dynamic transition of RPL protocol from IoT to IoV in static and mobile environments Garg, Sakshi

26 1 p. 863
article
20 Correction to: High-performance pseudo-anonymization of virtual power plant data on a CPU cluster Abbasi, Mahdi

26 1 p. 513
article
21 Deep reinforcement learning approach towards a smart parking architecture Awaisi, Kamran Sattar

26 1 p. 255-266
article
22 Design and realization of a secure multiplicative homomorphic encryption scheme for cloud services Zaraket, Christiana

26 1 p. 685-699
article
23 Design of cultural emperor penguin optimizer for energy-efficient resource scheduling in green cloud computing environment Mansour, Romany F.

26 1 p. 575-586
article
24 Detection and prediction of traffic accidents using deep learning techniques Azhar, Anique

26 1 p. 477-493
article
25 DMAIDPS: a distributed multi-agent intrusion detection and prevention system for cloud IoT environments Javadpour, Amir

26 1 p. 367-384
article
26 Edge computing-enabled green multisource fusion indoor positioning algorithm based on adaptive particle filter Li, Mengyao

26 1 p. 667-684
article
27 Energy efficient offloading mechanism using particle swarm optimization in 5G enabled edge nodes Bacanin, Nebojsa

26 1 p. 587-598
article
28 Energy efficient offloading scheme for MEC-based augmented reality system Ateya, Abdelhamied A.

26 1 p. 789-806
article
29 Enhancing quality of experience in mobile edge computing using deep learning based data offloading and cyberattack detection technique Hilal, Anwer Mustafa

26 1 p. 59-70
article
30 Enhancing vehicular edge computing system through cooperative computation offloading Lu, Yanfei

26 1 p. 771-788
article
31 ESPINA: efficient and secured protocol for emerging IoT network applications Bomgni, Alain Bertrand

26 1 p. 85-98
article
32 Floating Fog: extending fog computing to vast waters for aerial users Hassan, Najmul

26 1 p. 181-195
article
33 Fraud detection in the distributed graph database Srivastava, Sakshi

26 1 p. 515-537
article
34 High-performance pseudo-anonymization of virtual power plant data on a CPU cluster Abbasi, Mahdi

26 1 p. 495-512
article
35 Joint resource trading and computation offloading in blockchain enhanced D2D-assisted mobile edge computing Jing, Weipeng

26 1 p. 635-649
article
36 Knowledge defined networks on the edge for service function chaining and reactive traffic steering Rafiq, Adeel

26 1 p. 613-634
article
37 LiMPO: lightweight mobility prediction and offloading framework using machine learning for mobile edge computing Zaman, Sardar Khaliq uz

26 1 p. 99-117
article
38 Managing data security in fog computing in IoT devices using noise framework encryption with power probabilistic clustering algorithm Jalasri, M.

26 1 p. 823-836
article
39 Mapping and embedding infrastructure resource management in software defined networks Javadpour, Amir

26 1 p. 461-475
article
40 MECpVmS: an SLA aware energy-efficient virtual machine selection policy for green cloud computing Mandal, Riman

26 1 p. 651-665
article
41 Modeling and simulation of smart grid-aware edge computing federations Cárdenas, Román

26 1 p. 719-743
article
42 Password authentication key exchange based on key consensus for IoT security Zhao, Zongqu

26 1 p. 1-12
article
43 PI-sqrt: novel parallel implementations of in-place sequence rotation on multicore systems Hashem, Mervat

26 1 p. 539-557
article
44 Quality evaluation method of agricultural product packaging image based on structural similarity and MTF Quan, Li

26 1 p. 1-12
article
45 SFCSim: a network function virtualization resource allocation simulation platform Xu, Lingyi

26 1 p. 423-436
article
46 Smart sentiment analysis system for pain detection using cutting edge techniques in a smart healthcare framework Ghosh, Anay

26 1 p. 119-135
article
47 Static to dynamic transition of RPL protocol from IoT to IoV in static and mobile environments Garg, Sakshi

26 1 p. 847-862
article
48 Task processing optimization using cuckoo particle swarm (CPS) algorithm in cloud computing infrastructure Zavieh, Hadi

26 1 p. 745-769
article
49 TOS-LRPLM: a task value-aware offloading scheme in IoT edge computing system Sun, Jiayu

26 1 p. 319-335
article
50 Video transcoding at the edge: cost and feasibility perspective Bukhari, Syed Muhammad Ammar Hassan

26 1 p. 157-180
article
51 Workload time series prediction in storage systems: a deep learning based approach Ruan, Li

26 1 p. 25-35
article
52 Zone of trust: blockchain assisted IoT authentication to support cross-communication between bubbles of trusted IoTs Rashid, Aqsa

26 1 p. 237-254
article
                             52 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands