nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
An experimental and comparative benchmark study examining resource utilization in managed Hadoop context
|
Ă–zdil, Uluer Emre |
|
|
26 |
3 |
p. 1891-1915 |
artikel |
2 |
A survey of uncover misleading and cyberbullying on social media for public health
|
Darwish, Omar |
|
|
26 |
3 |
p. 1709-1735 |
artikel |
3 |
Boosting the training of neural networks through hybrid metaheuristics
|
Al-Betar, Mohammed Azmi |
|
|
26 |
3 |
p. 1821-1843 |
artikel |
4 |
Budget-deadline constrained approach for scientific workflows scheduling in a cloud environment
|
Zhou, Naqin |
|
|
26 |
3 |
p. 1737-1751 |
artikel |
5 |
Deep learning enabled class imbalance with sand piper optimization based intrusion detection for secure cyber physical systems
|
Hilal, Anwer Mustafa |
|
|
26 |
3 |
p. 2085-2098 |
artikel |
6 |
Deep-profiling: a deep neural network model for scholarly Web user profiling
|
Lin, Weiwei |
|
|
26 |
3 |
p. 1753-1766 |
artikel |
7 |
DPC2-CD: a secure architecture and methods for distributed processing and concurrency control in cloud databases
|
Yadav, Arun Kumar |
|
|
26 |
3 |
p. 2047-2068 |
artikel |
8 |
Energy efficiency in cloud computing data centers: a survey on software technologies
|
Katal, Avita |
|
|
26 |
3 |
p. 1845-1875 |
artikel |
9 |
Enhanced unstructured points cloud subdivision applied for parallel Delaunay triangulation
|
Zahida, Tchantchane |
|
|
26 |
3 |
p. 1877-1889 |
artikel |
10 |
Enhancing constrained application protocol using message options for internet of things
|
Bansal, Sharu |
|
|
26 |
3 |
p. 1917-1934 |
artikel |
11 |
HCIndex: a Hilbert-Curve-based clustering index for efficient multi-dimensional queries for cloud storage systems
|
Wang, Xinyang |
|
|
26 |
3 |
p. 2011-2025 |
artikel |
12 |
Improving makespan in dynamic task scheduling for cloud robotic systems with time window constraints
|
Alirezazadeh, Saeid |
|
|
26 |
3 |
p. 2027-2045 |
artikel |
13 |
Metaheuristic feature selection with deep learning enabled cascaded recurrent neural network for anomaly detection in Industrial Internet of Things environment
|
Chander, Nenavath |
|
|
26 |
3 |
p. 1801-1819 |
artikel |
14 |
On the performance of SQL scalable systems on Kubernetes: a comparative study
|
Cardas, Cristian |
|
|
26 |
3 |
p. 1935-1947 |
artikel |
15 |
Quantifying the impact of data replication on error propagation
|
Ozturk, Zuhal |
|
|
26 |
3 |
p. 1985-1999 |
artikel |
16 |
RETRACTED ARTICLE: Real-time network virtualization based on SDN and Docker container
|
He, Qinlu |
|
|
26 |
3 |
p. 2069-2083 |
artikel |
17 |
ROGI: Partial Computation Offloading and Resource Allocation in the Fog-Based IoT Network Towards Optimizing Latency and Power Consumption
|
Tabarsi, Benyamin T. |
|
|
26 |
3 |
p. 1767-1784 |
artikel |
18 |
Scalable feature subset selection for big data using parallel hybrid evolutionary algorithm based wrapper under apache spark environment
|
Vivek, Yelleti |
|
|
26 |
3 |
p. 1949-1983 |
artikel |
19 |
Seq2Path: a sequence-to-path-based flow feature fusion approach for encrypted traffic classification
|
Jiang, Chengxi |
|
|
26 |
3 |
p. 1785-1800 |
artikel |
20 |
Upper confident bound advantage function proximal policy optimization
|
Xie, Guiliang |
|
|
26 |
3 |
p. 2001-2010 |
artikel |