nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A caching mechanism to exploit object store speed in High Energy Physics analysis
|
Padulano, Vincenzo Eduardo |
|
|
26 |
5 |
p. 2757-2772 |
artikel |
2 |
A collective attestation scheme towards cloud system
|
Song, Yuan |
|
|
26 |
5 |
p. 2467-2478 |
artikel |
3 |
A comprehensive review of the deep learning-based tumor analysis approaches in histopathological images: segmentation, classification and multi-learning tasks
|
Abdel-Nabi, Heba |
|
|
26 |
5 |
p. 3145-3185 |
artikel |
4 |
A comprehensive systematic and bibliometric review of the IoT-based healthcare systems
|
Bovenizer, Wimalyn |
|
|
26 |
5 |
p. 3291-3317 |
artikel |
5 |
A container-based workflow for distributed training of deep learning algorithms in HPC clusters
|
González-Abad, Jose |
|
|
26 |
5 |
p. 2815-2834 |
artikel |
6 |
Adaptive denoising for magnetic resonance image based on nonlocal structural similarity and low-rank sparse representation
|
Wang, Hongyu |
|
|
26 |
5 |
p. 2933-2946 |
artikel |
7 |
A data compression and encryption method for green edge computing
|
Liu, Jianli |
|
|
26 |
5 |
p. 3341-3359 |
artikel |
8 |
A multiobjective decomposition evolutionary algorithm with optimal history-based neighborhood adaptation and a dual-indicator selection strategy
|
Li, Wei |
|
|
26 |
5 |
p. 3319-3339 |
artikel |
9 |
An energy-aware service placement strategy using hybrid meta-heuristic algorithm in iot environments
|
HU, Yuanchao |
|
|
26 |
5 |
p. 2913-2919 |
artikel |
10 |
A novel method to detect cyber-attacks in IoT/IIoT devices on the modbus protocol using deep learning
|
Gueye, Thierno |
|
|
26 |
5 |
p. 2947-2973 |
artikel |
11 |
APR: adaptive page replacement scheme for scientific applications
|
Lee, Yunjae |
|
|
26 |
5 |
p. 2551-2562 |
artikel |
12 |
ARED: automata-based runtime estimation for distributed systems using deep learning
|
Cheon, Hyunjoon |
|
|
26 |
5 |
p. 2629-2641 |
artikel |
13 |
A review of task scheduling in cloud computing based on nature-inspired optimization algorithm
|
Prity, Farida Siddiqi |
|
|
26 |
5 |
p. 3037-3067 |
artikel |
14 |
A taxonomy of load balancing algorithms and approaches in fog computing: a survey
|
Ebneyousef, Sepideh |
|
|
26 |
5 |
p. 3187-3208 |
artikel |
15 |
ATConf: auto-tuning high dimensional configuration parameters for big data processing frameworks
|
Dou, Hui |
|
|
26 |
5 |
p. 2737-2755 |
artikel |
16 |
Cloud-edge load balancing distributed protocol for IoE services using swarm intelligence
|
Saba, Tanzila |
|
|
26 |
5 |
p. 2921-2931 |
artikel |
17 |
Comprehensive techniques for multi-tenant deep learning framework on a Hadoop YARN cluster
|
Heo, Seoungbeom |
|
|
26 |
5 |
p. 2851-2864 |
artikel |
18 |
Correction to: a novel method to detect cyber-attacks in IoT/IIoT devices on the modbus protocol using deep learning
|
Gueye, Thierno |
|
|
26 |
5 |
p. 2975 |
artikel |
19 |
Deep learning for the security of software-defined networks: a review
|
Taheri, Roya |
|
|
26 |
5 |
p. 3089-3112 |
artikel |
20 |
Design and implementation of an efficient and parallel bad block checker for parallelism of storage devices
|
Han, Jaehyun |
|
|
26 |
5 |
p. 2615-2627 |
artikel |
21 |
Design and implementation of an efficient VM scheduling framework for interactive streaming service
|
Han, Jongbeen |
|
|
26 |
5 |
p. 2801-2814 |
artikel |
22 |
Detect anomalies in cloud platforms by using network data: a review
|
Jayaweera, M. P. G. K. |
|
|
26 |
5 |
p. 3279-3289 |
artikel |
23 |
DRJOA: intelligent resource management optimization through deep reinforcement learning approach in edge computing
|
Chen, Yifan |
|
|
26 |
5 |
p. 2897-2911 |
artikel |
24 |
Edge server placement problem in multi-access edge computing environment: models, techniques, and applications
|
Bahrami, Bahareh |
|
|
26 |
5 |
p. 3237-3262 |
artikel |
25 |
Fungible and non-fungible tokens with snapshots in Java
|
Crosara, Marco |
|
|
26 |
5 |
p. 2701-2718 |
artikel |
26 |
High-speed hyperparameter optimization for deep ResNet models in image recognition
|
Jafar, Abbas |
|
|
26 |
5 |
p. 2605-2613 |
artikel |
27 |
Improved particle swarm optimization based on blockchain mechanism for flexible job shop problem
|
Sana, Muhammad Usman |
|
|
26 |
5 |
p. 2519-2537 |
artikel |
28 |
Improving blocked matrix-matrix multiplication routine by utilizing AVX-512 instructions on intel knights landing and xeon scalable processors
|
Park, Yoosang |
|
|
26 |
5 |
p. 2539-2549 |
artikel |
29 |
Improving latency in Internet-of-Things and cloud computing for real-time data transmission: a systematic literature review (SLR)
|
Shukla, Saurabh |
|
|
26 |
5 |
p. 2657-2680 |
artikel |
30 |
Improving Oversubscribed GPU Memory Performance in the PyTorch Framework
|
Choi, Jake |
|
|
26 |
5 |
p. 2835-2850 |
artikel |
31 |
Intelligent microservices autoscaling module using reinforcement learning
|
Abdel Khaleq, Abeer |
|
|
26 |
5 |
p. 2789-2800 |
artikel |
32 |
Interference-aware execution framework with Co-scheML on GPU clusters
|
Kim, Sejin |
|
|
26 |
5 |
p. 2577-2589 |
artikel |
33 |
I/O separation scheme on Lustre metadata server based on multi-stream SSD
|
Lee, Cheongjun |
|
|
26 |
5 |
p. 2883-2896 |
artikel |
34 |
LambdAgrIoT: a new architecture for agricultural autonomous robots’ scheduling: from design to experiments
|
André, Geraldine |
|
|
26 |
5 |
p. 2993-3015 |
artikel |
35 |
Machine learning-based computation offloading in edge and fog: a systematic review
|
Taheri-abed, Sanaz |
|
|
26 |
5 |
p. 3113-3144 |
artikel |
36 |
Machine learning models for phishing detection from TLS traffic
|
Kumar, Munish |
|
|
26 |
5 |
p. 3263-3277 |
artikel |
37 |
Performance modeling and analysis of Hyperledger Fabric
|
Ke, Zuqiang |
|
|
26 |
5 |
p. 2681-2699 |
artikel |
38 |
Prediction-based scheduling techniques for cloud data center’s workload: a systematic review
|
Kashyap, Shobhana |
|
|
26 |
5 |
p. 3209-3235 |
artikel |
39 |
Privacy protection framework for face recognition in edge-based Internet of Things
|
Xie, Yun |
|
|
26 |
5 |
p. 3017-3035 |
artikel |
40 |
Reinforcement learning based energy efficient resource allocation strategy of MapReduce jobs with deadline constraint
|
Lingam, Greeshma |
|
|
26 |
5 |
p. 2719-2735 |
artikel |
41 |
Reversible encryption and lossless data hiding for medical imaging aiding smart health care
|
Basit, Abdul |
|
|
26 |
5 |
p. 2977-2991 |
artikel |
42 |
Scalable NUMA-aware persistent B+-tree for non-volatile memory devices
|
Jamil, Safdar |
|
|
26 |
5 |
p. 2865-2881 |
artikel |
43 |
Smart sensors, sensing mechanisms and platforms of sustainable smart agriculture realized through the big data analysis
|
Liu, Weilian |
|
|
26 |
5 |
p. 2503-2517 |
artikel |
44 |
S-MPEC: Sparse Matrix Multiplication Performance Estimator on a Cloud Environment
|
Park, Jueon |
|
|
26 |
5 |
p. 2563-2576 |
artikel |
45 |
Task scheduling and VM placement to resource allocation in Cloud computing: challenges and opportunities
|
Saidi, Karima |
|
|
26 |
5 |
p. 3069-3087 |
artikel |
46 |
Task scheduling of cloud computing based on hybrid particle swarm algorithm and genetic algorithm
|
Fu, Xueliang |
|
|
26 |
5 |
p. 2479-2488 |
artikel |
47 |
Towards energy-efficient service scheduling in federated edge clouds
|
Jeong, Yeonwoo |
|
|
26 |
5 |
p. 2591-2603 |
artikel |
48 |
Towards enhanced I/O performance of a highly integrated many-core processor by empirical analysis
|
Lee, Cheongjun |
|
|
26 |
5 |
p. 2643-2655 |
artikel |
49 |
Towards the design of real-time autonomous IoT NIDS
|
Alhowaide, Alaa |
|
|
26 |
5 |
p. 2489-2502 |
artikel |
50 |
zStream: towards a low latency micro-batch streaming system
|
Lee, Suyeon |
|
|
26 |
5 |
p. 2773-2787 |
artikel |