Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             65 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A better and fast cloud intrusion detection system using improved squirrel search algorithm and modified deep belief network Sarkar, Nairita

27 2 p. 1699-1718
artikel
2 A collusion-resistant certificateless provable data possession scheme for shared data with user revocation Yang, Guang

27 2 p. 2165-2179
artikel
3 A comprehensive comparison study of traditional classifiers and deep neural networks for forest fire detection Akyol, Kemal

27 2 p. 1201-1215
artikel
4 A computationally efficient and randomized RLWE-based key exchange scheme Pursharthi, Komal

27 2 p. 1599-1610
artikel
5 A controller-based roadside unit plane architecture for software-defined internet of vehicles Mao, Ming

27 2 p. 1235-1249
artikel
6 ACPM: adaptive container provisioning model to mitigate serverless cold-start Kumari, Anisha

27 2 p. 1333-1360
artikel
7 A deep learning approach for detecting covert timing channel attacks using sequential data Al-Eidi, Shorouq

27 2 p. 1655-1665
artikel
8 A design of provably secure multi-factor ECC-based authentication protocol in multi-server cloud architecture Shukla, Shivangi

27 2 p. 1559-1580
artikel
9 A distributed B+Tree indexing method for processing range queries over streaming data Safaee, Shahab

27 2 p. 1251-1274
artikel
10 A genetic-based clustering algorithm for efficient resource allocating of IoT applications in layered fog heterogeneous platforms Abedpour, Kimia

27 2 p. 1313-1331
artikel
11 A JAYA algorithm based on normal clouds for DNA sequence optimization Zhu, Donglin

27 2 p. 2133-2149
artikel
12 A machine learning-based optimization approach for pre-copy live virtual machine migration Haris, Raseena M.

27 2 p. 1293-1312
artikel
13 A meta reinforcement learning-based virtual machine placement algorithm in mobile edge computing Xu, Hao

27 2 p. 1883-1896
artikel
14 An efficient cloud resource exchange model based on the double auction and evolutionary game theory Ghasemian Koochaksaraei, Mohammad Hossein

27 2 p. 2291-2307
artikel
15 An efficient edge caching approach for SDN-based IoT environments utilizing the moth flame clustering algorithm Jazaeri, Seyedeh Shabnam

27 2 p. 1503-1525
artikel
16 An efficient multi-objective scheduling algorithm based on spider monkey and ant colony optimization in cloud computing Amer, Dina A.

27 2 p. 1799-1819
artikel
17 An improved arithmetic optimization algorithm for task offloading in mobile edge computing Li, Hongjian

27 2 p. 1667-1682
artikel
18 A novel and secure image encryption scheme based on two-dimensional logistic and Arnold Cat map Akraam, Muhammad

27 2 p. 2029-2048
artikel
19 A novel seq2seq-based prediction approach for workflow scheduling Yang, Zhongguo

27 2 p. 1897-1910
artikel
20 A novel sparrow search algorithm with integrates spawning strategy Zhang, Jiaxiang

27 2 p. 1753-1773
artikel
21 A privacy-enhanced human activity recognition using GAN & entropy ranking of microaggregated data Aleroud, Ahmed

27 2 p. 2117-2132
artikel
22 A retrieval method of learners’ behavior features based on K-means clustering algorithm Wang, Shaohua

27 2 p. 2049-2058
artikel
23 Blockchain based reputation management, data storage and distributed revocation in vehicular energy networks in smart health care systems Jamal, Abid

27 2 p. 2151-2163
artikel
24 Cloning-based virtual machine pre-provisioning for resource-constrained edge cloud server Sung, Jungwoong

27 2 p. 1831-1847
artikel
25 Cloud benchmarking and performance analysis of an HPC application in Amazon EC2 Dancheva, Tamara

27 2 p. 2273-2290
artikel
26 Computational approaches to detect experts in distributed online communities: a case study on Reddit Strukova, Sofia

27 2 p. 2181-2201
artikel
27 Correction: Scalable NUMA-aware persistent B+-tree for non-volatile memory devices Jamil, Safdar

27 2 p. 2309
artikel
28 CSADE: a delay-sensitive scheduling method based on task admission and delay evaluation on edge–cloud collaboration Zuo, Liyun

27 2 p. 1541-1558
artikel
29 CUDA-aware MPI implementation of Gibbs sampling for an IRT model Welling, William S.

27 2 p. 1821-1830
artikel
30 EIoT-DDoS: embedded classification approach for IoT traffic-based DDoS attacks Shukla, Praveen

27 2 p. 1471-1490
artikel
31 Emotion and sentiment analysis for intelligent customer service conversation using a multi-task ensemble framework Chen, Duan

27 2 p. 2099-2115
artikel
32 Framework for wrapping binary swarm optimizers to the hybrid parallel cooperative coevolving version Ipchi Sheshgelani, Mohammadreza

27 2 p. 1683-1697
artikel
33 Human–object interaction recognition based on interactivity detection and multi-feature fusion Xia, Limin

27 2 p. 1169-1183
artikel
34 Hybrid cuckoo finch optimisation based machine learning classifier for seizure prediction using EEG signals in IoT network Kapoor, Bhaskar

27 2 p. 2239-2260
artikel
35 Hybrid modified particle swarm optimization with genetic algorithm (GA) based workflow scheduling in cloud-fog environment for multi-objective optimization Singh, Gyan

27 2 p. 1947-1964
artikel
36 Improved Harris Hawks optimization for global optimization and engineering design Chen, Lei

27 2 p. 2003-2027
artikel
37 Improved Harris Hawks Optimizer with chaotic maps and opposition-based learning for task scheduling in cloud environment Ghafari, R.

27 2 p. 1421-1469
artikel
38 Improving the accuracy of diagnosing and predicting coronary heart disease using ensemble method and feature selection techniques Asif, Sohaib

27 2 p. 1927-1946
artikel
39 Improving UWB ranging accuracy via multiple network model with second order motion prediction Xing, Guangwei

27 2 p. 2261-2272
artikel
40 InPlaceKV: in-place update scheme for SSD-based KV storage systems under update-intensive Worklaods Zhao, Jianing

27 2 p. 1527-1540
artikel
41 Integrated method for distributed processing of large XML data Chen, Rongxin

27 2 p. 1375-1399
artikel
42 Intrusion detection in internet of things-based smart farming using hybrid deep learning framework Kethineni, Keerthi

27 2 p. 1719-1732
artikel
43 Knowledge-based multi-objective estimation of distribution algorithm for solving reliability constrained cloud workflow scheduling Li, Ming

27 2 p. 1401-1419
artikel
44 Maximizing utility by optimal capacity division in P2P networks Singha, Nitin

27 2 p. 1159-1168
artikel
45 MOM-VMP: multi-objective mayfly optimization algorithm for VM placement supported by principal component analysis (PCA) in cloud data center Durairaj, Selvam

27 2 p. 1733-1751
artikel
46 Network-assisted processing of advanced IoT applications: challenges and proof-of-concept application Mora, Higinio

27 2 p. 1849-1865
artikel
47 New Spark solutions for distributed frequent itemset and association rule mining algorithms Fernandez-Basso, Carlos

27 2 p. 1217-1234
artikel
48 Ordered balancing: load balancing for redundant task scheduling in robotic network cloud systems Alirezazadeh, Saeid

27 2 p. 1185-1200
artikel
49 Parallel mutation testing for large scale systems Cañizares, Pablo C.

27 2 p. 2071-2097
artikel
50 Product recommendation using enhanced convolutional neural network for e-commerce platform Latha, Yarasu Madhavi

27 2 p. 1639-1653
artikel
51 Profit-maximization spectrum sharing in opportunistic duopoly market under dynamic spectrum pricing and QoS constraints Bany Salameh, Haythem

27 2 p. 1491-1502
artikel
52 Prototypical contrastive learning for image classification Yang, Han

27 2 p. 2059-2069
artikel
53 Ransomware early detection using deep reinforcement learning on portable executable header Deng, XiZhen

27 2 p. 1867-1881
artikel
54 Real-time data fusion for intrusion detection in industrial control systems based on cloud computing and big data techniques Abid, Ahlem

27 2 p. 2217-2238
artikel
55 Retraction Note: Agricultural product monitoring system supported by cloud computing Jinbo, Chen

27 2 p. 2311
artikel
56 Secure cloud storage auditing with deduplication and efficient data transfer Yu, Jingze

27 2 p. 2203-2215
artikel
57 Secure itemset hiding in smart city sensor data Srivastava, Gautam

27 2 p. 1361-1374
artikel
58 Secure transfer of robust healthcare data using blockchain-based privacy Kumar, Maddila Suresh

27 2 p. 1275-1291
artikel
59 Securing the medical data using enhanced privacy preserving based blockchain technology in Internet of Things Vatambeti, Ramesh

27 2 p. 1625-1637
artikel
60 Self-supervised deep subspace clustering with entropy-norm Zhao, Guangyi

27 2 p. 1611-1623
artikel
61 Spark-based cooperative coevolution for large scale global optimization Kelkawi, Ali

27 2 p. 1911-1926
artikel
62 Supporting dynamic update scheme for assured deletion based-multi-copy association tree Tian, Junfeng

27 2 p. 1983-2001
artikel
63 Task and resource allocation in the internet of things based on an improved version of the moth-flame optimization algorithm Nematollahi, Masoud

27 2 p. 1775-1797
artikel
64 Two-stage scheduling for a fluctuant big data stream on heterogeneous servers with multicores in a data center Wang, Shun

27 2 p. 1581-1597
artikel
65 User request-based scheduling algorithms by managing uncertainty of renewable energy Padhi, Slokashree

27 2 p. 1965-1982
artikel
                             65 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland