Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             81 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A conceptual investigation of the effect of random numbers over the performance of metaheuristic algorithms Kuyu, Yiğit Çağatay

13 p. 13971-14038
artikel
2 Admission control and resource provisioning in fog-integrated cloud using modified fuzzy inference system Sham, Eht E

13 p. 15463-15503
artikel
3 A GPU method for the analysis stage of the SPTRSV kernel Freire, Manuel

13 p. 15051-15078
artikel
4 A joint optimization scheme of task caching and offloading for smart factories Qu, Xiaofeng

13 p. 15185-15211
artikel
5 A model of checkpoint behavior for applications that have I/O León, Betzabeth

13 p. 15404-15436
artikel
6 A multi-application approach for synthesizing custom network-on-chips Kashi, Somayeh

13 p. 15358-15380
artikel
7 Analysis of workflow schedulers in simulated distributed environments Beránek, Jakub

13 p. 15154-15180
artikel
8 An anonymous and fair auction system based on blockchain Ye, Zongli

13 p. 13909-13951
artikel
9 An efficient dynamic transaction storage mechanism for sustainable high-throughput Bitcoin Zhao, Xiongfei

13 p. 14388-14426
artikel
10 An extended version of sectional MinHash method for near-duplicate detection Shayegan, Mohammad-Javad

13 p. 15638-15662
artikel
11 An improved secure file deduplication avoidance using CKHO based deep learning model in a cloud environment Mageshkumar, N.

13 p. 14892-14918
artikel
12 An integrated approach of designing functionality with security for distributed cyber-physical systems Tripathi, Dipty

13 p. 14813-14845
artikel
13 A novel social deep autoencoder NMF incentive scheme to detect a selfish node in delay tolerant network Sharma, Rakhi

13 p. 15014-15041
artikel
14 A parallel elliptic curve crypto-processor architecture with reduced clock cycle for FPGA platforms Kalaiarasi, M.

13 p. 15567-15597
artikel
15 A practical privacy-preserving nearest neighbor searching method over encrypted spatial data Zhang, Jing

13 p. 14146-14171
artikel
16 A quantum approximate optimization algorithm for solving Hamilton path problem Gong, Changqing

13 p. 15381-15403
artikel
17 A survey on implementations of homomorphic encryption schemes Doan, Thi Van Thao

13 p. 15098-15139
artikel
18 A traceable and revocable multi-authority attribute-based access control scheme for mineral industry data secure storage in blockchain Zhang, Xiaohong

13 p. 14743-14779
artikel
19 Building a speech recognition system with privacy identification information based on Google Voice for social robots Lin, Pei-Chun

13 p. 15060-15088
artikel
20 Cellular Goore Game and its application to quality-of-service control in wireless sensor networks Ameri, Reyhaneh

13 p. 15181-15228
artikel
21 CoFB: latency-constrained co-scheduling of flows and batches for deep learning inference service on the CPU–GPU system Zhang, Qi

13 p. 14172-14199
artikel
22 Component-wise design method of fuzzy C-means clustering validity function based on CRITIC combination weighting Wang, Guan

13 p. 14571-14601
artikel
23 Constructing conditional PKEET with verification mechanism for data privacy protection in intelligent systems Hong, Hanshu

13 p. 15004-15022
artikel
24 Correction to: A model of checkpoint behavior for applications that have I/O León, Betzabeth

13 p. 15437-15438
artikel
25 Correction to: FPGA implementation of hardware accelerated RTOS based on real-time event handling Zagan, Ionel

13 p. 15213
artikel
26 Correction to: Improve customer churn prediction through the proposed PCA‑PSO‑K means algorithm in the communication industry Sadeghi, Maryam

13 p. 15212
artikel
27 CPU power and network bandwidth-aware optimal block size computation for blockchain-based applications using meta-heuristic algorithms Singh, Nikita

13 p. 14063-14078
artikel
28 Deep learning-based energy-efficient computational offloading strategy in heterogeneous fog computing networks Sarkar, Indranil

13 p. 15089-15106
artikel
29 Dynamic sampling rate: harnessing frame coherence in graphics applications for energy-efficient GPUs Anglada, Martí

13 p. 14940-14964
artikel
30 Efficient parallel graph trimming by arc-consistency Guo, Bin

13 p. 15269-15313
artikel
31 Energy-aware edge server placement using the improved butterfly optimization algorithm Asghari, Ali

13 p. 14954-14980
artikel
32 Energy cost optimization in distribution network considering hybrid electric vehicle and photovoltaic using modified whale optimization algorithm Zadehbagheri, Mahmoud

13 p. 14427-14456
artikel
33 Enhanced whale optimization algorithm-based modeling and simulation analysis for industrial system parameter identification Braik, Malik

13 p. 14489-14544
artikel
34 Enhancing gas detection-based swarming through deep reinforcement learning Lee, Sangmin

13 p. 14794-14812
artikel
35 EP4DDL: addressing straggler problem in heterogeneous distributed deep learning Ji, Zeyu

13 p. 15663-15680
artikel
36 EP2LBS: efficient privacy-preserving scheme for location-based services Yadav, Vijay Kumar

13 p. 14991-15013
artikel
37 Evaluation and analysis of human resource management mode and its talent screening factors based on decision tree algorithm Zhang, Chuanzhu

13 p. 15681-15713
artikel
38 Exploring implicit persona knowledge for personalized dialogue generation Xu, Fuyong

13 p. 14545-14570
artikel
39 Extreme learning machine and bayesian optimization-driven intelligent framework for IoMT cyber-attack detection Nayak, Janmenjoy

13 p. 14866-14891
artikel
40 Feature selection with a deep learning based high-performance computing model for traffic flow analysis of Twitter data Mounica, B.

13 p. 15107-15122
artikel
41 Fiuncho: a program for any-order epistasis detection in CPU clusters Ponte-Fernández, Christian

13 p. 15338-15357
artikel
42 Global triangle estimation based on first edge sampling in large graph streams Yu, Changyong

13 p. 14079-14116
artikel
43 GM-WOA: a hybrid energy efficient cluster routing technique for SDN-enabled WSNs Tyagi, Vikas

13 p. 14894-14922
artikel
44 Graph convolutional networks with hierarchical multi-head attention for aspect-level sentiment classification Li, Xiaowen

13 p. 14846-14865
artikel
45 Hexagonal picture generation in DNA computing Sudha, V.

13 p. 15140-15184
artikel
46 Hierarchy-entropy based method for command and control networks reconfiguration Gao, Xiue

13 p. 15229-15249
artikel
47 HSVNN: an efficient medical data classification using dimensionality reduction combined with hybrid support vector neural network Prakash, P. N. Senthil

13 p. 15439-15462
artikel
48 Hybrid binary arithmetic optimization algorithm with simulated annealing for feature selection in high-dimensional biomedical data Pashaei, Elham

13 p. 15598-15637
artikel
49 Hybrid deep learning model for answering visual medical questions Gasmi, Karim

13 p. 15042-15059
artikel
50 Hyperbolic trees for efficient routing computation Heszberger, Zalán

13 p. 15250-15268
artikel
51 Investigating the effect of varying block size on power and energy consumption of GPU kernels Ikram, Muhammad Jawad

13 p. 14919-14939
artikel
52 LOCP: Latency-optimized channel pruning for CNN inference acceleration on GPUs Zhang, Yonghua

13 p. 14313-14341
artikel
53 MISR: a multiple behavior interactive enhanced learning model for social-aware recommendation Liang, Xiufang

13 p. 14221-14244
artikel
54 Mitigating the NUMA effect on task-based runtime systems Maroñas, Marcos

13 p. 14287-14312
artikel
55 MultiOff: offloading support and service deployment for multiple IoT applications in mobile edge computing Li, Ming

13 p. 15123-15153
artikel
56 New numerical methods for solving the partial fractional differential equations with uniform and non-uniform meshes Javidi, Mohammad

13 p. 14457-14488
artikel
57 On the impact of information-sharing model between subpopulations in the Island-based evolutionary algorithms: search manager framework as a case study Abdi, Yousef

13 p. 14245-14286
artikel
58 Parallel design and implementation of Jacobi iterative algorithm based on ternary optical computer Song, Kai

13 p. 14965-14990
artikel
59 Path covers of bubble-sort star graphs Cheng, Dongqin

13 p. 14848-14868
artikel
60 Predicting product advertisement links using hybrid learning within social networks Ebadi Jokandan, Seyed Mohsen

13 p. 15023-15050
artikel
61 Privacy-preserving multi-party PCA computation on horizontally and vertically partitioned data based on outsourced QR decomposition Jaberi, Mehrad

13 p. 14358-14387
artikel
62 Proactive threshold-proxy re-encryption scheme for secure data sharing on cloud Raghav,

13 p. 14117-14145
artikel
63 Probabilistic coverage in mobile directional sensor networks: a game theoretical approach Golrasan, Elham

13 p. 14200-14220
artikel
64 Queries with aggregate functions over fuzzy RDF data Ma, Zongmin

13 p. 14780-14807
artikel
65 Real-time anomaly detection system within the scope of smart factories Bayraktar, Cihan

13 p. 14707-14742
artikel
66 Reliability analysis of the pentanary n-cube based on h-extra edge-connectivity with a concentration behavior Liang, Tengteng

13 p. 15504-15531
artikel
67 Resource management and switch migration in SDN-based multi-access edge computing environments Guo, Jingjing

13 p. 15532-15566
artikel
68 S-Edge: heterogeneity-aware, light-weighted, and edge computing integrated adaptive traffic light control framework Sachan, Anuj

13 p. 14923-14953
artikel
69 Selection of Six Sigma projects based on integrated multi-criteria decision-making methods: the case of the software development industry Ayyıldız, Tülin Erçelebi

13 p. 14981-15003
artikel
70 SeQual: an unsupervised feature selection method for cloud workload traces Ali, Shallaw Mohammed

13 p. 15079-15097
artikel
71 SIMD vectorization for simultaneous solution of locally varying linear systems with multiple right-hand sides Kühn, Martin J.

13 p. 14684-14706
artikel
72 Supercomputing of reducing sequenced bases in de novo sequencing of the human genome Kavezadeh, Shirin

13 p. 14769-14793
artikel
73 TARA: weighted majority cooperative game theory-based task assignment and resource allocation in 5G heterogeneous fog network for IoT Ghosh, Subha

13 p. 14633-14683
artikel
74 TempChain: a blockchain scheme for telehealth data sharing between two blockchains using property mapping function Dewangan, Narendra K.

13 p. 14808-14826
artikel
75 The music demixing machine: toward real-time remixing of classical music Cabañas-Molero, Pablo

13 p. 14342-14357
artikel
76 Thresholding methods in non-intrusive load monitoring Precioso, Daniel

13 p. 14039-14062
artikel
77 UAV-assisted ubiquitous communication architecture for urban VANET environment Raza, Ali

13 p. 14602-14632
artikel
78 URMP: using reconfigurable multicast path for NoC-based deep neural network accelerators Ouyang, Yiming

13 p. 14827-14847
artikel
79 Vertex transitivity and distance metric of the quad-cube Jha, Pranava K.

13 p. 13952-13970
artikel
80 Virtual reality human–robot interaction technology acceptance model for learning direct current and alternating current Lo, Chih-Min

13 p. 15314-15337
artikel
81 YOLOOD: an arbitrary-oriented flexible flat cable detection method in robotic assembly Bai, Yuxuan

13 p. 14869-14893
artikel
                             81 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland