nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A conceptual investigation of the effect of random numbers over the performance of metaheuristic algorithms
|
Kuyu, Yiğit Çağatay |
|
|
|
13 |
p. 13971-14038 |
artikel |
2 |
Admission control and resource provisioning in fog-integrated cloud using modified fuzzy inference system
|
Sham, Eht E |
|
|
|
13 |
p. 15463-15503 |
artikel |
3 |
A GPU method for the analysis stage of the SPTRSV kernel
|
Freire, Manuel |
|
|
|
13 |
p. 15051-15078 |
artikel |
4 |
A joint optimization scheme of task caching and offloading for smart factories
|
Qu, Xiaofeng |
|
|
|
13 |
p. 15185-15211 |
artikel |
5 |
A model of checkpoint behavior for applications that have I/O
|
León, Betzabeth |
|
|
|
13 |
p. 15404-15436 |
artikel |
6 |
A multi-application approach for synthesizing custom network-on-chips
|
Kashi, Somayeh |
|
|
|
13 |
p. 15358-15380 |
artikel |
7 |
Analysis of workflow schedulers in simulated distributed environments
|
Beránek, Jakub |
|
|
|
13 |
p. 15154-15180 |
artikel |
8 |
An anonymous and fair auction system based on blockchain
|
Ye, Zongli |
|
|
|
13 |
p. 13909-13951 |
artikel |
9 |
An efficient dynamic transaction storage mechanism for sustainable high-throughput Bitcoin
|
Zhao, Xiongfei |
|
|
|
13 |
p. 14388-14426 |
artikel |
10 |
An extended version of sectional MinHash method for near-duplicate detection
|
Shayegan, Mohammad-Javad |
|
|
|
13 |
p. 15638-15662 |
artikel |
11 |
An improved secure file deduplication avoidance using CKHO based deep learning model in a cloud environment
|
Mageshkumar, N. |
|
|
|
13 |
p. 14892-14918 |
artikel |
12 |
An integrated approach of designing functionality with security for distributed cyber-physical systems
|
Tripathi, Dipty |
|
|
|
13 |
p. 14813-14845 |
artikel |
13 |
A novel social deep autoencoder NMF incentive scheme to detect a selfish node in delay tolerant network
|
Sharma, Rakhi |
|
|
|
13 |
p. 15014-15041 |
artikel |
14 |
A parallel elliptic curve crypto-processor architecture with reduced clock cycle for FPGA platforms
|
Kalaiarasi, M. |
|
|
|
13 |
p. 15567-15597 |
artikel |
15 |
A practical privacy-preserving nearest neighbor searching method over encrypted spatial data
|
Zhang, Jing |
|
|
|
13 |
p. 14146-14171 |
artikel |
16 |
A quantum approximate optimization algorithm for solving Hamilton path problem
|
Gong, Changqing |
|
|
|
13 |
p. 15381-15403 |
artikel |
17 |
A survey on implementations of homomorphic encryption schemes
|
Doan, Thi Van Thao |
|
|
|
13 |
p. 15098-15139 |
artikel |
18 |
A traceable and revocable multi-authority attribute-based access control scheme for mineral industry data secure storage in blockchain
|
Zhang, Xiaohong |
|
|
|
13 |
p. 14743-14779 |
artikel |
19 |
Building a speech recognition system with privacy identification information based on Google Voice for social robots
|
Lin, Pei-Chun |
|
|
|
13 |
p. 15060-15088 |
artikel |
20 |
Cellular Goore Game and its application to quality-of-service control in wireless sensor networks
|
Ameri, Reyhaneh |
|
|
|
13 |
p. 15181-15228 |
artikel |
21 |
CoFB: latency-constrained co-scheduling of flows and batches for deep learning inference service on the CPU–GPU system
|
Zhang, Qi |
|
|
|
13 |
p. 14172-14199 |
artikel |
22 |
Component-wise design method of fuzzy C-means clustering validity function based on CRITIC combination weighting
|
Wang, Guan |
|
|
|
13 |
p. 14571-14601 |
artikel |
23 |
Constructing conditional PKEET with verification mechanism for data privacy protection in intelligent systems
|
Hong, Hanshu |
|
|
|
13 |
p. 15004-15022 |
artikel |
24 |
Correction to: A model of checkpoint behavior for applications that have I/O
|
León, Betzabeth |
|
|
|
13 |
p. 15437-15438 |
artikel |
25 |
Correction to: FPGA implementation of hardware accelerated RTOS based on real-time event handling
|
Zagan, Ionel |
|
|
|
13 |
p. 15213 |
artikel |
26 |
Correction to: Improve customer churn prediction through the proposed PCA‑PSO‑K means algorithm in the communication industry
|
Sadeghi, Maryam |
|
|
|
13 |
p. 15212 |
artikel |
27 |
CPU power and network bandwidth-aware optimal block size computation for blockchain-based applications using meta-heuristic algorithms
|
Singh, Nikita |
|
|
|
13 |
p. 14063-14078 |
artikel |
28 |
Deep learning-based energy-efficient computational offloading strategy in heterogeneous fog computing networks
|
Sarkar, Indranil |
|
|
|
13 |
p. 15089-15106 |
artikel |
29 |
Dynamic sampling rate: harnessing frame coherence in graphics applications for energy-efficient GPUs
|
Anglada, Martí |
|
|
|
13 |
p. 14940-14964 |
artikel |
30 |
Efficient parallel graph trimming by arc-consistency
|
Guo, Bin |
|
|
|
13 |
p. 15269-15313 |
artikel |
31 |
Energy-aware edge server placement using the improved butterfly optimization algorithm
|
Asghari, Ali |
|
|
|
13 |
p. 14954-14980 |
artikel |
32 |
Energy cost optimization in distribution network considering hybrid electric vehicle and photovoltaic using modified whale optimization algorithm
|
Zadehbagheri, Mahmoud |
|
|
|
13 |
p. 14427-14456 |
artikel |
33 |
Enhanced whale optimization algorithm-based modeling and simulation analysis for industrial system parameter identification
|
Braik, Malik |
|
|
|
13 |
p. 14489-14544 |
artikel |
34 |
Enhancing gas detection-based swarming through deep reinforcement learning
|
Lee, Sangmin |
|
|
|
13 |
p. 14794-14812 |
artikel |
35 |
EP4DDL: addressing straggler problem in heterogeneous distributed deep learning
|
Ji, Zeyu |
|
|
|
13 |
p. 15663-15680 |
artikel |
36 |
EP2LBS: efficient privacy-preserving scheme for location-based services
|
Yadav, Vijay Kumar |
|
|
|
13 |
p. 14991-15013 |
artikel |
37 |
Evaluation and analysis of human resource management mode and its talent screening factors based on decision tree algorithm
|
Zhang, Chuanzhu |
|
|
|
13 |
p. 15681-15713 |
artikel |
38 |
Exploring implicit persona knowledge for personalized dialogue generation
|
Xu, Fuyong |
|
|
|
13 |
p. 14545-14570 |
artikel |
39 |
Extreme learning machine and bayesian optimization-driven intelligent framework for IoMT cyber-attack detection
|
Nayak, Janmenjoy |
|
|
|
13 |
p. 14866-14891 |
artikel |
40 |
Feature selection with a deep learning based high-performance computing model for traffic flow analysis of Twitter data
|
Mounica, B. |
|
|
|
13 |
p. 15107-15122 |
artikel |
41 |
Fiuncho: a program for any-order epistasis detection in CPU clusters
|
Ponte-Fernández, Christian |
|
|
|
13 |
p. 15338-15357 |
artikel |
42 |
Global triangle estimation based on first edge sampling in large graph streams
|
Yu, Changyong |
|
|
|
13 |
p. 14079-14116 |
artikel |
43 |
GM-WOA: a hybrid energy efficient cluster routing technique for SDN-enabled WSNs
|
Tyagi, Vikas |
|
|
|
13 |
p. 14894-14922 |
artikel |
44 |
Graph convolutional networks with hierarchical multi-head attention for aspect-level sentiment classification
|
Li, Xiaowen |
|
|
|
13 |
p. 14846-14865 |
artikel |
45 |
Hexagonal picture generation in DNA computing
|
Sudha, V. |
|
|
|
13 |
p. 15140-15184 |
artikel |
46 |
Hierarchy-entropy based method for command and control networks reconfiguration
|
Gao, Xiue |
|
|
|
13 |
p. 15229-15249 |
artikel |
47 |
HSVNN: an efficient medical data classification using dimensionality reduction combined with hybrid support vector neural network
|
Prakash, P. N. Senthil |
|
|
|
13 |
p. 15439-15462 |
artikel |
48 |
Hybrid binary arithmetic optimization algorithm with simulated annealing for feature selection in high-dimensional biomedical data
|
Pashaei, Elham |
|
|
|
13 |
p. 15598-15637 |
artikel |
49 |
Hybrid deep learning model for answering visual medical questions
|
Gasmi, Karim |
|
|
|
13 |
p. 15042-15059 |
artikel |
50 |
Hyperbolic trees for efficient routing computation
|
Heszberger, Zalán |
|
|
|
13 |
p. 15250-15268 |
artikel |
51 |
Investigating the effect of varying block size on power and energy consumption of GPU kernels
|
Ikram, Muhammad Jawad |
|
|
|
13 |
p. 14919-14939 |
artikel |
52 |
LOCP: Latency-optimized channel pruning for CNN inference acceleration on GPUs
|
Zhang, Yonghua |
|
|
|
13 |
p. 14313-14341 |
artikel |
53 |
MISR: a multiple behavior interactive enhanced learning model for social-aware recommendation
|
Liang, Xiufang |
|
|
|
13 |
p. 14221-14244 |
artikel |
54 |
Mitigating the NUMA effect on task-based runtime systems
|
Maroñas, Marcos |
|
|
|
13 |
p. 14287-14312 |
artikel |
55 |
MultiOff: offloading support and service deployment for multiple IoT applications in mobile edge computing
|
Li, Ming |
|
|
|
13 |
p. 15123-15153 |
artikel |
56 |
New numerical methods for solving the partial fractional differential equations with uniform and non-uniform meshes
|
Javidi, Mohammad |
|
|
|
13 |
p. 14457-14488 |
artikel |
57 |
On the impact of information-sharing model between subpopulations in the Island-based evolutionary algorithms: search manager framework as a case study
|
Abdi, Yousef |
|
|
|
13 |
p. 14245-14286 |
artikel |
58 |
Parallel design and implementation of Jacobi iterative algorithm based on ternary optical computer
|
Song, Kai |
|
|
|
13 |
p. 14965-14990 |
artikel |
59 |
Path covers of bubble-sort star graphs
|
Cheng, Dongqin |
|
|
|
13 |
p. 14848-14868 |
artikel |
60 |
Predicting product advertisement links using hybrid learning within social networks
|
Ebadi Jokandan, Seyed Mohsen |
|
|
|
13 |
p. 15023-15050 |
artikel |
61 |
Privacy-preserving multi-party PCA computation on horizontally and vertically partitioned data based on outsourced QR decomposition
|
Jaberi, Mehrad |
|
|
|
13 |
p. 14358-14387 |
artikel |
62 |
Proactive threshold-proxy re-encryption scheme for secure data sharing on cloud
|
Raghav, |
|
|
|
13 |
p. 14117-14145 |
artikel |
63 |
Probabilistic coverage in mobile directional sensor networks: a game theoretical approach
|
Golrasan, Elham |
|
|
|
13 |
p. 14200-14220 |
artikel |
64 |
Queries with aggregate functions over fuzzy RDF data
|
Ma, Zongmin |
|
|
|
13 |
p. 14780-14807 |
artikel |
65 |
Real-time anomaly detection system within the scope of smart factories
|
Bayraktar, Cihan |
|
|
|
13 |
p. 14707-14742 |
artikel |
66 |
Reliability analysis of the pentanary n-cube based on h-extra edge-connectivity with a concentration behavior
|
Liang, Tengteng |
|
|
|
13 |
p. 15504-15531 |
artikel |
67 |
Resource management and switch migration in SDN-based multi-access edge computing environments
|
Guo, Jingjing |
|
|
|
13 |
p. 15532-15566 |
artikel |
68 |
S-Edge: heterogeneity-aware, light-weighted, and edge computing integrated adaptive traffic light control framework
|
Sachan, Anuj |
|
|
|
13 |
p. 14923-14953 |
artikel |
69 |
Selection of Six Sigma projects based on integrated multi-criteria decision-making methods: the case of the software development industry
|
Ayyıldız, Tülin Erçelebi |
|
|
|
13 |
p. 14981-15003 |
artikel |
70 |
SeQual: an unsupervised feature selection method for cloud workload traces
|
Ali, Shallaw Mohammed |
|
|
|
13 |
p. 15079-15097 |
artikel |
71 |
SIMD vectorization for simultaneous solution of locally varying linear systems with multiple right-hand sides
|
Kühn, Martin J. |
|
|
|
13 |
p. 14684-14706 |
artikel |
72 |
Supercomputing of reducing sequenced bases in de novo sequencing of the human genome
|
Kavezadeh, Shirin |
|
|
|
13 |
p. 14769-14793 |
artikel |
73 |
TARA: weighted majority cooperative game theory-based task assignment and resource allocation in 5G heterogeneous fog network for IoT
|
Ghosh, Subha |
|
|
|
13 |
p. 14633-14683 |
artikel |
74 |
TempChain: a blockchain scheme for telehealth data sharing between two blockchains using property mapping function
|
Dewangan, Narendra K. |
|
|
|
13 |
p. 14808-14826 |
artikel |
75 |
The music demixing machine: toward real-time remixing of classical music
|
Cabañas-Molero, Pablo |
|
|
|
13 |
p. 14342-14357 |
artikel |
76 |
Thresholding methods in non-intrusive load monitoring
|
Precioso, Daniel |
|
|
|
13 |
p. 14039-14062 |
artikel |
77 |
UAV-assisted ubiquitous communication architecture for urban VANET environment
|
Raza, Ali |
|
|
|
13 |
p. 14602-14632 |
artikel |
78 |
URMP: using reconfigurable multicast path for NoC-based deep neural network accelerators
|
Ouyang, Yiming |
|
|
|
13 |
p. 14827-14847 |
artikel |
79 |
Vertex transitivity and distance metric of the quad-cube
|
Jha, Pranava K. |
|
|
|
13 |
p. 13952-13970 |
artikel |
80 |
Virtual reality human–robot interaction technology acceptance model for learning direct current and alternating current
|
Lo, Chih-Min |
|
|
|
13 |
p. 15314-15337 |
artikel |
81 |
YOLOOD: an arbitrary-oriented flexible flat cable detection method in robotic assembly
|
Bai, Yuxuan |
|
|
|
13 |
p. 14869-14893 |
artikel |