Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             31 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A DSL for specifying run-time adaptations for embedded systems: an application to vehicle stereo navigation Santos, André C.
2014
70 3 p. 1218-1248
artikel
2 A simple distributed garbage collector for distributed real-time Java Basanta-Val, Pablo
2014
70 3 p. 1588-1616
artikel
3 Cloud-assisted analysis for energy efficiency in intelligent video systems Dai, Jie
2014
70 3 p. 1345-1364
artikel
4 CloudTaint: an elastic taint tracking framework for malware detection in the cloud Yuan, Jinfeng
2014
70 3 p. 1433-1450
artikel
5 Decluster: a complex network model-based data center network topology Zhang, Xu
2014
70 3 p. 1365-1382
artikel
6 Design and analysis of secure host-based mobility protocol for wireless heterogeneous networks El Bouabidi, Imen
2014
70 3 p. 1036-1050
artikel
7 Design and implementation of process-aware predictive scheduling scheme for virtual machine Xie, Xia
2014
70 3 p. 1577-1587
artikel
8 Dynamic forecast scheduling algorithm for virtual machine placement in cloud computing environment Tang, Zhuo
2014
70 3 p. 1279-1296
artikel
9 Efficient and secure key extraction using channel state information Wang, Zhi
2014
70 3 p. 1537-1554
artikel
10 Energy measurement, modeling, and prediction for processors with frequency scaling Rauber, Thomas
2014
70 3 p. 1451-1476
artikel
11 Energy-saving model for SDN data centers Tu, Renlong
2014
70 3 p. 1477-1495
artikel
12 Erratum to: Exploiting smart spaces for interactive TV applications development Saleemi, M. Mohsin
2014
70 3 p. 1617
artikel
13 Exploiting application-level similarity to improve SSD cache performance in Hadoop Chen, Zhijian
2014
70 3 p. 1331-1344
artikel
14 Exploiting smart spaces for interactive TV applications development Saleemi, M. Mohsin
2014
70 3 p. 1200-1217
artikel
15 H.264/AVC video error concealment algorithm by employing motion vector recovery under cloud computing environment Liu, Xingang
2014
70 3 p. 1180-1199
artikel
16 LR-FEAD: leakage-tolerating and attribute-hiding functional encryption mechanism with delegation in affine subspaces Zhang, Mingwu
2014
70 3 p. 1405-1432
artikel
17 Multiperiod robust optimization for proactive resource provisioning in virtualized data centers Takouna, Ibrahim
2014
70 3 p. 1514-1536
artikel
18 On studying business models in mobile social networks based on two-sided market (TSM) Wang, Yufeng
2014
70 3 p. 1297-1317
artikel
19 Optimized big data K-means clustering using MapReduce Cui, Xiaoli
2014
70 3 p. 1249-1259
artikel
20 Peacock: a customizable MapReduce for multicore platform Wu, Song
2014
70 3 p. 1496-1513
artikel
21 PerContRep: a practical reputation system for pervasive content services Yan, Zheng
2014
70 3 p. 1051-1074
artikel
22 Performance–energy adaptation of parallel programs in pervasive computing Zhu, Liang
2014
70 3 p. 1260-1278
artikel
23 Performance evaluation of snapshot isolation in distributed database system under failure-prone environment Luo, C.
2014
70 3 p. 1156-1179
artikel
24 Real-time blind audio source separation: performance assessment on an advanced digital signal processor Pani, Danilo
2014
70 3 p. 1555-1576
artikel
25 Research on robust control and exponential stabilization for large scale impulsive hybrid network systems with time-delay Chen, Lanping
2013
70 3 p. 1023-1035
artikel
26 Robust architecture for distributed intelligence in an IP-based mobile wide-area surveillance system Nieminen, Mikko
2014
70 3 p. 1120-1141
artikel
27 SmartMic: a smartphone-based meeting support system Xu, Huang
2014
70 3 p. 1318-1330
artikel
28 Taxonomy of trust relationships in authorization domains for cloud computing Marin Perez, Juan M.
2014
70 3 p. 1075-1099
artikel
29 The insecurity of two proxy signcryption schemes: proxy credential forgery attack and how to prevent it Yeh, Jyh-haw
2014
70 3 p. 1100-1119
artikel
30 UAV-assisted data gathering in wireless sensor networks Dong, Mianxiong
2014
70 3 p. 1142-1155
artikel
31 $$\upmu \mathrm{DC}^2$$μDC2: unified data collection for data centers Xia, Wenfeng
2014
70 3 p. 1383-1404
artikel
                             31 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland