nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A DSL for specifying run-time adaptations for embedded systems: an application to vehicle stereo navigation
|
Santos, André C. |
|
2014 |
70 |
3 |
p. 1218-1248 |
artikel |
2 |
A simple distributed garbage collector for distributed real-time Java
|
Basanta-Val, Pablo |
|
2014 |
70 |
3 |
p. 1588-1616 |
artikel |
3 |
Cloud-assisted analysis for energy efficiency in intelligent video systems
|
Dai, Jie |
|
2014 |
70 |
3 |
p. 1345-1364 |
artikel |
4 |
CloudTaint: an elastic taint tracking framework for malware detection in the cloud
|
Yuan, Jinfeng |
|
2014 |
70 |
3 |
p. 1433-1450 |
artikel |
5 |
Decluster: a complex network model-based data center network topology
|
Zhang, Xu |
|
2014 |
70 |
3 |
p. 1365-1382 |
artikel |
6 |
Design and analysis of secure host-based mobility protocol for wireless heterogeneous networks
|
El Bouabidi, Imen |
|
2014 |
70 |
3 |
p. 1036-1050 |
artikel |
7 |
Design and implementation of process-aware predictive scheduling scheme for virtual machine
|
Xie, Xia |
|
2014 |
70 |
3 |
p. 1577-1587 |
artikel |
8 |
Dynamic forecast scheduling algorithm for virtual machine placement in cloud computing environment
|
Tang, Zhuo |
|
2014 |
70 |
3 |
p. 1279-1296 |
artikel |
9 |
Efficient and secure key extraction using channel state information
|
Wang, Zhi |
|
2014 |
70 |
3 |
p. 1537-1554 |
artikel |
10 |
Energy measurement, modeling, and prediction for processors with frequency scaling
|
Rauber, Thomas |
|
2014 |
70 |
3 |
p. 1451-1476 |
artikel |
11 |
Energy-saving model for SDN data centers
|
Tu, Renlong |
|
2014 |
70 |
3 |
p. 1477-1495 |
artikel |
12 |
Erratum to: Exploiting smart spaces for interactive TV applications development
|
Saleemi, M. Mohsin |
|
2014 |
70 |
3 |
p. 1617 |
artikel |
13 |
Exploiting application-level similarity to improve SSD cache performance in Hadoop
|
Chen, Zhijian |
|
2014 |
70 |
3 |
p. 1331-1344 |
artikel |
14 |
Exploiting smart spaces for interactive TV applications development
|
Saleemi, M. Mohsin |
|
2014 |
70 |
3 |
p. 1200-1217 |
artikel |
15 |
H.264/AVC video error concealment algorithm by employing motion vector recovery under cloud computing environment
|
Liu, Xingang |
|
2014 |
70 |
3 |
p. 1180-1199 |
artikel |
16 |
LR-FEAD: leakage-tolerating and attribute-hiding functional encryption mechanism with delegation in affine subspaces
|
Zhang, Mingwu |
|
2014 |
70 |
3 |
p. 1405-1432 |
artikel |
17 |
Multiperiod robust optimization for proactive resource provisioning in virtualized data centers
|
Takouna, Ibrahim |
|
2014 |
70 |
3 |
p. 1514-1536 |
artikel |
18 |
On studying business models in mobile social networks based on two-sided market (TSM)
|
Wang, Yufeng |
|
2014 |
70 |
3 |
p. 1297-1317 |
artikel |
19 |
Optimized big data K-means clustering using MapReduce
|
Cui, Xiaoli |
|
2014 |
70 |
3 |
p. 1249-1259 |
artikel |
20 |
Peacock: a customizable MapReduce for multicore platform
|
Wu, Song |
|
2014 |
70 |
3 |
p. 1496-1513 |
artikel |
21 |
PerContRep: a practical reputation system for pervasive content services
|
Yan, Zheng |
|
2014 |
70 |
3 |
p. 1051-1074 |
artikel |
22 |
Performance–energy adaptation of parallel programs in pervasive computing
|
Zhu, Liang |
|
2014 |
70 |
3 |
p. 1260-1278 |
artikel |
23 |
Performance evaluation of snapshot isolation in distributed database system under failure-prone environment
|
Luo, C. |
|
2014 |
70 |
3 |
p. 1156-1179 |
artikel |
24 |
Real-time blind audio source separation: performance assessment on an advanced digital signal processor
|
Pani, Danilo |
|
2014 |
70 |
3 |
p. 1555-1576 |
artikel |
25 |
Research on robust control and exponential stabilization for large scale impulsive hybrid network systems with time-delay
|
Chen, Lanping |
|
2013 |
70 |
3 |
p. 1023-1035 |
artikel |
26 |
Robust architecture for distributed intelligence in an IP-based mobile wide-area surveillance system
|
Nieminen, Mikko |
|
2014 |
70 |
3 |
p. 1120-1141 |
artikel |
27 |
SmartMic: a smartphone-based meeting support system
|
Xu, Huang |
|
2014 |
70 |
3 |
p. 1318-1330 |
artikel |
28 |
Taxonomy of trust relationships in authorization domains for cloud computing
|
Marin Perez, Juan M. |
|
2014 |
70 |
3 |
p. 1075-1099 |
artikel |
29 |
The insecurity of two proxy signcryption schemes: proxy credential forgery attack and how to prevent it
|
Yeh, Jyh-haw |
|
2014 |
70 |
3 |
p. 1100-1119 |
artikel |
30 |
UAV-assisted data gathering in wireless sensor networks
|
Dong, Mianxiong |
|
2014 |
70 |
3 |
p. 1142-1155 |
artikel |
31 |
$$\upmu \mathrm{DC}^2$$μDC2: unified data collection for data centers
|
Xia, Wenfeng |
|
2014 |
70 |
3 |
p. 1383-1404 |
artikel |