nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Accelerated bulk memory operations on heterogeneous multi-core systems
|
Lee, JongHyuk |
|
2018 |
74 |
12 |
p. 6898-6922 |
artikel |
2 |
A design and implementation of a framework for games in IoT
|
Kim, Hye-Young |
|
2017 |
74 |
12 |
p. 6516-6528 |
artikel |
3 |
A dynamic multiple-keys game-based industrial wireless sensor-cloud authentication scheme
|
Li, Dazhi |
|
2018 |
74 |
12 |
p. 6794-6814 |
artikel |
4 |
Analyzing the traffic of penetration testing tools with an IDS
|
Muñoz, Fernando Román |
|
2016 |
74 |
12 |
p. 6454-6469 |
artikel |
5 |
An efficient transmission method based on HEVC multi-view adaptive video streaming over P2P network in NFV
|
Ma, Linh Van |
|
2018 |
74 |
12 |
p. 6939-6959 |
artikel |
6 |
An energy efficiency grading system for mobile applications based on usage patterns
|
Baek, Dusan |
|
2018 |
74 |
12 |
p. 6502-6515 |
artikel |
7 |
An energy-saving strategy based on multi-server vacation queuing theory in cloud data center
|
Chunxia, Yin |
|
2018 |
74 |
12 |
p. 6766-6784 |
artikel |
8 |
An event-driven plan recognition algorithm based on intuitionistic fuzzy theory
|
Wang, Xiaofan |
|
2018 |
74 |
12 |
p. 6923-6938 |
artikel |
9 |
An improved ant colony optimization-based approach with mobile sink for wireless sensor networks
|
Wang, Jin |
|
2017 |
74 |
12 |
p. 6633-6645 |
artikel |
10 |
A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers
|
Kumari, Saru |
|
2017 |
74 |
12 |
p. 6428-6453 |
artikel |
11 |
CF-CloudOrch: container fog node-based cloud orchestration for IoT networks
|
Kim, Nam Yong |
|
2018 |
74 |
12 |
p. 7024-7045 |
artikel |
12 |
Cloud workflow scheduling with hybrid resource provisioning
|
Chen, Long |
|
2017 |
74 |
12 |
p. 6529-6553 |
artikel |
13 |
Compact deep learned feature-based face recognition for Visual Internet of Things
|
Oh, Seon Ho |
|
2017 |
74 |
12 |
p. 6729-6741 |
artikel |
14 |
DCSACA: distributed constraint service-aware collaborative access algorithm based on large-scale access to the Internet of Things
|
Meng, Yi |
|
2018 |
74 |
12 |
p. 6408-6427 |
artikel |
15 |
Deep feature learning for person re-identification in a large-scale crowdsourced environment
|
Oh, Seon Ho |
|
2018 |
74 |
12 |
p. 6753-6765 |
artikel |
16 |
Detection of damaged files and measurement of similarity to originals using entropy graph characteristics
|
Cho, Chaeho |
|
2017 |
74 |
12 |
p. 6719-6728 |
artikel |
17 |
Energy management strategy in cloud computing: a perspective study
|
Chaabouni, Taha |
|
2017 |
74 |
12 |
p. 6569-6597 |
artikel |
18 |
Enlargement of vulnerable web applications for testing
|
Román Muñoz, Fernando |
|
2017 |
74 |
12 |
p. 6598-6617 |
artikel |
19 |
Fog-based energy-efficient routing protocol for wireless sensor networks
|
Borujeni, Elham Mirzavand |
|
2018 |
74 |
12 |
p. 6831-6858 |
artikel |
20 |
Future computing with IoT and cloud computing
|
Park, D. S. |
|
2018 |
74 |
12 |
p. 6401-6407 |
artikel |
21 |
Host load prediction with long short-term memory in cloud computing
|
Song, Binbin |
|
2017 |
74 |
12 |
p. 6554-6568 |
artikel |
22 |
Information science techniques for investigating research areas: a case study in telecommunications policy
|
Kim, Sung-Kil |
|
2017 |
74 |
12 |
p. 6691-6718 |
artikel |
23 |
IoT service classification and clustering for integration of IoT service platforms
|
Lee, Daewon |
|
2018 |
74 |
12 |
p. 6859-6875 |
artikel |
24 |
Job submission and monitoring management in integrated computing environment for finite element analysis
|
Jung, Daeyong |
|
2018 |
74 |
12 |
p. 6960-6975 |
artikel |
25 |
Logically isolated group network for virtual convergence environment over SD-WAN
|
Kim, Dongkyun |
|
2018 |
74 |
12 |
p. 6742-6752 |
artikel |
26 |
Mobile forensic reference set (MFReS) and mobile forensic investigation for android devices
|
Kim, Dohyun |
|
2017 |
74 |
12 |
p. 6618-6632 |
artikel |
27 |
Modified adaptive support weight and disparity search range estimation schemes for stereo matching processors
|
Ok, Seung-Ho |
|
2017 |
74 |
12 |
p. 6665-6690 |
artikel |
28 |
Multi-objective optimization design for multi-source multicasting MIMO AF relay systems
|
Zhu, Min |
|
2018 |
74 |
12 |
p. 6815-6830 |
artikel |
29 |
On construction of a virtual GPU cluster with InfiniBand and 10 Gb Ethernet virtualization
|
Yang, Chao-Tung |
|
2018 |
74 |
12 |
p. 6876-6897 |
artikel |
30 |
Power function-based signal recovery transition optimization model of emergency traffic
|
Yao, Jiao |
|
2018 |
74 |
12 |
p. 7003-7023 |
artikel |
31 |
Privacy-aware task data management using TPR*-Tree for trajectory-based crowdsourcing
|
Li, Yan |
|
2018 |
74 |
12 |
p. 6976-6987 |
artikel |
32 |
Resource provisioning for cloud applications: a 3-D, provident and flexible approach
|
Aslanpour, Mohammad Sadegh |
|
2017 |
74 |
12 |
p. 6470-6501 |
artikel |
33 |
Secure mobile device structure for trust IoT
|
Lee, Yun-kyung |
|
2017 |
74 |
12 |
p. 6646-6664 |
artikel |
34 |
Semi-real-time removal of baseline fluctuations in electrocardiogram (ECG) signals by an infinite impulse response low-pass filter (IIR-LPF)
|
Kim, Jeong-Hwan |
|
2018 |
74 |
12 |
p. 6785-6793 |
artikel |
35 |
Utilizing a lightweight PKI mechanism to guarantee a secure service in a cloud environment
|
Park, Sangho |
|
2018 |
74 |
12 |
p. 6988-7002 |
artikel |