nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A context-aware encryption protocol suite for edge computing-based IoT devices
|
Dar, Zaineb |
|
|
76 |
4 |
p. 2548-2567 |
artikel |
2 |
A framework for IoT service selection
|
Baranwal, Gaurav |
|
|
76 |
4 |
p. 2777-2814 |
artikel |
3 |
A generalized pixel value ordering data hiding with adaptive embedding capability
|
Lee, Chin-Feng |
|
|
76 |
4 |
p. 2683-2714 |
artikel |
4 |
A matrix representation method for decoders using majority gate characteristics in quantum-dot cellular automata
|
Deng, Feifei |
|
|
76 |
4 |
p. 2842-2859 |
artikel |
5 |
A memory scheduling strategy for eliminating memory access interference in heterogeneous system
|
Fang, Juan |
|
|
76 |
4 |
p. 3129-3154 |
artikel |
6 |
An ANFIS-based compatibility scorecard for IoT integration in websites
|
Kumar, Akshi |
|
|
76 |
4 |
p. 2568-2596 |
artikel |
7 |
A new algorithm of stock data mining in Internet of Multimedia Things
|
Yang, Jinfei |
|
|
76 |
4 |
p. 2374-2389 |
artikel |
8 |
An optimized time series combined forecasting method based on neural networks
|
Zhao, Kaiyi |
|
|
76 |
4 |
p. 2986-3012 |
artikel |
9 |
A novel warp scheduling scheme considering long-latency operations for high-performance GPUs
|
Do, Cong Thuan |
|
|
76 |
4 |
p. 3043-3062 |
artikel |
10 |
A quantitative evaluation of unified memory in GPUs
|
Yu, Qi |
|
|
76 |
4 |
p. 2958-2985 |
artikel |
11 |
A robust extreme learning machine framework for uncertain data classification
|
Jing, Shibo |
|
|
76 |
4 |
p. 2390-2416 |
artikel |
12 |
A scoping review of searchable encryption schemes in cloud computing: taxonomy, methods, and recent developments
|
Varri, Umasankararao |
|
|
76 |
4 |
p. 3013-3042 |
artikel |
13 |
Binary cuckoo search metaheuristic-based supercomputing framework for human behavior analysis in smart home
|
Kaur, Maninder |
|
|
76 |
4 |
p. 2479-2502 |
artikel |
14 |
Challenges of server consolidation in virtualized data centers and open research issues: a systematic literature review
|
Abadi, Reza Mohamadi Bahram |
|
|
76 |
4 |
p. 2876-2927 |
artikel |
15 |
Classification of the tree for aerial image using a deep convolution neural network and visual feature clustering
|
Lin, Chuen Horng |
|
|
76 |
4 |
p. 2503-2517 |
artikel |
16 |
Comparative study of illumination-invariant foreground detection
|
Karthikeyan, P. R. |
|
|
76 |
4 |
p. 2289-2301 |
artikel |
17 |
Correction to: Challenges of server consolidation in virtualized data centers and open research issues: a systematic literature review
|
Abadi, Reza Mohamadi Bahram |
|
|
76 |
4 |
p. 2928 |
artikel |
18 |
Correction to: Efficient noise injection for exposing hidden data races
|
Yu, Misun |
|
|
76 |
4 |
p. 3155 |
artikel |
19 |
Development of software reliability models using a hybrid approach and validation of the proposed models using big data
|
Govindasamy, P. |
|
|
76 |
4 |
p. 2252-2265 |
artikel |
20 |
Early warning indexes determination of the crop injuries caused by waterlogging based on DHSVM model
|
Ma, Yan |
|
|
76 |
4 |
p. 2435-2448 |
artikel |
21 |
Editor’s note
|
|
|
|
76 |
4 |
p. 2239 |
artikel |
22 |
Efficient computation offloading for Internet of Vehicles in edge computing-assisted 5G networks
|
Wan, Shaohua |
|
|
76 |
4 |
p. 2518-2547 |
artikel |
23 |
Empirical study on application of machine learning techniques for resource allocation in health care using KPI
|
Skylakha, S. |
|
|
76 |
4 |
p. 2266-2274 |
artikel |
24 |
Exemplar-based data stream clustering toward Internet of Things
|
Jiang, Yizhang |
|
|
76 |
4 |
p. 2929-2957 |
artikel |
25 |
HPDMS: high-performance data harvesting in wireless sensor networks with mobile sinks
|
Najjar-Ghabel, Samad |
|
|
76 |
4 |
p. 2748-2776 |
artikel |
26 |
Integration and exploitation of intra-routine malleability in BLIS
|
Rodríguez-Sánchez, Rafael |
|
|
76 |
4 |
p. 2860-2875 |
artikel |
27 |
Intelligent robust control for cyber-physical systems of rotary gantry type under denial of service attack
|
Sayad Haghighi, Mohammad |
|
|
76 |
4 |
p. 3063-3085 |
artikel |
28 |
Internet-of-Things-aided energy management in smart grid environment
|
Amarnath, D. |
|
|
76 |
4 |
p. 2302-2314 |
artikel |
29 |
MBitCuts: optimal bit-level cutting in geometric space packet classification
|
Abbasi, Mahdi |
|
|
76 |
4 |
p. 3105-3128 |
artikel |
30 |
Measuring data-centre workflows complexity through process mining: the Google cluster case
|
Fernández-Cerero, Damián |
|
|
76 |
4 |
p. 2449-2478 |
artikel |
31 |
Mining image frequent patterns based on a frequent pattern list in image databases
|
Chang, Ye-In |
|
|
76 |
4 |
p. 2597-2621 |
artikel |
32 |
Modeling neutrosophic variables based on particle swarm optimization and information theory measures for forest fires
|
Gafar, Mona Gamal |
|
|
76 |
4 |
p. 2339-2356 |
artikel |
33 |
Perfect forward secrecy via an ECC-based authentication scheme for SIP in VoIP
|
Nikooghadam, Mahdi |
|
|
76 |
4 |
p. 3086-3104 |
artikel |
34 |
Performance analysis of data compression algorithms for heterogeneous architecture through parallel approach
|
Mahammad, Farooq Sunar |
|
|
76 |
4 |
p. 2275-2288 |
artikel |
35 |
Research on feature extraction and segmentation of rover wheel imprint
|
Li, Nan |
|
|
76 |
4 |
p. 2357-2373 |
artikel |
36 |
Research on the evolution of participants collaboration mechanism in PPP model based on computer simulation: based on the old community renovation project
|
Guo, Bin |
|
|
76 |
4 |
p. 2417-2434 |
artikel |
37 |
RETRACTED ARTICLE: Research on a distributed auto-negotiation model based on Stackelberg game theory
|
Tian, Ran |
|
|
76 |
4 |
p. 2240-2251 |
artikel |
38 |
Rio: a personal storage system in multi-device and cloud
|
Wang, Feng |
|
|
76 |
4 |
p. 2315-2338 |
artikel |
39 |
Securing smart vehicles from relay attacks using machine learning
|
Ahmad, Usman |
|
|
76 |
4 |
p. 2665-2682 |
artikel |
40 |
Structured mesh-oriented framework design and optimization for a coarse-grained parallel CFD solver based on hybrid MPI/OpenMP programming
|
He, Feng |
|
|
76 |
4 |
p. 2815-2841 |
artikel |
41 |
Theoretical modeling for performance analysis of IEEE 1901 power-line communication networks in the multi-hop environment
|
Hao, Sheng |
|
|
76 |
4 |
p. 2715-2747 |
artikel |
42 |
Threats on the horizon: understanding security threats in the era of cyber-physical systems
|
Walker-Roberts, Steven |
|
|
76 |
4 |
p. 2643-2664 |
artikel |
43 |
Vulnerability assessment method for cyber-physical system considering node heterogeneity
|
Wang, Bo |
|
|
76 |
4 |
p. 2622-2642 |
artikel |