nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A basketball game prediction system based on artificial intelligence
|
Chen, Meihong |
|
|
78 |
10 |
p. 12528-12552 |
artikel |
2 |
A hybrid deep learning approach for skin cancer diagnosis using subband fusion of 3D wavelets
|
Maniraj, S. P. |
|
|
78 |
10 |
p. 12394-12409 |
artikel |
3 |
A joint computational and resource allocation model for fast parallel data processing in fog computing
|
Lakzaei, Mahmood |
|
|
78 |
10 |
p. 12662-12685 |
artikel |
4 |
Analysis on improving the application of machine learning in product development
|
Chang, Yu-Teng |
|
|
78 |
10 |
p. 12435-12460 |
artikel |
5 |
An analytical modelling and QoS evaluation of fault-tolerant load balancer and web servers in fog computing
|
Aldağ, Mehmet |
|
|
78 |
10 |
p. 12136-12158 |
artikel |
6 |
An efficient remote user authentication with key agreement procedure based on convolution-Chebyshev chaotic maps using biometric
|
Meshram, Chandrashekhar |
|
|
78 |
10 |
p. 12792-12814 |
artikel |
7 |
An improved bat algorithm with velocity weight and curve decreasing
|
Ye, Yun |
|
|
78 |
10 |
p. 12461-12475 |
artikel |
8 |
An improved method of identifying learner's behaviors based on deep learning
|
Liu, Suping |
|
|
78 |
10 |
p. 12861-12872 |
artikel |
9 |
Attention-based Conv-LSTM and Bi-LSTM networks for large-scale traffic speed prediction
|
Hu, Xiaojian |
|
|
78 |
10 |
p. 12686-12709 |
artikel |
10 |
Authenticated key agreement protocols for dew-assisted IoT systems
|
Braeken, An |
|
|
78 |
10 |
p. 12093-12113 |
artikel |
11 |
Cognitive decision-making in smart police industry
|
Ahanger, Tariq Ahamed |
|
|
78 |
10 |
p. 12834-12860 |
artikel |
12 |
Correction to: FLSGD: free local SGD with parallel synchronization
|
Ye, Qing |
|
|
78 |
10 |
p. 12434 |
artikel |
13 |
Correction to: Theoretical peak FLOPS per instruction set: a tutorial
|
Dolbeau, Romain |
|
|
78 |
10 |
p. 12929 |
artikel |
14 |
D-ACSM: a technique for dynamically assigning and adjusting cluster patterns for IoT data analysis
|
Balakrishna, Sivadi |
|
|
78 |
10 |
p. 12873-12897 |
artikel |
15 |
Distributed algorithm for computation offloading in mobile edge computing considering user mobility and task randomness
|
Zheng, F. Yifeng |
|
|
78 |
10 |
p. 12476-12504 |
artikel |
16 |
Docker platform aging: a systematic performance evaluation and prediction of resource consumption
|
Vinícius, Lucas |
|
|
78 |
10 |
p. 12898-12928 |
artikel |
17 |
FLSGD: free local SGD with parallel synchronization
|
Ye, Qing |
|
|
78 |
10 |
p. 12410-12433 |
artikel |
18 |
High-performance visual geometric group deep learning architectures for MRI brain tumor classification
|
Veni, N. |
|
|
78 |
10 |
p. 12753-12764 |
artikel |
19 |
HyPar-FCA: a distributed framework based on hybrid partitioning for FCA
|
Packiaraj, Muneeswaran |
|
|
78 |
10 |
p. 12589-12620 |
artikel |
20 |
Independent spanning trees in Eisenstein–Jacobi networks
|
Hussain, Zaid |
|
|
78 |
10 |
p. 12114-12135 |
artikel |
21 |
Intrusion detection for IoT based on a hybrid shuffled shepherd optimization algorithm
|
Alweshah, Mohammed |
|
|
78 |
10 |
p. 12278-12309 |
artikel |
22 |
Performance and availability evaluation of the blockchain platform hyperledger fabric
|
Melo, Carlos |
|
|
78 |
10 |
p. 12505-12527 |
artikel |
23 |
POWER: probabilistic weight-based energy-efficient cluster routing for large-scale wireless sensor networks
|
Farooq, Muhammad Umar |
|
|
78 |
10 |
p. 12765-12791 |
artikel |
24 |
Provably secure post-quantum authenticated key exchange from supersingular isogenies
|
Qi, Mingping |
|
|
78 |
10 |
p. 12815-12833 |
artikel |
25 |
Providing quality of service in omni-path networks
|
Cano-Cano, Javier |
|
|
78 |
10 |
p. 12310-12343 |
artikel |
26 |
Queue congestion prediction for large-scale high performance computing systems using a hidden Markov model
|
Park, Ju-Won |
|
|
78 |
10 |
p. 12202-12223 |
artikel |
27 |
Runtime hardware Trojan detection by reconfigurable monitoring circuits
|
Fani, Reza |
|
|
78 |
10 |
p. 12726-12752 |
artikel |
28 |
Satellite imagery analysis for road segmentation using U-Net architecture
|
Chaudhary, Vidhi |
|
|
78 |
10 |
p. 12710-12725 |
artikel |
29 |
Target tracking algorithm based on multiscale analysis and combinatorial matching
|
Wang, Yanni |
|
|
78 |
10 |
p. 12648-12661 |
artikel |
30 |
The distance measurement based on corner detection for rebar spacing in engineering images
|
An, MingShou |
|
|
78 |
10 |
p. 12380-12393 |
artikel |
31 |
The influence of dependability in cloud computing adoption
|
Song, Chi-hoon |
|
|
78 |
10 |
p. 12159-12201 |
artikel |
32 |
The OCR-Vx experience: lessons learned from designing and implementing a task-based runtime system
|
Dokulil, Jiri |
|
|
78 |
10 |
p. 12344-12379 |
artikel |
33 |
TSMSA: a 2DSPP algorithm with multi-strategy rectangle selection
|
Guo, Ping |
|
|
78 |
10 |
p. 12242-12277 |
artikel |
34 |
Using a Multi-GPU node to accelerate the training of Pix2Pix neural networks
|
Lupión, M. |
|
|
78 |
10 |
p. 12224-12241 |
artikel |
35 |
Vectorizing divergent control flow with active-lane consolidation on long-vector architectures
|
Praharenka, Wyatt |
|
|
78 |
10 |
p. 12553-12588 |
artikel |
36 |
Web services recommendation based on Metapath-guided graph attention network
|
Li, Xiaoyu |
|
|
78 |
10 |
p. 12621-12647 |
artikel |