nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A conceptual investigation of the effect of random numbers over the performance of metaheuristic algorithms
|
Kuyu, Yiğit Çağatay |
|
|
79 |
13 |
p. 13971-14038 |
artikel |
2 |
A GPU method for the analysis stage of the SPTRSV kernel
|
Freire, Manuel |
|
|
79 |
13 |
p. 15051-15078 |
artikel |
3 |
A joint optimization scheme of task caching and offloading for smart factories
|
Qu, Xiaofeng |
|
|
79 |
13 |
p. 15185-15211 |
artikel |
4 |
An anonymous and fair auction system based on blockchain
|
Ye, Zongli |
|
|
79 |
13 |
p. 13909-13951 |
artikel |
5 |
An efficient dynamic transaction storage mechanism for sustainable high-throughput Bitcoin
|
Zhao, Xiongfei |
|
|
79 |
13 |
p. 14388-14426 |
artikel |
6 |
A practical privacy-preserving nearest neighbor searching method over encrypted spatial data
|
Zhang, Jing |
|
|
79 |
13 |
p. 14146-14171 |
artikel |
7 |
A survey on implementations of homomorphic encryption schemes
|
Doan, Thi Van Thao |
|
|
79 |
13 |
p. 15098-15139 |
artikel |
8 |
A traceable and revocable multi-authority attribute-based access control scheme for mineral industry data secure storage in blockchain
|
Zhang, Xiaohong |
|
|
79 |
13 |
p. 14743-14779 |
artikel |
9 |
CoFB: latency-constrained co-scheduling of flows and batches for deep learning inference service on the CPU–GPU system
|
Zhang, Qi |
|
|
79 |
13 |
p. 14172-14199 |
artikel |
10 |
Component-wise design method of fuzzy C-means clustering validity function based on CRITIC combination weighting
|
Wang, Guan |
|
|
79 |
13 |
p. 14571-14601 |
artikel |
11 |
Constructing conditional PKEET with verification mechanism for data privacy protection in intelligent systems
|
Hong, Hanshu |
|
|
79 |
13 |
p. 15004-15022 |
artikel |
12 |
Correction to: FPGA implementation of hardware accelerated RTOS based on real-time event handling
|
Zagan, Ionel |
|
|
79 |
13 |
p. 15213 |
artikel |
13 |
Correction to: Improve customer churn prediction through the proposed PCA‑PSO‑K means algorithm in the communication industry
|
Sadeghi, Maryam |
|
|
79 |
13 |
p. 15212 |
artikel |
14 |
CPU power and network bandwidth-aware optimal block size computation for blockchain-based applications using meta-heuristic algorithms
|
Singh, Nikita |
|
|
79 |
13 |
p. 14063-14078 |
artikel |
15 |
Energy-aware edge server placement using the improved butterfly optimization algorithm
|
Asghari, Ali |
|
|
79 |
13 |
p. 14954-14980 |
artikel |
16 |
Energy cost optimization in distribution network considering hybrid electric vehicle and photovoltaic using modified whale optimization algorithm
|
Zadehbagheri, Mahmoud |
|
|
79 |
13 |
p. 14427-14456 |
artikel |
17 |
Enhanced whale optimization algorithm-based modeling and simulation analysis for industrial system parameter identification
|
Braik, Malik |
|
|
79 |
13 |
p. 14489-14544 |
artikel |
18 |
Exploring implicit persona knowledge for personalized dialogue generation
|
Xu, Fuyong |
|
|
79 |
13 |
p. 14545-14570 |
artikel |
19 |
Global triangle estimation based on first edge sampling in large graph streams
|
Yu, Changyong |
|
|
79 |
13 |
p. 14079-14116 |
artikel |
20 |
GM-WOA: a hybrid energy efficient cluster routing technique for SDN-enabled WSNs
|
Tyagi, Vikas |
|
|
79 |
13 |
p. 14894-14922 |
artikel |
21 |
Hexagonal picture generation in DNA computing
|
Sudha, V. |
|
|
79 |
13 |
p. 15140-15184 |
artikel |
22 |
LOCP: Latency-optimized channel pruning for CNN inference acceleration on GPUs
|
Zhang, Yonghua |
|
|
79 |
13 |
p. 14313-14341 |
artikel |
23 |
MISR: a multiple behavior interactive enhanced learning model for social-aware recommendation
|
Liang, Xiufang |
|
|
79 |
13 |
p. 14221-14244 |
artikel |
24 |
Mitigating the NUMA effect on task-based runtime systems
|
Maroñas, Marcos |
|
|
79 |
13 |
p. 14287-14312 |
artikel |
25 |
New numerical methods for solving the partial fractional differential equations with uniform and non-uniform meshes
|
Javidi, Mohammad |
|
|
79 |
13 |
p. 14457-14488 |
artikel |
26 |
On the impact of information-sharing model between subpopulations in the Island-based evolutionary algorithms: search manager framework as a case study
|
Abdi, Yousef |
|
|
79 |
13 |
p. 14245-14286 |
artikel |
27 |
Path covers of bubble-sort star graphs
|
Cheng, Dongqin |
|
|
79 |
13 |
p. 14848-14868 |
artikel |
28 |
Predicting product advertisement links using hybrid learning within social networks
|
Ebadi Jokandan, Seyed Mohsen |
|
|
79 |
13 |
p. 15023-15050 |
artikel |
29 |
Privacy-preserving multi-party PCA computation on horizontally and vertically partitioned data based on outsourced QR decomposition
|
Jaberi, Mehrad |
|
|
79 |
13 |
p. 14358-14387 |
artikel |
30 |
Proactive threshold-proxy re-encryption scheme for secure data sharing on cloud
|
Raghav, |
|
|
79 |
13 |
p. 14117-14145 |
artikel |
31 |
Probabilistic coverage in mobile directional sensor networks: a game theoretical approach
|
Golrasan, Elham |
|
|
79 |
13 |
p. 14200-14220 |
artikel |
32 |
Queries with aggregate functions over fuzzy RDF data
|
Ma, Zongmin |
|
|
79 |
13 |
p. 14780-14807 |
artikel |
33 |
Real-time anomaly detection system within the scope of smart factories
|
Bayraktar, Cihan |
|
|
79 |
13 |
p. 14707-14742 |
artikel |
34 |
S-Edge: heterogeneity-aware, light-weighted, and edge computing integrated adaptive traffic light control framework
|
Sachan, Anuj |
|
|
79 |
13 |
p. 14923-14953 |
artikel |
35 |
Selection of Six Sigma projects based on integrated multi-criteria decision-making methods: the case of the software development industry
|
Ayyıldız, Tülin Erçelebi |
|
|
79 |
13 |
p. 14981-15003 |
artikel |
36 |
SeQual: an unsupervised feature selection method for cloud workload traces
|
Ali, Shallaw Mohammed |
|
|
79 |
13 |
p. 15079-15097 |
artikel |
37 |
SIMD vectorization for simultaneous solution of locally varying linear systems with multiple right-hand sides
|
Kühn, Martin J. |
|
|
79 |
13 |
p. 14684-14706 |
artikel |
38 |
TARA: weighted majority cooperative game theory-based task assignment and resource allocation in 5G heterogeneous fog network for IoT
|
Ghosh, Subha |
|
|
79 |
13 |
p. 14633-14683 |
artikel |
39 |
TempChain: a blockchain scheme for telehealth data sharing between two blockchains using property mapping function
|
Dewangan, Narendra K. |
|
|
79 |
13 |
p. 14808-14826 |
artikel |
40 |
The music demixing machine: toward real-time remixing of classical music
|
Cabañas-Molero, Pablo |
|
|
79 |
13 |
p. 14342-14357 |
artikel |
41 |
Thresholding methods in non-intrusive load monitoring
|
Precioso, Daniel |
|
|
79 |
13 |
p. 14039-14062 |
artikel |
42 |
UAV-assisted ubiquitous communication architecture for urban VANET environment
|
Raza, Ali |
|
|
79 |
13 |
p. 14602-14632 |
artikel |
43 |
URMP: using reconfigurable multicast path for NoC-based deep neural network accelerators
|
Ouyang, Yiming |
|
|
79 |
13 |
p. 14827-14847 |
artikel |
44 |
Vertex transitivity and distance metric of the quad-cube
|
Jha, Pranava K. |
|
|
79 |
13 |
p. 13952-13970 |
artikel |
45 |
YOLOOD: an arbitrary-oriented flexible flat cable detection method in robotic assembly
|
Bai, Yuxuan |
|
|
79 |
13 |
p. 14869-14893 |
artikel |