nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A dynamic energy conservation scheme with dual-rate adjustment and semi-sleep mode in cloud system
|
Cui, Yu |
|
|
79 |
3 |
p. 2451-2487 |
artikel |
2 |
A grey wolf optimizer-based chaotic gravitational search algorithm for global optimization
|
Yu, Xianrui |
|
|
79 |
3 |
p. 2691-2739 |
artikel |
3 |
A multistep forecasting method for online car-hailing demand based on wavelet decomposition and deep Gaussian process regression
|
Chang, Wenbing |
|
|
79 |
3 |
p. 3412-3436 |
artikel |
4 |
An effective hybrid genetic algorithm and tabu search for maximizing network lifetime using coverage sets scheduling in wireless sensor networks
|
Mottaki, Nemat allah |
|
|
79 |
3 |
p. 3277-3297 |
artikel |
5 |
A new improved maximal relevance and minimal redundancy method based on feature subset
|
Xie, Shanshan |
|
|
79 |
3 |
p. 3157-3180 |
artikel |
6 |
An improved anomaly detection model for IoT security using decision tree and gradient boosting
|
Douiba, Maryam |
|
|
79 |
3 |
p. 3392-3411 |
artikel |
7 |
A novel approach towards high-performance image compression using multilevel wavelet transformation for heterogeneous datasets
|
Gowthami, V. |
|
|
79 |
3 |
p. 2488-2518 |
artikel |
8 |
Anti-aliasing convolution neural network of finger vein recognition for virtual reality (VR) human–robot equipment of metaverse
|
Tran, Nghi C. |
|
|
79 |
3 |
p. 2767-2782 |
artikel |
9 |
A performance evaluation of modular functions and state databases for Hyperledger Fabric blockchain systems
|
Wen, Yean-Fu |
|
|
79 |
3 |
p. 2654-2690 |
artikel |
10 |
A power line loss analysis method based on boost clustering
|
Chen, Junde |
|
|
79 |
3 |
p. 3210-3226 |
artikel |
11 |
A pricing approach for optimal use of computing resources in cloud federation
|
Dinachali, Bijan Pourghorbani |
|
|
79 |
3 |
p. 3055-3094 |
artikel |
12 |
Blockchain technology applications in the health domain: a multivocal literature review
|
Baysal, Merve Vildan |
|
|
79 |
3 |
p. 3112-3156 |
artikel |
13 |
Certificateless network coding scheme from certificateless public auditing protocol
|
Bian, Genqing |
|
|
79 |
3 |
p. 2570-2602 |
artikel |
14 |
Characterization of interval graphs that are paired 2-disjoint path coverable
|
Park, Jung-Heum |
|
|
79 |
3 |
p. 2783-2800 |
artikel |
15 |
Community detection in complex networks using stacked autoencoders and crow search algorithm
|
Kumar, Sanjay |
|
|
79 |
3 |
p. 3329-3356 |
artikel |
16 |
Deep learning-based early stage detection (DL-ESD) for routing attacks in Internet of Things networks
|
Albishari, Mohammed |
|
|
79 |
3 |
p. 2626-2653 |
artikel |
17 |
Design of an efficient QCA-based median filter with energy dissipation analysis
|
Bevara, Vasudeva |
|
|
79 |
3 |
p. 2984-3004 |
artikel |
18 |
DHSA: efficient doubly homomorphic secure aggregation for cross-silo federated learning
|
Liu, Zizhen |
|
|
79 |
3 |
p. 2819-2849 |
artikel |
19 |
Distribution of DDS-cerberus authenticated facial recognition streams
|
Park, Andrew T. |
|
|
79 |
3 |
p. 3471-3488 |
artikel |
20 |
ESDedup: An efficient and secure deduplication scheme based on data similarity and blockchain for cloud-assisted medical storage systems
|
Xiao, Ling |
|
|
79 |
3 |
p. 2932-2960 |
artikel |
21 |
Exploring interval implicitization in real-valued time series classification and its applications
|
Tao, Zhifu |
|
|
79 |
3 |
p. 3373-3391 |
artikel |
22 |
Fault tolerance and quality of service aware virtual machine scheduling algorithm in cloud data centers
|
Xu, Heyang |
|
|
79 |
3 |
p. 2603-2625 |
artikel |
23 |
Godiva: green on-chip interconnection for DNNs
|
Asad, Arghavan |
|
|
79 |
3 |
p. 2404-2430 |
artikel |
24 |
Hardware-accuracy trade-offs for error-resilient applications using an ultra-efficient hybrid approximate multiplier
|
Shirkavand Saleh Abad, Sudeh |
|
|
79 |
3 |
p. 3357-3372 |
artikel |
25 |
HMAC-R: Hash-based message authentication code and Rijndael-based multilevel security model for data storage in cloud environment
|
Kumar, P. Hari |
|
|
79 |
3 |
p. 3181-3209 |
artikel |
26 |
How much BiGAN and CycleGAN-learned hidden features are effective for COVID-19 detection from CT images? A comparative study
|
Sarv Ahrabi, Sima |
|
|
79 |
3 |
p. 2850-2881 |
artikel |
27 |
Instance segmentation-based review photo validation scheme
|
Park, Sungwoo |
|
|
79 |
3 |
p. 3489-3510 |
artikel |
28 |
Intelligent quotient estimation from MRI images using optimal light gradient boosting machine
|
Thilakavathy, P. |
|
|
79 |
3 |
p. 2431-2450 |
artikel |
29 |
Int-Monitor: a model triggered hardware trojan in deep learning accelerators
|
Li, Peng |
|
|
79 |
3 |
p. 3095-3111 |
artikel |
30 |
Ladybug Beetle Optimization algorithm: application for real-world problems
|
Safiri, Saadat |
|
|
79 |
3 |
p. 3511-3560 |
artikel |
31 |
Leveraging temporal-aware fine-grained features for robust multiple object tracking
|
Wu, Han |
|
|
79 |
3 |
p. 2910-2931 |
artikel |
32 |
Logic Realization of Galois Field for AES SBOX using Quantum Dot Cellular Automata
|
Rajasekar, P. |
|
|
79 |
3 |
p. 3024-3054 |
artikel |
33 |
Multivariate workload and resource prediction in cloud computing using CNN and GRU by attention mechanism
|
Dogani, Javad |
|
|
79 |
3 |
p. 3437-3470 |
artikel |
34 |
Noise-insensitive image representation via multiple extended LDB and class supervised intelligent coordination feature selection
|
Zhang, Xi |
|
|
79 |
3 |
p. 3227-3256 |
artikel |
35 |
Nscale: an efficient RAID-6 online scaling via optimizing data migration
|
Xie, Ping |
|
|
79 |
3 |
p. 2383-2403 |
artikel |
36 |
Privacy-preserving edge computing offloading scheme based on whale optimization algorithm
|
Liu, Zhenpeng |
|
|
79 |
3 |
p. 3005-3023 |
artikel |
37 |
ReNo: novel switch architecture for reliability improvement of NoCs
|
Shirmohammadi, Zahra |
|
|
79 |
3 |
p. 2801-2818 |
artikel |
38 |
Risk-Averse Influence Maximization
|
NasehiMoghaddam, Saeed |
|
|
79 |
3 |
p. 2519-2569 |
artikel |
39 |
Spanning simple path inside a simple polygon
|
Sepahvand, Abdolah |
|
|
79 |
3 |
p. 2740-2766 |
artikel |
40 |
Star-structure connectivity of folded hypercubes and augmented cubes
|
Ba, Lina |
|
|
79 |
3 |
p. 3257-3276 |
artikel |
41 |
Trust-based secure routing and message delivery protocol for signal processing attacks in IoT applications
|
Ragesh, G. K. |
|
|
79 |
3 |
p. 2882-2909 |
artikel |
42 |
VALKYRIE: a suite of topology-aware clustering approaches for cloud-based virtual network services
|
El Mansoum, Imane |
|
|
79 |
3 |
p. 3298-3328 |
artikel |
43 |
Wasserstein generative adversarial networks for modeling marked events
|
Dizaji, S. Haleh S. |
|
|
79 |
3 |
p. 2961-2983 |
artikel |