Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             43 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A dynamic energy conservation scheme with dual-rate adjustment and semi-sleep mode in cloud system Cui, Yu

79 3 p. 2451-2487
artikel
2 A grey wolf optimizer-based chaotic gravitational search algorithm for global optimization Yu, Xianrui

79 3 p. 2691-2739
artikel
3 A multistep forecasting method for online car-hailing demand based on wavelet decomposition and deep Gaussian process regression Chang, Wenbing

79 3 p. 3412-3436
artikel
4 An effective hybrid genetic algorithm and tabu search for maximizing network lifetime using coverage sets scheduling in wireless sensor networks Mottaki, Nemat allah

79 3 p. 3277-3297
artikel
5 A new improved maximal relevance and minimal redundancy method based on feature subset Xie, Shanshan

79 3 p. 3157-3180
artikel
6 An improved anomaly detection model for IoT security using decision tree and gradient boosting Douiba, Maryam

79 3 p. 3392-3411
artikel
7 A novel approach towards high-performance image compression using multilevel wavelet transformation for heterogeneous datasets Gowthami, V.

79 3 p. 2488-2518
artikel
8 Anti-aliasing convolution neural network of finger vein recognition for virtual reality (VR) human–robot equipment of metaverse Tran, Nghi C.

79 3 p. 2767-2782
artikel
9 A performance evaluation of modular functions and state databases for Hyperledger Fabric blockchain systems Wen, Yean-Fu

79 3 p. 2654-2690
artikel
10 A power line loss analysis method based on boost clustering Chen, Junde

79 3 p. 3210-3226
artikel
11 A pricing approach for optimal use of computing resources in cloud federation Dinachali, Bijan Pourghorbani

79 3 p. 3055-3094
artikel
12 Blockchain technology applications in the health domain: a multivocal literature review Baysal, Merve Vildan

79 3 p. 3112-3156
artikel
13 Certificateless network coding scheme from certificateless public auditing protocol Bian, Genqing

79 3 p. 2570-2602
artikel
14 Characterization of interval graphs that are paired 2-disjoint path coverable Park, Jung-Heum

79 3 p. 2783-2800
artikel
15 Community detection in complex networks using stacked autoencoders and crow search algorithm Kumar, Sanjay

79 3 p. 3329-3356
artikel
16 Deep learning-based early stage detection (DL-ESD) for routing attacks in Internet of Things networks Albishari, Mohammed

79 3 p. 2626-2653
artikel
17 Design of an efficient QCA-based median filter with energy dissipation analysis Bevara, Vasudeva

79 3 p. 2984-3004
artikel
18 DHSA: efficient doubly homomorphic secure aggregation for cross-silo federated learning Liu, Zizhen

79 3 p. 2819-2849
artikel
19 Distribution of DDS-cerberus authenticated facial recognition streams Park, Andrew T.

79 3 p. 3471-3488
artikel
20 ESDedup: An efficient and secure deduplication scheme based on data similarity and blockchain for cloud-assisted medical storage systems Xiao, Ling

79 3 p. 2932-2960
artikel
21 Exploring interval implicitization in real-valued time series classification and its applications Tao, Zhifu

79 3 p. 3373-3391
artikel
22 Fault tolerance and quality of service aware virtual machine scheduling algorithm in cloud data centers Xu, Heyang

79 3 p. 2603-2625
artikel
23 Godiva: green on-chip interconnection for DNNs Asad, Arghavan

79 3 p. 2404-2430
artikel
24 Hardware-accuracy trade-offs for error-resilient applications using an ultra-efficient hybrid approximate multiplier Shirkavand Saleh Abad, Sudeh

79 3 p. 3357-3372
artikel
25 HMAC-R: Hash-based message authentication code and Rijndael-based multilevel security model for data storage in cloud environment Kumar, P. Hari

79 3 p. 3181-3209
artikel
26 How much BiGAN and CycleGAN-learned hidden features are effective for COVID-19 detection from CT images? A comparative study Sarv Ahrabi, Sima

79 3 p. 2850-2881
artikel
27 Instance segmentation-based review photo validation scheme Park, Sungwoo

79 3 p. 3489-3510
artikel
28 Intelligent quotient estimation from MRI images using optimal light gradient boosting machine Thilakavathy, P.

79 3 p. 2431-2450
artikel
29 Int-Monitor: a model triggered hardware trojan in deep learning accelerators Li, Peng

79 3 p. 3095-3111
artikel
30 Ladybug Beetle Optimization algorithm: application for real-world problems Safiri, Saadat

79 3 p. 3511-3560
artikel
31 Leveraging temporal-aware fine-grained features for robust multiple object tracking Wu, Han

79 3 p. 2910-2931
artikel
32 Logic Realization of Galois Field for AES SBOX using Quantum Dot Cellular Automata Rajasekar, P.

79 3 p. 3024-3054
artikel
33 Multivariate workload and resource prediction in cloud computing using CNN and GRU by attention mechanism Dogani, Javad

79 3 p. 3437-3470
artikel
34 Noise-insensitive image representation via multiple extended LDB and class supervised intelligent coordination feature selection Zhang, Xi

79 3 p. 3227-3256
artikel
35 Nscale: an efficient RAID-6 online scaling via optimizing data migration Xie, Ping

79 3 p. 2383-2403
artikel
36 Privacy-preserving edge computing offloading scheme based on whale optimization algorithm Liu, Zhenpeng

79 3 p. 3005-3023
artikel
37 ReNo: novel switch architecture for reliability improvement of NoCs Shirmohammadi, Zahra

79 3 p. 2801-2818
artikel
38 Risk-Averse Influence Maximization NasehiMoghaddam, Saeed

79 3 p. 2519-2569
artikel
39 Spanning simple path inside a simple polygon Sepahvand, Abdolah

79 3 p. 2740-2766
artikel
40 Star-structure connectivity of folded hypercubes and augmented cubes Ba, Lina

79 3 p. 3257-3276
artikel
41 Trust-based secure routing and message delivery protocol for signal processing attacks in IoT applications Ragesh, G. K.

79 3 p. 2882-2909
artikel
42 VALKYRIE: a suite of topology-aware clustering approaches for cloud-based virtual network services El Mansoum, Imane

79 3 p. 3298-3328
artikel
43 Wasserstein generative adversarial networks for modeling marked events Dizaji, S. Haleh S.

79 3 p. 2961-2983
artikel
                             43 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland