Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             51 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A cognitive effective framework for analysis, monitoring and identifying variant of coronavirus disease Kumari, Sapna

80 15 p. 22563-22597
artikel
2 A collaborative cache allocation strategy for performance and link cost in mobile edge computing Xiao, Hui

80 15 p. 22885-22912
artikel
3 A conditioned joint-modality attention fusion approach for multimodal aspect-level sentiment analysis Yang, Ying

80 15 p. 21676-21698
artikel
4 Adaptive multi-object tracking algorithm based on split trajectory Sun, Lifan

80 15 p. 22287-22314
artikel
5 A high-performance, parallel, and hierarchically distributed model for coastal run-up events simulation and forecasting Di Luccio, Diana

80 15 p. 22748-22769
artikel
6 A learning-based data and task placement mechanism for IoT applications in fog computing: a context-aware approach Torabi, Esmaeil

80 15 p. 21726-21763
artikel
7 An encrypted deduplication scheme based on files diversity He, Xinfeng

80 15 p. 22860-22884
artikel
8 An improved SMOTE based on center offset factor and synthesis strategy for imbalanced data classification Zhang, Ying

80 15 p. 22479-22519
artikel
9 An unmanned tank combat game driven by FPSO-MADDPG algorithm Wang, Fei

80 15 p. 21615-21641
artikel
10 A personalized recommendation model with multimodal preference-based graph attention network Wang, Shuo

80 15 p. 22020-22048
artikel
11 Application of an extrapolation method in the Hessenberg algorithm for computing PageRank Hu, Qian-Ying

80 15 p. 22836-22859
artikel
12 A real-time approach for smart building operations prediction using rule-based complex event processing and SPARQL query Kumar, Shashi Shekhar

80 15 p. 21569-21591
artikel
13 A real-time object detection method for electronic screen GUI test systems Wang, Zhongmin

80 15 p. 22803-22835
artikel
14 Aspect-level implicit sentiment analysis model based on semantic wave and knowledge enhancement Zhang, Maoyuan

80 15 p. 22726-22747
artikel
15 Blockchain based distributed trust management in IoT and IIoT: a survey Lahbib, Asma

80 15 p. 21867-21919
artikel
16 Capacity planning and scheduling for jobs with uncertainty in resource usage and duration Patra, Sunandita

80 15 p. 22428-22461
artikel
17 Chebyshev approximation technique: analysis and applications Nicolas, Elie

80 15 p. 22155-22189
artikel
18 Cycle-accurate multi-FPGA platform for accelerated emulation of large on-chip networks Romanov, Aleksandr Y.

80 15 p. 22462-22478
artikel
19 DBOS_US: a density-based graph under-sampling method to handle class imbalance and class overlap issues in software fault prediction Bhandari, Kirti

80 15 p. 22682-22725
artikel
20 DE2RA-RPL: detection and elimination of resource-related attacks in IoT RPL-based protocol Paganraj, Deepavathi

80 15 p. 22397-22427
artikel
21 Efficient data race detection for interrupt-driven programs via path feasibility analysis Zhao, Jingwen

80 15 p. 21699-21725
artikel
22 Enhancing differential evolution algorithm with a fitness-distance-based selection strategy Huang, Yawei

80 15 p. 22245-22286
artikel
23 Enhancing 3D localization in wireless sensor network: a differential evolution method for the DV-Hop algorithm Liu, Zhihua

80 15 p. 23120-23146
artikel
24 Enhancing multidimensional scaling through a distributed algorithm Gachkooban, Zahra

80 15 p. 22049-22068
artikel
25 Enhancing self-adaptation for efficient decision-making at run-time in streaming applications on multicores Vogel, Adriano

80 15 p. 22213-22244
artikel
26 Evaluating machine learning prediction techniques and their impact on proactive resource provisioning for cloud environments Kirchoff, Dionatrã F.

80 15 p. 21920-21951
artikel
27 Flood algorithm (FLA): an efficient inspired meta-heuristic for engineering optimization Ghasemi, Mojtaba

80 15 p. 22913-23017
artikel
28 GPU-accelerated relaxed graph pattern matching algorithms Benachour, Amira

80 15 p. 21811-21836
artikel
29 Guide to developing case-based attack scenarios and establishing defense strategies for cybersecurity exercise in ICS environment Kim, Donghyun

80 15 p. 21642-21675
artikel
30 Influence maximization under equilibrious groups in social networks Li, Runzhi

80 15 p. 22190-22212
artikel
31 IoV security and privacy survey: issues, countermeasures, and challenges Haddaji, Achref

80 15 p. 23018-23082
artikel
32 Las-yolo: a lightweight detection method based on YOLOv7 for small objects in airport surveillance Zhou, Wentao

80 15 p. 21764-21789
artikel
33 MiniTomatoNet: a lightweight CNN for tomato leaf disease recognition on heterogeneous FPGA-SoC Sanida, Theodora

80 15 p. 21837-21866
artikel
34 MOTORS: multi-objective task offloading and resource scheduling algorithm for heterogeneous fog-cloud computing scenario Shukla, Prashant

80 15 p. 22315-22361
artikel
35 On a model-free meta-heuristic approach for unconstrained optimization Xia, Wei

80 15 p. 22548-22562
artikel
36 Optimization of containerized application deployment in virtualized environments: a novel mathematical framework for resource-efficient and energy-aware server infrastructure Rabieyan, Reza

80 15 p. 22598-22630
artikel
37 Palindromes in involutive Fibonacci arrays Blasiyus, Hannah

80 15 p. 22520-22547
artikel
38 Performance evaluation of complex systems based on hierarchical evidential reasoning rule considering disturbances Zhang, Yunyi

80 15 p. 22124-22154
artikel
39 Positioning and tracking with ODE-LSTM algorithm for emerging smart rail systems Zhao, Xiao

80 15 p. 21975-21995
artikel
40 Privacy-preserving algorithm based on vulnerable nodes for social relationships Shen, Jiawei

80 15 p. 22654-22681
artikel
41 Proteo: a framework for the generation and evaluation of malleable MPI applications Martín-Álvarez, Iker

80 15 p. 23083-23119
artikel
42 Reliability analysis of complete cubic networks based on extra conditional fault Lv, Mengjie

80 15 p. 21952-21974
artikel
43 RepEKShot: an evidential k-nearest neighbor classifier with repulsion loss for few-shot named entity recognition Liu, Haitao

80 15 p. 22069-22098
artikel
44 Resource allocation for UAV-enabled multi-access edge computing Falcão, Marcos

80 15 p. 22770-22802
artikel
45 SDESA: secure cloud computing with gradient deep belief network and congruential advanced encryption Rani, Sheeja

80 15 p. 23147-23176
artikel
46 Securing the perceptual layer of E-payment-based internet of things devices using elliptic curve cryptography over binary field Okediran, T. M.

80 15 p. 21592-21614
artikel
47 Semantic difference-based feature extraction technique for fake news detection Gorai, Joy

80 15 p. 22631-22653
artikel
48 Sequential predictive maintenance and spare parts management with data mining methods: a case study in bus fleet İfraz, Metin

80 15 p. 22099-22123
artikel
49 Spatiotemporal information complementary modeling and group relationship reasoning for group activity recognition Deng, Haigang

80 15 p. 21790-21810
artikel
50 The h-faulty-block connectivity of alternating group graphs and split-star networks Hua, Xiaohui

80 15 p. 21996-22019
artikel
51 Transforming future technology with quantum-based IoT Khan, Habib Ullah

80 15 p. 22362-22396
artikel
                             51 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland