Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             37 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A Deep Learning Spatiotemporal Prediction Framework for Mobile Crowdsourced Services Ben Said, Ahmed
2018
24 3 p. 1120-1133
artikel
2 A Hybrid Key Item Locating Method to Assist Elderly Daily Life Using Internet of Things Hung, Lun-Ping
2018
24 3 p. 786-795
artikel
3 A Performance Evaluation of Resilient Server with a Self-Repair Network Model Winarno, Idris
2018
24 3 p. 1095-1103
artikel
4 Applying Privacy Patterns to the Internet of Things’ (IoT) Architecture Pape, Sebastian
2018
24 3 p. 925-933
artikel
5 A Simplified Interference Model for Outdoor Millimeter-wave Networks Jiang, Xiaolin
2018
24 3 p. 983-990
artikel
6 Assessment of LTE Wireless Accessing for Managing Traffic Flow of IoT Services Kuo, Fang-Chang
2018
24 3 p. 853-863
artikel
7 A Survey of Localization Systems in Internet of Things Khelifi, Fekher
2018
24 3 p. 761-785
artikel
8 Collaboration IoT-Based RBAC with Trust Evaluation Algorithm Model for Massive IoT Integrated Application Chen, Hsing-Chung
2018
24 3 p. 839-852
artikel
9 Contract-theoretic Approach for Delay Constrained Offloading in Vehicular Edge Computing Networks Zhang, Ke
2018
24 3 p. 1003-1014
artikel
10 Correction to: An IoT Service Aggregation Method Based on Dynamic Planning for QoE Restraints Jia, Bing
2019
24 3 p. 1134
artikel
11 Crowdsourcing Analysis in 5G IoT: Cybersecurity Threats and Mitigation Nieto, Ana
2018
24 3 p. 881-889
artikel
12 Data Driven Cyber-Physical System for Landslide Detection Liu, Zhi
2018
24 3 p. 991-1002
artikel
13 Decentralised Functional Signatures Liang, Bei
2018
24 3 p. 934-946
artikel
14 Determining Honesty of Accuser Nodes in Key Revocation Procedure for MANETs Zarezadeh, Maryam
2018
24 3 p. 903-912
artikel
15 Diffusion Distance-Based Predictive Tracking for Continuous Objects in Industrial Wireless Sensor Networks Liu, Li
2018
24 3 p. 971-982
artikel
16 Editorial: Advanced Industrial Networks with IoT and Big Data Zhang, Yan
2019
24 3 p. 947-949
artikel
17 Editorial: Recent Advances in IoT as a Service (IoTaas 2017) Deng, Der-Jiunn
2019
24 3 p. 721-723
artikel
18 Editorial: Security and Privacy in Internet of Things de Fuentes, Jose M.
2018
24 3 p. 878-880
artikel
19 Efficient User Profiling Based Intelligent Travel Recommender System for Individual and Group of Users Logesh, R.
2018
24 3 p. 1018-1033
artikel
20 E-Health Cloud Security Using Timing Enabled Proxy Re-Encryption Vijayakumar, V.
2018
24 3 p. 1034-1045
artikel
21 Emerging Solutions in Big Data and Cloud Technologies for Mobile Networks Varadarajan, Vijayakumar
2019
24 3 p. 1015-1017
artikel
22 Energy-Aware Fault-Tolerant Dynamic Task Scheduling Scheme for Virtualized Cloud Data Centers Marahatta, Avinab
2018
24 3 p. 1063-1077
artikel
23 Evaluation of the Effect of Variations in Vehicle Velocity and Channel Bandwidth on an Image-Streaming System in Vehicular Networks Tsai, Ming-Fong
2018
24 3 p. 810-828
artikel
24 Flower Sermon: An Interactive Visual Design Using IoTtalk Hsiao, Chung-Yun
2018
24 3 p. 724-735
artikel
25 Home Healthcare Matching Service System Using the Internet of Things Lin, Tzong-Shyan
2018
24 3 p. 736-747
artikel
26 Identity-Based User Authenticated Key Agreement Protocol for Multi-Server Environment with Anonymity Hassan, Alzubair
2018
24 3 p. 890-902
artikel
27 Interoperability in Internet of Things: Taxonomies and Open Challenges Noura, Mahda
2018
24 3 p. 796-809
artikel
28 LaSa: Location Aware Wireless Security Access Control for IoT Systems Lu, Bingxian
2018
24 3 p. 748-760
artikel
29 Loading Aware Green Power Control (LAGPC) for the Mitigation of Co-Tier Downlink Interference for Femtocell in the Future 5G Networks Ting, Kuo-Chang
2018
24 3 p. 864-877
artikel
30 Optimal and Elastic Energy Trading for Green Microgrids: a two-Layer Game Approach Zhou, Wenhui
2018
24 3 p. 950-961
artikel
31 Price Versus Performance of Big Data Analysis for Cloud Based Internet of Things Networks Meerja, Khalim Amjad
2018
24 3 p. 1078-1094
artikel
32 RETRACTED ARTICLE: E-Health Cloud Security Using Timing Enabled Proxy Re-Encryption Vijayakumar, V.

24 3 p. 1034-1045
artikel
33 Secure Remote User Mutual Authentication Scheme with Key Agreement for Cloud Environment Karuppiah, Marimuthu
2018
24 3 p. 1046-1062
artikel
34 SHSec: SDN based Secure Smart Home Network Architecture for Internet of Things Sharma, Pradip Kumar
2018
24 3 p. 913-924
artikel
35 The Digital Fingerprinting Analysis of Generic Twitter Sessions from Internet of Things Security Aspect Chu, Hai-Cheng
2018
24 3 p. 829-838
artikel
36 Two-Server 3D ElGamal Diffie-Hellman Password Authenticated and Key Exchange Protocol Using Geometrical Properties Anitha Kumari, K.
2018
24 3 p. 1104-1119
artikel
37 When Green Energy Meets Cloud Radio Access Network: Joint Optimization Towards Brown Energy Minimization Guo, Song
2018
24 3 p. 962-970
artikel
                             37 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland