Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             31 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A Deep Neural Network Combined with Radial Basis Function for Abnormality Classification Jafarpisheh, Noushin

26 6 p. 2318-2328
artikel
2 A Fine-Grained Attribute Based Data Retrieval with Proxy Re-Encryption Scheme for Data Outsourcing Systems Hong, Hanshu

26 6 p. 2509-2514
artikel
3 A Multi-modal Data Platform for Diagnosis and Prediction of Alzheimer’s Disease Using Machine Learning Methods Pang, Zhen

26 6 p. 2341-2352
artikel
4 A Novel Visual Medical Image Encryption for Secure Transmission of Authenticated Watermarked Medical Images Priya, S.

26 6 p. 2501-2508
artikel
5 Artificial Intelligence in Collaborative Computing Wang, Xinheng

26 6 p. 2389-2391
artikel
6 A Survey of Android Mobile Phone Authentication Schemes Kunda, Douglas

26 6 p. 2558-2566
artikel
7 A Survey On Log Research Of AIOps: Methods and Trends Zhaoxue, Jiang

26 6 p. 2353-2364
artikel
8 Deep Learning Based Customer Preferences Analysis in Industry 4.0 Environment Sun, Qindong

26 6 p. 2329-2340
artikel
9 Edge Network Routing Protocol Base on Target Tracking Scenario Zhang, Zhongyi

26 6 p. 2230-2241
artikel
10 Edge User Allocation in Overlap Areas for Mobile Edge Computing Liu, Fangzheng

26 6 p. 2423-2433
artikel
11 Editorial: Deep Learning for Big Data Analytics Wu, Yulei

26 6 p. 2315-2317
artikel
12 Fast Blind Deblurring of QR Code Images Based on Adaptive Scale Control Chen, Rongjun

26 6 p. 2472-2487
artikel
13 Fine-grained Trust-based Routing Algorithm for Wireless Sensor Networks Gong, Liangyi

26 6 p. 2515-2524
artikel
14 Formal analysis and automated validation of privacy-preserving AICE protocol in mobile edge computing Yin, Jiaqi

26 6 p. 2258-2271
artikel
15 Fuzzy Logic with Expert Judgment to Implement an Adaptive Risk-Based Access Control Model for IoT Atlam, Hany F.

26 6 p. 2545-2557
artikel
16 Mapping the Evolution of Intellectual Structure in Information Management Using Author Co-citation Analysis González-Valiente, Carlos Luis

26 6 p. 2374-2388
artikel
17 New Engineering Method for the Risk Assessment: Case Study Signal Jamming of the M-Health Networks Karoui, Kamel

26 6 p. 2525-2544
artikel
18 Point-of-Interest Recommendation with User’s Privacy Preserving in an IoT Environment Zhang, Guoming

26 6 p. 2445-2460
artikel
19 Privacy in Cross-User Data Deduplication Jannati, Hoda

26 6 p. 2567-2579
artikel
20 PR-RCUC: A POI Recommendation Model Using Region-Based Collaborative Filtering and User-Based Mobile Context Zeng, Jun

26 6 p. 2434-2444
artikel
21 Runtime Verification of Spatio-Temporal Specification Language Li, Tengfei

26 6 p. 2392-2406
artikel
22 SDTIOA: Modeling the Timed Privacy Requirements of IoT Service Composition: A User Interaction Perspective for Automatic Transformation from BPEL to Timed Automata Gao, Honghao

26 6 p. 2272-2297
artikel
23 Secure and Usable Handshake Based Pairing for Wrist-Worn Smart Devices on Different Users Zhao, Guichuan

26 6 p. 2407-2422
artikel
24 Security and Privacy in New Computing Environments (SPNCE 2016) Li, Jin

26 6 p. 2488-2489
artikel
25 Self-Organised Collision-Free Flocking Mechanism in Heterogeneous Robot Swarms Ban, Zhe

26 6 p. 2461-2471
artikel
26 Special Issue on Deep Learning in Mobile and Wireless Networks: Algorithms, Models and Techniques Xu, Yueshen

26 6 p. 2217-2218
artikel
27 TA-BiLSTM: An Interpretable Topic-Aware Model for Misleading Information Detection in Mobile Social Networks Chang, Shuyu

26 6 p. 2298-2314
artikel
28 Tiny FCOS: a Lightweight Anchor-Free Object Detection Algorithm for Mobile Scenarios Xu, Xiaolong

26 6 p. 2219-2229
artikel
29 Tolerance-Oriented Wi-Fi Advertisement Scheduling: A Near Optimal Study on Accumulative User Interests Xu, Wanru

26 6 p. 2242-2257
artikel
30 TORM: Tunicate Swarm Algorithm-based Optimized Routing Mechanism in IoT-based Framework Dogra, Roopali

26 6 p. 2365-2373
artikel
31 Verifiable Public-Key Encryption with Keyword Search Secure against Continual Memory Attacks Hu, Chengyu

26 6 p. 2490-2500
artikel
                             31 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland