Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             51 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A hybrid approach towards reduced checkpointing overhead in cloud-based applications Sinha, Bharati

15 1 p. 473-483
artikel
2 Analytical modelling of false blocking problem in wireless ad hoc networks Chong, Wai Kheong

15 1 p. 221-245
artikel
3 An autonomous intrusion detection system for the RPL protocol Shirafkan, Mohammad

15 1 p. 484-502
artikel
4 An efficient and privacy-preserving mutual authentication with key agreement scheme for telecare medicine information system Chen, Yulei

15 1 p. 516-528
artikel
5 A new fog-based routing strategy (FBRS) for vehicular ad-hoc networks El Gayyar, Khaled S.

15 1 p. 386-407
artikel
6 An improved k-angle coverage algorithm for multimedia wireless sensor networks based on two-layer tabu search Wu, Huarui

15 1 p. 28-44
artikel
7 An improved secure certificateless public-key searchable encryption scheme with multi-trapdoor privacy Yang, Guang

15 1 p. 503-515
artikel
8 An intelligent traffic prediction framework for 5G network using SDN and fusion learning Selvi, K. Tamil

15 1 p. 751-767
artikel
9 An OLSR-based Geocast Routing Protocol for Vehicular Ad Hoc Networks Kachooei, Maryam Ataei

15 1 p. 246-266
artikel
10 An optimal load balancing strategy for P2P network using chicken swarm optimization Kumar, Dharmendra

15 1 p. 666-688
artikel
11 A novel hierarchical fault management framework for wireless sensor networks: HFMF Moridi, Elham

15 1 p. 45-55
artikel
12 An uneven annulus sector grid-based energy-efficient multi-hop routing protocol for wireless sensor networks Huang, Jianhua

15 1 p. 559-575
artikel
13 Application-aware QoS routing in SDNs using machine learning techniques Zheng, Weichang

15 1 p. 529-548
artikel
14 AToM: Active topology monitoring for the bitcoin peer-to-peer network Franzoni, Federico

15 1 p. 408-425
artikel
15 A trust based energy and mobility aware routing protocol to improve infotainment services in VANETs Shafi, Shaik

15 1 p. 576-591
artikel
16 A two-phase fuzzy based access network selection scheme for vehicular ad hoc networks Evangeline, C. Suganthi

15 1 p. 107-133
artikel
17 BCPPT: A blockchain-based privacy-preserving and traceability identity management scheme for intellectual property Zhuang, Chuxin

15 1 p. 724-738
artikel
18 Big data analytics for critical information classification in online social networks using classifier chains Silva, Douglas H.

15 1 p. 626-641
artikel
19 Cloudlet deployment for workflow applications in a mobile edge computing-wireless metropolitan area network Zhao, Xu

15 1 p. 739-750
artikel
20 Clover: An anonymous transaction relay protocol for the bitcoin P2P network Franzoni, Federico

15 1 p. 290-303
artikel
21 Clustered NOMA-based downlink adaptive relay coordinated transmission scheme for future 6G cell-free edge network Peng, Xuefei

15 1 p. 612-625
artikel
22 Continuous improvement of script-driven verifiable random functions for reducing computing power in blockchain consensus protocols Guo, Guanglai

15 1 p. 304-323
artikel
23 Cryptographically secure privacy-preserving authenticated key agreement protocol for an IoT network: A step towards critical infrastructure protection Thakur, Vidyotma

15 1 p. 206-220
artikel
24 Decentralized access control technique with multi-tier authentication of user for cloud storage Shiny, S.

15 1 p. 13-27
artikel
25 Deep action: A mobile action recognition framework using edge offloading Zhang, Deyu

15 1 p. 324-339
artikel
26 Determination of energy efficient optimal sojourn location of mobile sinks in clustered corona-based wireless sensor networks K, Mohaideen Pitchai

15 1 p. 1-12
artikel
27 Developing a novel methodology for virtual machine introspection to classify unknown malware functions Vaza, Rahul N.

15 1 p. 793-810
artikel
28 Distributed Address Table (DAT): A Decentralized Model for End-to-End Communication in IoT Alshawki, Mohammed B.

15 1 p. 178-193
artikel
29 Double agents-DQL based D2D computing-offloading for SHVC Liu, Jianlong

15 1 p. 56-76
artikel
30 Efficient path-sense transmission based on IoT system in opportunistic social networks Li, Xiaoli

15 1 p. 811-826
artikel
31 Efficient topology control of blockchain peer to peer network based on SDN paradigm Deshpande, Varun

15 1 p. 267-289
artikel
32 EMBOF-RPL: Improved RPL for early detection and isolation of rank attack in RPL-based internet of things Bang, A. O.

15 1 p. 642-665
artikel
33 Enabling rank-based distribution of microservices among containers for green cloud computing environment Saboor, Abdul

15 1 p. 77-91
artikel
34 Energy aware MAC protocol with mobility management in wireless body area network Dhanvijay, Mrinai Maneetkumar

15 1 p. 426-443
artikel
35 Fuzzy routing for in-network aggregation in wireless sensor networks Maivizhi, Radhakrishnan

15 1 p. 592-611
artikel
36 Joint computation offloading and deployment optimization in multi-UAV-enabled MEC systems Chen, Zheyi

15 1 p. 194-205
artikel
37 Joint pricing and task allocation for blockchain empowered crowd spectrum sensing Chen, Wenbin

15 1 p. 783-792
artikel
38 Joint resource allocation for QoE optimization in large-scale NOMA-enabled multi-cell networks Jia, Jie

15 1 p. 689-702
artikel
39 LocTrust: A local and global consensus-combined trust model in MANETs Zhou, Shuai

15 1 p. 355-368
artikel
40 Machine-learning-based cache partition method in cloud environment Qiu, Jiefan

15 1 p. 149-162
artikel
41 MINAD: Multi-inputs Neural Network based on Application Structure for Android Malware Detection Nguyen, Duc V.

15 1 p. 163-177
artikel
42 MPLDS: An integration of CP-ABE and local differential privacy for achieving multiple privacy levels data sharing Song, Haina

15 1 p. 369-385
artikel
43 Obfuscation-based location privacy-preserving scheme in cloud-enabled internet of vehicles Benarous, Leila

15 1 p. 461-472
artikel
44 Optimal hybrid heat transfer search and grey wolf optimization-based homomorphic encryption model to assure security in cloud-based IoT environment Jeniffer, J. Thresa

15 1 p. 703-723
artikel
45 Privacy-preserving comparison based data aggregation protocols for mobile sensing Liu, Weinan

15 1 p. 549-558
artikel
46 Reducing the number of transaction messages in bitcoin Mišić, Vojislav B.

15 1 p. 768-782
artikel
47 Robustness against fraudulent activities of a blockchain-based online review system Karode, Tanakorn

15 1 p. 92-106
artikel
48 SCMP-V: A secure multiple relays cooperative downloading scheme with privacy preservation in VANETs Liu, Xuejiao

15 1 p. 340-354
artikel
49 The reliable routing for software-defined vehicular networks towards beyond 5G Lu, Yaoguang

15 1 p. 134-148
artikel
50 Towards intelligent P2P IPTV overlay management through classification of peers Ali, Muhammad

15 1 p. 827-838
artikel
51 Trusted resource allocation based on proof-of-reputation consensus mechanism for edge computing Hu, Qiaohong

15 1 p. 444-460
artikel
                             51 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland