nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A 3-dimensional group management MAC scheme for mobile IoT devices in wireless sensor networks
|
Ryoo, Intae |
|
2017 |
9 |
4 |
p. 1223-1234 |
artikel |
2 |
Advanced algorithms and applications based on IoT for the smart devices
|
Park, Jong Hyuk |
|
2018 |
9 |
4 |
p. 1085-1087 |
artikel |
3 |
A lightweight and anonymous RFID tag authentication protocol with cloud assistance for e-healthcare applications
|
Wu, Fan |
|
2017 |
9 |
4 |
p. 919-930 |
artikel |
4 |
Ambient intelligence middleware architecture based on awareness-cognition framework
|
Kim, Svetlana |
|
2017 |
9 |
4 |
p. 1131-1139 |
artikel |
5 |
A model-driven framework for data quality management in the Internet of Things
|
Karkouch, Aimad |
|
2017 |
9 |
4 |
p. 977-998 |
artikel |
6 |
An improved quantum genetic algorithm based on MAGTD for dynamic FJSP
|
Ning, Tao |
|
2017 |
9 |
4 |
p. 931-940 |
artikel |
7 |
An innovative fuzzy and artificial neural network approach for forecasting yield under an uncertain learning environment
|
Chen, Toly |
|
2017 |
9 |
4 |
p. 1013-1025 |
artikel |
8 |
Availability enhancement in a four-layer based IoT use three-phase scheduling
|
Tsai, Yao-Te |
|
2017 |
9 |
4 |
p. 1275-1291 |
artikel |
9 |
Decision making algorithm for an autonomous guide-robot using fuzzy logic
|
Rainer, J. Javier |
|
2017 |
9 |
4 |
p. 1177-1189 |
artikel |
10 |
Decision making model to predict presence of coronary artery disease using neural network and C5.0 decision tree
|
Ahmadi, Ehsan |
|
2017 |
9 |
4 |
p. 999-1011 |
artikel |
11 |
Detecting crypto-ransomware in IoT networks based on energy consumption footprint
|
Azmoodeh, Amin |
|
2017 |
9 |
4 |
p. 1141-1152 |
artikel |
12 |
Detection of document modification based on deep neural networks
|
Kim, Noo-ri |
|
2017 |
9 |
4 |
p. 1089-1096 |
artikel |
13 |
Efficiency investigation of artificial neural networks in human activity recognition
|
Suto, Jozsef |
|
2017 |
9 |
4 |
p. 1049-1060 |
artikel |
14 |
Efficient and privacy-aware attribute-based data sharing in mobile cloud computing
|
Zhang, Yinghui |
|
2017 |
9 |
4 |
p. 1039-1048 |
artikel |
15 |
Explore semantic topics and author communities for citation recommendation in bipartite bibliographic network
|
Dai, Tao |
|
2017 |
9 |
4 |
p. 957-975 |
artikel |
16 |
Garbled role-based access control in the cloud
|
Alam, Masoom |
|
2017 |
9 |
4 |
p. 1153-1166 |
artikel |
17 |
How do you sleep? Using off the shelf wrist wearables to estimate sleep quality, sleepiness level, chronotype and sleep regularity indicators
|
Arriba-Pérez, Francisco de |
|
2017 |
9 |
4 |
p. 897-917 |
artikel |
18 |
IoT device security based on proxy re-encryption
|
Kim, SuHyun |
|
2017 |
9 |
4 |
p. 1267-1273 |
artikel |
19 |
Location recognition system using random forest
|
Lee, Sunmin |
|
2018 |
9 |
4 |
p. 1191-1196 |
artikel |
20 |
Management platform of threats information in IoT environment
|
Ko, Eunhye |
|
2017 |
9 |
4 |
p. 1167-1176 |
artikel |
21 |
Mobile cloud services recommendation: a soft set-based approach
|
Hao, Fei |
|
2017 |
9 |
4 |
p. 1235-1243 |
artikel |
22 |
MRM: mobile resource management scheme on mobile cloud computing
|
Yi, Gangman |
|
2017 |
9 |
4 |
p. 1245-1257 |
artikel |
23 |
Numerical analysis and modeling for crack width calculation using IoT in reinforced concrete members
|
Lee, Kiyeol |
|
2017 |
9 |
4 |
p. 1119-1130 |
artikel |
24 |
Orchestration of use-case driven analytics in 5G scenarios
|
Barona López, Lorena Isabel |
|
2017 |
9 |
4 |
p. 1097-1117 |
artikel |
25 |
Power aware malicious nodes detection for securing MANETs against packet forwarding misbehavior attack
|
Kukreja, Deepika |
|
2017 |
9 |
4 |
p. 941-956 |
artikel |
26 |
Predicting unusual energy consumption events from smart home sensor network by data stream mining with misclassified recall
|
Fong, Simon |
|
2018 |
9 |
4 |
p. 1197-1221 |
artikel |
27 |
Provably secure biometric based authentication and key agreement protocol for wireless sensor networks
|
Srinivas, Jangirala |
|
2017 |
9 |
4 |
p. 875-895 |
artikel |
28 |
Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems
|
Jiang, Qi |
|
2017 |
9 |
4 |
p. 1061-1073 |
artikel |
29 |
SEMANTO: a graphical ontology management system for knowledge discovery
|
Toti, Daniele |
|
2017 |
9 |
4 |
p. 1075-1084 |
artikel |
30 |
TR-MCN: light weight task recommendation for mobile crowdsourcing networks
|
Wan, Changsheng |
|
2017 |
9 |
4 |
p. 1027-1038 |
artikel |
31 |
User-Qualified Group Search using Bidirectional Sweep Planes
|
Jung, Kyoung-Ho |
|
2017 |
9 |
4 |
p. 1259-1265 |
artikel |