nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A comprehensive survey on container resource allocation approaches in cloud computing: State-of-the-art and research challenges
|
Netaji, Vhatkar Kapil |
|
|
|
4 |
p. 295-316 |
artikel |
2 |
Active learning strategies for solving the cold user problem in model-based recommender systems
|
Geurts, Tomas |
|
|
|
4 |
p. 269-283 |
artikel |
3 |
Advanced ant colony algorithm for high dimensional abnormal data mining in Internet of things
|
Wang, Huixian |
|
|
|
4 |
p. 253-262 |
artikel |
4 |
Adversarial auto-encoder for rating prediction with ratings and reviews
|
Yi, Jin |
|
|
|
4 |
p. 285-294 |
artikel |
5 |
A federated learning based semi-supervised credit prediction approach enhanced by multi-layer label mean
|
Li, Lin |
|
|
|
4 |
p. 329-342 |
artikel |
6 |
A measure based pricing framework for data products
|
Ye, Yazhen |
|
|
|
4 |
p. 249-260 |
artikel |
7 |
An automatic generation of software test data based on improved Markov model
|
Chen, Jiali |
|
|
|
4 |
p. 307-315 |
artikel |
8 |
An extensive review on crop/weed classification models
|
Panda, Bikramaditya |
|
|
|
4 |
p. 473-488 |
artikel |
9 |
An intelligent recommender system based on predictive analysis in telehealthcare environment
|
Lafta, Raid |
|
2016 |
|
4 |
p. 325-336 |
artikel |
10 |
Applying ontologies to the development and execution of Multi-Agent Systems
|
Freitas, Artur |
|
2017 |
|
4 |
p. 291-302 |
artikel |
11 |
A secure authentication protocol for healthcare service in IoT with Q-net based secret key generation
|
Mahajan, Rupali |
|
|
|
4 |
p. 407-433 |
artikel |
12 |
A topical diversity-based approach to detecting similar question groups from collaborative question-answering archives
|
Hao, Tianyong |
|
2016 |
|
4 |
p. 301-308 |
artikel |
13 |
A topic-based sentiment analysis model to predict stock market price movement using Weibo mood
|
Chen, Wenhao |
|
2016 |
|
4 |
p. 287-300 |
artikel |
14 |
Author Index Volume 13 (2015)
|
|
|
2015 |
|
4 |
p. 313-314 |
artikel |
15 |
Author Index Volume 14 (2016)
|
|
|
2016 |
|
4 |
p. 337-338 |
artikel |
16 |
Chatbots for online banking services
|
Doherty, Dana |
|
|
|
4 |
p. 327-342 |
artikel |
17 |
Clustering method of unbalanced large data density based on dynamic grid
|
Wang, Yang |
|
|
|
4 |
p. 287-295 |
artikel |
18 |
Combining semantic graph and probabilistic topic models for discovering coherent topics
|
Allahyari, Mehdi |
|
|
|
4 |
p. 365-379 |
artikel |
19 |
Comparative evaluation of two approaches for retweet clustering: A text-based method and graph-based method
|
Uchida, Kazuki |
|
|
|
4 |
p. 271-284 |
artikel |
20 |
Correlation alignment with attention mechanism for unsupervised domain adaptation
|
Chen, Rong |
|
|
|
4 |
p. 261-267 |
artikel |
21 |
Exponential Ant-Lion Rider Optimization for Privacy Preservation in Cloud Computing
|
Pamarthi, Nagaraju |
|
|
|
4 |
p. 275-293 |
artikel |
22 |
Factors to be considered in cloud computing adoption
|
Ali, Omar |
|
2016 |
|
4 |
p. 309-323 |
artikel |
23 |
Firefly-Aquila optimized Deep Q network for handoff management in context aware video streaming-based heterogeneous wireless networks
|
Waghmode, Uttam |
|
|
|
4 |
p. 363-384 |
artikel |
24 |
FLICM clustering with matrix factorization based course recommendation in an E-learning platform
|
Madhavi, A. |
|
|
|
4 |
p. 489-505 |
artikel |
25 |
Improvement of fusion algorithm using cascade method and implementation on proxy server for replacing negative content on a porn site
|
Soetrisno, Yosua Alvin Adi |
|
2018 |
|
4 |
p. 233-246 |
artikel |
26 |
Learning and relearning of target decision strategies in continuous coordinated cleaning tasks with shallow coordination1
|
Yoneda, Keisuke |
|
2015 |
|
4 |
p. 279-294 |
artikel |
27 |
Mining the information architecture of the WWW using automated website boundary detection
|
Alshukri, Ayesh |
|
2017 |
|
4 |
p. 269-290 |
artikel |
28 |
Mobile agents path planning based on an extension of Bug-Algorithms and applied to the pursuit-evasion game
|
Souidi, Mohammed El Habib |
|
2017 |
|
4 |
p. 325-334 |
artikel |
29 |
Multi-mode Natural Language Processing for human-robot interaction
|
Xie, Jiongkun |
|
2015 |
|
4 |
p. 267-278 |
artikel |
30 |
Multi-objective hybrid optimization for micro strip patch antenna design
|
Bommu, Samuyelu |
|
|
|
4 |
p. 451-472 |
artikel |
31 |
Multi-objective secure aware workflow scheduling algorithm in cloud computing based on hybrid optimization algorithm
|
Narendrababu Reddy, G. |
|
|
|
4 |
p. 385-405 |
artikel |
32 |
Negative trust for conflict resolution in software management
|
Primiero, Giuseppe |
|
2018 |
|
4 |
p. 251-271 |
artikel |
33 |
On the emergence of semantic agreement among rational agents
|
Vakili, Golnaz |
|
2015 |
|
4 |
p. 295-312 |
artikel |
34 |
Pancake graphs for lookup acceleration and optimization in P2P networks
|
Amad, Mourad |
|
2018 |
|
4 |
p. 221-232 |
artikel |
35 |
Performance evaluation of Twitter datasets on SQL and NoSQL DBMS
|
Leung, Franklin |
|
2016 |
|
4 |
p. 275-286 |
artikel |
36 |
Privacy information protection algorithm of ultra dense network nodes based on edge computing
|
Wang, Hua |
|
|
|
4 |
p. 279-286 |
artikel |
37 |
Privacy preserving data release for tagging recommender systems
|
Zhu, Tianqing |
|
2015 |
|
4 |
p. 229-246 |
artikel |
38 |
Processing of association rules with ontology in distributed NoSQL systems
|
Dahmani, Djilali |
|
|
|
4 |
p. 285-296 |
artikel |
39 |
Properties of a new adaptive sampling method with applications to scalable learning
|
Chen, Jianhua |
|
2015 |
|
4 |
p. 215-227 |
artikel |
40 |
Proposal of grade training method for quality improvement in microtask crowdsourcing
|
Ashikawa, Masayuki |
|
|
|
4 |
p. 313-326 |
artikel |
41 |
Recommend interesting items: How can social curiosity help?
|
Wu, Qiong |
|
|
|
4 |
p. 297-311 |
artikel |
42 |
Reliable routing in MANET with mobility prediction via long short-term memory
|
Biradar, Manjula A. |
|
|
|
4 |
p. 435-450 |
artikel |
43 |
Research on dynamic and secure storage of financial data based on cloud platform
|
Li, Jingyi |
|
|
|
4 |
p. 263-274 |
artikel |
44 |
Scheduling control method of Internet of things data uplink based on TS algorithm
|
Wang, Zhao-Long |
|
|
|
4 |
p. 297-305 |
artikel |
45 |
Sentiment analysis of customer data
|
Tarnowska, Katarzyna A. |
|
|
|
4 |
p. 343-363 |
artikel |
46 |
Special issue on knowledge management of web social media
|
Tao, Xiaohui |
|
2016 |
|
4 |
p. 273-274 |
artikel |
47 |
Special Issue: Trust management
|
|
|
2018 |
|
4 |
p. 247 |
artikel |
48 |
Special issue: Trust management
|
Esfandiari, Babak |
|
2018 |
|
4 |
p. 249 |
artikel |
49 |
State of the art of reputation-enhanced recommender systems
|
Richthammer, Christian |
|
2018 |
|
4 |
p. 273-286 |
artikel |
50 |
The mobile edge computing task offloading in wireless networks based on improved genetic algorithm
|
Shang, Zhanlei |
|
|
|
4 |
p. 269-277 |
artikel |
51 |
The node deployment of wireless sensor networks based on mobile edge computing
|
Zhou, Fangrong |
|
|
|
4 |
p. 259-267 |
artikel |
52 |
Thinking space generation using context-enhanced knowledge fusion for systematic brain computing
|
Kuai, Hongzhi |
|
|
|
4 |
p. 345-361 |
artikel |
53 |
Top-N recommendations in the presence of sparsity: An NCD-based approach
|
Nikolakopoulos, Athanasios N. |
|
2015 |
|
4 |
p. 247-265 |
artikel |
54 |
Transferring sentiment knowledge between words and tweets
|
Bravo-Marquez, Felipe |
|
2018 |
|
4 |
p. 203-220 |
artikel |
55 |
Trust-based federated learning for network anomaly detection
|
Chen, Naiyue |
|
|
|
4 |
p. 317-327 |
artikel |
56 |
Using online data sources to make query suggestions for children
|
Pera, Maria Soledad |
|
2017 |
|
4 |
p. 303-323 |
artikel |