Special issue on big data security and intelligent data in clouds (bds‐idc) (Englisch)
- Neue Suche nach: Hassan, Houcine
- Neue Suche nach: Yang, Laurence T.
- Neue Suche nach: Qiu, Meikang
- Neue Suche nach: Hassan, Houcine
- Neue Suche nach: Yang, Laurence T.
- Neue Suche nach: Qiu, Meikang
In:
CONCURRENCY AND COMPUTATION
;
29
, 14
;
NA
;
2017
-
ISSN:
- Aufsatz (Zeitschrift) / Print
-
Titel:Special issue on big data security and intelligent data in clouds (bds‐idc)
-
Beteiligte:
-
Erschienen in:CONCURRENCY AND COMPUTATION ; 29, 14 ; NA
-
Verlag:
- Neue Suche nach: John Wiley & Sons, Ltd
-
Erscheinungsdatum:01.01.2017
-
Format / Umfang:NA
-
ISSN:
-
Medientyp:Aufsatz (Zeitschrift)
-
Format:Print
-
Sprache:Englisch
- Neue Suche nach: 004.35
- Weitere Informationen zu Dewey Decimal Classification
-
Klassifikation:
DDC: 004.35 -
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis – Band 29, Ausgabe 14
Zeige alle Jahrgänge und Ausgaben
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
-
Forensic data acquisition from cloud‐of‐things devices: windows Smartphones as a case studyCahyani, Niken Dwi Wahyu / Martini, Ben / Choo, Kim‐Kwang Raymond / Al‐Azhar, AKBP Muhammad Nuh et al. | 2017
-
Taming the big to small: efficient selfish task allocation in mobile crowdsourcing systemsLi, Qingyu / Yang, Panlong / Fan, Xiaochen / Tang, Shaojie / Xiang, Chaocan / Guo, Deke / Li, Fan et al. | 2017
-
An energy‐aware virtual machine scheduling method for service QoS enhancement in clouds over big dataDou, Wanchun / Xu, Xiaolong / Meng, Shunmei / Zhang, Xuyun / Hu, Chunhua / Yu, Shui / Yang, Jian et al. | 2017
-
Adaptive human detection approach using FPGA‐based parallel architecture in reconfigurable hardwareLi, Yibin / Gai, Keke / Qiu, Meikang / Dai, Wenyun / Liu, Meiqin et al. | 2017
-
A cooperative offloading game on data recovery for reliable broadcast in VANETXiao, Guangbing / Zhang, Haibo / Hassan, Houcine / Chen, Yawen / Huang, Zhiyi / Sun, Ning et al. | 2017
-
A new outsourcing conditional proxy re‐encryption suitable for mobile cloud environmentSon, Junggab / Kim, Donghyun / Bhuiyan, Md Zakirul Alam / Hussain, Rasheed / Oh, Heekuck et al. | 2017
-
A resource allocation game with restriction mechanism in VANET cloudTao, Jun / Xu, Yifan / Zhang, Ziyi / Feng, Fuqin / Tong, Fei / Dong, Fang et al. | 2017
-
Running state of the high energy consuming equipment and energy saving countermeasure for chinese petroleum industry in cloud computingZhao, Haihui / Qi, Yaoguang / Du, Hongwei / Wang, Ningning / Zhang, Guofu / Liu, Wenbao / Lu, Hailong et al. | 2017
-
BRGP: a balanced RDF graph partitioning algorithm for cloud storageLeng, Yonglin / Zhikui, Chen / Zhong, Fangming / Li, Xiongjiu / Hu, Yueming / Yang, Chao et al. | 2017
-
Characteristics analysis and optimization design of entities collaboration for cloud manufacturingLi, Wenxiang / Zhu, Chunsheng / Wei, Xia / Rodrigues, Joel J.P.C. / Wang, Kun et al. | 2017
-
A comparison of classifiers and features for authorship authentication of social networking messagesLi, Jenny S. / Chen, Li‐Chiou / Monaco, John V. / Singh, Pranjal / Tappert, Charles C. et al. | 2017
-
Towards a multi‐layers anomaly detection framework for analyzing network trafficLi, Bo / Zhang, Simin / Li, Ke et al. | 2017
-
A video recommendation algorithm based on the combination of video content and social networkCui, Laizhong / Dong, Linyong / Fu, Xianghua / Wen, Zhenkun / Lu, Nan / Zhang, Guanjing et al. | 2017
-
Virtual network embedding with pre‐transformation and incentive convergence mechanismWang, Cong / Liu, Guohua / Peng, Sancheng / Yuan, Ying / Li, Guorui / Wan, Cong et al. | 2017
-
Issue Information| 2017
-
Modeling recommender systems via weighted bipartite networkXia, Jianxun / Wu, Fei / Xiong, Zenggang / Qiu, Meikang / Xie, Changsheng et al. | 2017
-
A novel social network access control model using logical authorization language in cloud computingMa, Li / Tao, Lixin / Gai, Keke / Zhong, Yong et al. | 2017
-
The structure of communities in scale‐free networksJiang, Jiaojiao / Wen, Sheng / Yu, Shui / Xiang, Yang / Zhou, Wanlei / Hassan, Houcine et al. | 2017
-
Defense against malicious URL spreading in micro‐blog network with hub nodesLiu, Xin / Wang, Feng / Yang, Yang / Xu, Jiuyun / Zou, Pingjun / Wang, Yiwen et al. | 2017
-
Cloud incident handling and forensic‐by‐design: cloud storage as a case studyAb Rahman, Nurul Hidayah / Cahyani, Niken Dwi Wahyu / Choo, Kim‐Kwang Raymond et al. | 2017
-
Special issue on Big Data Security and Intelligent Data in Clouds (BDS‐IDC)Hassan, Houcine / Yang, Laurence T. / Qiu, Meikang et al. | 2017