-
1
-
-
84880575702
-
Semantic analysis and biological modelling in selected classes of cognitive information systems
-
[1] Ogiela, L., Semantic analysis and biological modelling in selected classes of cognitive information systems. Math. Comput. Modelling 58 (2013), 1405–1414.
-
(2013)
Math. Comput. Modelling
, vol.58
, pp. 1405-1414
-
-
Ogiela, L.1
-
2
-
-
84855970948
-
Methods for model-based reasoning within agent-based ambient intelligence applications
-
[2] Bosse, T., Both, F., Gerritsen, Ch., Hoogendoorn, M., Treur, J., Methods for model-based reasoning within agent-based ambient intelligence applications. Knowl.-Based Syst. 27 (2012), 190–210.
-
(2012)
Knowl.-Based Syst.
, vol.27
, pp. 190-210
-
-
Bosse, T.1
Both, F.2
Gerritsen, C.3
Hoogendoorn, M.4
Treur, J.5
-
3
-
-
84921746195
-
Cognitive systems for intelligent business information management in cognitive economy
-
[3] Ogiela, L., Ogiela, M.R., Cognitive systems for intelligent business information management in cognitive economy. Int. J. Inform. Manag. 34 (2014), 751–760.
-
(2014)
Int. J. Inform. Manag.
, vol.34
, pp. 751-760
-
-
Ogiela, L.1
Ogiela, M.R.2
-
4
-
-
84994571164
-
A collaborative clinical analysis service based on theory of evidence, fuzzy linguistic sets and prospect theory and its application to craniofacial disorders in infants
-
[4] Castiglione, A., Pizzolante, R., Esposito, Ch., De Santis, A., Palmieri, F., Castiglione, A., A collaborative clinical analysis service based on theory of evidence, fuzzy linguistic sets and prospect theory and its application to craniofacial disorders in infants. Future Gener. Comput. Syst. 67 (2017), 230–241.
-
(2017)
Future Gener. Comput. Syst.
, vol.67
, pp. 230-241
-
-
Castiglione, A.1
Pizzolante, R.2
Esposito, C.3
De Santis, A.4
Palmieri, F.5
Castiglione, A.6
-
5
-
-
84940874202
-
Evidence-theory-based numerical characterization of multigranulation rough sets in incomplete information systems
-
[5] Tan, A., Wu, W., Li, J., Lin, G., Evidence-theory-based numerical characterization of multigranulation rough sets in incomplete information systems. Fuzzy Sets Syst. 294 (2016), 18–35.
-
(2016)
Fuzzy Sets Syst.
, vol.294
, pp. 18-35
-
-
Tan, A.1
Wu, W.2
Li, J.3
Lin, G.4
-
6
-
-
84994885361
-
Cost-effective secure E-health cloud system using identity based cryptographic techniques
-
[6] Wang, X.A., Ma, J., Xhafa, F., Zhang, M., Luo, X., Cost-effective secure E-health cloud system using identity based cryptographic techniques. Future Gener. Comput. Syst. 67 (2017), 242–254.
-
(2017)
Future Gener. Comput. Syst.
, vol.67
, pp. 242-254
-
-
Wang, X.A.1
Ma, J.2
Xhafa, F.3
Zhang, M.4
Luo, X.5
-
7
-
-
84959862120
-
Secure authentication scheme for IoT and cloud servers
-
[7] Kalra, S., Sood, S.K., Secure authentication scheme for IoT and cloud servers. Pervasive Mobile Comput. 24 (2015), 210–223.
-
(2015)
Pervasive Mobile Comput.
, vol.24
, pp. 210-223
-
-
Kalra, S.1
Sood, S.K.2
-
8
-
-
84996598632
-
Exploiting cloud and workflow patterns for the analysis of composite cloud services
-
[8] Amato, F., Moscato, F., Exploiting cloud and workflow patterns for the analysis of composite cloud services. Future Gener. Comput. Syst. 67 (2017), 255–265.
-
(2017)
Future Gener. Comput. Syst.
, vol.67
, pp. 255-265
-
-
Amato, F.1
Moscato, F.2
-
9
-
-
84989924447
-
A survey on cloud federation architectures: Identifying functional and non-functional properties
-
[9] Assis, M.R.M., Bittencourt, L.F., A survey on cloud federation architectures: Identifying functional and non-functional properties. J. Netw. Comput. Appl. 72 (2016), 51–71.
-
(2016)
J. Netw. Comput. Appl.
, vol.72
, pp. 51-71
-
-
Assis, M.R.M.1
Bittencourt, L.F.2
-
10
-
-
84969917002
-
Towards achieving flexible and verifiable search for outsourced database in cloud computing
-
[10] Wang, J., Chen, X., Li, J., Zhao, J., Shen, J., Towards achieving flexible and verifiable search for outsourced database in cloud computing. Future Gener. Comput. Syst. 67 (2017), 266–275.
-
(2017)
Future Gener. Comput. Syst.
, vol.67
, pp. 266-275
-
-
Wang, J.1
Chen, X.2
Li, J.3
Zhao, J.4
Shen, J.5
-
11
-
-
84995894834
-
Uploading multiply deferrable big data to the cloud platform using cost-effective online algorithms
-
[11] Cui, B., Shi, P., Qi, W., Li, M., Uploading multiply deferrable big data to the cloud platform using cost-effective online algorithms. Future Gener. Comput. Syst. 67 (2017), 276–285.
-
(2017)
Future Gener. Comput. Syst.
, vol.67
, pp. 276-285
-
-
Cui, B.1
Shi, P.2
Qi, W.3
Li, M.4
-
12
-
-
84979556390
-
Geometrical and topological approaches to Big Data
-
[12] Snasel, V., Nowakova, J., Xhafa, F., Barolli, L., Geometrical and topological approaches to Big Data. Future Gener. Comput. Syst. 67 (2017), 286–296.
-
(2017)
Future Gener. Comput. Syst.
, vol.67
, pp. 286-296
-
-
Snasel, V.1
Nowakova, J.2
Xhafa, F.3
Barolli, L.4
-
13
-
-
84975464994
-
Clustering of trending topics in microblogging posts: A graph-based approach
-
[13] Hachaj, T., Ogiela, M.R., Clustering of trending topics in microblogging posts: A graph-based approach. Future Gener. Comput. Syst. 67 (2017), 297–304.
-
(2017)
Future Gener. Comput. Syst.
, vol.67
, pp. 297-304
-
-
Hachaj, T.1
Ogiela, M.R.2
-
14
-
-
84962128816
-
Voronoi-based Range-kNN search with Map Grid in a mobile environment
-
[14] Shao, Z., Taniar, D., Adhinugraha, K.M., Voronoi-based Range-kNN search with Map Grid in a mobile environment. Future Gener. Comput. Syst. 67 (2017), 305–314.
-
(2017)
Future Gener. Comput. Syst.
, vol.67
, pp. 305-314
-
-
Shao, Z.1
Taniar, D.2
Adhinugraha, K.M.3
-
15
-
-
84983503423
-
On cloud security attacks: A taxonomy and intrusion detection and prevention as a service
-
[15] Iqbal, S., Kiah, L.M., Dhaghighi, B., Hussain, M., Khan, S., Khan, M.K., Choo, K-K.R., On cloud security attacks: A taxonomy and intrusion detection and prevention as a service. J. Netw. Comput. Appl. 74 (2016), 98–120.
-
(2016)
J. Netw. Comput. Appl.
, vol.74
, pp. 98-120
-
-
Iqbal, S.1
Kiah, L.M.2
Dhaghighi, B.3
Hussain, M.4
Khan, S.5
Khan, M.K.6
Choo, K.-K.R.7
-
16
-
-
84995887335
-
Security challenges with network functions virtualization
-
[16] Firoozjaei, M.D., (Paul) Jeong, J., Ko, H., Kim, H., Security challenges with network functions virtualization. Future Gener. Comput. Syst. 67 (2017), 315–324.
-
(2017)
Future Gener. Comput. Syst.
, vol.67
, pp. 315-324
-
-
Firoozjaei, M.D.1
Jeong, J.2
Ko, H.3
Kim, H.4
|