Abstract is missing.
- Deadline and Energy Aware Task Scheduling in Cloud ComputingHicham Ben Alla, Said Ben Alla, Abdellah Touhafi, Abdellah Ezzati. 1-8 [doi]
- Towards a Semantic Video Analysis using Deep Learning and OntologyJemai Bornia, Sidi Ahmed Mahmoudi, Ali Frihida, Pierre Manneback. 1-6 [doi]
- An adaptive task scheduler for a cloud of dronesHazzaa Naif Alshareef, Dan Grigoras. 1-8 [doi]
- Two-Level Allocation for H-CRAN Architecture Based in OffloadingMariane de Paula da Silva Goncalves, Matheus Barros Leto, Rafael Fogarolli Vieira, Fabricio Jose Brito Barros, Diego Lisboa Cardoso. 1-5 [doi]
- On-Board-Unit Data: A Big Data Platform for Scalable storage and ProcessingGiovanni Buroni, Yann-Aël Le Borgne, Gianluca Bontempi, Karl Determe. 1-5 [doi]
- Internet of Things: learning and practices. Application to Smart CityOlivier Debauche, Saïd Mahmoudi, Sidi Ahmed Mahmoudi. 1-7 [doi]
- Security Pattern for Cloud SaaS: from system and data security to privacyBojan Spasic, Annanda Th. Rath, Philippe Thiran, Nick Boucart. 1-8 [doi]
- A Comparative Analysis of Local and Cloud Access Assessment for Multimodal Interactive ApplicationIgor W. S. Falcao, Marcos C. da R. Seruffo, Daniel da S. Souza, Diego L. Cardoso, Jose J. H. Ferreira, Marcelino S. da Silva. 1-7 [doi]
- Analyzing fault tolerance mechanism of Hadoop Mapreduce under different type of failuresYassir Samadi, Mostapha Zbakh, Claude Tadonki. 1-7 [doi]
- Deep learning for a smart e-Icarning systemAbdessamad Chanaa, Nour-eddine El Faddouli. 1-8 [doi]
- Automated Breast Tumor Segmentation in DCE-MRI Using Deep LearningMohammed Benjelloun, Mohammed El Adoui, Mohamed Amine Larhmam, Sidi Ahmed Mahmoudi. 1-6 [doi]
- Storage and computation optimization of public-key schemes on embedded devicesJori Winderickx, An Braeken, Nele Mentens. 1-8 [doi]
- Cloud-Based Acoustic Beamforming Emulator for FPGA-Based Sound Source LocalizationLaurent Segers, Bruno da Silva, An Braeken, Abdellah Touhafi. 1-6 [doi]
- DTLS Integration in oneM2M based on Zolertia RE-motesSimone Patonico, Thanh-Long Nguyen, Placide Shabisha, An Braeken, Kris Steenhaut. 1-8 [doi]
- Resource Allocation Optimization for Hierarchical Cloud Data CentersRafael Fogarolli Vieira, Paulo Henrique Alves Pereira, Diego Lisboa Cardoso. 1-6 [doi]
- Design and implementation of a smart gateway for IoT applications using heterogeneous smart objectsYasser Mesmoudi, Mohammed Lamnaour, Yasser El Khamlichi, Abderrahim Tahiri, Abdellah Touhafi, An Braeken. 1-7 [doi]
- INTERACTIONS AND COMPARISON OF IT RISK ANALYSIS METHODSChaymaa Fakrane, Boubker Regragui. 1-7 [doi]
- Proximity Test for Sensitive Categorical Attributes in Big DataZakariae El Ouazzani, Hanan El Bakkali. 1-7 [doi]
- RGB Guided Thermal Super-Resolution EnhancementFeras Almasri, Olivier Debeir. 1-5 [doi]
- Symmetric-key Based Security for Multicast Communication in Wireless Sensor NetworksMatthias Carlier, Kris Steenhaut, An Braeken. 1-6 [doi]
- Robust Facial Recognition Using Extended Local Binary PatternsGafour Yacine, Djamel Berrabah, Sidi Ahmed Mahmoudi. 1-8 [doi]
- Performance Evaluation of IoT-Fag-Cloud Deployment for Healthcare serviciesSaid El Kafhali, Khaled Salah, Said Ben Alla. 1-6 [doi]
- Heterogeneous Cloud Computing: Design Methodology to Combine Hardware AcceleratorsBruno da Silva, Jan G. Cornelis, An Braeken, Erik H. D'Hollander, Jan Lemeire, Abdellah Touhafi. 1-8 [doi]
- Blockchain and IoT for Security and Privacy: A Platform for Diabetes Self-managementKebira Azbeg, Ouail Ouchetto, Said Jai-Andaloussi, Leila Fetjah, Abderrahim Sekkaki. 1-5 [doi]
- Wireless Sensor Networks as part of IOT: Performance study of WiMax - Mobil protocolHamza Zemrane, Aiman Nait Abbou, Youssef Baddi, Abderrahim Hasbi. 1-8 [doi]
- Autonomous Wireless Sensor Networks in automated IPMMina Petric, Cedric Marsboom, Tom Matheusen, Els Ducheyne, Jurgen Vandendriessche, Abdellah Touhafi. 1-6 [doi]
- A Cloud-based Architecture for Remote Access to Digital Fabrication Services for EducationGianluca Cornetta, Abdellah Touhafi, F. Javier Mateos, Gabriel-Miro Muntean. 1-6 [doi]
- Artifact Identification in Digital Pathology from Weak and Noisy Supervision with Deep Residual NetworksAdrien Foucart, Olivier Debeir, Christine Decaestecker. 1-6 [doi]
- Optimizing Microphone Arrays for Delay-and-Sum Beamforming using Genetic AlgorithmsDugagjin Lashi, Quentin Quevy, Jan Lemeire. 1-5 [doi]
- Cloud Secured Protocol based on Partial Homomorphic EncryptionsMostapha Derfouf, Mohsine Eleuldj. 1-6 [doi]