default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 5,004 matches
- 2024
- Antonio Caruso, Stefano Chessa:
Energy Sustainable IoT Scheduling in a Fog/IoT Interplay. ISCC 2024: 1-6 - Zhou Zhou, Zahra Pooranian, Mohammad Shojafar, Fabio Martinelli:
An Edge Server Deployment Strategy for Multi-Objective Optimization in the Internet of Vehicles. ISCC 2024: 1-6 - Rui Jesus, José Frías, Pedro Gouveia, João Santinha, Luís Bastião Silva, Carlos Costa:
DICOM Gateway Anonymizer: A Cloud architecture for a scalable research PACS. ISCC 2024: 1-6 - Hanzhi Wang, David Marshall, Derek K. Jones, Yuhua Li:
Improving High-Frequency Details in Cerebellum for Brain MRI Super-Resolution. ISCC 2024: 1-7 - Yu Wang, Dongdong Huo, Chuang Li, Sixiang Wang, Xiaokun Guo, Qihui Zhou, Yu Wang:
Cross-Architecture IoT Firmware Similarity Comparison Based on Multi-Layer GCN. ISCC 2024: 1-7 - Ahmed Abdelmaguid, Marwan Torki, Ayman Khalafallah:
AraEGI: Arabic Gender Identification Using Transformers for Egyptian Dialect. ISCC 2024: 1-7 - Diego Medeiros de Abreu, Antônio J. G. Abelém:
qRL: Reinforcement Learning Routing for Quantum Entanglement Networks. ISCC 2024: 1-6 - Diego Medeiros de Abreu, Christian Esteve Rothenberg, Antônio J. G. Abelém:
QML-IDS: Quantum Machine Learning Intrusion Detection System. ISCC 2024: 1-6 - Vincenzo Agate, Pierluca Ferraro, Giuseppe Lo Re:
A Privacy-Preserving System for Enhancing the QoI of Collected Data in a Smart Connected Community. ISCC 2024: 1-6 - Vincenzo Agate, Alessandra De Paola, Salvatore Drago, Pierluca Ferraro, Giuseppe Lo Re:
Enhancing IoT Network Security with Concept Drift-Aware Unsupervised Threat Detection. ISCC 2024: 1-6 - Antonio Agliata, Antonio Pilato, Sorrentino Mariacarmen, Salvatore Bottiglieri, Emanuel Di Nardo, Angelo Ciaramella:
Generative AI and Emotional Health: Innovations with Haystack. ISCC 2024: 1-4 - Candra Ahmadi, Jiann-Liang Chen:
Enhancing Phishing Detection: A Multi-Layer Ensemble Approach Integrating Machine Learning for Robust Cybersecurity. ISCC 2024: 1-6 - Arian Ahmadi, Anders Høst-Madsen, Zixiang Xiong:
Latency and Energy Minimization in NOMA-Assisted MEC Network: A Federated Deep Reinforcement Learning Approach. ISCC 2024: 1-6 - Mohammad Imran Ali, Giuseppe Di Modica, Giorgia Rondinini, Andrea Sabbioni, Antonio Corradi:
Function profiling to support smart Serverless service deployment in the Cloud continuum. ISCC 2024: 1-6 - Emmanuel N. Amachaghi, Sulyman Age Abdulkareem, Sotiris Chatzimiltis, Mohammad Shojafar, Chuan Heng Foh:
An Efficient Intrusion Detection Solution for Near-Real-Time Open-RAN. ISCC 2024: 1-7 - Youness Amadiaz, Ahmed Nait-Sidi-Moh, Said Kharraja:
Decision Support for Patient Transport Efficiency Based on V2X Communications in Healthcare Systems. ISCC 2024: 1-6 - Ons Aouedi, Gautam Jajoo, Kandaraj Piamrat:
METALS : seMi-supervised fEderaTed Active Learning for intrusion detection Systems. ISCC 2024: 1-6 - Adriana Arteaga Arce, Nikos Filinis, Lei Fu, Carol Habib, Leonardo Militano, Dimitrios Spatharakis, Anastasios Zafeiropoulos, Thomas Michael Bohnert, Nathalie Mitton, Symeon Papavassiliou:
Virtual Objects for Robots and Sensor Nodes in Distributed Applications over the Cloud Continuum. ISCC 2024: 1-6 - Yeabsira Asefa Ashengo, Tara Ali-Yahiya, Nicola Roberto Zema:
Efficient Task Offloading in Multi-access Edge Computing Servers using Asynchronous Meta Reinforcement Learning in 5G. ISCC 2024: 1-6 - Nícolas Riccieri Gardin Assumpçáo, Leandro Villas:
Fast, Private, and Protected: Safeguarding Data Privacy and Defending Against Model Poisoning Attacks in Federated Learning. ISCC 2024: 1-6 - Sara Baldoni:
Quality of Experience for immersive media: from content creation to rendering. ISCC 2024: 1-6 - Eranga Bandara, Peter Foytik, Sachin Shetty, Ravi Mukkamala, Abdul Rahman, Xueping Liang, Ng Wee Keong, Kasun De Zoysa:
WedaGPT - Generative-AI (with Custom-Trained Meta's Llama2 LLM), Blockchain, Self Sovereign Identity, NFT and Model Card Enabled Indigenous Medicine Platform. ISCC 2024: 1-6 - Utsav Banerjee:
Energy-Efficient and Secure Clustering with Post-Quantum DTLS in Wireless Sensor Networks. ISCC 2024: 1-6 - Sampad Banik, Xingya Liu, Jiang (Linda) Xie:
SABR: A Self-Adaptive Beamforming-Based Rendezvous Protocol for Cognitive Radio Networks with Dense Primary Users. ISCC 2024: 1-6 - Bithi Banik, Constanza Zurita Valdebenito, Al Mamun Bhuiyan, Soumya P. Dash, Yuan Lin, Debasish Ghose:
Bi-directional Estimation of Infant Heart and Respiration Rates Using Machine Learning Algorithms. ISCC 2024: 1-6 - Sergio Barrachina-Muñoz, Rasoul Nikbakht, Albert Bel, Jorge Baranda, Miquel Payaró, Josep Mangues-Bafalluy:
DEMO: On-demand 5G/6G edge verticals via third-party UPF selection and cloud-native relocation. ISCC 2024: 1-3 - Aymern Belghith:
Balancing Detection Speed and Resource Efficiency in Healthcare Vulnerability Scanning. ISCC 2024: 1-6 - Diana Gratiela Berbecaru, Stefano Giannuzzi:
On Detecting Anomalous TLS Connections with Artificial Intelligence Models. ISCC 2024: 1-6 - Diana Gratiela Berbecaru, Silvia Sisinni, Matteo Simone:
On the evaluation of X.509 certificate processing in Transport Layer Security interceptors. ISCC 2024: 1-6 - Cinzia Bernardeschi, Gianluca Dini, Maurizio Palmieri, Alessio Vivani:
Attacks detection in Cyber-Physical Systems with Neural Networks: a case study. ISCC 2024: 1-6
skipping 4,974 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-12-22 12:16 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint