default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 1,182 matches
- 2012
- Mitsuaki Akiyama, Yuhei Kawakoya, Takeo Hariu:
Scalable and Performance-Efficient Client Honeypot on High Interaction System. SAINT 2012: 40-50 - Yoshiyuki Asai, Takeshi Abe, Masao Okita, Tomohiro Okuyama, Nobukazu Yoshioka, Shigetoshi Yokoyama, Masaru Nagaku, Kenichi Hagihara, Hiroaki Kitano:
Multilevel Modeling of Physiological Systems and Simulation Platform: PhysioDesigner, Flint and Flint K3 Service. SAINT 2012: 215-219 - Ryan Babbitt, Hen-I Yang, Johnny Wong:
PIPER: A Framework for Exploring the Privacy Implications of Pervasive Computing Applications in Their Physical Environments. SAINT 2012: 166-171 - Noppawat Chaisamran, Takeshi Okuda, Suguru Yamaguchi:
A Proposal for Anomaly Traffic Detection in the IP Multimedia Subsystem Using Tanimoto Distance and a Modified Moving Average. SAINT 2012: 278-283 - Daiki Chiba, Kazuhiro Tobe, Tatsuya Mori, Shigeki Goto:
Detecting Malicious Websites by Learning IP Address Features. SAINT 2012: 29-39 - Zan-Kai Chong, Hiroyuki Ohsaki, Bok-Min Goi, Hong-Tat Ewe, Cheng-Kuan Bryan Ng:
Performance Analysis of Fountain-Based Protocol in CSMA/CA Wireless Networks. SAINT 2012: 184-189 - Nagul Cooharojananone, Pongjit Kongnim, Aratchaporn Mongkolnut, Hitoshi Okada:
Evaluation Study of Usability Factors on Mobile Payment Application on Two Different Service Providers in Thailand. SAINT 2012: 233-238 - Maike Erdmann, Tomoya Takeyoshi, Gen Hattori, Chihiro Ono:
Extraction and Annotation of Personal Cliques from Social Networks. SAINT 2012: 172-177 - Yaokai Feng, Yoshiaki Hori, Kouichi Sakurai, Jun'ichi Takeuchi:
A Behavior-Based Detection Method for Outbreaks of Low-Rate Attacks. SAINT 2012: 267-272 - Akihiro Fujihara, Hiroyoshi Miwa:
Real-Time Disaster Evacuation Guidance Using Opportunistic Communications. SAINT 2012: 326-331 - Takayoshi Fujii, Katsunari Yoshioka, Junji Shikata, Tsutomu Matsumoto:
An Efficient Dynamic Detection Method for Various x86 Shellcodes. SAINT 2012: 284-289 - Kenji Fujikawa, Hajime Tazaki, Hiroaki Harai:
Inter-AS Locator Allocation of Hierarchical Automatic Number Allocation in a 10, 000-AS Network. SAINT 2012: 68-73 - Masanori Fujiwara, Keita Kawano, Nariyoshi Yamai:
An Execution Control System for Application Software Reducing Administrative Burden of Educational PCs. SAINT 2012: 375-380 - Kazunori Fujiwara, Akira Sato, Kenichi Yoshida:
DNS Traffic Analysis: Issues of IPv6 and CDN. SAINT 2012: 129-137 - Dariusz Gasior, Maciej Drwal:
Two-Level Heuristic Algorithm for Utility-Based Data Placement and Rate Allocation in Content-Aware Networks. SAINT 2012: 308-313 - Kurt Geihs, Jan Marco Leimeister, Alexander Roßnagel, Ludger Schmidt:
On Socio-technical Enablers for Ubiquitous Computing Applications. SAINT 2012: 405-408 - Sven Groot:
Modeling I/O Interference in Data Intensive Map-Reduce Applications. SAINT 2012: 206-209 - Seung Chul Han:
Distributing Link Stress for Internet TV Systems. SAINT 2012: 314-319 - Takuya Horai, Kaori Maeda, Yasuhiro Ohishi, Hayato Morihiro, Tomoki Harase:
Vertical Handover Control Considering End-to-End Communication Quality in IP Mobility. SAINT 2012: 332-337 - Theofilos Kakantousis, Vana Kalogeraki:
A Mobile Platform for Managing Mobile MapReduce Participatory Sensing Data. SAINT 2012: 196-201 - Keisuke Kamada, Tohru Kondo, Kouji Nishimura, Reiji Aibara:
Design and Evaluation of Global Live Migration with Mobility Support for IP Multicast. SAINT 2012: 338-344 - Péter András Kara, László Bokor, Sándor Imre:
Distortions in QoE Measurements of Ubiquitous Mobile Video Services Caused by the Preconceptions of Test Subjects. SAINT 2012: 409-413 - Takahiro Kasama, Katsunari Yoshioka, Daisuke Inoue, Tsutomu Matsumoto:
Malware Detection Method by Catching Their Random Behavior in Multiple Executions. SAINT 2012: 262-266 - Hiroki Kashiwazaki, Satoshi Kobayashi, Shugo Kawai, Norikatsu Ohishi, Yoshiaki Takai:
An Adaptive Approach for Network Traffic Load Balancing by Using One-Way Delay. SAINT 2012: 345-350 - Eiji Kawai:
Can SDN Help HPC? SAINT 2012: 210 - Hirotsugu Kinoshita, Yoshiaki Tajima, Tetsuya Morizumi, Masato Noto, Hideyuki Kanabe, Sumiko Miyata:
A Local Currency System Reflecting Variety of Values with a Swarm Intelligence. SAINT 2012: 251-255 - Mario Köppen, Kaori Yoshida, Rodrigo Verschae, Masato Tsuru, Yuji Oie:
Comparative Study on Meta-heuristics for Achieving Parabolic Fairness in Wireless Channel Allocation. SAINT 2012: 302-307 - Daisuke Kotani, Kazuya Suzuki, Hideyuki Shimonishi:
A Design and Implementation of OpenFlow Controller Handling IP Multicast with Fast Tree Switching. SAINT 2012: 60-67 - Minkyu Lee, Suk Hoon Jung, Sangjae Lee, Dongsoo Han:
Elekspot: A Platform for Urban Place Recognition via Crowdsourcing. SAINT 2012: 190-195 - Yu-Chu Lin, Yuusuke Kawakita, Etsuko Suzuki, Haruhisa Ichikawa:
Personalized Clothing-Recommendation System Based on a Modified Bayesian Network. SAINT 2012: 414-417
skipping 1,152 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-12-04 20:22 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint