default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 454 matches
- 2023
- Jeng-Shyang Pan, Pei Hu, Tien-Szu Pan, Shu-Chuan Chu:
Improved Equilibrium Optimizer for Short-Term Traffic Flow Prediction. J. Database Manag. 34(1): 1-20 (2023) - Kai Zhang, Xuejia Lai, Jie Guan, Bin Hu:
Selecting Rotation Constants on SIMON-Type Ciphers. J. Database Manag. 34(1): 1-23 (2023) - Hui Li, Yifei Zhu:
Privacy-Preserving Contact Tracing for Curbing the Spread of Infectious Disease. J. Database Manag. 34(3): 1-17 (2023) - Erukala Suresh Babu, Bhukya Padma, Soumya Ranjan Nayak, Nazeeruddin Mohammad, Uttam Ghosh:
Cooperative IDS for Detecting Collaborative Attacks in RPL-AODV Protocol in Internet of Everything. J. Database Manag. 34(2): 1-33 (2023) - Taiyu Ban, Xiangyu Wang, Xin Wang, Jiarun Zhu, Lvzhou Chen, Yizhan Fan:
Knowledge Extraction From National Standards for Natural Resources: A Method for Multi-Domain Texts. J. Database Manag. 34(1): 1-23 (2023) - Maryam Bukhari, Sadaf Yasmin, Saira Andleeb Gillani, Muazzam Maqsood, Seungmin Rho, Sang Soo Yeo:
Secure Gait Recognition-Based Smart Surveillance Systems Against Universal Adversarial Attacks. J. Database Manag. 34(2): 1-25 (2023) - Peng Chen, Shuang Liu, Niko Lukac:
CNN-Based Vessel Meeting Knowledge Discovery From AIS Vessel Trajectories. J. Database Manag. 34(3): 1-38 (2023) - Mehmet Demir, Ozgur Turetken, Alexander Ferworn, Mehdi Kargar:
A Blockchain-Based System for Aid Delivery: Concept Development, Data Modeling, and Validation. J. Database Manag. 34(1): 1-35 (2023) - Prajwal Eachempati, Praveen Ranjan Srivastava:
Prediction of the Stock Market From Linguistic Phrases: A Deep Neural Network Approach. J. Database Manag. 34(1): 1-22 (2023) - Junhua Fang, Zonglei Zhang:
A Distributed Spatial Index With High Update Efficiency for Location-Based Real-Time Services. J. Database Manag. 34(1): 1-28 (2023) - Nan Feng, Yuguang Wang, Zhiguo Chen, Tingting Song:
The Status Quo and Development Countermeasures of Venture Capital in the New Energy Economy Based on Big Data Analysis. J. Database Manag. 34(1): 1-23 (2023) - Yalan Feng, Huabin Wang, Dai-lei Zhang, Jiahao Li, Liang Tao:
One-Factor Cancellable Fingerprint Template Protection Based on Index Self-Encoding. J. Database Manag. 34(3): 1-18 (2023) - R. Gurunath, Debabrata Samanta:
A New 3-Bit Hiding Covert Channel Algorithm for Public Data and Medical Data Security Using Format-Based Text Steganography. J. Database Manag. 34(2): 1-22 (2023) - Fangwan Huang, Shijie Zhuang, Zhiyong Yu, Yuzhong Chen, Kun Guo:
Adaptive Modularized Recurrent Neural Networks for Electric Load Forecasting. J. Database Manag. 34(1): 1-18 (2023) - Harish Kumar, Rameshwar Shivadas Ture, M. P. Gupta, R. S. Sharma:
Technological Solutions for Digital Identity: A Computer Vision-Based Approach to Mitigate Imaging Errors. J. Database Manag. 34(1): 1-17 (2023) - Parul Lakhotia, Rinky Dwivedi, Deepak Kumar Sharma, Nonita Sharma:
Intrusion Detection System for IoE-Based Medical Networks. J. Database Manag. 34(2): 1-18 (2023) - Rankang Li, Shanxiong Chen, Fujia Zhao, Xiaogang Qiu:
Text Detection Model for Historical Documents Using CNN and MSER. J. Database Manag. 34(1): 1-23 (2023) - Yongdong Li, Liang Qu, Guiyan Cai, Guoan Cheng, Long Qian, Yuling Dou, Fengqin Yao, Shengke Wang:
Video Object Counting With Scene-Aware Multi-Object Tracking. J. Database Manag. 34(3): 1-13 (2023) - Zhongliang Li, Yaofeng Tu, Zongmin Ma:
A Sample-Aware Database Tuning System With Deep Reinforcement Learning. J. Database Manag. 35(1): 1-25 (2023) - Min Li, Huabin Wang, Leqian Li, Dai-lei Zhang, Liang Tao:
Finger Vein Recognition Based on a Histogram of Competitive Gabor Directional Binary Statistics. J. Database Manag. 34(3): 1-19 (2023) - Wenjie Liu, Sai Chen, Guoyao Huang, Lingfeng Lu, Huakang Li, Guozi Sun:
Incorporating I Ching Knowledge Into Prediction Task via Data Mining. J. Database Manag. 34(3): 1-16 (2023) - Liqun Liu, Renyuan Gu, Jiuyuan Huo, Yubo Zhou:
Origin-Oriented Shuffled Frog Leaping Vehicle Routing Multiobjective Optimization Algorithm. J. Database Manag. 34(3): 1-24 (2023) - Haiyi Liu, Ying Jiang, Yongquan Chen:
Completion of Parallel app Software User Operation Sequences Based on Temporal Context. J. Database Manag. 34(3): 1-17 (2023) - Yikai Liu, Fenglan Ju, Qunwei Zhang, Meng Zhang, Zezhong Ma, Mingduo Li, Aimin Yang, Fengchun Liu:
Overview of Internet of Medical Things Security Based on Blockchain Access Control. J. Database Manag. 34(3): 1-20 (2023) - Jun Lu, Wenhe Xu, Kailong Zhou, Zhicong Guo:
Frequent Itemset Mining Algorithm Based on Linear Table. J. Database Manag. 34(1): 1-21 (2023) - Junfeng Man, Longqian Zhao, Bowen Xu, Cheng Peng, Junjie Jiang, Yi Liu:
Computation Offloading Method for Large-Scale Factory Access in Edge-Edge Collaboration Mode. J. Database Manag. 34(1): 1-29 (2023) - Gang Peng, Rahul Bhaskar:
Artificial Intelligence and Machine Learning for Job Automation: A Review and Integration. J. Database Manag. 34(1): 1-12 (2023) - Pasi Raatikainen, Samuli Pekkola, Maria Mäkelä:
Narrativization in Information Systems Development. J. Database Manag. 35(1): 1-30 (2023) - Pranay Sindhu, Kumkum Bharti:
The Effects of Atmospherics and Influencers on Purchase Intention in Social Commerce. J. Database Manag. 34(1): 1-23 (2023) - Monu Singh, Amit Kumar Singh:
Security of Medical Images Using a Key-Based Encryption Algorithm in the RDWT-RSVD Domain: SeMIE. J. Database Manag. 34(2): 1-20 (2023)
skipping 424 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-01-12 21:58 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint