default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 165 matches
- 2018
- Eslam G. AbdAllah, Mohammad Zulkernine, Hossam S. Hassanein:
A Security Framework for ICN Traffic Management. DASC/PiCom/DataCom/CyberSciTech 2018: 78-85 - Mohammad A. R. Abdeen:
A Distributed Architecture and Design Challenges of an Astray Pilgrim Tracking System. DASC/PiCom/DataCom/CyberSciTech 2018: 1028-1033 - Antonio Acien, Ana Nieto, Javier López:
Analyzing Cross-Platform Attacks: Towards a Three-Actor Approach. DASC/PiCom/DataCom/CyberSciTech 2018: 536-543 - Abdulghani Ali Ahmed, Yee Wai Kit:
Collecting and Analyzing Digital Proof Material to Detect Cybercrimes. DASC/PiCom/DataCom/CyberSciTech 2018: 742-747 - Leonidas Akritidis, Panayiotis Bozanis, Athanasios Fevgas:
Supervised Papers Classification on Large-Scale High-Dimensional Data with Apache Spark. DASC/PiCom/DataCom/CyberSciTech 2018: 987-994 - Mabrook Al-Rakhami, Mohammed Abdullah Alsahli, Mohammad Mehedi Hassan, Atif Alamri, Antonio Guerrieri, Giancarlo Fortino:
Cost Efficient Edge Intelligence Framework Using Docker Containers. DASC/PiCom/DataCom/CyberSciTech 2018: 800-807 - Khaled Alanezi, Shivakant Mishra:
A Privacy Negotiation Mechanism for the Internet of Things. DASC/PiCom/DataCom/CyberSciTech 2018: 512-519 - Saqib Ali, Guojun Wang, Xiaofei Xing, Roger Leslie Cottrell:
Substituting Missing Values in End-to-End Internet Performance Measurements Using k-Nearest Neighbors. DASC/PiCom/DataCom/CyberSciTech 2018: 919-926 - Alaa Alsaig, Vangular Alagar, Olga Ormandjieva:
Foundational Issues on Big Data Science and Engineering. DASC/PiCom/DataCom/CyberSciTech 2018: 995-1000 - Kahina Amara, Naeem Ramzan, Nouara Achour, Mahmoud Belhocine, Cherif Larbes, Nadia Zenati:
A New Method for Facial and Corporal Expression Recognition. DASC/PiCom/DataCom/CyberSciTech 2018: 446-450 - Arafa Anis, Mohammad Zulkernine, Shahrear Iqbal, Clifford Liem, Catherine Chambers:
Securing Web Applications with Secure Coding Practices and Integrity Verification. DASC/PiCom/DataCom/CyberSciTech 2018: 618-625 - Muhammad Arif, Guojun Wang, Shuhong Chen:
Deep Learning with Non-parametric Regression Model for Traffic Flow Prediction. DASC/PiCom/DataCom/CyberSciTech 2018: 681-688 - Beakal Gizachew Assefa, Öznur Özkasap:
MER-SDN: Machine Learning Framework for Traffic Aware Energy Efficient Routing in SDN. DASC/PiCom/DataCom/CyberSciTech 2018: 974-980 - Nikoloas Bakalos, Eftychios Protopapadakis, Anastasios D. Doulamis, Nikolaos Doulamis:
Dance Posture/Steps Classification Using 3D Joints from the Kinect Sensors. DASC/PiCom/DataCom/CyberSciTech 2018: 868-873 - Humayun Bakht, Samuel Eding:
Policy-Based Approach for Securing Message Dissemination in Mobile Ad Hoc Networks. DASC/PiCom/DataCom/CyberSciTech 2018: 1040-1045 - Puneet Bakshi, Neelakantan Subramanian, Sukumar Nandi:
Using Digital Tokens to Improve Amortized Performance of eSign. DASC/PiCom/DataCom/CyberSciTech 2018: 121-128 - Souha Bejaoui, Christophe Cérin, Tarek Menouer, Walid Saad:
Towards a Two Layers Based Scheduling Schema for Data Aware Strategies. DASC/PiCom/DataCom/CyberSciTech 2018: 1060-1067 - Pierfrancesco Bellini, Stefano Bilotta, Paolo Nesi, Michela Paolucci, Mirco Soderi:
Real-Time Traffic Estimation of Unmonitored Roads. DASC/PiCom/DataCom/CyberSciTech 2018: 935-942 - Keltoum Bendiab, Nicholas Kolokotronis, Stavros Shiaeles, Samia Boucherkha:
WiP: A Novel Blockchain-Based Trust Model for Cloud Identity Management. DASC/PiCom/DataCom/CyberSciTech 2018: 724-729 - Quentin Bergougnoux, Julien Cartigny, Gilles Grimaud:
Porting the Pip Proto-Kernel's Model to Multi-core Environments. DASC/PiCom/DataCom/CyberSciTech 2018: 584-591 - Nesrine Berjab, Hieu Hanh Le, Chia-Mu Yu, Sy-Yen Kuo, Haruo Yokota:
Abnormal-Node Detection Based on Spatio-Temporal and Multivariate-Attribute Correlation in Wireless Sensor Networks. DASC/PiCom/DataCom/CyberSciTech 2018: 568-575 - Ruiying Cai, Ao Guo, Jianhua Ma, Runhe Huang, Ruiyun Yu, Chen Yang:
Correlation Analyses Between Personality Traits and Personal Behaviors Under Specific Emotion States Using Physiological Data from Wearable Devices. DASC/PiCom/DataCom/CyberSciTech 2018: 46-53 - Joyjit Chatterjee, Vajja Mukesh, Hui-Huang Hsu, Garima Vyas, Zhen Liu:
Speech Emotion Recognition Using Cross-Correlation and Acoustic Features. DASC/PiCom/DataCom/CyberSciTech 2018: 243-249 - Lingchi Chen, Xiaoheng Deng, Hailan Shen, Congxu Zhu, Le Chang:
DYCUSBoost: Adaboost-Based Imbalanced Learning Using Dynamic Clustering and Undersampling. DASC/PiCom/DataCom/CyberSciTech 2018: 208-215 - Hsing-bung Chen, Qiang Guan, Song Fu:
UNS: A Portable, Mobile, and Exchangeable Namespace for Supporting Fetch-from-Anywhere Big Data Eco-Systems. DASC/PiCom/DataCom/CyberSciTech 2018: 889-896 - Fulong Chen, Hao Shen, Cheng Wang, Le Xie, Shoujun Zhou, Hesheng Wang:
The Model Experimental Evaluation of the Cardiovascular Interventional Surgery Robot System. DASC/PiCom/DataCom/CyberSciTech 2018: 114-120 - Chunhua Chen, Junwei Yan:
HyTube: A Novel Middleware Layer for Smart Building Systems. DASC/PiCom/DataCom/CyberSciTech 2018: 135-142 - Yi-Ting Chen, Chia-Cheng Yen, Yu-Tai Lin, Jia-Shung Wang:
Cooperative Caching Plan of Popular Videos for Mobile Users by Grouping Preferences. DASC/PiCom/DataCom/CyberSciTech 2018: 762-769 - Xuejiao Chen, Jiahui Yu, Feng Ye, Pan Wang:
A Hierarchical Approach to Encrypted Data Packet Classification in Smart Home Gateways. DASC/PiCom/DataCom/CyberSciTech 2018: 41-45 - Edren Dacaymat, Jun Zhang, Qi Wang, M. D. Alam Bhuiyan, Thaier Hayajneh:
Exploring Problems with Virtualization in Cloud Computing. DASC/PiCom/DataCom/CyberSciTech 2018: 673-680
skipping 135 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-12-16 09:08 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint