default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 65 matches
- 2020
- Igor V. Kotenko, Costin Badica, Vasily Desnitsky, Didier El Baz, Mirjana Ivanovic:
Intelligent Distributed Computing XIII, 13th International Symposium on Intelligent Distributed Computing, IDC 2019, St. Petersburg, Russia, 7-9 October, 2019. Studies in Computational Intelligence 868, Springer 2020, ISBN 978-3-030-32257-1 [contents] - 2019
- Fatemeh Khodaparast, Mina Sheikhalishahi, Hassan Haghighi, Fabio Martinelli:
Privacy-Preserving LDA Classification over Horizontally Distributed Data. IDC 2019: 65-74 - Abhishta Abhishta, Marianne Junger, Reinoud Joosten, Lambert J. M. Nieuwenhuis:
A Note on Analysing the Attacker Aims Behind DDoS Attacks. IDC 2019: 255-265 - Amelia Badica, Costin Badica, Mirjana Ivanovic, Doina Logofatu:
Exploring the Space of Block Structured Scheduling Processes Using Constraint Logic Programming. IDC 2019: 149-159 - Anastasia Balueva, Vasily Desnitsky, Igor Ushakov:
Approach to Detection of Denial-of-Sleep Attacks in Wireless Sensor Networks on the Base of Machine Learning. IDC 2019: 350-355 - Oleg V. Baranov, Nikolay V. Smirnov, Tatiana E. Smirnova, Yefim V. Zholobov:
Design of Fail-Safe Quadrocopter Configuration. IDC 2019: 13-22 - Yana A. Bekeneva, Vladimir Mochalov, Andrey Shorov:
Approach to Association and Classification Rules Visualization. IDC 2019: 541-546 - Diana Berbecaru, Antonio Lioy, Cesare Cameroni:
Authorize-then-Authenticate: Supporting Authorization Decisions Prior to Authentication in an Electronic Identity Infrastructure. IDC 2019: 313-322 - Diethelm Bienhaus, Lukas Jäger, Roland Rieke, Christoph Krauß:
Gateway for Industrial Cyber-Physical Systems with Hardware-Based Trust Anchors. IDC 2019: 521-528 - Alina V. Boiko, Nikolay V. Smirnov:
On Approaches for Solving Nonlinear Optimal Control Problems. IDC 2019: 183-188 - Alexander Branitskiy, Elena Doynikova, Igor V. Kotenko, Natalia Krasilnikova, Dmitry Levshun, Artem Tishkov, Nina Vanchakova:
The Common Approach to Determination of the Destructive Information Impacts and Negative Personal Tendencies of Young Generation Using the Neural Network Methods for the Internet Content Processing. IDC 2019: 302-310 - Maria A. Butakova, Andrey V. Chernov, Ilias K. Savvas, Georgia Garani:
Data Warehouse Design for Security Applications Using Distributed Ontology-Based Knowledge Representation. IDC 2019: 140-145 - Vincenza Carchiolo, Marco Grassia, Alessandro Longheu, Michele Malgeri, Giuseppe Mangioni:
Strategies Comparison in Link Building Problem. IDC 2019: 197-202 - Vincenza Carchiolo, Alessandro Longheu, Michele Malgeri, Giuseppe Mangioni:
Smart Topic Sharing in IoT Platform Based on a Social Inspired Broker. IDC 2019: 48-55 - Yannick Chevalier, Roland Rieke, Florian Fenzl, Andrey Chechulin, Igor V. Kotenko:
ECU-Secure: Characteristic Functions for In-Vehicle Intrusion Detection. IDC 2019: 495-504 - Vlado Delic, Dragisa Miskovic, Branislav M. Popovic, Milan Secujski, Sinisa Suzic, Tijana Delic, Niksa Jakovljevic:
Central Audio-Library of the University of Novi Sad. IDC 2019: 467-476 - Vasily Desnitsky, Nikolay Rudavin, Igor V. Kotenko:
Modeling and Evaluation of Battery Depletion Attacks on Unmanned Aerial Vehicles in Crisis Management Systems. IDC 2019: 323-332 - Samer El-Khatib, Yuri A. Skobtsov, Sergey Rodzin:
Improved Particle Swarm Medical Image Segmentation Algorithm for Decision Making. IDC 2019: 437-442 - Giancarlo Fortino, Fabrizio Messina, Domenico Rosaci, Giuseppe M. L. Sarné:
Using Blockchain for Reputation-Based Cooperation in Federated IoT Domains. IDC 2019: 3-12 - Diana Gaifulina, Andrey Chechulin:
Development of the Complex Algorithm for Web Pages Classification to Detection Inappropriate Information on the Internet. IDC 2019: 278-284 - Dmitry Gavra, Vladislav Dekalov, Ksenia Naumenko:
Digital Subjects as New Power Actors: A Critical View on Political, Media-, and Digital Spaces Intersection. IDC 2019: 233-243 - Alexander S. Geyda:
Conceptual and Formal Models of Information Technologies Use for Decisions Support in Technological Systems. IDC 2019: 423-429 - Vladimir Gorodetsky, Vladimir Larukchin, Petr Skobelev:
Conceptual Model of Digital Platform for Enterprises of Industry 5.0. IDC 2019: 35-40 - Alexander A. Grusho, Nick A. Grusho, Elena E. Timonina:
Method of Several Information Spaces for Identification of Anomalies. IDC 2019: 515-520 - Yury Iskanderov, Mikhail Pautov:
Actor-Network Approach to Self-organisation in Global Logistics Networks. IDC 2019: 117-127 - Sergey I. Ivanov, G. N. Ilin:
The Method of Fuzzy Logic and Data Mining for Monitoring Troposphere Parameters Using Ground-Based Radiometric Complex. IDC 2019: 108-114 - Ildar Kagirov, Alexey Karpov, Irina S. Kipyatkova, Konstantin Klyuzhev, Alexander Kudryavcev, Igor Kudryavcev, Dmitry Ryumin:
Lower Limbs Exoskeleton Control System Based on Intelligent Human-Machine Interface. IDC 2019: 457-466 - Oleg Karsaev, Evgeniy Minakov:
Satellite Constellation Control Based on Inter-Satellite Information Interaction. IDC 2019: 374-384 - Maad M. Khalill, Anatoly D. Khomonenko, Sergey I. Gindin:
Load Balancing Cloud Computing with Web-Interface Using Multi-channel Queuing Systems with Warming up and Cooling. IDC 2019: 385-393 - Anastasiia O. Khlobystova, Maxim V. Abramov, Alexander L. Tulupyev:
Soft Estimates for Social Engineering Attack Propagation Probabilities Depending on Interaction Rates Among Instagram Users. IDC 2019: 272-277
skipping 35 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-12-19 20:22 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint