default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 31 matches
- 2011
- Mohammed Al-Kateb, Byung Suk Lee:
Load Shedding for Temporal Queries over Data Streams. J. Comput. Sci. Eng. 5(4): 294-304 (2011) - Ahmed Fares, Mohamed I. Sharawy, Hala Helmy Zayed:
Intrusion Detection: Supervised Machine Learning. J. Comput. Sci. Eng. 5(4): 305-313 (2011) - Hongyu Guo, Herna L. Viktor, Eric Paquet:
Privacy Disclosure and Preservation in Learning with Multi-Relational Databases. J. Comput. Sci. Eng. 5(3): 183-196 (2011) - Ling Guo, Xiaowei Ying, Xintao Wu:
Limiting Attribute Disclosure in Randomization Based Microdata Release. J. Comput. Sci. Eng. 5(3): 169-182 (2011) - Sumi Helal, Raja Bose, Chao Chen, Andy Smith, Scott de Deugd, Diane J. Cook:
STEPSTONE: An Intelligent Integration Architecture for Personal Tele-Health. J. Comput. Sci. Eng. 5(3): 269-281 (2011) - Junghwi Jeon, Chulmin Kim, Ki-seok Lee, Cheeha Kim:
Fast Retransmission Scheme for Overcoming Hidden Node Problem in IEEE 802.11 Networks. J. Comput. Sci. Eng. 5(4): 324-330 (2011) - Joon-Myung Kang, Sin-Seok Seo, James Won-Ki Hong:
Personalized Battery Lifetime Prediction for Mobile Devices based on Usage Patterns. J. Comput. Sci. Eng. 5(4): 338-345 (2011) - Krasimira Kapitanova, Yuan Wei, Woochul Kang, Sang Hyuk Son:
Applying Formal Methods to Modeling and Analysis of Real-time Data Streams. J. Comput. Sci. Eng. 5(1): 85-110 (2011) - Alexandros Karakasidis, Vassilios S. Verykios:
Secure Blocking + Secure Matching = Secure Record Linkage. J. Comput. Sci. Eng. 5(3): 223-235 (2011) - Byungjin Kim, Youngho Ahn, Ki-Seok Chung:
A Technique for Fast Process Creation Based on Creation Location. J. Comput. Sci. Eng. 5(4): 283-287 (2011) - Jung Eun Kim, Yoohwan Kim:
A Secure Credit Card Transaction Method Based on Kerberos. J. Comput. Sci. Eng. 5(1): 51-70 (2011) - Minkyong Kim, David Kotz:
Identifying Unusual Days. J. Comput. Sci. Eng. 5(1): 71-84 (2011) - Ji-Hoon Kim, Kwang-Jo Lee, Taek-Hun Kim, Sung-Bong Yang:
Effective Routing Schemes for Double-Layered Peer-to-Peer Systems in MANET. J. Comput. Sci. Eng. 5(1): 19-31 (2011) - Daehyeok Kim, Wan-Seon Lim, Young-Joo Suh:
Multicast Extension to Proxy Mobile IPv6 for Mobile Multicast Services. J. Comput. Sci. Eng. 5(4): 316-323 (2011) - Harksoo Kim, Choong-Nyoung Seon, Jungyun Seo:
Review of Korean Speech Act Classification: Machine Learning Methods. J. Comput. Sci. Eng. 5(4): 288-293 (2011) - Youngjoong Ko, Jungyun Seo:
Issues and Empirical Results for Improving Text Classification. J. Comput. Sci. Eng. 5(2): 150-160 (2011) - Minkyu Lee, Dongsoo Han:
Ubiscript: A Script Language for Ubiquitous Environment. J. Comput. Sci. Eng. 5(2): 141-149 (2011) - Yidong Li, Hong Shen:
Anonymizing Graphs Against Weight-based Attacks with Community Preservation. J. Comput. Sci. Eng. 5(3): 197-209 (2011) - Igor Milevskiy, Jin-Young Ha:
A Fast Algorithm for Korean Text Extraction and Segmentation from Subway Signboard Images Utilizing Smartphone Sensors. J. Comput. Sci. Eng. 5(3): 161-166 (2011) - Chris D. Nugent, Leo Galway, Liming Chen, Mark P. Donnelly, Sally I. McClean, Shuai Zhang, Bryan W. Scotney, Gerard Parr:
Managing Sensor Data in Ambient Assisted Living. J. Comput. Sci. Eng. 5(3): 237-245 (2011) - Carlos Ordonez, Mario Navas, Carlos Garcia-Alvarado:
Parallel Multithreaded Processing for Data Set Summarization on Multicore CPUs. J. Comput. Sci. Eng. 5(2): 111-120 (2011) - Wooram Park, Chanik Park:
Data Firewall: A TPM-based Security Framework for Protecting Data in Thick Client Mobile Environment. J. Comput. Sci. Eng. 5(4): 331-337 (2011) - Carmen C. Y. Poon, Qing Liu, Hui Gao, Wan-Hua Lin, Yuan-Ting Zhang:
Wearable Intelligent Systems for E-Health. J. Comput. Sci. Eng. 5(3): 246-256 (2011) - Gook-Pil Roh, Seung-won Hwang:
Online Clustering Algorithms for Semantic-Rich Network Trajectories. J. Comput. Sci. Eng. 5(4): 346-353 (2011) - Jungwoo Ryoo, Eun-A Park:
Internet Security Readiness: The Influence of Internet Usage Level and Awareness on Internet Security Readiness Capital, Skill, and Actual Uptake/Use of Infrastructure. J. Comput. Sci. Eng. 5(1): 33-50 (2011) - Kyung Dong Ryu, Kang-Won Lee, Jihie Kim:
Preface for KOCSEA Special Issue. J. Comput. Sci. Eng. 5(1): 32 (2011) - Spyros Sioutas, Emmanouil Magkos, Ioannis Karydis, Vassilios S. Verykios:
Uncertainty for Privacy and 2-Dimensional Range Query Distortion. J. Comput. Sci. Eng. 5(3): 210-222 (2011) - Qian Xu, Qiang Yang:
A Survey of Transfer and Multitask Learning in Bioinformatics. J. Comput. Sci. Eng. 5(3): 257-268 (2011) - Jun Yan, Wei Zhang:
Bounding Worst-Case Performance for Multi-Core Processors with Shared L2 Instruction Caches. J. Comput. Sci. Eng. 5(1): 1-18 (2011) - Jun Yan, Wei Zhang:
Computing and Reducing Transient Error Propagation in Registers. J. Comput. Sci. Eng. 5(2): 121-130 (2011)
skipping 1 more match
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-12-25 15:24 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint