default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 712 matches
- 2024
- Sami Alsaadi, Tertsegha J. Anande, Mark S. Leeson:
Comparative Analysis of 1D-CNN and 2D-CNN for Network Intrusion Detection in Software Defined Networks. EIDWT 2024: 480-491 - Phudit Ampririt, Shunya Higashi, Paboth Kraikritayakul, Ermioni Qafzezi, Keita Matsuo, Leonard Barolli:
Implementation of a Fuzzy-Based Testbed for Selection of Radio Access Technologies in 5G Wireless Networks and Its Performance Evaluation. EIDWT 2024: 318-331 - Sora Asada, Yuki Nagai, Kyohei Wakabayashi, Chihiro Yukawa, Tetsuya Oda, Leonard Barolli:
Optimization of Deer Repellent Devices Placement Based on Hill Climbing and Acoustic Ray Tracing. EIDWT 2024: 545-554 - Walter Balzano, Antonio Lanuto, Erasmo Prosciutto, Biagio Scotto di Covella:
Energy Sharing System Among Vehicles on a Vehicular Network. EIDWT 2024: 415-422 - Walter Balzano, Antonio Lanuto, Erasmo Prosciutto, Biagio Scotto di Covella:
Analysis and Development of a New Method for Defining Path Reliability in WebGIS Based on Fuzzy Logic and Dispersion Indices. EIDWT 2024: 492-501 - Admir Barolli, Shinji Sakamoto, Leonard Barolli, Makoto Takizawa:
Performance Evaluation of BLX-α Crossover Method for Different Instances of WMNs Considering FC-RDVM Router Replacement Method and Subway Distribution of Mesh Clients. EIDWT 2024: 343-352 - Mario Alessandro Bochicchio, Eleonora Miccoli:
XR Theater: An Experience. EIDWT 2024: 639-648 - Dario Branco, Antonio Coppa, Salvatore D'Angelo, Stefania Quilici Gigli, Giuseppina Renda, Salvatore Venticinque:
Advanced IT Technologies Applied to Archaeological Park of Norba (Latium, Italy). EIDWT 2024: 629-638 - Luigi Colucci Cante, Beniamino Di Martino, Mariangela Graziano, Dario Branco, Gennaro Junior Pezzullo:
Automated Storytelling Technologies for Cultural Heritage. EIDWT 2024: 597-606 - Elena Cardillo, Alessio Portaro, Maria Taverniti, Claudia Lanza, Raffaele Guarasci:
Towards the Automated Population of Thesauri Using BERT: A Use Case on the Cybersecurity Domain. EIDWT 2024: 100-109 - Ziyang Chen, Baojiang Cui, Zishuai Cheng:
4G Access Network Protection and Compliance Detection Based on Man-in-the-Middle Model. EIDWT 2024: 404-414 - Peixin Cong, Baojiang Cui:
Real-Time Detection of Network Exploration Behavior: A Method Based on Feature Extraction and Half-Space Trees Algorithm. EIDWT 2024: 555-566 - Dennis R. dela Cruz, Dyan G. Rodriguez, Hazel A. Caparas:
Usability and Effectiveness of a Developed IoT-Based Smart Beverage Dispenser. EIDWT 2024: 273-284 - Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa:
An Algorithm to Change the TBFC Model to Reduce the Energy Consumption of the IoT. EIDWT 2024: 285-296 - Antonino Ferraro, Antonio Galli, Valerio La Gatta, Mario Minocchi, Vincenzo Moscato, Marco Postiglione:
Few Shot NER on Augmented Unstructured Text from Cardiology Records. EIDWT 2024: 1-12 - Yusuke Gotoh, Ryusei Tsunetomo, Kiki Adhinugraha:
Proposal of Indoor AR Navigation System Using SLAM for Location Search. EIDWT 2024: 423-434 - Raffaele Guarasci, Stefano Silvestri, Massimo Esposito:
Probing Cross-lingual Transfer of XLM Multi-language Model. EIDWT 2024: 219-228 - Qing Guo, Wenchuan Yang, Baojiang Cui:
Graph-Based Detection of Encrypted Malicious Traffic with Spatio-Temporal Features. EIDWT 2024: 75-86 - Alba Haveriku, Hakik Paci, Nelda Kote, Elinda Kajo Meçe:
Systematic Review of Eye-Tracking Studies. EIDWT 2024: 251-260 - Shunya Higashi, Phudit Ampririt, Ermioni Qafzezi, Makoto Ikeda, Keita Matsuo, Leonard Barolli:
Implementation of a Fuzzy-Based System for Assessment of Logical Trust Considering Reliability as a New Parameter. EIDWT 2024: 43-52 - Ting Hu, Fang Deng, Zhiqiang Chu:
TPLUG: An Efficient Framework Through Token Pair Linking and Undirected Graph for Chinese Event Extraction. EIDWT 2024: 261-272 - Zhen-zhen Li:
Star Point Target Extraction with High Noise Background Based on Morphology. EIDWT 2024: 567-574 - Rui Liu, Baojiang Cui, Chen Chen, Jinxin Ma:
XRLFuzz: Fuzzing Binaries Guided by Format Information Based on Deep Reinforcement Learning. EIDWT 2024: 307-317 - Huipeng Liu, Baojiang Cui, Jie Xu, Lihua Niu:
An Efficient Cross-Contract Vulnerability Detection Model Integrating Machine Learning and Fuzz Testing. EIDWT 2024: 297-306 - Yifan Luo, Baojiang Cui:
Rev Gadget: A Java Deserialization Gadget Chains Discover Tool Based on Reverse Semantics and Taint Analysis. EIDWT 2024: 229-240 - Wenxing Ma, Baojiang Cui:
Fuzzing IoT Devices via Android App Interfaces with Large Language Model. EIDWT 2024: 87-99 - Menglin Ma, Baojiang Cui:
Research and Implementation of TFTP Encrypted Traffic Analysis and Attack Technology Based on 4G Man-in-the-Middle. EIDWT 2024: 394-403 - Beniamino Di Martino, Gennaro Junior Pezzullo, Emanuela Grassia:
Support for Automated Story Telling Using Natural Language Processing Techniques Aimed at Recognizing Narrative Elements. EIDWT 2024: 607-616 - Michele Mastroianni, Massimo Ficco, Francesco Palmieri, Vincenzo Emanuele Martone:
Monitoring Power Usage Effectiveness to Detect Cooling Systems Attacks and Failures in Cloud Data Centers. EIDWT 2024: 173-184 - Tomoaki Matsui, Tetsuya Oda, Kyohei Wakabayashi, Yuki Nagai, Chihiro Yukawa, Leonard Barolli:
An Accident Detection System for Private Lavatories Using Fuzzy Control and Thermal Camera. EIDWT 2024: 452-459
skipping 682 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-21 08:05 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint