Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 766 matches
- 2024
- Yi-Cheng Chen, Wang-Chien Lee:
A Novel Cross-Domain Recommendation with Evolution Learning. ACM Trans. Internet Techn. 24(1): 6:1-6:23 (2024) - Chao Dong, Fang Wang, Dan Feng:
DxHash: A Memory-saving Consistent Hashing Algorithm. ACM Trans. Internet Techn. 24(1): 3:1-3:22 (2024) - Bofeng Pan, Natalia Stakhanova, Zhongwen Zhu:
EtherShield: Time-interval Analysis for Detection of Malicious Behavior on Ethereum. ACM Trans. Internet Techn. 24(1): 2:1-2:30 (2024) - Anuj Sachan, Neetesh Kumar:
SDN-enabled Quantized LQR for Smart Traffic Light Controller to Optimize Congestion. ACM Trans. Internet Techn. 24(1): 7:1-7:25 (2024) - Zhiyi Song, Dipankar Chaki, Abdallah Lakhdari, Athman Bouguettaya:
Positional Encoding-based Resident Identification in Multi-resident Smart Homes. ACM Trans. Internet Techn. 24(1): 1:1-1:27 (2024) - Jiashu Wu, Hao Dai, Kenneth B. Kent, Jerome Yen, Cheng-Zhong Xu, Yang Wang:
Open Set Dandelion Network for IoT Intrusion Detection. ACM Trans. Internet Techn. 24(1): 4:1-4:26 (2024) - Xuezheng Yang, Zhiwen Zeng, Anfeng Liu, Neal N. Xiong, Shaobo Zhang:
ADTO: A Trust Active Detecting-based Task Offloading Scheme in Edge Computing for Internet of Things. ACM Trans. Internet Techn. 24(1): 5:1-5:25 (2024) - 2023
- Pedro Victor Borges, Chantal Taconet, Sophie Chabridon, Denis Conan, Everton Cavalcante, Thaís Batista:
Taming Internet of Things Application Development with the IoTvar Middleware. ACM Trans. Internet Techn. 23(2): 29:1-29:21 (2023) - Li Yang, Xi Li, Zhuoru Ma, Lu Li, Neal N. Xiong, Jianfeng Ma:
IRGA: An Intelligent Implicit Real-time Gait Authentication System in Heterogeneous Complex Scenarios. ACM Trans. Internet Techn. 23(2): 35:1-35:29 (2023) - Usman Ahmed, Jerry Chun-Wei Lin, Gautam Srivastava:
Exploring the Potential of Cyber Manufacturing System in the Digital Age. ACM Trans. Internet Techn. 23(4): 54:1-54:38 (2023) - Amjad Alsirhani, Muhammad Ali Khan, Abdullah Alomari, Sauda Maryam, Aiman Younas, Muddesar Iqbal, Muhammad Hameed Siqqidi, Amjad Ali:
Securing Low-Power Blockchain-enabled IoT Devices against Energy Depletion Attack. ACM Trans. Internet Techn. 23(3): 43:1-43:17 (2023) - Luigi Asprino, Enrico Daga, Aldo Gangemi, Paul Mulholland:
Knowledge Graph Construction with a Façade: A Unified Method to Access Heterogeneous Data Sources on the Web. ACM Trans. Internet Techn. 23(1): 6:1-6:31 (2023) - Gonul Ayci, Murat Sensoy, Arzucan Özgür, Pinar Yolum:
Uncertainty-Aware Personal Assistant for Making Personalized Privacy Decisions. ACM Trans. Internet Techn. 23(1): 13:1-13:24 (2023) - Mohammed Bahutair, Athman Bouguettaya:
An End-to-end Trust Management Framework for Crowdsourced IoT Services. ACM Trans. Internet Techn. 23(3): 46:1-46:32 (2023) - Gregorius Satia Budhi, Raymond Chiong:
A Multi-type Classifier Ensemble for Detecting Fake Reviews Through Textual-based Feature Extraction. ACM Trans. Internet Techn. 23(1): 16:1-16:24 (2023) - Loredana Caruccio, Gaetano Cimino, Stefano Cirillo, Domenico Desiato, Giuseppe Polese, Genoveffa Tortora:
Malicious Account Identification in Social Network Platforms. ACM Trans. Internet Techn. 23(4): 57:1-57:25 (2023) - Hossein Chegini, Fernando Beltran, Aniket Mahanti:
Designing and Developing a Weed Detection Model for California Thistle. ACM Trans. Internet Techn. 23(3): 48:1-48:29 (2023) - Keke Chen, Yuechun Gu, Sagar Sharma:
DisguisedNets: Secure Image Outsourcing for Confidential Model Training in Clouds. ACM Trans. Internet Techn. 23(3): 47:1-47:26 (2023) - Jing Chen, Wenjun Jiang, Jie Wu, Kenli Li, Keqin Li:
Dynamic Personalized POI Sequence Recommendation with Fine-Grained Contexts. ACM Trans. Internet Techn. 23(2): 32:1-32:28 (2023) - Mu-Yen Chen, Yi-Wei Lai, Jiunn-Woei Lian:
Using Deep Learning Models to Detect Fake News about COVID-19. ACM Trans. Internet Techn. 23(2): 25:1-25:23 (2023) - Yuanjun Dai, An Wang, Yang Guo, Songqing Chen:
Elastically Augmenting the Control-path Throughput in SDN to Deal with Internet DDoS Attacks. ACM Trans. Internet Techn. 23(1): 9:1-9:25 (2023) - Lizhen Deng, Guoxia Xu, Jiaqi Pi, Hu Zhu, Xiaokang Zhou:
Unpaired Self-supervised Learning for Industrial Cyber-Manufacturing Spectrum Blind Deconvolution. ACM Trans. Internet Techn. 23(4): 52:1-52:18 (2023) - Yucheng Dong, Qin Ran, Xiangrui Chao, Congcong Li, Shui Yu:
Personalized Individual Semantics Learning to Support a Large-Scale Linguistic Consensus Process. ACM Trans. Internet Techn. 23(2): 26:1-26:27 (2023) - Weiwei Fang, Wenyuan Xu, Chongchong Yu, Neal N. Xiong:
Joint Architecture Design and Workload Partitioning for DNN Inference on Industrial IoT Clusters. ACM Trans. Internet Techn. 23(1): 7:1-7:21 (2023) - Romain Fouquet, Pierre Laperdrix, Romain Rouvoy:
Breaking Bad: Quantifying the Addiction of Web Elements to JavaScript. ACM Trans. Internet Techn. 23(1): 22:1-22:28 (2023) - Xiuwen Fu, Pasquale Pace, Gianluca Aloi, Antonio Guerrieri, Wenfeng Li, Giancarlo Fortino:
Tolerance Analysis of Cyber-Manufacturing Systems to Cascading Failures. ACM Trans. Internet Techn. 23(4): 50:1-50:23 (2023) - Keke Gai, Yufeng She, Liehuang Zhu, Kim-Kwang Raymond Choo, Zhiguo Wan:
A Blockchain-Based Access Control Scheme for Zero Trust Cross-Organizational Data Sharing. ACM Trans. Internet Techn. 23(3): 38:1-38:25 (2023) - Arvind Kumar Gangwar, Sandeep Kumar:
Concept Drift in Software Defect Prediction: A Method for Detecting and Handling the Drift. ACM Trans. Internet Techn. 23(2): 31:1-31:28 (2023) - Luca Gioacchini, Luca Vassio, Marco Mellia, Idilio Drago, Zied Ben-Houidi, Dario Rossi:
i-DarkVec: Incremental Embeddings for Darknet Traffic Analysis. ACM Trans. Internet Techn. 23(3): 45:1-45:28 (2023) - Jianwei Hao, Piyush Subedi, Lakshmish Ramaswamy, In Kee Kim:
Reaching for the Sky: Maximizing Deep Learning Inference Throughput on Edge Devices with AI Multi-Tenancy. ACM Trans. Internet Techn. 23(1): 2:1-2:33 (2023)
skipping 736 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-24 12:07 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint