default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 106 matches
- 2019
- Leonard Barolli, Nadeem Javaid, Makoto Ikeda, Makoto Takizawa:
Complex, Intelligent, and Software Intensive Systems - Proceedings of the 12th International Conference on Complex, Intelligent, and Software Intensive Systems, CISIS-2018, Matsue, Japan, 4-6 July 2018. Advances in Intelligent Systems and Computing 772, Springer 2019, ISBN 978-3-319-93658-1 [contents] - 2018
- Manzoor Ahmad, Nadeem Javaid, Iftikhar Azim Niaz, Sundas Shafiq, Obaid Ur Rehman, Hafiz Majid Hussain:
Application of Bird Swarm Algorithm for Solution of Optimal Power Flow Problems. CISIS 2018: 280-291 - Flora Amato, Beniamino Di Martino, Fiammetta Marulli, Francesco Moscato:
A Federation of Cognitive Cloud Services for Trusting Data Sources. CISIS 2018: 1022-1031 - Eiji Aoki, Shinji Otsuka, Takeshi Ikenaga, Masaaki Yatsuzuka, Kazuhiro Tokiwa:
Study on Regional Transportation Linkage System that Enables Efficient and Safe Movement Utilizing LPWA. CISIS 2018: 968-977 - Watchira Buranasing, Suronapee Phoomvuthisarn:
Information Extraction for Cultural Heritage Knowledge Acquisition Using Word Vector Representation. CISIS 2018: 419-430 - Valentina Casola, Alessandra De Benedictis, Massimiliano Rak, Umberto Villano:
A Proposal of a Cloud-Oriented Security and Performance Simulator Provided as-a-Service. CISIS 2018: 1002-1011 - ByungRae Cha, Sun Park, ByeongChun Shin, JongWon Kim:
Draft Design of Distributed Ledger Based Peer-to-Peer Business Platform. CISIS 2018: 865-872 - Fangzhou Chen, Peng Li, He Xu, Wenkang Xie:
Research on Data Storage and Processing Optimization Based on Federation HDFS and Spark. CISIS 2018: 1047-1057 - Rui Chen, Ying Tong, Jie Yang, Minghu Wu:
Residual Reconstruction Algorithm Based on Sub-pixel Multi-hypothesis Prediction for Distributed Compressive Video Sensing. CISIS 2018: 599-605 - Wenwu Chen, Su Yang, Xu An Wang, Wei Zhang, Jindan Zhang:
Network Malicious Behavior Detection Using Bidirectional LSTM. CISIS 2018: 627-635 - Bolun Chen, Yan Yuan, Yongjun Zhang, Fen-Fen Li, Qiang Yu:
Measurement and Algorithm for Overlapping Community Partitioning in Bipartite Networks. CISIS 2018: 431-439 - Bin Cong, Zhefu Wang:
Camshift Target Tracking Based on Gaussian Background Difference and Adaboost Combination. CISIS 2018: 1087-1096 - Lu Dong, Peng Li, He Xu, Cheng Yang:
Analysis of Localization Algorithms in Wireless Sensor Networks. CISIS 2018: 573-582 - Yanyu Duan, Xu An Wang, Fang Li, Jindan Zhang:
Coupling Relationship Construction of Key Elements in Emergency Intelligence with Big Data. CISIS 2018: 1069-1076 - Dilawaer Duolikun, Ryo Watanabe, Tomoya Enokido, Makoto Takizawa:
An Eco IDMMV Migration Algorithm of Dynamic Virtual Machines in a Server Cluster. CISIS 2018: 115-126 - Hiroki Egawa, Yuichiro Shibata:
Storing and Compressing Video into Neural Networks by Overfitting. CISIS 2018: 615-626 - Donald Elmazi, Miralda Cuka, Makoto Ikeda, Leonard Barolli:
A Fuzzy-Based Approach for Selection of Actor Nodes in WSANs Considering Size of Giant Component as New Parameter. CISIS 2018: 89-101 - Tomoya Enokido, Dilawaer Duolikun, Makoto Takizawa:
Energy-Efficient Process Replication by Forcing Meaningless Replicas to Terminate in Virtual Machine Environment. CISIS 2018: 149-160 - Itrat Fatima, Sakeena Javaid, Nadeem Javaid, Isra Shafi, Zunaira Nadeem, Rahim Ullah:
Region Oriented Integrated Fog and Cloud Based Environment for Efficient Resource Distribution in Smart Buildings. CISIS 2018: 749-759 - Shoma Fukuhara, Soichiro Yamasita, Shigeki Matsubara, Makoto Nakashima:
A Mechanism of Operation Monitoring for Motor-Impaired Persons in Controlling a PC Through a Mobile Touch-Type Device. CISIS 2018: 901-910 - Orazio Gambino, Antonia India, Mariangela Sciandra, Roberto Pirrone:
A PCA Interpretation of the Glasgow Coma Scale in the Trauma Brain Injury PECARN Dataset. CISIS 2018: 341-350 - Klodiana Goga, Luca Pilosu, Antonio Parodi, Martina Lagasio, Olivier Terzo:
Performance of WRF Cloud Resolving Simulations with Data Assimilation on Public Cloud and HPC Environments. CISIS 2018: 161-171 - Klodiana Goga, Fatos Xhafa, Olivier Terzo:
An Evaluation of Neural Networks Performance for Job Scheduling in a Public Cloud Environment. CISIS 2018: 760-769 - Kenta Goto, Hiroaki Nishino:
A Method of Neural Style Transfer for Images with Artistic Characters. CISIS 2018: 911-920 - Daisuke Higashi, Keiko Tanaka, Satoko Shin, Keisuke Nishijima, Ken'ichi Furuya:
Classification of Arteriovenous Fistula Stenosis Using Shunt Murmurs Analysis and Support Vector Machine. CISIS 2018: 884-892 - Yushiro Hiramoto, Satoshi Ohtake:
A Method of Hardware-Trojan Detection Using Design Verification Techniques. CISIS 2018: 978-987 - Yukihiro Ito, Shinji Sugawara:
Efficient Query Transmission Using Route Selection Records and Multiple Dynamic Network Agents. CISIS 2018: 936-947 - Taiki Izumi, Ryo Aihara, Toshiyuki Hanazawa, Yohei Okato, Takanobu Uramoto, Shingo Uenohara, Ken'ichi Furuya:
Reducing Computational Complexity of Multichannel Nonnegative Matrix Factorization Using Initial Value Setting for Speech Recognition. CISIS 2018: 893-900 - Tony Jan:
Ada-Boosted Locally Enhanced Probabilistic Neural Network for IoT Intrusion Detection. CISIS 2018: 583-589 - Nadeem Javaid:
Differential Evolution: An Updated Survey. CISIS 2018: 681-691
skipping 76 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-27 03:22 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint