default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 54 matches
- 2017
- Johannes Klein, Jean Botev, Steffen Rothkugel:
Concurrent Command and Consistency Management for Distributed Compound Document Authoring. CIC 2017: 34-40 - Nuray Baltaci Akhuseyinoglu, James Joshi:
A Risk-Aware Access Control Framework for Cyber-Physical Systems. CIC 2017: 349-358 - Manar Alohaly, Hassan Takabi:
When Do Changes Induce Software Vulnerabilities? CIC 2017: 59-66 - Yasmeen Alufaisan, Yan Zhou, Murat Kantarcioglu, Bhavani Thuraisingham:
From Myths to Norms: Demystifying Data Mining Models with Instance-Based Transparency. CIC 2017: 257-266 - Icaro Alzuru, Andréa M. Matsunaga, Maurício O. Tsugawa, José A. B. Fortes:
Task Design and Crowd Sentiment in Biocollections Information Extraction. CIC 2017: 389-398 - Laura C. Anderson, Cheryl A. Kieliszewski:
A Socio-Technical Perspective in Support of Information Sharing for Diverse Teams in Today's Workplace. CIC 2017: 416-420 - Rafael Angarita, Nikolaos Georgantas, Valérie Issarny:
USNB: Enabling Universal Online Social Interactions. CIC 2017: 309-318 - Tasnia Heya Ashrafi, Md. Arshad Hossain, Sayed Erfan Arefin, Kowshik Dipta Jay Das, Amitabha Chakrabarty:
Service Based FOG Computing Model for IoT. CIC 2017: 163-172 - Smriti Bhatt, Farhan Patwa, Ravi S. Sandhu:
An Access Control Framework for Cloud-Enabled Wearable Internet of Things. CIC 2017: 328-338 - Sriramulu Bojjagani, V. N. Sastry:
VAPTAi: A Threat Model for Vulnerability Assessment and Penetration Testing of Android and iOS Mobile Banking Apps. CIC 2017: 77-86 - Priya Chandran, Lakshya Garg, Aditya Kumar:
Multikernel Simulation: A New Approach to Study Rollback Sensitive Memory Architecture. CIC 2017: 437-442 - Anshuman Chhabra, Shivam Arora:
An Elliptic Curve Cryptography Based Encryption Scheme for Securing the Cloud against Eavesdropping Attacks. CIC 2017: 243-246 - Hsien-Ming Chou, Dongsong Zhang, Lina Zhou, Yin Kang:
CaCM: Context-Aware Call Management for Mobile Phones. CIC 2017: 399-405 - Quang-Vinh Dang, Claudia-Lavinia Ignat:
dTrust: A Simple Deep Learning Approach for Social Recommendation. CIC 2017: 209-218 - Prajit Kumar Das, Anupam Joshi, Tim Finin:
Personalizing Context-Aware Access Control on Mobile Platforms. CIC 2017: 107-116 - Saptarshi Das, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
Policy Adaptation in Attribute-Based Access Control for Inter-Organizational Collaboration. CIC 2017: 136-145 - Naktal Moaid Edan, Ali Al-Sherbaz, Scott J. Turner:
WebNSM: A Novel Scalable WebRTC Signalling Mechanism for Many-to-Many Video Conferencing. CIC 2017: 27-33 - João Eduardo Ferreira, Pedro Losco Takecian, Leonardo Tadashi Kamaura, Bruno Padilha, Calton Pu:
Dependency Management with WED-flow Techniques and Tools: A Case Study. CIC 2017: 379-388 - Antonino Galletta, Oliver Ardo, Antonio Celesti, Peter Kissa, Massimo Villari:
A Recommendation-Based Approach for Cloud Service Brokerage: A Case Study in Public Administration. CIC 2017: 227-234 - Zachariah Pabi Gariba, John Andrew van der Poll:
Security Failure Trends of Cloud Computing. CIC 2017: 247-256 - Brian Heredia, Joseph D. Prusa, Taghi M. Khoshgoftaar:
Exploring the Effectiveness of Twitter at Polling the United States 2016 Presidential Election. CIC 2017: 283-290 - Qixuan Hou, Aibek Musaev, Yang Yang, Calton Pu:
A Comparative Study of Increasing Automation in the Integration of Multilingual Social Media Information. CIC 2017: 319-327 - Leila Karimi, James Joshi:
Multi-Owner Multi-Stakeholder Access Control Model for a Healthcare Environment. CIC 2017: 359-368 - Maryam Karimi, Mohammad Sadegh Najafi, Reza Akbari, Manijeh Keshtgari:
Presenting a New Method, Using Topology Virtualization for Stabilizing Flow Tables in SDWN. CIC 2017: 219-226 - David Kauffmann, Golan Carmi:
A Comparative Study of E-Collaboration on Temporary vs. Ongoing Teams. CIC 2017: 11-19 - Takehiro Kitao, Masato Shirai, Takao Miura:
Model Selection Based on Kalman Temporal Differences Learning. CIC 2017: 41-47 - Ahmed Ktob, Zhoujun Li, Djelloul Bouchiha:
Extracting Linked Data from HTML Tables. CIC 2017: 48-53 - Josephine Lamp, Carlos E. Rubio-Medrano, Ziming Zhao, Gail-Joon Ahn:
OntoEDS: Protecting Energy Delivery Systems by Collaboratively Analyzing Security Requirements. CIC 2017: 1-10 - Ojus Thomas Lee, G. J. Akash, S. D. Madhu Kumar, Priya Chandran:
A Method for Storage Node Allocation in Erasure Code Based Storage Systems. CIC 2017: 449-454 - Ang Li, Qinghua Li, Vincent C. Hu:
Access Control for Distributed Processing Systems: Use Cases and General Considerations. CIC 2017: 117-125
skipping 24 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-04 21:04 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint