default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 26 matches
- 2019
- Mari Abe, Gaku Yamamoto, Sanehiro Furuichi, Kazuhito Akiyama:
Automated Detection of Rule Conflicts for Enterprise IoT. ICIOT 2019: 9-16 - Md. Zulfikar Alom, Barbara Carminati, Elena Ferrari:
Adapting Users' Privacy Preferences in Smart Environments. ICIOT 2019: 165-172 - Poojitha Amin, Ludmila Cherkasova, Rob Aitken, Vikas Kache:
Automating Energy Demand Modeling and Forecasting Using Smart Meter Data. ICIOT 2019: 133-137 - Ilse Bohé, Michiel Willocx, Vincent Naessens:
An Extensible Approach for Integrating Health and Activity Wearables in Mobile IoT Apps. ICIOT 2019: 69-75 - Sara Bonfitto, Fatima Hachem, Elefelious Getachew Belay, Stefano Valtolina, Marco Mesiti:
On the Bulk Ingestion of IoT Devices from Heterogeneous IoT Brokers. ICIOT 2019: 189-195 - Anas Dawod, Dimitrios Georgakopoulos, Prem Prakash Jayaraman, Ampalavanapillai Nirmalathas:
Advancements towards Global IoT Device Discovery and Integration. ICIOT 2019: 147-155 - Luca Ferretti, Francesco Longo, Michele Colajanni, Giovanni Merlino, Nachiket Tapas:
Authorization Transparency for Accountable Access to IoT Services. ICIOT 2019: 91-99 - Zhipeng Gao, Wensi Zhao, Chenxi Xia, Kaile Xiao, Zijia Mo, Qian Wang, Yang Yang:
A Credible and Lightweight Multidimensional Trust Evaluation Mechanism for Service-Oriented IoT Edge Computing Environment. ICIOT 2019: 156-164 - Nevena Golubovic, Rich Wolski, Chandra Krintz, Markus Mock:
Improving the Accuracy of Outdoor Temperature Prediction by IoT Devices. ICIOT 2019: 117-124 - Christos Kotronis, Ioannis Routis, Anargyros Tsadimas, Mara Nikolaidou, Dimosthenis Anagnostopoulos:
A Model-Based Approach for the Design of Cyber-Physical Human Systems Emphasizing Human Concerns. ICIOT 2019: 100-107 - Goo Yeon Lee, Kyung Jin Cha, Hwa Jong Kim:
Designing the GDPR Compliant Consent Procedure for Personal Information Collection in the IoT Environment. ICIOT 2019: 79-81 - Wanxin Li, Mark M. Nejad, Rui Zhang:
A Blockchain-Based Architecture for Traffic Signal Control Systems. ICIOT 2019: 33-40 - Jia Xin Low, Yongmei Wei, Joshua Chow, Iskandar F. B. Ali:
ActSen - AI-Enabled Real-Time IoT-Based Ergonomic Risk Assessment System. ICIOT 2019: 76-78 - Minhu Lyu, Frédérique Biennier, Parisa Ghodous:
Control as a Service Architecture to Support Cloud-Based and Event-Driven Control Application Development. ICIOT 2019: 41-49 - Weibin Ma, Xuanzhang Liu, Lena Mashayekhy:
A Strategic Game for Task Offloading among Capacitated UAV-Mounted Cloudlets. ICIOT 2019: 61-68 - Ricardo Manzano, Abdurhman Albasir, Kshirasagar Naik, Jim Kozlowski, Nishith Goel:
Detection of Anomalous Behavior in Wireless Devices Using Changepoint Analysis. ICIOT 2019: 82-90 - Phu Hong Nguyen, Nicolas Ferry, Gencer Erdogan, Hui Song, Stéphane Lavirotte, Jean-Yves Tigli, Arnor Solberg:
Advances in Deployment and Orchestration Approaches for IoT - A Systematic Review. ICIOT 2019: 53-60 - Behnam Ousat, Majid Ghaderi:
LoRa Network Planning: Gateway Placement and Device Configuration. ICIOT 2019: 25-32 - Josh Payne, Karan K. Budhraja, Ashish Kundu:
How Secure Is Your IoT Network? ICIOT 2019: 181-188 - Christian Rondanini, Barbara Carminati, Elena Ferrari:
Confidential Discovery of IoT Devices through Blockchain. ICIOT 2019: 1-8 - Ljubisa Sehovac, Cornelius Nesen, Katarina Grolinger:
Forecasting Building Energy Consumption with Deep Learning: A Sequence to Sequence Approach. ICIOT 2019: 108-116 - Eunil Seo, Hyoungshick Kim, Tai-Myoung Chung:
Profiling-Based Classification Algorithms for Security Applications in Internet of Things. ICIOT 2019: 138-146 - Dharmashankar Subramanian, Pavankumar Murali, Nianjun Zhou, Xiang Ma, Giovane Cesar Da Silva, Raju Pavuluri, Jayant Kalagnanam:
A Prediction-Optimization Framework for Site-Wide Process Optimization. ICIOT 2019: 125-132 - Enriquillo Valdez, Dimitrios Pendarakis, Hani Jamjoom:
How to Discover IoT Devices When Network Traffic Is Encrypted. ICIOT 2019: 17-24 - Junia Valente, Keerthi Koneru, Alvaro A. Cárdenas:
Privacy and Security in Internet-Connected Cameras. ICIOT 2019: 173-180 - Elisa Bertino, Carl K. Chang, Peter Chen, Ernesto Damiani, Michael Goul, Katsunori Oyama:
2019 IEEE International Congress on Internet of Things, ICIOT 2019, Milan, Italy, July 8-13, 2019. IEEE 2019, ISBN 978-1-7281-2714-9 [contents]
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-13 03:38 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint