default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 61 matches
- 2018
- Quang-Vinh Dang, Claudia-Lavinia Ignat:
Link-Sign Prediction in Dynamic Signed Directed Networks. CIC 2018: 36-45 - Muhammad Ejaz Ahmed, Surya Nepal, Hyoungshick Kim:
MEDUSA: Malware Detection Using Statistical Analysis of System's Behavior. CIC 2018: 272-278 - Lina Alfantoukh, Yefeng Ruan, Arjan Durresi:
Multi-Stakeholder Consensus Decision-Making Framework Based on Trust: A Generic Framework. CIC 2018: 472-479 - Ayesha Anzer, Mourad Elhadef:
A Multilayer Perceptron-Based Distributed Intrusion Detection System for Internet of Vehicles. CIC 2018: 438-445 - Daniele Enrico Asoni, Takayuki Sasaki, Adrian Perrig:
Alcatraz: Data Exfiltration-Resilient Corporate Network Architecture. CIC 2018: 176-187 - Gbadebo Ayoade, Swarup Chandra, Latifur Khan, Kevin W. Hamlen, Bhavani Thuraisingham:
Automated Threat Report Classification over Multi-Source Data. CIC 2018: 236-245 - Pierfrancesco Bellini, Stefano Bilotta, Daniele Cenni, Paolo Nesi, Michela Paolucci, Mirco Soderi:
Knowledge Modeling and Management for Mobility and Transport Applications. CIC 2018: 364-371 - Alina Buzachis, Giuseppe Massimo Bernava, Mario Busa, Giovanni Pioggia, Massimo Villari:
Towards the Basic Principles of Osmotic Computing: A Closed-Loop Gamified Cognitive Rehabilitation Flow Model. CIC 2018: 446-452 - Barbara Carminati, Elena Ferrari, Christian Rondanini:
Blockchain as a Platform for Secure Inter-Organizational Business Processes. CIC 2018: 122-129 - Lorenzo Carnevale, Antonino Galletta, Maria Fazio, Antonio Celesti, Massimo Villari:
Designing a FIWARE Cloud Solution for Making Your Travel Smoother: The FLIWARE Experience. CIC 2018: 392-398 - LeRoy Carr III, Anthony Newtson, James Joshi:
Towards Modernizing the Future of American Voting. CIC 2018: 130-135 - Sharmila Chackravarthy, Steven Schmitt, Li Yang:
Intelligent Crime Anomaly Detection in Smart Cities Using Deep Learning. CIC 2018: 399-404 - Dakshak Keerthi Chandra, Weerdhawal Chowgule, Yanjie Fu, Dan Lin:
RIPA: Real-Time Image Privacy Alert System. CIC 2018: 136-145 - Babu R. Dawadi, Danda B. Rawat, Shashidhar R. Joshi, Martina M. Keitsch:
Joint Cost Estimation Approach for Service Provider Legacy Network Migration to Unified Software Defined IPv6 Network. CIC 2018: 372-379 - Victorien Elvinger, Gérald Oster, François Charoy:
Prunable Authenticated Log and Authenticable Snapshot in Distributed Collaborative Systems. CIC 2018: 156-165 - Robert Engel, Shashank Rajamoni, Bryant Chen, Heiko Ludwig, Alexander Keller:
ysla: Reusable and Configurable SLAs for Large-Scale SLA Management. CIC 2018: 317-325 - Carla Cavichiolo Flores, Denis Alcides Rezende, Luisa Aguilar Lopes:
Tapping Into the Use of Social Media Applications for Harnessing the Citizens' Collective Intelligence in the Strategic Digital City. CIC 2018: 416-423 - Cristian Gadea, Bogdan Ionescu, Dan Ionescu:
New Algorithms and Methods for Collaborative Co-Editing Using HTML DOM Synchronization. CIC 2018: 217-226 - Haitham Ghalwash, Chun-Hsi Huang:
A QoS Framework for SDN-Based Networks. CIC 2018: 98-105 - Malayam Parambath Gilesh, Sanjay Satheesh, Athul Chandran, S. D. Madhu Kumar, Lillykutty Jacob:
Parallel Schedule of Live Migrations for Virtual Machine Placements. CIC 2018: 64-70 - Hadi Hajari, Hassan A. Karimi:
A Method for Large-Scale Resource Allocation in Smart Cities. CIC 2018: 412-415 - Brian Heredia, Joseph D. Prusa, Taghi M. Khoshgoftaar:
The Impact of Malicious Accounts on Political Tweet Sentiment. CIC 2018: 197-202 - Sebastian Hernandez, Nelson Baloian, José A. Pino, Xiaojun Yuan:
A Teacher Dashboard for Real-Time Intervention. CIC 2018: 227-235 - Julian Jarrett, M. Brian Blake:
Investigating Aspects of Platform Growth on Crowdsource Driven Recommendation Services. CIC 2018: 56-63 - Adya Joshi, Madan Oberoi, Ranjan Bose:
Analyzing CDR/IPDR Data to Find People Network from Encrypted Messaging Services. CIC 2018: 480-486 - Yogesh S. Kale, Samantha E. Petrie, Marwan Bikdash, Michael D. Topal:
Cold-Start User-Based Weighted Collaborative Filtering for an Implicit Recommender System for Research Facilities. CIC 2018: 466-471 - Ashish Kundu, Zehra Sura, Upendra Sharma:
Collaborative and Accountable Hardware Governance Using Blockchain. CIC 2018: 114-121 - Craig A. Lee, Zhiyi Zhang, Yukai Tu, Alexander Afanasyev, Lixia Zhang:
Supporting Virtual Organizations Using Attribute-Based Encryption in Named Data Networking. CIC 2018: 188-196 - Antonella Longo, Andrea De Matteis, Marco Zappatore:
Urban Pollution Monitoring Based on Mobile Crowd Sensing: An Osmotic Computing Approach. CIC 2018: 380-387 - Ahsan Morshed, Abdur Rahim Mohammad Forkan, Tejal Shah, Prem Prakash Jayaraman, Rajiv Ranjan, Dimitrios Georgakopoulos:
Visual Analytics Ontology-Guided I-DE System: A Case Study of Head and Neck Cancer in Australia. CIC 2018: 424-429
skipping 31 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-23 20:18 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint