Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 27 matches
- 2021
- Vinay Chamola, Alireza Jolfaei, Vaibhav Chanana, Prakhar Parashari, Vikas Hassija:
Information security in the post quantum era for 5G and beyond networks: Threats to existing cryptography, and post-quantum cryptography. Comput. Commun. 176: 99-118 (2021) - Naiyue Chen, Yinglong Li, Xuejun Liu, Zhenjiang Zhang:
A mutual information based federated learning framework for edge computing networks. Comput. Commun. 176: 23-30 (2021) - Gabriel Martins de Oliveira Costa, Sergio Guedes de Souza, Igor Leão dos Santos, Luci Pirmez, Claudio M. de Farias:
On a multisensor knowledge fusion heuristic for the Internet of Things. Comput. Commun. 176: 190-206 (2021) - Hanane Djeddal, Liticia Touzari, Anastasios Giovanidis, Chi-Dung Phung, Stefano Secci:
Hyperbolic K-means for traffic-aware clustering in cloud and virtualized RANs. Comput. Commun. 176: 258-271 (2021) - Saman Fouladi, Mohammad Javad Ebadi, Ali A. Safaei, Mohd Yazid Bajuri, Ali Ahmadian:
Efficient deep neural networks for classification of COVID-19 based on CT images: Virtualization via software defined radio. Comput. Commun. 176: 234-248 (2021) - Jianfeng Guan, Yinan Wu, Su Yao, Tianhong Zhang, Xiaokang Su, Chuanqing Li:
BSLA: Blockchain-assisted Secure and Lightweight Authentication for SGIN. Comput. Commun. 176: 46-55 (2021) - Bing Hu, Zhixin Sun, Jian Liu:
Distributed time synchronization algorithm based on sequential belief propagation in wireless sensor networks. Comput. Commun. 176: 119-127 (2021) - Shuhua Huang, Weiwei Liu, Guangjie Liu, Yuewei Dai, Huiwen Bai:
A correlation-based approach to detecting wireless physical covert channels. Comput. Commun. 176: 31-39 (2021) - Zhiliang Huang, Hong Ma, Shizhi Wang, Yuan Shen:
Accurate Item Recommendation Algorithm of itemrank based on tag and context information. Comput. Commun. 176: 282-289 (2021) - Arun Kumar, Sharad Sharma, Nitin Goyal, Aman Singh, Xiaochun Cheng, Parminder Singh:
Secure and energy-efficient smart building architecture with emerging technology IoT. Comput. Commun. 176: 207-217 (2021) - Xiangyang Liu, Xiangli Liu:
Asymptotically optimal link bit error probability for distributed detection in wireless sensor networks. Comput. Commun. 176: 155-162 (2021) - Qian Liu, Hao Zhang, Gaofeng Shen, Fengtong Mei:
A fast reconstruction of the parity-check matrices of LDPC codes in a noisy environment. Comput. Commun. 176: 163-172 (2021) - Han Liu, Xiaotong Zhang, Xianchao Zhang, Qimai Li, Xiao-Ming Wu:
RPC: Representative possible world based consistent clustering algorithm for uncertain data. Comput. Commun. 176: 128-137 (2021) - Dapeng Man, Qi Lu, Hanbo Wang, Jiafei Guo, Wu Yang, Jiguang Lv:
On-path caching based on content relevance in Information-Centric Networking. Comput. Commun. 176: 272-281 (2021) - Kaveh Kadkhoda Mohammadmosaferi, Hassan Naderi:
AFIF: Automatically Finding Important Features in community evolution prediction for dynamic social networks. Comput. Commun. 176: 66-80 (2021) - Ali Nauman, Muhammad Ali Jamshed, Rashid Ali, Korhan Cengiz, Zulqarnain, Sung Won Kim:
Reinforcement learning-enabled Intelligent Device-to-Device (I-D2D) communication in Narrowband Internet of Things (NB-IoT). Comput. Commun. 176: 13-22 (2021) - Ruirui Ning, Siyu Lin, Hongwei Wang, Weiyang Feng, Bin Sun, Jianwen Ding, Wenyi Jiang, Zhangdui Zhong:
Data driven interference source localization based on train real-time onboard interference monitoring. Comput. Commun. 176: 56-65 (2021) - Judith Nkechinyere Njoku, Manuel Eugenio Morocho Cayamcela, Wansu Lim:
BLER performance evaluation of an enhanced channel autoencoder. Comput. Commun. 176: 173-181 (2021) - Monica Ravishankar, Thompson Stephan, Thinagaran Perumal:
Time dependent network resource optimization in cyber-physical systems using game theory. Comput. Commun. 176: 1-12 (2021) - Marcus de Ree, Georgios Mantas, Jonathan Rodriguez, Ifiok E. Otung, Christos V. Verikoukis:
DISTANT: DIStributed Trusted Authority-based key managemeNT for beyond 5G wireless mobile small cells. Comput. Commun. 176: 218-233 (2021) - Amiya Kumar Sahu, Suraj Sharma, Mohammad Tanveer, Rohit Raja:
Internet of Things attack detection using hybrid Deep Learning Model. Comput. Commun. 176: 146-154 (2021) - Hongyu Sun, Xining Cui, Zhan Song, Feifei Gu:
Precise grabbing of overlapping objects system based on end-to-end deep neural network. Comput. Commun. 176: 138-145 (2021) - Han Wang, Xingwang Li, Rutvij H. Jhaveri, Thippa Reddy Gadekallu, Mingfu Zhu, Tariq Ahamed Ahanger, Sunder Ali Khowaja:
Sparse Bayesian learning based channel estimation in FBMC/OQAM industrial IoT networks. Comput. Commun. 176: 40-45 (2021) - Libing Wu, Rui Zhang, Ruiting Zhou, Dan Wu:
An edge computing based data detection scheme for traffic light at intersections. Comput. Commun. 176: 91-98 (2021) - Gang Yao, Zhiyuan Xu:
Trajectory tracking analysis of airborne data link antenna. Comput. Commun. 176: 182-189 (2021) - Jie Yin, Liang Guo, Wei Jiang, Sheng Hong, Jie Yang:
ShuffleNet-inspired lightweight neural network design for automatic modulation classification methods in ubiquitous IoT cyber-physical systems. Comput. Commun. 176: 249-257 (2021) - Qiang Zhang, Guojun Wang, Wenjuan Tang, Karim Alinani, Qin Liu, Xin Li:
Efficient personalized search over encrypted data for mobile edge-assisted cloud storage. Comput. Commun. 176: 81-90 (2021)
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-04 12:00 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint