Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 1,354 matches
- 2021
- Chuang Liu, Hongwei Du:
t, K-Sweep Coverage With Mobile Sensor Nodes in Wireless Sensor Networks. IEEE Internet Things J. 8(18): 13888-13899 (2021) - Peng Yang, Xing Xi, Tony Q. S. Quek, Jingxuan Chen, Xianbin Cao, Dapeng Wu:
RAN Slicing for Massive IoT and Bursty URLLC Service Multiplexing: Analysis and Optimization. IEEE Internet Things J. 8(18): 14258-14275 (2021) - Chen Wang, Rui Huang, Jian Shen, Jianwei Liu, Pandi Vijayakumar, Neeraj Kumar:
A Novel Lightweight Authentication Protocol for Emergency Vehicle Avoidance in VANETs. IEEE Internet Things J. 8(18): 14248-14257 (2021) - Mohamed Abdel-Basset, Doaa El-Shahat, Mohamed Elhoseny, Houbing Song:
Energy-Aware Metaheuristic Algorithm for Industrial-Internet-of-Things Task Scheduling Problems in Fog Computing Applications. IEEE Internet Things J. 8(16): 12638-12649 (2021) - Mohamed Abdel-Basset, Hossam Hawash, Ripon Kumar Chakrabortty, Michael J. Ryan, Mohamed Elhoseny, Houbing Song:
ST-DeepHAR: Deep Learning Model for Human Activity Recognition in IoHT Applications. IEEE Internet Things J. 8(6): 4969-4979 (2021) - Mohamed Abdel-Basset, Hossam Hawash, Ripon K. Chakrabortty, Michael J. Ryan:
Semi-Supervised Spatiotemporal Deep Learning for Intrusions Detection in IoT Networks. IEEE Internet Things J. 8(15): 12251-12265 (2021) - Mohamed Abdel-Basset, Hossam Hawash, Ripon K. Chakrabortty, Michael J. Ryan:
Energy-Net: A Deep Learning Approach for Smart Energy Management in IoT-Based Smart Cities. IEEE Internet Things J. 8(15): 12422-12435 (2021) - Alaa Awad Abdellatif, Lutfi Samara, Amr Mohamed, Aiman Erbad, Carla-Fabiana Chiasserini, Mohsen Guizani, Mark Dennis O'Connor, James Laughton:
MEdge-Chain: Leveraging Edge Computing and Blockchain for Efficient Medical Data Exchange. IEEE Internet Things J. 8(21): 15762-15775 (2021) - Karrar Hameed Abdulkareem, Mazin Abed Mohammed, Ahmad Salim, Muhammad Arif, Oana Geman, Deepak Gupta, Ashish Khanna:
Realizing an Effective COVID-19 Diagnosis System Based on Machine Learning and IoT in Smart Hospital Environment. IEEE Internet Things J. 8(21): 15919-15928 (2021) - Pramod Abichandani, Deepan Lobo, Smit Kabrawala, William McIntyre:
Secure Communication for Multiquadrotor Networks Using Ethereum Blockchain. IEEE Internet Things J. 8(3): 1783-1796 (2021) - Forough Shirin Abkenar, Komal Saifullah Khan, Abbas Jamalipour:
Smart-Cluster-Based Distributed Caching for Fog-IoT Networks. IEEE Internet Things J. 8(5): 3875-3884 (2021) - Amine Abouaomar, Soumaya Cherkaoui, Zoubeir Mlika, Abdellatif Kobbane:
Resource Provisioning in Edge Computing for Latency-Sensitive Applications. IEEE Internet Things J. 8(14): 11088-11099 (2021) - Laila Abouzaid, Essaid Sabir, Halima Elbiaze, Ahmed Errami, Othmane Benhmammouch:
The Meshing of the Sky: Delivering Ubiquitous Connectivity to Ground Internet of Things. IEEE Internet Things J. 8(5): 3743-3757 (2021) - Mohammed Abuhamad, Ahmed Abusnaina, Daehun Nyang, David Mohaisen:
Sensor-Based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Contemporary Survey. IEEE Internet Things J. 8(1): 65-84 (2021) - Ahmad Abusukhon:
Toward Achieving a Balance Between the User Satisfaction and the Power Conservation in the Internet of Things. IEEE Internet Things J. 8(14): 10998-11015 (2021) - Fjolla Ademaj, Mateusz Rzymowski, Hans-Peter Bernhard, Krzysztof Nyka, Lukasz Kulas:
Relay-Aided Wireless Sensor Network Discovery Algorithm for Dense Industrial IoT Utilizing ESPAR Antennas. IEEE Internet Things J. 8(22): 16653-16665 (2021) - Orion Afisiadis, Sitian Li, Joachim Tapparel, Andreas Burg, Alexios Balatsoukas-Stimming:
On the Advantage of Coherent LoRa Detection in the Presence of Interference. IEEE Internet Things J. 8(14): 11581-11593 (2021) - Shubhani Aggarwal, Neeraj Kumar, Sudeep Tanwar:
Blockchain-Envisioned UAV Communication Using 6G Networks: Open Issues, Use Cases, and Future Directions. IEEE Internet Things J. 8(7): 5416-5441 (2021) - Arman Ahmadian, Wonjae Shin, Hyuncheol Park:
Max-Min Throughput Optimization in FDD Multiantenna Wirelessly Powered IoT Networks. IEEE Internet Things J. 8(7): 5866-5880 (2021) - Imran Ahmed, Awais Ahmad, Gwanggil Jeon:
An IoT-Based Deep Learning Framework for Early Assessment of Covid-19. IEEE Internet Things J. 8(21): 15855-15862 (2021) - Imran Ahmed, Gwanggil Jeon, Francesco Piccialli:
A Deep-Learning-Based Smart Healthcare System for Patient's Discomfort Detection at the Edge of Internet of Things. IEEE Internet Things J. 8(13): 10318-10326 (2021) - Adnan Aijaz, Aleksandar Stanoev:
Closing the Loop: A High-Performance Connectivity Solution for Realizing Wireless Closed-Loop Control in Industrial IoT Applications. IEEE Internet Things J. 8(15): 11860-11876 (2021) - Nail Akar, Ozancan Dogan:
Discrete-Time Queueing Model of Age of Information With Multiple Information Sources. IEEE Internet Things J. 8(19): 14531-14542 (2021) - Aamir Akbar, Muhammad Ibrar, Mian Ahmad Jan, Ali Kashif Bashir, Lei Wang:
SDN-Enabled Adaptive and Reliable Communication in IoT-Fog Environment Using Machine Learning and Multiobjective Optimization. IEEE Internet Things J. 8(5): 3057-3065 (2021) - Sedat Akleylek, Meryem Soysaldi, Wai-Kong Lee, Seong Oun Hwang, Denis Chee-Keong Wong:
Novel Postquantum MQ-Based Signature Scheme for Internet of Things With Parallel Implementation. IEEE Internet Things J. 8(8): 6983-6994 (2021) - Muna Al-Hawawreh, Elena Sitnikova:
Developing a Security Testbed for Industrial Internet of Things. IEEE Internet Things J. 8(7): 5558-5573 (2021) - Osama Al-Kadi, Nour Moustafa, Benjamin P. Turnbull, Kim-Kwang Raymond Choo:
A Deep Blockchain Framework-Enabled Collaborative Intrusion Detection for Protecting IoT and Cloud Networks. IEEE Internet Things J. 8(12): 9463-9472 (2021) - Fakhrul Alam, Nathaniel Faulkner, Baden Parr:
Device-Free Localization: A Review of Non-RF Techniques for Unobtrusive Indoor Positioning. IEEE Internet Things J. 8(6): 4228-4249 (2021) - Moahd K. Alghuson, Khaled F. Abdelghany, Ahmed Hassan:
Telematics-Based Traffic Law Enforcement and Network Management System for Connected Vehicles. IEEE Internet Things J. 8(15): 12384-12397 (2021) - Muntadher Alshaikh Ali, Abbas Jamalipour:
UAV-Aided Cellular Operation by User Offloading. IEEE Internet Things J. 8(12): 9855-9864 (2021)
skipping 1,324 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-12 10:27 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint