Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 109 matches
- 2021
- Mohammed Al-Khafajiy, Safa Otoum, Thar Baker, Muhammad Asim, Zakaria Maamar, Moayad Aloqaily, Mark Taylor, Martin Randles:
Intelligent Control and Security of Fog Resources in Healthcare Systems via a Cognitive Fog Model. ACM Trans. Internet Techn. 21(3): 54:1-54:23 (2021) - Laha Ale, Ning Zhang, Scott A. King, Jose Guardiola:
Spatio-temporal Bayesian Learning for Mobile Edge Computing Resource Planning in Smart Cities. ACM Trans. Internet Techn. 21(3): 72:1-72:21 (2021) - Mojtaba Alizadeh, Mohammad Hesam Tadayon, Kouichi Sakurai, Hiroaki Anada, Alireza Jolfaei:
A Secure Ticket-Based Authentication Mechanism for Proxy Mobile IPv6 Networks in Volunteer Computing. ACM Trans. Internet Techn. 21(4): 82:1-82:16 (2021) - Mahmoud Barhamgi, Michael N. Huhns, Charith Perera, Pinar Yolum:
Introduction to the Special Section on Human-centered Security, Privacy, and Trust in the Internet of Things. ACM Trans. Internet Techn. 21(1): 16:1-16:3 (2021) - Vandana Bharti, Bhaskar Biswas, Kaushal Kumar Shukla:
A Novel Multiobjective GDWCN-PSO Algorithm and Its Application to Medical Data Security. ACM Trans. Internet Techn. 21(2): 46:1-46:28 (2021) - Paolo Boldi, Georgios Gousios:
Fine-Grained Network Analysis for Modern Software Ecosystems. ACM Trans. Internet Techn. 21(1): 1:1-1:14 (2021) - Yekta Said Can, Cem Ersoy:
Privacy-preserving Federated Deep Learning for Wearable IoT-based Biomedical Monitoring. ACM Trans. Internet Techn. 21(1): 21:1-21:17 (2021) - Bin Cao, Jiawei Wu, Sichao Wang, Honghao Gao, Jing Fan, Shuiguang Deng, Jianwei Yin, Xuan Liu:
Unsupervised Derivation of Keyword Summary for Short Texts. ACM Trans. Internet Techn. 21(2): 45:1-45:23 (2021) - Lucia Cascone, Aniello Castiglione, Michele Nappi, Fabio Narducci, Ignazio Passero:
Waiting for Tactile: Robotic and Virtual Experiences in the Fog. ACM Trans. Internet Techn. 21(3): 79:1-79:19 (2021) - Karam Bou Chaaya, Richard Chbeir, Mansour Naser Alraja, Philippe Arnould, Charith Perera, Mahmoud Barhamgi, Djamal Benslimane:
δ-Risk: Toward Context-aware Multi-objective Privacy Management in Connected Environments. ACM Trans. Internet Techn. 21(2): 51:1-51:31 (2021) - Shehzad Ashraf Chaudhry, Azeem Irshad, Khalid Yahya, Neeraj Kumar, Mamoun Alazab, Yousaf Bin Zikria:
Rotating behind Privacy: An Improved Lightweight Authentication Scheme for Cloud-based IoT Environment. ACM Trans. Internet Techn. 21(3): 78:1-78:19 (2021) - Yan-Chun Chen, Ren-Hung Hwang, Mu-Yen Chen, Chih-Chin Wen, Chih-Ping Hsu:
Screw Slot Quality Inspection System Based on Tactile Network. ACM Trans. Internet Techn. 21(4): 90:1-90:17 (2021) - Liang Chen, Jiaying Peng, Yang Liu, Jintang Li, Fenfang Xie, Zibin Zheng:
Phishing Scams Detection in Ethereum Transaction Network. ACM Trans. Internet Techn. 21(1): 10:1-10:16 (2021) - Min Chen, Wenjing Xiao, Long Hu, Yujun Ma, Yin Zhang, Guangming Tao:
Cognitive Wearable Robotics for Autism Perception Enhancement. ACM Trans. Internet Techn. 21(4): 97:1-97:16 (2021) - Wu Chen, Yong Yu, Keke Gai, Jiamou Liu, Kim-Kwang Raymond Choo:
Time-Efficient Ensemble Learning with Sample Exchange for Edge Computing. ACM Trans. Internet Techn. 21(3): 76:1-76:17 (2021) - Lichen Cheng, Jiqiang Liu, Yi Jin, Yidong Li, Wei Wang:
Account Guarantee Scheme: Making Anonymous Accounts Supervised in Blockchain. ACM Trans. Internet Techn. 21(1): 11:1-11:19 (2021) - Elie Chicha, Bechara al Bouna, Mohamed Nassar, Richard Chbeir, Ramzi A. Haraty, Mourad Oussalah, Djamal Benslimane, Mansour Naser Alraja:
A User-Centric Mechanism for Sequentially Releasing Graph Datasets under Blowfish Privacy. ACM Trans. Internet Techn. 21(1): 20:1-20:25 (2021) - David K. Y. Chiu, Tao Xu, Iker Gondra:
Random Graph-based Multiple Instance Learning for Structured IoT Smart City Applications. ACM Trans. Internet Techn. 21(3): 70:1-70:17 (2021) - Kim-Kwang Raymond Choo, Uttam Ghosh, Deepak K. Tosh, Reza M. Parizi, Ali Dehghantanha:
Introduction to the Special Issue on Decentralized Blockchain Applications and Infrastructures for Next Generation Cyber-Physical Systems. ACM Trans. Internet Techn. 21(2): 38e:1-38e:3 (2021) - Laizhong Cui, Zhe Xiao, Jiahao Wang, Fei Chen, Yi Pan, Hua Dai, Jing Qin:
Improving Vaccine Safety Using Blockchain. ACM Trans. Internet Techn. 21(2): 38:1-38:24 (2021) - Song Deng, Fulin Chen, Xia Dong, Guangwei Gao, Xindong Wu:
Short-term Load Forecasting by Using Improved GEP and Abnormal Load Recognition. ACM Trans. Internet Techn. 21(4): 95:1-95:28 (2021) - Shuiguang Deng, Guanjie Cheng, Hailiang Zhao, Honghao Gao, Jianwei Yin:
Incentive-Driven Computation Offloading in Blockchain-Enabled E-Commerce. ACM Trans. Internet Techn. 21(1): 9:1-9:19 (2021) - Jun Feng, Laurence T. Yang, Yuxiang Zhu, Nicholaus J. Gati, Yijun Mo:
Blockchain-enabled Tensor-based Conditional Deep Convolutional GAN for Cyber-physical-Social Systems. ACM Trans. Internet Techn. 21(2): 41:1-41:17 (2021) - Wensheng Gan, Jerry Chun-Wei Lin, Philippe Fournier-Viger, Han-Chieh Chao, Philip S. Yu:
Beyond Frequency: Utility Mining with Varied Item-specific Minimum Utility. ACM Trans. Internet Techn. 21(1): 3:1-3:32 (2021) - Honghao Gao, Wanqiu Huang, Yucong Duan:
The Cloud-edge-based Dynamic Reconfiguration to Service Workflow for Mobile Ecommerce Environments: A QoS Prediction Perspective. ACM Trans. Internet Techn. 21(1): 6:1-6:23 (2021) - Guangwei Gao, Dong Zhu, Huimin Lu, Yi Yu, Heyou Chang, Dong Yue:
Robust Facial Image Super-Resolution by Kernel Locality-Constrained Coupled-Layer Regression. ACM Trans. Internet Techn. 21(3): 67:1-67:15 (2021) - Prateek Garg, Anirudh Srinivasan Chakravarthy, Murari Mandal, Pratik Narang, Vinay Chamola, Mohsen Guizani:
ISDNet: AI-enabled Instance Segmentation of Aerial Scenes for Smart Cities. ACM Trans. Internet Techn. 21(3): 66:1-66:18 (2021) - Martin Garriga, Koen Aarns, Christos Tsigkanos, Damian A. Tamburri, Willem-Jan van den Heuvel:
DataOps for Cyber-Physical Systems Governance: The Airport Passenger Flow Case. ACM Trans. Internet Techn. 21(2): 36:1-36:25 (2021) - V. Gomathy, K. Janarthanan, Fadi Al-Turjman, R. Sitharthan, M. Rajesh, K. Vengatesan, T. Priya Reshma:
Investigating the Spread of Coronavirus Disease via Edge-AI and Air Pollution Correlation. ACM Trans. Internet Techn. 21(4): 105:1-105:10 (2021) - Zhitao Guan, Naiyu Wang, Xunfeng Fan, Xueyan Liu, Longfei Wu, Shaohua Wan:
Achieving Secure Search over Encrypted Data for e-Commerce: A Blockchain Approach. ACM Trans. Internet Techn. 21(1): 12:1-12:17 (2021)
skipping 79 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-30 16:29 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint