default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 651 matches
- 2024
- Maryna Waszak, Terje Moen, Anders H. Hansen, Gregory Bouquet, Antoine Pultier, Xiang Ma, Dumitru Roman:
Vibration Sensors for Detecting Critical Events: A Case Study in Ferrosilicon Production. IEEE Access 12: 12465-12477 (2024) - Luisa Peterson, Jens Bremer, Kai Sundmacher:
Challenges in data-based reactor modeling: A critical analysis of purely data-driven and hybrid models for a CSTR case study. Comput. Chem. Eng. 184: 108643 (2024) - Xiao Yang, Ramesh Bahadur Bist, Bidur Paneru, Tianming Liu, Todd Applegate, Casey Ritz, Woo Kim, Prafulla Regmi, Lilong Chai:
Computer Vision-Based cybernetics systems for promoting modern poultry Farming: A critical review. Comput. Electron. Agric. 225: 109339 (2024) - Pinghui Xiao:
The rise of livestreaming e-commerce in China and challenges for regulation: A critical examination of a landmark case occurring during COVID-19 pandemic. Comput. Law Secur. Rev. 52: 105955 (2024) - Hanxiao Wanyan, Yingxu Lai, Jing Liu, Hao Chen:
NCMFuzzer: Using non-critical field mutation and test case combination to improve the efficiency of ICS protocol fuzzing. Comput. Secur. 141: 103811 (2024) - Mengbin Ye, Brian D. O. Anderson:
Rate of Convergence to the Disease Free Equilibrium for Multi-Population SIS Networks in the Critical Case. IEEE Control. Syst. Lett. 8: 436-441 (2024) - Debas Senshaw, Hossana Twinomurinzi:
Critical path-dependencies affecting digital government innovation in low-income countries: a case study from Woredas in Ethiopia. Electron. Gov. an Int. J. 20(1): 1-19 (2024) - Monika Rani Golla, Sangharatna Godboley:
Automated SC-MCC Test Case Generation using Bounded Model Checking for Safety-Critical Applications. Expert Syst. Appl. 238(Part F): 122033 (2024) - Daniela Enciu, Andrei Halanay, Adrian Toader, Ioan Ursu:
Lyapunov-Malkin type approach of equilibrium stability in a critical case applied to a switched model of a servomechanism with state delay. Int. J. Control 97(3): 520-531 (2024) - Prasetyo Adi Wibowo Putro, Dana Indra Sensuse, Wahyu Setiawan Setiawan Wibowo:
Framework for critical information infrastructure protection in smart government: a case study in Indonesia. Inf. Comput. Secur. 32(1): 112-129 (2024) - Arthur Perodou, Christophe Combastel, Ali Zolghadri:
Critical-time metric for risk analysis against sharp input anomalies: Computation and application case study. J. Frankl. Inst. 361(7): 106756 (2024) - Marcello Cinque, Luigi De Simone, Daniele Ottaviano:
Temporal isolation assessment in virtualized safety-critical mixed-criticality systems: A case study on Xen hypervisor. J. Syst. Softw. 216: 112147 (2024) - Ran Wei, Simon Foster, Haitao Mei, Fang Yan, Ruizhe Yang, Ibrahim Habli, Colin O'Halloran, Nick Tudor, Tim Kelly, Yakoub Nemouchi:
ACCESS: Assurance Case Centric Engineering of Safety-critical Systems. J. Syst. Softw. 213: 112034 (2024) - Mohd Effendi Amran, Sa'ardin Abdul Aziz, Mohd Nabil Muhtazaruddin, Maslin Masrom, Habibah Norehan Haron, Nurul Aini Bani, Mohd Azri Mohd Izhar, Sahnius Usman, Shamsul Sarip, Siti Sara Najamudin, Aizat Hilmi Zamzam, Ahmad Safwan Ahmad Kamil, Nurul Farhana Azilah, Firdaus Muhammad-Sukki:
Critical assessment of medical devices on reliability, replacement prioritization and maintenance strategy criterion: Case study of Malaysian hospitals. Qual. Reliab. Eng. Int. 40(2): 970-1001 (2024) - Daniyar Kurmankhojayev, Guoyuan Li, Anthony Chen:
Link criticality index: Refinement, framework extension, and a case study. Reliab. Eng. Syst. Saf. 243: 109889 (2024) - Louis Garénaux:
Nonlinear Convective Stability of a Critical Pulled Front Undergoing a Turing Bifurcation at Its Back: A Case Study. SIAM J. Math. Anal. 56(3): 3275-3325 (2024) - Hamidreza Karimi, Hadi Sarvari, David J. Edwards, Daniel W. M. Chan, Timothy O. Olawumi:
Deploying Bottleneck Management Strategies for Ameliorating Critical Delays in Building Construction Projects: A Case for Developing Country of Iran. Syst. 12(6): 195 (2024) - Zheyu Yan, Xiaobo Sharon Hu, Yiyu Shi:
Compute-in-Memory-Based Neural Network Accelerators for Safety-Critical Systems: Worst-Case Scenarios and Protections. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 43(8): 2452-2464 (2024) - Shyam Krishna Khadka, Suzan Bayhan, Ralph Holz, Cristian Hesselman:
Assessing the security of Internet paths: A case study of Dutch critical infrastructures. ANRW 2024 - Matteo Esposito, Francesco Palagiano:
Leveraging Large Language Models for Preliminary Security Risk Analysis: A Mission-Critical Case Study. EASE 2024: 442-445 - David Antonio Buentello-Montoya, Luis-Manuel Rico-Gutierrez, Brenda Ivette Garcia-Maya, Luis-Eduardo Garcia-Amezquita:
Science and Technology Lectures to Develop Critical Thinking: A Case Study in Higher Education. EDUCON 2024: 1-5 - Elena Mäkiö, Juho Mäkiö:
T-CHAT Educational Approach to Teaching Critical Thinking based on use Cases in Software Engineering. EDUCON 2024: 1-7 - Karolina Bejussova, Silvia Lips, Rozha K. Ahmed, Dirk Draheim:
Assessment of the eID Ecosystem as a Part of the State's Critical Infrastructure: The Case of Estonia. EGOVIS 2024: 88-102 - Ivan Maric, Aida Avdic, Boris Avdic:
Derivation of Critical Infrastructure Accessibility Index Using GIS-MCDA and Network Analysis: Case Study of Sarajevo. GISTAM 2024: 15-25 - Mingze Xia, Sheng Di, Franck Cappello, Pu Jiao, Kai Zhao, Jinyang Liu, Xuan Wu, Xin Liang, Hanqi Guo:
Preserving Topological Feature with Sign-of-Determinant Predicates in Lossy Compression: A Case Study of Vector Field Critical Points. ICDE 2024: 4979-4992 - Laura Farinetti, Lorenzo Canale:
Chatbot Development Using LangChain: A Case Study to Foster Critical Thinking and Creativity. ITiCSE (1) 2024 - Zhengmin Jiang, Jia Liu, Ming Sang, Huiyun Li, Yi Pan:
Critical Test Cases Generalization for Autonomous Driving Object Detection Algorithms. IV 2024: 1149-1156 - Ran Wei, Simon Foster, Haitao Mei, Fang Yan, Ruizhe Yang, Ibrahim Habli, Colin O'Halloran, Nick Tudor, Tim Kelly:
ACCESS: Assurance Case Centric Engineering of Safety-critical Systems. CoRR abs/2403.15236 (2024) - Matteo Esposito, Francesco Palagiano:
Leveraging Large Language Models for Preliminary Security Risk Analysis: A Mission-Critical Case Study. CoRR abs/2403.15756 (2024) - Andre Ye, Jared Moore, Rose Novick, Amy X. Zhang:
Language Models as Critical Thinking Tools: A Case Study of Philosophers. CoRR abs/2404.04516 (2024)
skipping 621 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-22 19:14 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint