Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
Likely matches
- Annual ACM Conference on Computer and Communications Security (CCS)
- ACM SIGCOMM Conference (SIGCOMM)
- International Conference on Information and Knowledge Management (CIKM)
also: International CIKM Workshop on Cloud Data Management (CloudDb @ CIKM) - IEEE International Conference on Distributed Computing Systems (ICDCS)
- OnTheMove Federated Conferences & Workshops (OTM)
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 12,594 matches
- 2024
- Mohammad A. Altahat, Tariq Daradkeh, Anjali Agarwal:
Optimized Encryption-Integrated Strategy for Containers Scheduling and Secure Migration in Multi-Cloud Data Centers. IEEE Access 12: 51330-51345 (2024) - Somchart Fugkeaw, Lyhour Hak, Thanaruk Theeramunkong:
Achieving Secure, Verifiable, and Efficient Boolean Keyword Searchable Encryption for Cloud Data Warehouse. IEEE Access 12: 49848-49864 (2024) - Abdel Ali Harchaoui, Ali Younes, Abdelaaziz El Hibaoui, Ahmed Bendahmane:
PoEDDP-A Fast RSA-Based Proof of Possession Accumulator of Dynamic Data on the Cloud. IEEE Access 12: 52878-52901 (2024) - Sivakumar Ponnusamy, Pankaj Gupta:
Scalable Data Partitioning Techniques for Distributed Data Processing in Cloud Environments: A Review. IEEE Access 12: 26735-26746 (2024) - Mohammed Y. Shakor, Mustafa Ibrahim Khaleel, Mejdl S. Safran, Sultan Alfarhood, Michelle Zhu:
Dynamic AES Encryption and Blockchain Key Management: A Novel Solution for Cloud Data Security. IEEE Access 12: 26334-26343 (2024) - Yuuki Tsubouchi, Hirofumi Tsuruta:
MetricSifter: Feature Reduction of Multivariate Time Series Data for Efficient Fault Localization in Cloud Applications. IEEE Access 12: 37398-37417 (2024) - Hannie Zang, Ho Kim, Jongwon Kim:
Blockchain-Based Decentralized Storage Design for Data Confidence Over Cloud-Native Edge Infrastructure. IEEE Access 12: 50083-50099 (2024) - Tong Zheng, Jialun Chen, Wenbin Feng, Chongchong Yu:
A Graph Aggregation Convolution and Attention Mechanism Based Semantic Segmentation Method for Sparse Lidar Point Cloud Data. IEEE Access 12: 10459-10469 (2024) - Juan José López Escobar, Rebeca P. Díaz Redondo, Felipe J. Gil-Castiñeira:
Unleashing the power of decentralized serverless IoT dataflow architecture for the Cloud-to-Edge Continuum: a performance comparison. Ann. des Télécommunications 79(3-4): 135-148 (2024) - Marie-José Montpetit, Walter Cerroni:
ICIN 2023 special issue - Emergence of the data and intelligence networking across the edge-cloud continuum. Ann. des Télécommunications 79(3-4): 131-133 (2024) - S. Jerald Nirmal Kumar, M. M. Gowthul Alam, Michael Raj TF, Uma Mageswari R:
Golden Search Optimization based adaptive and diagonal kernel convolution neural network for disease prediction and securing IoT data in cloud. Appl. Soft Comput. 151: 111137 (2024) - M. Ananthi, Annapoorani Gopal, K. Ramalakshmi, P. Mohan Kumar:
Gaussian Adapted Markov Model with Overhauled Fluctuation Analysis-Based Big Data Streaming Model in Cloud. Big Data 12(1): 1-18 (2024) - Dipesh Kumar, Nirupama Mandal, Yugal Kumar:
Cloud-Based Advanced Shuffled Frog Leaping Algorithm for Tasks Scheduling. Big Data 12(2): 110-126 (2024) - Fernando N. van der Vlist, Anne Helmond, Fabian Ferrari:
Big AI: Cloud infrastructure dependence and the industrialisation of artificial intelligence. Big Data Soc. 11(1) (2024) - Vijayakumar Polepally, Jagannadha Rao D. B., Parsi Kalpana, S. Nagendra Prabhu:
Exponential Squirrel Search Algorithm-Based Deep Classifier for Intrusion Detection in Cloud Computing with Big Data Assisted Spark Framework. Cybern. Syst. 55(2): 331-350 (2024) - S. P. Santhoshkumar, H. Lilly Beaulah, Abdulrahman Saad Alqahtani, P. Parthasarathy, Azath Mubarakali:
A remote diagnosis of Parkinson's ailment using artificial intelligence based BPNN framework and cloud based storage architecture for securing data in cloud environment for the application of telecommunication technologies. Comput. Intell. 40(1) (2024) - August Asheim Birkeland, Marius Udnæs:
Semi-automated dataset creation for semantic and instance segmentation of industrial point clouds. Comput. Ind. 155: 104064 (2024) - Ahlem Abid, Farah Jemili, Ouajdi Korbaa:
Real-time data fusion for intrusion detection in industrial control systems based on cloud computing and big data techniques. Clust. Comput. 27(2): 2217-2238 (2024) - Selvam Durairaj, Rajeswari Sridhar:
MOM-VMP: multi-objective mayfly optimization algorithm for VM placement supported by principal component analysis (PCA) in cloud data center. Clust. Comput. 27(2): 1733-1751 (2024) - Jingze Yu, Wenting Shen:
Secure cloud storage auditing with deduplication and efficient data transfer. Clust. Comput. 27(2): 2203-2215 (2024) - Complexity:
Retracted: Analysis of the Impact of Big Data on E-Commerce in Cloud Computing Environment. Complex. 2024: 9840138:1-9840138:1 (2024) - Complexity:
Retracted: Optimization of the Marketing Management System Based on Cloud Computing and Big Data. Complex. 2024: 9846047:1-9846047:1 (2024) - G. Sakthivel, P. Madhubala:
Advanced set containment deep learned Rabin certificateless signcryption for secured transmission with big data in cloud. Concurr. Comput. Pract. Exp. 36(1) (2024) - Jacek Lagoni:
Cloud Switching gemäß Data Act: Die Abschaffung von Switching Charges - Was ist ein Wechselentgelt und welche Wechsel sind betroffen? Comput. und Recht 40(2): 91-95 (2024) - Carlo Piltz, Johannes Zwerschke:
Cloud Switching nach dem Data Act aus der Beratungsperspektive: Zentrale Herausforderungen für die vertragliche Ausgestaltung hindernisfreier Wechsel zwischen Datenverarbeitungsdiensten. Comput. und Recht 40(3): 153-160 (2024) - Qingqing Gan, Xiaoming Wang, Daxin Huang, Jianwei Li, Changji Wang, Zhen Liu:
Online/offline remote data auditing with strong key-exposure resilience for cloud storage. Comput. Stand. Interfaces 88: 103798 (2024) - Jinlu Liu, Jing Qin, Wenchao Wang, Lin Mei, Huaxiong Wang:
Key-aggregate based access control encryption for flexible cloud data sharing. Comput. Stand. Interfaces 88: 103800 (2024) - Haiqin Wu, Boris Düdder, Liangmin Wang, Zhenfu Cao, Jun Zhou, Xia Feng:
Survey on Secure Keyword Search over Outsourced Data: From Cloud to Blockchain-assisted Architecture. ACM Comput. Surv. 56(3): 63:1-63:40 (2024) - Shahnawaz Ahmad, Shabana Mehfuz:
Efficient time-oriented latency-based secure data encryption for cloud storage. Cyber Secur. Appl. 2: 100027 (2024) - Hrachya V. Astsatryan, Stepan Babayan, Areg M. Mickaelian, Gor A. Mikayelyan, Martin Astsatryan:
Cloud-Based Machine Learning Service for Astronomical Sub-Object Classification: Case Study On the First Byurakan Survey Spectra. Data Sci. J. 23 (2024)
skipping 12,564 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-27 03:43 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint