Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 89 matches
- 2024
- Yanwei Gong, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Jianhua Wang, Haoran Zhu:
Practical solutions in fully homomorphic encryption: a survey analyzing existing acceleration methods. Cybersecur. 7(1): 5 (2024) - Ketan Date, Rakesh Nagi:
Optimal and heuristic solutions for placing multiple finite-size rectangular facilities in an existing layout. Int. J. Prod. Res. 62(1-2): 24-44 (2024) - Silke Adam, Mykola Makhortykh, Michaela Maier, Viktor Aigenseer, Aleksandra Urman, Teresa Gil-Lopez, Clara Christner, Ernesto de León, Roberto Ulloa:
Improving the quality of individual-level online information tracking: challenges of existing approaches and introduction of a new content- and long-tail sensitive academic solution. CoRR abs/2403.02931 (2024) - 2023
- Shangyao Yan, Kuo-Pin Hsieh, Chun-Hui Hsieh:
An integrated model with a solution algorithm for improving an existing public bicycle sharing system. Comput. Ind. Eng. 184: 109612 (2023) - Ahmed Benmoussa, Chaker Abdelaziz Kerrache, Nasreddine Lagraa, Spyridon Mastorakis, Abderrahmane Lakas, Abdou El Karim Tahari:
Interest Flooding Attacks in Named Data Networking: Survey of Existing Solutions, Open Issues, Requirements, and Future Directions. ACM Comput. Surv. 55(7): 139:1-139:37 (2023) - Wenyi Lin, Fikret Isik Karahanoglu, Charmaine Demanuele, Sheraz Khan, Xuemei Cai, Mar Santamaria, Junrui Di, Lukas Adamowicz:
SciKit digital health package for accelerometry-measured physical activity: comparisons to existing solutions and investigations of age effects in healthy adults. Frontiers Digit. Health 5 (2023) - Lakshmi Priya Krishnan, Iman Vakilinia, Sandeep Reddivari, Sanjay Ahuja:
Scams and Solutions in Cryptocurrencies - A Survey Analyzing Existing Machine Learning Models. Inf. 14(3): 171 (2023) - Mohammed Ayalew Belay, Sindre Stenen Blakseth, Adil Rasheed, Pierluigi Salvo Rossi:
Unsupervised Anomaly Detection for IoT-Based Multivariate Time Series: Existing Solutions, Performance Analysis and Future Directions. Sensors 23(5): 2844 (2023) - Jamal N. Al-Karaki, Amjad Gawanmeh, Claude Fachkha:
Blockchain for Email Security: A Perspective on Existing and Potential Solutions for Phishing Attacks. BCCA 2023: 404-411 - Ambily Jose, Maxime Sasseville, Ellen Gorus, Anik Giguère, Anne Bourbonnais, Samira Abbasgholizadeh Rahimi, Ronald Buyl, Marie-Pierre Gagnon:
Environmental Scan of Existing Digital Health Solutions for Older Adults Living with Neurocognitive Disorders (Mild and Major) and Their Informal Caregivers: Summary Report. ICT4AWE 2023: 216-220 - Yevheniia Kataieva, Oliver Leontiev:
Approach to Construction of Optimal Tourist Routes Based on the Analysis of Existing Solutions. SQAMIA 2023 - Erik Klinger, Alexander Wiesmaier, Andreas Heinemann:
A Review of existing GDPR Solutions for Citizens and SMEs. CoRR abs/2302.03581 (2023) - Yanwei Gong, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Jianhua Wang, Haoran Zhu:
Practical Solutions in Fully Homomorphic Encryption - A Survey Analyzing Existing Acceleration Methods. CoRR abs/2303.10877 (2023) - Tuomas Eerola, Daniel Batrakhanov, Nastaran Vatankhah Barazandeh, Kaisa Kraft, Lumi Haraguchi, Lasse Lensu, Sanna Suikkanen, Jukka Seppälä, Timo Tamminen, Heikki Kälviäinen:
Survey of Automatic Plankton Image Recognition: Challenges, Existing Solutions and Future Perspectives. CoRR abs/2305.11739 (2023) - 2022
- Melpomeni Dimopoulou, Marc Antonini:
Data and image storage on synthetic DNA: existing solutions and challenges. EURASIP J. Image Video Process. 2022(1): 23 (2022) - Demsew Mitiku Teferra, Livingstone Ngoo, George Nyauma Nyakoe:
Fuzzy-Swarm Intelligence-Based Short-Term Load Forecasting Model as a Solution to Power Quality Issues Existing in Microgrid System. J. Electr. Comput. Eng. 2022: 3107495:1-3107495:14 (2022) - Prasad Velpula, Rajendra Pamula:
EBGO: an optimal load balancing algorithm, a solution for existing tribulation to balance the load efficiently on cloud servers. Multim. Tools Appl. 81(24): 34653-34675 (2022) - Tsung-Ting Kuo, Xiaoqian Jiang, Hua Xu, Li Xiong, Lucila Ohno-Machado:
Existing and emerging privacy challenges and solutions for federated data coordination. AMIA 2022 - João Moreira, Inês N. Soares, José Lima, Vítor H. Pinto, Paulo Gomes Costa:
Hybrid Legged-Wheeled Robotic Platforms: Survey on Existing Solutions. CLAWAR 2022: 140-151 - Sagar Swamy Rajan, Neeraj Anand Sharma:
Electronic and Remote Voting Systems: Solutions to Existing Problems - An Experimental Approach to Secure Voting Platforms on Endpoints. DataCom 2022: 178-193 - Adriaan de Vos, Alessandro Brighente, Mauro Conti:
Threat Sensitive Networking: On the Security of IEEE 802.1CB and (un)Effectiveness of Existing Security Solutions. CyberICPS/SECPRE/SPOSE/CPS4CIP/CDT&SECOMAN/EIS/SecAssure@ESORICS 2022: 67-80 - Leila Benarous, Saadi Boudjit:
Location Privacy in Vehicular Networks: Analytical Review of Existing Solutions. PEMWN 2022: 1-6 - Ahmed Benmoussa, Chaker Abdelaziz Kerrache, Nasreddine Lagraa, Spyridon Mastorakis, Abderrahmane Lakas, Abdou El Karim Tahari:
Interest Flooding Attacks in Named Data Networking: Survey of Existing Solutions, Open Issues, Requirements and Future Directions (Extended version). CoRR abs/2206.05605 (2022) - 2021
- PLS Jayalaxmi, Rahul Saha, Gulshan Kumar, Neeraj Kumar, Tai-Hoon Kim:
A Taxonomy of Security Issues in Industrial Internet-of-Things: Scoping Review for Existing Solutions, Future Implications, and Research Challenges. IEEE Access 9: 25344-25359 (2021) - Paulo Silva, Edmundo Monteiro, Paulo Simões:
Privacy in the Cloud: A Survey of Existing Solutions and Research Challenges. IEEE Access 9: 10473-10497 (2021) - Jasmine Zidan, Elijah I. Adegoke, Erik Kampert, Stewart A. Birrell, Col R. Ford, Matthew D. Higgins:
GNSS Vulnerabilities and Existing Solutions: A Review of the Literature. IEEE Access 9: 153960-153976 (2021) - Limin Jiang, Hui Yu, Jiawei Li, Jijun Tang, Yan Guo, Fei Guo:
Predicting MHC class I binder: existing approaches and a novel recurrent neural network solution. Briefings Bioinform. 22(6) (2021) - Kashif Naseer Qureshi, Adi Alhudhaif, Maria Ahmed Qureshi, Gwanggil Jeon:
Nature-inspired solution for coronavirus disease detection and its impact on existing healthcare systems. Comput. Electr. Eng. 95: 107411 (2021) - Jean-Paul A. Yaacoub, Javier Hernandez Fernandez, Hassan N. Noura, Ali Chehab:
Security of Power Line Communication systems: Issues, limitations and existing solutions. Comput. Sci. Rev. 39: 100331 (2021) - Lubna Fayez Eliyan, Roberto Di Pietro:
DoS and DDoS attacks in Software Defined Networks: A survey of existing solutions and research challenges. Future Gener. Comput. Syst. 122: 149-171 (2021)
skipping 59 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-23 08:49 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint