default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 78 matches
- 2024
- Yantong Chen, Jialiang Wang, Yanyan Zhang, Yang Liu, Junsheng Wang:
P2RNet: Fast Maritime Object Detection From Key Points to Region Proposals in Large-Scale Remote Sensing Images. IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. 17: 9294-9308 (2024) - Kazuhiro Kikuma, Katsumi Ueda:
Proposal and Evaluation of Virtual Node Placement Algorithm in KVS (Key Value Store). ICCE 2024: 1-5 - 2023
- Swarn Singh Rathour, Takahiro Ito, Kimiyoshi Machii, Mikio Bando, Taku Shimizu:
ORB Keypoint Based Flying Object Region Proposal for Safe & Reliable Urban Air Traffic Management *. ITSC 2023: 1263-1268 - Alexios Kaponis, Alexios A. Kaponis, Manolis Maragoudakis:
Case study analysis of medical and pharmaceutical chatbots in digital marketing and proposal to create a reliable chatbot with summary extraction based on users' keywords. PETRA 2023: 357-363 - 2022
- V. Gayoso Martínez, Luis Hernández Encinas, Agustín Martín Muñoz:
A modification proposal for the reconciliation mechanism of the key exchange algorithm NewHope. Log. J. IGPL 30(6): 1028-1040 (2022) - Yoshihiko Kimuro, Taishi Takiuchi, Ken'ichi Furusato, Takafumi Ienaga:
Proposal of "micro: bit PC" Powered by Numeric Key Programming for both Visually Impaired and Sighted Elementary School Students. ICCHP-AAATE (1) 2022: 355-362 - 2021
- Takayuki Sekiya, Tomohiro Tatejima, Yoshitatsu Matsuda, Kazunori Yamaguchi:
A Proposal for a Hybrid Syllabus Search Tool that Combines Keyword Search and Content Based Classification. EDUCON 2021: 398-403 - Noor Ul Sehr Zia, Osman Semih Kayhan, Jan van Gemert:
PUNet: Temporal Action Proposal Generation With Positive Unlabeled Learning Using Key Frame Annotations. ICIP 2021: 2598-2602 - Gorazd Jank, Silvia Schmidt, Manuel Koschuch:
Secure Key Management in Embedded Systems: A First Proposal. IoTBDS 2021: 81-91 - 2020
- Ge He, Yagu Dang, Li Zhou, Yiyang Dai, Yi Que, Xu Ji:
Architecture model proposal of innovative intelligent manufacturing in the chemical industry based on multi-scale integration and key technologies. Comput. Chem. Eng. 141: 106967 (2020) - Román Rodríguez-Aguilar:
Proposal for a Comprehensive Environmental Key Performance Index of the Green Supply Chain. Mob. Networks Appl. 25(6): 2161-2171 (2020) - John Moran:
Keynote: Evaluating MT based on translation speed - a review of the status quo and a proposal for the future. PEMDT@AMTA 2020: 1-15 - Nick Frymann, Daniel Gardham, Franziskus Kiefer, Emil Lundberg, Mark Manulis, Dain Nilsson:
Asynchronous Remote Key Generation: An Analysis of Yubico's Proposal for W3C WebAuthn. CCS 2020: 939-954 - Yuexi Zhang, Yin Wang, Octavia I. Camps, Mario Sznaier:
Key Frame Proposal Network for Efficient Pose Estimation in Videos. ECCV (17) 2020: 609-625 - Moe Hamamoto, Takashi Murakami, Hiroshi Sugimura, Masao Isshiki:
Proposal of a method to solve the Group Temporal Key mismatch between IoT devices. GCCE 2020: 233-234 - Yuexi Zhang, Yin Wang, Octavia I. Camps, Mario Sznaier:
Key Frame Proposal Network for Efficient Pose Estimation in Videos. CoRR abs/2007.15217 (2020) - Nick Frymann, Daniel Gardham, Franziskus Kiefer, Emil Lundberg, Mark Manulis, Dain Nilsson:
Asynchronous Remote Key Generation: An Analysis of Yubico's Proposal for W3C WebAuthn. IACR Cryptol. ePrint Arch. 2020: 1004 (2020) - Shigeo Tsujii, Ryo Fujita, Masahito Gotaishi:
Proposal of Multivariate Public Key Cryptosystem Based on Modulus of Numerous Prime Numbers and CRT with Security of IND-CPA. IACR Cryptol. ePrint Arch. 2020: 314 (2020) - 2019
- Jingyong Hou, Yangyang Shi, Mari Ostendorf, Mei-Yuh Hwang, Lei Xie:
Region Proposal Network Based Small-Footprint Keyword Spotting. IEEE Signal Process. Lett. 26(10): 1471-1475 (2019) - Fabio Di Tommaso, Michele Guerra, Fabio Martinelli, Francesco Mercaldo, Massimo Piedimonte, Giovanni Rosa, Antonella Santone:
User Authentication through Keystroke Dynamics by means of Model Checking: A Proposal. IEEE BigData 2019: 6232-6234 - Os Keyes, Jevan A. Hutson, Meredith Durbin:
A Mulching Proposal: Analysing and Improving an Algorithmic System for Turning the Elderly into High-Nutrient Slurry. CHI Extended Abstracts 2019 - Asami Inoue, Makoto Fukumoto:
A Proposal of Creating Ideal UTAU Voice Based on Voice of the User's Own Key by Interactive Differential Evolution. CSII 2019: 56-59 - Os Keyes, Jevan A. Hutson, Meredith Durbin:
A Mulching Proposal. CoRR abs/1908.06166 (2019) - 2018
- Ágoston Schranz, Eszter Udvary:
Transmitter Design Proposal for the BB84 Quantum Key Distribution Protocol using Polarization Modulated Vertical Cavity Surface-emitting Lasers. PHOTOPTICS 2018: 252-258 - 2017
- Chen-Chen Mao, Jian Li, Jian-Rong Zhu, Chun-Mei Zhang, Qin Wang:
An improved proposal on the practical quantum key distribution with biased basis. Quantum Inf. Process. 16(10): 256 (2017) - 2016
- Shigeo Tsujii, Kohtaro Tadaki, Ryo Fujita, Masahito Gotaishi:
Proposal of the Multivariate Public Key Cryptosystem Relying on the Difficulty of Factoring a Product of Two Large Prime Numbers. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(1): 66-72 (2016) - Qin Wang, Chun-Hui Zhang, Shunlong Luo, Guang-Can Guo:
An enhanced proposal on decoy-state measurement device-independent quantum key distribution. Quantum Inf. Process. 15(9): 3785-3797 (2016) - J. T. Turner, Kalyan Moy Gupta, David W. Aha:
Keypoint density-based region proposal for fine-grained object detection using regions with convolutional neural network features. AIPR 2016: 1-6 - Mohamed Nidhal Mejri, Nadjib Achir, Mohamed Hamdi:
A new group Diffie-Hellman key generation proposal for secure VANET communications. CCNC 2016: 992-995 - Juan Lao-Tebar, Francisco Alvaro, Daniel Marques:
Proposal for Coexistence of Mathematical Handwritten and Keyboard Input in a WYSIWYG Expression Editor. FM4M/MathUI/ThEdu/DP/WIP@CIKM 2016: 56-65
skipping 48 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-22 21:40 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint