Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 170 matches
- 2024
- Steffen Biehs, Jonas Stilling:
Identification of Key Requirements for the Application of Data Sovereignty in the Context of Data Exchange. HICSS 2024: 4248-4257 - 2023
- Akbobek Abilkaiyrkyzy, Ahmed Elhagry, Fedwa Laamarti, Abdulmotaleb El-Saddik:
Metaverse Key Requirements and Platforms Survey. IEEE Access 11: 117765-117787 (2023) - Abdullah Abu Zaid, Baha Eddine Youcef Belmekki, Mohamed-Slim Alouini:
eVTOL Communications and Networking in UAM: Requirements, Key Enablers, and Challenges. IEEE Commun. Mag. 61(8): 154-160 (2023) - Cheng-Xiang Wang, Xiaohu You, Xiqi Gao, Xiuming Zhu, Zixin Li, Chuan Zhang, Haiming Wang, Yongming Huang, Yunfei Chen, Harald Haas, John S. Thompson, Erik G. Larsson, Marco Di Renzo, Wen Tong, Peiying Zhu, Xuemin Shen, H. Vincent Poor, Lajos Hanzo:
On the Road to 6G: Visions, Requirements, Key Technologies, and Testbeds. IEEE Commun. Surv. Tutorials 25(2): 905-974 (2023) - Natalia Díaz Rodríguez, Javier Del Ser, Mark Coeckelbergh, Marcos López de Prado, Enrique Herrera-Viedma, Francisco Herrera:
Connecting the dots in trustworthy Artificial Intelligence: From AI principles, ethics, and key requirements to responsible AI systems and regulation. Inf. Fusion 99: 101896 (2023) - Farzane Sahli, Sirous Alidousti, Nader Naghshineh:
Branding in libraries: Identifying key requirements and dimensions to provide a conceptual model. J. Libr. Inf. Sci. 55(1): 151-166 (2023) - Issa Atoum:
Measurement of key performance indicators of user experience based on software requirements. Sci. Comput. Program. 226: 102929 (2023) - Alistair G. Sutcliffe:
i* Meets AI: New Roles in Requirements Modelling (keynote). iStar 2023: 1-3 - Praveen Peiris, Thursha Herath, Roshani Dissanayaka, Kanishka Saranga, Samantha Thelijjagoda, Ishara Weerathunge:
Comprehensive Browser Extension for Analysing YouTube User Engagement, Controversy, User Requirements, and Trending Keywords. ITNAC 2023: 134-139 - Haitao Du, Shen He, Li Su, Jie Bai, Ru Yan:
Requirements and Potential Key Technologies of Security for 6G Mobile Network. NaNA 2023: 1-6 - Shangzhi Tang, Xuan Chen, Hongbin Xiao, Jiahao Wei, Zhi Li:
Using Problem Frames Approach for Key Information Extraction from Natural Language Requirements. QRS Companion 2023: 330-339 - Alessio Ferrari:
Artificial Intelligence in Engineering and Society: Blue Skies, Black Holes, and the Job of Requirements Engineers (Keynote). REW 2023: 67 - Lennart Luttkus, Lars Mikelsons:
Key Requirements for Autonomous Micromobility Vehicle Simulators. SMC 2023: 1506-1511 - Natalia Díaz Rodríguez, Javier Del Ser, Mark Coeckelbergh, Marcos López de Prado, Enrique Herrera-Viedma, Francisco Herrera:
Connecting the Dots in Trustworthy Artificial Intelligence: From AI Principles, Ethics, and Key Requirements to Responsible AI Systems and Regulation. CoRR abs/2305.02231 (2023) - 2022
- Renzo D'Amato, Fabrizio Cutolo, Giovanni Badiali, Marina Carbone, Hao Lu, Harm Hogenbirk, Vincenzo Ferrari:
Key Ergonomics Requirements and Possible Mechanical Solutions for Augmented Reality Head-Mounted Displays in Surgery. Multimodal Technol. Interact. 6(2): 15 (2022) - Robert Zimmermann, Chibuzor Udokwu, Ricarda Kompp, Patrick Brandtner, Alex Norta:
Authentication of Luxury Products - Identifying Key Requirements from a Seller and Consumer Perspective. FDSE (CCIS Volume) 2022: 195-209 - Fabiano Dalpiaz:
Keynote - Requirements Conversations: A New Frontier in AI-for-RE. RE Workshops 2022: 142 - Jennifer Horkoff:
Keynote - Requirements Engineering for Machine Learning: Non-functional Requirements as Core Functions. RE Workshops 2022: 141 - Muhammad Sajjad Akbar, Zawar Hussain, Quan Z. Sheng, Subhas Mukhopadhyay:
6G Survey on Challenges, Requirements, Applications, Key Enabling Technologies, Use Cases, AI integration issues and Security aspects. CoRR abs/2206.00868 (2022) - 2021
- Ahmed Slalmi, Hasna Chaibi, Abdellah Chehri, Rachid Saadane, Gwanggil Jeon:
Toward 6G: Understanding network requirements and key performance indicators. Trans. Emerg. Telecommun. Technol. 32(3) (2021) - Cami Rincón, Os Keyes, Corinne Cath:
Speaking from Experience: Trans/Non-Binary Requirements for Voice-Activated AI. Proc. ACM Hum. Comput. Interact. 5(CSCW1): 132:1-132:27 (2021) - Maninder Singh, Gursimran S. Walia:
Automated mapping of fault logs to SRS requirements using key-phrase extraction. ACM Southeast Conference 2021: 138-145 - Plínio de Sá Leitão Júnior, Fábio Nogueira de Lucena, Mariana Soller Ramada, Leonardo Andrade Ribeiro, João Carlos da Silva:
On Functional Requirements for Keyword-based Query over Heterogeneous Databases on the Web. ICEIS (1) 2021: 224-231 - Maninder Singh, Gursimran Singh Walia:
Automating Key Phrase Extraction from Fault Logs to Support Post-Inspection Repair of Software Requirements. ISEC 2021: 3:1-3:12 - Henning Femmer:
Assisted Requirements Engineering - What Will Remain in the Hands of the Future Requirements Engineer? (Invited Keynote). SWQD 2021: 3-14 - Russ Housley:
Algorithm Requirements Update to the Internet X.509 Public Key Infrastructure Certificate Request Message Format (CRMF). RFC 9045: 1-9 (2021) - 2020
- Mohammad Faisal, Ikram Ali, Muhammad Sajjad Khan, Junsu Kim, Su Min Kim:
Cyber Security and Key Management Issues for Internet of Things: Techniques, Requirements, and Challenges. Complex. 2020: 6619498:1-6619498:9 (2020) - Nailiang Li, Xiao Jin, Yupeng Li:
Identification of key customer requirements based on online reviews. J. Intell. Fuzzy Syst. 39(3): 3957-3970 (2020) - Yanxiang Feng, Keyi Xing, MengChu Zhou, Huixia Liu:
Liveness Analysis and Deadlock Control for Automated Manufacturing Systems With Multiple Resource Requirements. IEEE Trans. Syst. Man Cybern. Syst. 50(2): 525-538 (2020) - Chan Nam Ngo, Daniele Friolo, Fabio Massacci, Daniele Venturi, Ettore Battaiola:
Vision: What If They All Die? Crypto Requirements For Key People. EuroS&P Workshops 2020: 178-183
skipping 140 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-24 08:03 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint