callback( { "result":{ "query":"proof* of concept* implementation*", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"279.41" }, "completions":{ "@total":"2", "@computed":"2", "@sent":"0" }, "hits":{ "@total":"58", "@computed":"58", "@sent":"58", "@first":"0", "hit":[{ "@score":"7", "@id":"78812", "info":{"authors":{"author":{"@pid":"323/4280","text":"Florian Vanhems"}},"title":"Conception, implémentation et preuve d'un service de transfert de flôt d'exécution au sein d'un noyau de système d'exploitation. (Conception, implementation and proof of an execution flow transfer service in an operating system's kernel).","year":"2023","type":"Books and Theses","access":"closed","key":"phd/hal/Vanhems23","ee":"https://tel.archives-ouvertes.fr/tel-04324713","url":"https://dblp.org/rec/phd/hal/Vanhems23"}, "url":"URL#78812" }, { "@score":"5", "@id":"405193", "info":{"authors":{"author":[{"@pid":"265/0912","text":"Kai Lennert Bober"},{"@pid":"140/1128","text":"Dominic Schulz"},{"@pid":"77/5878","text":"Volker Jungnickel"},{"@pid":"75/11156","text":"Anil Mengi"}]},"title":"A Proof of Concept Implementation of LiFi over Power Line Networks based on ITU-T G.hn.","venue":"ISPLC","pages":"61-66","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/isplc/BoberSJM23","doi":"10.1109/ISPLC57122.2023.10104189","ee":"https://doi.org/10.1109/ISPLC57122.2023.10104189","url":"https://dblp.org/rec/conf/isplc/BoberSJM23"}, "url":"URL#405193" }, { "@score":"4", "@id":"406204", "info":{"authors":{"author":{"@pid":"335/8954","text":"Trishna Rajkumar"}},"title":"Exploiting Routing Asymmetry for APUF Implementation in FPGA: A Proof-of-Concept.","venue":"ISVLSI","pages":"1-4","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/isvlsi/Rajkumar23","doi":"10.1109/ISVLSI59464.2023.10238578","ee":"https://doi.org/10.1109/ISVLSI59464.2023.10238578","url":"https://dblp.org/rec/conf/isvlsi/Rajkumar23"}, "url":"URL#406204" }, { "@score":"4", "@id":"456981", "info":{"authors":{"author":[{"@pid":"80/3310","text":"François Quitin"},{"@pid":"65/5967","text":"Michel Osée"}]},"title":"A Wireless Transceiver for Control Area Networks: Proof-of-Concept Implementation.","venue":"WFCS","pages":"1-4","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/wfcs/QuitinO23","doi":"10.1109/WFCS57264.2023.10144235","ee":"https://doi.org/10.1109/WFCS57264.2023.10144235","url":"https://dblp.org/rec/conf/wfcs/QuitinO23"}, "url":"URL#456981" }, { "@score":"6", "@id":"672832", "info":{"authors":{"author":[{"@pid":"296/4366","text":"Justus Wolff"},{"@pid":"225/9451","text":"Julian O. Matschinske"},{"@pid":"338/1354","text":"Dietrich Baumgart"},{"@pid":"338/0567","text":"Anne Pytlik"},{"@pid":"296/4353","text":"Andreas Keck"},{"@pid":"338/2829","text":"Arunakiry Natarajan"},{"@pid":"338/2353","text":"Claudio E. von Schacky"},{"@pid":"38/11252","text":"Josch Pauling"},{"@pid":"32/4397","text":"Jan Baumbach"}]},"title":"Federated machine learning for a facilitated implementation of Artificial Intelligence in healthcare - a proof of concept study for the prediction of coronary artery calcification scores.","venue":"J. Integr. Bioinform.","volume":"19","number":"4","year":"2022","type":"Journal Articles","access":"open","key":"journals/jib/WolffMBPKNSPB22","doi":"10.1515/JIB-2022-0032","ee":"https://doi.org/10.1515/jib-2022-0032","url":"https://dblp.org/rec/journals/jib/WolffMBPKNSPB22"}, "url":"URL#672832" }, { "@score":"4", "@id":"725919", "info":{"authors":{"author":[{"@pid":"175/6434","text":"Jin Nakazato"},{"@pid":"259/3796","text":"Zongdian Li"},{"@pid":"15/8209","text":"Kazuki Maruta"},{"@pid":"127/6775","text":"Keiichi Kubota"},{"@pid":"67/1014-11","text":"Tao Yu 0011"},{"@pid":"04/5083","text":"Gia Khanh Tran"},{"@pid":"06/3291","text":"Kei Sakaguchi"},{"@pid":"53/2829","text":"Soh Masuko"}]},"title":"MEC/Cloud Orchestrator to Facilitate Private/Local Beyond 5G with MEC and Proof-of-Concept Implementation.","venue":"Sensors","volume":"22","number":"14","pages":"5145","year":"2022","type":"Journal Articles","access":"open","key":"journals/sensors/NakazatoLMKYTSM22","doi":"10.3390/S22145145","ee":"https://doi.org/10.3390/s22145145","url":"https://dblp.org/rec/journals/sensors/NakazatoLMKYTSM22"}, "url":"URL#725919" }, { "@score":"5", "@id":"799511", "info":{"authors":{"author":[{"@pid":"192/0562-2","text":"Muhammad Sulaiman 0002"},{"@pid":"04/3817","text":"Anne Håkansson"},{"@pid":"90/3506","text":"Randi Karlsen"}]},"title":"A Proof-of-Concept Implementation Based on the Framework of AI-Enabled Proactive mHealth: Health Promotion with Motivation.","venue":"BIOSTEC","pages":"256-287","year":"2022","type":"Conference and Workshop Papers","access":"closed","key":"conf/biostec/0002HK22","doi":"10.1007/978-3-031-38854-5_14","ee":"https://doi.org/10.1007/978-3-031-38854-5_14","url":"https://dblp.org/rec/conf/biostec/0002HK22"}, "url":"URL#799511" }, { "@score":"5", "@id":"920627", "info":{"authors":{"author":[{"@pid":"335/1450","text":"Stuart W. Hall"},{"@pid":"76/8037","text":"Amin Sakzad"},{"@pid":"210/4924","text":"Sepehr Minagar"}]},"title":"A Proof of Concept Implementation of Explainable Artificial Intelligence (XAI) in Digital Forensics.","venue":"NSS","pages":"66-85","year":"2022","type":"Conference and Workshop Papers","access":"closed","key":"conf/nss/HallSM22","doi":"10.1007/978-3-031-23020-2_4","ee":"https://doi.org/10.1007/978-3-031-23020-2_4","url":"https://dblp.org/rec/conf/nss/HallSM22"}, "url":"URL#920627" }, { "@score":"4", "@id":"1156854", "info":{"authors":{"author":[{"@pid":"187/6551","text":"Lorenzo Addazi"},{"@pid":"36/10028","text":"Federico Ciccozzi"}]},"title":"Blended graphical and textual modelling for UML profiles: A proof-of-concept implementation and experiment.","venue":"J. Syst. Softw.","volume":"175","pages":"110912","year":"2021","type":"Journal Articles","access":"closed","key":"journals/jss/AddaziC21","doi":"10.1016/J.JSS.2021.110912","ee":"https://doi.org/10.1016/j.jss.2021.110912","url":"https://dblp.org/rec/journals/jss/AddaziC21"}, "url":"URL#1156854" }, { "@score":"5", "@id":"1163386", "info":{"authors":{"author":[{"@pid":"212/7936","text":"Randall W. Grout"},{"@pid":"90/7309","text":"Siu L. Hui"},{"@pid":"186/3541","text":"Timothy D. Imler"},{"@pid":"289/4078","text":"Sarah El-Azab"},{"@pid":"289/7840","text":"Jarod Baker"},{"@pid":"289/7792","text":"George H. Sands"},{"@pid":"176/7288","text":"Mohammad B. Ateya"},{"@pid":"289/7701","text":"Francis Pike"}]},"title":"Development, validation, and proof-of-concept implementation of a two-year risk prediction model for undiagnosed atrial fibrillation using common electronic health data (UNAFIED).","venue":"BMC Medical Informatics Decis. Mak.","volume":"21","number":"1","pages":"112","year":"2021","type":"Journal Articles","access":"open","key":"journals/midm/GroutHIEBSAP21","doi":"10.1186/S12911-021-01482-1","ee":"https://doi.org/10.1186/s12911-021-01482-1","url":"https://dblp.org/rec/journals/midm/GroutHIEBSAP21"}, "url":"URL#1163386" }, { "@score":"4", "@id":"1244261", "info":{"authors":{"author":[{"@pid":"228/3333","text":"Victor Boutin"},{"@pid":"149/1589","text":"Alexis Hannart"},{"@pid":"307/4812","text":"Abderrahim Essaidi"},{"@pid":"88/1777","text":"Brunilde Sansò"}]},"title":"Offloading autonomous vehicle machine learning algorithms to the 5G edge: A proof of concept implementation.","venue":"5GWF","pages":"269-274","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/5gwf/BoutinHES21","doi":"10.1109/5GWF52925.2021.00054","ee":"https://doi.org/10.1109/5GWF52925.2021.00054","url":"https://dblp.org/rec/conf/5gwf/BoutinHES21"}, "url":"URL#1244261" }, { "@score":"5", "@id":"1387279", "info":{"authors":{"author":[{"@pid":"293/0732","text":"Viddi Mardiansyah"},{"@pid":"51/1048","text":"Riri Fitri Sari"}]},"title":"Implementation of Proof-of-Work Concept Algorithm using SimBlock Simulator.","venue":"NTMS","pages":"1-6","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/ntms/MardiansyahS21","doi":"10.1109/NTMS49979.2021.9432645","ee":"https://doi.org/10.1109/NTMS49979.2021.9432645","url":"https://dblp.org/rec/conf/ntms/MardiansyahS21"}, "url":"URL#1387279" }, { "@score":"4", "@id":"1756016", "info":{"authors":{"author":[{"@pid":"178/3323-2","text":"Theodoros Georgiou 0002"},{"@pid":"00/505","text":"Karan Singh"},{"@pid":"55/4931","text":"Lynne Baillie"},{"@pid":"42/1137","text":"Frank Broz"}]},"title":"Small Robots With Big Tasks: A Proof of Concept Implementation Using a MiRo for Fall Alert.","venue":"HRI","pages":"206-208","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/hri/GeorgiouSBB20","doi":"10.1145/3371382.3378331","ee":"https://doi.org/10.1145/3371382.3378331","url":"https://dblp.org/rec/conf/hri/GeorgiouSBB20"}, "url":"URL#1756016" }, { "@score":"5", "@id":"1761980", "info":{"authors":{"author":[{"@pid":"118/7664","text":"Yahya Hassanzadeh-Nazarabadi"},{"@pid":"271/0262","text":"Nazir Nayal"},{"@pid":"271/0140","text":"Shadi Sameh Hamdan"},{"@pid":"o/OznurOskasap","text":"Öznur Özkasap"},{"@pid":"33/4077","text":"Alptekin Küpçü"}]},"title":"A containerized proof-of-concept implementation of LightChain system.","venue":"IEEE ICBC","pages":"1-2","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/icbc2/Hassanzadeh-Nazarabadi20a","doi":"10.1109/ICBC48266.2020.9169463","ee":"https://doi.org/10.1109/ICBC48266.2020.9169463","url":"https://dblp.org/rec/conf/icbc2/Hassanzadeh-Nazarabadi20a"}, "url":"URL#1761980" }, { "@score":"5", "@id":"1772728", "info":{"authors":{"author":[{"@pid":"263/0672","text":"Sergio Gimenez"},{"@pid":"56/836","text":"Eduard Grasa"},{"@pid":"61/1322","text":"Steve Bunch"}]},"title":"A Proof of Concept implementation of a RINA interior router using P4-enabled software targets.","venue":"ICIN","pages":"57-62","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/icin/GimenezGB20","doi":"10.1109/ICIN48450.2020.9059486","ee":"https://doi.org/10.1109/ICIN48450.2020.9059486","url":"https://dblp.org/rec/conf/icin/GimenezGB20"}, "url":"URL#1772728" }, { "@score":"5", "@id":"1811790", "info":{"authors":{"author":[{"@pid":"67/8361","text":"Francisco Valdés Souto"},{"@pid":"281/2953","text":"Roberto Pedraza-Coello"},{"@pid":"281/3164","text":"Fabiola Cristina Olguín-Barrón"}]},"title":"COSMIC Sizing of RPA Software: A Case Study from a Proof of Concept Implementation in a Banking Organization.","venue":"IWSM-Mensura","year":"2020","type":"Conference and Workshop Papers","access":"open","key":"conf/iwsm/SoutoPO20","ee":"https://ceur-ws.org/Vol-2725/paper4.pdf","url":"https://dblp.org/rec/conf/iwsm/SoutoPO20"}, "url":"URL#1811790" }, { "@score":"5", "@id":"1847033", "info":{"authors":{"author":[{"@pid":"213/3186","text":"Sanaz Taheri Boshrooyeh"},{"@pid":"271/0561","text":"Ali Utkan Sahin"},{"@pid":"118/7664","text":"Yahya Hassanzadeh-Nazarabadi"},{"@pid":"o/OznurOskasap","text":"Öznur Özkasap"}]},"title":"Demo: A Proof-of-Concept Implementation of Guard Secure Routing Protocol.","venue":"SRDS","pages":"332-334","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/srds/BoshrooyehSHO20","doi":"10.1109/SRDS51746.2020.00041","ee":"https://doi.org/10.1109/SRDS51746.2020.00041","url":"https://dblp.org/rec/conf/srds/BoshrooyehSHO20"}, "url":"URL#1847033" }, { "@score":"4", "@id":"1858542", "info":{"authors":{"author":[{"@pid":"276/1817","text":"Davide Cristiani"},{"@pid":"276/2018","text":"Filippo Bottonelli"},{"@pid":"133/4880","text":"Angelo Trotta"},{"@pid":"63/442","text":"Marco Di Felice"}]},"title":"Inventory Management through Mini-Drones: Architecture and Proof-of-Concept Implementation.","venue":"WoWMoM","pages":"317-322","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/wowmom/CristianiBTF20","doi":"10.1109/WOWMOM49955.2020.00060","ee":"https://doi.org/10.1109/WoWMoM49955.2020.00060","url":"https://dblp.org/rec/conf/wowmom/CristianiBTF20"}, "url":"URL#1858542" }, { "@score":"5", "@id":"1904245", "info":{"authors":{"author":[{"@pid":"118/7664","text":"Yahya Hassanzadeh-Nazarabadi"},{"@pid":"271/0262","text":"Nazir Nayal"},{"@pid":"271/0140","text":"Shadi Sameh Hamdan"},{"@pid":"o/OznurOskasap","text":"Öznur Özkasap"},{"@pid":"33/4077","text":"Alptekin Küpçü"}]},"title":"A containerized proof-of-concept implementation of LightChain system.","venue":"CoRR","volume":"abs/2007.13203","year":"2020","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2007-13203","ee":"https://arxiv.org/abs/2007.13203","url":"https://dblp.org/rec/journals/corr/abs-2007-13203"}, "url":"URL#1904245" }, { "@score":"5", "@id":"1904247", "info":{"authors":{"author":[{"@pid":"213/3186","text":"Sanaz Taheri Boshrooyeh"},{"@pid":"271/0561","text":"Ali Utkan Sahin"},{"@pid":"118/7664","text":"Yahya Hassanzadeh-Nazarabadi"},{"@pid":"o/OznurOskasap","text":"Öznur Özkasap"}]},"title":"Demo: A Proof-of-Concept Implementation of Guard Secure Routing Protocol.","venue":"CoRR","volume":"abs/2007.13212","year":"2020","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2007-13212","ee":"https://arxiv.org/abs/2007.13212","url":"https://dblp.org/rec/journals/corr/abs-2007-13212"}, "url":"URL#1904247" }, { "@score":"5", "@id":"2099915", "info":{"authors":{"author":[{"@pid":"247/9648","text":"Esmaeil Ghahremani"},{"@pid":"139/4571","text":"Annissa Heniche-Oussedik"},{"@pid":"119/2325","text":"Mathieu Perron"},{"@pid":"247/9591","text":"Marcel Racine"},{"@pid":"247/9451","text":"Stéphane Landry"},{"@pid":"247/9293","text":"Houssem Akremi"}]},"title":"A Detailed Presentation of an Innovative Local and Wide-Area Special Protection Scheme to Avoid Voltage Collapse: From Proof of Concept to Grid Implementation.","venue":"IEEE Trans. Smart Grid","volume":"10","number":"5","pages":"5196-5211","year":"2019","type":"Journal Articles","access":"closed","key":"journals/tsg/GhahremaniHPRLA19","doi":"10.1109/TSG.2018.2878980","ee":"https://doi.org/10.1109/TSG.2018.2878980","url":"https://dblp.org/rec/journals/tsg/GhahremaniHPRLA19"}, "url":"URL#2099915" }, { "@score":"4", "@id":"2102678", "info":{"authors":{"author":[{"@pid":"13/5659","text":"Shun-Ren Yang"},{"@pid":"179/8812","text":"Yu-Ju Tseng"},{"@pid":"41/3581","text":"Chen-Chia Huang"},{"@pid":"236/3323","text":"Wo-Chien Lin"}]},"title":"Multi-Access Edge Computing Enhanced Video Streaming: Proof-of-Concept Implementation and Prediction/QoE Models.","venue":"IEEE Trans. Veh. Technol.","volume":"68","number":"2","pages":"1888-1902","year":"2019","type":"Journal Articles","access":"closed","key":"journals/tvt/YangTHL19","doi":"10.1109/TVT.2018.2889196","ee":"https://doi.org/10.1109/TVT.2018.2889196","url":"https://dblp.org/rec/journals/tvt/YangTHL19"}, "url":"URL#2102678" }, { "@score":"5", "@id":"2107268", "info":{"authors":{"author":[{"@pid":"85/93-1","text":"Selena He"},{"@pid":"241/7862","text":"Aiju Zhang"},{"@pid":"53/11198","text":"Mingyuan Yan"}]},"title":"Voice and Motion-based Control System: Proof-of-Concept Implementation on Robotics via Internet-of-Things Technologies.","venue":"ACM Southeast Regional Conference","pages":"102-108","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/HeZY19","doi":"10.1145/3299815.3314440","ee":"https://doi.org/10.1145/3299815.3314440","url":"https://dblp.org/rec/conf/ACMse/HeZY19"}, "url":"URL#2107268" }, { "@score":"5", "@id":"2172350", "info":{"authors":{"author":[{"@pid":"71/2630","text":"Lars Nielsen"},{"@pid":"234/7538","text":"Rasmus Vestergaard"},{"@pid":"188/2975","text":"Niloofar Yazdani"},{"@pid":"212/5366","text":"Prasad Talasila"},{"@pid":"96/3518","text":"Daniel E. Lucani"},{"@pid":"150/6322","text":"Márton Sipos"}]},"title":"Alexandria: A Proof-of-Concept Implementation and Evaluation of Generalised Data Deduplication.","venue":"GLOBECOM Workshops","pages":"1-6","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/NielsenVYTLS19","doi":"10.1109/GCWKSHPS45667.2019.9024368","ee":"https://doi.org/10.1109/GCWkshps45667.2019.9024368","url":"https://dblp.org/rec/conf/globecom/NielsenVYTLS19"}, "url":"URL#2172350" }, { "@score":"5", "@id":"2292580", "info":{"authors":{"author":[{"@pid":"247/4838","text":"Rodrigo Cortesão"},{"@pid":"272/0634","text":"Daniel F. S. Fernandes"},{"@pid":"241/0680","text":"Diogo J. A. Clemente"},{"@pid":"05/10865","text":"Gabriela E. Soares"},{"@pid":"58/4391","text":"Pedro Sebastião"},{"@pid":"25/10518","text":"Lucio Studer Ferreira"}]},"title":"Cloud-based Implementation of a SON Automatic Planning System: a proof-of-concept for UMTS.","venue":"WPMC","pages":"1-6","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/wpmc/CortesaoFCSSF19","doi":"10.1109/WPMC48795.2019.9096060","ee":"https://doi.org/10.1109/WPMC48795.2019.9096060","url":"https://dblp.org/rec/conf/wpmc/CortesaoFCSSF19"}, "url":"URL#2292580" }, { "@score":"4", "@id":"2292591", "info":{"authors":{"author":[{"@pid":"74/5758","text":"André Godinho"},{"@pid":"272/0634","text":"Daniel F. S. Fernandes"},{"@pid":"241/0680","text":"Diogo J. A. Clemente"},{"@pid":"05/10865","text":"Gabriela E. Soares"},{"@pid":"58/4391","text":"Pedro Sebastião"},{"@pid":"264/6976","text":"Paulo M. Pina"},{"@pid":"25/10518","text":"Lucio Studer Ferreira"}]},"title":"Cloud-based Cellular Network Planning System: Proof-of-Concept Implementation for GSM in AWS.","venue":"WPMC","pages":"1-5","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/wpmc/GodinhoFCSSPF19","doi":"10.1109/WPMC48795.2019.9096082","ee":"https://doi.org/10.1109/WPMC48795.2019.9096082","url":"https://dblp.org/rec/conf/wpmc/GodinhoFCSSPF19"}, "url":"URL#2292591" }, { "@score":"5", "@id":"2554466", "info":{"authors":{"author":[{"@pid":"175/6267","text":"Eduard Gringinger"},{"@pid":"231/8793","text":"Christoph Fabianek"},{"@pid":"167/2271","text":"Christoph G. Schuetz"},{"@pid":"246/2662","text":"Johann Stöbich"},{"@pid":"76/970","text":"Bernd Neumayr"},{"@pid":"s/MichaelSchrefl","text":"Michael Schrefl"}]},"title":"A Proof-of-Concept Implementation of a Semantic Container Management System for Air Traffic Management.","venue":"EKAW","pages":"69-72","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/ekaw/GringingerFSNS18","ee":"https://ceur-ws.org/Vol-2262/ekaw-demo-25.pdf","url":"https://dblp.org/rec/conf/ekaw/GringingerFSNS18"}, "url":"URL#2554466" }, { "@score":"4", "@id":"2767313", "info":{"authors":{"author":[{"@pid":"117/8392","text":"Sergio Trilles"},{"@pid":"146/2042","text":"Óscar Belmonte Fernández"},{"@pid":"58/2047","text":"Sven Schade"},{"@pid":"67/3031","text":"Joaquín Huerta"}]},"title":"A domain-independent methodology to analyze IoT data streams in real-time. A proof of concept implementation for anomaly detection from environmental data.","venue":"Int. J. Digit. Earth","volume":"10","number":"1","pages":"103-120","year":"2017","type":"Journal Articles","access":"open","key":"journals/digearth/TrillesFSH17","doi":"10.1080/17538947.2016.1209583","ee":"https://doi.org/10.1080/17538947.2016.1209583","url":"https://dblp.org/rec/journals/digearth/TrillesFSH17"}, "url":"URL#2767313" }, { "@score":"4", "@id":"2780081", "info":{"authors":{"author":[{"@pid":"38/10038","text":"Mohamad Samir A. Eid"},{"@pid":"95/4728","text":"Hitoshi Aida"}]},"title":"Trustworthy DDoS Defense: Design, Proof of Concept Implementation and Testing.","venue":"IEICE Trans. Inf. Syst.","volume":"100-D","number":"8","pages":"1738-1750","year":"2017","type":"Journal Articles","access":"closed","key":"journals/ieicet/EidA17","doi":"10.1587/TRANSINF.2016ICP0024","ee":"https://doi.org/10.1587/transinf.2016ICP0024","url":"https://dblp.org/rec/journals/ieicet/EidA17"}, "url":"URL#2780081" }, { "@score":"4", "@id":"2867622", "info":{"authors":{"author":[{"@pid":"191/8079","text":"Himanshu Dogra"},{"@pid":"221/5011","text":"Sudhakar Verma"},{"@pid":"20/7949","text":"Neminath Hubballi"},{"@pid":"177/2115","text":"Mayank Swarnkar"}]},"title":"Security service level agreement measurement in cloud: A proof of concept implementation.","venue":"ANTS","pages":"1-6","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/IEEEants/DograVHS17","doi":"10.1109/ANTS.2017.8384139","ee":"https://doi.org/10.1109/ANTS.2017.8384139","url":"https://dblp.org/rec/conf/IEEEants/DograVHS17"}, "url":"URL#2867622" }, { "@score":"4", "@id":"2867632", "info":{"authors":{"author":[{"@pid":"91/7449","text":"Naveen Gupta"},{"@pid":"157/8319","text":"Vibhutesh Kumar Singh"},{"@pid":"17/7501","text":"Siddharth Sharma"},{"@pid":"89/3598","text":"Vivek Ashok Bohara"}]},"title":"Testbed implementation and proof-of-concept demonstration for cooperative device-to-device communication framework.","venue":"ANTS","pages":"1-6","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/IEEEants/GuptaSSB17","doi":"10.1109/ANTS.2017.8384087","ee":"https://doi.org/10.1109/ANTS.2017.8384087","url":"https://dblp.org/rec/conf/IEEEants/GuptaSSB17"}, "url":"URL#2867632" }, { "@score":"6", "@id":"3212116", "info":{"authors":{"author":{"@pid":"117/6974-1","text":"Jens Weber 0001"}},"title":"A Multi-user-collaboration Platform Concept for Managing Simulation-Based Optimization of Virtual Tooling as Big Data Exchange Service - An Implementation as Proof of Concept Based on Different Human-Machine-Interfaces.","venue":"BDTA","pages":"144-153","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/bdta/Weber16a","doi":"10.1007/978-3-319-58967-1_17","ee":"https://doi.org/10.1007/978-3-319-58967-1_17","url":"https://dblp.org/rec/conf/bdta/Weber16a"}, "url":"URL#3212116" }, { "@score":"4", "@id":"3308627", "info":{"authors":{"author":[{"@pid":"191/0607","text":"Diep Thi Hoang"},{"@pid":"88/5","text":"Le Sy Vinh"},{"@pid":"01/5035","text":"Tomás Flouri"},{"@pid":"01/501","text":"Alexandros Stamatakis"},{"@pid":"07/3545","text":"Arndt von Haeseler"},{"@pid":"92/422","text":"Bui Quang Minh"}]},"title":"A new phylogenetic tree sampling method for maximum parsimony bootstrapping and proof-of-concept implementation.","venue":"KSE","pages":"1-6","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/kse/HoangVFSHM16","doi":"10.1109/KSE.2016.7758020","ee":"https://doi.org/10.1109/KSE.2016.7758020","url":"https://dblp.org/rec/conf/kse/HoangVFSHM16"}, "url":"URL#3308627" }, { "@score":"5", "@id":"3358546", "info":{"authors":{"author":[{"@pid":"23/1238","text":"Chee-Kit Looi"},{"@pid":"66/6220","text":"Peter Sen Kee Seow"}]},"title":"Seamless Learning from Proof-of-Concept to Implementation and Scaling-Up: A Focus on Curriculum Design.","venue":"Seamless Learning in the Age of Mobile Connectivity","pages":"419-435","year":"2016","type":"Parts in Books or Collections","access":"closed","key":"books/daglib/p/LooiS16","doi":"10.1007/978-981-287-113-8_21","ee":"https://doi.org/10.1007/978-981-287-113-8_21","url":"https://dblp.org/rec/books/daglib/p/LooiS16"}, "url":"URL#3358546" }, { "@score":"5", "@id":"3437457", "info":{"authors":{"author":[{"@pid":"07/9049","text":"Patrick Dreher"},{"@pid":"57/4036","text":"William Scullin"},{"@pid":"v/MladenAVouk","text":"Mladen A. Vouk"}]},"title":"Toward a Proof of Concept Implementation of a Cloud Infrastructure on the Blue Gene/Q.","venue":"Int. J. Grid High Perform. Comput.","volume":"7","number":"1","pages":"32-41","year":"2015","type":"Journal Articles","access":"closed","key":"journals/ijghpc/DreherSV15","doi":"10.4018/IJGHPC.2015010103","ee":"https://doi.org/10.4018/ijghpc.2015010103","url":"https://dblp.org/rec/journals/ijghpc/DreherSV15"}, "url":"URL#3437457" }, { "@score":"4", "@id":"3468189", "info":{"authors":{"author":[{"@pid":"67/8339","text":"Pablo Antón"},{"@pid":"m/AntonioMana","text":"Antonio Maña"},{"@pid":"15/4271-1","text":"Antonio Muñoz 0001"},{"@pid":"47/3484","text":"Hristo Koshutanski"}]},"title":"An immersive view approach by secure interactive multimedia proof-of-concept implementation.","venue":"Multim. Tools Appl.","volume":"74","number":"19","pages":"8401-8420","year":"2015","type":"Journal Articles","access":"closed","key":"journals/mta/AntonMMK15","doi":"10.1007/S11042-013-1682-7","ee":"https://doi.org/10.1007/s11042-013-1682-7","url":"https://dblp.org/rec/journals/mta/AntonMMK15"}, "url":"URL#3468189" }, { "@score":"5", "@id":"3506094", "info":{"authors":{"author":[{"@pid":"03/6666","text":"Mauro Migliardi"},{"@pid":"54/3464","text":"Alessio Merlo"},{"@pid":"73/10335","text":"Andrea Passaglia"}]},"title":"On the Feasibility of Moderating a Peer-to-Peer CDN System: A Proof-of-Concept Implementation.","venue":"3PGCIC","pages":"689-694","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/3pgcic/MigliardiMP15","doi":"10.1109/3PGCIC.2015.53","ee":"https://doi.org/10.1109/3PGCIC.2015.53","url":"https://dblp.org/rec/conf/3pgcic/MigliardiMP15"}, "url":"URL#3506094" }, { "@score":"4", "@id":"3506198", "info":{"authors":{"author":[{"@pid":"43/1752","text":"Nahla Haddar"},{"@pid":"42/1176","text":"Mohamed Tmar"},{"@pid":"03/18","text":"Faïez Gargouri"}]},"title":"Opus framework: A proof-of-concept implementation.","venue":"ICIS","pages":"639-641","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACISicis/HaddarTG15","doi":"10.1109/ICIS.2015.7166670","ee":"https://doi.org/10.1109/ICIS.2015.7166670","url":"https://dblp.org/rec/conf/ACISicis/HaddarTG15"}, "url":"URL#3506198" }, { "@score":"5", "@id":"3586634", "info":{"authors":{"author":[{"@pid":"148/7135","text":"Davide Margaria"},{"@pid":"58/1785","text":"Emanuela Falletti"}]},"title":"Proof-of-concept of the local integrity approach: Prototype implementation and performance assessment in an urban context.","venue":"ICL-GNSS","pages":"1-6","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icl-gnss/MargariaF15","doi":"10.1109/ICL-GNSS.2015.7217166","ee":"https://doi.org/10.1109/ICL-GNSS.2015.7217166","url":"https://dblp.org/rec/conf/icl-gnss/MargariaF15"}, "url":"URL#3586634" }, { "@score":"4", "@id":"3625600", "info":{"authors":{"author":[{"@pid":"58/2999","text":"Cynthia Hood"},{"@pid":"59/5595","text":"Gregory Cox"},{"@pid":"189/9176","text":"Stuart Schutta"},{"@pid":"189/9242","text":"Anthony Rennier"}]},"title":"Policy-Enhanced Spectrum Operations: Analysis and proof of concept implementation.","venue":"MILCOM","pages":"1212-1217","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/milcom/HoodCSR15","doi":"10.1109/MILCOM.2015.7357611","ee":"https://doi.org/10.1109/MILCOM.2015.7357611","url":"https://dblp.org/rec/conf/milcom/HoodCSR15"}, "url":"URL#3625600" }, { "@score":"4", "@id":"3850737", "info":{"authors":{"author":[{"@pid":"96/7033","text":"Stephan Flake"},{"@pid":"86/1334","text":"Jürgen Tacken"},{"@pid":"79/5087","text":"Carsten Zoth"}]},"title":"Real-time billing as a service - A standard-based proof-of-concept implementation.","venue":"ETFA","pages":"1-8","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/etfa/FlakeTZ14","doi":"10.1109/ETFA.2014.7005284","ee":"https://doi.org/10.1109/ETFA.2014.7005284","url":"https://dblp.org/rec/conf/etfa/FlakeTZ14"}, "url":"URL#3850737" }, { "@score":"4", "@id":"3939511", "info":{"authors":{"author":[{"@pid":"161/9298","text":"Vicknesan Ayadurai"},{"@pid":"95/1693","text":"Mikael Prytz"}]},"title":"Proof-of-concept implementation for network orchestrated relay selection mechanism.","venue":"SRIF@SIGCOMM","pages":"77-84","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sigcomm/AyaduraiP14","doi":"10.1145/2627788.2627791","ee":"https://doi.org/10.1145/2627788.2627791","url":"https://dblp.org/rec/conf/sigcomm/AyaduraiP14"}, "url":"URL#3939511" }, { "@score":"4", "@id":"4113002", "info":{"authors":{"author":[{"@pid":"61/4099","text":"Takeshi Takahashi 0001"},{"@pid":"68/1281","text":"Keita Emura"},{"@pid":"33/2485","text":"Akira Kanaoka"},{"@pid":"13/4965","text":"Shin'ichiro Matsuo"},{"@pid":"66/2639","text":"Tadashi Minowa"}]},"title":"Risk visualization and alerting system: architecture and proof-of-concept implementation.","venue":"SESP@CCS Asia","pages":"3-10","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/ccs/TakahashiEKMM13","doi":"10.1145/2484417.2484421","ee":"https://doi.org/10.1145/2484417.2484421","url":"https://dblp.org/rec/conf/ccs/TakahashiEKMM13"}, "url":"URL#4113002" }, { "@score":"4", "@id":"4478755", "info":{"authors":{"author":[{"@pid":"13/5407-2","text":"Xuan Liu 0002"},{"@pid":"53/60","text":"Akira Wada"},{"@pid":"48/9198","text":"Tianyi Xing"},{"@pid":"83/11529","text":"Parikshit Juluri"},{"@pid":"42/6105","text":"Yasuhiro Sato"},{"@pid":"49/2403","text":"Shingo Ata"},{"@pid":"36/4573","text":"Dijiang Huang"},{"@pid":"m/DeepMedhi","text":"Deep Medhi"}]},"title":"SeRViTR: A framework for trust and policy management for a secure Internet and its proof-of-concept implementation.","venue":"NOMS","pages":"1159-1166","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/noms/LiuWXJSAHM12","doi":"10.1109/NOMS.2012.6212043","ee":"https://doi.org/10.1109/NOMS.2012.6212043","url":"https://dblp.org/rec/conf/noms/LiuWXJSAHM12"}, "url":"URL#4478755" }, { "@score":"4", "@id":"4521518", "info":{"authors":{"author":[{"@pid":"m/SergueiAMokhov","text":"Serguei A. Mokhov"},{"@pid":"20/6889","text":"Yankui Sun"}]},"title":"OCT Segmentation Survey and Summary Reviews and a Novel 3D Segmentation Algorithm and a Proof of Concept Implementation","venue":"CoRR","volume":"abs/1204.6725","year":"2012","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1204-6725","ee":"http://arxiv.org/abs/1204.6725","url":"https://dblp.org/rec/journals/corr/abs-1204-6725"}, "url":"URL#4521518" }, { "@score":"4", "@id":"4534427", "info":{"authors":{"author":{"@pid":"04/7588","text":"Mathieu Boespflug"}},"title":"Conception d'un noyau de vérification de preuves pour le λΠ-calcul modulo. (Design and implementation of a proof verifying kernel for the λΠ-calculus modulo).","year":"2011","type":"Books and Theses","access":"open","key":"phd/hal/Boespflug11","ee":"https://tel.archives-ouvertes.fr/tel-00672699","url":"https://dblp.org/rec/phd/hal/Boespflug11"}, "url":"URL#4534427" }, { "@score":"4", "@id":"4891960", "info":{"authors":{"author":[{"@pid":"52/9079","text":"Selvi Kadirvel"},{"@pid":"j/JoseABFortes","text":"José A. B. Fortes"}]},"title":"Self-Caring IT Systems: A Proof-of-Concept Implementation in Virtualized Environments.","venue":"CloudCom","pages":"433-440","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/cloudcom/KadirvelF10","doi":"10.1109/CLOUDCOM.2010.83","ee":"https://doi.org/10.1109/CloudCom.2010.83","url":"https://dblp.org/rec/conf/cloudcom/KadirvelF10"}, "url":"URL#4891960" }, { "@score":"4", "@id":"4942246", "info":{"authors":{"author":[{"@pid":"06/10136","text":"Jérémie Tharaud"},{"@pid":"58/2312","text":"Sven Wohlgemuth"},{"@pid":"04/1505","text":"Isao Echizen"},{"@pid":"08/2511","text":"Noboru Sonehara"},{"@pid":"74/5441","text":"Günter Müller"},{"@pid":"l/PascalLafourcade","text":"Pascal Lafourcade 0001"}]},"title":"Privacy by Data Provenance with Digital Watermarking - A Proof-of-Concept Implementation for Medical Services with Electronic Health Records.","venue":"IIH-MSP","pages":"510-513","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/iih-msp/TharaudWESML10","doi":"10.1109/IIHMSP.2010.130","ee":"https://doi.org/10.1109/IIHMSP.2010.130","url":"https://dblp.org/rec/conf/iih-msp/TharaudWESML10"}, "url":"URL#4942246" }, { "@score":"4", "@id":"5168315", "info":{"authors":{"author":[{"@pid":"01/9482","text":"Ioannis Magnisalis"},{"@pid":"29/1217","text":"Stavros N. Demetriadis"}]},"title":"Modeling Adaptation Patterns with IMS-LD Specification: A Case Study as a Proof of Concept Implementation.","venue":"INCoS","pages":"295-300","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/incos/MagnisalisD09","doi":"10.1109/INCOS.2009.50","ee":"https://doi.org/10.1109/INCOS.2009.50","url":"https://dblp.org/rec/conf/incos/MagnisalisD09"}, "url":"URL#5168315" }, { "@score":"5", "@id":"5177472", "info":{"authors":{"author":[{"@pid":"32/3964","text":"Carolin Latze"},{"@pid":"48/10872","text":"Andreas Ruppen"},{"@pid":"u/UlrichUltesNitsche","text":"Ulrich Ultes-Nitsche"}]},"title":"A Proof of Concept Implementation of a Secure E-Commerce Authentication Scheme.","venue":"ISSA","pages":"379-392","year":"2009","type":"Conference and Workshop Papers","access":"open","key":"conf/issa/LatzeRU09","ee":"http://icsa.cs.up.ac.za/issa/2009/Proceedings/Research/15_latze-ruppen-ultes-nitsche.pdf","url":"https://dblp.org/rec/conf/issa/LatzeRU09"}, "url":"URL#5177472" }, { "@score":"5", "@id":"5388787", "info":{"authors":{"author":[{"@pid":"32/3964","text":"Carolin Latze"},{"@pid":"u/UlrichUltesNitsche","text":"Ulrich Ultes-Nitsche"}]},"title":"A Proof-of-Concept Implementation of EAP-TLS with TPM Support.","venue":"ISSA","pages":"1-12","year":"2008","type":"Conference and Workshop Papers","access":"open","key":"conf/issa/LatzeU08","ee":"http://icsa.cs.up.ac.za/issa/2008/Proceedings/Full/46.pdf","url":"https://dblp.org/rec/conf/issa/LatzeU08"}, "url":"URL#5388787" }, { "@score":"5", "@id":"5587886", "info":{"authors":{"author":[{"@pid":"19/1165","text":"Rolf Oppliger"},{"@pid":"23/3638","text":"Ralf Hauser"},{"@pid":"b/DavidABasin","text":"David A. Basin"},{"@pid":"10/5558","text":"Aldo Rodenhaeuser"},{"@pid":"67/6359","text":"Bruno Kaiser"}]},"title":"A Proof of Concept Implementation of SSL/TLS Session-Aware User Authentication (TLS-SA).","venue":"KiVS","pages":"225-236","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/kivs/OppligerHBRK07","doi":"10.1007/978-3-540-69962-0_19","ee":"https://doi.org/10.1007/978-3-540-69962-0_19","url":"https://dblp.org/rec/conf/kivs/OppligerHBRK07"}, "url":"URL#5587886" }, { "@score":"5", "@id":"5602009", "info":{"authors":{"author":[{"@pid":"53/597","text":"Tracy Bost"},{"@pid":"44/6310","text":"Phillipe Bonnard"},{"@pid":"59/351","text":"Mark Proctor"}]},"title":"Implementation of Production Rules for a RIF Dialect: A MISMO Proof-of-Concept for Loan Rates.","venue":"RuleML","pages":"160-165","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/ruleml/BostBP07","doi":"10.1007/978-3-540-75975-1_14","ee":"https://doi.org/10.1007/978-3-540-75975-1_14","url":"https://dblp.org/rec/conf/ruleml/BostBP07"}, "url":"URL#5602009" }, { "@score":"4", "@id":"5732866", "info":{"authors":{"author":[{"@pid":"96/382","text":"Vineeta Chand"},{"@pid":"21/6331","text":"C. Orhan Orgun"}]},"title":"Exploiting Linguistic Features in Lexical Steganography: Design and Proof-of-Concept Implementation.","venue":"HICSS","year":"2006","type":"Conference and Workshop Papers","access":"closed","key":"conf/hicss/ChandO06","doi":"10.1109/HICSS.2006.175","ee":"https://doi.org/10.1109/HICSS.2006.175","url":"https://dblp.org/rec/conf/hicss/ChandO06"}, "url":"URL#5732866" }, { "@score":"5", "@id":"5939146", "info":{"authors":{"author":{"@pid":"91/2901","text":"Allan McInnes"}},"title":"Design and Implementation of a Proof-of-Concept MMORPG Using CSP and occam-pi.","venue":"PDPTA","pages":"194-200","year":"2005","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/pdpta/McInnes05","url":"https://dblp.org/rec/conf/pdpta/McInnes05"}, "url":"URL#5939146" }, { "@score":"5", "@id":"6183008", "info":{"authors":{"author":[{"@pid":"25/2112","text":"Hannes Hartenstein"},{"@pid":"41/3704","text":"Holger Füßler"},{"@pid":"77/6442","text":"Martin Mauve"},{"@pid":"53/3902","text":"Walter J. Franz"}]},"title":"Simulation Results and a Proof-of-Concept Implementation of the FleetNet Position-Based Router: Extended Abstract.","venue":"PWC","pages":"192-197","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/ifip6-8/HartensteinFMF03","doi":"10.1007/978-3-540-39867-7_19","ee":"https://doi.org/10.1007/978-3-540-39867-7_19","url":"https://dblp.org/rec/conf/ifip6-8/HartensteinFMF03"}, "url":"URL#6183008" }, { "@score":"4", "@id":"6377710", "info":{"authors":{"author":[{"@pid":"a/MikhailJAtallah","text":"Mikhail J. Atallah"},{"@pid":"24/2020","text":"Victor Raskin"},{"@pid":"31/4374","text":"Michael Crogan"},{"@pid":"87/3593","text":"Christian Hempelmann"},{"@pid":"26/5304","text":"Florian Kerschbaum"},{"@pid":"80/3231","text":"Dina Mohamed"},{"@pid":"20/4526","text":"Sanket Naik"}]},"title":"Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept Implementation.","venue":"Information Hiding","pages":"185-199","year":"2001","type":"Conference and Workshop Papers","access":"closed","key":"conf/ih/AtallahRCHKMN01","doi":"10.1007/3-540-45496-9_14","ee":"https://doi.org/10.1007/3-540-45496-9_14","url":"https://dblp.org/rec/conf/ih/AtallahRCHKMN01"}, "url":"URL#6377710" }, { "@score":"4", "@id":"6855256", "info":{"authors":{"author":[{"@pid":"g/RobertLGrossman","text":"Robert L. Grossman"},{"@pid":"199/4704","text":"Xiao Qin"},{"@pid":"89/5659","text":"D. Lifka"}]},"title":"A proof-of-concept implementation interfacing an object manager with a hierarchical storage system.","venue":"MSS","pages":"209-213","year":"1993","type":"Conference and Workshop Papers","access":"closed","key":"conf/mss/GrossmanQL93","doi":"10.1109/MASS.1993.289758","ee":"https://doi.org/10.1109/MASS.1993.289758","url":"https://dblp.org/rec/conf/mss/GrossmanQL93"}, "url":"URL#6855256" } ] } } } )