
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 235 matches
- 2021
- Jian Sun, Nan Gu, Chenye Wu
:
Strategic Bidding in Extended Locational Marginal Price Scheme. IEEE Control. Syst. Lett. 5(1): 19-24 (2021) - Xiaopeng Zhao, Zhenfu Cao
, Xiaolei Dong, Jun Shao:
Extended Galbraith's test on the anonymity of IBE schemes from higher residuosity. Des. Codes Cryptogr. 89(2): 241-253 (2021) - G. R. Vijay, A. Rama Mohan Reddy:
An extended infrastructure security scheme for multi-cloud systems with verifiable inter-server communication protocol. Int. J. Comput. Aided Eng. Technol. 14(2): 168-188 (2021) - Arman Sehatnia, Farzad Hashemzadeh, Mahdi Baradarannia:
Extended hybrid control scheme for asynchronous switching. J. Frankl. Inst. 358(3): 1693-1714 (2021) - Srividhya Sridhar, Gnanou Florence Sudha:
Two in One Image Secret Sharing Scheme (TiOISSS) for extended progressive visual cryptography using simple modular arithmetic operations. J. Vis. Commun. Image Represent. 74: 102996 (2021) - Shuxin Zhou, Huandong Wang, Dong Tong:
Prediction of Register Instance Usage and Time-sharing Register for Extended Register Reuse Scheme. ASP-DAC 2021: 216-221 - 2020
- Huaibao Zhang
, Fan Zhang
, Jun Liu, James M. McDonough, Chunguang Xu:
A simple extended compact nonlinear scheme with adaptive dissipation control. Commun. Nonlinear Sci. Numer. Simul. 84: 105191 (2020) - Jordan Yoder, Li Chen, Henry Pao, Eric Bridgeford, Keith Levin, Donniell E. Fishkind, Carey E. Priebe, Vince Lyzinski:
Vertex nomination: The canonical sampling and the extended spectral nomination schemes. Comput. Stat. Data Anal. 145: 106916 (2020) - Marc Parveau
, Mehdi Adda:
Toward a user-centric classification scheme for extended reality paradigms. J. Ambient Intell. Humaniz. Comput. 11(6): 2237-2249 (2020) - Yu-An Liu, Jianwei Xia, Bo Meng, Xiaona Song, Hao Shen:
Extended dissipative synchronization for semi-Markov jump complex dynamic networks via memory sampled-data control scheme. J. Frankl. Inst. 357(15): 10900-10920 (2020) - Sonal Kukreja
, Geeta Kasana, Singara Singh Kasana:
Curvelet transform based robust copyright protection scheme for color images using extended visual cryptography. Multim. Tools Appl. 79(35-36): 26155-26179 (2020) - Ashraf Y. Hassan:
A Simple Time-Space Diversity Scheme Using Extended Shaping Pulse. Wirel. Pers. Commun. 113(2): 821-841 (2020) - Roberto Román, Rosario Arjona
, Javier Arcenegui, Iluminada Baturone
:
Hardware Security for eXtended Merkle Signature Scheme Using SRAM-based PUFs and TRNGs. ICM 2020: 1-4 - 2019
- Sonal Kukreja, Geeta Kasana, Singara Singh Kasana:
Cellular Automata Based Image Authentication Scheme Using Extended Visual Cryptography. Comput. Informatics 38(6): 1272-1300 (2019) - Yuqiao Cheng, Zhengxin Fu, Bin Yu, Gang Shen:
General Construction for Extended Visual Cryptography Scheme Using QR Codes. Int. J. Digit. Crime Forensics 11(1): 1-17 (2019) - Sha Liu
, Yuehan Yang, Chengwen Zhong
:
An extended gas-kinetic scheme for shock structure calculations. J. Comput. Phys. 390: 1-24 (2019) - Masahiro Yasugi, Reichi Ikeuchi, Tasuku Hiraishi, Tsuneyasu Komiya:
Evaluating Portable Mechanisms for Legitimate Execution Stack Access with a Scheme Interpreter in an Extended SC Language. J. Inf. Process. 27: 177-189 (2019) - Biao Yu
, Lin Dong, Deyi Xue
, Hui Zhu, Xinli Geng, Ruling Huang, Jie Wang:
A hybrid dead reckoning error correction scheme based on extended Kalman filter and map matching for vehicle self-localization. J. Intell. Transp. Syst. 23(1): 84-98 (2019) - Tanveer Ahmad
, Xue Jun Li
, Boon-Chong Seet
:
Noise Reduction Scheme for Parametric Loop Division 3D Wireless Localization Algorithm Based on Extended Kalman Filtering. J. Sens. Actuator Networks 8(2): 24 (2019) - Masato Kimura, Hirofumi Notsu
, Yoshimi Tanaka, Hiroki Yamamoto:
The Gradient Flow Structure of an Extended Maxwell Viscoelastic Model and a Structure-Preserving Finite Element Scheme. J. Sci. Comput. 78(2): 1111-1131 (2019) - Tian-Fu Lee
, Yin-Yu Diao, Yi-Pei Hsieh:
A ticket-based multi-server biometric authentication scheme using extended chaotic maps for telecare medical information systems. Multim. Tools Appl. 78(22): 31649-31672 (2019) - Lintao Liu
, Yuliang Lu
, Xuehu Yan
:
Polynomial-based extended secret image sharing scheme with reversible and unexpanded covers. Multim. Tools Appl. 78(2): 1265-1287 (2019) - Kanakkath Praveen, Sethumadhavan Madathil, Ramakrishnan Krishnan:
Deterministic extended visual cryptographic schemes for general access structures with OR-AND and XOR-AND operations. Multim. Tools Appl. 78(2): 1315-1344 (2019) - William Chaves de Souza Carvalho, Pedro Frosi Rosa, Flávio de Oliveira Silva
:
Extended Scheme Mediation Integration Model for Information Systems Project Proposal. AINA Workshops 2019: 183-192 - Marios Belk, Christos Fidas, Andreas Pitsillides:
FlexPass: Symbiosis of Seamless User Authentication Schemes in IoT. CHI Extended Abstracts 2019 - Mayank Chadha, Michael D. Todd:
On the derivatives of curvature of framed space curve and their time-updating scheme: Extended version with MATLAB code. CoRR abs/1907.11271 (2019) - Sasan Tavakkol, Sangyoung Son, Patrick J. Lynett:
Adaptive Third Order Adams-Bashforth Time Stepping Scheme for 2D Extended Boussinesq Equations. CoRR abs/1909.04153 (2019) - Dianming Hou
, Hongyi Zhu, Chuanju Xu:
Highly efficient and accurate schemes for time fractional Allen-Cahn equation by using extended SAV approach. CoRR abs/1910.09087 (2019) - Ahto Buldas, Denis Firsov, Risto Laanoja, Henri Lakk, Ahto Truu:
A New Approach to Constructing Digital Signature Schemes (Extended Paper). IACR Cryptol. ePrint Arch. 2019: 673 (2019) - 2018
- Chun-Ta Li
, Tsu-Yang Wu
, Chien-Ming Chen
:
A Provably Secure Group Key Agreement Scheme With Privacy Preservation for Online Social Networks Using Extended Chaotic Maps. IEEE Access 6: 66742-66753 (2018)
skipping 205 more matches
loading more results
failed to load more results, please try again later

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
retrieved on 2021-04-16 22:31 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint