
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
Likely matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 283 matches
- 2021
- Pawel Garbacz, Bogumil Szady, Agnieszka Lawrynowicz:
Identity of historical localities in information systems. Appl. Ontology 16(1): 55-86 (2021) - Xiangjie Kong
, Mengyi Mao, Wei Wang
, Jiaying Liu
, Bo Xu
:
VOPRec: Vector Representation Learning of Papers with Text Information and Structural Identity for Recommendation. IEEE Trans. Emerg. Top. Comput. 9(1): 226-237 (2021) - Hossein Mosafer, Jalal Sarabadani:
Identity in the Digital Age: A Review of Information Technology Identity (ITID) Research in Information Systems. HICSS 2021: 1-10 - Alexander Puchta, Sebastian Groll, Günther Pernul:
Leveraging Dynamic Information for Identity and Access Management: An Extension of Current Enterprise IAM Architecture. ICISSP 2021: 611-618 - 2020
- Flavia Costa:
To be or not to be - a data set. Art, technology and identity in the new informational order. EAI Endorsed Trans. Creative Technol. 7(22): e4 (2020) - Xiaojun Zhang, Yao Tang, Sheng Cao, Chao Huang, Shuang Zheng:
Enabling identity-based authorized encrypted diagnostic data sharing for cloud-assisted E-health information systems. J. Inf. Secur. Appl. 54: 102568 (2020) - Aira Huttunen, Noora Hirvonen
, Lottamari Kähkönen:
Uncomfortable in my own skin - emerging, early-stage identity-related information needs of transgender people. J. Documentation 76(3): 709-729 (2020) - Jonathan Mahadeo, Zahra Hazari, Geoff Potvin:
Developing a Computing Identity Framework: Understanding Computer Science and Information Technology Career Choice. ACM Trans. Comput. Educ. 20(1): 7:1-7:14 (2020) - Michelle Carter, Stacie Petter, Varun Grover, Jason Bennett Thatcher:
Information Technology Identity: A Key Determinant of IT Feature and Exploratory Usage. MIS Q. 44(3) (2020) - Guillaume Heusch, Anjith George
, David Geissbühler, Zohreh Mostaani
, Sébastien Marcel:
Deep Models and Shortwave Infrared Information to Detect Face Presentation Attacks. IEEE Trans. Biom. Behav. Identity Sci. 2(4): 399-409 (2020) - Gabriel S. Zamudio
, Miryam Palacios-Pérez, Marco V. José
:
Information theory unveils the evolution of tRNA identity elements in the three domains of life. Theory Biosci. 139(1): 77-85 (2020) - Travis W. Windleharth:
Identity, Safety, and Information Management within Communities of Practice in Location-based Augmented Reality Games: A Case Study of Ingress. AMCIS 2020 - Siyuan Chen, Jiahai Wang, Xin Du, Yanqing Hu:
A Novel Framework with Information Fusion and Neighborhood Enhancement for User Identity Linkage. ECAI 2020: 1754-1761 - Siegfried Ludwig, Burkhardt Funk, Benjamin Mueller:
Using Natural Language Processing Techniques to Tackle the Construct Identity Problem in Information Systems Research. HICSS 2020: 1-10 - Obi Ogbanufe:
"Information Security Is Not Really My Job": Exploring Information Security Role Identity in End-Users. HICSS 2020: 1-8 - Philipp Terhörst, Daniel Fährmann, Naser Damer, Florian Kirchbuchner, Arjan Kuijper:
Beyond Identity: What Information Is Stored in Biometric Face Templates? IJCB 2020: 1-10 - Lianglang Deng, Jiangtao Luo, Jie Zhou, Junxia Wang:
Identity-based Secret Sharing Access Control Framework for Information-Centric Networking. ICCC 2020: 507-511 - Zhigang Liu:
In-domain User Identity Authentication Method for System Wide Information Management (SWIM). ICMLC 2020: 479-482 - Shiya Liu, Yue Yao, Chaoyue Xing, Tom Gedeon:
Disguising Personal Identity Information in EEG Signals. ICONIP (5) 2020: 87-95 - Ravi Tejwani, Felipe Moreno, Sooyeon Jeong, Hae Won Park, Cynthia Breazeal:
Migratable AI: Effect of identity and information migration on users' perception of conversational AI agents. RO-MAN 2020: 877-884 - Boris Nizomutdinov, Anna Borisovna Uglova, Aleksandr Tropnikov:
The Description of the Structure of Social Identity in the Information Space, Using Automated Data Processing Tools. SSI 2020: 221-233 - Michael Friedewald
, Melek Önen
, Eva Lievens
, Stephan Krenn
, Samuel Fricker:
Privacy and Identity Management. Data for Better Living: AI and Privacy - 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Windisch, Switzerland, August 19-23, 2019, Revised Selected Papers. IFIP Advances in Information and Communication Technology 576, Springer 2020, ISBN 978-3-030-42503-6 [contents] - Siyuan Chen, Jiahai Wang, Xin Du, Yanqing Hu:
A Novel Framework with Information Fusion and Neighborhood Enhancement for User Identity Linkage. CoRR abs/2003.07122 (2020) - Niloofar Tavakolian, Azadeh Nazemi, Donal Fitzpatrick:
Real-time information retrieval from Identity cards. CoRR abs/2003.12103 (2020) - Philipp Terhörst, Daniel Fährmann, Naser Damer, Florian Kirchbuchner, Arjan Kuijper:
Beyond Identity: What Information Is Stored in Biometric Face Templates? CoRR abs/2009.09918 (2020) - Shiya Liu, Yue Yao, Chaoyue Xing, Tom Gedeon:
Disguising Personal Identity Information in EEG Signals. CoRR abs/2010.08915 (2020) - Xiaofeng Liu, Linghao Jin, Xu Han, Jane You:
Mutual Information Regularized Identity-aware Facial ExpressionRecognition in Compressed Video. CoRR abs/2010.10637 (2020) - Ravi Tejwani, Cynthia Breazeal:
Migratable AI : Investigating users' affect on identity and information migration of a conversational AI agent. CoRR abs/2010.13319 (2020) - 2019
- Yu Fan
, Yongjian Liao
, Fagen Li, Shijie Zhou, Ganglin Zhang
:
Identity-Based Auditing for Shared Cloud Data With Efficient and Secure Sensitive Information Hiding. IEEE Access 7: 114246-114260 (2019) - Lee Hadlington, Masa Popovac, Helge Janicke
, Iryna Yevseyeva, Kevin I. Jones:
Exploring the role of work identity and work locus of control in information security awareness. Comput. Secur. 81: 41-48 (2019)
skipping 253 more matches
loading more results
failed to load more results, please try again later

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
retrieved on 2021-04-13 13:47 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint