
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 154 matches
- 2021
- Junichi Tomida, Atsushi Fujioka, Akira Nagai, Koutarou Suzuki:
Strongly Secure Identity-Based Key Exchange with Single Pairing Operation. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 104-A(1): 58-68 (2021) - Chao Li, Balaji Palanisamy, Runhua Xu, Jinlai Xu, Jingzhe Wang:
SteemOps: Extracting and Analyzing Key Operations in Steemit Blockchain-based Social Media Platform. CoRR abs/2102.00177 (2021) - 2020
- Jessica Bruch, Carin Rösiö, Anna Granlund, Peter E. Johansson:
Managing the core plant role - key prerequisites from an operations perspective. Int. J. Manuf. Res. 15(1): 90-106 (2020) - Brijesh Jethva, Issa Traoré, Asem Ghaleb, Karim Ganame, Sherif Ahmed:
Multilayer ransomware detection using grouped registry key operations, file entropy and file signature monitoring. J. Comput. Secur. 28(3): 337-373 (2020) - Junhu Ruan, Xiangpei Hu, Xuexi Huo
, Yan Shi, Felix T. S. Chan
, Xuping Wang, Gunasekaran Manogaran, George Mastorakis, Constandinos X. Mavromoustakis, Xiaofeng Zhao:
An IoT-based E-business model of intelligent vegetable greenhouses and its key operations management issues. Neural Comput. Appl. 32(19): 15341-15356 (2020) - Pranshu Bajpai
, Richard J. Enbody:
Dissecting .NET ransomware: key generation, encryption and operation. Netw. Secur. 2020(2): 8-14 (2020) - Anqi Huang:
Drastic increase of key rate in continuous-variable quantum key distribution using multimode states and non-Gaussian operations. Quantum Eng. 2(3) (2020) - Jinhua Su
, Yanbing Bai
, Xingrui Wang, Dong Lu, Bo Zhao, Hanfang Yang, Erick Mas
, Shunichi Koshimura
:
Technical Solution Discussion for Key Challenges of Operational Convolutional Neural Network-Based Building-Damage Assessment from Satellite Imagery: Perspective from Benchmark xBD Dataset. Remote. Sens. 12(22): 3808 (2020) - Hessam Golmohamadi
, Reza Keypour
, Birgitte Bak-Jensen
, Jayakrishnan R. Pillai
, Mohammad Hassan Khooban
:
Robust Self-Scheduling of Operational Processes for Industrial Demand Response Aggregators. IEEE Trans. Ind. Electron. 67(2): 1387-1395 (2020) - Ge Cao
, Wei Gu
, Peixin Li, Wanxing Sheng, Ke-yan Liu
, Lijing Sun, Zhihuang Cao, Jing Pan:
Operational Risk Evaluation of Active Distribution Networks Considering Cyber Contingencies. IEEE Trans. Ind. Informatics 16(6): 3849-3861 (2020) - Tobias A. Eriksson, Ruben S. Luís, Georg Rademacher, Benjamin J. Puttnam, Kadir Gümüs, Laurent Schmalen, Alex Alvarado, Hideaki Furukawa, Naoya Wada, Takuya Hirano, Masahide Sasaki, Masahiro Takeoka:
Challenges in Coding, DSP and Parallel Operation of Quantum Key Distribution and Coherent Data Transmission. ECOC 2020: 1-4 - Ilan Kirsh
, Mike Joy
:
An HCI Approach to Extractive Text Summarization: Selecting Key Sentences Based on User Copy Operations. HCI (48) 2020: 335-341 - Liang Han, Ning Wu, Fen Ge, Fang Zhou, Jin Wen, Peiyao Qing:
Differential Fault Attack for the Iterative Operation of AES-192 Key Expansion. ICCT 2020: 1156-1160 - Md Hasibul Islam
, Zuhara Chavez, Seyoum Eshetu Birkie
, Monica Bellgran
:
Key Factors on Utilizing the Production System Design Phase for Increasing Operational Performance. APMS (2) 2020: 740-748 - Rui Zhou, Shiji Song, Anke Xue, Keyou You, Hu Wu:
Smart Train Operation Algorithms based on Expert Knowledge and Reinforcement Learning. CoRR abs/2003.03327 (2020) - Ludovico Lami, Ladislav Mista Jr., Gerardo Adesso:
Fundamental limitations to key distillation from Gaussian states with Gaussian operations. CoRR abs/2010.15729 (2020) - 2019
- Nuno M. Garcia
, Fábio Machado Gil, Bárbara Matos, Yahaya Coulibaly, Nuno Pombo
, Rossitza Ivanova Goleva:
Keyed User Datagram Protocol: Concepts and Operation of an Almost Reliable Connectionless Transport Protocol. IEEE Access 7: 18951-18963 (2019) - Felipe Cabarcas
, Daniel Cabarcas, John Baena:
Efficient public-key operation in multivariate schemes. Adv. Math. Commun. 13(2): 343-371 (2019) - Aleksander Cislak, Szymon Grabowski:
Lightweight Fingerprints for Fast Approximate Keyword Matching Using Bitwise Operations. Comput. Informatics 38(2): 367-389 (2019) - Bin Liao, Tao Zhang, Min Li, Jiong Yu, Binglei Guo, Yan Liu:
基于操作历史图的分布式Key-Value数据库一致性检测算法 (Consistency Checking Algorithm for Distributed Key-Value Database Based on Operation History Graph). 计算机科学 46(12): 213-219 (2019) - Wajih Halim Boukaram, George Turkiyyah, David E. Keyes
:
Randomized GPU Algorithms for the Construction of Hierarchical Matrices from Matrix-Vector Operations. SIAM J. Sci. Comput. 41(4): C339-C366 (2019) - Hassan N. Noura, Ali Chehab, Raphaël Couturier
:
Efficient & secure cipher scheme with dynamic key-dependent mode of operation. Signal Process. Image Commun. 78: 448-464 (2019) - Qingchao Jiang
, Furong Gao
, Hui Yi
, Xuefeng Yan
:
Multivariate Statistical Monitoring of Key Operation Units of Batch Processes Based on Time-Slice CCA. IEEE Trans. Control. Syst. Technol. 27(3): 1368-1375 (2019) - Wajih Halim Boukaram, George Turkiyyah, David E. Keyes
:
Hierarchical Matrix Operations on GPUs: Matrix-Vector Multiplication and Compression. ACM Trans. Math. Softw. 45(1): 3:1-3:28 (2019) - Junichi Tomida, Atsushi Fujioka, Akira Nagai, Koutarou Suzuki:
Strongly Secure Identity-Based Key Exchange with Single Pairing Operation. ESORICS (2) 2019: 484-503 - David Graf, Werner Retschitzegger, Wieland Schwinger, Elisabeth Kapsammer, Birgit Pröll, Norbert Baumgartner:
Towards Operational Technology Monitoring in Intelligent Transportation Systems: Key Challenges and Research Roadmap. MEDES 2019: 237-241 - Francesco Corman, Jonas Henken, Mehdi Keyvan-Ekbatani:
Macroscopic fundamental diagrams for train operations - are we there yet? MT-ITS 2019: 1-8 - Heasin Ko, Joong-Seon Choe, Byung-Seok Choi, Kap-Joong Kim, Jong-Hoi Kim, Yongsoon Baek, Chun Ju Youn:
Daylight Operation of a High-Speed Free-Space Quantum Key Distribution using Silica-Based Integration Chip and Micro-Optics-Based Module. OFC 2019: 1-3 - Wajih Halim Boukaram, George Turkiyyah, David E. Keyes
:
Hierarchical Matrix Operations on GPUs: Matrix-Vector Multiplication and Compression. CoRR abs/1902.01829 (2019) - 2018
- Keyvan Bayram:
Steigerung des Situationsbewusstseins von Verkehrspiloten durch integrierte Verarbeitung operationeller Flugdaten. Braunschweig University of Technology, Germany, 2018, ISBN 978-3-947623-09-9, pp. 1-214
skipping 124 more matches
loading more results
failed to load more results, please try again later

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
retrieved on 2021-04-13 21:43 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint