
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 3,372 matches
- 2021
- Yangzhe Liao, Xinhui Qiao, Quan Yu, Quan Liu:
Intelligent dynamic service pricing strategy for multi-user vehicle-aided MEC networks. Future Gener. Comput. Syst. 114: 15-22 (2021) - Harumasa Tada, Masayuki Murata, Masaki Aida:
Mitigation of Flash Crowd in Web Services By Providing Feedback Information to Users. IEICE Trans. Inf. Syst. 104-D(1): 63-75 (2021) - Ikramul Hasan, Samiul Parvez Ahmed, Sarwar Uddin Ahmed, Tanzina Binte Yousuf:
Factors influencing users' willingness for online messaging services: a developing country perspective. Int. J. Mob. Commun. 19(1): 75-98 (2021) - Qihua Liu, Bingyu Xue, Shan Huang:
Investigating users switching intention for mobile map services: an extension of the push-pull-mooring model. Int. J. Mob. Commun. 19(1): 99-120 (2021) - Yuantian Miao, Minhui Xue, Chao Chen, Lei Pan, Jun Zhang, Benjamin Zi Hao Zhao, Dali Kaafar, Yang Xiang:
The Audio Auditor: User-Level Membership Inference in Internet of Things Voice Services. Proc. Priv. Enhancing Technol. 2021(1): 209-228 (2021) - 2020
- Bernd Herrenkind:
Driving the future diffusion of mobility: investigating user acceptance of autonomous driving in shared mobility services. University of Göttingen, Germany, Cuvillier Verlag 2020, ISBN 978-3-7369-7214-8, pp. 1-240 - Jing Bai
, Xiaolin Chang
, Fumio Machida
, Kishor S. Trivedi
, Zhen Han
:
Analyzing Software Rejuvenation Techniques in a Virtualized System: Service Provider and User Views. IEEE Access 8: 6448-6459 (2020) - Ana Dominguez
, Julián Flórez, Alberto Lafuente, Stefano Masneri
, Iñigo Tamayo
, Mikel Zorrilla
:
A Methodology for User Interface Adaptation of Multi-Device Broadcast-Broadband Services. IEEE Access 8: 211048-211062 (2020) - Francisco Gallardo
, Antonio Pérez Yuste
:
SCER Spoofing Attacks on the Galileo Open Service and Machine Learning Techniques for End-User Protection. IEEE Access 8: 85515-85532 (2020) - Chen Huang
, Jiannong Cao
, Shihui Wang
, Yan Zhang
:
Dynamic Resource Scheduling Optimization With Network Coding for Multi-User Services in the Internet of Vehicles. IEEE Access 8: 126988-127003 (2020) - J. Indumathi, Achyut Shankar, Muhammad Rukunuddin Ghalib, J. Gitanjali, Qiaozhi Hua
, Zheng Wen
, Xin Qi:
Block Chain Based Internet of Medical Things for Uninterrupted, Ubiquitous, User-Friendly, Unflappable, Unblemished, Unlimited Health Care Services (BC IoMT U6 HCS). IEEE Access 8: 216856-216872 (2020) - Lili Jiang
, Xiaolin Chang
, Jing Bai
, Jelena V. Misic
, Vojislav B. Misic
, Zhi Chen
:
Dependability Analysis of 5G-AKA Authentication Service From Server and User Perspectives. IEEE Access 8: 89562-89574 (2020) - Chen-Yu Li
, Chien-Cheng Huang
, Feipei Lai
, San-Liang Lee
, Jingshown Wu
, Rong-Chi Chang
, Hsiang-Wei Huang
:
Mobile Social Service User Identification Framework Based on Action-Characteristic Data Retention. IEEE Access 8: 127748-127767 (2020) - Farrukh Nadeem
:
A Unified Framework for User-Preferred Multi-Level Ranking of Cloud Computing Services Based on Usability and Quality of Service Evaluation. IEEE Access 8: 180054-180066 (2020) - Juan Sebastián Rojas
, Adrián Pekár
, Álvaro Rendón Gallón
, Juan Carlos Corrales
:
Smart User Consumption Profiling: Incremental Learning-Based OTT Service Degradation. IEEE Access 8: 207426-207442 (2020) - Vilc Queupe Rufino
, Mateus Schulz Nogueira
, Alberto Avritzer
, Daniel Sadoc Menasché
, Barbara Russo
, Andrea Janes
, Vincenzo Ferme
, André van Hoorn
, Henning Schulz
, Cabral Lima
:
Improving Predictability of User-Affecting Metrics to Support Anomaly Detection in Cloud Services. IEEE Access 8: 198152-198167 (2020) - Besfort Shala
, Ulrich Trick, Armin Lehmann
, Bogdan Ghita
, Stavros Shiaeles
:
Blockchain and Trust for Secure, End-User-Based and Decentralized IoT Service Provision. IEEE Access 8: 119961-119979 (2020) - E. Natasha Stavros
, Catalina M. Oaida
, Jessica Hausman, Michelle M. Gierach:
A Quantitative Framework to Inform Cloud Data System Architecture and Services Requirements Based on User Needs and Expected Demand. IEEE Access 8: 138088-138101 (2020) - Yi-Sheng Wang:
The application of netnography to the online dating service experiences of female users. Behav. Inf. Technol. 39(2): 226-240 (2020) - Pedro Valderas
, Victoria Torres
, Vicente Pelechano:
Towards the Composition of Services by End-Users. Bus. Inf. Syst. Eng. 62(4): 305-321 (2020) - Xiaofei Zhang, Chunxiao Yin, Xitong Guo, Kee-hung Lai, Joseph S. Valacich:
The Role of Decision Rationality on Users' Attitudes toward Utilitarian Mobile Service Usage. Commun. Assoc. Inf. Syst. 46: 10 (2020) - Yan Wang
, Jiantao Zhou, Xinyuan Li, Xiaoyu Song:
Effective User Preference Clustering in Web Service Applications. Comput. J. 63(11): 1633-1643 (2020) - Emanuele Di Pascale, Hamed Ahmadi, Linda Doyle, Irene Macaluso:
Toward Scalable User-Deployed Ultra-Dense Networks: Blockchain-Enabled Small Cells as a Service. IEEE Commun. Mag. 58(8): 82-88 (2020) - Husam Al Jawaheri
, Mashael Al Sabah, Yazan Boshmaf, Aiman Erbad
:
Deanonymizing Tor hidden service users through Bitcoin transactions analysis. Comput. Secur. 89 (2020) - Mashael M. Alsulami, Arwa Y. Al-Aama:
Employing Behavioral Analysis to Predict User Attitude towards Unwanted Content in Online Social Network Services: The Case of Makkah Region in Saudi Arabia. Comput. 9(2): 34 (2020) - Shigeo Shioda
, Keisuke Nakajima, Masato Minamikawa:
Information Spread across Social Network Services with Non-Responsiveness of Individual Users. Comput. 9(3): 65 (2020) - Pedro Valderas
, Victoria Torres
, Vicente Pelechano:
A social network for supporting end users in the composition of services: definition and proof of concept. Computing 102(8): 1909-1940 (2020) - Mayssa Fayala, Haithem Mezni
:
Web service recommendation based on time-aware users clustering and multi-valued QoS prediction. Concurr. Comput. Pract. Exp. 32(9) (2020) - Xueqin Wang
, Yiik Diew Wong
, Chee Chong Teo
, Kum Fai Yuen
, Xuehao Feng:
The four facets of self-collection service for e-commerce delivery: Conceptualisation and latent class analysis of user segments. Electron. Commer. Res. Appl. 39: 100896 (2020) - Haidong Zhong, Hongbo Lyu, Shaozhong Zhang, Ping Li, Zuopeng Justin Zhang
, Li Da Xu:
Measuring user similarity using check-ins from LBSN: a mobile recommendation approach for e-commerce and security services. Enterp. Inf. Syst. 14(3): 368-387 (2020)
skipping 3,342 more matches
loading more results
failed to load more results, please try again later

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
retrieved on 2021-01-27 03:13 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint