
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 943 matches
- 2021
- Olivier Blazy
, Emmanuel Conchon
, Mathieu Klingler
, Damien Sauveron
:
An IoT Attribute-Based Security Framework for Topic-Based Publish/Subscribe Systems. IEEE Access 9: 19066-19077 (2021) - Juhui Gim
, Changsun Ahn
, Huei Peng
:
Landmark Attribute Analysis for a High-Precision Landmark-Based Local Positioning System. IEEE Access 9: 18061-18071 (2021) - I. Sumaiya Thaseen
, J. Saira Banu, K. Lavanya, Muhammad Rukunuddin Ghalib, Kumar Abhishek
:
An integrated intrusion detection system using correlation-based attribute selection and artificial neural network. Trans. Emerg. Telecommun. Technol. 32(2) (2021) - Shanshan Li, He Zhang, Zijia Jia, Chenxing Zhong, Cheng Zhang, Zhihao Shan, Jinfeng Shen, Muhammad Ali Babar:
Understanding and addressing quality attributes of microservices architecture: A Systematic literature review. Inf. Softw. Technol. 131: 106449 (2021) - Majid Ashouri, Paul Davidsson, Romina Spalazzese:
Quality attributes in edge computing for the Internet of Things: A systematic mapping study. Internet Things 13: 100346 (2021) - María Luisa Díez Platas
, Salvador Ros Muñoz
, Elena González-Blanco
, Pablo Ruiz Fabo
, Elena Álvarez Mellado:
Medieval Spanish (12th-15th centuries) named entity recognition and attribute annotation system based on contextual information. J. Assoc. Inf. Sci. Technol. 72(2): 224-238 (2021) - Pandu Sowkuntla
, Sravya Dunna
, P. S. V. S. Sai Prasad
:
MapReduce based parallel attribute reduction in Incomplete Decision Systems. Knowl. Based Syst. 213: 106677 (2021) - Dokyun Lee, Kartik Hosanagar:
How Do Product Attributes and Reviews Moderate the Impact of Recommender Systems Through Purchase Stages? Manag. Sci. 67(1): 524-546 (2021) - Dandan Zhu, Jun-qing Sun:
The Path Optimization Algorithm of Car Navigation System considering Node Attributes under Time-Invariant Network. Mob. Inf. Syst. 2021: 2963092:1-2963092:20 (2021) - Yassine Afoudi, Mohamed Lazaar, Mohammed Al Achhab:
Intelligent recommender system based on unsupervised machine learning and demographic attributes. Simul. Model. Pract. Theory 107: 102198 (2021) - 2020
- Pankaj Pathak, Parashu Ram Pal:
Data Mining Multi-Attribute Decision System. Facilitating Decision Support Through Data Mining Technique by Hierarchical Multi-Attribute Decision Models. Symbiosis International University, Pune, Maharashtra, India, GRIN Verlag 2020 - Jochen Saßmannshausen:
Attribute-based access control for smart grids and industrial automation and control systems. University of Siegen, Germany, Shaker Verlag 2020, ISBN 978-3-8440-7507-6, pp. 1-297 - Fatbardh Veseli:
A framework for evaluating privacy-enhanced attribute-based credential systems. Goethe University Frankfurt, Frankfurt am Main, Germany, 2020, pp. 1-233 - Khalid Alsubhi
, Muhammad Usman Ashraf
, Iqra Ilyas
:
HBLP: A Privacy Protection Framework for TIP Attributes in NTTP-Based LBS Systems. IEEE Access 8: 67718-67734 (2020) - Xi Chen
, Yun Liu, Han-Chieh Chao
, Yong Li
:
Ciphertext-Policy Hierarchical Attribute-Based Encryption Against Key-Delegation Abuse for IoT-Connected Healthcare System. IEEE Access 8: 86630-86650 (2020) - Qianqian Su
, Rui Zhang
, Rui Xue
, Pengchao Li:
Revocable Attribute-Based Signature for Blockchain-Based Healthcare System. IEEE Access 8: 127884-127896 (2020) - Sichun Wang
, Yini Wang:
Uncertainty Measurement for a Hybrid Information System With Images: An Application in Attribute Reduction. IEEE Access 8: 180491-180509 (2020) - Chen Yan
, Haidong Zhang
:
Attribute Reduction Methods Based on Pythagorean Fuzzy Covering Information Systems. IEEE Access 8: 28484-28495 (2020) - Qingzhao Kong, Xiawei Zhang, Weihua Xu, Shutong Xie:
Attribute reducts of multi-granulation information system. Artif. Intell. Rev. 53(2): 1353-1371 (2020) - Marco Rasori, Pericle Perazzo, Gianluca Dini:
A lightweight and scalable attribute-based encryption system for smart cities. Comput. Commun. 149: 78-89 (2020) - Nuray Baltaci Akhuseyinoglu
, James Joshi:
A constraint and risk-aware approach to attribute-based access control for cyber-physical systems. Comput. Secur. 96: 101802 (2020) - Robin Doss
, Rolando Trujillo-Rasua, Selwyn Piramuthu:
Secure attribute-based search in RFID-based inventory control systems. Decis. Support Syst. 132: 113270 (2020) - Sihai Zhao, Yucheng Dong, Ying He
:
The reliability analysis of rating systems in decision making: When scale meets multi-attribute additive value model. Decis. Support Syst. 138: 113384 (2020) - Ryo Okishima, Toru Nakanishi:
An Anonymous Credential System with Constant-Size Attribute Proofs for CNF Formulas with Negations. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 103-A(12): 1381-1392 (2020) - Sumathi M., S. Sangeetha:
Blockchain Based Sensitive Attribute Storage and Access Monitoring in Banking System. Int. J. Cloud Appl. Comput. 10(2): 77-92 (2020) - Xixi Yan, Chaochao Yang, Qichao Zhang, Jinxia Yu:
Revocable ciphertext-policy attribute-based encryption in data outsourcing systems from lattices. Int. J. Embed. Syst. 13(4): 414-421 (2020) - Li Kang, Leyou Zhang:
A Privacy-Preserving Data Sharing System with Decentralized Attribute-based Encryption Scheme. Int. J. Netw. Secur. 22(5): 815-827 (2020) - Zhenhua Liu, Yan Liu, Jing Xu, Baocang Wang:
Verifiable Attribute-based Keyword Search Encryption with Attribute Revocation for Electronic Health Record System. Int. J. Netw. Secur. 22(5): 845-856 (2020) - Lianjie Dong
, Degang Chen, Ning-Ling Wang, Zhanhui Lu:
Key energy-consumption feature selection of thermal power systems based on robust attribute reduction with rough sets. Inf. Sci. 532: 61-71 (2020) - Ping Huang
, Chao Wen, Liping Fu, Qiyuan Peng, Yixiong Tang:
A deep learning approach for multi-attribute data: A study of train delay prediction in railway systems. Inf. Sci. 516: 234-253 (2020)
skipping 913 more matches
loading more results
failed to load more results, please try again later

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
retrieved on 2021-03-09 12:38 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint