Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 29 matches
- 2021
- Samar Ben Ammar, Mario G. C. A. Cimino, Pierfrancesco Foglia, Federico A. Galatolo, Issam Nouiri:
Multi-objective optimization of water distribution networks via NSGA-II and Pseudo-Weights. EUC 2021: 181-186 - Marouene Boubakri, Fausto Chiatante, Belhassen Zouari:
Open Portable Trusted Execution Environment framework for RISC-V. EUC 2021: 1-8 - Hendrik Meyer zum Felde, Mathias Morbitzer, Julian Schütte:
Securing Remote Policy Enforcement by a Multi-Enclave based Attestation Architecture. EUC 2021: 102-108 - Asif Raza Kazmi, Mehreen Afzal, Haider Abbas, Shahzaib Tahir, Abdul Rauf:
Is Blockchain Overrated? EUC 2021: 187-192 - Qiran Kong, Yirui Wu, Shaohua Wan:
PolarText: Single-stage Scene Text Detection with Polar Representation. EUC 2021: 1-8 - Xiao Li, Yufeng Wang, Jianhua Ma, Qun Jin:
VFAT: A Personalized HAR Scheme Through Exploiting Virtual Feature Adaptation Based on Transfer Learning. EUC 2021: 1-8 - Haining Meng, Wei Li, Wenjiang Ji, Yi Zheng, Xinyu Tong, Xinhong Hei:
Forecasting the Track Irregularity of High-speed Railway based on a WT-GA-GRU Model. EUC 2021: 8-14 - Nang Hung Nguyen, Phi Le Nguyen, Hieu Dinh, Thanh-Hung Nguyen, Kien Nguyen:
Multi-Agent Multi-Armed Bandit Learning for Offloading Delay Minimization in V2X Networks. EUC 2021: 47-55 - Jonathan Oliver, Josiah Hagen:
Designing the Elements of a Fuzzy Hashing Scheme. EUC 2021: 1-6 - Weihui Qiu, Xin Yang, Ming Wei, Wei Ren, Tianqing Zhu:
A Blockchain-based Fast Authentication and Collaborative Video Data Forwarding Scheme for Vehicular Networks. EUC 2021: 56-63 - Bahman A. Sassani Sarrafpour, Abdulaziz Alomirah, Shaning Pang, Soshian Sarrafpour:
Coding Observer Nodes for Sybil Attacks Detection in Mobile Wireless Sensor Networks. EUC 2021: 87-94 - Bahman A. Sassani Sarrafpour, Reem A. Alomirah, Soshian Sarrafpour, Hamid Sharifzadeh:
An Adaptive Edge-Based Steganography Algorithm for Hiding Text into Images. EUC 2021: 109-116 - Waleed Bin Shahid, Haider Abbas, Baber Aslam, Hammad Afzal, Saad Bin Khalid:
A Framework to Optimize Deep Learning based Web Attack Detection Using Attacker Categorization. EUC 2021: 95-101 - Ryota Shimomura, Hiroshi Oyama, Takuya Azumi:
Dynamically Interchangeable Framework for Component Behavior of Embedded Component Systems. EUC 2021: 15-22 - Junwei Tang, Ruixuan Li, Zhiqiang Xiong, Hongmu Han, Xiwu Gu:
Detecting Privacy Leaks in Android Hybrid Applications Based on Dynamic Taint Tracking. EUC 2021: 193-200 - Qi Tang, Jiachen Shen, Zhenfu Cao, Xiaolei Dong:
PSSBP: A Privacy-preserving Scope-query Searchable Encryption Scheme Based on Blockchain for Parking Lots Sharing in Vehicular Networks. EUC 2021: 1-8 - Yunting Tao, Fanyu Kong, Jia Yu, Qiuliang Xu:
Modification and Performance Improvement of Paillier Homomorphic Cryptosystem. EUC 2021: 131-136 - Cong Wang, Yunhe Cui, Qing Qian, Guowei Shen, Hongfeng Gao, Saifei Li:
METER: An Ensemble DWT-based Method for Identifying Low-rate DDoS Attack in SDN. EUC 2021: 79-86 - Hongyu Wang, Xiaolei Tang, Liming Sheng, Wenqiang Li, Jun Shen, Jun Tao:
scList: A PCRAM-based Hybrid Memory Management Scheme. EUC 2021: 1-7 - Yupeng Wang, Xin Zhou, Xinyue Fan:
A Q- Learning based Routing Optimization Model in a Software Defined Network. EUC 2021: 143-150 - Zhijun Wu, Jia Nie, Yue Yin, Hui Wang:
Verified CSAC-Based CP-ABE Access Control of Cloud Storage in SWIM. EUC 2021: 72-78 - Benze Wu, Yirui Wu, Shaohua Wan:
An Image Enhancement Method for Few-shot Classification. EUC 2021: 1-7 - Benze Wu, Yirui Wu, Shaohua Wan:
A Image Enhancement Method for Few-shot Classification. EUC 2021: 201-207 - Xiaotong Wu, Xiaolong Xu, Shaohua Wan, Lianyong Qi:
Private Estimation of Symptom Distribution for Infectious Disease Analysis in Edge Computing. EUC 2021: 31-38 - Chengyi Yang, Feng Liu, Siyuan Shen, Jiayin Qi:
An Energy-aware Approach with Spectrum Detection in Wireless Sensor Networks. EUC 2021: 1-7 - Lin Yao, Jia Li, Guowei Wu, Bin Wu:
New Dynamic Switch Migration Technique Based on Deep Q-learning. EUC 2021: 125-130 - Xuebiao Yuchi, Zhiwei Yan, Kejun Dong, Hongtao Li, Guanggang Geng, Sachin Shetty:
Dealing with the Domain Name Abuse: Issues and Approaches. EUC 2021: 166-173 - Muhammad Zia, Muhammad Faisal Amjad, Haider Abbas, Zafar Iqbal, Anique Azhar, Ahsan Yasin, Hasan Iesar:
A Systematic Evaluation of Android Anti-Malware Tools for Detection of Contemporary Malware. EUC 2021: 117-124 - Shaohua Wan, Xiaochun Cheng, Celimuge Wu:
19th IEEE International Conference on Embedded and Ubiquitous Computing, EUC 2021, Shenyang, China, October 20-22, 2021. IEEE 2021, ISBN 978-1-6654-0036-7 [contents]
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-29 17:09 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint