Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 45 matches
- 2020
- Tarek F. Abdelzaher, Yifan Hao, Kasthuri Jayarajah, Archan Misra, Per Skarin, Shuochao Yao, Dulanga Weerakoon, Karl-Erik Årzén:
Five Challenges in Cloud-enabled Intelligence and Control. ACM Trans. Internet Techn. 20(1): 3:1-3:19 (2020) - Nikolaos Athanasios Anagnostopoulos, Saad Ahmad, Tolga Arul, Daniel Steinmetzer, Matthias Hollick, Stefan Katzenbeisser:
Low-cost Security for Next-generation IoT Networks. ACM Trans. Internet Techn. 20(3): 30:1-30:31 (2020) - Flor Miriam Plaza del Arco, M. Dolores Molina-González, Luis Alfonso Ureña López, María Teresa Martín-Valdivia:
Detecting Misogyny and Xenophobia in Spanish Tweets Using Language Technologies. ACM Trans. Internet Techn. 20(2): 12:1-12:19 (2020) - Zakaria Benomar, Francesco Longo, Giovanni Merlino, Antonio Puliafito:
Cloud-based Enabling Mechanisms for Container Deployment and Migration at the Network Edge. ACM Trans. Internet Techn. 20(3): 25:1-25:28 (2020) - Ting Chen, Zihao Li, Yuxiao Zhu, Jiachi Chen, Xiapu Luo, John Chi-Shing Lui, Xiaodong Lin, Xiaosong Zhang:
Understanding Ethereum via Graph Analysis. ACM Trans. Internet Techn. 20(2): 18:1-18:32 (2020) - Jiaoyan Chen, Laurence T. Yang, Xianjun Deng, Xianggong Hong, Lingzhi Yi:
Optimal Receiver Placement for K-barrier Coverage in Passive Bistatic Radar Sensor Networks. ACM Trans. Internet Techn. 20(3): 24:1-24:23 (2020) - Xia Cheng, Junyang Shi, Mo Sha:
Cracking Channel Hopping Sequences and Graph Routes in Industrial TSCH Networks. ACM Trans. Internet Techn. 20(3): 23:1-23:28 (2020) - Michele Corazza, Stefano Menini, Elena Cabrio, Sara Tonelli, Serena Villata:
A Multilingual Evaluation for Online Hate Speech Detection. ACM Trans. Internet Techn. 20(2): 10:1-10:22 (2020) - Rossana Damiano, Viviana Patti, Chloé Clavel, Paolo Rosso:
Introduction to the Special Section on Computational Modeling and Understanding of Emotions in Conflictual Social Interactions. ACM Trans. Internet Techn. 20(2): 8:1-8:5 (2020) - Marcel Enguehard, Yoann Desmouceaux, Giovanna Carofiglio:
Efficient Latency Control in Fog Deployments via Hardware-Accelerated Popularity Estimation. ACM Trans. Internet Techn. 20(3): 21:1-21:23 (2020) - Giuseppe Faraci, Christian Grasso, Giovanni Schembra:
Fog in the Clouds: UAVs to Provide Edge Computing to IoT Devices. ACM Trans. Internet Techn. 20(3): 26:1-26:26 (2020) - Weichao Gao, James H. Nguyen, Yalong Wu, William G. Hatcher, Wei Yu:
Routing in Large-scale Dynamic Networks: A Bloom Filter-based Dual-layer Scheme. ACM Trans. Internet Techn. 20(4): 38:1-38:24 (2020) - Xiaoyu Ge, Panos K. Chrysanthis, Konstantinos Pelechrinis, Demetrios Zeinalipour-Yazti, Mohamed A. Sharaf:
Serendipity-based Points-of-Interest Navigation. ACM Trans. Internet Techn. 20(4): 33:1-33:32 (2020) - Bilal Ghanem, Paolo Rosso, Francisco M. Rangel Pardo:
An Emotional Analysis of False Information in Social Media and News Articles. ACM Trans. Internet Techn. 20(2): 19:1-19:18 (2020) - Krit Gupta, Aditya Gujral, Theodora Chaspari, Adela C. Timmons, Sohyun C. Han, Yehsong Kim, Sarah Barrett, Stassja Sichko, Gayla Margolin:
Sub-Population Specific Models of Couples' Conflict. ACM Trans. Internet Techn. 20(2): 9:1-9:20 (2020) - Zhengdi Hu, Guangquan Xu, Xi Zheng, Jiang Liu, Zhangbing Li, Quan Z. Sheng, Wenjuan Lian, Hequn Xian:
SSL-SVD: Semi-supervised Learning-based Sparse Trust Recommendation. ACM Trans. Internet Techn. 20(1): 4:1-4:20 (2020) - Chunli Huang, Wenjun Jiang, Jie Wu, Guojun Wang:
Personalized Review Recommendation based on Users' Aspect Sentiment. ACM Trans. Internet Techn. 20(4): 42:1-42:26 (2020) - Xingbin Jiang, Michele Lora, Sudipta Chattopadhyay:
An Experimental Analysis of Security Vulnerabilities in Industrial IoT Devices. ACM Trans. Internet Techn. 20(2): 16:1-16:24 (2020) - Kostas Kolomvatsos, Christos Anagnostopoulos:
An Intelligent Edge-centric Queries Allocation Scheme based on Ensemble Models. ACM Trans. Internet Techn. 20(4): 45:1-45:25 (2020) - Ling Liu:
Internet Technology Outlook: From Communication to Storage and Cognitive Computing. ACM Trans. Internet Techn. 20(1): 1:1-1:4 (2020) - Grigorios Loukides, Robert Gwadera, Shing-Wan Chang:
Overexposure-Aware Influence Maximization. ACM Trans. Internet Techn. 20(4): 39:1-39:31 (2020) - Marcin Luckner, Maciej Grzenda, Robert Kunicki, Jaroslaw Legierski:
IoT Architecture for Urban Data-Centric Services and Applications. ACM Trans. Internet Techn. 20(3): 29:1-29:30 (2020) - Slava Novgorodov, Ido Guy, Guy Elad, Kira Radinsky:
Descriptions from the Customers: Comparative Analysis of Review-based Product Description Generation Methods. ACM Trans. Internet Techn. 20(4): 44:1-44:31 (2020) - Michalis Pachilakis, Antonios A. Chariton, Panagiotis Papadopoulos, Panagiotis Ilia, Eirini Degkleri, Evangelos P. Markatos:
Design and Implementation of a Compressed Certificate Status Protocol. ACM Trans. Internet Techn. 20(4): 34:1-34:25 (2020) - Amitangshu Pal, Krishna Kant:
Exploiting Proxy Sensing for Efficient Monitoring of Large-Scale Sensor Networks. ACM Trans. Internet Techn. 20(2): 14:1-14:31 (2020) - Amitangshu Pal, Mayank Raj, Krishna Kant, Sajal K. Das:
A Smartphone-based Network Architecture for Post-disaster Operations Using WiFi Tethering. ACM Trans. Internet Techn. 20(1): 6:1-6:27 (2020) - Kyriaki Panagidi, Christos Anagnostopoulos, A. Chalvatzaras, Stathes Hadjiefthymiades:
To Transmit or Not to Transmit: Controlling Communications in the Mobile IoT Domain. ACM Trans. Internet Techn. 20(3): 22:1-22:23 (2020) - Demetris Paschalides, Dimosthenis Stephanidis, Andreas Andreou, Kalia Orphanou, George Pallis, Marios D. Dikaiakos, Evangelos P. Markatos:
MANDOLA: A Big-Data Processing and Visualization Platform for Monitoring and Detecting Online Hate Speech. ACM Trans. Internet Techn. 20(2): 11:1-11:21 (2020) - Rui Pascoal, Ana de Almeida, Rute C. Sofia:
Mobile Pervasive Augmented Reality Systems - MPARS: The Role of User Preferences in the Perceived Quality of Experience in Outdoor Applications. ACM Trans. Internet Techn. 20(1): 7:1-7:17 (2020) - Calton Pu, Abhijit Suprem, Rodrigo Alves Lima, Aibek Musaev, De Wang, Danesh Irani, Steve Webb, João Eduardo Ferreira:
Beyond Artificial Reality: Finding and Monitoring Live Events from Social Sensors. ACM Trans. Internet Techn. 20(1): 2:1-2:21 (2020)
skipping 15 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-25 11:45 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint