Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 58 matches
- 2020
- Yi Liu, Phudit Ampririt, Ermioni Qafzezi, Kevin Bylykbashi, Leonard Barolli, Makoto Takizawa:
A Fuzzy-Based Decision System for Sightseeing Spots Considering Natural Scenery and Visiting Cost as New Parameters. EIDWT 2020: 82-88 - Usman Ali, Usman Qamar, Kanwal Wahab, Khawaja Sarmad Arif:
A Knapsack Problem Based Algorithm for Local Level Management in Smart Grid. EIDWT 2020: 301-310 - Phudit Ampririt, Seiji Ohara, Yi Liu, Makoto Ikeda, Hiroshi Maeda, Leonard Barolli:
A Fuzzy-Based System for Admission Control in 5G Wireless Networks Considering Software-Defined Network Approach. EIDWT 2020: 73-81 - Mubbashra Anwar, Afrah Naeem, Hira Gul, Arooj Arif, Sahiba Fareed, Nadeem Javaid:
Electricity Price and Load Forecasting Using Data Analytics in Smart Grid: A Survey. EIDWT 2020: 427-439 - Admir Barolli, Shinji Sakamoto, Seiji Ohara, Leonard Barolli, Makoto Takizawa:
Performance Evaluation of WMNs Using WMN-PSOHC-DGA Considering Evolution Steps and Computation Time. EIDWT 2020: 127-137 - Kevin Bylykbashi, Ermioni Qafzezi, Makoto Ikeda, Keita Matsuo, Leonard Barolli:
Effect of Driver's Condition for Driving Risk Measurement in VANETs: A Comparison Study of Simulation and Experimental Results. EIDWT 2020: 102-113 - Wei-Sheng Chen, Fang-Yie Leu:
The Study on AUSF Fault Tolerance. EIDWT 2020: 406-415 - YoungEun Choe, Jun-Sik Shin, Seunghyung Lee, JongWon Kim:
eBPF/XDP Based Network Traffic Visualization and DoS Mitigation for Intelligent Service Protection. EIDWT 2020: 458-468 - Miralda Cuka, Donald Elmazi, Makoto Ikeda, Keita Matsuo, Leonard Barolli:
IoT Node Selection in Opportunistic Networks: A Fuzzy-Based Approach Considering Node's Successful Delivery Ratio (NSDR) as a New Parameter. EIDWT 2020: 64-72 - Donald Elmazi, Miralda Cuka, Makoto Ikeda, Keita Matsuo, Leonard Barolli:
A Fuzzy-Based System for Actor Node Selection in WSANs Considering Task Accomplishment Time as a New Parameter. EIDWT 2020: 53-63 - Tomoya Enokido, Makoto Takizawa:
The Improved Redundant Energy Consumption Laxity-Based Algorithm with Differentiating Starting Time of Process Replicas. EIDWT 2020: 181-188 - Kosuke Gima, Takumi Saito, Ryuji Oma, Shigenari Nakamura, Tomoya Enokido, Makoto Takizawa:
Evaluation of Parallel Data Transmission in the Mobile Fog Computing Model. EIDWT 2020: 158-170 - Hira Gul, Arooj Arif, Sahiba Fareed, Mubbashra Anwar, Afrah Naeem, Nadeem Javaid:
Classification and Regression Based Methods for Short Term Load and Price Forecasting: A Survey. EIDWT 2020: 416-426 - Yinzhe Guo, Takumi Saito, Ryuji Oma, Shigenari Nakamura, Tomoya Enokido, Makoto Takizawa:
Subtree-Based Fog Computing in the TWTBFC Model. EIDWT 2020: 46-52 - Daiji Hara, Kouichi Sakurai, Yasuo Musashi:
Classification of Malicious Domains by Their LIFETIME. EIDWT 2020: 334-341 - Kenta Henmi, Akio Koyama:
Hybrid Type DTN Routing Protocol Considering Storage Capacity. EIDWT 2020: 491-502 - Naoki Higashinaka, Hiroshi Maeda:
Input Amplitude Dependency of Duplexer with Dispersive and Nonlinear Dielectric in 2-D Photonic Crystal Waveguide. EIDWT 2020: 226-236 - Yujin Hong, JongWon Kim:
Workflow Improvement for KubeFlow DL Performance over Cloud-Native SmartX AI Cluster. EIDWT 2020: 522-531 - Tsu-Hao Hsieh, Kuan-Yu Ho, Meng-Yo Tsai, Kuan-Chou Lai:
Usage-Oriented Resource Allocation Strategy in Edge Computing Environments. EIDWT 2020: 351-360 - Yong-Woon Hwang, Im-Yeong Lee, Kangbin Yim:
A Study on Access Control Scheme Based on ABE Using Searchable Encryption in Cloud Environment. EIDWT 2020: 215-221 - Takumi Iwamoto, Kiyotaka Fujisaki:
A Beam Power Allocating Method for Ka-band Multi-beam Broadcasting Satellite Based on Meteorological Data. EIDWT 2020: 237-246 - Kosuke Kaneko, Yusuke Tsutsumi, Subodh Sharma, Yoshihiro Okada:
PACKUARIUM: Network Packet Visualization Using Mixed Reality for Detecting Bot IoT Device of DDoS Attack. EIDWT 2020: 361-372 - Takeru Kurita, Keita Matsuo, Leonard Barolli:
A Management System for Electric Wheelchair Considering Agile-Kanban Using IoT Sensors and Scikit-Learn. EIDWT 2020: 540-551 - Jiasen Liu, Xu An Wang, Kaiyang Zhao, Han Wang:
Secure Public Cloud Storage Auditing with Deduplication: More Efficient and Secure. EIDWT 2020: 290-300 - Yusi Machidori, Ko Takayama, Kaoru Sugita:
A Multi-modal Interface for Control of Omnidirectional Video Playing on Head Mount Display. EIDWT 2020: 7-11 - Ishak Meraouche, Sabyasachi Dutta, Kouichi Sakurai:
3-Party Adversarial Cryptography. EIDWT 2020: 247-258 - Ryo Nakai, Tomoyuki Ishida:
Proposal of an Interactive Brainstorming Environment for Various Content Sharing and Meeting Progress. EIDWT 2020: 448-457 - Shigenari Nakamura, Tomoya Enokido, Makoto Takizawa:
Evaluation of a TBOI (Time-Based Operation Interruption) Protocol to Prevent Late Information Flow in the IoT. EIDWT 2020: 12-23 - Lidia Ogiela, Makoto Takizawa, Urszula Ogiela:
Transformative Computing in Knowledge Extraction and Service Management Processes. EIDWT 2020: 222-225 - Marek R. Ogiela, Lidia Ogiela:
Cognitive Approaches for Sensor Data Analysis in Transformative Computing. EIDWT 2020: 210-214
skipping 28 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-04 03:46 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint