default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 29 matches
- 2018
- Hiroaki Anada:
Detailed Instantiation of the Decentralized Multi-Authority Anonymous Authentication Scheme and Tighter Reduction for Security. CANDAR 2018: 85-91 - Andrew Feutrill, Dinesha Ranathunga, Yuval Yarom, Matthew Roughan:
The Effect of Common Vulnerability Scoring System Metrics on Vulnerability Exploit Delay. CANDAR 2018: 1-10 - Satoshi Fujita:
Resilient Peer-to-Peer Video Streaming with a Guaranteed Latency. CANDAR 2018: 11-18 - Masayuki Fukumitsu, Shingo Hasegawa:
A Galindo-Garcia-Like Identity-Based Signature with Tight Security Reduction, Revisited. CANDAR 2018: 92-98 - Cing-Fu Jhu, Pangfeng Liu, Jan-Jan Wu:
Data Pinning and Back Propagation Memory Optimization for Deep Learning on GPU. CANDAR 2018: 19-28 - Ryuta Kawano, Ryota Yasudo, Hiroki Matsutani, Hideharu Amano:
k-Optimized Path Routing for High-Throughput Data Center Networks. CANDAR 2018: 99-105 - Md. Al-Amin Khandaker, Yuki Nanjo, Takuya Kusaka, Yasuyuki Nogami:
A Comparative Implementation of GLV Technique on KSS-16 Curve. CANDAR 2018: 106-112 - Yonghwan Kim, Hiroki Aono, Yoshiaki Katayama, Toshimitsu Masuzawa:
A Self-Stabilizing Algorithm for Constructing a Maximal (2, 2)-Directed Acyclic Mixed Graph. CANDAR 2018: 29-38 - Tulio A. Lima, Paulo V. G. Farias, Marcos F. Caetano, Jacir Luiz Bordim:
A Fast Message-Delivery Mechanism to Support Broadcast in Vehicular Ad hoc Networks. CANDAR 2018: 113-119 - Tokihiro Naito, Satoshi Fujita:
Acquiring Nearly Optimal Peer Selection Strategy through Deep Q-Network. CANDAR 2018: 120-125 - Son Duc Nguyen, Mamoru Mimura, Hidema Tanaka:
Slow-Port-Exhaustion DoS Attack on Virtual Network Using Port Address Translation. CANDAR 2018: 126-132 - Mehrdad Arabpour Niasari, Ke Qiu:
An Efficient Shortest Path Routing on the Hypercube with Blocking/Faulty Nodes. CANDAR 2018: 39-46 - Hiroki Nishikawa, Kana Shimada, Ittetsu Taniguchi, Hiroyuki Tomiyama:
Scheduling of Malleable Fork-Join Tasks with Constraint Programming. CANDAR 2018: 133-138 - Lucas Saad N. Nunes, Jacir Luiz Bordim, Yasuaki Ito, Koji Nakano:
A Prefix-Sum-Based Rabin-Karp Implementation for Multiple Pattern Matching on GPGPU. CANDAR 2018: 139-145 - Kouzou Ohara, Kazumi Saito, Masahiro Kimura, Hiroshi Motoda:
Critical Node Identification Based on Articulation Point Detection for Network with Uncertain Connectivity. CANDAR 2018: 146-152 - Yuuki Okuda, Masaya Sato, Hideo Taniguchi:
Hiding Communication of Essential Services by System Call Proxy. CANDAR 2018: 47-56 - Tomonobu Ozaki:
Evaluation Measures for Frequent Itemsets Based on Distributed Representations. CANDAR 2018: 153-159 - Yasuyuki Seita, Toru Nakanishi:
Speeding Up Revocable Group Signature with Compact Revocation List Using Vector Commitments. CANDAR 2018: 160-166 - Takayuki Shiroma, Celimuge Wu, Tsutomu Yoshinaga:
A Template-Based Sub-Optimal Content Distribution for D2D Content Sharing Networks. CANDAR 2018: 167-173 - Henrique Yoshikazu Shishido, Júlio Cezar Estrella, Claudio Fabiano Motta Toledo, Stephan Reiff-Marganiec:
A CloudSim Extension for Evaluating Security Overhead in Workflow Execution in Clouds. CANDAR 2018: 174-180 - Soichiro Shohata, Yuichi Nakamura, Hiroaki Nishi:
Hardware for Accelerating Anonymization Transparent to Network. CANDAR 2018: 181-187 - Amang Sudarsono, Mike Yuliana, Prima Kristalina, Ali Ridho Barakbah:
An Implementation of Shared Key Generation Extracted from Received Signal Strength in Vehicular Ad-Hoc Communication. CANDAR 2018: 57-65 - Makoto Takita, Hiroya Okuma, Masakatu Morii:
A Construction of Fake QR Codes Based on Error-Correcting Codes. CANDAR 2018: 188-193 - Tze Hon Tan, Chia Yee Ooi, Muhammad Nadzir Marsono:
drDRM: A PUF-Based Dynamically Reconfigurable DRM Mechanism for FPGA-Based Platform. CANDAR 2018: 194-200 - Takuma Wada, Naoki Matsumura, Koji Nakano, Yasuaki Ito:
Efficient Byte Stream Pattern Test using Bloom Filter with Rolling Hash Functions on the FPGA. CANDAR 2018: 66-75 - Ben-Li Wang, Chung-Ta King, Hung-Kuo Chu:
A Semi-Automatic Video Labeling Tool for Autonomous Driving Based on Multi-Object Detector and Tracker. CANDAR 2018: 201-206 - Xiong Xiao, Mulya Agung, Muhammad Alfian Amrizal, Ryusuke Egawa, Hiroyuki Takizawa:
Investigating the Effects of Dynamic Thread Team Size Adjustment for Irregular Applications. CANDAR 2018: 76-84 - Hisaaki Yamaba, Shotaro Usuzaki, Kentaro Aburada, Masayuki Mukunoki, Mirang Park, Naonobu Okazaki:
A Proposal of New Reading Text CAPTCHA using Random Dot Patterns. CANDAR 2018: 207-212 - Sixth International Symposium on Computing and Networking, CANDAR 2018, Takayama, Japan, November 23-27, 2018. IEEE Computer Society 2018, ISBN 978-1-5386-9182-3 [contents]
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-20 19:29 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint