default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 110 matches
- 2019
- Hussein Hazimeh, Mohammad Harissa, Elena Mugellini, Omar Abou Khaled:
Temporal Sentiment Tracking and Analysis on Large-scale Social Events. ICSCA 2019: 17-21 - Hussein Hazimeh, Elena Mugellini, Omar Abou Khaled:
Reliable User Profile Analytics and Discovery on Social Networks. ICSCA 2019: 496-500 - Meng Sun, Kuoyi Shao, Lu Wang:
Minimizing Flow Rules for Rerouting Multi-Flows in Multi-Failure Recovery over SDN. ICSCA 2019: 555-559 - Maythem K. Abbas, Low Tang Jung, Raed M. T. Abdulla:
An Automated Software-Agents System for Detecting Road Speed Limit Offences. ICSCA 2019: 538-543 - Salisu Mamman Abdulrahman, Pavel Brazdil, Wan Mohd Nazmee Wan Zainon, Alhassan Adamu:
Simplifying the Algorithm Selection Using Reduction of Rankings of Classification Algorithms. ICSCA 2019: 140-148 - Mohamad Izani Zainal Abidin, Aishah Abdul Razak:
Modelling of the Prophet Mosque in Virtual Reality. ICSCA 2019: 320-324 - Alhassan Adamu, Wan Mohd Nazmee Wan Zainon, Salisu Mamman Abdulrahman:
Empirical Investigation of UML Models Matching through Different Weight Calibration. ICSCA 2019: 167-172 - Muhammad Umar Aftab, Zhiguang Qin, Syed Falahuddin Quadri, Zakria, Arslan Javed, Xuyun Nie:
Role-Based ABAC Model for Implementing Least Privileges. ICSCA 2019: 467-471 - Mohammed Al-Habib, Dongjun Huang, Majjed Al-Qatf, Kamal Al-Sabahi:
Cooperative Hierarchical Framework for Group Activity Recognition: From Group Detection to Multi-activity Recognition. ICSCA 2019: 291-298 - Mohammed A. Al-Sharafi, Ruzaini Abdullah Arshah, Emad A. Abu-Shanab:
Questionnaire Development Process to Measure the SMEs' Continuous Use behavior towards Cloud Computing Services. ICSCA 2019: 50-55 - Hammoudeh S. Alamri, Kamal Z. Zamli, Mohd Faizal Ab Razak, Ahmad Firdaus:
Solving 0/1 Knapsack Problem using Opposition-based Whale Optimization Algorithm (OWOA). ICSCA 2019: 135-139 - Moatsum Alawida, Azman Samsudin, Wafa' Hamdan Alshoura:
Enhancing One-Dimensional Chaotic Map Based on Bitstream Dividing Model. ICSCA 2019: 130-134 - Nabil Almashfi, Lunjin Lu, Koby Picker, Christian Maldonado:
Precise String Analysis for JavaScript Programs Using Automata. ICSCA 2019: 159-166 - Ahmad Alshammari, Mohamed A. Zohdy:
Internet of Things Attacks Detection and Classification Using Tiered Hidden Markov Model. ICSCA 2019: 550-554 - Muhammad Alshurideh, Said A. Salloum, Barween Al Kurdi, Mostafa Al-Emran:
Factors affecting the Social Networks Acceptance: An Empirical Study using PLS-SEM Approach. ICSCA 2019: 414-418 - Hamit Altiparmak, Fatih Veysel Nurçin:
Segmentation of Microscopic Breast Cancer Images for Cancer Detection. ICSCA 2019: 268-271 - Muhammad Asyraf Asbullah, Muhammad Rezal Kamel Ariffin, Zahari Mahad, Muhamad Azlan Daud:
(In)Security of the AAβ Cryptosystem for Transmitting Large Data. ICSCA 2019: 91-94 - Asroni, Juanita Yusanti, Slamet Riyadi:
Dashboard-based Alumni Tracer Study Report Using Normalized Data Store Architecture. ICSCA 2019: 70-74 - Tran Quy Ban, Bui Ngoc Anh, Ngo Tung Son, Tran Van Dinh:
Survey of Hyperledger Blockchain Frameworks: Case Study in FPT University's Cryptocurrency Wallets. ICSCA 2019: 472-480 - Surajit Das Barman, Mahamudul Hasan, Falguni Roy:
A Genre-Based Item-Item Collaborative Filtering: Facing the Cold-Start Problem. ICSCA 2019: 258-262 - Ricardo A. Catanghal Jr., Thelma D. Palaoag, Carlwin Dayagdag:
Meta-Analysis of Acoustic Feature Extraction for Machine Listening Systems. ICSCA 2019: 369-372 - Shuhui Sophy Cheng, Shao-Liang Chang, Chi-Ying Chen:
Problematic Use of Live Video Streaming Services: Impact of Personality Traits, Psychological Factors, and Motivations. ICSCA 2019: 487-490 - Yee Jian Chew, Shih Yin Ooi, Kok-Seng Wong, Ying-Han Pang:
Privacy Preserving of IP Address through Truncation Method in Network-based Intrusion Detection System. ICSCA 2019: 569-573 - Nguyen The Duy, Tran Thi Thuy, Luong Thuy Chung, Ngo Tung Son, Tran Van Dinh:
DC programming and DCA for Secure Guarantee with Null Space Beamforming in Two-Way Relay Networks. ICSCA 2019: 529-532 - Riswan Efendi, Susnaningsih Mu'at, Nelsy Arisandi, Noor Azah Samsudin:
Removing Unclassified Elements in Investigating of Financial Wellbeing Attributes Using Rough-Regression Model. ICSCA 2019: 87-90 - Francisco C. Eugenio Jr., Ardee Joy T. Ocampo:
Assessing Classcraft as an Effective Gamification App based on Behaviorism Learning Theory. ICSCA 2019: 325-329 - Sim Liew Fong, Amir Ariff Azham bin Abu Bakar, Falah Y. H. Ahmed, Arshad Jamal:
Smart Transportation System Using RFID. ICSCA 2019: 579-584 - Sim Liew Fong, David Chin Wui Yung, Falah Y. H. Ahmed, Arshad Jamal:
Smart City Bus Application with Quick Response (QR) Code Payment. ICSCA 2019: 248-252 - Xiangling Fu, Chenwei Yan, Pengya Zhao:
A Model Integrating Information of Multiple Social Networks. ICSCA 2019: 510-516 - Chien-Le Goh, Hong Tat Ewe, Yong Kheng Goh:
An Artificial Cell Simulator based on Artificial Chemistry. ICSCA 2019: 338-342
skipping 80 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-25 01:57 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint