Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "stream:streams/journals/ijsccps:"
@article{DBLP:journals/ijsccps/Benedict21, author = {Shajulin Benedict}, title = {Distributed blockchains for collaborative product designs in smart cities}, journal = {Int. J. Soc. Comput. Cyber Phys. Syst.}, volume = {2}, number = {3}, pages = {256--274}, year = {2021}, url = {https://doi.org/10.1504/IJSCCPS.2021.117977}, doi = {10.1504/IJSCCPS.2021.117977}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsccps/Benedict21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsccps/Das21, author = {Manik Lal Das}, title = {Secure resource sharing in grid system without public key settings}, journal = {Int. J. Soc. Comput. Cyber Phys. Syst.}, volume = {2}, number = {3}, pages = {194--211}, year = {2021}, url = {https://doi.org/10.1504/IJSCCPS.2021.117939}, doi = {10.1504/IJSCCPS.2021.117939}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsccps/Das21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsccps/DesaiD21, author = {Nidhi Desai and Manik Lal Das}, title = {Rule based anonymisation against inference attack in social networks}, journal = {Int. J. Soc. Comput. Cyber Phys. Syst.}, volume = {2}, number = {3}, pages = {212--228}, year = {2021}, url = {https://doi.org/10.1504/IJSCCPS.2021.117952}, doi = {10.1504/IJSCCPS.2021.117952}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsccps/DesaiD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsccps/GururajTVR21, author = {Harinahalli Lokesh Gururaj and U. Tanuja and Janhavi V and B. Ramesh}, title = {Detecting malicious users in the social networks using machine learning approach}, journal = {Int. J. Soc. Comput. Cyber Phys. Syst.}, volume = {2}, number = {3}, pages = {229--243}, year = {2021}, url = {https://doi.org/10.1504/IJSCCPS.2021.117959}, doi = {10.1504/IJSCCPS.2021.117959}, timestamp = {Wed, 23 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsccps/GururajTVR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsccps/SolaniD21, author = {Riddhi Solani and Manik Lal Das}, title = {iCOPS: insider attack detection in distributed file systems}, journal = {Int. J. Soc. Comput. Cyber Phys. Syst.}, volume = {2}, number = {3}, pages = {244--255}, year = {2021}, url = {https://doi.org/10.1504/IJSCCPS.2021.117972}, doi = {10.1504/IJSCCPS.2021.117972}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsccps/SolaniD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsccps/Vijayaprabakaran21, author = {K. Vijayaprabakaran and K. Sathiyamurthy and S. Sowmya}, title = {Deep learning-based medical expert system for diabetes diagnosis on IoT healthcare data}, journal = {Int. J. Soc. Comput. Cyber Phys. Syst.}, volume = {2}, number = {3}, pages = {177--193}, year = {2021}, url = {https://doi.org/10.1504/IJSCCPS.2021.117937}, doi = {10.1504/IJSCCPS.2021.117937}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsccps/Vijayaprabakaran21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsccps/ChandraB19, author = {Ramesh Chandra and Vaibhav Bhatnagar}, title = {Cyber-squatting: a cyber crime more than an unethical act}, journal = {Int. J. Soc. Comput. Cyber Phys. Syst.}, volume = {2}, number = {2}, pages = {146--150}, year = {2019}, url = {https://doi.org/10.1504/IJSCCPS.2019.100197}, doi = {10.1504/IJSCCPS.2019.100197}, timestamp = {Thu, 16 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsccps/ChandraB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsccps/DaveGD19, author = {Ainish Dave and Hardik Gajera and Manik Lal Das}, title = {Privacy-preserving targeted online advertising}, journal = {Int. J. Soc. Comput. Cyber Phys. Syst.}, volume = {2}, number = {2}, pages = {132--145}, year = {2019}, url = {https://doi.org/10.1504/IJSCCPS.2019.100196}, doi = {10.1504/IJSCCPS.2019.100196}, timestamp = {Thu, 16 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsccps/DaveGD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsccps/JerlinDA19, author = {M. Asha Jerlin and Anindya Kumar Das and Joshua Agbonjaru}, title = {Implementation of an efficient and intelligent Indian maritime borderline alert system using IoT}, journal = {Int. J. Soc. Comput. Cyber Phys. Syst.}, volume = {2}, number = {2}, pages = {95--105}, year = {2019}, url = {https://doi.org/10.1504/IJSCCPS.2019.100184}, doi = {10.1504/IJSCCPS.2019.100184}, timestamp = {Thu, 16 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsccps/JerlinDA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsccps/MohitKS19, author = {Mohit and A. Charan Kumari and Meghna Sharma}, title = {A novel approach to text clustering using shift k-medoid}, journal = {Int. J. Soc. Comput. Cyber Phys. Syst.}, volume = {2}, number = {2}, pages = {106--118}, year = {2019}, url = {https://doi.org/10.1504/IJSCCPS.2019.100186}, doi = {10.1504/IJSCCPS.2019.100186}, timestamp = {Thu, 16 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsccps/MohitKS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsccps/NinaweV19, author = {Swapnil S. Ninawe and Pallapa Venkataram}, title = {Authentication schemes for social network users: a review}, journal = {Int. J. Soc. Comput. Cyber Phys. Syst.}, volume = {2}, number = {2}, pages = {151--176}, year = {2019}, url = {https://doi.org/10.1504/IJSCCPS.2019.100199}, doi = {10.1504/IJSCCPS.2019.100199}, timestamp = {Thu, 16 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsccps/NinaweV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsccps/SharmaKS19, author = {Manish Sharma and Shikha N. Khera and Pritam Babu Sharma}, title = {The troika of artificial intelligence, emotional intelligence and customer intelligence}, journal = {Int. J. Soc. Comput. Cyber Phys. Syst.}, volume = {2}, number = {2}, pages = {119--131}, year = {2019}, url = {https://doi.org/10.1504/IJSCCPS.2019.100195}, doi = {10.1504/IJSCCPS.2019.100195}, timestamp = {Thu, 16 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsccps/SharmaKS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsccps/FuchsG17, author = {Christoph Fuchs and Georg Groh}, title = {Data sharing sensitivity, relevance, and social traits in social information retrieval}, journal = {Int. J. Soc. Comput. Cyber Phys. Syst.}, volume = {2}, number = {1}, pages = {1--34}, year = {2017}, url = {https://doi.org/10.1504/IJSCCPS.2017.10009736}, doi = {10.1504/IJSCCPS.2017.10009736}, timestamp = {Tue, 20 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsccps/FuchsG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsccps/KumariV17, author = {Madhu Kumari and Singh Vijendra}, title = {Big data analytics in healthcare: opportunities, challenges and techniques}, journal = {Int. J. Soc. Comput. Cyber Phys. Syst.}, volume = {2}, number = {1}, pages = {35--58}, year = {2017}, url = {https://doi.org/10.1504/IJSCCPS.2017.10005265}, doi = {10.1504/IJSCCPS.2017.10005265}, timestamp = {Fri, 30 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsccps/KumariV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsccps/SainiSY17, author = {Indu Saini and Phool Singh and Anil Kumar Yadav}, title = {Analysis of Lorenz-chaos and exclusive-OR based image encryption scheme}, journal = {Int. J. Soc. Comput. Cyber Phys. Syst.}, volume = {2}, number = {1}, pages = {59--72}, year = {2017}, url = {https://doi.org/10.1504/IJSCCPS.2017.10009739}, doi = {10.1504/IJSCCPS.2017.10009739}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsccps/SainiSY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsccps/ShahP17, author = {Asif Ali Shah and Shabir A. Parah}, title = {Chaos based novel cryptographic technique based on a new logistic map}, journal = {Int. J. Soc. Comput. Cyber Phys. Syst.}, volume = {2}, number = {1}, pages = {73--94}, year = {2017}, url = {https://doi.org/10.1504/IJSCCPS.2017.10009740}, doi = {10.1504/IJSCCPS.2017.10009740}, timestamp = {Thu, 16 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsccps/ShahP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsccps/DeepakP16, author = {Gerard Deepak and Sheeba Priyadarshini}, title = {A hybrid framework for social tag recommendation using context driven social information}, journal = {Int. J. Soc. Comput. Cyber Phys. Syst.}, volume = {1}, number = {4}, pages = {312--325}, year = {2016}, url = {https://doi.org/10.1504/IJSCCPS.2017.10005809}, doi = {10.1504/IJSCCPS.2017.10005809}, timestamp = {Thu, 16 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsccps/DeepakP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsccps/NinaweV16, author = {Swapnil S. Ninawe and Pallapa Venkataram}, title = {A method of designing an access mechanism for social networks}, journal = {Int. J. Soc. Comput. Cyber Phys. Syst.}, volume = {1}, number = {4}, pages = {387--408}, year = {2016}, url = {https://doi.org/10.1504/IJSCCPS.2017.10005789}, doi = {10.1504/IJSCCPS.2017.10005789}, timestamp = {Thu, 16 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsccps/NinaweV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsccps/PrabukumarAP16, author = {Prabukumar Manoharan and Loganathan Agilandeeswari and M. Sai Praneeth}, title = {Opinion mining for digital India scheme using fuzzy sets}, journal = {Int. J. Soc. Comput. Cyber Phys. Syst.}, volume = {1}, number = {4}, pages = {344--355}, year = {2016}, url = {https://doi.org/10.1504/IJSCCPS.2017.10005811}, doi = {10.1504/IJSCCPS.2017.10005811}, timestamp = {Thu, 16 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsccps/PrabukumarAP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsccps/RaniD16, author = {Sangeeta Rani and Kanwalvir Singh Dhindsa}, title = {Malware detection techniques and tools for Android}, journal = {Int. J. Soc. Comput. Cyber Phys. Syst.}, volume = {1}, number = {4}, pages = {326--343}, year = {2016}, url = {https://doi.org/10.1504/IJSCCPS.2017.10005813}, doi = {10.1504/IJSCCPS.2017.10005813}, timestamp = {Thu, 16 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsccps/RaniD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsccps/Vijendra16, author = {Singh Vijendra}, title = {Big data characteristics, challenges, architectures, analytics and applications: a review}, journal = {Int. J. Soc. Comput. Cyber Phys. Syst.}, volume = {1}, number = {4}, pages = {356--386}, year = {2016}, url = {https://doi.org/10.1504/IJSCCPS.2017.10005064}, doi = {10.1504/IJSCCPS.2017.10005064}, timestamp = {Fri, 30 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsccps/Vijendra16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsccps/BambergerSD12, author = {Walter Bamberger and Josef Schlittenlacher and Klaus Diepold}, title = {Ability-aware trust for vehicular networks}, journal = {Int. J. Soc. Comput. Cyber Phys. Syst.}, volume = {1}, number = {3}, pages = {286--307}, year = {2012}, url = {https://doi.org/10.1504/IJSCCPS.2012.047701}, doi = {10.1504/IJSCCPS.2012.047701}, timestamp = {Thu, 16 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsccps/BambergerSD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsccps/BeachGH12, author = {Aaron Beach and Mike Gartrell and Richard Han}, title = {q-Anon: practical anonymity for social networks}, journal = {Int. J. Soc. Comput. Cyber Phys. Syst.}, volume = {1}, number = {3}, pages = {223--241}, year = {2012}, url = {https://doi.org/10.1504/IJSCCPS.2012.047698}, doi = {10.1504/IJSCCPS.2012.047698}, timestamp = {Fri, 17 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsccps/BeachGH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsccps/JiangMC12, author = {Miao Jiang and William L. McGill and Yan Cao}, title = {Participatory risk management: concept and illustration}, journal = {Int. J. Soc. Comput. Cyber Phys. Syst.}, volume = {1}, number = {3}, pages = {268--285}, year = {2012}, url = {https://doi.org/10.1504/IJSCCPS.2012.047700}, doi = {10.1504/IJSCCPS.2012.047700}, timestamp = {Thu, 16 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsccps/JiangMC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsccps/RahmanHKA12, author = {Farzana Rahman and Md. Endadul Hoque and Ferdaus Ahmed Kawsar and Sheikh Iqbal Ahamed}, title = {User privacy protection in pervasive social networking applications using {PCO}}, journal = {Int. J. Soc. Comput. Cyber Phys. Syst.}, volume = {1}, number = {3}, pages = {242--267}, year = {2012}, url = {https://doi.org/10.1504/IJSCCPS.2012.047699}, doi = {10.1504/IJSCCPS.2012.047699}, timestamp = {Thu, 16 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsccps/RahmanHKA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsccps/GrohL11, author = {Georg Groh and Alexander Lehmann}, title = {Deducing evidence for social situations from dynamic geometric interaction data}, journal = {Int. J. Soc. Comput. Cyber Phys. Syst.}, volume = {1}, number = {2}, pages = {206--222}, year = {2011}, url = {https://doi.org/10.1504/IJSCCPS.2011.044174}, doi = {10.1504/IJSCCPS.2011.044174}, timestamp = {Thu, 16 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsccps/GrohL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsccps/HelicTSA11, author = {Denis Helic and Christoph Trattner and Markus Strohmaier and Keith Andrews}, title = {Are tag clouds useful for navigation? {A} network-theoretic analysis}, journal = {Int. J. Soc. Comput. Cyber Phys. Syst.}, volume = {1}, number = {1}, pages = {33--55}, year = {2011}, url = {https://doi.org/10.1504/IJSCCPS.2011.043603}, doi = {10.1504/IJSCCPS.2011.043603}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsccps/HelicTSA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsccps/KarikoskiN11, author = {Juuso Karikoski and Matti Nelimarkka}, title = {Measuring social relations with multiple datasets}, journal = {Int. J. Soc. Comput. Cyber Phys. Syst.}, volume = {1}, number = {1}, pages = {98--113}, year = {2011}, url = {https://doi.org/10.1504/IJSCCPS.2011.043606}, doi = {10.1504/IJSCCPS.2011.043606}, timestamp = {Thu, 16 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsccps/KarikoskiN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsccps/KelleyGMMW11, author = {Stephen Kelley and Mark K. Goldberg and Konstantin Mertsalov and Malik Magdon{-}Ismail and William A. Wallace}, title = {Overlapping communities in social networks}, journal = {Int. J. Soc. Comput. Cyber Phys. Syst.}, volume = {1}, number = {2}, pages = {135--159}, year = {2011}, url = {https://doi.org/10.1504/IJSCCPS.2011.044171}, doi = {10.1504/IJSCCPS.2011.044171}, timestamp = {Thu, 16 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsccps/KelleyGMMW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsccps/MacindoeR11, author = {Owen Macindoe and Whitman Richards}, title = {Comparing networks using their fine structure}, journal = {Int. J. Soc. Comput. Cyber Phys. Syst.}, volume = {1}, number = {1}, pages = {79--97}, year = {2011}, url = {https://doi.org/10.1504/IJSCCPS.2011.043605}, doi = {10.1504/IJSCCPS.2011.043605}, timestamp = {Thu, 16 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsccps/MacindoeR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsccps/MenezesRC11, author = {Telmo L. T. Menezes and Camille Roth and Jean{-}Philippe Cointet}, title = {Finding the semantic-level precursors on a blog network}, journal = {Int. J. Soc. Comput. Cyber Phys. Syst.}, volume = {1}, number = {2}, pages = {115--134}, year = {2011}, url = {https://doi.org/10.1504/IJSCCPS.2011.044170}, doi = {10.1504/IJSCCPS.2011.044170}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsccps/MenezesRC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsccps/MoonH11, author = {Eunyoung Moon and Sangki Han}, title = {A qualitative method to find influencers using similarity-based approach in the blogosphere}, journal = {Int. J. Soc. Comput. Cyber Phys. Syst.}, volume = {1}, number = {1}, pages = {56--78}, year = {2011}, url = {https://doi.org/10.1504/IJSCCPS.2011.043604}, doi = {10.1504/IJSCCPS.2011.043604}, timestamp = {Thu, 16 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsccps/MoonH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsccps/QiuIYLR11, author = {Baojun Qiu and Kristinka Ivanova and John Yen and Peng Liu and Frank E. Ritter}, title = {Event-driven modelling of evolving social networks}, journal = {Int. J. Soc. Comput. Cyber Phys. Syst.}, volume = {1}, number = {1}, pages = {13--32}, year = {2011}, url = {https://doi.org/10.1504/IJSCCPS.2011.043602}, doi = {10.1504/IJSCCPS.2011.043602}, timestamp = {Thu, 16 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsccps/QiuIYLR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsccps/YeW11, author = {Shaozhi Ye and Shyhtsun Felix Wu}, title = {Estimating the size of online social networks}, journal = {Int. J. Soc. Comput. Cyber Phys. Syst.}, volume = {1}, number = {2}, pages = {160--179}, year = {2011}, url = {https://doi.org/10.1504/IJSCCPS.2011.044172}, doi = {10.1504/IJSCCPS.2011.044172}, timestamp = {Thu, 16 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsccps/YeW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsccps/YuK11, author = {Louis Lei Yu and Valerie King}, title = {The evolution of friendships in Chinese online social networks}, journal = {Int. J. Soc. Comput. Cyber Phys. Syst.}, volume = {1}, number = {2}, pages = {180--205}, year = {2011}, url = {https://doi.org/10.1504/IJSCCPS.2011.044173}, doi = {10.1504/IJSCCPS.2011.044173}, timestamp = {Thu, 16 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsccps/YuK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsccps/ZhanF11, author = {Justin Zhan and Xing Fang}, title = {Social computing: the state of the art}, journal = {Int. J. Soc. Comput. Cyber Phys. Syst.}, volume = {1}, number = {1}, pages = {1--12}, year = {2011}, url = {https://doi.org/10.1504/IJSCCPS.2011.043601}, doi = {10.1504/IJSCCPS.2011.043601}, timestamp = {Thu, 16 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsccps/ZhanF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.