default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 2,057 matches
- 2024
- Hassan A. Shafei, Chiu C. Tan:
A Closer Look at Access Control in Multi-User Voice Systems. IEEE Access 12: 40933-40946 (2024) - Kentaro Sato:
A new model construction by making a detour via intuitionistic theories IV: A closer connection between KPω and BI. Ann. Pure Appl. Log. 175(7): 103422 (2024) - Fan Yang, Muqiao Yang, Xiang Li, Yuxuan Wu, Zhiyuan Zhao, Bhiksha Raj, Rita Singh:
A closer look at reinforcement learning-based automatic speech recognition. Comput. Speech Lang. 87: 101641 (2024) - Shaohui Lin, Bo Ji, Rongrong Ji, Angela Yao:
A closer look at branch classifiers of multi-exit architectures. Comput. Vis. Image Underst. 239: 103900 (2024) - Anna Martín-Bylund, Linnea Stenliden:
Closer to the senses in post-pandemic teacher training - Reclaiming the body in online educational encounters. Educ. Inf. Technol. 29(3): 3133-3154 (2024) - Jack Tacchi, Chiara Boldrini, Andrea Passarella, Marco Conti:
Keep your friends close, and your enemies closer: structural properties of negative relationships on Twitter. EPJ Data Sci. 13(1): 55 (2024) - Joel D. Day, Vijay Ganesh, Nathan Grewal, Matthew Konefal, Florin Manea:
A Closer Look at the Expressive Power of Logics Based on Word Equations. Theory Comput. Syst. 68(3): 322-379 (2024) - Ruizhe Shi, Ruizhi Cheng, Bo Han, Yue Cheng, Songqing Chen:
A Closer Look into IPFS: Accessibility, Content, and Performance. Proc. ACM Meas. Anal. Comput. Syst. 8(2): 20:1-20:31 (2024) - Wei Cheng, Dejun Zheng, Shaoxiong Fu, Jingfeng Cui:
Closer in time and higher correlation: disclosing the relationship between citation similarity and citation interval. Scientometrics 129(7): 4495-4512 (2024) - Neil S. Grigg:
Systems engineering and water resources management: A closer relationship is needed. Syst. Eng. 27(2): 440-444 (2024) - Maximiliano Barbosa, Leandro Pralon, Antonio L. L. Ramos, José Antonio Apolinário:
On a Closer Look of a Doppler Tolerant Noise Radar Waveform in Surveillance Applications. Sensors 24(8): 2532 (2024) - Juri Opitz:
A Closer Look at Classification Evaluation Metrics and a Critical Reflection of Common Evaluation Practice. Trans. Assoc. Comput. Linguistics 12: 820-836 (2024) - Zhikai Chen, Fuchen Long, Zhaofan Qiu, Juyong Zhang, Zheng-Jun Zha, Ting Yao, Jiebo Luo:
A Closer Look at the Reflection Formulation in Single Image Reflection Removal. IEEE Trans. Image Process. 33: 625-638 (2024) - Ying Luo, Guoliang Kang, Kexin Liu, Fuzhen Zhuang, Jinhu Lü:
Taking a Closer Look at Factor Disentanglement: Dual-Path Variational Autoencoder Learning for Domain Generalization. IEEE Trans. Multim. 26: 5872-5883 (2024) - Wenqing Wang, Yawei Luo, Zhiqing Chen, Tao Jiang, Yi Yang, Jun Xiao:
Taking a Closer Look At Visual Relation: Unbiased Video Scene Graph Generation With Decoupled Label Learning. IEEE Trans. Multim. 26: 5718-5728 (2024) - Xiaoye Zheng, Zhiyuan Wan, Yun Zhang, Rui Chang, David Lo:
A Closer Look at the Security Risks in the Rust Ecosystem. ACM Trans. Softw. Eng. Methodol. 33(2): 34:1-34:30 (2024) - Cassandra Lee, Jessica R. Mindel:
Closer and Closer Worlds: Using LLMs to Surface Personal Stories in World-building Conversation Games. Conference on Designing Interactive Systems (Companion Volume) 2024 - Lianghe Shi, Weiwei Liu:
A Closer Look at Curriculum Adversarial Training: From an Online Perspective. AAAI 2024: 14973-14981 - Wang Zhang, Ziwen Martin Ma, Subhro Das, Tsui-Wei Lily Weng, Alexandre Megretski, Luca Daniel, Lam M. Nguyen:
One Step Closer to Unbiased Aleatoric Uncertainty Estimation. AAAI 2024: 16857-16864 - William Jones, Rob Capra, Mary Czerwinski, Jesse David Dinneen, Jacek Gwizdka, Unmil Karadkar:
PIM 2024: The Information We Need, When We Need It...: As We Get Ever Closer, Is this Ideal Still Ideal? CHIIR 2024: 438-440 - Somayeh Abdi, Mohammad Ashjaei, Saad Mubeen:
Task Offloading in Edge-Cloud Computing Using a Q-Learning Algorithm. CLOSER 2024: 159-166 - Azizol Abdullah, Mohamed Aly Bouke:
Towards Image-Based Network Traffic Pattern Detection for DDoS Attacks in Cloud Computing Environments: A Comparative Study. CLOSER 2024: 287-294 - Remo Andreoli, Stefano Forti, Luigi Pannocchi, Tommaso Cucinotta, Antonio Brogi:
A Logic Programming Approach to VM Placement. CLOSER 2024: 319-326 - Fatemeh Baghdadi, Davide Cirillo, Daniele Lezzi, Francesc Lordan, Fernando Vazquez, Eugenio Lomurno, Alberto Archetti, Danilo Ardagna, Matteo Matteucci:
Harnessing the Computing Continuum Across Personalized Healthcare, Maintenance and Inspection, and Farming 4.0. CLOSER 2024: 375-385 - Vijon Baraku, Iraklis Paraskakis, Simeon Veloudis, Poonam Yadav:
Responsible Information Sharing in the Era of Big Data Analytics Facilitating Digital Economy Through the Use of Blockchain Technology and Observing GDPR. CLOSER 2024: 257-264 - Filippo Berto, Francesco Minetti, Claudio A. Ardagna, Marco Anisetti:
A Methodology for Web Cache Deception Vulnerability Discovery. CLOSER 2024: 231-238 - Md. Olid Hasan Bhuiyan, Souvik Das, Shafayat H. Majumder, Suryadipta Majumdar, Md. Shohrab Hossain:
On Detecting Malicious Code Injection by Monitoring Multi-Level Container Activities. CLOSER 2024: 15-26 - Valeria Cardellini:
Keynote Lecture. CLOSER 2024: 9 - Tomás Cerný, Md Showkat Hossain Chy, Amr S. Abdelfattah, Jacopo Soldani, Justus Bogner:
On Maintainability and Microservice Dependencies: How Do Changes Propagate? CLOSER 2024: 277-286 - Lydia Y. Chen:
Trustworthy Federated Learning Systems. CLOSER 2024: 7
skipping 2,027 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-21 12:37 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint