Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 17,021 matches
- 2024
- Dongxiao Liu, Xuemin (Sherman) Shen:
Blockchain-Based Data Security in Heterogeneous Communications Networks. Wireless Networks, Springer 2024, ISBN 978-3-031-52476-9, pp. 1-189 - Rahma Gantassi, Sana Messous, Zaki Masood, Quota Alief Sias, Yonghoon Choi:
Enhanced Network QoS in Large Scale and High Sensor Node Density Wireless Sensor Networks Using (IR-DV-Hop) Localization Algorithm and Mobile Data Collector (MDC). IEEE Access 12: 37957-37973 (2024) - Panagiotis K. Gkonis, Nikolaos Nomikos, Panagiotis Trakadas, Lambros Sarakis, George Xylouris, Xavi Masip-Bruin, Josep Martrat:
Leveraging Network Data Analytics Function and Machine Learning for Data Collection, Resource Optimization, Security and Privacy in 6G Networks. IEEE Access 12: 21320-21336 (2024) - Dalia Grendaite, Linas Petkevicius:
Identification of Algal Blooms in Lakes in the Baltic States Using Sentinel-2 Data and Artificial Neural Networks. IEEE Access 12: 27973-27988 (2024) - Osama Ahmed Khashan, Nour Mahmoud Khafajah, Waleed Alomoush, Mohammad Alshinwan:
Innovative Energy-Efficient Proxy Re-Encryption for Secure Data Exchange in Wireless Sensor Networks. IEEE Access 12: 23290-23304 (2024) - Jungmin Kwon, Hyunggon Park:
Data Dissemination Framework Using Low-Rank Approximation in Edge Networks. IEEE Access 12: 1266-1279 (2024) - Eldar Sabanovic, Paulius Kojis, Valentin G. Ivanov, Miguel Dhaens, Viktor Skrickij:
Development and Evaluation of Artificial Neural Networks for Real-World Data-Driven Virtual Sensors in Vehicle Suspension. IEEE Access 12: 13183-13195 (2024) - Zheng Zhou, Juan Liu, Chixiong Mao:
Age of Information Oriented Data Collection via Energy-Constrained UAVs in Wireless Sensor Networks. IEEE Access 12: 11897-11908 (2024) - Hao Chen, Hua Qin, Gelan Yang, Yang Peng:
HDS: Heterogeneity-aware dual-interface scheduling for energy-efficient delay-constrained data collection in IoT. Ad Hoc Networks 155: 103405 (2024) - Adel Salah Ould Khaoua, Abdelmadjid Boukra, Fella Bey:
On estimating the interest satisfaction ratio in IEEE 802.15.4-based named-data networks. Ann. des Télécommunications 79(1): 111-130 (2024) - Cong Wu, Hongxin Li, Jiajia Ren, K. Marimuthu, Priyan Malarvizhi Kumar:
Correction to: Artificial neural network based high dimensional data visualization technique for interactive data exploration in E-commerce. Ann. Oper. Res. 332(1): 1197-1198 (2024) - S. Jerald Nirmal Kumar, M. M. Gowthul Alam, Michael Raj TF, Uma Mageswari R:
Golden Search Optimization based adaptive and diagonal kernel convolution neural network for disease prediction and securing IoT data in cloud. Appl. Soft Comput. 151: 111137 (2024) - Diego Mañanes, Inés Rivero-García, Carlos Relaño, Miguel Torres, David Sancho, Daniel Jimenez-Carretero, Carlos Torroja Fungairino, Fátima Sánchez-Cabo:
SpatialDDLS: an R package to deconvolute spatial transcriptomics data using neural networks. Bioinform. 40(2) (2024) - Xiaoke Hao, Jiawang Li, Mingming Ma, Jing Qin, Daoqiang Zhang, Feng Liu:
Hypergraph convolutional network for longitudinal data analysis in Alzheimer's disease. Comput. Biol. Medicine 168: 107765 (2024) - Alireza Rafiei, Milad Ghiasi Rad, Andrea Sikora, Rishikesan Kamaleswaran:
Improving mixed-integer temporal modeling by generating synthetic data using conditional generative adversarial networks: A case study of fluid overload prediction in the intensive care unit. Comput. Biol. Medicine 168: 107749 (2024) - Xutao Weng, Hong Song, Yucong Lin, You Wu, Xi Zhang, Bowen Liu, Jian Yang:
A joint learning method for incomplete and imbalanced data in electronic health record based on generative adversarial networks. Comput. Biol. Medicine 168: 107687 (2024) - Sunita S. Patil, Thangamuthu Senthil Kumaran:
Fuzzy based rendezvous points selection for mobile data gathering in wireless sensor network. Comput. Intell. 40(1) (2024) - Guanqiao Qu, Chenguang He, Qian Chen, Weixiao Meng:
Tactical Data-Oriented Decentralized Communication Scheme in Vehicle-Assisted Networks: Challenges and Solutions. IEEE Commun. Mag. 62(1): 56-61 (2024) - Roberto Doriguzzi Corin, Luis Augusto Dias Knob, Luca Mendozzi, Domenico Siracusa, Marco Savi:
Introducing packet-level analysis in programmable data planes to advance Network Intrusion Detection. Comput. Networks 239: 110162 (2024) - Vladimir V. Fedorenko, Irina Samoylenko, Vladimir Samoylenko:
Fragmentation of data packets in wireless sensor network with variable temperature and channel conditions. Comput. Commun. 214: 201-214 (2024) - Complexity:
Retracted: Adoption of Convolutional Neural Network Algorithm Combined with Augmented Reality in Building Data Visualization and Intelligent Detection. Complex. 2024: 9810679:1-9810679:1 (2024) - Gopinathan Rajeswari, R. Arthi, Krishnan Murugan:
Nature-inspired donkey and smuggler algorithm for optimal data gathering in partitioned wireless sensor networks for restoring network connectivity. Computing 106(3): 759-787 (2024) - Insozhan Nagasundharamoorthi, Prabhu Venkatesan, Parthasarathy Velusamy:
Hash message authentication codes for securing data in wireless body area networks. Concurr. Comput. Pract. Exp. 36(5) (2024) - Jiayi Deng, Danyang Huang, Yi Ding, Yingqiu Zhu, Bingyi Jing, Bo Zhang:
Subsampling spectral clustering for stochastic block models in large-scale networks. Comput. Stat. Data Anal. 189: 107835 (2024) - Hélder Alves, Paula Brito, Pedro Campos:
Community detection in interval-weighted networks. Data Min. Knowl. Discov. 38(2): 653-698 (2024) - Faxing Yu, Chunna Li, Yuanhai Shao:
DNTC: An unsupervised Deep Networks for Temperature Compensation in non-stationary data. Eng. Appl. Artif. Intell. 127(Part B): 107319 (2024) - Xueping Li, Linbo Hu, Zhigang Lu:
Detection of false data injection attack in power grid based on spatial-temporal transformer network. Expert Syst. Appl. 238(Part A): 121706 (2024) - P. V. Sabique, Ganesh Pasupathy, Sivaramakrishnan Ramachandran:
A data driven recurrent neural network approach for reproduction of variable visuo-haptic force feedback in surgical tool insertion. Expert Syst. Appl. 238(Part E): 122221 (2024) - Gang Wu, Liang Hu, Xuelin Mao, Yongheng Xing, Feng Wang:
A data fusion framework based on heterogeneous information network embedding for trigger-action programming in IoT. Expert Syst. Appl. 235: 121065 (2024) - Yuzi Yi, Nafei Zhu, Jingsha He, Anca Delia Jurcut, Xiangjun Ma, Yehong Luo:
A privacy-sensitive data identification model in online social networks. Trans. Emerg. Telecommun. Technol. 35(1) (2024)
skipping 16,991 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-03-28 10:02 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint