


default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 75 matches
- 2025
- Mohammadreza Abdi, Mehrdad Kargari, Meysam Alavi, Babak Teimourpour:
Predicting NBA Playoffs Qualification Using Machine Learning Techniques. CSICC 2025: 1-5 - Asef Afsahi, Ali Fahim, Ali Moeini:
MRKG-DSP: Enhanced Multimodal Reasoning with Knowledge Graphs, Dynamic Semantic Pruning and LLM Integration. CSICC 2025: 1-6 - Seyyed Ali Aghamiri, Reza Sharifnia, Ahmad Khonsari:
PTSA: Utilizing Transaction Prioritization to Enhance Confirmation Speed in the IOTA Network. CSICC 2025: 1-5 - Fatemeh Aliasgharzadeh, Reza Azmi:
AcDWS: Actor Based Distributed Web Scraping. CSICC 2025: 1-5 - Fatemehzahra Aligolzadeh, Seyed Pooya Shariatpanahi:
Improving Physical Layer Computation with Reconfigurable Intelligent Surfaces. CSICC 2025: 1-7 - Faezeh Alizadeh, Mohammad Khansari, Abouzar Arabsorkhi:
On the Applicability of the Power Law Signature in the Cyber Security Data. CSICC 2025: 1-6 - Melika Sadat Araghi, Hadi Shakibian:
Cluster Aware Personalized News Recommendation System Using a Global News Graph. CSICC 2025: 1-5 - Rasoul Asadian, Alireza Akhavanpour:
Persian Text-Image Retrieval: A Framework Based on Image Captioning and Scalable Vector Search. CSICC 2025: 1-7 - Aref Ayati, Hamid Reza Naji, Mohammad Mahdi Hashemi, Mohsen Saffar:
Optimizing Location Allocation in Urban Management: A Brief Review. CSICC 2025: 1-7 - Parsa Azimi, Sadegh Sulaimany:
Effective Preprocessing and Explainability for Better Lung Cancer Prediction. CSICC 2025: 1-5 - Niyusha Baghayi, Diba Rashidi, Bahar Baradaran Eftekhari, Ali Moradi, Mahmoud Reza Hashemi, Hadi Moradi:
A Low-cost Epicenter Estimation Scheme for Earthquake Early Warning Systems: A Preliminary Study. CSICC 2025: 1-6 - Bahareh Kaviani Baghbaderani, Hossein Shahinzadeh:
Adversarial Attacks and Defense Mechanisms in Spiking Neural Networks: A Comprehensive Review. CSICC 2025: 1-7 - Fereshteh Baradaran, Mohsen Raji, Azadeh Baradaran, Arezoo Baradaran, Reihaneh Akbarifard:
Zero Memory Overhead Approach for Protecting Vision Transformer Parameters Against Bit-Flip Faults. CSICC 2025: 1-5 - Yeganeh Chatri, Behzad Akbari, Pejman Goudarzi:
Investigating the Impact of Chunk Time on Video Streaming Performance in TCP-Based Networks. CSICC 2025: 1-5 - Rishi Choksi, Siddh Shah, Lakshit Pathak, Rajesh Gupta, Sudeep Tanwar, Hossein Shahinzadeh, Fatemeh Afzoon:
AI-based Malicious Bitcoin Transaction Detection Framework for Real Estate in Metaverse. CSICC 2025: 1-6 - Pouria Dadkhah, Siavash Ahmadi, Mohammad Reza Aref:
GenAtt NIDS Attack: A Practical Generative Adversarial Attack Against Network Intrusion Detection Systems. CSICC 2025: 1-7 - Mohsen Darchini-Tabrizi, Erfan Hemati, Reza Entezari-Maleki:
RADTO: A Resource-Aware and Dynamic Task Offloading Strategy for Mobile Edge Computing. CSICC 2025: 1-5 - Massoud Dehghan, Ahmad Kalhor, Mohammad Hossein Nasr-Esfahani, Marziyeh Tavalaee:
Predicting Sperm DNA Fragmentation Markers using Basic Semen Parameters and Age: A Preliminary Data Analysis. CSICC 2025: 1-7 - Mahmood Deypir:
Detecting Vulnerable Smart Contracts by Security Risk Estimation. CSICC 2025: 1-5 - Ali Edalat, Hadi Kamkar, Amir Mohammad Rasekh Mehrabi, Sadjad Nojavan, Saeed Aghamiri, S. Mohammad Fakhraie, Habibollah Yajam, Mohammadsadegh Alizadeh:
ZharfSima: Benchmarking Vision Language Models for Persian Language and Culture. CSICC 2025: 1-7 - Soroush Elyasi, Fattaneh Taghiyareh:
TIS: Three-Tiered Intelligent Supply Chain Management to Enhance Quality and Supervision. CSICC 2025: 1-7 - Parisa Esfehani, Neda Faraji, Farshad Almasganj:
An Experimental Study on SALSA-Lite Method for Localization of Multiple Human Speakers. CSICC 2025: 1-5 - Sepehr Eskandari, Mohammad Hesam Tadayon:
Cyber Protection Gap: Challenges and Remedies. CSICC 2025: 1-7 - Mahboubeh Farahat, Ali Ahmadi:
Geometric Autoencoder with Manifold Learning. CSICC 2025: 1-4 - Fatemeh Farsijani, Ali Zaheri, Davar Giveki, Hossein Peyvandi:
Low-Level Feature Representation in the RCSU-Net Model Using Channel-Spatial Attention Mechanism for Semantic Segmentation of Plant Leaves. CSICC 2025: 1-5 - Amin Fekri, Fahimeh Ghasemian, Hossein Ghasemalizadeh, Hossein Nozari:
Persian Physical Activity Recommender System Based on ParsBERT. CSICC 2025: 1-5 - Vida Fotoohabadi, Afsaneh Afzali, Pirooz Shamsinejadbabaki:
FeAdaBoost: Enhancing Federated Learning Accuracy by Ensemble Techniques. CSICC 2025: 1-5 - Sadra Galavani, Abolfazl Younesi, Mohsen Ansari:
QIGA: Quantum-Inspired Genetic Algorithm for Dynamic Scheduling in Mobile Edge Computing. CSICC 2025: 1-5 - Arman Gheysari, Murtadha Almahdawi, Hamid R. Zarandi:
Optimizing Proof-of-Work Blockchain Network Communications Using Genetic Algorithm. CSICC 2025: 1-5 - Mohammadreza Gholami, Mahshad Faramarzi, Nima Alipour, Mansooreh Pakravan:
Node Embedding Extraction for Causal Brain Graphs in fMRI Data. CSICC 2025: 1-6
loading more results
failed to load more results, please try again later

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
[+][–] Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
[+][–] Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-06-24 05:08 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint
