default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 37 matches
- 2023
- Nishad A., Sajimon Abraham:
Contact tracing and mobility pattern detection during pandemics - a trajectory cluster based approach. Int. J. Pervasive Comput. Commun. 19(4): 624-650 (2023) - Noor Cholis Basjaruddin, Faris Rifqi Fakhrudin, Yana Sudarsa, Fatimah Noor:
NFC and IoT-based electronic health card for elementary students using sensor fusion method. Int. J. Pervasive Comput. Commun. 19(1): 43-53 (2023) - Jayaram Boga, V. Dhilip Kumar:
Human activity recognition in WBAN using ensemble model. Int. J. Pervasive Comput. Commun. 19(4): 513-549 (2023) - Mythili Boopathi, Meena Chavan, Jeneetha Jebanazer J, Sanjay Nakharu Prasad Kumar:
An approach for DoS attack detection in cloud computing using sine cosine anti coronavirus optimized deep maxout network. Int. J. Pervasive Comput. Commun. 19(5): 666-688 (2023) - Manik Chandra, Rajdeep Niyogi:
QoS aware web service selection using orthogonal array learning on fruit fly optimization approach. Int. J. Pervasive Comput. Commun. 19(3): 343-363 (2023) - Deepak Choudhary:
Optimized security algorithm for connected vehicular network. Int. J. Pervasive Comput. Commun. 19(5): 799-817 (2023) - Satyaki Datta, Utkarsh:
A qualitative study proposing service quality dimensions for video-on-demand services through over-the-top medium. Int. J. Pervasive Comput. Commun. 19(4): 550-572 (2023) - Tulsi Pawan Fowdur, Lavesh Babooram:
Performance analysis of a cloud-based network analytics system with multiple-source data aggregation. Int. J. Pervasive Comput. Commun. 19(5): 698-733 (2023) - Shilpa Gite, Ketan Kotecha, Gheorghita Ghinea:
Context-aware assistive driving: an overview of techniques for mitigating the risks of driver in real-time driving environment. Int. J. Pervasive Comput. Commun. 19(3): 325-342 (2023) - Souad El Houssaini, Mohammed-Alamine El Houssaini, Jamal El Kafi:
Novel approach of detecting the black hole attack for vehicular ad-hoc networks based on capability indicators. Int. J. Pervasive Comput. Commun. 19(5): 734-755 (2023) - Devid Jegerson, Matloub Hussain:
A framework for measuring the adoption factors in digital mobile payments in the COVID-19 era. Int. J. Pervasive Comput. Commun. 19(4): 596-623 (2023) - Geetha K, Brahmananda S. H:
Network traffic analysis through deep learning for detection of an army of bots in health IoT network. Int. J. Pervasive Comput. Commun. 19(5): 653-665 (2023) - Mandeep Kaur, Rajinder Sandhu, Rajni Mohana:
A framework for scheduling IoT application jobs on fog computing infrastructure based on QoS parameters. Int. J. Pervasive Comput. Commun. 19(3): 364-385 (2023) - Kotaru Kiran, Rajeswara Rao D.:
5G heterogeneous network (HetNets): a self-optimization technique for vertical handover management. Int. J. Pervasive Comput. Commun. 19(1): 1-22 (2023) - Sanjay Sudhir Kulkarni, Arjav A. Bavarva:
A survey on various handover technologies in 5G network using the modular handover modules. Int. J. Pervasive Comput. Commun. 19(2): 267-290 (2023) - Manju V. M., Ganesh R. S.:
Review on various detectors in massive MIMO technology: a performance analysis. Int. J. Pervasive Comput. Commun. 19(2): 291-322 (2023) - Hamidreza Nasiriasayesh, Alireza Yari, Eslam Nazemi:
Adaptive IWD-based algorithm for deployment of business processes into cloud federations. Int. J. Pervasive Comput. Commun. 19(1): 54-73 (2023) - Mithun B. Patil, Rekha Patil:
A network controlled vertical handoff mechanism for heterogeneous wireless network using optimized support vector neural network. Int. J. Pervasive Comput. Commun. 19(1): 23-42 (2023) - Ankush Balaram Pawar, Shashikant U. Ghumbre, Rashmi M. Jogdand:
Privacy preserving model-based authentication and data security in cloud computing. Int. J. Pervasive Comput. Commun. 19(2): 173-190 (2023) - Mohandas V. Pawar, Anuradha Jagadeesan:
Detection and prevention of black-hole and wormhole attacks in wireless sensor network using optimized LSTM. Int. J. Pervasive Comput. Commun. 19(1): 124-153 (2023) - Syama R., Mala C.:
Context-aware behaviour prediction for autonomous driving: a deep learning approach. Int. J. Pervasive Comput. Commun. 19(4): 477-490 (2023) - Gnaneshwari G. R., M. S. Hema, S. C. Lingareddy:
Authentication-based access control approach for enhancing security in pervasive computing environments. Int. J. Pervasive Comput. Commun. 19(2): 211-232 (2023) - Arthi R., Nayana J. S., Rajarshee Mondal:
Real-time optimal protocol prediction of quantum key distribution using machine learning. Int. J. Pervasive Comput. Commun. 19(5): 689-697 (2023) - Yerra Readdy Alekya Rani, Edara Sreenivasa Reddy:
An optimal communication in WSN enabled by fuzzy clustering and improved meta-heuristic model. Int. J. Pervasive Comput. Commun. 19(2): 233-254 (2023) - Sirasani Srinivasa Rao, Subba Ramaiah V.:
FHSA: fractional harmony search algorithm for polyphase code design in radar signal processing. Int. J. Pervasive Comput. Commun. 19(3): 412-431 (2023) - Umesh K. Raut, L. K. Vishwamitra:
Seek-and-destroy algorithm for optimal resource allocation and security analysis in software-defined vehicular networks. Int. J. Pervasive Comput. Commun. 19(1): 97-123 (2023) - Subramonian Krishna Sarma:
Metaheuristic based auto-scaling for microservices in cloud environment: a new container-aware application scheduling. Int. J. Pervasive Comput. Commun. 19(1): 74-96 (2023) - Hingmire Vishal Sharad, Santosh R. Desai, Kanse Yuvraj Krishnrao:
Energy-aware multipath routing in WSN using improved invasive weed elephant herd optimization. Int. J. Pervasive Comput. Commun. 19(3): 451-474 (2023) - Nidhi Sharma, Ravindara Bhatt:
Source location privacy preservation in IoT-enabled event-driven WSNs. Int. J. Pervasive Comput. Commun. 19(5): 782-798 (2023) - Minakshi Sharma, Rajneesh Kumar, Anurag Jain:
A distributed quality of service-enabled load balancing approach for cloud environment. Int. J. Pervasive Comput. Commun. 19(4): 491-512 (2023)
skipping 7 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-15 15:08 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint