default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 99 matches
- 2018
- Yi Liu, Kosuke Ozera, Keita Matsuo, Makoto Ikeda, Leonard Barolli, Vladi Kolici:
Improving Team Collaboration in MobilePeerDroid Mobile System: A Fuzzy-Based Approach Considering Four Input Parameters. EIDWT 2018: 65-78 - Kentaro Aburada, Yoshihiro Kita, Hisaaki Yamaba, Tetsuro Katayama, Mirang Park, Naonobu Okazaki:
Evaluation of Index Poisoning Method in Large Scale Winny Network. EIDWT 2018: 999-1006 - Elson Agastra
, Bexhet Kamo, Ilir Shinko, Renalda Kushe:
Data Interpretation Using Mobile Uncalibrated Sensor for Urban Environmental Monitoring. EIDWT 2018: 597-605 - Flora Amato
, Francesco Moscato, Fatos Xhafa:
Cloud Orchestration with ORCS and OpenStack. EIDWT 2018: 944-955 - Flora Amato
, Leonard Barolli, Giovanni Cozzolino, Antonino Mazzeo, Francesco Moscato:
Improving Results of Forensics Analysis by Semantic-Based Suggestion System. EIDWT 2018: 956-967 - Ping Bai, Wei Zhang, Xu An Wang
, Yudong Liu, Haibin Yang, Chun Shan:
Homomorphic Authentication Based on Rank-Based Merkle Hash Tree. EIDWT 2018: 841-848 - Anjan Bandyopadhyay
, Fatos Xhafa, Sajal Mukhopadhyay:
An Auction Framework for DaaS in Cloud Computing. EIDWT 2018: 732-741 - Admir Barolli, Shinji Sakamoto, Kosuke Ozera, Leonard Barolli, Elis Kulla, Makoto Takizawa:
Design and Implementation of a Hybrid Intelligent System Based on Particle Swarm Optimization and Distributed Genetic Algorithm. EIDWT 2018: 79-93 - Rasool Bukhsh
, Zafar Iqbal, Nadeem Javaid
, Usman Ahmed, Asif Khan
, Zahoor Ali Khan:
Appliances Scheduling Using State-of-the-Art Algorithms for Residential Demand Response. EIDWT 2018: 292-302 - Kevin Bylykbashi, Ryoichiro Obukata, Yi Liu, Evjola Spaho
, Leonard Barolli, Makoto Takizawa:
Application of Fuzzy Logic for Improving Human Sleeping Conditions in an Ambient Intelligence Testbed. EIDWT 2018: 41-50 - Giovanni Cammarata, Rao Mikkilineni, Giovanni Morana, Riccardo Nocita:
Improving Security with Cognitive Workflows. EIDWT 2018: 429-436 - Elena Canaj, Aleksander Xhuvani:
Big Data in Cloud Computing: A Review of Key Technologies and Open Issues. EIDWT 2018: 504-513 - Wenwu Chen, Xu An Wang
, Wei Zhang, Chunfen Xu:
Phishing Detection Research Based on PSO-BP Neural Network. EIDWT 2018: 990-998 - Miralda Cuka, Donald Elmazi
, Kevin Bylykbashi, Evjola Spaho
, Makoto Ikeda, Leonard Barolli:
A Fuzzy-Based System for Selection of IoT Devices in Opportunistic Networks Considering IoT Device Storage, Waiting Time and Security Parameters. EIDWT 2018: 94-105 - Stavros N. Demetriadis, Anastasios Karakostas
, Thrasyvoulos Tsiatsos, Santi Caballé
, Yannis A. Dimitriadis
, Armin Weinberger, Pantelis M. Papadopoulos
, George Palaigeorgiou, Costas Tsimpanis, Matthew Hodges:
Towards Integrating Conversational Agents and Learning Analytics in MOOCs. EIDWT 2018: 1061-1072 - Abeer E. W. Eldewahi, Alzubair Hassan, Khalid Elbadawi, Bazara I. A. Barry:
The Analysis of MATE Attack in SDN Based on STRIDE Model. EIDWT 2018: 901-910 - Donald Elmazi
, Miralda Cuka, Kevin Bylykbashi, Evjola Spaho
, Makoto Ikeda, Leonard Barolli:
Selection of Actor Nodes in Wireless Sensor and Actor Networks Considering Failure of Assigned Task as New Parameter. EIDWT 2018: 106-118 - Indrit Enesi
, Algenti Lala, Elma Zanaj
:
A Fingerprint Enhancement Algorithm in Spatial and Wavelet Domain. EIDWT 2018: 742-753 - Tomoya Enokido, Dilawaer Duolikun, Makoto Takizawa:
Improved Energy-Efficient Quorum Selection Algorithm by Omitting Meaningless Methods. EIDWT 2018: 171-182 - Itrat Fatima, Nadeem Javaid
, Abdul Wahid
, Zunaira Nadeem, Muqaddas Naz, Zahoor Ali Khan:
Stochastic Power Management in Microgrid with Efficient Energy Storage. EIDWT 2018: 202-213 - Siran Fu, Baojiang Cui, Tao Guo, Xuyan Song:
C++ Memory Detection Tool Based on Dynamic Instrumentation. EIDWT 2018: 663-674 - Nobuo Funabiki, Khin Khin Zaw, Ei Ei Mon, Wen-Chung Kao:
An Improved Informative Test Code Approach for Code Writing Problem in Java Programming Learning Assistant System. EIDWT 2018: 687-698 - Klodiana Goga
, Fatos Xhafa, Olivier Terzo:
VM Deployment Methods for DaaS Model in Clouds. EIDWT 2018: 371-382 - Nuno Guimarães
, Filipe Miranda, Álvaro Figueira
:
Human vs. Automatic Annotation Regarding the Task of Relevance Detection in Social Networks. EIDWT 2018: 922-933 - Toshiyuki Haramaki
, Hiroaki Nishino:
An Edge Computer Based Driver Monitoring System for Assisting Safety Driving. EIDWT 2018: 639-650 - Toshinobu Hayashi, Shinji Sugawara
:
Efficient Content Sharing with File Splitting and Differences Between Versions in Hybrid Peer-to-Peer Networks. EIDWT 2018: 416-428 - Faisal Hayat, Nadeem Javaid
, Mehreen Shah, Umar Rasheed, Aasma Khan, Zahoor Ali Khan:
Routing Protocol with Minimized Load Distribution for UASNs. EIDWT 2018: 258-269 - Astrit Hulaj
, Adrian Shehu:
An Efficient Algorithm to Energy Savings for Application to the Wireless Multimedia Sensor Networks. EIDWT 2018: 349-358 - Mohammed Abdulaziz Ikram, Farookh Khadeer Hussain:
Software as a Service (SaaS) Service Selection Based on Measuring the Shortest Distance to the Consumer's Preferences. EIDWT 2018: 403-415 - Nebojsha Ilijoski, Vladimir Trajkovik
:
Usage Optimization of Mobile Devices Resources in Mobile Web. EIDWT 2018: 315-325
skipping 69 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-08-03 10:38 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint