![](https://dblp.org/img/logo.ua.320x120.png)
![](https://dblp.org/img/dropdown.dark.16x16.png)
![](https://dblp.org/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.org/img/search.dark.16x16.png)
![search dblp](https://dblp.org/img/search.dark.16x16.png)
default search action
Journal of Internet Services and Applications, Volume 9
Volume 9, Number 1, December 2018
- Pedro Geraldo M. R. Alves
, Diego F. Aranha
:
A framework for searching encrypted databases. 1:1-1:18 - Alan Oliveira de Sá
, Luiz F. R. da Costa Carmo, Raphael C. S. Machado:
A controller design for mitigation of passive system identification attacks in networked control systems. 2:1-2:19 - Alexandre Lucchesi, André C. Drummond
, George Teodoro
:
High-performance IP lookup using Intel Xeon Phi: a Bloom filters based approach. 3:1-3:18 - Thiago Werlley B. Silva, Daniel C. Morais
, Halamo G. R. Andrade, Antonio Marcus Nogueira de Lima
, Elmar U. K. Melcher, Alisson V. Brito
:
Environment for integration of distributed heterogeneous computing systems. 4:1-4:17 - Vinodkrishnan Kulathumani, Masahiro Nakagawa, Anish Arora:
EZ-AG: structure-free data aggregation in MANETs using push-assisted self-repelling random walks. 5:1-5:14 - Crystiam Kelle Pereira, Fernanda Campos, Victor Ströele
, José Maria N. David
, Regina Braga
:
BROAD-RSI - educational recommender system using social networks interactions and linked data. 7:1-7:28 - Juho Lindman
, Imed Hammouda:
Support mechanisms provided by FLOSS foundations and other entities. 8:1-8:12 - Leandro Ventura Silva, Pedro Barbosa, Rodolfo Marinho, Andrey Brito:
Security and privacy aware data aggregation on cloud computing. 6:1-6:13 - Salman Hooshmand, Gregor von Bochmann, Guy-Vincent Jourdan
, Russell Couturier, Iosif-Viorel Onut:
Recovering user-interactions of Rich Internet Applications through replaying of HTTP traces. 9:1-9:27 - Marco Autili
, Dimitra Giannakopoulou, Massimo Tivoli
:
Thematic series on Verification and Composition for the Internet of Services and Things. 10:1-10:3 - Gunnar E. Wolf
, Víctor González Quiroga:
Insights on the large-scale deployment of a curated Web-of-Trust: the Debian project's cryptographic keyring. 11:1-11:12 - Edmilson P. da Costa Júnior, Carlos Eduardo da Silva
, Marcos Pinheiro, Silvio Sampaio
:
A new approach to deploy a self-adaptive distributed firewall. 12:1-12:21 - Raouf Boutaba, Mohammad A. Salahuddin, Noura Limam, Sara Ayoubi, Nashid Shahriar
, Felipe Estrada Solano
, Oscar Maurício Caicedo Rendón
:
A comprehensive survey on machine learning for networking: evolution, applications and research opportunities. 16:1-16:99 - Vianney Kengne Tchendji
, Yannick Florian Yankam, Jean Frédéric Myoupo
:
Conflict-free rerouting scheme through flow splitting for virtual networks using switches. 13:1-13:15 - Karima Velasquez
, David Perez Abreu
, Marcio R. M. Assis, Carlos R. Senna
, Diego F. Aranha
, Luiz F. Bittencourt, Nuno Laranjeiro
, Marília Curado
, Marco Vieira
, Edmundo Monteiro
, Edmundo Roberto Mauro Madeira:
Fog orchestration for the Internet of Everything: state-of-the-art and research challenges. 14:1-14:23 - Daniel Schneider
, Mario Trapp:
B-space: dynamic management and assurance of open systems of systems. 15:1-15:16 - Hanna Mäenpää
, Simo Mäkinen, Terhi Kilamo, Tommi Mikkonen
, Tomi Männistö
, Paavo Ritala:
Organizing for openness: six models for developer involvement in hybrid OSS projects. 17:1-17:14 - Josemar Alves Caetano
, Helder Seixas Lima, Mateus F. Santos, Humberto Torres Marques-Neto
:
Using sentiment analysis to define twitter political users' classes and their homophily during the 2016 American presidential election. 18:1-18:15 - Carlos Eduardo da Silva
, Thomas Diniz, Nélio Cacho, Rogério de Lemos:
Self-adaptive authorisation in OpenStack cloud platform. 19:1-19:17 - Jeancarlo C. Leão
, Michele A. Brandão, Pedro O. S. Vaz de Melo
, Alberto H. F. Laender:
Who is really in my social circle? - Mining social relationships to improve detection of real communities. 20:1-20:17 - Michael Nekrasov
, Daniel Iland, Miriam J. Metzger, Lisa Parks, Elizabeth M. Belding:
A user-driven free speech application for anonymous and verified online, public group discourse. 21 - Carlos Caminha, Vasco Furtado, Vládia Pinheiro, Caio Ponte:
Graph mining for the detection of overcrowding and waste of resources in public transport. 22:1-22:11 - Letícia Dias Verona
, Jonice Oliveira
, José Vitor da Cunha Hisse, Maria Luiza Machado Campos:
Metrics for network power based on Castells' Network Theory of Power: a case study on Brazilian elections. 23 - Leonardo B. Oliveira, Fernando Magno Quintão Pereira, Rafael Misoczki, Diego F. Aranha
, Fábio Borges
, Michele Nogueira, Michelle S. Wangham
, Min Wu, Jie Liu:
The computer for the 21st century: present security & privacy challenges. 24:1-24:25 - Túlio C. Loures
, Pedro O. S. Vaz de Melo
, Adriano Alonso Veloso:
Is it possible to describe television series from online comments? 25:1-25:17 - Imad Jawhar, Nader Mohamed, Jameela Al-Jaroodi:
Networking architectures and protocols for smart city systems. 26:1-26:16
![](https://dblp.org/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.