default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Likely matches
- Network Information Center
- First Birn
aka: Functional Imaging Research Schizophrenia Testbed-Biomedical Informatics Research Network - Federal Networking Council
- Dominantly Inherited Alzheimer Network (DIAN)
- The Cancer Genome Atlas Research Network
Venue search results
Likely matches
- International Conference on Computer Graphics and Interactive Techniques (SIGGRAPH)
- International Conference on Medical Image Computing and Computer-Assisted Intervention (MICCAI)
- Computer Networks
- International Conference for High Performance Computing, Networking, Storage and Analysis (SC)
- Journal of Network and Computer Applications
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 936,287 matches
- 2025
- Jing Xu:
Connecting the dots: Exploring backdoor attacks on graph neural networks. Delft University of Technology, Netherlands, 2025 - Mohammed Al-Khalidi, Rabab Al-Zaidi, Tarek Ali, Safiullah Khan, Ali Kashif Bashir:
AI-optimized elliptic curve with Certificate-Less Digital Signature for zero trust maritime security. Ad Hoc Networks 166: 103669 (2025) - Melchizedek Alipio, Miroslav Bures:
A cache-aware congestion control mechanism using deep reinforcement learning for wireless sensor networks. Ad Hoc Networks 166: 103678 (2025) - Rafael Silva Barbon, Edmundo R. M. Madeira, Ademar Takeo Akabane:
A two-context-aware approach for navigation: A case study for vehicular route recommendation. Ad Hoc Networks 166: 103655 (2025) - Zhipeng Cheng, Lu Liu, Minghui Liwang, Ning Chen, Xuwei Fan:
Learning-based joint recommendation, caching, and transmission optimization for cooperative edge video caching in Internet of Vehicles. Ad Hoc Networks 166: 103667 (2025) - Qingwen Han, Tianlin Yang, Yao Li, Yongsheng Zhao, Shuai Zhang, Guoqiang Zu:
TAVA: Traceable anonymity-self-controllable V2X Authentication over dynamic multiple charging-service providers. Ad Hoc Networks 166: 103666 (2025) - Mohammed Hassanin, Marwa Keshk, Sara Salim, Majid Alsubaie, Dharmendra Sharma:
PLLM-CS: Pre-trained Large Language Model (LLM) for cyber threat detection in satellite networks. Ad Hoc Networks 166: 103645 (2025) - Shajjad Hossain, Sidi-Mohammed Senouci, Bouziane Brik, Abdelwahab Boualouache:
A privacy-preserving Self-Supervised Learning-based intrusion detection system for 5G-V2X networks. Ad Hoc Networks 166: 103674 (2025) - Osama Ahmed Khashan:
Dual-stage machine learning approach for advanced malicious node detection in WSNs. Ad Hoc Networks 166: 103672 (2025) - Baogang Li, Jiale Chen, Xinlong Yu, Zhi Yang, Jingxi Zhang:
Cross-domain gesture recognition via WiFi signals with deep learning. Ad Hoc Networks 166: 103654 (2025) - Hong Min, Amir Masoud Rahmani, Payam Ghaderkourehpaz, Komeil Moghaddasi, Mehdi Hosseinzadeh:
A joint optimization of resource allocation management and multi-task offloading in high-mobility vehicular multi-access edge computing networks. Ad Hoc Networks 166: 103656 (2025) - Akhtar Saeed, Mikail Erdem, Özgür Gürbüz, Mustafa Alper Akkas:
THz band drone communications with practical antennas: Performance under realistic mobility and misalignment scenarios. Ad Hoc Networks 166: 103644 (2025) - Emre Sahin, Orhan Dagdeviren, Mustafa Alper Akkas:
Energy-efficient hierarchical cluster-based routing strategies for Internet of Nano-Things: Algorithms design and experimental evaluations. Ad Hoc Networks 166: 103673 (2025) - Zahraa Sweidan, Sanaa Sharafeddine, Mariette Awad:
RL-based mobile edge computing scheme for high reliability low latency services in UAV-aided IIoT networks. Ad Hoc Networks 166: 103646 (2025) - Girraj Kumar Verma, Vinay Chamola, Asheesh Tiwari, Neeraj Kumar, Dheerendra Mishra, Saurabh Rana, Ahmed Barnawi:
Escrow-free and efficient dynamic anonymous privacy-preserving batch verifiable authentication scheme for VANETs. Ad Hoc Networks 166: 103670 (2025) - Ji Wang, Miao Zhang, Quanjun Yin, Lujia Yin, Yong Peng:
Multi-agent reinforcement learning for task offloading with hybrid decision space in multi-access edge computing. Ad Hoc Networks 166: 103671 (2025) - Wenchao Yang, Yuxing Mao, Xueshuo Chen, Chunxu Chen, Bozheng Lei, Qing He:
A method for simultaneously implementing trajectory planning and DAG task scheduling in multi-UAV assisted edge computing. Ad Hoc Networks 166: 103668 (2025) - Siyu Guo, Yingnan Pan, Hongyi Li:
Dynamic event-driven optimal consensus control for state-constrained multiagent zero-sum differential graphical games. Appl. Math. Comput. 484: 128979 (2025) - Yubao Guo, Lutz Volkmann, Yun Wang:
Signed total Roman domination and domatic numbers in graphs. Appl. Math. Comput. 487: 129074 (2025) - Dan Li, Minghui Yan, Jixiang Meng:
Minimizing the least Laplacian eigenvalue of signed complete graphs. Appl. Math. Comput. 484: 129002 (2025) - Sunyo Moon, Seungkook Park:
Laplacian eigenvalue distribution for unicyclic graphs. Appl. Math. Comput. 485: 129022 (2025) - Francisco J. Muñoz, Luca Meacci, Juan Carlos Nuño, Mario Primicerio:
Exploring the limits of the law of mass action in the mean field description of epidemics on Erdös-Rényi networks. Appl. Math. Comput. 485: 129019 (2025) - Yi Shen, Jiemei Zhao, Liqi Yu:
Reachable set estimation of delayed second-order memristive neural networks. Appl. Math. Comput. 484: 128994 (2025) - Yu Sun, Cheng Hu, Juan Yu:
Pinning passivity and bipartite synchronization of fractional signed networks without gauge transformation. Appl. Math. Comput. 486: 129067 (2025) - R. Suvetha, Juan J. Nieto, P. Prakash:
Non-fragile output-feedback control for delayed memristive bidirectional associative memory neural networks against actuator failure. Appl. Math. Comput. 485: 129021 (2025) - Hong-Zhang Wang, Xing-Chen Shang-Guan, Du Xiong, Y.-H. An, L. Jin:
A matrix-separation-based integral inequality for aperiodic sampled-data synchronization of delayed neural networks considering communication delay. Appl. Math. Comput. 486: 129032 (2025) - Qing Yang, Yingzhi Tian:
Exploring redundant trees in bipartite graphs. Appl. Math. Comput. 486: 129006 (2025) - Jinsen Zhang, Xiaobing Nie:
Multiple exponential stability for short memory fractional impulsive Cohen-Grossberg neural networks with time delays. Appl. Math. Comput. 486: 129066 (2025) - Liangming Chen, Chenyang Liang, Yibei Li, Jie Mei, Lihua Xie:
Performance optimization for continuous network localization. Autom. 171: 111903 (2025) - Yong Ding, Hanlei Wang, Wei Ren:
Distributed continuous-time time-varying optimization for networked Lagrangian systems with quadratic cost functions. Autom. 171: 111882 (2025)
skipping 936,257 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-15 17:25 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint