Search dblp for Publications

export results for "toc:db/journals/ijes/ijes7.bht:"

 download as .bib file

@article{DBLP:journals/ijes/CaiZY15,
  author       = {Qingling Cai and
                  Yiju Zhan and
                  Jian Yang},
  title        = {{RFID} authentication protocol design methodology},
  journal      = {Int. J. Embed. Syst.},
  volume       = {7},
  number       = {2},
  pages        = {91--103},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJES.2015.069985},
  doi          = {10.1504/IJES.2015.069985},
  timestamp    = {Wed, 13 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijes/CaiZY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijes/ChuF15,
  author       = {XiaoBo Chu and
                  Dengguo Feng},
  title        = {On the provable security of {TPM2.0} cryptography APIs},
  journal      = {Int. J. Embed. Syst.},
  volume       = {7},
  number       = {3/4},
  pages        = {230--243},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJES.2015.072369},
  doi          = {10.1504/IJES.2015.072369},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijes/ChuF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijes/DongCQZ15,
  author       = {Ying{-}hong Dong and
                  Hao Chen and
                  Weining Qian and
                  Aoying Zhou},
  title        = {Micro-blog social moods and Chinese stock market: the influence of
                  emotional valence and arousal on Shanghai Composite Index volume},
  journal      = {Int. J. Embed. Syst.},
  volume       = {7},
  number       = {2},
  pages        = {148--155},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJES.2015.069987},
  doi          = {10.1504/IJES.2015.069987},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijes/DongCQZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijes/DungTHT15,
  author       = {Tran Van Dung and
                  Ittetsu Taniguchi and
                  Takuji Hieda and
                  Hiroyuki Tomiyama},
  title        = {Function-level profiling for embedded software with {QEMU}},
  journal      = {Int. J. Embed. Syst.},
  volume       = {7},
  number       = {2},
  pages        = {170--179},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJES.2015.069998},
  doi          = {10.1504/IJES.2015.069998},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijes/DungTHT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijes/HeYCLY15,
  author       = {Ruhan He and
                  Yongsheng Yu and
                  Jia Chen and
                  Min Li and
                  Xun Yao},
  title        = {Region covariance tracking with hybrid search strategy},
  journal      = {Int. J. Embed. Syst.},
  volume       = {7},
  number       = {1},
  pages        = {55--62},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJES.2015.066142},
  doi          = {10.1504/IJES.2015.066142},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijes/HeYCLY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijes/HuYYXZY15,
  author       = {Chengyu Hu and
                  Zuoxia Yu and
                  Rupeng Yang and
                  Qiuliang Xu and
                  Yongbin Zhou and
                  Qixia Yuan},
  title        = {Weak leakage resilient extractable hash proof system and construction
                  for weak leakage resilient CCA-secure public-key encryption},
  journal      = {Int. J. Embed. Syst.},
  volume       = {7},
  number       = {3/4},
  pages        = {216--229},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJES.2015.072367},
  doi          = {10.1504/IJES.2015.072367},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijes/HuYYXZY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijes/JiangJWH15,
  author       = {Nan Jiang and
                  Sixin Jin and
                  Tao Wan and
                  Yueshun He},
  title        = {{MVP:} modelling virus propagation for IPv6 wireless sensor networks},
  journal      = {Int. J. Embed. Syst.},
  volume       = {7},
  number       = {3/4},
  pages        = {244--256},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJES.2015.072371},
  doi          = {10.1504/IJES.2015.072371},
  timestamp    = {Fri, 22 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijes/JiangJWH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijes/KolchinF15,
  author       = {Ivan Kolchin and
                  Sergey Filippov},
  title        = {Bare-metal microhypervisor prototype and measurement of real-time
                  characteristics},
  journal      = {Int. J. Embed. Syst.},
  volume       = {7},
  number       = {1},
  pages        = {1--10},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJES.2015.066137},
  doi          = {10.1504/IJES.2015.066137},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijes/KolchinF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijes/KosSVPGKBBTP15,
  author       = {Andrej Kos and
                  Urban Sedlar and
                  Mojca Volk and
                  Klemen Peternel and
                  Joze Guna and
                  Aleksander Kovacic and
                  Gregor Burger and
                  Janez Bester and
                  Saso Tomazic and
                  Matevz Pogacnik},
  title        = {Real-time eHealth visualisation and actuation platform},
  journal      = {Int. J. Embed. Syst.},
  volume       = {7},
  number       = {2},
  pages        = {104--114},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJES.2015.069995},
  doi          = {10.1504/IJES.2015.069995},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijes/KosSVPGKBBTP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijes/LiGLH15,
  author       = {Guilin Li and
                  Xing Gao and
                  Minghong Liao and
                  Bing Han},
  title        = {An iterative algorithm to process the top-k query for the wireless
                  sensor networks},
  journal      = {Int. J. Embed. Syst.},
  volume       = {7},
  number       = {1},
  pages        = {26--33},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJES.2015.066139},
  doi          = {10.1504/IJES.2015.066139},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijes/LiGLH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijes/LiHLXW15,
  author       = {Mengting Li and
                  Xinyi Huang and
                  Joseph K. Liu and
                  Li Xu and
                  Wei Wu},
  title        = {Cooperative attribute-based access control for enterprise computing
                  system},
  journal      = {Int. J. Embed. Syst.},
  volume       = {7},
  number       = {3/4},
  pages        = {191--202},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJES.2015.072364},
  doi          = {10.1504/IJES.2015.072364},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijes/LiHLXW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijes/LiLXJL15,
  author       = {Zhongwen Li and
                  Qian Li and
                  Zhibin Xu and
                  Hai Jiang and
                  Kuan{-}Ching Li},
  title        = {A secured transmission model for {EPC} network},
  journal      = {Int. J. Embed. Syst.},
  volume       = {7},
  number       = {3/4},
  pages        = {324--333},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJES.2015.072375},
  doi          = {10.1504/IJES.2015.072375},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijes/LiLXJL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijes/LiPSZ15,
  author       = {Jingzhao Li and
                  Ren Ping and
                  Ling{-}Ling Shi and
                  Shunxiang Zhang},
  title        = {Optimisation of moving target's low-power and high-precision monitoring
                  with {RSSI} based on static and dynamic clustering},
  journal      = {Int. J. Embed. Syst.},
  volume       = {7},
  number       = {3/4},
  pages        = {334--344},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJES.2015.072363},
  doi          = {10.1504/IJES.2015.072363},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijes/LiPSZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijes/LiZM15,
  author       = {Qiang Li and
                  Guoyin Zhu and
                  Lixin Miao},
  title        = {Developing operation layer of logistics information system based on
                  {EPCIS}},
  journal      = {Int. J. Embed. Syst.},
  volume       = {7},
  number       = {2},
  pages        = {115--122},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJES.2015.069996},
  doi          = {10.1504/IJES.2015.069996},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijes/LiZM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijes/LiaoYHS15,
  author       = {Zhensong Liao and
                  Qiang Yin and
                  Yan Huang and
                  Li Sheng},
  title        = {Management and application of mobile big data},
  journal      = {Int. J. Embed. Syst.},
  volume       = {7},
  number       = {1},
  pages        = {63--70},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJES.2015.066143},
  doi          = {10.1504/IJES.2015.066143},
  timestamp    = {Tue, 24 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijes/LiaoYHS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijes/LiuJL15,
  author       = {Jun Liu and
                  Hongwei Jiang and
                  Xiaoming Liu},
  title        = {A 3-D robust detail preserving anisotropic diffusion for speckle reduction
                  in 3-D cattle follicle ultrasound image},
  journal      = {Int. J. Embed. Syst.},
  volume       = {7},
  number       = {2},
  pages        = {156--161},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJES.2015.069989},
  doi          = {10.1504/IJES.2015.069989},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijes/LiuJL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijes/LiuLSA15,
  author       = {Jingwei Liu and
                  Qian Li and
                  Rong Sun and
                  Sawand Muhammad Ajmal},
  title        = {Energy-efficient key agreement protocols for wireless body area networks},
  journal      = {Int. J. Embed. Syst.},
  volume       = {7},
  number       = {3/4},
  pages        = {266--279},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJES.2015.072368},
  doi          = {10.1504/IJES.2015.072368},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijes/LiuLSA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijes/LiuQLZ15,
  author       = {Ling Liu and
                  Hanyu Quan and
                  Xuefeng Liu and
                  Yuqing Zhang},
  title        = {Lightweight handover authentication with location privacy-preserving
                  in mobile wireless networks},
  journal      = {Int. J. Embed. Syst.},
  volume       = {7},
  number       = {3/4},
  pages        = {280--288},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJES.2015.072374},
  doi          = {10.1504/IJES.2015.072374},
  timestamp    = {Fri, 03 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijes/LiuQLZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijes/Luo15,
  author       = {Song Luo},
  title        = {Anonymous hierarchical identity-based encryption without key delegation
                  in decryption},
  journal      = {Int. J. Embed. Syst.},
  volume       = {7},
  number       = {3/4},
  pages        = {306--317},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJES.2015.072373},
  doi          = {10.1504/IJES.2015.072373},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijes/Luo15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijes/MandalaNSZM15,
  author       = {Satria Mandala and
                  Md. Asri Ngadi and
                  Johan Mohamad Sharif and
                  Mohd Soperi Mohd Zahid and
                  Farhan Mohamed},
  title        = {Investigating severity of blackhole attack and its variance in wireless
                  mobile ad hoc networks},
  journal      = {Int. J. Embed. Syst.},
  volume       = {7},
  number       = {3/4},
  pages        = {296--305},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJES.2015.072370},
  doi          = {10.1504/IJES.2015.072370},
  timestamp    = {Sat, 23 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijes/MandalaNSZM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijes/MessaoudiBTMML15,
  author       = {Kamel Messaoudi and
                  El{-}Bay Bourennane and
                  Salah Toumi and
                  Hichem Mayache and
                  Nawfel Messaoudi and
                  Ouassila Labbani},
  title        = {Utilisation of the Array-OL specification language for self-generation
                  of a memory controller especially for the {H.264/AVC}},
  journal      = {Int. J. Embed. Syst.},
  volume       = {7},
  number       = {2},
  pages        = {133--147},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJES.2015.069984},
  doi          = {10.1504/IJES.2015.069984},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijes/MessaoudiBTMML15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijes/NiuQ15,
  author       = {Linwei Niu and
                  Gang Quan},
  title        = {Peripheral-conscious energy-efficient scheduling for weakly hard real-time
                  systems},
  journal      = {Int. J. Embed. Syst.},
  volume       = {7},
  number       = {1},
  pages        = {11--25},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJES.2015.066138},
  doi          = {10.1504/IJES.2015.066138},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijes/NiuQ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijes/PengC15,
  author       = {Junjie Peng and
                  Yuanyuan Chen},
  title        = {A low energy consumption {WSN} node},
  journal      = {Int. J. Embed. Syst.},
  volume       = {7},
  number       = {3/4},
  pages        = {318--323},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJES.2015.072362},
  doi          = {10.1504/IJES.2015.072362},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijes/PengC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijes/PuXHZQH15,
  author       = {Lu Pu and
                  Xiaowei Xu and
                  Han He and
                  Hanqing Zhou and
                  Zhijun Qiu and
                  Yu Hu},
  title        = {A flexible control study of variable speed limit in connected vehicle
                  systems},
  journal      = {Int. J. Embed. Syst.},
  volume       = {7},
  number       = {2},
  pages        = {180--188},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJES.2015.069997},
  doi          = {10.1504/IJES.2015.069997},
  timestamp    = {Thu, 04 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijes/PuXHZQH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijes/ShaoY15,
  author       = {Zhi{-}Yi Shao and
                  Bo Yang},
  title        = {Proof of retrievability with efficient verification},
  journal      = {Int. J. Embed. Syst.},
  volume       = {7},
  number       = {3/4},
  pages        = {203--215},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJES.2015.072365},
  doi          = {10.1504/IJES.2015.072365},
  timestamp    = {Tue, 16 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijes/ShaoY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijes/TalpurBW15,
  author       = {Mir Sajjad Hussain Talpur and
                  Md. Zakirul Alam Bhuiyan and
                  Guojun Wang},
  title        = {Shared-node IoT network architecture with ubiquitous homomorphic encryption
                  for healthcare monitoring},
  journal      = {Int. J. Embed. Syst.},
  volume       = {7},
  number       = {1},
  pages        = {43--54},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJES.2015.066141},
  doi          = {10.1504/IJES.2015.066141},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijes/TalpurBW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijes/WangZZW15,
  author       = {Tai Wang and
                  Zongkui Zhou and
                  Tingshao Zhu and
                  Yang Wei},
  title        = {Mood disorder patients' language features on their microblogs},
  journal      = {Int. J. Embed. Syst.},
  volume       = {7},
  number       = {1},
  pages        = {34--42},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJES.2015.066140},
  doi          = {10.1504/IJES.2015.066140},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijes/WangZZW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijes/WeiMML15,
  author       = {Fushan Wei and
                  Jianfeng Ma and
                  Chuangui Ma and
                  Xinghua Li},
  title        = {A two-factor authenticated key exchange protocol based on {RSA} with
                  dynamic passwords},
  journal      = {Int. J. Embed. Syst.},
  volume       = {7},
  number       = {3/4},
  pages        = {257--265},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJES.2015.072366},
  doi          = {10.1504/IJES.2015.072366},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijes/WeiMML15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijes/WuXSZ15,
  author       = {Chao Wu and
                  Bin Xu and
                  ShanShan Shi and
                  Bin Zhao},
  title        = {Time-activity pattern observatory from mobile web logs},
  journal      = {Int. J. Embed. Syst.},
  volume       = {7},
  number       = {1},
  pages        = {71--78},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJES.2015.066144},
  doi          = {10.1504/IJES.2015.066144},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijes/WuXSZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijes/XiaoX15,
  author       = {Qian Xiao and
                  Haitao Xie},
  title        = {A social tag recommendation method alleviating cold start based on
                  probabilistic graphical model},
  journal      = {Int. J. Embed. Syst.},
  volume       = {7},
  number       = {2},
  pages        = {162--169},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJES.2015.069994},
  doi          = {10.1504/IJES.2015.069994},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijes/XiaoX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijes/ZhangWZDW15,
  author       = {Wujun Zhang and
                  Xiaohui Wang and
                  Yunya Zhou and
                  Hua Deng and
                  Yumin Wang},
  title        = {A GAA-based batch authentication and key agreement for {LTE} networks},
  journal      = {Int. J. Embed. Syst.},
  volume       = {7},
  number       = {3/4},
  pages        = {289--295},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJES.2015.072372},
  doi          = {10.1504/IJES.2015.072372},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijes/ZhangWZDW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijes/ZhuWWWM15,
  author       = {Linghao Zhu and
                  Cheng Wu and
                  Linyin Wu and
                  Junyu Wang and
                  Hao Min},
  title        = {A DPA-resistant crypto engine for {UHF} {RFID} tag},
  journal      = {Int. J. Embed. Syst.},
  volume       = {7},
  number       = {2},
  pages        = {123--132},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJES.2015.069986},
  doi          = {10.1504/IJES.2015.069986},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijes/ZhuWWWM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijes/ZhuX15,
  author       = {Li Zhu and
                  Shengyong Xu},
  title        = {Prediction algorithm based on web mining for multimedia objects in
                  next-generation Digital Earth},
  journal      = {Int. J. Embed. Syst.},
  volume       = {7},
  number       = {1},
  pages        = {79--87},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJES.2015.066145},
  doi          = {10.1504/IJES.2015.066145},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijes/ZhuX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics