default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Likely matches
- Zhu Han 0001
University of Houston, TX, USA - Hai Jin 0001
Huazhong University of Science and Technology, School of Computer Science and Technology, Services Computing Technology and System Lab, Cluster and Grid Computing Lab, Wuhan, China - Wen Gao 0001
Chinese Academy of Sciences, Institute of Computing Technology, Beijing, China - Xuelong Li 0001
China Telecom Corp Ltd, Institute of Artificial Intelligence, TeleAI, Beijing, China - Jiawei Han 0001
University of Illinois at Urbana-Champaign, Department of Computer Science, IL, USA
Venue search results
Likely matches
- Imaging and Multimedia Analytics at the Edge
- Workshop on Metrology for Industry 4.0 and IoT (MetroInd4.0&IoT)
- International Conference on Industry 4.0 and Smart Manufacturing (ISM)
- International Workshop on Computer Information Technologies in Industry 4.0 (CITI)
- Workshop on Web 2.0 for Software Engineering (Web2SE)
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 1,623,469 matches
- 2025
- Jing Xu:
Connecting the dots: Exploring backdoor attacks on graph neural networks. Delft University of Technology, Netherlands, 2025 - Valentin Ovsienko, Emmanuel Pedon:
Continued fractions for q-deformed real numbers, {-1,0,1}-Hankel determinants, and Somos-Gale-Robinson sequences. Adv. Appl. Math. 162: 102788 (2025) - Li Li, Hongbin Chen:
Age of information optimal UAV swarm-assisted sweep coverage in wireless sensor networks. Ad Hoc Networks 166: 103675 (2025) - Ning Liu, Jun Wang, Fazhan Tao, Zhumu Fu, Bo Liu:
EDRP-GTDQN: An adaptive routing protocol for energy and delay optimization in wireless sensor networks using game theory and deep reinforcement learning. Ad Hoc Networks 166: 103687 (2025) - Hong Min, Amir Masoud Rahmani, Payam Ghaderkourehpaz, Komeil Moghaddasi, Mehdi Hosseinzadeh:
A joint optimization of resource allocation management and multi-task offloading in high-mobility vehicular multi-access edge computing networks. Ad Hoc Networks 166: 103656 (2025) - Girraj Kumar Verma, Vinay Chamola, Asheesh Tiwari, Neeraj Kumar, Dheerendra Mishra, Saurabh Rana, Ahmed Barnawi:
Escrow-free and efficient dynamic anonymous privacy-preserving batch verifiable authentication scheme for VANETs. Ad Hoc Networks 166: 103670 (2025) - Shudong Wang, Zhi Lu, Haiyuan Gui, Xiao He, Shengzhe Zhao, Zixuan Fan, Yanxiang Zhang, Shanchen Pang:
DDQN-based online computation offloading and application caching for dynamic edge computing service management. Ad Hoc Networks 166: 103681 (2025) - Ji Wang, Miao Zhang, Quanjun Yin, Lujia Yin, Yong Peng:
Multi-agent reinforcement learning for task offloading with hybrid decision space in multi-access edge computing. Ad Hoc Networks 166: 103671 (2025) - Zhilin Xu, Hao Sun, Panfei Sun, Qianqian Kong:
Requester mobility for mobile crowdsensing system: A dynamic alliance-based incentive mechanism. Ad Hoc Networks 166: 103680 (2025) - Jie Zhang, Lei Zhang, Degan Zhang, Ting Zhang, Shuo Wang, Cheng-hui Zou:
New routing method based on sticky bacteria algorithm and link stability for VANET. Ad Hoc Networks 166: 103682 (2025) - Chen Li, Yoshihiro Yamanishi:
AI-driven transcriptome profile-guided hit molecule generation. Artif. Intell. 338: 104239 (2025) - Júlio Araújo, Mitre Costa Dourado, Fábio Protti, Rudini Menezes Sampaio:
The iteration time and the general position number in graph convexities. Appl. Math. Comput. 487: 129084 (2025) - Xiaofeng Chen, Dongyuan Lin, Hua Li, Zhi Cheng:
Minimum error entropy high-order extend Kalman filter with fiducial points. Appl. Math. Comput. 487: 129113 (2025) - Xuanrui Cheng, Ming Gao, Wuxiang Huai, Yichun Niu, Li Sheng:
Fixed-time active fault-tolerant control for dynamical systems with intermittent faults and unknown disturbances. Appl. Math. Comput. 486: 129054 (2025) - Qian Cui, Jinde Cao, Lulu Li, Yang Liu:
Exponential stability of switched systems with state-dependent delayed impulses via B-equivalent method. Appl. Math. Comput. 486: 129031 (2025) - Zhaoping Du, Chi Zhang, Xiaofei Yang, Hui Ye, Jianzhen Li:
Discrete-time event-triggered H-infinity stabilization for three closed-loop cyber-physical system with uncertain delay. Appl. Math. Comput. 488: 129127 (2025) - V. T. Elayabharath, P. Sozhaeswari, N. Tatar, Rathinasamy Sakthivel, T. Satheesh:
Resilient observer-based unified state and fault estimation for nonlinear parabolic PDE systems via fuzzy approach over finite-time interval. Appl. Math. Comput. 488: 129125 (2025) - Anna Daniel Fome, Wolfgang Bock, Axel Klar:
Analysis of a competitive respiratory disease system with quarantine: Epidemic thresholds and cross-immunity effects. Appl. Math. Comput. 485: 128968 (2025) - Yini Geng, Yikang Lu, Lijun Hong, Lei Shi:
Evolution of cooperation with asymmetric rewards. Appl. Math. Comput. 487: 129075 (2025) - Siyu Guo, Yingnan Pan, Hongyi Li:
Dynamic event-driven optimal consensus control for state-constrained multiagent zero-sum differential graphical games. Appl. Math. Comput. 484: 128979 (2025) - Yubing Jiang, Hu Chen, Chaobao Huang, Jian Wang:
A fully discrete GL-ADI scheme for 2D time-fractional reaction-subdiffusion equation. Appl. Math. Comput. 488: 129147 (2025) - Taijiang Jiang, Qiang Sun, Chao Zhang:
A note on the 1-factorization of non-uniform complete hypergraph. Appl. Math. Comput. 485: 129007 (2025) - Taekyun Kim, Dae San Kim:
Some identities on degenerate harmonic and degenerate higher-order harmonic numbers. Appl. Math. Comput. 486: 129045 (2025) - Do Wan Kim, Donghwan Lee:
Relaxed conditions for parameterized linear matrix inequality in the form of nested fuzzy summations. Appl. Math. Comput. 487: 129079 (2025) - Mladen Kovacevic:
Vector multispaces and multispace codes. Appl. Math. Comput. 486: 129041 (2025) - Dan Li, Minghui Yan, Jixiang Meng:
Minimizing the least Laplacian eigenvalue of signed complete graphs. Appl. Math. Comput. 484: 129002 (2025) - Yikang Lu, Hui Dai, Huaiyu Tan, Xiaofang Duan, Lei Shi, Junpyo Park:
Enhancement of persistence in the rock-paper-scissors dynamics through higher-order interactions. Appl. Math. Comput. 487: 129083 (2025) - Xu Mei, Jun Cheng, Wentao Huang:
Attack-compensated asynchronous output feedback control for stochastic switching systems with sojourn probability. Appl. Math. Comput. 485: 129024 (2025) - Andreas Meier, Eberhard Bänsch, Florian Frank:
Multiscale flow simulations of dilute polymeric solutions with bead-rod chains using Brownian configuration fields. Appl. Math. Comput. 487: 129091 (2025) - Helena Molina-Abril, María José Morón-Fernández, Marc Benito-Marimón, Fernando Díaz-del-Río, Pedro Real:
Topological scale framework for hypergraphs. Appl. Math. Comput. 485: 128989 (2025)
skipping 1,623,439 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-09 00:35 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint