default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Exact matches
Likely matches
- Gregory Levitin
- Stefano Levialdi
aka: Stefano Levialdi Ghiron
Sapienza University of Rome, Italy - Giorgio Levi
University of Pisa, Italy - Nancy G. Leveson
aka: Nancy Leveson
MIT, Cambridge, MA, USA - Gina-Anne Levow
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 32,172 matches
- 2025
- Jun Lei, Yuxi Zhou, Xue Tian, Qinghao Zhao, Qi Zhang, Shijia Geng, Qingbo Wu, Shenda Hong:
A deep learning method for beat-level risk analysis and interpretation of atrial fibrillation patients during sinus rhythm. Biomed. Signal Process. Control. 100: 107028 (2025) - Rafael Merli, Antolín Martínez-Martínez, Juan José Ródenas, Marc Bosch-Galera, Enrique Nadal:
Two-Level High-Resolution Structural Topology Optimization with Equilibrated Cells. Comput. Aided Des. 179: 103811 (2025) - Wei Chen, Zhiyuan Bai, Gaoyuan Pan, Jian Wang:
A fast modularity hardware Trojan detection technique for large scale gate-level netlists. Comput. Secur. 148: 104111 (2025) - Vimitha R. Vidhya Lakshmi, Gireesh Kumar T:
Enhancing data integrity in opportunistic mobile social network: Leveraging Berkle Tree and secure data routing against attacks. Comput. Secur. 148: 104133 (2025) - Bakar Chargeishvili, Levente Fekésházy, Gábor Somogyi, Sam Van Thurenhout:
LinApart: Optimizing the univariate partial fraction decomposition. Comput. Phys. Commun. 307: 109395 (2025) - Dinei A. Rockenbach, Gabriell Alves de Araujo, Dalvan Griebler, Luiz Gustavo Fernandes:
GSParLib: A multi-level programming interface unifying OpenCL and CUDA for expressing stream and data parallelism. Comput. Stand. Interfaces 92: 103922 (2025) - José-Luis Casado-Rubio, Israel Villarrasa-Sapiña, Xavier García-Massó, Gonzalo Monfort-Torres:
Differences in hand acceleration and digital reaction time between different skill levels of Counter Strike players. Entertain. Comput. 52: 100797 (2025) - Jiayu Zhang, Lucas Guo, Guiling Wang, Jian Yu, Xin Zheng, Yusheng Mei, Boyang Han:
A dual-level graph attention network and transformer for enhanced trajectory prediction under road network constraints. Expert Syst. Appl. 261: 125510 (2025) - Raúl Miñón, Juan López-de-Armentia, Lander Bonilla, Aitor Brazaola, Ibai Laña, M. Carmen Palacios, Szymon Mueller, Michal Blaszczak, Herwig Zeiner, Julia Tschuden, Mohammad Yusuf Quadri, Ignasi Garcia-Milà, Andrea Bartoli, Norbert Gormolla, Alberto Fernández, Pablo Segarra, José A. Sanchidrián, Philipp Hartlieb:
A multi-level IIOT platform for boosting mines digitalization. Future Gener. Comput. Syst. 163: 107501 (2025) - Suranjan Goswami, Satish Kumar Singh:
An image information fusion based simple diffusion network leveraging the segment anything model for guided attention on thermal images producing colorized pedestrian masks. Inf. Fusion 113: 102618 (2025) - Xiujuan Ma, Xinwang Liu, Zaiwu Gong, Fang Liu:
The bi-level consensus model with dual social networks for group decision making. Inf. Fusion 114: 102714 (2025) - Ali Asghar Yarifard, Saeed Araban, Samad Paydar, Vahid Garousi, Maurizio Morisio, Riccardo Coppola:
Extraction and empirical evaluation of GUI-level invariants as GUI Oracles in mobile app testing. Inf. Softw. Technol. 177: 107531 (2025) - Michael B. Dillencourt, Michael T. Goodrich, Michael Mitzenmacher:
Leveraging parameterized Chernoff bounds for simplified algorithm analyses. Inf. Process. Lett. 187: 106516 (2025) - Qingqing Zhao, Yuhan Xia, Yunfei Long, Ge Xu, Jia Wang:
Leveraging sensory knowledge into Text-to-Text Transfer Transformer for enhanced emotion analysis. Inf. Process. Manag. 62(1): 103876 (2025) - Antonio Di Crescenzo, Antonio Gómez-Corral, D. Taipe:
A computational approach to extreme values and related hitting probabilities in level-dependent quasi-birth-death processes. Math. Comput. Simul. 228: 211-224 (2025) - Gregory Levitin, Liudong Xing, Yuanshun Dai:
Standby and inspection policy optimization in systems exposed to common and operational shock processes. Reliab. Eng. Syst. Saf. 253: 110509 (2025) - Zhangpei Cheng, Kaimeng Chen, Qingxiao Guan:
Reversible data hiding in encrypted images based on pixel-level masked autoencoder and polar code. Signal Process. 226: 109664 (2025) - Omar Trigui, Sawsan Daoud, Mohamed Ghorbel, Mariem Dammak, Chokri Mhiri, Ahmed Ben Hamida:
Automated identification and localization of interictal epileptiform discharges: leveraging morphological analysis, five-criterion fulfillment, and machine learning approach. J. Supercomput. 81(1): 1 (2025) - Akshat Gaurav, Varsha Arya, Kwok Tai Chui, Brij B. Gupta:
Enhanced Virtual Try-On in the Metaverse Leveraging Unet Model for Improved Cloth Detection. WoWMoM 2025: 124-129 - Francesco Malandrino, Giuseppe Di Giacomo, Marco Levorato, Carla-Fabiana Chiasserini:
Dependable Distributed Training of Compressed Machine Learning Models. WoWMoM 2025: 147-156 - 2024
- Ulrich Gallersdörfer:
Public Key Infrastructures and Blockchain Systems: Utilizing Internet Public Key Infrastructures to Leverage Their Trust and Adoption in Blockchain Systems. Technical University of Munich, Germany, 2024 - Kai-Björn Gemlau:
Deterministic Design and Implementation of Distributed Systems using System-Level Logical Execution Time. Braunschweig University of Technology, Germany, 2024 - Ali Heydarigorji:
Leveraging Computational Storage for Power-Efficient Distributed Data Analytics. University of California, Irvine, USA, 2024 - Guiliang Zhou, Shuaiqi Lü, Lina Mao, Kaiwen Xu, Tianwen Bao, Xu Bao:
Path Planning of UAV Using Levy Pelican Optimization Algorithm In Mountain Environment. Appl. Artif. Intell. 38(1) (2024) - Lev Rapoport, Alexey Generalov, B. A. Barulin, M. D. Gorbachev:
An Extension of the Feedback Linearization Method in the Control Problem of an Inverted Pendulum on a Wheel. Autom. Remote. Control. 85(4): 396-411 (2024) - Fariha Afsana, Manoranjan Paul, Faranak Tohidi, Pan Gao:
A Density-Aware Point Cloud Geometry Compression Leveraging Cluster- Centric Processing. IEEE Access 12: 81441-81452 (2024) - Bader Al-Sada, Alireza Sadighian, Gabriele Oligeri:
Analysis and Characterization of Cyber Threats Leveraging the MITRE ATT&CK Database. IEEE Access 12: 1217-1234 (2024) - Waleed Alam, Muhammad Tahir, Shahid Hussain, Sarah Gul, Maqsood Hayat, Reyazur Rashid Irshad, Fabiano Pallonetto:
Unveiling the Potential Pattern Representation of RNA 5-Methyluridine Modification Sites Through a Novel Feature Fusion Model Leveraging Convolutional Neural Network and Tetranucleotide Composition. IEEE Access 12: 10023-10035 (2024) - Mine Arai, Koki Tejima, Yuya Yamada, Takayuki Miura, Kyosuke Yamashita, Chihiro Kado, Rei Shimizu, Masataka Tatsumi, Naoto Yanai, Goichiro Hanaoka:
REN-A.I.: A Video Game for AI Security Education Leveraging Episodic Memory. IEEE Access 12: 47359-47372 (2024) - Vijayakumar Arun, Albert Alexander Stonier, Geno Peter, Vivekananda Ganji:
Enhanced Switched Capacitor Nine-Level Inverter (ESC9LI) Featuring Boost Capability and Streamlined Component Configuration. IEEE Access 12: 109513-109525 (2024)
skipping 32,142 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-02 23:12 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint