Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 306 matches
- 2023
- Raed Alharbi, Tre' R. Jeter, My T. Thai:
Detection of Fake News Through Heterogeneous Graph Interactions. NETYS 2023: 3-16 - Sidi Mohamed Beillahi, Ahmed Bouajjani, Constantin Enea:
Comparing Causal Convergence Consistency Models. NETYS 2023: 62-77 - Hicham Bellafkir, Markus Vogelbacher, Daniel Schneider, Markus Mühling, Nikolaus Korfhage, Bernd Freisleben:
Edge-Based Bird Species Recognition via Active Learning. NETYS 2023: 17-34 - Adri Bhattacharya, Barun Gorain, Partha Sarathi Mandal:
Pebble Guided Treasure Hunt in Plane. NETYS 2023: 141-156 - Mouad Bouharoun, Bilal Taghdouti, Mohammed Erradi:
A Peer to Peer Federated Graph Neural Network for Threat Intelligence. NETYS 2023: 35-40 - Max von Hippel, Kenneth L. McMillan, Cristina Nita-Rotaru, Lenore D. Zuck:
A Formal Analysis of Karn's Algorithm. NETYS 2023: 43-61 - Saswata Jana, Partha Sarathi Mandal:
Approximation Algorithms for Drone Delivery Scheduling Problem. NETYS 2023: 125-140 - Tanvir Kaur, Kaushik Mondal:
Distance-2-Dispersion: Dispersion with Further Constraints. NETYS 2023: 157-173 - Adnane Mzibri, Rédouane Benaini, Mouad Ben Mamoun:
Case Study on the Performance of ML-Based Network Intrusion Detection Systems in SDN. NETYS 2023: 90-95 - Narjisse Nejjari, Karim Zkik, Houda Benbrahim, Mounir Ghogho:
Beyond Locks and Keys: Structural Equation Modeling Based Framework to Explore Security Breaches Through the Lens of Crime Theories. NETYS 2023: 96-101 - Achraf Nia, Hossam Tarouchi, Mohammed Erradi:
Encrypted Search: Not Enough to Ensure Privacy. NETYS 2023: 81-89 - Joseph Oglio, Kendric Hood, Gokarna Sharma, Mikhail Nesterenko:
Consensus on an Unknown Torus with Dense Byzantine Faults. NETYS 2023: 105-121 - David Mohaisen, Thomas Wies:
Networked Systems - 11th International Conference, NETYS 2023, Benguerir, Morocco, May 22-24, 2023, Proceedings. Lecture Notes in Computer Science 14067, Springer 2023, ISBN 978-3-031-37764-8 [contents] - 2022
- Parosh Aziz Abdulla, Mohamed Faouzi Atig, Ahmed Bouajjani, K. Narayan Kumar, Prakash Saivasan:
Verifying Reachability for TSO Programs with Dynamic Thread Creation. NETYS 2022: 283-300 - Janne Alatalo, Joni Korpihalkola, Tuomo Sipola, Tero Kokkonen:
Chromatic and Spatial Analysis of One-Pixel Attacks Against an Image Classifier. NETYS 2022: 303-316 - Salima Attache, Ikram Remadna, Labib Sadek Terrissa, Ikram Maouche, Noureddine Zerhouni:
IoT Based Prediction of Active and Passive Earth Pressure Coefficients Using Artificial Neural Networks. NETYS 2022: 252-262 - João Paulo Bezerra, Petr Kuznetsov, Alice Koroleva:
Relaxed Reliable Broadcast for Decentralized Trust. NETYS 2022: 104-118 - Armando Castañeda, Sergio Rajsbaum, Michel Raynal:
A Snapshot-Based Introduction to the Linearizability Hierarchy. NETYS 2022: 3-15 - Imane Chakour, Cherki Daoui, Mohamed Baslam:
Mechanical Energy Minimization UAV-Mounted Base Station Path Plan for Public Safety Communication. NETYS 2022: 222-235 - Lhoussaine Daoudi, Mohamed Baslam, Said Safi:
Dynamics Analysis for a Duopoly Game with Bounded Rationality in Cognitive Radio Network. NETYS 2022: 236-251 - J. J. Garcia-Luna-Aceves, Dylan Cirimelli-Low:
Making CSMA Collision-Free and Stable Using Collaborative Indexing. NETYS 2022: 167-183 - Hamid Garmani, Mohamed El Amrani, Driss Ait Omar, Mohamed Ouaskou, Mohamed Baslam:
Analysis of Interactions Among Infrastructure Provider Fronting Content Provider. NETYS 2022: 136-146 - Jonas Höchst, Hicham Bellafkir, Patrick Lampe, Markus Vogelbacher, Markus Mühling, Daniel Schneider, Kim Lindner, Sascha Rösner, Dana G. Schabo, Nina Farwig, Bernd Freisleben:
Bird@Edge: Bird Species Recognition at the Edge. NETYS 2022: 69-86 - Mohamed Lechiakh, Alexandre Maurer:
FEBR: Expert-Based Recommendation Framework for Beneficial and Personalized Content. NETYS 2022: 52-68 - Léonard Lys, Maria Potop-Butucaru:
Distributed Blockchain Price Oracle. NETYS 2022: 37-51 - Viktor Malík, Petr Silling, Tomás Vojnar:
Applying Custom Patterns in Semantic Equality Analysis. NETYS 2022: 265-282 - Anshuman Misra, Ajay D. Kshemkalyani:
Solvability of Byzantine Fault-Tolerant Causal Ordering Problems. NETYS 2022: 87-103 - Laurent Prosperi, Ahmed Bouajjani, Marc Shapiro:
Varda: A Framework for Compositional Distributed Programming. NETYS 2022: 16-30 - Laine E. Rumreich, Paolo A. G. Sivilotti:
An Eventually Perfect Failure Detector on ADD Channels Using Clustering. NETYS 2022: 149-166 - Aravind Segu, Wojciech Golab:
Recycling Memory in Recoverable Mutex Locks. NETYS 2022: 31-36
skipping 276 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-08-05 20:06 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint