Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 90 matches
- 2012
- Aditi Gupta, Michael S. Kirkpatrick, Elisa Bertino:
A formal proximity model for RBAC systems. CollaborateCom 2012: 1-10 - Satyen Abrol, Latifur Khan, Bhavani Thuraisingham:
Tweecalization: Efficient and intelligent location mining in twitter using semi-supervised learning. CollaborateCom 2012: 514-523 - Nabil Adam, Jayan Eledath, Sharad Mehrotra, Nalini Venkatasubramanian:
Social media alert and response to threats to citizens (SMART-C). CollaborateCom 2012: 181-189 - Mohammad Allahbakhsh, Aleksandar Ignjatovic, Boualem Benatallah, Amin Beheshti, Elisa Bertino, Norman Foo:
Reputation management in crowdsourcing systems. CollaborateCom 2012: 664-671 - Rehab Alnemr, Christoph Meinel:
Reputation objects for interoperable reputation exchange: Implementation and design decisions. CollaborateCom 2012: 672-680 - Saad Alqithami, Henry Hexmoor:
Spontaneous organizations: Collaborative computing model of a networked organization. CollaborateCom 2012: 643-650 - Mohamed Azab, Mohamed Eltoweissy:
CyberX: A biologically-inspired platform for cyber trust management. CollaborateCom 2012: 655-663 - Jacob W. Bartel, Prasun Dewan:
Towards hierarchical email recipient prediction. CollaborateCom 2012: 50-59 - Katrin Bergener, Sara Hofmann:
Collaborative media choice processes in virtual teams. CollaborateCom 2012: 372-380 - Khalid Zaman Bijon, Tahmina Ahmed, Ravi S. Sandhu, Ram Krishnan:
A lattice interpretation of group-centric collaboration with expedient insiders. CollaborateCom 2012: 200-209 - Sanat Kumar Bista, Surya Nepal, Nathalie Colineau, Cécile Paris:
Using gamification in an online community. CollaborateCom 2012: 611-618 - Ian Brooks, Kathleen M. Swigger:
The role of leadership and its effect on the temporal patterns of global software development teams. CollaborateCom 2012: 381-390 - John F. Buford, Venkatesh Krishnaswamy:
Semantic structure in a federated collaboration environment. CollaborateCom 2012: 490-499 - Barbara Carminati, Lakshmish Ramaswamy, Calton Pu, James Joshi:
Preface. CollaborateCom 2012 - Younghun Chae, Lisa Cingiser DiPippo, Yan Lindsay Sun:
Predictability trust for Wireless Sensor Networks to provide a defense against On/off attack. CollaborateCom 2012: 406-415 - Steve Chan, Wesley Rhodes, Charles Atencio, Caroline Kuo, Brent Ranalli, Anna Miao, Simone Sala, Stephen Serene, Robert Helbling, Sarah Rumbley, Marc Clement, Lisa Sokol, Loren Gary:
Robust Decision Engineering: Collaborative Big Data and its application to international development/aid. CollaborateCom 2012: 597-604 - Ronald Chenu-Abente, María Menéndez, Fausto Giunchiglia, Antonella De Angeli:
An entity-based platform for the integration of social and scientific services. CollaborateCom 2012: 165-174 - Manoj Cherukuri, Srinivas Mukkamala, Dongwan Shin:
Similarity analysis of shellcodes in drive-by download attack kits. CollaborateCom 2012: 687-694 - Chenyun Dai, Fang-Yu Rao, Traian Marius Truta, Elisa Bertino:
Privacy-preserving assessment of social network data trustworthiness. CollaborateCom 2012: 97-106 - Ahmed Al Dhanhani, Rabeb Mizouni, Hadi Otrok, Ahmad Al-Rubaie:
Game theoretical analysis of collaborative social applications. CollaborateCom 2012: 628-634 - Oldooz Dianat, Mehmet A. Orgun:
Modelling Bayesian attacker detection game in wireless networks with epistemic logic. CollaborateCom 2012: 210-215 - Kevin Dullemond, Ben van Gameren, Rini van Solingen:
Collaboration should become a first-class citizen in support environments for software engineers. CollaborateCom 2012: 398-405 - Kiran L. N. Eranki, Kannan M. Moudgalya:
A collaborative approach to scaffold programming efficiency using spoken tutorials and its evaluation. CollaborateCom 2012: 556-559 - Ben Falchuk, Tomasz Zernicki, Michal Koziuk:
Towards streamed services for co-located collaborative groups. CollaborateCom 2012: 306-315 - Xinxin Fan, Ling Liu, Mingchu Li, Zhiyuan Su:
EigenTrustp++: Attack resilient trust management. CollaborateCom 2012: 416-425 - Arash Fard, Amir Abdolrashidi, Lakshmish Ramaswamy, John A. Miller:
Towards efficient query processing on massive time-evolving graphs. CollaborateCom 2012: 567-574 - Walid Fdhila, Stefanie Rinderle-Ma, Manfred Reichert:
Change propagation in collaborative processes scenarios. CollaborateCom 2012: 452-461 - Ben van Gameren, Kevin Dullemond, Rini van Solingen:
Auto-erecting virtual office walls. CollaborateCom 2012: 391-397 - Himanshu Grover, Vanathi Gopalakrishnan:
Efficient processing of models for large-scale shotgun proteomics data. CollaborateCom 2012: 591-596 - Nawal Guermouche, Silvano Dal-Zilio:
Towards timed requirement verification for service choreographies. CollaborateCom 2012: 117-126
skipping 60 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-20 14:20 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint