dblp: COMPSAC 2019 - Volume 2 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches


43rd COMPSAC 2019: Milwaukee, WI, USA - Volume 2: COMPSAC 2019 Workshops

jump to- ADMNET: Architecture, Design, Deployment & Management of Networks & Applications
- SCA: Smart Computing & Applications
- DADA: Deep Analysis of Data Driven Applications
- ESAS: E-Health Systems & Web Technologies
- STA: Software Test Automation
- NETSAP: Network Technologies for Security, Administration & Protection
- SAPSE: Security Aspects for Process & Services Engineering
- MVDA: Workshop on Modeling and Verifying Distributed Applications
- QUORS: Quality Oriented Reuse of Software
- BDCAA: The 1st IEEE International Workshop on Big Data Computation, Analysis, and Applications

SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as

Vladimir Getov, Jean-Luc Gaudiot, Nariyoshi Yamai, Stelvio Cimato, J. Morris Chang, Yuuichi Teranishi, Ji-Jiang Yang, Hong Va Leong, Hossain Shahriar, Michiharu Takemoto, Dave Towey, Hiroki Takakura, Atilla Elçi, Susumu Takeuchi, Satish Puri:
43rd IEEE Annual Computer Software and Applications Conference, COMPSAC 2019, Milwaukee, WI, USA, July 15-19, 2019, Volume 2. IEEE 2019, ISBN 978-1-7281-2607-4
ADMNET: Architecture, Design, Deployment & Management of Networks & Applications

Wei-Han Chen, Fuchun Joseph Lin
:
Over-the-Air Provisioning for IoT Wearable Devices via BLE and oneM2M. 1-6

Chaxiong Yukonhiatou, Tomoki Yoshihisa, Tomoya Kawakami, Yuuichi Teranishi, Shinji Shimojo
:
A Dynamic Intervals Determination Method Based on Transaction Rates for Real-Time IoT Applications. 7-12

Mateus Coelho Silva
, Ricardo Oliveira
:
Analyzing the Effect of Increased Distribution on a Wearable Appliance. 13-18

Natusko Kawabata, Yasuhiro Yamasaki, Hiroyuki Ohsaki:
On the Effectiveness of Position-Based Routing in Delay/Disruption-Tolerant Networking. 19-23

Kazuyuki Yamashita, Yuichi Yasuda, Ryo Nakamura, Hiroyuki Ohsaki:
On the Predictability of Network Robustness from Spectral Measures. 24-29

Kenichi Yoshida, Kazunori Fujiwara, Akira Sato, Shuji Sannomiya:
Spread of Anycast and GSLB. 30-35

Hiroki Kashiwazaki, Shinnosuke Miura, Shinji Shimojo
:
A Proposal of SDN-FIT System to Evaluate Wide-Area Distributed Applications Based on Exhaustive FIT Scenario Generation. 36-41
AIML: Advances in AI and Machine Learning

Zihao Dong, Ruixun Zhang, Xiuli Shao, Hongyu Zhou:
Multi-scale Discriminative Location-Aware Network for Few-Shot Semantic Segmentation. 42-47

Hongjie Liu, Hongzhe Xu, Yu Yan, Wen Li:
Research on Evaluation Function of Clustering Algorithm Based on Duty Cycle. 48-54

Mike McMahon, Dale Mumper, Mitsuko Ihaza, Dominic Farrar:
How Smart is your Manufacturing? Build Smarter with AI. 55-60

Piyush Saxena, Devansh Saxena, Xiao Nie, Aaron Helmers, Nithin Ramachandran, Nazmus Sakib, Sheikh Iqbal Ahamed:
Feature Boosting in Natural Image Classification. 61-67

Takeshi Morita, Naoya Takahashi, Mizuki Kosuda, Takahira Yamaguchi:
A Teaching Assistant Robot Design Tool Based on Knowledge Chunks Reuse. 68-73

Jiawei Wu, Wenliang Hu, Joseph Coelho, Paromita Nitu, Hanna R. Paul, Praveen Madiraju, Roger O. Smith, Sheikh Iqbal Ahamed:
Identifying Buildings with Ramp Entrances Using Convolutional Neural Networks. 74-79

Mehdi Nekouei, Sara Sartoli:
Modeling the Structured Porous Network Using Stacked Ensemble Learning. 80-84
SCA: Smart Computing & Applications

Oluwaseun Bamgboye
, Xiaodong Liu, Peter Cruickshank:
Semantic Stream Management Framework for Data Consistency in Smart Spaces. 85-90

Kincho H. Law, Siddarth Taduri, Jay P. Kesan, Ram Sriram:
Utilization of Bio-Ontologies for Enhancing Patent Information Retrieval. 91-96

Shiraj Pokharel, Ying Zhu
, Satish Puri
:
Micro-Level Analysis and Visualization of Tennis Shot Patterns with Fractal Tables. 97-102

Yan Zhu
, Yi Zhang, Jing Wang, Weijing Song, William Cheng-Chung Chu, Guowei Liu:
From Data-Driven to Intelligent-Driven: Technology Evolution of Network Security in Big Data Era. 103-109

Seungyo Ryu, Dongseung Kim:
Intelligent Highway Traffic Forecast Based on Deep Learning and Restructured Road Models. 110-114

Fabian Burzlaff
, Maurice Ackel, Christian Bartelt:
A Mapping Language for IoT Device Descriptions. 115-120

Yuxuan Deng, Henry C. B. Chan
:
Development of Mobile Intercloud Applications. 121-126

Faisal Fahmi
, Pei-Shu Huang, Feng-Jian Wang:
Improving the Detection of Sequential Anomalies Associated with a Loop. 127-134

Lijuan Diao, Huaduo Wang, Sultan Alsarra
, I-Ling Yen, Farokh B. Bastani:
A Smart Role Mapping Recommendation System. 135-140
IEESD: Industrial Experience in Embedded Systems Design

Johannes Richter
, Detlef Streitferdt:
Modern Architecture for Deep Learning-Based Automatic Optical Inspection. 141-145

Yingjie Zhang, Yujie Gong, Daniel Morgan, Ying Zhang:
A Data-Driven Approach to Energy Cost Prediction Of Dwellings Based on Partitioned Parallel Modeling. 146-152

Anton Urvantsev, Morgan E. Johansson, Nils Müllner, Tiberiu Seceleanu
:
Experiencing Technology Independence. 153-158

Tamer Omar
, Olusegun Bamgbose, Ibrahim Naffaa, Omar Naffaa:
Embedded Control System for Decentralized Wastewater Treatment. 159-164

Aida Causevic, Alessandro Vittorio Papadopoulos
, Marjan Sirjani:
Towards a Framework for Safe and Secure Adaptive Collaborative Systems. 165-170

Maxi Weichenhain, Wolfgang Fengler, Detlef Streitferdt:
How to Bring Project Management of Embedded Systems to an Appropriate Level of Abstraction for a Discrete Event Model. 171-176
DADA: Deep Analysis of Data Driven Applications

Olumide Kayode, Ali Saman Tosun:
LiRUL: A Lightweight LSTM Based Model for Remaining Useful Life Estimation at the Edge. 177-182

Neda Tavakoli
:
Modeling Genome Data Using Bidirectional LSTM. 183-188

Shihao Ge, Haruna Isah
, Farhana H. Zulkernine, Shahzad Khan:
A Scalable Framework for Multilevel Streaming Data Analytics using Deep Learning. 189-194

Joseph Coelho, Dawson D'almeida, Scott Coyne, Nathan Gilkerson, Katelyn Mills, Praveen Madiraju:
Social Media and Forecasting Stock Price Change. 195-200

Shatha Jaradat, Nima Dokoohaki
, Ummul Wara, Mallu Goswami, Kim Hammar, Mihhail Matskin:
TALS: A Framework for Text Analysis, Fine-Grained Annotation, Localisation and Semantic Segmentation. 201-206

Hanxiang Du, Long Hoang Nguyen, Zhou Yang, Hashim Abu-gellban
, Xingyu Zhou, Wanli Xing, Guofeng Cao, Fang Jin
:
Twitter vs News: Concern Analysis of the 2018 California Wildfire Event. 207-212

Yuta Shirasaki, Yuya Kobayashi, Mikio Aoyama:
A Speech Data-Driven Stakeholder Analysis Methodology Based on the Stakeholder Graph Models. 213-220

Aerambamoorthy Thavaneswaran, Ruppa K. Thulasiram, Zimo Zhu, Mohammed Erfanul Hoque
, Nalini Ravishanker:
Fuzzy Value-at-Risk Forecasts Using a Novel Data-Driven Neuro Volatility Predictive Model. 221-226

Moitrayee Chatterjee
, Akbar Siami Namin:
Detecting Phishing Websites through Deep Reinforcement Learning. 227-232

Hamid Mansoor
, Walter Gerych, Luke Buquicchio, Kavin Chandrasekaran, Emmanuel Agu, Elke A. Rundensteiner:
COMEX: Identifying Mislabeled Human Behavioral Context Data Using Visual Analytics. 233-238

Tommy Dang, Ngan V. T. Nguyen
:
SpacePhaser: Phase Space Embedding Visual Analytics. 239-244
CDS: Consumer Devices & Systems

Tsutomu Terada, Masahiko Tsukamoto:
A Pen-Grip Shaped Device for Estimating Writing Pressure and Altitude. 245-250

Toru Kobayashi, Kenichi Arai, Tetsuo Imai, Shigeaki Tanimoto, Hiroyuki Sato, Atsushi Kanai:
Communication Robot for Elderly Based on Robotic Process Automation. 251-256

Kazuki Someya, Masashi Saito, Ryozo Kiyohara:
Estimation Method of Traffic Volume in Provincial City Using Big-Data. 257-262

Thamer Horbylon Nascimento
, Fabrízzio Alphonsus Alves de Melo Nunes Soares
, Marcos Alves Vieira, Juliana Paula Felix
, Jaline Gonçalves Mombach, Livia Mancine Coelho De Campos, Wellington Galvão Rodrigues, Wesley F. de Miranda, Ronaldo Martins da Costa:
Using Smartwatches as an Interactive Movie Controller: A Case Study with the Bandersnatch Movie. 263-268
ESAS: E-Health Systems & Web Technologies

Ling Tong
, Jake Luo
, Ron A. Cisler, Michael Cantor:
Machine Learning-Based Modeling of Big Clinical Trials Data for Adverse Outcome Prediction: A Case Study of Death Events. 269-274

Komal Minhas, Munazza Tabassam, Rida Rasheed, Assad Abbas
, Hasan Ali Khattak
, Samee U. Khan
:
A Framework for Dengue Surveillance and Data Collection in Pakistan. 275-280

A. K. M. Jahangir Alam Majumder, Mohammed ElSaadany, Joshua Aaron Izaguirre, Donald R. Ucci:
A Real-Time Cardiac Monitoring using a Multisensory Smart IoT System. 281-287

Daniel Scherer
, José George Dias de Souza:
Educational app Proposal to Support Pregnant Women. 288-293

Saad El Jaouhari, Patrick Hardy, Guillaume Pasquier, Pierrick Guitter, Eric Poiseau, Cédric Moubri-Tournes, Stéphane Leduc, Sebastien Vincendeau, Laurent Bourgeois, Bernard Gibaud, Emmanuel Cordonnier:
World First Retransmission of Medical Images in an Operating Room via DICOM-RTV: Technical Details. 294-299
OER: Open Educational Resources

Bahtijar Vogel, Bo Peterson, Blerim Emruli:
Prototyping for Internet of Things with Web Technologies: A Case on Project-Based Learning using Scrum. 300-305

Lotfi Ben Othmane, Monica Lamm
:
Mindset for Software Architecture Students. 306-311

Justin Wang, Dennis Brylow, Debbie Perouli
:
Implementing Cybersecurity into the Wisconsin K-12 Classroom. 312-317

Ahmed Alzaghoul
, Edmundo Tovar:
An Approach for Developing a Conceptual Quality Model by Changing the Learner Behavior with OER. 318-323
STA: Software Test Automation

Nasser Mustafa, Yvan Labiche, Dave Towey
:
Mitigating Threats to Validity in Empirical Software Engineering: A Traceability Case Study. 324-329

Juan Qiu
, Qingfeng Du, Wei Wang, Kanglin Yin, Liang Chen:
Short-Term Performance Metrics Forecasting for Virtual Machine to Support Anomaly Detection Using Hybrid ARIMA-WNN Model. 330-335

Katerina Goseva-Popstojanova
, Mohammad Jamil Ahmad
, Yasser Ali Alshehri
:
Software Fault Proneness Prediction with Group Lasso Regression: On Factors that Affect Classification Performance. 336-343

Tugkan Tuglular
, Sercan Sensülün:
SPL-AT Gherkin: A Gherkin Extension for Feature Oriented Testing of Software Product Lines. 344-349

Sai Chaithra Allala, Juan P. Sotomayor
, Dionny Santiago
, Tariq M. King
, Peter J. Clarke
:
Towards Transforming User Requirements to Test Cases Using MDE and NLP. 350-355

Juan P. Sotomayor
, Sai Chaithra Allala, Patrick Alt, Justin Phillips, Tariq M. King, Peter J. Clarke
:
Comparison of Runtime Testing Tools for Microservices. 356-361
MediComp: Medical Computing

Wenai Song, Ying Cao, Zhiqiang Qiao, Qing Wang, Ji-Jiang Yang:
An Improved Semi-Supervised Learning Method on Cataract Fundus Image Classification. 362-367

Changshaui Huo, Faheem Akhtar
, Pengzhi Li:
A Novel Grading Method of Cataract Based on AWM. 368-373

Weijing Wang, Chenkai Guo, Jing Xu, Ao Liu:
Bi-Dimensional Representation of Patients for Diagnosis Prediction. 374-379

Siyuan Fang, Lixia Hu, Bin Du, Haoteng Zheng, Minhua Lu, Rui Mao:
Viscoelasticity Measurements of knee Muscles with Simulated Knee Osteoarthritis Treated by Novel Chinese Medicine: A Preliminary Study. 380-385

Fitrat Hossain, Olawunmi George, Nadiyah Johnson, Praveen Madiraju, Mark Flower, Zeno Franco
, Katinka Hooyer, Jose Lizarraga Mazaba, Lisa Rein, Sheikh Iqbal Ahamed:
Towards Clinical Decision Support for Veteran Mental Health Crisis Events using Tree Algorithm. 386-390

Xin-Hong Jia, Wenai Song, Wei-Yan Li, Ji-Jiang Yang, Qing Wang, Yi Lei, Ke Huang, Jun Li, Ting Yang:
Semi-Automatic Construction Method of Chronic Obstructive Pulmonary Disease Knowledge Graph. 391-396

Prosper Kandabongee Yeng, Bian Yang, Einar Snekkenes:
Observational Measures for Effective Profiling of Healthcare Staffs' Security Practices. 397-404

Wei-liang Zhang, Qin-Yan Zhang, Ji-Jiang Yang, Qing Wang:
Multi-Scale Network with the Deeper and Wider Residual Block for MRI Motion Artifact Correction. 405-410

Jing Gao, Huanqing Zhang, Ruifang Shen:
Classification of Pulmonary Nodules by using Improved Convolutional Neural Networks. 411-416

Rehnuma Afrin, Hisham Haddad, Hossain Shahriar
:
Supervised and Unsupervised-Based Analytics of Intensive Care Unit Data. 417-422

Bo Liu, Mengmeng Huang, Kelu Yao, Lan Wei, Xiaolu Fei, Qing Wang:
Prediction and Study of the Applicability of Medical Gels to Patients. 423-428

Wei-Yan Li, Wenai Song, Xin-Hong Jia, Ji-Jiang Yang, Qing Wang, Yi Lei, Ke Huang, Jun Li, Ting Yang:
Drug Specification Named Entity Recognition Base on BiLSTM-CRF Model. 429-433

Chao Luo, Canghong Shi
, Xian Zhang, Jing Peng, Xiaojie Li, Yucheng Chen:
AMCNet: Attention-Based Multiscale Convolutional Network for DCM MRI Segmentation. 434-439

Lori Kim, Hossain Shahriar
, Chi Zhang:
Non-Invasive Wi-Fi Sensors For Smart Healthcare. 440-445

Prakhar Agrawal, Divya Bhargavi, Gokul Krishna G., Xiao Han, Neha Tevathia, Abbie M. Popa, Nicholas Ross, Diane Myung-kyung Woodbridge, Barbie Zimmerman-Bier, William Bosl
:
A Scalable Automated Diagnostic Feature Extraction System for EEGs. 446-451

Gracie Carter, Hossain Shahriar
, Sweta Sneha:
Blockchain-Based Interoperable Electronic Health Record Sharing Framework. 452-457
NETSAP: Network Technologies for Security, Administration & Protection

Daneth Horn, Nazakat Ali, Jang-Eui Hong:
Towards Enhancement of Fault Traceability Among Multiple Hazard Analyses in Cyber-Physical Systems. 458-464

Komei Nomura, Kenji Rikitake, Ryosuke Matsumoto:
Automatic Whitelist Generation for SQL Queries Using Web Application Tests. 465-470

Yo Kanemoto, Kazufumi Aoki, Makoto Iwamura, Jun Miyoshi, Daisuke Kotani, Hiroki Takakura, Yasuo Okabe:
Detecting Successful Attacks from IDS Alerts Based On Emulation of Remote Shellcodes. 471-476
WISH: Integrated Smart Healthcare

Austin Gentry, William M. Mongan
, Brent Lee, Owen C. Montgomery, Kapil R. Dandekar:
Activity Segmentation Using Wearable Sensors for DVT/PE Risk Detection. 477-483

Aditi Sharma, Shivee Singh, Brian Wright, Alan Perry, Diane Myung-kyung Woodbridge, Abbie M. Popa:
Scalable Motor Movement Recognition from Electroencephalography using Machine Learning. 484-489

Amit Kumar Saha, G. M. Tanimul Ahsan, Md. Osman Gani, Sheikh Iqbal Ahamed:
Personalized Pain Study Platform using Evidence-Based Continuous Learning Tool. 490-495

Colin Willoughby, Ian Banatoski, Paul Roberts, Emmanuel Agu:
DrunkSelfie: Intoxication Detection from Smartphone Facial Images. 496-501
SAPSE: Security Aspects for Process & Services Engineering

Ariel Rodríguez, Koji Okamura:
Generating Real Time Cyber Situational Awareness Information Through Social Media Data Mining. 502-507

Alfredo Cuzzocrea, Ernesto Damiani:
Making the Pedigree to Your Big Data Repository: Innovative Methods, Solutions, and Algorithms for Supporting Big Data Privacy in Distributed Settings via Data-Driven Paradigms. 508-516
InfoFlow: Information Flow Oriented Approaches in Internet of Things and Cyber-Physical Systems

Nuwan Jayawardene, Pumudu Fernando:
Hybrid Approach for Enabling Hierarchical Fog Networks in an IoT Deployment. 517-521

Robison Cris Brito, Mainara Cristina Lorencena, José Felippe Loureiro, Fábio Favarim, Eduardo Todt
:
A Comparative Approach on the use of Unmanned Aerial Vehicles kind of Fixed-Wing and Rotative Wing Applied to the Precision Agriculture Scenario. 522-526

Kosuke Gotani, Hiroyuki Takahira, Misumi Hata, Luis Guillen
, Satoru Izumi, Toru Abe:
OpenFlow Based Information Flow Control Considering Route Switching Cost. 527-530
MVDA: Workshop on Modeling and Verifying Distributed Applications

Ryuichiro Maegawa, Daiki Matsui, Yasuhiro Yamasaki, Hiroyuki Ohsaki:
A Discrete Model of IEEE 1588-2008 Precision Time Protocol with Clock Servo using PI Controller. 531-536

Robison Cris Brito, José Felippe Loureiro, André Guedes
, Eduardo Todt
:
Optimization System for Dynamic Flight Planning for Groups of Drones using Cooperation with Mobile Recharge Bases by Means of Multiagent System and Recursive Auctions. 537-542

Kei Katayama, Hiroyuki Ohsaki:
Fluid-Based Modeling of Large-Scale IEEE 802.15.4 Wireless Sensor Networks. 543-548

Salma Ayari, Yousra Bendaly Hlaoui, Leila Ben Ayed:
A Grammar Based Approach to BPMN Model Semantic Preservation using Refinement. 549-554

Zhen-Tian Liu, Jing Liu:
Formal Verification of Blockchain Smart Contract Based on Colored Petri Net Models. 555-560

Ahlem Ben Younes, Yousra Bendaly Hlaoui, Leila Ben Ayed, Mayssa Bessifi:
From BPMN2 to Event B: A Specification and Verification Approach of Workflow Applications. 561-566
STPSA: Security, Trust & Privacy for Software Applications

Sheikh Iqbal Ahamed, Mohammad Zulkernine, Hossain Shahriar
, Hongmei Chi:
STPSA 2019 Welcome Message. 567-568

Lotfi Ben Othmane, Ameerah-Muhsina Jamil, Moataz AbdelKhalek:
Identification of the Impacts of Code Changes on the Security of Software. 569-574

Sara Mccloskey, John Herbert:
User Behaviour-Based Access Control for Social Media with Qualitative Research and Bayesian Modelling. 575-579

George O. M. Yee:
Designing Good Security Metrics. 580-585

Seoksu Lee, Joon-Young Paik, Rize Jin, Eun-Sun Cho:
Toward Machine Learning Based Analyses on Compressed Firmware. 586-591

Juan Wang, Karim Lounis, Mohammad Zulkernine:
Security Features for Proximity Verification. 592-597

Shen Fu, Mathew L. Wymore, Ting-Wei Chang, Daji Qiao:
Continuous User Authentication Based on Context-Emphasized Behavior Profiling. 598-603

Hossain Shahriar
, Md Arabin Islam Talukder
, Mohammad Ashiqur Rahman
, Hongmei Chi, Sheikh Iqbal Ahamed, Fan Wu:
Hands-on File Inclusion Vulnerablity and Proactive Control for Secure Software Development. 604-609
QUORS: Quality Oriented Reuse of Software

Cody Baker, Lin Deng
, Suranjan Chakraborty, Josh Dehlinger
:
Automatic Multi-class Non-Functional Software Requirements Classification Using Neural Networks. 610-615

Makoto Shiraishi, Hironori Washizaki, Yoshiaki Fukazawa, Joseph W. Yoder:
Mob Programming: A Systematic Literature Review. 616-621

Ruiqiong Wu, Qing Duan, Fei Dai, Hongji Yang, Yi Zhang, Biseng Xie:
Research on the Realizability of Microservice Interaction Contract Based on CSP#. 622-627
DFM: Data Flow Models and Extreme-Scale Computing

Sihan Zeng, Jose Manuel Monsalve Diaz
, Siddhisanket Raskar:
Toward A High-Performance Emulation Platformfor Brain-Inspired Intelligent SystemsExploring Dataflow-Based Execution Model and Beyond. 628-633

Gabriel da Silva Vieira
, Fabrízzio Alphonsus A. M. N. Soares
, Junio Cesar de Lima, Hugo A. D. do Nascimento
, Gustavo Teodoro Laureano, Ronaldo Martins da Costa, Júlio César Ferreira, Wellington Galvão Rodrigues:
A Disparity Computation Framework. 634-639

Siddhisanket Raskar, Thomas Applencourt
, Kalyan Kumaran, Guang Gao:
Position Paper: Extending Codelet Model for Dataflow Software Pipelining using Software-Hardware Co-Design. 640-645

Christoph Kühbacher, Christian Mellwig, Florian Haas, Theo Ungerer:
A Functional Programming Model for Embedded Dataflow Applications. 646-651

Alan Humphrey, Martin Berzins
:
An Evaluation of An Asynchronous Task Based Dataflow Approach For Uintah. 652-657
BDCAA: The 1st IEEE International Workshop on Big Data Computation, Analysis, and Applications

George O. Strawn:
Open Science, Business Analytics, and FAIR Digital Objects. 658-663

Makoto Nakagami, José A. B. Fortes, Saneyasu Yamaguchi:
Job-Aware Optimization of File Placement in Hadoop. 664-669

Dan Lo, Karl Kevin Tiba, Sergiu Buciumas, Frank Ziller:
An Emperical Study on Application of Big Data Analytics to Automate Service Desk Business Process. 670-675
SDIM: Secure Digital Identity Management

Yong Jin, Masahiko Tomoishi:
Encrypted QR Code Based Optical Challenge-Response Authentication by Mobile Devices for Mounting Concealed File System. 676-681

Hiroyuki Sato, Sridhar Nikita:
An Interactive and Continuous Authorization Scheme by using Belnap Logic. 682-687

Jacob Hendricks, Brandon Burke, Thoshitha T. Gamage:
Polysizemic Encryption: Towards a Variable-Length Output Symmetric-Key Cryptosystem. 688-693

Gen Li
, Hiroyuki Sato:
A Privacy-Preserving and Fully Decentralized Storage and Sharing System on Blockchain. 694-699

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:






