Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/ijes/ijes7.bht:"
@article{DBLP:journals/ijes/CaiZY15, author = {Qingling Cai and Yiju Zhan and Jian Yang}, title = {{RFID} authentication protocol design methodology}, journal = {Int. J. Embed. Syst.}, volume = {7}, number = {2}, pages = {91--103}, year = {2015}, url = {https://doi.org/10.1504/IJES.2015.069985}, doi = {10.1504/IJES.2015.069985}, timestamp = {Wed, 13 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijes/CaiZY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijes/ChuF15, author = {XiaoBo Chu and Dengguo Feng}, title = {On the provable security of {TPM2.0} cryptography APIs}, journal = {Int. J. Embed. Syst.}, volume = {7}, number = {3/4}, pages = {230--243}, year = {2015}, url = {https://doi.org/10.1504/IJES.2015.072369}, doi = {10.1504/IJES.2015.072369}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijes/ChuF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijes/DongCQZ15, author = {Ying{-}hong Dong and Hao Chen and Weining Qian and Aoying Zhou}, title = {Micro-blog social moods and Chinese stock market: the influence of emotional valence and arousal on Shanghai Composite Index volume}, journal = {Int. J. Embed. Syst.}, volume = {7}, number = {2}, pages = {148--155}, year = {2015}, url = {https://doi.org/10.1504/IJES.2015.069987}, doi = {10.1504/IJES.2015.069987}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijes/DongCQZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijes/DungTHT15, author = {Tran Van Dung and Ittetsu Taniguchi and Takuji Hieda and Hiroyuki Tomiyama}, title = {Function-level profiling for embedded software with {QEMU}}, journal = {Int. J. Embed. Syst.}, volume = {7}, number = {2}, pages = {170--179}, year = {2015}, url = {https://doi.org/10.1504/IJES.2015.069998}, doi = {10.1504/IJES.2015.069998}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijes/DungTHT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijes/HeYCLY15, author = {Ruhan He and Yongsheng Yu and Jia Chen and Min Li and Xun Yao}, title = {Region covariance tracking with hybrid search strategy}, journal = {Int. J. Embed. Syst.}, volume = {7}, number = {1}, pages = {55--62}, year = {2015}, url = {https://doi.org/10.1504/IJES.2015.066142}, doi = {10.1504/IJES.2015.066142}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijes/HeYCLY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijes/HuYYXZY15, author = {Chengyu Hu and Zuoxia Yu and Rupeng Yang and Qiuliang Xu and Yongbin Zhou and Qixia Yuan}, title = {Weak leakage resilient extractable hash proof system and construction for weak leakage resilient CCA-secure public-key encryption}, journal = {Int. J. Embed. Syst.}, volume = {7}, number = {3/4}, pages = {216--229}, year = {2015}, url = {https://doi.org/10.1504/IJES.2015.072367}, doi = {10.1504/IJES.2015.072367}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijes/HuYYXZY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijes/JiangJWH15, author = {Nan Jiang and Sixin Jin and Tao Wan and Yueshun He}, title = {{MVP:} modelling virus propagation for IPv6 wireless sensor networks}, journal = {Int. J. Embed. Syst.}, volume = {7}, number = {3/4}, pages = {244--256}, year = {2015}, url = {https://doi.org/10.1504/IJES.2015.072371}, doi = {10.1504/IJES.2015.072371}, timestamp = {Fri, 22 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijes/JiangJWH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijes/KolchinF15, author = {Ivan Kolchin and Sergey Filippov}, title = {Bare-metal microhypervisor prototype and measurement of real-time characteristics}, journal = {Int. J. Embed. Syst.}, volume = {7}, number = {1}, pages = {1--10}, year = {2015}, url = {https://doi.org/10.1504/IJES.2015.066137}, doi = {10.1504/IJES.2015.066137}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijes/KolchinF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijes/KosSVPGKBBTP15, author = {Andrej Kos and Urban Sedlar and Mojca Volk and Klemen Peternel and Joze Guna and Aleksander Kovacic and Gregor Burger and Janez Bester and Saso Tomazic and Matevz Pogacnik}, title = {Real-time eHealth visualisation and actuation platform}, journal = {Int. J. Embed. Syst.}, volume = {7}, number = {2}, pages = {104--114}, year = {2015}, url = {https://doi.org/10.1504/IJES.2015.069995}, doi = {10.1504/IJES.2015.069995}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijes/KosSVPGKBBTP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijes/LiGLH15, author = {Guilin Li and Xing Gao and Minghong Liao and Bing Han}, title = {An iterative algorithm to process the top-k query for the wireless sensor networks}, journal = {Int. J. Embed. Syst.}, volume = {7}, number = {1}, pages = {26--33}, year = {2015}, url = {https://doi.org/10.1504/IJES.2015.066139}, doi = {10.1504/IJES.2015.066139}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijes/LiGLH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijes/LiHLXW15, author = {Mengting Li and Xinyi Huang and Joseph K. Liu and Li Xu and Wei Wu}, title = {Cooperative attribute-based access control for enterprise computing system}, journal = {Int. J. Embed. Syst.}, volume = {7}, number = {3/4}, pages = {191--202}, year = {2015}, url = {https://doi.org/10.1504/IJES.2015.072364}, doi = {10.1504/IJES.2015.072364}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijes/LiHLXW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijes/LiLXJL15, author = {Zhongwen Li and Qian Li and Zhibin Xu and Hai Jiang and Kuan{-}Ching Li}, title = {A secured transmission model for {EPC} network}, journal = {Int. J. Embed. Syst.}, volume = {7}, number = {3/4}, pages = {324--333}, year = {2015}, url = {https://doi.org/10.1504/IJES.2015.072375}, doi = {10.1504/IJES.2015.072375}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijes/LiLXJL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijes/LiPSZ15, author = {Jingzhao Li and Ren Ping and Ling{-}Ling Shi and Shunxiang Zhang}, title = {Optimisation of moving target's low-power and high-precision monitoring with {RSSI} based on static and dynamic clustering}, journal = {Int. J. Embed. Syst.}, volume = {7}, number = {3/4}, pages = {334--344}, year = {2015}, url = {https://doi.org/10.1504/IJES.2015.072363}, doi = {10.1504/IJES.2015.072363}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijes/LiPSZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijes/LiZM15, author = {Qiang Li and Guoyin Zhu and Lixin Miao}, title = {Developing operation layer of logistics information system based on {EPCIS}}, journal = {Int. J. Embed. Syst.}, volume = {7}, number = {2}, pages = {115--122}, year = {2015}, url = {https://doi.org/10.1504/IJES.2015.069996}, doi = {10.1504/IJES.2015.069996}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijes/LiZM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijes/LiaoYHS15, author = {Zhensong Liao and Qiang Yin and Yan Huang and Li Sheng}, title = {Management and application of mobile big data}, journal = {Int. J. Embed. Syst.}, volume = {7}, number = {1}, pages = {63--70}, year = {2015}, url = {https://doi.org/10.1504/IJES.2015.066143}, doi = {10.1504/IJES.2015.066143}, timestamp = {Tue, 24 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijes/LiaoYHS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijes/LiuJL15, author = {Jun Liu and Hongwei Jiang and Xiaoming Liu}, title = {A 3-D robust detail preserving anisotropic diffusion for speckle reduction in 3-D cattle follicle ultrasound image}, journal = {Int. J. Embed. Syst.}, volume = {7}, number = {2}, pages = {156--161}, year = {2015}, url = {https://doi.org/10.1504/IJES.2015.069989}, doi = {10.1504/IJES.2015.069989}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijes/LiuJL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijes/LiuLSA15, author = {Jingwei Liu and Qian Li and Rong Sun and Sawand Muhammad Ajmal}, title = {Energy-efficient key agreement protocols for wireless body area networks}, journal = {Int. J. Embed. Syst.}, volume = {7}, number = {3/4}, pages = {266--279}, year = {2015}, url = {https://doi.org/10.1504/IJES.2015.072368}, doi = {10.1504/IJES.2015.072368}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijes/LiuLSA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijes/LiuQLZ15, author = {Ling Liu and Hanyu Quan and Xuefeng Liu and Yuqing Zhang}, title = {Lightweight handover authentication with location privacy-preserving in mobile wireless networks}, journal = {Int. J. Embed. Syst.}, volume = {7}, number = {3/4}, pages = {280--288}, year = {2015}, url = {https://doi.org/10.1504/IJES.2015.072374}, doi = {10.1504/IJES.2015.072374}, timestamp = {Fri, 03 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijes/LiuQLZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijes/Luo15, author = {Song Luo}, title = {Anonymous hierarchical identity-based encryption without key delegation in decryption}, journal = {Int. J. Embed. Syst.}, volume = {7}, number = {3/4}, pages = {306--317}, year = {2015}, url = {https://doi.org/10.1504/IJES.2015.072373}, doi = {10.1504/IJES.2015.072373}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijes/Luo15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijes/MandalaNSZM15, author = {Satria Mandala and Md. Asri Ngadi and Johan Mohamad Sharif and Mohd Soperi Mohd Zahid and Farhan Mohamed}, title = {Investigating severity of blackhole attack and its variance in wireless mobile ad hoc networks}, journal = {Int. J. Embed. Syst.}, volume = {7}, number = {3/4}, pages = {296--305}, year = {2015}, url = {https://doi.org/10.1504/IJES.2015.072370}, doi = {10.1504/IJES.2015.072370}, timestamp = {Sat, 23 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijes/MandalaNSZM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijes/MessaoudiBTMML15, author = {Kamel Messaoudi and El{-}Bay Bourennane and Salah Toumi and Hichem Mayache and Nawfel Messaoudi and Ouassila Labbani}, title = {Utilisation of the Array-OL specification language for self-generation of a memory controller especially for the {H.264/AVC}}, journal = {Int. J. Embed. Syst.}, volume = {7}, number = {2}, pages = {133--147}, year = {2015}, url = {https://doi.org/10.1504/IJES.2015.069984}, doi = {10.1504/IJES.2015.069984}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijes/MessaoudiBTMML15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijes/NiuQ15, author = {Linwei Niu and Gang Quan}, title = {Peripheral-conscious energy-efficient scheduling for weakly hard real-time systems}, journal = {Int. J. Embed. Syst.}, volume = {7}, number = {1}, pages = {11--25}, year = {2015}, url = {https://doi.org/10.1504/IJES.2015.066138}, doi = {10.1504/IJES.2015.066138}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijes/NiuQ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijes/PengC15, author = {Junjie Peng and Yuanyuan Chen}, title = {A low energy consumption {WSN} node}, journal = {Int. J. Embed. Syst.}, volume = {7}, number = {3/4}, pages = {318--323}, year = {2015}, url = {https://doi.org/10.1504/IJES.2015.072362}, doi = {10.1504/IJES.2015.072362}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijes/PengC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijes/PuXHZQH15, author = {Lu Pu and Xiaowei Xu and Han He and Hanqing Zhou and Zhijun Qiu and Yu Hu}, title = {A flexible control study of variable speed limit in connected vehicle systems}, journal = {Int. J. Embed. Syst.}, volume = {7}, number = {2}, pages = {180--188}, year = {2015}, url = {https://doi.org/10.1504/IJES.2015.069997}, doi = {10.1504/IJES.2015.069997}, timestamp = {Thu, 04 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijes/PuXHZQH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijes/ShaoY15, author = {Zhi{-}Yi Shao and Bo Yang}, title = {Proof of retrievability with efficient verification}, journal = {Int. J. Embed. Syst.}, volume = {7}, number = {3/4}, pages = {203--215}, year = {2015}, url = {https://doi.org/10.1504/IJES.2015.072365}, doi = {10.1504/IJES.2015.072365}, timestamp = {Tue, 16 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijes/ShaoY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijes/TalpurBW15, author = {Mir Sajjad Hussain Talpur and Md. Zakirul Alam Bhuiyan and Guojun Wang}, title = {Shared-node IoT network architecture with ubiquitous homomorphic encryption for healthcare monitoring}, journal = {Int. J. Embed. Syst.}, volume = {7}, number = {1}, pages = {43--54}, year = {2015}, url = {https://doi.org/10.1504/IJES.2015.066141}, doi = {10.1504/IJES.2015.066141}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijes/TalpurBW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijes/WangZZW15, author = {Tai Wang and Zongkui Zhou and Tingshao Zhu and Yang Wei}, title = {Mood disorder patients' language features on their microblogs}, journal = {Int. J. Embed. Syst.}, volume = {7}, number = {1}, pages = {34--42}, year = {2015}, url = {https://doi.org/10.1504/IJES.2015.066140}, doi = {10.1504/IJES.2015.066140}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijes/WangZZW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijes/WeiMML15, author = {Fushan Wei and Jianfeng Ma and Chuangui Ma and Xinghua Li}, title = {A two-factor authenticated key exchange protocol based on {RSA} with dynamic passwords}, journal = {Int. J. Embed. Syst.}, volume = {7}, number = {3/4}, pages = {257--265}, year = {2015}, url = {https://doi.org/10.1504/IJES.2015.072366}, doi = {10.1504/IJES.2015.072366}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijes/WeiMML15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijes/WuXSZ15, author = {Chao Wu and Bin Xu and ShanShan Shi and Bin Zhao}, title = {Time-activity pattern observatory from mobile web logs}, journal = {Int. J. Embed. Syst.}, volume = {7}, number = {1}, pages = {71--78}, year = {2015}, url = {https://doi.org/10.1504/IJES.2015.066144}, doi = {10.1504/IJES.2015.066144}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijes/WuXSZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijes/XiaoX15, author = {Qian Xiao and Haitao Xie}, title = {A social tag recommendation method alleviating cold start based on probabilistic graphical model}, journal = {Int. J. Embed. Syst.}, volume = {7}, number = {2}, pages = {162--169}, year = {2015}, url = {https://doi.org/10.1504/IJES.2015.069994}, doi = {10.1504/IJES.2015.069994}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijes/XiaoX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijes/ZhangWZDW15, author = {Wujun Zhang and Xiaohui Wang and Yunya Zhou and Hua Deng and Yumin Wang}, title = {A GAA-based batch authentication and key agreement for {LTE} networks}, journal = {Int. J. Embed. Syst.}, volume = {7}, number = {3/4}, pages = {289--295}, year = {2015}, url = {https://doi.org/10.1504/IJES.2015.072372}, doi = {10.1504/IJES.2015.072372}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijes/ZhangWZDW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijes/ZhuWWWM15, author = {Linghao Zhu and Cheng Wu and Linyin Wu and Junyu Wang and Hao Min}, title = {A DPA-resistant crypto engine for {UHF} {RFID} tag}, journal = {Int. J. Embed. Syst.}, volume = {7}, number = {2}, pages = {123--132}, year = {2015}, url = {https://doi.org/10.1504/IJES.2015.069986}, doi = {10.1504/IJES.2015.069986}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijes/ZhuWWWM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijes/ZhuX15, author = {Li Zhu and Shengyong Xu}, title = {Prediction algorithm based on web mining for multimedia objects in next-generation Digital Earth}, journal = {Int. J. Embed. Syst.}, volume = {7}, number = {1}, pages = {79--87}, year = {2015}, url = {https://doi.org/10.1504/IJES.2015.066145}, doi = {10.1504/IJES.2015.066145}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijes/ZhuX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.