Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 29 matches
- 2024
- Yericharla Mary Asha Latha, Luis C. Nunes, Filipe M. Barradas, José Carlos Pedro:
Theory and Design of Doherty Power Amplifier With Active Harmonic Injection. IEEE Access 12: 41631-41642 (2024) - Kaavya Kanagaraj, Shiju George, Asha Joseph, Sushanth H. Gowda:
Adolescent identity search algorithm with optimised video-based activity classification using hierarchical auto-associative polynomial convolutional neural network. Int. J. Ad Hoc Ubiquitous Comput. 45(4): 254-265 (2024) - Edith Antor, Joseph Owusu-Marfo, Jonathan Kissi:
Usability evaluation of electronic health records at the trauma and emergency directorates at the Komfo Anokye teaching hospital in the Ashanti region of Ghana. BMC Medical Informatics Decis. Mak. 24(1): 231 (2024) - 2023
- Alireza Ashayer, Joseph Wireman, Nasseh Tabrizi:
Machine Learning and Blockchain Intersection in Cryptocurrency Price Prediction. ICBC 2023: 72-88 - Muhammad Nauman Khan, Asha Rao, Seyit Camtepe, Josef Pieprzyk:
Classical to Post-Quantum Secure ABE-IBE Proxy Re-Encryption Scheme. SECRYPT 2023: 85-98 - 2022
- Justus Ashaba, Josephine Nabukenya:
Beyond monitoring functionality to results evaluation of eHealth interventions: Development and validation of an eHealth evaluation framework. Health Informatics J. 28(4): 146045822211418 (2022) - 2021
- S. Adarsh, Shon G. Joseph, Franklin John, Lekshmi M. B., Asharaf S.:
A Transparent and Traceable Coverage Analysis Model for Vaccine Supply-Chain Using Blockchain Technology. IT Prof. 23(4): 28-35 (2021) - Asha Jose, Kamalraj Subramanian:
High-capacity reversible data hiding using quotient multi pixel value differencing scheme in encrypted images by fuzzy based encryption. Multim. Tools Appl. 80(19): 29453-29479 (2021) - 2020
- Asha Jose, Kamalraj Subramaniam:
Comparative analysis of reversible data hiding schemes. IET Image Process. 14(10): 2064-2073 (2020) - 2019
- Josep Miquel Jornet, Yongho Bae, Christopher Raymond Handelmann, Brandon Decker, Anna Balcerak, Amit Sangwan, Pei Miao, Aesha Desai, Liang Feng, Ewa K. Stachowiak, Michal K. Stachowiak:
Optogenomic Interfaces: Bridging Biological Networks With the Electronic Digital World. Proc. IEEE 107(7): 1387-1401 (2019) - Katrina M. Ariones, Mark Albert D. Alquiros, Aesha Camille Canay, Camille V. Morales, Analyn N. Yumang, Jose B. Lazaro, Ericson D. Dimaunahan:
Acquisition of Spectral Signals for Determination of Chronic Disease to Syndrome Using Independent Component Analysis. ICBET 2019: 78-82 - 2018
- Michal K. Stachowiak, Ewa K. Stachowiak, Christopher Raymond Handelmann, Brandon Decker, Anna Balcerak, Aesha Desai, Yongho Bae, Josep Miquel Jornet:
Integrated genome regulation of brain development: targeting ontogenomic networks in schizophrenia via nanomachine-genome optical communications. NANOCOM 2018: 4:1-4:2 - 2017
- Sandhya Kattayat, Smitha Josey, Asha J. V:
Mobile Learning Apps in Instruction And Students Achievement. Int. J. Interact. Mob. Technol. 11(1): 143-147 (2017) - Mihir Bellare, Asha Camper Singh, Joseph Jaeger, Maya Nyayapati, Igors Stepanovs:
Ratcheted Encryption and Key Exchange: The Security of Messaging. CRYPTO (3) 2017: 619-650 - 2016
- Mahdi Ashabani, Francisco D. Freijedo, Saeed Golestan, Josep M. Guerrero:
Inducverters: PLL-Less Converters With Auto-Synchronization and Emulated Inertia Capability. IEEE Trans. Smart Grid 7(3): 1660-1674 (2016) - Mihir Bellare, Asha Camper Singh, Joseph Jaeger, Maya Nyayapati, Igors Stepanovs:
Ratcheted Encryption and Key Exchange: The Security of Messaging. IACR Cryptol. ePrint Arch. 2016: 1028 (2016) - 2015
- K. D. Joseph, Asha Elizabeth Daniel, A. Unnikrishnan:
Reduced ripple interleaved cuk converter with phase shifted PWM. ASCC 2015: 1-6 - Mia D. Champion, Ryan A. Hlady, Huihuang Yan, Jared Evans, Jeff Nie, Jeong-Heon Lee, James M. Bogenberger, Kannabiran Nandakumar, Jaime I. Dávila, Raymond M. Moore, Asha A. Nair, Daniel R. O'Brien, Yuan-Xiao Zhu, K. Martin Kortüm, Tamas Ordog, Zhiguo Zhang, Richard W. Joseph, A. Keith Stewart, Jean-Pierre A. Kocher, Eric Jonasch, Keith D. Robertson, Raoul Tibes, Thai H. Ho:
Bioinformatics Strategies for Identifying Regions of Epigenetic Deregulation Associated with Aberrant Transcript Splicing and RNA-editing. BIOINFORMATICS 2015: 163-170 - 2014
- Ashanka Kumari, Courtney Lawton, Carmen McCue, Jose Luis Moreno, Grace Thomas:
Detecting Linguistic Signal in Cather's Early Journalism: Polishing the Bibliography. DH 2014 - 2013
- Karin Verspoor, Antonio Jimeno-Yepes, Lawrence Cavedon, Tara McIntosh, Asha Herten-Crabb, Zoë Thomas, John-Paul Plazzer:
Annotating the biomedical literature for the human variome. Database J. Biol. Databases Curation 2013 (2013) - Ashirwad Joseph Chowriappa, Raul Wirz, Aditya R. Ashammagari, Yong Won Seo:
Prediction from expert demonstrations for safe tele-surgery. Int. J. Autom. Comput. 10(6): 487-497 (2013) - Andrew G. Gehring, Charles Barnett, Ted Chu, Chitrita DebRoy, Doris D'Souza, Shannon Eaker, Pina Fratamico, Barbara Gillespie, Narasimha Hegde, Kevin Jones, Jun Lin, Stephen Oliver, George C. Paoli, Ashan Perera, Joseph Uknalis:
A High-Throughput Antibody-Based Microarray Typing Platform. Sensors 13(5): 5737-5748 (2013) - Ashirwad Joseph Chowriappa, Raul Wirz, Aditya R. Ashammagari, Thenkurussi Kesavadas:
A convex decomposition methodology for collision detection. VR 2013: 57-58 - 2009
- Asha Balijepalli, Joseph Ervin, William Lepkowski, Yu Cao, Trevor J. Thornton:
Compact modeling of a PD SOI MESFET for wide temperature designs. Microelectron. J. 40(9): 1264-1273 (2009) - 2007
- Asha Balijepalli, Joseph Ervin, Yu Cao, Trevor Thornton:
Compact Modeling of a PD SOI MESFET for Wide Temperature Designs. ISQED 2007: 133-138 - 2004
- Joselíto J. Chua, Asha Rao:
An Image-Guided Heuristic for Planning an Exhaustive Enumeration. HIS 2004: 136-141 - 2002
- George Joseph, Asha George:
ERP, Learning Communities, and Curriculum Integration. J. Inf. Syst. Educ. 13(1): 51-58 (2002) - 2001
- Arturo Molina, José L. Acosta, Ahmed Al-Ashaab, Karina Rodríguez:
Web-based Information Models to Support Product Development in Virtual Enterprises. PROLAMAT 2001: 284-295 - 1996
- José Monteiro, Srinivas Devadas, Pranav Ashar, Ashutosh Mauskar:
Scheduling Techniques to Enable Power Management. DAC 1996: 349-352
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-05 04:43 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint