Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 65 matches
- 2011
- Hongyun Cai, Zhen Li, Junfeng Tian:
A New Trust Evaluation Model Based on Cloud Theory in E-Commerce Environment. IPTC 2011: 139-142 - Kuobin Dai:
Secure Digital Library Technology Research Based on VPN. IPTC 2011: 165-168 - Kuobin Dai:
IPv4 to IPv6 Transition Research Based on the Campus Network. IPTC 2011: 199-202 - Kuobin Dai:
Teaching and Research of Cryptography in Information and Computer Science. IPTC 2011: 226-230 - Kuobin Dai:
Network Security Mechanisms Research. IPTC 2011: 231-234 - Han-ping Gao, Zu-qiao Yang:
Integrated Visual Saliency Based Local Feature Selection for Image Retrieval. IPTC 2011: 47-50 - Juan He:
An Analytic Network Process Model of Trust in B2C E-Commerce. IPTC 2011: 173-176 - Zhonglin He, Zhihua Hu:
A New Method for Impossible Differential Cryptanalysis of 8-Round AES-128. IPTC 2011: 214-217 - Zhihua Hu, Zhonglin He:
A New Method for Impossible Differential Cryptanalysis of 7-Round AES-192. IPTC 2011: 248-251 - Yin Hu, Pei Lin:
Research and Implementation of Packet Classification Based on NDIS Intermediate Layer under Windows Platform. IPTC 2011: 157-160 - Yin Hu, Chaoyang Zhang:
An Improved Bayesian Algorithm for Filtering Spam E-Mail. IPTC 2011: 87-90 - Ajay Jangra, Nitin Goel, Priyanka:
Efficient Power Saving Adaptive Routing Protocol (EPSAR) for MANETs Using AODV and DSDV: Simulation and Feasibility Analysis. IPTC 2011: 24-26 - Qin Jiang:
Some Remarks on Charactertics Function and Density Function of Uncertain Variable. IPTC 2011: 115-118 - Lei Lu, Lei Zhang:
The Chaotic Cipher Based on CNNs and Its Application in Network. IPTC 2011: 184-187 - Xi Li, Hang Dai:
The Color Components' Exchanging on Different Color Spaces and the Using for Image Segmentation. IPTC 2011: 123-126 - Yun Li, Shufang Song, Mahmoud Daneshmand, Weina Duan:
A Cooperative Relay Method and Performance for Wireless Networks. IPTC 2011: 31-34 - Xueming Li, Minling Xing, Jiapei Zhang:
A Comprehensive Prediction Method of Visit Priority for Focused Crawler. IPTC 2011: 27-30 - Xueming Li, Jiapei Zhang, Minling Xing:
Automatic Summarization for Chinese Text Based on Sub Topic Partition and Sentence Features. IPTC 2011: 131-134 - Kailiang Liang:
A Network Construction Solution in Colleges or Universities. IPTC 2011: 188-191 - Kailiang Liang:
Research on Thin AP Architecture to Deploy Campus WLAN. IPTC 2011: 192-195 - Changxing Lin, Jian Zhang, Beibei Shao:
A High Speed Parallel Timing Recovery Algorithm and Its FPGA Implementation. IPTC 2011: 63-66 - Chen Liu, Zhou Wei:
Multi-feature Method: An Integrated Content Based Image Retrieval System. IPTC 2011: 43-46 - Xiong Liu, Haiwei Xue, Yiqi Dai:
A Self Adaptive Jamming Strategy to Restrict Covert Timing Channel. IPTC 2011: 1-4 - Hong-fu Liu, Cong Zhang, Rui-fan Liang:
Optimization of Masking Expansion Algorithm in Psychoacoustic Models. IPTC 2011: 161-164 - Yuwu Lu, Xueying Liu:
A New Population Migration Algorithm Based on the Chaos Theory. IPTC 2011: 147-150 - Da Lu, Guofan Liu, Lingli Zhu:
An Optimization for CAVLC Code Table Lookup Algorithm in H.264 Decoder. IPTC 2011: 79-82 - Haoyong Lv, Hengyao Tang:
Machine Learning Methods and Their Application Research. IPTC 2011: 108-110 - Haoyong Lv, Zhihong Wu:
A Survey of Computer Graphics and Graphics Image Processing Technology. IPTC 2011: 196-198 - Sheng Ma:
Some Remarks on Convergence in Credibility Measure and Convergence in Credibility Distribution of Fuzzy Variable. IPTC 2011: 100-103 - YuHong Ma, Kai Xie, Minfang Peng:
A Parallel Gaussian Filtering Algorithm Based on Color Difference. IPTC 2011: 51-54
skipping 35 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-05 10:12 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint