Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 130 matches
- 2012
- Hanane Abdeldjelil, Noura Faci, Zakaria Maamar, Djamal Benslimane:
A Diversity-Based Approach for Managing Faults in Web Services. AINA 2012: 81-88 - Markus Aleksy, Axel Korthaus:
Time-Dependent Execution Pattern. AINA 2012: 338-343 - Deepali Arora, Eamon Millman, Stephen W. Neville:
Assessing the Expected Performance of the OLSR Routing Protocol for Denser Urban Core Ad Hoc Network Deployments. AINA 2012: 406-414 - Khalid Ashraf, Rachid Anane, Behzad Bordbar:
File Management in a Mobile DHT-based P2P Environment. AINA 2012: 415-422 - Muhammad Ariff Baharudin, Quang Tran Minh, Eiji Kamioka:
Evaluations of Ant Colony Optimization Inspired SCTP Optimal Path Selection Using E-model. AINA 2012: 487-494 - Patrick Baier, Frank Dürr, Kurt Rothermel:
PSense: Reducing Energy Consumption in Public Sensing Systems. AINA 2012: 136-143 - Jason Barnes, Vamsi Paruchuri:
Optimal Phase Ordering of Traffic Signals to Reduce Stopped Delay. AINA 2012: 113-119 - Danilo Valeros Bernardo, Doan B. Hoang:
Compositional Logic for Proof of Correctness of Proposed UDT Security Mechanisms. AINA 2012: 686-694 - Davi da Silva Böger, Joni da Silva Fraga, Eduardo Adílio Pelinson Alchieri, Michelle S. Wangham:
Intrusion-Tolerant Shared Memory through a P2P Overlay Segmentation. AINA 2012: 779-786 - Dang-Quang Bui, Won-Joo Hwang:
Proportionally Quasi-fair Scheduling Optimization in Wireless Ad Hoc Networks. AINA 2012: 641-648 - Yeim-Kuan Chang, Chao-Yen Chien:
Layer Partitioned Search Tree for Packet Classification. AINA 2012: 276-282 - Ming-Feng Chang, Chi-Hua Chen:
Temporary Call-Back Telephone Number Service. AINA 2012: 314-318 - Yi Chen, Ajit Narayanan, Shaoning Pang, Ban Tao:
Malicioius Software Detection Using Multiple Sequence Alignment and Data Mining. AINA 2012: 8-14 - Shyr-Kuen Chen, Pi-Chung Wang:
Shortcut Anycast Tree Routing in MANETs. AINA 2012: 635-640 - Sheng-Tzong Cheng, Ju-Hsien Chou:
Fuzzy-Based Actuators Controlling for Minimizing Power Consumption in Cyber-physical System. AINA 2012: 160-166 - Chih-Yung Cheng, Chi-Cheng Chuang, Ray-I Chang:
Three-Dimensional Location-Based IPv6 Addressing for Wireless Sensor Networks in Smart Grid. AINA 2012: 824-831 - Tianzhen Cheng, Ping Li, Sencun Zhu:
An Algorithm for Jammer Localization in Wireless Sensor Networks. AINA 2012: 724-731 - Quan Jia Cheng, Joseph Kee-Yin Ng, Kevin Chin Yiu Shum:
A Wireless LAN Location Estimation System Using Center of Gravity as an Algorithm Selector for Enhancing Location Estimation. AINA 2012: 261-268 - Yuan-Po Chi, Hsung-Pin Chang:
TARS: An Energy-Efficient Routing Scheme for Wireless Sensor Networks with Mobile Sinks and Targets. AINA 2012: 128-135 - Nitin Chiluka, Nazareno Andrade, Dimitra Gkorou, Johan A. Pouwelse:
Personalizing EigenTrust in the Face of Communities and Centrality Attack. AINA 2012: 503-510 - Amlan Jyoti Choudhury, Hyotaek Lim, Hoon-Jae Lee:
An Efficient FPGA Design of PingPong-128 Stream Cipher for Secure Computing. AINA 2012: 695-700 - Li-Yeh Chuang, Cheng-Yi Chiang, Cheng-Hong Yang:
A Quantum Genetic Algorithm for Operon Prediction. AINA 2012: 269-275 - Li-Yeh Chuang, Li-Wei Huang, Cheng-Hong Yang:
Chaos Embedded Particle Swarm Optimization for Tag Single Nucleotide Polymorphism Selection. AINA 2012: 283-288 - Po-Jen Chuang, Yi-Ping Liao:
Efficient and Secure Cross-Realm Client-to-Client Password-Authenticated Key Exchange. AINA 2012: 701-708 - Po-Jen Chuang, Po-Hsun Yen, Ting-Yi Chu:
Efficient Route Discovery and Repair in Mobile Ad-hoc Networks. AINA 2012: 391-398 - Subhasis Dash, Amulya Ratna Swain, Anuja Ajay:
Reliable Energy Aware Multi-token Based MAC Protocol for WSN. AINA 2012: 144-151 - Sanjay Kumar Dhurandher, Isaac Woungang, Kirti Kumar, Mamta Joshi, Monika Verma:
A Rate Adaptive Admission Control Protocol for Multimedia Wireless Mesh Networks. AINA 2012: 38-43 - Tomoya Enokido, Makoto Takizawa:
An Extended Power Consumption Model for Distributed Applications. AINA 2012: 912-919 - Stefan Föll, Klaus Herrmann, Kurt Rothermel:
Energy-Efficient Update Protocols for Mobile User Context. AINA 2012: 120-127 - Yusuke Gotoh, Tomoki Yoshihisa, Hideo Taniguchi, Masanori Kanazawa, J. Wenny Rahayu, Yi-Ping Phoebe Chen:
A Scheduling Method for Node Relay-based Webcast Considering Reconnection. AINA 2012: 787-794
skipping 100 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-28 16:21 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint