default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 39 matches
- 2015
- Shoug Alfadhli, Asmaa Alsumait:
Fun Academic Cloud Computing. CSCESM 2015: 43-48 - Mohammed Alotaibi, Islam Choudhury:
A social robotics children diabetes management and educational system for Saudi Arabia: System architecture. CSCESM 2015: 170-174 - Abdullah H. Alsharif, Nada Y. Philip:
A framework for smoking cessation in the Kingdom Of Saudi Arabia using smart mobile phone technologies (Smoke Mind). CSCESM 2015: 96-102 - Norah M. Asiri, Nourah AlHumaidi, Nourah AlOsaim:
Combination of histogram of oriented gradients and hierarchical centroid for sketch-based image retrieval. CSCESM 2015: 149-152 - Kaci Bourdache, Tina El-Nemr:
Use of Remotely Piloted Aircraft Systems in Arctic and comparable extreme environments in civil security scenarios. CSCESM 2015: 204-208 - Nikos Dimokas, Kostas Kalogirou, Pavlos Spanidis, Evangelos Bekiaris:
Building adaptive user interface using cloud computing. CSCESM 2015: 55-60 - Jonathan Dunne, David Malone, Jason Flood:
Social testing: A framework to support adoption of continuous delivery by small medium enterprises. CSCESM 2015: 49-54 - Mabruk Fekihal, Ibrahim Jaluta, Dinesh Kumar Saini:
TB±tree: Index structure for Information Retrieval Systems. CSCESM 2015: 182-186 - Andrea Horch, Holger Kett, Anette Weisbecker:
Extracting product unit attributes from product offers by using an ontology. CSCESM 2015: 67-71 - Shuting Hou:
An algorithm of calligraphy beautification based on improved velocity and width model. CSCESM 2015: 124-127 - Anne Huotari, Ilkka Tikanmaki:
An online training for the EU Common Information Sharing Environment. CSCESM 2015: 153-156 - Yusuke Kawakami, Tetsuo Hattori, Yoshiro Imai, Yo Horikawa, Haruna Matsushita, R. P. C. Janaka Rajapakse:
Automated color image arrangement method for multiple-peak image. CSCESM 2015: 27-30 - Kihyun Kim:
Random number visualization using the TRNG. CSCESM 2015: 139-142 - Geonlyang Kim, Yong-Sung Jeon, Jeong-Nyeo Kim:
The Secure Urgent Situation Propagation System using the Mobile Security Solution. CSCESM 2015: 109-114 - Tae-Hak Kim, Seong-Jin Kim:
A study on facility maintenance information composition and sophisticated technology utilization measures. CSCESM 2015: 23-26 - Seong-Jin Kim, Tae-Hak Kim:
A study on the integrated construction cost management method with reflection of the characteristics of public construction works in South Korea. CSCESM 2015: 72-75 - Kihyun Kim, Taeson Yoon:
Analysis and solutions to publicize Gonu. CSCESM 2015: 115-123 - Riku Leppanen:
Enhancing situation awareness through real-time video. CSCESM 2015: 198-203 - Ramamoorthy Luxman, Xiao Liu:
Implementation of back-stepping integral controller for a gesture driven quad-copter with human detection and auto follow feature. CSCESM 2015: 134-138 - Irmeli Makitalo, Janne Tuominen, Riina Timonen, Ilkka Tikanmaki:
Social media guidelines for maritime transport crises situations in the EU area. CSCESM 2015: 1-6 - Antti Miettinen, Jani Nousiainen, Jyri Rajamäki, Juha S. Knuuttila:
The usage of social media in crisis communication. CSCESM 2015: 13-18 - Marcin Mironczuk:
The cascading knowledge discovery in databases process in the information system development. CSCESM 2015: 83-89 - Rauno Pirinen, Jyri Rajamäki:
Mechanism of critical and resilient digital services for design theory. CSCESM 2015: 90-95 - Jyri Rajamäki, Juha S. Knuuttila, Harri Ruoslahti, Pasi Patama, Jouni Viitanen:
Building trust between citizens and their governments. CSCESM 2015: 128-133 - Paresh Rathod, Viljami Julkunen, Tero Kaisti, Janne Nissila:
Automatic acceptance testing of the web application security with ITU-T X.805 framework. CSCESM 2015: 103-108 - Christopher Ruff, Florian Maier, Tobias Muller, Holger Kett:
Leveraging Complex Event Processing for supporting small and medium-sized e-commerce enterprises. CSCESM 2015: 61-66 - Sami Savolainen, Marika Ridell, Marko Lehtonen, Paresh Rathod:
eGuard. CSCESM 2015: 37-42 - Johannes Schick, Martin Kuboschek, Wolfram-Manfred Lippe:
Modeling communicational and informational content in Facebook with context specific methods. CSCESM 2015: 7-12 - Sulaiman Al Sheibani:
Internet addiction: A structured literature review and future research directions. CSCESM 2015: 175-181 - Johannes Harungguan Sianipar, Christoph Meinel:
A verification mechanism for cloud brokerage system. CSCESM 2015: 143-148
skipping 9 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-31 11:54 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint