Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 108 matches
- 2004
- Jesús Acosta Elías, Ulises Pineda Rico, Jose Martin Luna-Rivera, Enrique Stevens-Navarro, Isaac Campos-Cantón, Leandro Navarro-Moldes:
The Effects of Network Topology on Epidemic Algorithms. ICCSA (4) 2004: 177-184 - Muhammad Bilal Ahmad, Min Hyuk Chang, Seung-Jin Park, Jong-An Park, Tae-Sun Choi:
Tracking of Moving Objects Using Morphological Segmentation, Statistical Moments, and Radon Transform. ICCSA (4) 2004: 877-886 - Khin Mi Mi Aung, Jong Sou Park:
Software Rejuvenation Approach to Security Engineering. ICCSA (4) 2004: 574-583 - Sung Baik, Jerzy W. Bala:
A Decision Tree Algorithm for Distributed Data Mining: Towards Network Intrusion Detection. ICCSA (4) 2004: 206-212 - Sung Baik, Jerzy W. Bala, Sung Ahn:
Visualizing Predictive Models in Decision Tree Generation. ICCSA (4) 2004: 489-495 - Jan Broeckhove, Kurt Vanmechelen:
Using C++ Functors with Legacy C Libraries. ICCSA (4) 2004: 514-523 - Jongwoo Chae, Ghita Kouadri Mostéfaoui, Mokdong Chung:
An Adaptive Security Model for Heterogeneous Networks Using MAUT and Simple Heuristics. ICCSA (4) 2004: 983-993 - Tzu-Yi Chen:
ILUTP Mem: A Space-Efficient Incomplete LU Preconditioner. ICCSA (4) 2004: 20-28 - Youngjoo Cho, ChangKyun Chi, Ilyong Chung:
An Efficient Conference Key Distribution System Based on Symmetric Balanced Incomplete Block Design. ICCSA (4) 2004: 647-654 - Chang-Gyu Choi, Yongseok Chang, Jung Hyun Cho, Sung-Ho Kim:
Extract Shape from Clipart Image Using Modified Chain Code - Rectangle Representation. ICCSA (4) 2004: 251-260 - Uk-Chul Choi, Yoon-Hee Choi, Dae-Chul Kim, Tae-Sun Choi:
Scene-Based Video Watermarking for Broadcasting Systems. ICCSA (4) 2004: 271-280 - Won-Hyuck Choi, Hye-jin Shim, Jung-Sun Kim:
Effective Digital Watermarking Algorithm by Contour Detection. ICCSA (4) 2004: 321-328 - Yoon-Hee Choi, Yeong Kyeong Seong, Joo-Young Kim, Tae-Sun Choi:
A Video Mosaicking Technique with Self Scene Segmentation for Video Indexing. ICCSA (4) 2004: 338-347 - Sung Jin Choi, Hee Yong Youn:
A Novel Data Encryption and Distribution Approach for High Security and Availability Using LU Decomposition. ICCSA (4) 2004: 637-646 - Chunlin Li, Zhengding Lu, Layuan Li:
Price Driven Market Mechanism for Computational Grid Resource Allocation. ICCSA (4) 2004: 117-126 - Boguslaw Cyganek, Jan Borgosz:
Control Messaging Channel for Distributed Computer Systems. ICCSA (4) 2004: 261-270 - Olena Daly, David Taniar:
Exception Rules Mining Based on Negative Association Rules. ICCSA (4) 2004: 543-552 - Eugene Demidenko:
Kolmogorov-Smirnov Test for Image Comparison. ICCSA (4) 2004: 933-939 - Olivia Graciela Fragoso Diaz, René Santaolaya Salgado, Isaac M. Vásquez Mendez, Manuel A. Valdés Marrero:
Frameworks as Web Services. ICCSA (4) 2004: 534-542 - Monia Discepoli, Ivan Gerace:
Inverse Dithering through IMAP Estimation. ICCSA (4) 2004: 379-388 - Hugo Estrada, Oscar Pastor, Alicia Martínez, Jose Torres-Jimenez:
Using a Goal-Refinement Tree to Obtain and Refine Organizational Requirements. ICCSA (4) 2004: 506-513 - José Daniel García, Jesús Carretero, José María Pérez, Félix García:
A Model for Use Case Priorization Using Criticality Analysis. ICCSA (4) 2004: 496-505 - Hyoun-Joo Go, Keun Chang Kwak, Sung-Suk Kim, Myung-Geun Chun:
Face Recognition for Expressive Face Images. ICCSA (4) 2004: 924-932 - Jong-Eun Ha, Dong Joong Kang:
Initialization Method for the Self-Calibration Using Minimal Two Images. ICCSA (4) 2004: 915-923 - Eun-Ju Ha, Byeong-Soo Yun:
End-to-End QoS Management for VoIP Using DiffServ. ICCSA (4) 2004: 818-827 - Byong-Won Hwang, Tae-Ha Kang, Tae-Seung Lee:
Distortion-Free of General Information with Edge Enhanced Error Diffusion Halftoning. ICCSA (4) 2004: 281-290 - Sung-kwan Je, Jae-Hyun Cho, Eui-Young Cha:
Automatic Selecting Coefficient for Semi-blind Watermarking. ICCSA (4) 2004: 421-430 - Sam Jin Jeong:
Maximizing Parallelism for Nested Loops with Non-uniform Dependences. ICCSA (4) 2004: 213-222 - Min Jin, Byung-Joo Shin:
Storing Together the Structural Information of XML Documents in Relational Databases. ICCSA (4) 2004: 763-771 - Seung-Shik Kang:
Term-Specific Language Modeling Approach to Text Categorization. ICCSA (4) 2004: 735-742
skipping 78 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-01 14:45 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint