Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 312 matches
- 2007
- Navin Angkura, Supavadee Aramvith, Supakorn Siddhichai:
Directional Texture Feature Extraction using Context Labels of Significance Coding for JPEG2000 Compressed Domain Image Retrieval. IIH-MSP 2007: 407-410 - Naofumi Aoki:
Potential of Value-Added Speech Communications by Using Steganography. IIH-MSP 2007: 251-254 - Yuki Ashino, Ryôichi Sasaki:
Proposal of Digital Forensic System Using Security Device and Hysteresis Signature. IIH-MSP 2007: 3-7 - Florent Autrusseau, Patrick Le Callet, Alexandre Ninassi:
A Study of Content based Watermarking using an Advanced HVS Model. IIH-MSP 2007: 485-488 - Shuzhong Ba, Ju Liu, Guoxia Sun, Wei Zhang:
Text Independent Speaker Verification Based on Mixing ICA Overcomplete Basis Functions. IIH-MSP 2007: 533-536 - Dirk Benyoucef, Daniel J. Strauss:
Optimized Computational Instrumentation in Biomedicine: A Review. IIH-MSP 2007: 217-220 - Mian Cai, Li Kang, Jia Jia:
A Multiple Grade Blind Proxy Signature Scheme. IIH-MSP 2007: 130-133 - Byung-Ho Cha, C.-C. Jay Kuo:
Design of Multiuser Collusion-Free Hiding Codes with Delayed Embedding. IIH-MSP 2007: 379-382 - Chao-Wen Chan, Chung-Chih Lin:
The Improvement of Lee-Chiu's Remote User Authentication Scheme. IIH-MSP 2007: 245-248 - Chao-Wen Chan, Rong-Yuan Wang:
Improving the Security of the Chien-Jan Protocol for Large Mobile Networks. IIH-MSP 2007: 249-252 - Ya-Fen Chang:
Non-Interactive t-out-of-n Oblivious Transfer Based on the RSA Cryptosystem. IIH-MSP 2007: 45-50 - Jui-Chuan Chang:
Financial Accelerator Effect and Macroeconomic Fluctuations. IIH-MSP 2007: 553-556 - Chin-Chen Chang, Yung-Chen Chou:
High Payload Data Embedding with Hybrid Strategy. IIH-MSP 2007: 505-508 - Feng-Cheng Chang, Hsiang-Cheh Huang:
A Programming Model for Distributed Content-Based Image Retrieval. IIH-MSP 2007: 210-213 - Ko-Chin Chang, Ping Sheng Huang, Te-Ming Tu, Chien-Ping Chang:
Image Steganographic Scheme Using Tri-way Pixel-Value Differencing and Adaptive Rules. IIH-MSP 2007: 449-452 - Chin-Chen Chang, The Duc Kieu:
Reversible Data Embedding for Vector Quantization Indices. IIH-MSP 2007: 481-484 - Chin-Chen Chang, The Duc Kieu:
Secret Sharing and Information Hiding by Shadow Images. IIH-MSP 2007: 457-460 - Chin-Chen Chang, Chin-Feng Lee, Lin-Yi Chuang:
Using Dynamic Programming Strategy to Find an Optimal Solution to Exploiting Modification Direction Embedding Method. IIH-MSP 2007: 489-492 - Jun-Wei Chang, Su Ian Eugene Lei, Chun-Fa Chang, Yu-Jung Cheng:
Real-Time Rendering of Splashing Stream Water. IIH-MSP 2007: 337-340 - Chuan-Yu Chang, Chi-Fang Li, Hung-Jen Wang:
Using Principal Component Analysis and Radial Basis Function Neural Networks for Image Contents Classification. IIH-MSP 2007: 7-10 - Bao Rong Chang, Hsiu Fen Tsai:
Forecasting Typhoon Moving Path Using BPNN-Weighted Grey-C3LSP Tuned by Quantum-Neuron-Based Adaptive Support Vector Regression with Nested Local Adiabatic Evolution. IIH-MSP 2007: 3-6 - Chin-Chen Chang, Wei-Liang Tai, Kuo-Nan Chen:
Improvements of EMD Embedding for Large Payloads. IIH-MSP 2007: 473-476 - Feng-Cheng Chang, Chiao-Lin Wu, Hsueh-Ming Hang:
A Switchable DRM Structure for Embedded Device. IIH-MSP 2007: 37-40 - Wei-Han Chang, Nai-Chung Yang, Chung Ming Kuo, Ching-Hsuan Lin:
Template-Based Scene Classification for Baseball Videos Using Efficient Playfield Segmentation. IIH-MSP 2007: 543-548 - Shih-Pin Chao, Chen-Lan Yen, Chien-Chun Kuo:
Neural ISOMAP. IIH-MSP 2007: 333-336 - Jeanne Chen, Tung-Shou Chen:
Content-based Rate Controlled Data Hiding in JPEG-LS. IIH-MSP 2007: 477-480 - Chang-Chu Chen, Chin-Chen Chang:
Secret Image Sharing Using Quadratic Residues. IIH-MSP 2007: 515-518 - Yu-Ting Chen, Chu-Song Chen:
Cascading Rectangle and Edge Orientation Features for Fast Pedestrian Detection. IIH-MSP 2007: 407-410 - Wen-Shiung Chen, Yao-Shan Chiang, Yen-Hsun Chiu:
Biometric Verification by Fusing Hand Geometry and Palmprint. IIH-MSP 2007: 403-406 - Thou-Ho Chen, Chao-Yu Chen, Chin-Hsing Chen:
An Adaptive Random-valued Impulse Noise Reduction Method Based on Noise Ratio Estimation in Highly Corrupted Images. IIH-MSP 2007: 523-526
skipping 282 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-03 21:57 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint