Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 36 matches
- 2008
- Karl Andersson, Muslim Elkotob, Christer Åhlund:
A new MIP-SIP interworking scheme. MUM 2008: 117-120 - Birgitta Bergvall-Kåreborn, Staffan Larsson:
A case study of real-world testing. MUM 2008: 113-116 - Mark Billinghurst, Mika Hakkarainen, Charles Woodward:
Augmented assembly using a mobile phone. MUM 2008: 84-87 - José Manuel Cantera, Guido García Bernardo, Jorge Cabrero Alonso:
A crawling and ranking method for improving context-awareness in mobile web search. MUM 2008: 97-100 - Shudong Chen, Johan J. Lukkien:
Obtaining resource controllability in service cooperation environments. MUM 2008: 109-112 - Driss Choujaa, Naranker Dulay:
Towards context-aware face anonymisation. MUM 2008: 137-144 - Stavros Christodoulakis, Michalis Foukarakis, Lemonia Ragia, Hiroaki Uchiyama, Takuya Imai:
Semantic maps and mobile context capturing for picture content visualization and management of picture databases. MUM 2008: 130-136 - Iain A. Currie, Mahesh K. Marina:
Experimental evaluation of read performance for RFID-based mobile sensor data gathering applications. MUM 2008: 92-95 - Arindam Das, Wolfgang Stürzlinger:
Modeling learning effects in mobile texting. MUM 2008: 154-161 - Oleg Davidyuk, Iván Sánchez Milara, Jon Imanol Durán, Jukka Riekki:
Autonomic composition of ubiquitous multimedia applications in REACHES. MUM 2008: 105-108 - Yun Ding, Jochen Huber:
Designing multi-user multi-device systems: an architecture for multi-browsing applications. MUM 2008: 8-14 - Muslim Elkotob, Karl Andersson:
Analysis and measurement of session setup delay and jitter in VoWLAN using composite metrics. MUM 2008: 190-197 - Harlan Hile, Ramakrishna Vedantham, Gregory Cuellar, Alan L. Liu, Natasha Gelfand, Radek Grzeszczuk, Gaetano Borriello:
Landmark-based pedestrian navigation from collections of geotagged photos. MUM 2008: 145-152 - Simo Hosio, Hannu Kukka, Jukka Riekki:
Leveraging social networking services to encourage interaction in public spaces. MUM 2008: 2-7 - Tuula Kärkkäinen, Antti Kaakinen, Teija Vainio, Kaisa Väänänen-Vainio-Mattila:
Design guidelines for managing metadata for personal content on mobile devices. MUM 2008: 162-167 - Otso Kassinen, Zhonghong Ou, Mika Ylianttila, Erkki Harjula:
Effects of peer-to-peer overlay parameters on mobile battery duration and resource lookup efficiency. MUM 2008: 177-180 - Lukasz Kondrad, Imed Bouazizi, Moncef Gabbouj:
Seamless handover for mobile TV over DVB-H applications. MUM 2008: 181-184 - Martin Körling:
The developer experience. MUM 2008: 214 - Hannu Kukka, Timo Ojala, Juha Tiensyrjä, Teemu Mikkonen:
panOULU Luotsi: a location based information mash-up with XML aggregator and WiFi positioning. MUM 2008: 80-83 - Rikard Lindgren:
Architectural knowledge in ubiquitous computing innovation. MUM 2008: 215 - Mika Luimula, Kari Kuutti:
Locawe: a novel platform for location-aware multimedia services. MUM 2008: 122-129 - Florian Marquardt, Adelinde M. Uhrmacher:
Evaluating AI planning for service composition in smart environments. MUM 2008: 48-55 - Fotis Menemenis, Symeon Papadopoulos, Ben Bratu, Simon Waddington, Yiannis Kompatsiaris:
AQUAM: automatic query formulation architecture for mobile applications. MUM 2008: 32-39 - Natasa Milic-Frayling, Martin J. Hicks, Rachel Jones, Jamie Costello:
Exploring personal broadcast channels for rich media sharing in close relationships. MUM 2008: 23-30 - Tuomas Nissilä, Kostas Pentikousis, Ilkka Harjula, Jyrki Huusko, Mika Rautio:
WiMAX backhaul for environmental monitoring. MUM 2008: 185-188 - Stina Nylander:
Where would you bring your laptop?: live blogging in an outdoors mechanical shop. MUM 2008: 101-104 - Pekka Pääkkönen, Daniel Pakkala:
Benchmark of middleware protocols for application and service interaction. MUM 2008: 40-47 - Jong-Tae Park, Jae-Wook Nah, Song Wang:
Application-aware handover with minimal power consumption for multimedia streaming service in wireless LAN. MUM 2008: 198-204 - Christiane Reisse, Christoph Burghardt, Florian Marquardt, Thomas Kirste, Adelinde M. Uhrmacher:
Smart environments meet the semantic web. MUM 2008: 88-91 - Iván Sánchez Milara, Jukka Riekki, Jarkko Rousu, Susanna Pirttikangas:
Touch & Share: RFID based ubiquitous file containers. MUM 2008: 57-63
skipping 6 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-30 19:58 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint