Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 155 matches
- 2012
- Hassan Abid, TaeChoong Chung, Sungyoung Lee, Saad B. Qaisar:
Performance Analysis of LTE Smartphones-Based Vehicle-to-Infrastrcuture Communication. UIC/ATC 2012: 72-78 - Masaki Aida, Chisa Takano, Masayuki Murata, Makoto Imase:
Quasi-static Approach for Analyzing Interactions between Networks and Users Based on Decomposition of Timescales. UIC/ATC 2012: 606-611 - Lucas A. Almeida, Fabricio Nogueira Buzeto, Ana H. O. R. Castillo, Carla Denise Castanho, Ricardo Pezzuol Jacobi:
Hydra: An Ubiquitous Application for Service Rerouting. UIC/ATC 2012: 366-373 - Luís Assunção, Carlos Gonçalves, José C. Cunha:
Autonomic Activities in the Execution of Scientific Workflows: Evaluation of the AWARD Framework. UIC/ATC 2012: 423-430 - Maryam Bagheri, Seyed-Hassan Mirian-Hosseinabadi, Hoda Mashayekhi, Jafar Habibi:
Mining Distributed Frequent Itemsets Using a Gossip Based Protocol. UIC/ATC 2012: 780-785 - Tarak Chaari, Kaouthar Fakhfakh:
Semantic Modeling and Reasoning at Runtime for Autonomous Systems Engineering. UIC/ATC 2012: 415-422 - Kevin S. Chan, Jin-Hee Cho, Sibel Adali:
Composite Trust Model for an Information Sharing Scenario. UIC/ATC 2012: 439-446 - Pintsang Chang:
A Distributed Integrated Fare Collection and Accounting System for Metropolitan Railway Transit. UIC/ATC 2012: 797-802 - Ching-Lung Chang, Chang-Hsuan Hung:
The Design and Realization of Video Phone System in Embedded Platform. UIC/ATC 2012: 650-654 - Chin-Yu Chang, Chang-Hong Lin:
An Efficient Method for Lane-Mark Extraction in Complex Conditions. UIC/ATC 2012: 330-336 - Ing-Chau Chang, Chien-Hsun Li, Cheng-Fu Chou:
The IG-Ferry Protocol to Support Efficient Controlled Replication in Vehicular Delay Tolerant Network. UIC/ATC 2012: 314-321 - Yao-Tang Chang, Chuen-Ching Wang:
Confidential Enhancement with Multi-code Keying Reconfiguration over Time-Shifted CHPC-based 2D OCDMA Networks. UIC/ATC 2012: 374-381 - Wen-Tzu Chen:
A New RFID Anti-collision Algorithm for the EPCglobal UHF Class-1 Generation-2 Standard. UIC/ATC 2012: 811-815 - Huang-Chi Chen, Yu-Wen Chang, Rey-Chue Hwang:
The Modulation Method Based on Reed-Solomon Code for Watermarking. UIC/ATC 2012: 633-637 - Yen-Lin Chen, Chuan-Yen Chiang, Yo-Ping Huang, Shyan-Ming Yuan:
A Project-Based Curriculum for Teaching C++ Object-Oriented Programming. UIC/ATC 2012: 667-672 - Hong-Jin Chen, Yo-Ping Huang, Yun-Kai Ke:
Ubiquitous Computing and Evaluation of Water Quality by Grey Relational Analysis. UIC/ATC 2012: 719-724 - Yi-Hui Chen, Ci-Wei Lan:
A Self-Authentication Mechanism for a (3, 3)-threshold Secret Sharing Scheme. UIC/ATC 2012: 1006-1008 - Chia-Jung Chen, Yi-Sheng Liu, Rong-Guey Chang:
DCSim: Design Analysis on Virtualization Data Center. UIC/ATC 2012: 900-905 - Longbiao Chen, Yaochun Li, Zeming Zheng, Li Zhang, Dan He, Xiaolong Li, Sha Zhao, Shijian Li, Gang Pan:
WaterLady: A Case Study for Connecting Physical Devices into Social Networks. UIC/ATC 2012: 930-934 - Wei Chen, Xiaoqiang Qiao, Jun Wei, Tao Huang:
A Two-Level Virtual Machine Self-Reconfiguration Mechanism for the Cloud Computing Platforms. UIC/ATC 2012: 563-570 - Chieh Jen Chen, Chin-Hung Teng, Tsai-Yen Li:
A Web-Based Interaction Design Tool: Pattern Language Toolkit. UIC/ATC 2012: 991-995 - Jun-Horng Chen, Teng-Hui Tseng, Chin-Lun Lai, Sheng-Ta Hsieh:
An Intelligent Virtual Fence Security System for the Detection of People Invading. UIC/ATC 2012: 786-791 - Yi-Ting Chiang, Jane Yung-jen Hsu:
Knowledge Transfer in Activity Recognition Using Sensor Profile. UIC/ATC 2012: 180-187 - Eun-Sun Cho, Sumi Helal:
Toward Efficient Detection of Semantic Exceptions in Context-Aware Systems. UIC/ATC 2012: 826-831 - Hung-Chi Chu, Wei-Tai Wu, Fang-Lin Chao, Liza Lee:
Design and Implementation of an Assisted Body Movement System for Visually Impaired Children. UIC/ATC 2012: 725-728 - Hugo Cruz-Sanchez, Lionel Havet, Moutie Chehaider, Yeqiong Song:
MPIGate: A Solution to Use Heterogeneous Networks for Assisted Living Applications. UIC/ATC 2012: 104-111 - Tadashi Dohi, Hiroyuki Okamura, Kishor S. Trivedi:
Optimizing Software Rejuvenation Policies under Interval Reliability Criteria. UIC/ATC 2012: 478-485 - Rei Endo, Kazuyuki Takayama, Yoshiki Sakata, Hiroshi Shigeno:
Neighbor Selection Method Based on Sending Capacity for P2P Live Streaming with Layer Coding. UIC/ATC 2012: 264-271 - Chih-Tien Fan, Yue-Shan Chang, Wei-Jen Wang, Shyan-Ming Yuan:
Execution Time Prediction Using Rough Set Theory in Hybrid Cloud. UIC/ATC 2012: 729-734 - Yao-Chung Fan, Xingjie Liu, Wang-Chien Lee, Arbee L. P. Chen:
Efficient Time Series Disaggregation for Non-intrusive Appliance Load Monitoring. UIC/ATC 2012: 248-255
skipping 125 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-28 07:32 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint