Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 145 matches
- 2013
- Abdelaziz Amara Korba, Mehdi Nafa, Salim Ghanemi:
Survey of Routing Attacks and Countermeasures in Mobile Ad Hoc Networks. UKSim 2013: 693-698 - Syed Saif Abrar, Rajesh K. Arumugam:
Simulation Model of IBM-Watson Intelligent System for Early Software Development. UKSim 2013: 325-329 - Belal Abuhaija, Raed Mesleh, Mohammed Alwakeel:
Analysis of LTE Multiuser Flat Downlink Power Spectrum with Multi-antenna System Simulation. UKSim 2013: 755-761 - Musse Ahmed, Soo Lian:
Novel Automated Fault Isolation System on Low Voltage Distribution System. UKSim 2013: 593-599 - AbdulRahman I. Al-Rawi, Jonathan M. Blackledge:
Image Authentication Using Stochastic Diffusion. UKSim 2013: 437-442 - Mahmoud Osama Al-Wadie, Hatem Yassin Diab, Hadi Maged El Helw:
Simulation of Islanding Detection Scheme Based on Fast Angle Estimation Method for Grid Connected Photovoltaic Systems Using ADALINE Technique. UKSim 2013: 548-553 - Ahmed M. AlAdwani, Amjad Gawanmeh, Sebastien Nicolas:
Traffic Shaping and Delay Optimization in Demand Side Management. UKSim 2013: 722-727 - Marwan Alakhras, Mousa I. Hussein, Mourad Oussalah:
Multivariable Fuzzy Inference with Multi Nearest Neighbour for Indoor WLAN Localization Based on RSS Fingerprint. UKSim 2013: 656-662 - Abdullah A. Alrabghi, Ashutosh Tiwari:
A Review of Simulation-Based Optimisation in Maintenance Operations. UKSim 2013: 353-358 - Mazin Alshamrani, Haitham S. Cruickshank, Zhili Sun, Basil Elmasri, Vahid Fami:
Evaluation of SIP Signalling and QoS for VoIP over OLSR MANET Routing Protocol. UKSim 2013: 699-706 - Alessandro Amato, Valentina Colla, Giacomo Filippo Porzio, Nicola Matarese, Lisa Chiappelli:
A CO2-Management Tool for Integrated Steelworks. UKSim 2013: 501-506 - Kalashankar Annaiahshetty, Nalli Prasad:
Expert System for Multiple Domain Experts Knowledge Acquisition in Software Design and Development. UKSim 2013: 196-201 - Yeasir Arafat, Shuddha Chowdhury:
Prospect of Renewable Energy in Bangladesh: A Comprehensive Study of Future Scopes. UKSim 2013: 559-562 - Harsh Arora, Yash Rajpurohit:
Enhanced Cycle Simulator for MIPS Architecture - CSMIPSA. UKSim 2013: 365-373 - Farhan Aslam, Adil Nasser, Ehsan Ulhaq, Ahmed Umar:
Intelligent Modeling Scheme for Detection of Line Losses in Power Distribution System. UKSim 2013: 218-223 - Berik Assylbekov, Erick Gaspar, Nasir Uddin, Paul Egan:
Investigating the Correlation between Mutation Score and Coverage Score. UKSim 2013: 347-352 - Elham Babaee, Sepideh Zareei, Rosli Salleh:
Best Path Cluster-Based Routing Protocol for Wireless Sensor Networks. UKSim 2013: 663-667 - Sajjad Baghaee, Sevgi Zubeyde Gurbuz, Elif Uysal-Biyikoglu:
Application and Modeling of a Magnetic WSN for Target Localization. UKSim 2013: 687-692 - Norantanum Abu Bakar, Yufridin Wahab, Yasmani Awang, Safizan Shaari:
Modelling of Critical Slopes of Gait Patterns for the Realization of a Wireless Foot Clearance Measurement. UKSim 2013: 707-711 - Alexandru Baloi, Florin Molnar-Matei:
A Fuzzy Approach for Power Quality Standards. UKSim 2013: 27-32 - Hamid Banirostam, Alireza Hedayati, Ahmad Khadem Zadeh, Elham Shamsinezhad:
A Trust Based Approach for Increasing Security in Cloud Computing Infrastructure. UKSim 2013: 717-721 - Anup Kumar Barman, Jumi Sarmah, Shikhar Kumar Sarma:
POS Tagging of Assamese Language and Performance Analysis of CRF++ and fnTBL Approaches. UKSim 2013: 476-479 - Anup Kumar Barman, Jumi Sarmah, Shikhar Kumar Sarma:
WordNet Based Information Retrieval System for Assamese. UKSim 2013: 480-484 - Rajendra Basavegowda, Sheshadri Seenappa:
Electronic Medical Report Security Using Visual Secret Sharing Scheme. UKSim 2013: 78-83 - Ashkan Bonabi, Dogu Baran Aydogan, Jari A. K. Hyttinen:
Simulation of Microporous Architecture's Effects on Fluid Flow Characteristics in Cell Seeding. UKSim 2013: 84-89 - Erkan Bostanci, Nadia Kanwal, Adrian F. Clark:
Kinect-Derived Augmentation of the Real World for Cultural Heritage. UKSim 2013: 117-122 - Richard J. Cant, Caroline S. Langensiepen, Daniel Rhodes:
Fourier Texture Filtering. UKSim 2013: 123-128 - Giulio Erberto Cantarella, Roberta Di Pace, Silvio Memoli, Stefano de Luca:
The Network Signal Setting Problem: The Coordination Approach vs. the Synchronisation Approach. UKSim 2013: 575-579 - Armando Arpys Arevalo Carreno, David Conchouso, Amir Zaher, Ian G. Foulds, Jürgen Kosel:
Simulation of a Low Frequency Z-Axis SU-8 Accelerometer in CoventorWare and MEMS+. UKSim 2013: 792-797 - Vladimir Ceperic, Georges G. E. Gielen, Adrijan Baric:
Black-Box Modelling of AC-DC Rectifiers for RFID Applications Using Support Vector Regression Machines. UKSim 2013: 815-819
skipping 115 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-09 09:26 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint