Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 203 matches
- 2005
- Bin Cai, Changsheng Xie, Huaiyang Li:
Building Strongly-Reliable and High-Performance Storage Cluster with Network Attached Storage Disks Using PCs. CIT 2005: 315-321 - ZhiLei Chai, Wenjie Chen, ZhiQiang Tang, Zhang-long Chen, Shi-liang Tu:
Asynchronous Transfer of Control in the RTSJ-compliant Java Processor. CIT 2005: 764-770 - Bao Rong Chang:
Forecasting the Flow of Data Packets in Web Using ANFISCH Predictor Tuned by Segmented Adaptive Support Vector Regression. CIT 2005: 23-27 - Chin-Chen Chang, Jung-San Lee, Chang-Chu Chen:
On the Forward and Backward Secrecy of HLL Group Key Exchange Mechanism. CIT 2005: 702-705 - Sujeong Chang, Jaehyung Park, Yonggwan Won, Mijeong Yang, Min Young Chung:
Performance Comparison of TCP Traffic over Mobile IPv4 and IPv6 Networks and a Mobile Network Deployment Approach. CIT 2005: 469-473 - Wenjie Chen, Liqiang Gao, ZhiLei Chai, Zhang-long Chen, Shi-liang Tu:
An Intelligent Guiding and Controlling System for Transportation Network Based on Wireless Sensor Network Technology. CIT 2005: 810-814 - Qingzhang Chen, Jianghong Han, Wenxiu He, Yungang Lai:
Utilize Fuzzy Data Mining to Find the Travel Pattern of Browsers. CIT 2005: 228-232 - Kuo-Yi Chen, Chi-Chih Huang, Ting-Wei Hou, Tzuo-Chun Lee, Shu-Fen Yang, Po-Wen Cheng:
A Quick XML Parser for Extracting Signatures of Secure Web Services. CIT 2005: 1093-1098 - Taolue Chen, Tingting Han, Jian Lu:
Analysis of A Leader Election Algorithm in uCRL. CIT 2005: 841-847 - Yuan Chen, Lemin Li:
A Fuzzy Fair Packet Dropping Algorithm Supporting Differentiated Services. CIT 2005: 442-446 - Yuan Chen, Lemin Li:
A Random Early Expiration Detection Based Buffer Management Algorithm for Real-time Traffic over Wireless Networks. CIT 2005: 507-511 - Jia-Xin Chen, Sen Liu:
A Medical Image Segmentation Method Based on Watershed Transform. CIT 2005: 634-639 - Qiu Chen, Jun Shen:
A SIP-Enabled Multimedia Service Framework for CERNET2. CIT 2005: 996-1003 - Wenxi Chen, Shigeru Tokinoya, Naotoshi Takeda:
A Mobile Phone-based Wearable Vital Signs Monitoring System. CIT 2005: 950-955 - Yue Chen, Na Wang, Yufeng Li, Julong Lan:
CMSM - A Closed Multi-Source IP Multicast Protocol. CIT 2005: 435-441 - Maogou Chen, Gengfeng Wu, Jie Yuan, Jinsu Ma:
Ontology-Based Actively Discovering Potential Demands of Service Object. CIT 2005: 1004-1008 - Zhicheng Chen, Chen Yu, Lizhu Zhou, Weikang Yang, Mingyi Mao:
A New Securely Running Mechanism and Programming Model Based on WorkerApplet Thread in Elastos. CIT 2005: 793-799 - King Sing Cheung, K. O. Chow:
Elimination of Duplicate Labels in Petri-Net-Based System Specification. CIT 2005: 932-936 - Nopporn Chotikakamthorn, Natapon Pantuwong:
Attacks on Feature-based Affine-invariant Watermarking Methods. CIT 2005: 706-710 - Michael Cohen:
Multipresence Narrowcasting Operations Comprise a Media Meta-Mixer Exponentiating Interface Value. CIT 2005: 535-542 - Tao Du, Shensheng Zhang, Zongjiang Wang:
Structure Learning Based on Ordering of Sets. CIT 2005: 88-92 - Jiangjiao Duan, Wei Wang, Bing Liu, Yongsheng Xue, Haofeng Zhou, Baile Shi:
Incorporating with Recursive Model Training in Time Series Clustering. CIT 2005: 105-109 - Nacer Farajzadeh, Mehdi Hashemzadeh, Morteza Mousakhani, Abolfazl Toroghi Haghighat:
An Efficient Generalized Deadlock Detection and Resolution Algorithm in Distributed Systems. CIT 2005: 303-309 - Rui Feng, Yuejie Zhang, Chunlin Song:
Study on Optimized Bandwidth Selection Approach of Drifting Learning. CIT 2005: 6-10 - Fernando Ferri, Patrizia Grifoni, Maurizio Rafanelli:
The Sketch Recognition and Query Interpretation by GSQL, aGeographical Sketch Query Language. CIT 2005: 34-38 - Peng Fu, Jingtao Li, Deyun Zhang:
Heuristic and Distributed QoS Route Discovery for Mobile Ad hoc Networks. CIT 2005: 512-516 - Zhigang Gao, Zhaohui Wu, Ruizhi Ye, Long Yue:
A Model-Based Development Method for SmartOSEK OS. CIT 2005: 781-787 - Xin Geng, Hanying Hu, Zhengjun Liu:
An Improved Parallel Interference Cancellation Algorithm in DS/CDMA Communication System. CIT 2005: 464-468 - Yonggen Gu, Yuxi Fu, Yang Li, Xiaoju Dong:
A Generic Model for Symbolic Analyzing Security Protocols. CIT 2005: 680-684 - Ruiqiang Guo, Dehua Chen, Jiajin Le:
Matching Semantic Web Services across Heterogeneous Ontologies. CIT 2005: 264-268
skipping 173 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-24 07:10 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint