Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 111 matches
- 2015
- Waleed Alfehaid, Asad I. Khan, Bala Srinivasan, Salem Alkhalaf:
Distributed Pattern Transformation-Invariant Recognition Scheme for Real-Time Sensory Applications. BWCCA 2015: 92-98 - Asma Musabah Alkalbani, Ahmed Mohamed Ghamry, Farookh Khadeer Hussain, Omar Khadeer Hussain:
Blue Pages: Software as a Service Data Set. BWCCA 2015: 269-274 - Admir Barolli, Tetsuya Oda, Keita Matsuo, Makoto Ikeda, Leonard Barolli, Makoto Takizawa:
Experimental Results of a Raspberry Pi Based WMN Testbed for Different OSs in Indoor Environment Considering LoS Scenario. BWCCA 2015: 207-212 - Christos Bouras, Georgios Diles:
Resource Management in 5G Femtocell Networks. BWCCA 2015: 353-358 - Christos Bouras, Georgios Diles, Vasileios Kokkinos, Andreas Papazois:
Optimizing Hybrid Access Femtocell Clusters in 5G Networks. BWCCA 2015: 220-226 - Savvas Charalambides, Michael Georgiades, Georgios Dimosthenous, Dora Christofi:
Investigating an ISP's Core Network in 2014. BWCCA 2015: 347-352 - Hsing-Chung Chen:
A Hierarchical Virtual Role Assignment for Negotiation-Based RBAC Scheme. BWCCA 2015: 538-543 - Tongtong Chen, Chanjuan Liu, Xinmiao Ding, Hailin Zou, Qian Shen, Ying Liu:
A Multi-instance Multi-label Learning Algorithm Based on Feature Selection. BWCCA 2015: 587-590 - Peixin Chen, Xiaofeng Wang, Baokang Zhao, Hao Sun, Jinshu Su, Ilsun You:
An Escrow-Free Hierarchical Identity-Based Signature Scheme from Composite Order Bilinear Groups. BWCCA 2015: 364-369 - Zhenhua Chen, Xiang-Wei Zheng, Xi-bin Chen:
A Virtual Network Reconfiguration Algorithm Oriented to Energy Consumption. BWCCA 2015: 605-609 - Junho Choi, Chang Choi, Htet Myet Lynn, Pankoo Kim:
Ontology Based APT Attack Behavior Analysis in Cloud Computing. BWCCA 2015: 375-379 - Baojiang Cui, Mengchen Cao, Shilei Chen, Weikong Qi:
A New Program Classification Method Based on Binary Instrumentation and Instruction Flow Feature Extraction. BWCCA 2015: 64-68 - Baojiang Cui, Shengbo Feng, Qinshu Xiao, Ming Li:
Detection of LTE Protocol Based on Format Fuzz. BWCCA 2015: 187-192 - Baojiang Cui, Yunze Ni, Yilun Fu:
ADDFuzzer: A New Fuzzing Framework of Android Device Drivers. BWCCA 2015: 88-91 - Yunqi Dou, Jiang Weng, Chuangui Ma, Fushan Wei:
Fast Scalar Multiplication Algorithm Using Constrained Triple-Base Number System and Its Applications. BWCCA 2015: 426-431 - Dilawaer Duolikun, Hiroki Kataoka, Shigenari Nakamura, Tomoya Enokido, Makoto Takizawa:
Energy-Aware Migration and Replication of Processes in a Cluster. BWCCA 2015: 283-287 - Mimoza Durresi, Arjan Durresi:
Security Based Cyber-Physical Architecture for Environment Protection. BWCCA 2015: 43-50 - Donald Elmazi, Takaaki Inaba, Shinji Sakamoto, Tetsuya Oda, Makoto Ikeda, Leonard Barolli:
Selection of Secure Actors in Wireless Sensor and Actor Networks Using Fuzzy Logic. BWCCA 2015: 125-131 - Tomoya Enokido, Makoto Takizawa:
Power Consumption Model of a Server to Perform Communication Type Application Processes on Virtual Machines. BWCCA 2015: 275-282 - Lan Gao:
Research on the Application of an Improved Shortest Path Algorithmin Public Transport System. BWCCA 2015: 580-582 - Tomasz Hachaj, Marek R. Ogiela, Katarzyna Koptyra:
Human Actions Modelling and Recognition in Low-Dimensional Feature Space. BWCCA 2015: 247-254 - Taimur Hafeez, Nadeem Javaid, Usman Shakeel, Muhammad, Sheraz Hussain, Hammad Maqsood:
An Energy Efficient Adaptive Cooperative Routing Protocol for Underwater WSNs. BWCCA 2015: 304-310 - Lifang Han, Tingting Hou, Songling Shan, Yikang Li, Baojiang Cui:
The Research of Aspect-Oriented Dynamic Analysis Based on Static Analysis. BWCCA 2015: 114-119 - Toshiyuki Haramaki, Hiroaki Nishino:
A Device Identification Method for AR-based Network Topology Visualization. BWCCA 2015: 255-262 - Tokumasa Hiraoka, Junichi Funasaka:
A Progressive Download Method Using Multiple TCP Flows on Multiple Paths. BWCCA 2015: 318-324 - Baofang Hu:
A Cultural Algorithm Based on Artificial Bee Colony Optimization for Community Detection in Signed Social Networks. BWCCA 2015: 404-409 - Dan Hu, Xingshe Zhou, Xiaohao Yu, Zhiqiang Hou:
Study on Deep Learning and Its Application in Visual Tracking. BWCCA 2015: 240-246 - Tao Huang, Xiaodong Yan:
Research on Construction of Tibetan Sentiment Corpus. BWCCA 2015: 591-593 - Sheraz Hussain, Nadeem Javaid, Syed Zarar, Muhammad Zain-ul-Abidin, Mudassir Ejaz, Taimur Hafeez:
Improved Adaptive Cooperative Routing in Underwater Wireless Sensor Networks. BWCCA 2015: 99-106 - Makoto Ikeda, Keisuke Ebisu, Yuki Sakai, Donald Elmazi, Leonard Barolli, Elis Kulla:
Performance Evaluation of a Fuzzy-Based Wireless Sensor and Actuator Network Testbed for Object Tracking. BWCCA 2015: 442-447
skipping 81 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-25 18:36 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint