Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 72 matches
- 2007
- Wael Hosny Fouad Aly, Hanan Lutfiyya:
Developing Autonomic Feedback Control for Heterogeneous Systems Using Cascaded Controllers. ISADS 2007: 484-491 - Elisa Bertino, Lorenzo Martino:
A Service-oriented Approach to Security - Concepts and Issues. ISADS 2007: 7-16 - Andrea Bondavalli, Andrea Ceccarelli, Lorenzo Falai, Michele Vadursi:
Towards Making NekoStat a Proper Measurement Tool for the Validation of Distributed Systems. ISADS 2007: 377-386 - Nikolaos Chatzis:
Mass MailingWorm Detection by Means of Situation Aware DNS. ISADS 2007: 279-286 - Matthias Dyer, Jan Beutel, Lothar Thiele:
S-XTC: A Signal-Strength Based Topology Control Algorithm for Sensor Networks. ISADS 2007: 508-518 - Onyeka Ezenwoye, Seyed Masoud Sadjadi:
RobustBPEL2: Transparent Autonomization in Business Processes through Dynamic Proxies. ISADS 2007: 17-24 - Weiwei Fang, Yi Liu, Jin Wu, Depei Qian:
An On-demand Address Allocation Scheme for Query based Sensor Networks. ISADS 2007: 173-179 - Tibor Farkas, Daniel Grund:
Rule Checking within the Model-Based Development of Safety-Critical Systems and Embedded Automotive Software. ISADS 2007: 287-294 - Stefan Foell, Philippe Boessling, David Linner, Ilja Radusch, Stephan Steglich:
Self-Organizing Pervasive Online Communities. ISADS 2007: 403-410 - Oliver Friedrich, Adel Al-Hezmi, Stefan Arbanowski, Thomas Magedanz:
Next Generation IPTV services for an extended IMS architecture. ISADS 2007: 429-436 - Yamato Fukuta, Gen Kogure, Takashi Kunifuji, Hiroyuki Sugahara, Reiji Ishima, Masayuki Matsumoto:
Novel Railway Signal Control System Based on the Internet Technology and Its Distributed Control Architecture. ISADS 2007: 77-82 - Junichi Funasaka, Yusuke Takemoto, Kenji Ishida:
Parallel Downloading Method using HTTP over UDP for High Loss Rate and Delay Networks. ISADS 2007: 555-561 - Matthias Gerlach:
Trust for Vehicular Applications. ISADS 2007: 295-304 - Kotaro Hama, Yuji Horikoshi, Hiroyuki Endo, Benjamin P. Kloester, Xiaodong Lu:
Autonomous Community Integration and Division Technology for High Response Service. ISADS 2007: 437-444 - Christian Hein, Tom Ritter:
Global Constraint Checking at Run-Time. ISADS 2007: 59-68 - Shinji Inoue, Noriyuki Masuda, Yoshiaki Kakuda:
An Autonomous Method for Aggregating and Repairing Paths in Sensor Networks. ISADS 2007: 526-533 - Daniel Jiang, Miro Bogdanovic, Luca Delgrossi:
Piggybacked Acknowledgement for Reception Assessment in a Pervasive Broadcasting System. ISADS 2007: 387-393 - Isao Kaji:
Distribution Algorithm for Newly Allocated Update Allowance (AV) in the Autonomous Decentralized Database System(ADDS). ISADS 2007: 215-220 - Sana Khalique, Sana Farooq, Hafiz Farooq Ahmad, Hiroki Suguri, Arshad Ali:
SAGE-LITE: An Architecture and Implementation of Light Weight Multiagent System. ISADS 2007: 239-244 - Muhammad Umer Khan, Muhammad Qaisar Choudhary, Hafiz Farooq Ahmad, Liaqut Ali, Arshad Ali, Hiroki Suguri:
Merging CBR and Neural Networks for SLA-Based Radio Resource Management for QoS Sensitive Cellular Networks. ISADS 2007: 263-269 - K. H. K. Kim:
General chair's message. ISADS 2007 - K. H. (Kane) Kim, Keizo Fujiwara, Moon-Cheol Kim, Liangchen Zheng, Kenichi Watanabe, Makoto Takizawa:
A TTF-Based Programming Model and a Support Kernel Running on a Communicating Sensor Platform. ISADS 2007: 368-376 - Dongkyun Kim, Hong-Jong Jeong, Sutaek Oh, Juan-Carlos Cano:
Improving the Accuracy of Passive Duplicate Address Detection Algorithms over MANET On-demand Routing Protocols. ISADS 2007: 534-542 - Sang-Sik Kim, Aesoon Park:
Mobility Support for Users in Wireless Sensor Networks. ISADS 2007: 123-128 - Tariq M. King, Djuradj Babich, Jonatan Alava, Peter J. Clarke, Ronald Stevens:
Towards Self-Testing in Autonomic Computing Systems. ISADS 2007: 51-58 - John S. Kinnebrew, Ankit Gupta, Nishanth Shankaran, Gautam Biswas, Douglas C. Schmidt:
A Decision-Theoretic Planner with Dynamic Component Reconfiguration for Distributed Real-Time Applications. ISADS 2007: 461-472 - Jui-Chi Liang, Jyh-Cheng Chen, Tao Zhang:
Mobile Service Discovery Protocol (MSDP) for Mobile Ad-Hoc Networks. ISADS 2007: 352-362 - Qianhui Liang, Zhaohui Wu:
Context-based Service Discovery for Enhanced Learning Objects in P2P Networks. ISADS 2007: 325-334 - Yao-Nan Lien, Hong-Qi Xu:
A UDP Based Protocol for Distributed P2P File Sharing. ISADS 2007: 318-324 - David Linner, Ilja Radusch, Stephan Steglich, Carsten Jacob:
The Semantic Data Space for Loosely Coupled Service Provisioning. ISADS 2007: 97-104
skipping 42 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-25 17:33 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint