Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 84 matches
- 2010
- Wei Li, Zhiwei Feng, Jing Zhou, Kehe Wu, Jing Teng:
Dynamic Increasing the Capacity of Transmission Line Based on the Kylin Operating System. SUComS 2010: 10-16 - Yoshihiro Akiyama:
How Process Helps You in Developing a High Quality Medical Information System. SUComS 2010: 554-559 - Samuel Assegie, Paul Salama, Brian King:
An Attack on Wavelet Tree Shuffling Encryption Schemes. SUComS 2010: 139-148 - Maricel O. Balitanas, Tai-Hoon Kim:
Data Hiding a Key Management for Interoperable Urban Services. SUComS 2010: 159-166 - Samit Biswas, Debnath Bhattacharyya, Tai-Hoon Kim, Samir Kumar Bandyopadhyay:
Extraction of Features from Signature Image and Signature Verification Using Clustering Techniques. SUComS 2010: 493-503 - Tae Young Byun:
ICSW2AN : An Inter-vehicle Communication System Using Mobile Access Point over Wireless Wide Area Networks. SUComS 2010: 355-366 - Giovanni Cagalaban, Seoksoo Kim:
Projective Illumination Technique in Unprepared Environments for Augmented Reality Applications. SUComS 2010: 17-23 - InSook Cho, Jeong Ah Kim, Ji-Hyeun Kim, Kyu Seob Ha, Yoon Kim:
Accuracy and Performance Evaluation of a Laboratory Results Alerting. SUComS 2010: 532-540 - Jae Hyoung Cho, Jae-Oh Lee:
Architecture of the SDP in the Cloud Environment. SUComS 2010: 454-459 - Yongyun Cho, Hyun Yoe:
An u-Service Model Based on a Smart Phone for Urban Computing Environments. SUComS 2010: 600-605 - HyunSook Choi, Jeong Ah Kim, InSook Cho:
Architecture and Workflow of Medical Knowledge Repository. SUComS 2010: 567-573 - Marco Antonio Cruz-Chávez, Abelardo Rodríguez-León, Érika Yesenia Ávila-Melgar, Fredy Juárez Pérez, Martín Heriberto Cruz-Rosales, Rafael Rivera-López:
Genetic-Annealing Algorithm in Grid Environment for Scheduling Problems. SUComS 2010: 1-9 - Debashis Ganguly, Srabonti Chakraborty, Maricel O. Balitanas, Tai-Hoon Kim:
Medical Imaging: A Review. SUComS 2010: 504-516 - Joon-Min Gil, Chan-Myung Kim, Youn-Hee Han:
Two Scheduling Schemes for Extending the Lifetime of Directional Sensor Networks. SUComS 2010: 411-420 - Jeong-Hwan Hwang, Jiwoong Lee, Ho-chul Lee, Hyun Yoe:
Implementation of Wireless Sensor Networks Based Pig Farm Integrated Management System in Ubiquitous Agricultural Environments. SUComS 2010: 581-590 - Ploypailin Intapong, Sittapong Settapat, Boonserm Kaewkamnerdpong, Tiranee Achalakul:
The Design of Modular Web-Based Collaboration. SUComS 2010: 24-33 - Azeem Irshad, Wajahat Noshairwan, Muhammad Shafiq, Shahzada Khurram, Ehtsham Irshad, Muhammad Usman:
Security Enhancement for Authentication of Nodes in MANET by Checking the CRL Status of Servers. SUComS 2010: 86-95 - Ehtsham Irshad, Wajahat Noshairwan, Muhammad Shafiq, Shahzada Khurram, Azeem Irshad, Muhammad Usman:
Performance Evaluation Analysis of Group Mobility in Mobile Ad Hoc Networks. SUComS 2010: 96-103 - Bong-Ki Jang, Young-Soon Lee, Byung-sam Kim, Ui-jung Kim:
A Study on S-band Short-range Surveillance Radar Optimum Deployment Considering Frequency Interference. SUComS 2010: 434-439 - JongGil Ju, InGon Park, Yong-Woong Lee, Jong-Sik Cho, HyunWook Cho, Hyun Yoe, Chang-Sun Shin:
An Implementation of the Salt-Farm Monitoring System Using Wireless Sensor Network. SUComS 2010: 647-655 - Sungmo Jung, Seoksoo Kim:
A Study on AR 3D Objects Shading Method Using Electronic Compass Sensor. SUComS 2010: 72-76 - Kwang-Ryul Jung, Aesoon Park, Sungwon Lee:
Machine-Type-Communication (MTC) Device Grouping Algorithm for Congestion Avoidance of MTC Oriented LTE Network. SUComS 2010: 167-178 - Hye Jin Kam, Man Young Park, Woojae Kim, Dukyong Yoon, Eun Kyoung Ahn, Rae Woong Park:
Knowledge Integration and Use-Case Analysis for a Customized Drug-Drug Interaction CDS Service. SUComS 2010: 46-51 - Mikyung Kang, Dong-In Kang, Mira Yun, Gyung-Leen Park, Junghoon Lee:
Design for Run-Time Monitor on Cloud Computing. SUComS 2010: 279-287 - Mohammad Àfif B. Kasno, Jihoon Ahn, Kyungkwon Jung, Yong-Gu Lee, Kihwan Eom:
Real-Time Hand Gesture SEMG Using Spectral Estimation and LVQ for Two-Wheel Control. SUComS 2010: 335-344 - Retraction Note to: Access Requirement Analysis of E-Governance Systems. SUComS 2010: 1
- Seoksoo Kim:
Web-Based Media Contents Editor for UCC Websites. SUComS 2010: 65-71 - Tai-Hoon Kim:
Procedure of Partitioning Data Into Number of Data Sets or Data Group - A Review. SUComS 2010: 104-115 - Tai-Hoon Kim:
Processing of Handwritten Signature Image for Authentication. SUComS 2010: 116-123 - Chayoung Kim, Jinho Ahn:
Scalable Multicast Protocols for Overlapped Groups in Broker-Based Sensor Networks. SUComS 2010: 196-205
skipping 54 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-24 00:39 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint