Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 2,489 matches
- 2024
- David Samuel Bhatti, Shahzad Saleem, Zulfiqar Ali, Tae-Jin Park, Beomkyu Suh, Ali Kamran, William J. Buchanan, Ki-Il Kim:
Design and Evaluation of Memory Efficient Data Structure Scheme for Energy Drainage Attacks in Wireless Sensor Networks. IEEE Access 12: 41499-41516 (2024) - Lamrot Hailemichael Woldeamanuel, Arun Ramaveerapathiran:
Design of Multivariable PID Control Scheme for Humidity and Temperature Control of Neonatal Incubator. IEEE Access 12: 6051-6062 (2024) - Zhaoxiang Yi, Lin Sun, Meng Jiang:
Data Transmission Analysis and Communication Scheme Design for TianQin Mission. IEEE Access 12: 42585-42593 (2024) - Haifeng Yu, Ziyan Shen, Rui Man:
Study on the System Design Scheme for Wide-Swath Spaceborne SAR Operating in the Frequency-Scanning Mode. IEEE Access 12: 26457-26473 (2024) - Xinyuan Chen, Wen Yi, Hongping Yuan, Weiwei Wu:
Construction and demolition waste disposal charging scheme design. Comput. Aided Civ. Infrastructure Eng. 39(2): 222-241 (2024) - Longfei Wu, John Du:
Designing novel proxy-based access control scheme for implantable medical devices. Comput. Stand. Interfaces 87: 103754 (2024) - Santosh Kumar Suman:
A New Scheme for the Approximation of Linear Dynamical Systems and Its Application to Controller Design. Circuits Syst. Signal Process. 43(2): 766-794 (2024) - Alexander L. Gavrilyuk, Sho Suda:
Uniqueness of an association scheme related to the Witt design on 11 points. Des. Codes Cryptogr. 92(1): 205-209 (2024) - Keyu Wu, Xingchen Hu, Hang Du, Kuihua Huang:
Adaptive wideband sensing scheme based on Bayesian experimental design. Evol. Intell. 17(1): 239-247 (2024) - Jia Zhan, Francis C. M. Lau:
Design of Joint Source-Channel Coding Scheme Based on Spatially-Coupled DP-LDPC Codes. IEEE Commun. Lett. 28(4): 749-753 (2024) - Shaonan Hou, Chengjun Lin, Shaojun Yang:
A Traceable Universal Designated Verifier Transitive Signature Scheme. Inf. 15(1): 43 (2024) - Xincheng Li, Lifeng Zhou, Xinchun Yin, Jianting Ning:
A Security-Enhanced Certificateless Designated Verifier Aggregate Signature Scheme for HWMSNs in the YOSO Model. IEEE Internet Things J. 11(6): 10865-10879 (2024) - Suryakant Prasad, Y. Sreenivasa Rao:
Designing Secure Data Storage and Retrieval Scheme in Cloud-Assisted Internet-of-Drones Environment. IEEE Internet Things J. 11(8): 13734-13751 (2024) - Pratap Anbalagan, Young Hoon Joo:
Fuzzy membership-function-dependent design of aperiodic sample-data control scheme for nonlinear PMSG-based WECS with quantization measurements via refined looped Lyapunov functional. Inf. Sci. 661: 120149 (2024) - Mingjia Tong:
TODIM-PROMETHEE method for tourism landscape planning design scheme evaluation based on the virtual reality technology under spherical fuzzy sets. J. Intell. Fuzzy Syst. 46(3): 6001-6017 (2024) - Bingbing Li, Wenning Lu:
An Energy-Efficient and Obstruction-Free Design Scheme for FSO-based Data Center Network. J. Inf. Sci. Eng. 40(1): 57-69 (2024) - Kyosuke Yamashita, Keisuke Hara:
On the Black-Box impossibility of multi-designated verifiers signature schemes from ring signature schemes. J. Math. Cryptol. 18(1) (2024) - Wenzhe Ding, Xiang Bai, Qingwei Wang, Fang Long, Hailin Li, Zhengrong Wu, Jian Liu, Huisheng Yao, Hong Yang:
A truncated test scheme design method for success-failure in-orbit tests. Reliab. Eng. Syst. Saf. 243: 109782 (2024) - Shyam Saurabh, Kishore Sinha:
Optimal key pre-distribution schemes from affine resolvable and partially affine resolvable designs. Secur. Priv. 7(1) (2024) - Bofan Guan, Zhongping Liu, Dong Wei, Qiangwen Fu:
Design of a Multi-Position Alignment Scheme. Sensors 24(6): 1938 (2024) - Ren-jun Qi, Xuan Zhao:
A Unified Design of Energy Stable Schemes with Variable Steps for Fractional Gradient Flows and Nonlinear Integro-differential Equations. SIAM J. Sci. Comput. 46(1): 130- (2024) - Tizian Wenzel, Francesco Marchetti, Emma Perracchione:
Data-Driven Kernel Designs for Optimized Greedy Schemes: A Machine Learning Perspective. SIAM J. Sci. Comput. 46(1): 101- (2024) - Hao Zheng, Yang Liu, Yinghui Zhang, Junkun Yan, Bo Jiu:
Pulse train coding and decoding matrix design based ECCM scheme for MIMO radar against interrupted sampling repeater jamming. Signal Process. 214: 109245 (2024) - Lijuan Zha, Jinzhao Miao, Jinliang Liu, Xiangpeng Xie, Engang Tian:
Resilient Recursive Filter Design for Complex Networks With Event-Triggering Random Access Scheme and Random Coupling Strengths. IEEE Syst. J. 18(1): 725-736 (2024) - Kirtirajsinh Zala, Hiren Kumar Thakkar, Neel H. Dholakia, Madhu Shukla, Deep Thumar:
Designing an Attribute-Based Encryption Scheme with an Enhanced Anonymity Model for Privacy Protection in E-Health. SN Comput. Sci. 5(1): 203 (2024) - Yang Zhang, Jun Hou, Leibo Wang, Huaijie Liu:
On the Design of Companding-Based Scheme for PAPR Reduction in OFDM Systems. IEEE Trans. Broadcast. 70(1): 347-356 (2024) - Cai Deng, Xiangyu Zou, Qi Chen, Bo Tang, Wen Xia:
The Design of a Lossless Deduplication Scheme to Eliminate Fine-Grained Redundancy for JPEG Image Storage Systems. IEEE Trans. Computers 73(5): 1385-1399 (2024) - Lei Cui, Zhe Zhen, Jianying Yang:
Fixed Time Cooperative Scheme Design for Missiles Salvo Attack. IEEE Trans. Circuits Syst. II Express Briefs 71(2): 672-676 (2024) - Yanrui Zhao, Xiaofan Liu, Yue Hu, Hao Xiao:
Design of an Efficient NTT/INTT Architecture With Low-Complex Memory Mapping Scheme. IEEE Trans. Circuits Syst. II Express Briefs 71(1): 400-404 (2024) - Dongji Li, Shaoyi Xu, Chengyu Zhao, Yuanjie Wang, Rongtao Xu, Bo Ai:
Data Collection in Laser-Powered UAV-Assisted IoT Networks: Phased Scheme Design Based on Improved Clustering Algorithm. IEEE Trans. Green Commun. Netw. 8(1): 482-497 (2024)
skipping 2,459 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-23 09:45 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint