


Остановите войну!
for scientists:
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 50 matches
- 2021
- Jirí Pokorný, Pavel Seda, Jan Dvorak, Lukas Malina, Zdenek Martinasek:
The Security Testbed for the Purposes of the ITS-G5 Communication Attacks Prevention. ICUMT 2021: 167-173 - Nourhan Elmeseiry, Abdullah I. Salama, Nancy Alshaer, Tawfik Ismail:
Design and Analysis of A Reliable Quadcopter UAV for Wireless Communication Purposes. NILES 2021: 193-198 - 2020
- Marcos Hervás
, Pau Bergada
, Rosa Maria Alsina Pages
:
Ionospheric Narrowband and Wideband HF Soundings for Communications Purposes: A Review. Sensors 20(9): 2486 (2020) - Motoharu Takahashi, Masaki Narita, Toshimitsu Inomata, Eiji Sugino:
Examination of Defense Method for Tor User Specific Purpose Attacks by Dummy User Attached Communication. AINA Workshops 2020: 745-755 - Augusto C. Ferreira, Natassya B. F. Silva:
Comparison of secure communication with AES between embedded system and general purpose computer. ISCC 2020: 1-6 - 2019
- Olena Kovtun, Nataliia Khaidari, Tetiana Harmash, Nataliia Melnyk, Sergiy Gnatyuk:
Communication in Civil Aviation: Linguistic Analysis for Educational Purposes. CMiGIN 2019: 483-495 - Philip Dost
, Daniel Breuer, Philip Krajinski, Constantinos Sourkounis:
Multi-Purpose Communication Protocol for Wired and Wireless Sensor Networks with Actuators. ICIT 2019: 1371-1376 - Tore Leikanger, Juha Häkkinen:
Direct Digital Synthesis and Current Mirror Based Software Defined General Purpose Visible Light Communication Transmitter. ISCAS 2019: 1-4 - 2018
- Takuya Fujihashi
, Toshiaki Koike-Akino
, Takashi Watanabe
, Philip V. Orlik:
Nonlinear Equalization with Deep Learning for Multi-Purpose Visual MIMO Communications. ICC 2018: 1-6 - Giuseppe Albanese, Davide Calvaresi
, Paolo Sernani
, Fabien Dubosson, Aldo Franco Dragoni
, Michael Schumacher:
MAXIM-GPRT: A Simulator of Local Schedulers, Negotiations, and Communication for Multi-Agent Systems in General-Purpose and Real-Time Scenarios. PAAMS 2018: 291-295 - Andrey Garnaev, Wade Trappe, Athina P. Petropulu:
Optimal Design of a Dual-Purpose Communication-Radar System in the Presence of a Jammer. SPAWC 2018: 1-5 - Aaron Goodman:
Learning Implicit Communication Strategies for the Purpose of Illicit Collusion. CoRR abs/1802.06036 (2018) - 2016
- Adriana Marroni Zaniol Palombo Rossini:
The Application of Digital Information and Communication Technologies in an English for Specific Purposes Course for the Legal Area (Uso de Tecnologias Digitais da Informação e Comunicação em um Curso de Inglês para Fins Específicos na Área Jurídica). Pontifícia Universidade Católica de São Paulo, Brazil, 2016 - Shinya Yano, Kazunori Ueda:
Improvement of WMNs routing method for the purpose of reduction of control communications. APNOMS 2016: 1-4 - Ilya Lebedev
, Viktoria M. Korzhuk, Irina E. Krivtsova, Kseniya I. Salakhutdinova, Mikhail E. Sukhoparov
, Daniil Tikhonov:
Using preventive measures for the purpose of assuring information security of wireless communication channels. FRUCT 2016: 167-173 - 2015
- Mohit Agarwal, Raghupathy Sivakumar:
THINK: Toward Practical General-Purpose Brain-Computer Communication. HotWireless@MobiCom 2015: 41-45 - 2014
- Emmanuel Manalo
, Yuri Uesaka:
Students' Spontaneous Use of Diagrams in Written Communication: Understanding Variations According to Purpose and Cognitive Cost Entailed. Diagrams 2014: 78-92 - Gonçalo S. Martins, David Portugal, Rui P. Rocha:
A Comparison of General-Purpose FOSS Compression Techniques for Efficient Communication in Cooperative Multi-Robot Tasks. ICINCO (2) 2014: 136-147 - Gonçalo S. Martins, David Portugal
, Rui P. Rocha
:
On the Usage of General-Purpose Compression Techniques for the Optimization of Inter-robot Communication. ICINCO (Selected Papers) 2014: 223-240 - 2013
- John Vaughn:
The future of scholarly communication: US efforts to bring warring factions to common purpose in support of scholarship. Inf. Serv. Use 33(1): 27-36 (2013) - 2012
- Anatoli Vrocharidou, Ilias Efthymiou:
Computer mediated communication for social and academic purposes: Profiles of use and University students' gratifications. Comput. Educ. 58(1): 609-616 (2012) - Michael C. Bromby:
Response to the consultation by the Judicial Office for England and Wales on the Use of Live, Text-Based Forms of Communications from Court for the Purposes of Fair and Accurate Reporting. Eur. J. Law Technol. 3(1) (2012) - Mimoza Durresi, Illiana Shukallari, Arjan Durresi:
Ad Hoc Wireless Communications for Marketing Purposes. CISIS 2012: 298-305 - Luca Carafoli, Federica Mandreoli
, Riccardo Martoglia
, Wilma Penzo:
Evaluation of data reduction techniques for vehicle to infrastructure communication saving purposes. IDEAS 2012: 61-70 - 2011
- Chris Norval, John L. Arnott, Nick A. Hine, Vicki L. Hanson:
Purposeful social media as support platform: Communication frameworks for older adults requiring care. PervasiveHealth 2011: 492-494 - 2010
- Mark Allman:
On building special-purpose social networks for emergency communication. Comput. Commun. Rev. 40(5): 27-34 (2010) - Hanane Fathi, SeongHan Shin
, Kazukuni Kobara
, Hideki Imai:
Purpose-restricted Anonymous Mobile Communications Using Anonymous Signatures in Online Credential Systems. Wirel. Pers. Commun. 54(1): 225-236 (2010) - 2009
- Nabil Hamza, Lazhar Khriji, Farid Touati:
Multi-purpose HealthCare monitoring System based on ISM band communication link support. ICTA 2009: 325-336 - 2008
- Hanane Fathi, SeongHan Shin
, Kazukuni Kobara
, Hideki Imai:
Protocols for purpose-restricted anonymous communications in IP-based wireless networks. Comput. Commun. 31(15): 3662-3671 (2008) - Christian Micheloni
, Marco Lestuzzi, Gian Luca Foresti:
Adaptive video communication for an intelligent distributed system: Tuning sensors parameters for surveillance purposes. Mach. Vis. Appl. 19(5-6): 359-373 (2008)
skipping 20 more matches
loading more results
failed to load more results, please try again later

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
retrieved on 2022-06-26 01:14 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint