Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 60 matches
- 2024
- Tao Feng, Taining Chen, Xiang Gong:
Formal Security Analysis of ISA100.11a Standard Protocol Based on Colored Petri Net Tool. Inf. 15(2): 118 (2024) - 2023
- Rohin Rakheja, Sonam Khera, Neelam Turk, Sangeeta Kamboj:
Parametric analysis of dynamic routing protocol for wireless sensor networks. Multim. Tools Appl. 82(25): 39035-39055 (2023) - Neelam Sharma, B. M. Singh, Karan Singh:
Analysis of packet transmission protocols for multimedia applications of WBANs in cognitive behavioral therapy. Multim. Tools Appl. 82(25): 39765-39781 (2023) - Yiwen Wang, Nannan Li, Biao Li:
A New Bio-Inspired Tool for Visual Design: A Cognitive Protocol Analysis. DSIE 2023: 934-939 - Murat Moran, Pascal Lafourcade, Maxime Puys, David Williams:
An Introduction to Tools for Formal Analysis of Cryptographic Protocols. Handb. Formal Anal. Verification Cryptogr. 2023: 105-152 - Bethany Davies, Thomas Beauchamp, Gayane Vardoyan, Stephanie Wehner:
Tools for the analysis of quantum protocols requiring state generation within a time window. CoRR abs/2304.12673 (2023) - 2022
- Ryosuke Miyawaki, Monica Perusquía-Hernández, Naoya Isoyama, Hideaki Uchiyama, Kiyoshi Kiyokawa:
A Data Collection Protocol, Tool and Analysis for the Mapping of Speech Volume to Avatar Facial Animation. ICAT-EGVE 2022: 27-34 - Caio Raduy, Denise Maria Vecino Sato, Eduardo A. Franciscon, Edson Emílio Scalabrin:
A Benchmark of Process Drift Detection Tools: Experimental Protocol and Statistical Analysis. ICAISC (2) 2022: 141-151 - 2021
- Namit Gupta, Arpit Jain, Kunwar Singh Vaisla, Adesh Kumar, Rajeev Kumar:
Performance analysis of DSDV and OLSR wireless sensor network routing protocols using FPGA hardware and machine learning. Multim. Tools Appl. 80(14): 22301-22319 (2021) - Abigail Siegel, Mia Santomauro, Tristan Dyer, Tim Nelson, Shriram Krishnamurthi:
Prototyping Formal Methods Tools: A Protocol Analysis Case Study. Protocols, Strands, and Logic 2021: 394-413 - Federico Maggi, Andrea Guglielmini:
RFQuack: A Universal Hardware-Software Toolkit for Wireless Protocol (Security) Analysis and Research. CoRR abs/2104.02551 (2021) - 2020
- Luyi Tian:
New protocols and computational tools for scRNAseq analysis. University of Melbourne, Parkville, Victoria, Australia, 2020 - Xu Lu, Hongwei Ding, Zhijun Yang, Liyong Bao, Liqing Wang, Qianlin Liu:
Implementation and performance analysis of random multiple access protocol with variable collision length of multimedia video information. Multim. Tools Appl. 79(23-24): 16547-16571 (2020) - 2019
- Stephan Kleber, Lisa Maile, Frank Kargl:
Survey of Protocol Reverse Engineering Algorithms: Decomposition of Tools for Static Traffic Analysis. IEEE Commun. Surv. Tutorials 21(1): 526-561 (2019) - Chunyan Fu, Kougen Zheng:
Formal modeling and analysis of ad hoc Zone Routing Protocol in Event-B. Int. J. Softw. Tools Technol. Transf. 21(2): 165-181 (2019) - Federico Sinigaglia, Roberto Carbone, Gabriele Costa, Silvio Ranise:
MuFASA: A Tool for High-level Specification and Analysis of Multi-factor Authentication Protocols. ETAA@ESORICS 2019: 138-155 - 2018
- Md Mushfiqur Rahman, Yu Lei, Georgios Kalantzis:
QALMA: A computational toolkit for the analysis of quality protocols for medical linear accelerators in radiation therapy. SoftwareX 7: 101-106 (2018) - Michael Blondin, Javier Esparza, Stefan Jaax:
Peregrine: A Tool for the Analysis of Population Protocols. CAV (1) 2018: 604-611 - 2017
- Juan Pedro Dominguez-Morales, Angel Jiménez-Fernandez, Saturnino Vicente Diaz, Alejandro Linares-Barranco, Asuncion Olmo-Sevilla, Antonio Fernandez-Enriquez:
A Protocol Generator Tool for Automatic In-Vitro HPV Robotic Analysis. ROBOT (2) 2017: 580-591 - 2016
- Manish Sud, Eoin Fahy, Dawn Cotter, Kenan Azam, Ilango Vadivelu, Charles F. Burant, Arthur Edison, Oliver Fiehn, Richard M. Higashi, K. Sreekumaran Nair, Susan Sumner, Shankar Subramaniam:
Metabolomics Workbench: An international repository for metabolomics data and metadata, metabolite standards, protocols, tutorials and training, and analysis tools. Nucleic Acids Res. 44(Database-Issue): 463-470 (2016) - Morgan Abily, Nathalie Bertrand, Olivier Delestre, Philippe Gourbesville, Y. Richet, Claire-Marie Duluc:
Global sensitivity analysis with 2d hydraulic codes: applied protocol and practical tool. CoRR abs/1603.07919 (2016) - 2015
- Ahyoung Lee, Ilkyeun Ra:
Performance analysis of ad hoc routing protocols based on selective forwarding node algorithms. Multim. Tools Appl. 74(16): 6443-6452 (2015) - Wei Si, Morteza Hashemi, Liangxiao Xin, David Starobinski, Ari Trachtenberg:
TeaCP: A Toolkit for Evaluation and Analysis of Collection Protocols in Wireless Sensor Networks. IEEE Trans. Netw. Serv. Manag. 12(2): 293-307 (2015) - Yong-Suk Park, Se-Ho Park, Kyung-Taek Lee, Myung-Hyun Yoon:
DLNA protocol analysis tool for smart device interoperability test. ICOIN 2015: 464-465 - 2014
- Vincent Génot, Nicolas André, Baptiste Cecconi, M. Bouchemit, E. Budnik, N. Bourrel, Michel Gangloff, N. Dufourg, Sebastien Hess, Ronan Modolo, Benjamin Renard, Nicolas Lormant, L. Beigbeder, D. Popescu, J.-P. Toniutti:
Joining the yellow hub: Uses of the Simple Application Messaging Protocol in Space Physics analysis tools. Astron. Comput. 7-8: 62-70 (2014) - Se-Ho Park, Yong-Suk Park, Jeong-Wook Seo, Jun Rim Choi:
DLNA Protocol Inspection Tool for Compatibility Analysis. KSII Trans. Internet Inf. Syst. 8(6): 2104-2117 (2014) - Camilo Rocha, José Meseguer:
Mechanical Analysis of Reliable Communication in the Alternating Bit Protocol Using the Maude Invariant Analyzer Tool. Specification, Algebra, and Software 2014: 603-629 - Ming-Hung Wang, Chia-Ming Yu, Chia-Liang Lin, Chien-Chao Tseng, Li-Hsing Yen:
KPAT: A kernel and protocol analysis tool for embedded networking devices. ICC 2014: 1160-1165 - 2013
- Tapio Levä, Henna Suomi:
Techno-economic feasibility analysis of Internet protocols: Framework and tools. Comput. Stand. Interfaces 36(1): 76-88 (2013) - 2012
- Sepideh Asadi, Hadi Shahriar Shahhoseini:
Formal security analysis of authentication in SNMPv3 protocol by an automated tool. IST 2012: 1060-1064
skipping 30 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-09 17:19 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint