default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 356 matches
- 2019
- Kuinam J. Kim, Nakhoon Baek:
Information Science and Applications 2018 - ICISA 2018, Hong Kong, China, June 25-27th, 2018. Lecture Notes in Electrical Engineering 514, Springer 2019, ISBN 978-981-13-1055-3 [contents] - 2018
- Matthias Becker, Sinan Balci:
Improving an Evolutionary Approach to Sudoku Puzzles by Intermediate Optimization of the Population. ICISA 2018: 369-375 - Patrick Von Angelo V. Atienza, William Emmanuel S. Yu:
A Framework for Performance Analysis of Various Load Balancing Techniques in a Software-Defined Networking Environment. ICISA 2018: 67-74 - Afizan Azman, Kirbana Jai Raman, Imran Artwel Junior Mhlanga, Siti Zainab Ibrahim, Sumendra Yogarayan, Mohd Fikri Azli Abdullah, Siti Fatimah Abdul Razak, Anang Hudaya Muhamad Amin, Kalaiarasi Sonai Muthu:
Real Time Driver Anger Detection. ICISA 2018: 157-167 - Afizan Azman, Sumendra Yogarayan, Samuel Leong Wei Jian, Siti Fatimah Abdul Razak, Kirbana Jai Raman, Mohd Fikri Azli Abdullah, Siti Zainab Ibrahim, Anang Hudaya Muhamad Amin, Kalaiarasi Sonai Muthu:
A Study of Wireless Communication Technologies for Vehicular Communication. ICISA 2018: 3-13 - Nakhoon Baek:
A Simplified Emulation Scheme for OpenGL SC 2.0 Rendering over OpenGL Embedded Systems 2.0. ICISA 2018: 131-135 - Larsson Bajracharya, Tirta Mulya, Ayi Purbasari, Mintae Hwang:
A Study on Cost-Effective and Eco-friendly Bicycle Sharing System for Developing Countries. ICISA 2018: 523-531 - Zibusiso Bhango, Dustin van der Haar:
Eigennose: Assessing Nose-Based Principal Component Analysis for Achieving Access Control with Occluded Faces. ICISA 2018: 175-183 - Miroslav Bures, Tomás Cerný, Bestoun S. Ahmed:
Internet of Things: Current Challenges in the Quality Assurance and Testing Methods. ICISA 2018: 625-634 - Jihyun Byun, Dustin van der Haar:
Pronunciation Detection for Foreign Language Learning Using MFCC and SVM. ICISA 2018: 327-335 - Timothy Callemein, Kristof Van Beeck, Geert Brône, Toon Goedemé:
Automated Analysis of Eye-Tracker-Based Human-Human Interaction Studies. ICISA 2018: 499-509 - Tomás Cerný, Michael Jeff Donahoo:
Survey on Compromise-Defensive System Design. ICISA 2018: 513-521 - Yongseok Chi:
A Multiple Optical Vision System of Virtual Display. ICISA 2018: 149-155 - Nutthisara Choolikhit, Wararat Songpan, Monlica Wattana, Ngamnij Arch-int:
Edge Detection and Symmetry Method for Cleft Lip and Palate Children Using Image Processing. ICISA 2018: 443-455 - Tao Feng, Xiaoyu Yin, Chunyan Liu:
An Efficient and Anonymous KP-ABE Scheme with Keyword Search. ICISA 2018: 251-258 - Margaux Fourie, Dustin van der Haar:
Ballet Pose Recognition: A Bag-of-Words Support Vector Machine Model for the Dance Training Environment. ICISA 2018: 317-325 - Shuting Guo, Zheng Liu, Wenyan Chen, Tao Li:
Event Extraction from Streaming System Logs. ICISA 2018: 465-474 - Khaled Hamdan, Boumediene Belkhouche, Peter Smith:
A Culture-Based Profile Model of Software Evaluators. ICISA 2018: 559-570 - Lei Hang, Do Hyeun Kim:
Enabling Cross-Domain IoT Interoperability Based on Open Framework. ICISA 2018: 687-691 - Feng-Hsiag Hsiao, Po-Han Lin:
Applying Triple Data Encryption Algorithm to a Chaotic Systems: T-S Fuzzy Model-Based Approach. ICISA 2018: 53-66 - Min-Shiang Hwang, Hung-Wei Yang, Cheng-Ying Yang:
An Improved Hou-Wang's User Authentication Scheme. ICISA 2018: 295-301 - Fauqia Ilyas, Farooque Azam, Wasi Haider Butt, Kinza Zahra:
Inferring Social Relationships Through Network: A Systematic Literature Review. ICISA 2018: 75-87 - Seung-Mo Je, Jun-Ho Huh:
Nash Equilibrium Solution for Communication in Strategic Competition Adopted by Zigbee Network for Micro Grid. ICISA 2018: 595-606 - Jongmun Jeong, Larsson Bajracharya, Mintae Hwang:
Optimal Lightweight Cryptography Algorithm for Environmental Monitoring Service Based on IoT. ICISA 2018: 361-367 - Euihyun Jung:
A Bayesian Network Approach for Discovering Variables Affecting Youth Depression. ICISA 2018: 423-430 - Jin-uk Jung, A. M. Ilham, Mintae Hwang, Kyo-Hong Jin:
Design of the Manufacturing Facility Maintenance Systems Based on Internet of Things. ICISA 2018: 663-673 - Mohd Fadzil Abdul Kadir, Mohamad Afendee Mohamed, R. Mohamad, M. Mamat, Abdullah Muhammed:
Performance Comparison of Some Addition Chain Methods Based on Integer Family. ICISA 2018: 211-218 - SeungAe Kang:
A Study on Development of Application for Management of Obesity in Children with Intellectual Disabilities. ICISA 2018: 109-114 - Sunyoung Kang, Seungae Kang:
Physical Activity Intervention Platform for the Elderly with Mild Cognitive Impairment. ICISA 2018: 123-128 - Hyuncheol Kim:
Extended Flow Detection Scheme Using Simple Processor Trace (PT). ICISA 2018: 89-95
skipping 326 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-30 02:15 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint