default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 226 matches
- 2010
- Cai Biao, Zhishu Li, Zhen Luo:
Threshold Secret Sharing Based Trust Security in Structured P2P Network. IITSI 2010: 320-323 - Yanyan Cao, Hengjun Yue, Jian Wu, Jianming Chen, Zhiming Cui:
Vehicle Edge Detection Based on Multi-structure Mathematical Morphology. IITSI 2010: 258-262 - Juan Chen:
A Flexible Fuzzy Comprehensive Evaluation Method. IITSI 2010: 502-506 - Juan Chen:
Economic Grid Resource Scheduling Based on Utility Optimization. IITSI 2010: 522-525 - Xiaodan Chen, Shaobai Chen:
The Feasible Control Lyapunov Function of Nonlinear Affine-Control Systems. IITSI 2010: 442-445 - Xiaodan Chen, Shaobai Chen:
On the Upper Completeness of Quasi-metric Spaces. IITSI 2010: 446-449 - Youqin Chen, Zhide Chen, Li Xu:
RFID System Security Using Identity-Based Cryptography. IITSI 2010: 460-464 - Junjian Chen, Dan Feng, Jingning Liu:
An Implementation of Object-Based Storage System Access Control Based on IBE. IITSI 2010: 635-639 - Hongli Chen, ShanGuo Lv:
Study on Ontology Model Based on Rough Set. IITSI 2010: 105-108 - Zhonghai Chen, Yong Sun, Guoli Yang, Tengfei Wu, Guizhu Li, Longbiao Xin:
Air Conditioning Load Prediction Based on DE-SVM Algorithm. IITSI 2010: 276-279 - Wen-Huan Chine, Hsiao-Ping Wei, Keh-Chia Yeh, Li Chen, Gin-Rong Liu, Chang-Hung Chiu:
Estimating Typhoon Rainfall over Sea from SSM/I Satellite Data Using a Back-Propagated Network. IITSI 2010: 263-267 - Huifang Deng, Haiyan Kang:
Research on High Performance RFID Code Resolving Technology. IITSI 2010: 677-681 - Zhongjun Deng, Wei Song, Xuefeng Zheng:
P2PKMM: A Hybrid Clustering Algorithm over P2P Network. IITSI 2010: 450-454 - Zhonghua Deng, Ying Wu:
Overcoming Disadvantages by Making Full Use of Extrinsic Objects: Advancing Information Resource Construction by ISA. IITSI 2010: 658-662 - Junyu Dong, Yuliang Wang, Yan Song, Guanglin Cheng:
Three-Dimensional Multiscale Texture Synthesis. IITSI 2010: 483-487 - Xiangqun Fu, Wansu Bao, Chun Zhou:
Design and Implementation of Quantum Factorization Algorithm. IITSI 2010: 748-752 - Wang Gang, Yin Fengxia:
Study on Service Selections Based on Ontology and Qos. IITSI 2010: 43-47 - Feng Gao, Jingsha He, Shufen Peng, Xu Wu:
A Quantifying Metric for Privacy Protection Based on Information Theory. IITSI 2010: 216-220 - Fuxiang Gao, Sha Li, Xiaolu Wang, Lan Yao:
A Security Architecture for Intranet Based on Security Area Division. IITSI 2010: 539-543 - Changyuan Gao, Shuchen Zhang, Xiaoxing Zhang:
The Modeling and Simulation of Negotiation Process for High-Tech Virtual Enterprise Based on UML and Petri Net. IITSI 2010: 455-459 - Ji-Hua Gu, Yun Shang, Bei-jing Huang:
An NPT Watermarking Algorithm Using Wavelet Image Combination. IITSI 2010: 378-381 - Yingjun Guo, Lihua Sun, Haichao Ran:
The Method of Early Real-Time Fault Diagnosis for Technical Process Based on Neural Network. IITSI 2010: 653-657 - Kaiqiang Guo, Jiewu Xia:
An Improved Algorithm of Collision Detection in 2D Grapple Games. IITSI 2010: 328-331 - Ruhan He, Weibin Xu, Ying Wang, Wei Zhan:
A Route-Nearest Neighbor Algorithm for Large-Scale Vehicle Routing Problem. IITSI 2010: 390-393 - Ding Hong, Zhao Yizhu:
A Historical Role-Based Fast Negotiation Model in Open Network. IITSI 2010: 289-293 - Mahboobeh Houshmand, Monireh Houshmand, Habib Rajabi Mashhadi:
Game Theory Based View to the Quantum Key Distribution BB84 Protocol. IITSI 2010: 332-336 - Mahboobeh Houshmand, Elaheh Soleymanpour, Hossein Salami, Mahya Amerian, Hossein Deldari:
Efficient Scheduling of Task Graphs to Multiprocessors Using a Combination of Modified Simulated Annealing and List Based Scheduling. IITSI 2010: 350-354 - Zhi-Hua Hu:
A Quay Crane Assignment Approach for Berth Allocation Problem in Container Terminal. IITSI 2010: 17-21 - Jianli Hu, Xiaohua Li, Bin Zhou, Yonghua Li:
SECTrust: A Secure and Effective Distributed P2P Trust Model. IITSI 2010: 34-38 - Xinming Hu, Huosong Xia:
Automated Assessment System for Subjective Questions Based on LSI. IITSI 2010: 250-254
skipping 196 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-12 17:17 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint