default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 42 matches
- 2009
- Munther Abualkibash, James Gedney, Yongbom Kim, Jeongkyu Lee:
A Hierarchical Approach to Landmarks Detection in Taekwondo Poomsae Videos. CSA 2009: 1-6 - Rachid Anane, Steven Marrocco, Behzad Bordbar:
Trusted P2P Group Interaction. CSA 2009: 1-8 - Hayretdin Bahsi, Albert Levi:
Energy Efficient Privacy Preserved Data Gathering in Wireless Sensor Networks Having Multiple Sinks. CSA 2009: 1-8 - Jungan Chen, Feng Liang, Wenxin Chen:
Hybrid Immune Detector Maturation Algorithm with LifeCycle Model. CSA 2009: 1-6 - Shan-Tai Chen, Hong-Zhe Luo, Tsung-Chun Li, Wann-Jin Chen:
A Soft Computing Approach to Rainfall Intensity Classification Using TRMM/TMI Data. CSA 2009: 1-6 - Shan-Tai Chen, Shih-Min Lin, Chi-Yii Tang, Guei-Yu Lin:
An Improved Algorithm for Completely Hiding Sensitive Association Rule Sets. CSA 2009: 1-6 - Chuan Chen, Ke-Wei Lv, Yi-Xin Zhu:
A Paillier Based Threshold Signature Scheme. CSA 2009: 1-6 - Chen-Chung Chi, Nai-Lung Tsao, Chin-Hwa Kuo:
A Time Influence Analysis for Web Page Recommender System. CSA 2009: 1-6 - Sam Chung, Daehee Won, Seung-Ho Baeg, Sangdeok Park:
A Model-Driven Scrum Process for Service-Oriented Software Reengineering: mScrum4SOSR. CSA 2009: 1-8 - Yeong Hyeon Gu, Seong Joon Yoo:
Mining Comparative Sentences from Korean Text Documents Using Sentential Structure Analysis Combined with Machine Learning Techniques. CSA 2009: 1-6 - Zahid Halim, Abdul Rauf Baig:
Automatic Generation of Interesting Games. CSA 2009: 1-6 - Md. Shohrab Hossain, Mohammed Atiquzzaman:
Signaling Cost Analysis of Mobility Protocols Using City Section Mobility Model. CSA 2009: 1-6 - Kuo-Yuan Hwa, Di-Shuan Chiang, Chen-Wen Yao:
Target Identification of an Antibacterial Compound from Data Mining of 2-D Gel Images. CSA 2009: 1-6 - Sun-Myung Hwang:
Characteristic of Korea SW Process Certification Model. CSA 2009: 1-4 - Seyed Hossein Iranmanesh, Seyed Mostafa Alem, Eisa Maleki Berneti:
Project Risk Assessment for Customer Relationship Management Using Adaptive Nero Fuzzy Inference System (ANFIS). CSA 2009: 1-7 - Mohammad Rakibul Islam, Jinsang Kim:
Energy Efficient Cooperative MIMO Communication for Uncorrelated Data Transmission at Wireless Sensor Network. CSA 2009: 1-6 - M. Arfan Jaffar, Qurat-ul-Ain Aini, Sohail Masood Bhatti, Muhammad Amjad Iqbal, Arshad Javed, Anwar M. Mirza:
Fuzzy Curvelet Based Fully Automated Segmentation of Brain from MR Images. CSA 2009: 1-6 - Niakam Kazemi, Alexander L. Wijesinha, Ramesh K. Karne:
Design and Implementation of IPsec on a Bare PC. CSA 2009: 1-8 - Pranav Khaitan, Korra Sathya Babu, Sanjay Kumar Jena, Banshidhar Majhi:
Approximation Algorithms for Optimizing Privacy and Utility. CSA 2009: 1-6 - Pranav Khaitan, Satish Kumar M, Korra Sathya Babu, Sanjay Kumar Jena:
Improved Query Plans for Unnesting Nested SQL Queries. CSA 2009: 1-6 - Younghee Kim, Soon Hyoung Pyo, Bonki Koo:
A Method for Immiscible Fluid Simulation. CSA 2009: 1-4 - Sung-Won Kim, Eun-Ha Song, Dong-Hwan Park, Hyeon Park, Sangjoon Park, Young-Sik Jeong:
Integrated Multi Mobile Object Scheme for Ubiquitous Sensor Network. CSA 2009: 1-6 - Yuseop Lee, Jongsung Kim, Pil Joong Lee, Yeonjung Kang, Hyangjin Lee:
Impossible Collision Based Side-Channel Attacks on HIGHT with Reduced Masked Rounds. CSA 2009: 1-4 - Fang-Yie Leu, Yong-Lon Chen:
A Path Switching Scheme for SCTP Based on Round Trip Delay. CSA 2009: 1-6 - Xuehong Liu, Arnaud Casteigts, Nishith Goel, Amiya Nayak, Ivan Stojmenovic:
Multiratecast in Wireless Fault Tolerant Sensor and Actuator Networks. CSA 2009: 1-6 - Kezhong Liu, Ji Xiong, Yongqiang Cui, Dong Han:
A Fine-Grained Localization Scheme Using a Mobile Beacon Node for Wireless Sensor Networks. CSA 2009: 1-6 - Jong Sik Moon, Im-Yeong Lee, Seo-Il Kang:
Group Key Management Using Device ID in Ad-hoc Network. CSA 2009: 1-6 - Rasha Osman, Irfan Awan, Michael E. Woodward:
Towards a Performance Evaluation Model for Database Designs. CSA 2009: 1-6 - Madhusoodan Parthasarathy, Min Sik Kim:
Routing in the Presence of Groups in Mobile Ad Hoc Networks. CSA 2009: 1-8 - Nadra Ben Romdhane, Mohamed Hammami, Hanêne Ben-Abdallah:
An Artificial Vision-Based Lane Detection Algorithm. CSA 2009: 1-6
skipping 12 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-04 10:41 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint