![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 172 matches
- 2017
- James J. Park, Yi Pan, Gangman Yi, Vincenzo Loia:
Advances in Computer Science and Ubiquitous Computing - CSA/CUTE 2016, Bangkok, Thailand, 19-21 December. Lecture Notes in Electrical Engineering 421, Springer 2017, ISBN 978-981-10-3022-2 [contents] - 2016
- Saurabh Singh, Pradip Kumar Sharma
, Jong Hyuk Park:
A Security Model for Protecting Virtualization in Cloud Computing. CSA/CUTE 2016: 385-388 - Lili He, Hongtao Bai, Jin Wang, Yu Jiang, Tonglin Li:
Coarse-Grained 2.5-D CSAMT Parallel Inversion Method Based on Multi-core CPU. CSA/CUTE 2016: 449-455 - Dae-Young Kim, Seokhoon Kim
:
Efficient Path Selection for IoT Devices in Heterogeneous Service Environments. CSA/CUTE 2016: 149-153 - Ganjar Alfian
, Hyejung Ahn, Yoonmo Shin, Jaeho Lee
, Jongtae Rhee:
Intelligent Food Distribution Monitoring System. CSA/CUTE 2016: 16-22 - Ganjar Alfian
, Jaeho Lee
, Hyejung Ahn, Jongtae Rhee:
Application of RFID and Computer Vision for the Inventory Management System. CSA/CUTE 2016: 600-606 - Mustafa Altaha, Humor Hwang:
An Observation Method for Estimating Carrier Frequency Offset in OFDM Systems. CSA/CUTE 2016: 900-905 - Euiri An, Kyungrak Lee, Jaewon Lee, Inwhee Joe:
An Approach for Interworking Heterogeneous Networks with DTN and IP Routing in Space Internet. CSA/CUTE 2016: 717-722 - Seungchan Back, Hyorin Choi, Jung-Won Lee, Byungjeong Lee:
Evolutionary Test Case Generation from UML-Diagram with Concurrency. CSA/CUTE 2016: 674-679 - Changseok Bae, Yuk Ying Chung, Jeun Woo Lee:
Image Based Video Querying Algorithm Using 3-Level Haar Wavelet Transform Features. CSA/CUTE 2016: 779-785 - Ji-Hye Bae, In-Hwan Kim, Yong-Tae Jeon, Hyun Lee:
IoT-Based Smart Photo Frame. CSA/CUTE 2016: 793-798 - Ji-Hye Bae, Hyun Lee:
Design and Implementation of the Mobile Learning App for Creative Problem Solving Activities. CSA/CUTE 2016: 786-792 - Seongmin Baek, Myunggyu Kim:
Real-Time Dynamic Motion Capture Using Multiple Kinects. CSA/CUTE 2016: 29-35 - Dusan Baek, Jae-Hyeon Park, Byungjeong Lee, Jung-Won Lee:
A Low-Power Sensing Management Method for Sustainable Context-Awareness in Exclusive Contexts. CSA/CUTE 2016: 950-956 - Hongtao Bai, Lili He, Yu Jiang, Jin Wang, Shanshan Jiang:
Linear Programming Computation Model Based on DPVM. CSA/CUTE 2016: 477-483 - Green Bang, IlJu Ko:
A User Empirical Context Model for a Smart Home Simulator. CSA/CUTE 2016: 555-560 - Jeongyong Byun, Seongbum Hong, Hoyoung Kim:
A Design Scheme of Combined Syllable Fonts for Hunminjeongeum. CSA/CUTE 2016: 1096-1102 - HwiRim Byun, Boo-Kwang Park, Young-Sik Jeong:
Mobile Agent Oriented Service for Offloading on Mobile Cloud Computing. CSA/CUTE 2016: 920-925 - Guang-Ho Cha:
The SP-tree: A Clustered Index Structure for Efficient Sequential Access. CSA/CUTE 2016: 104-110 - Jea-Hui Cha, Tae-Hyoung Kim, Jong-Wook Jang
:
Design of Sudden Unintended Acceleration Check System Using Distance Measurement Sensor. CSA/CUTE 2016: 23-28 - SooHyun Cho
:
The Effect of Introducing Small Cells in Wireless Networks. CSA/CUTE 2016: 976-981 - Wonhee Cho, Eunmi Choi:
Effective Pre-processing Methods with DTG Big Data by Using MapReduce Techniques. CSA/CUTE 2016: 389-395 - Yeongpil Cho, Yunheung Paek, Ejaz Ahmed, Kwangman Ko:
A Survey and Design of a Scalable Mobile Edge Cloud Platform for the Smart IoT Devices and It's Applications. CSA/CUTE 2016: 694-698 - Jae Sung Choi, Moon Jong Choi, Jung-Min Lee, Hyun Lee:
A New Automated Cell Counting Program by Using Hough Transform-Based Double Edge. CSA/CUTE 2016: 712-716 - Ji-Hyen Choi, Jong-Won Choe, Yong-Ik Yoon:
Prediction Method for Suspicious Behavior Based on Omni-View Model. CSA/CUTE 2016: 607-612 - Mijin Choi, Rize Jin, Tae-Sun Chung:
Document Classification Using Word2Vec and Chi-square on Apache Spark. CSA/CUTE 2016: 867-872 - Jae Sung Choi, Hyun Lee:
Deep Analysis of Tag Interference by Tag to Tag Relative Angles with Passive Far Field UHF RFID System. CSA/CUTE 2016: 660-664 - Myoungbeom Chung, IlJu Ko:
Detection of a Robust High-Frequency Range via Noise Analysis in a Real-World Environment. CSA/CUTE 2016: 9-15 - Zheng Dou, Zi Xiao, Yang Zhao, Jinyu Wang:
A Modified Complex ICA for Blind Source Separation and the Application in Communication Reconnaissance. CSA/CUTE 2016: 266-272 - Qingsong Feng, Zheng Dou, Chunmei Li, Guangzhen Si:
Anomaly Detection of Spectrum in Wireless Communication via Deep Autoencoder. CSA/CUTE 2016: 259-265
skipping 142 more matches
loading more results
failed to load more results, please try again later
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-01 11:14 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint