default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 98 matches
- 2008
- Rudy Adipranata, Eddy, Cherry G. Ballangan, Ronald P. Ongkodjojo:
Fast Method for Multiple Human Face Segmentation in Color Image. FGCN (2) 2008: 158-161 - Oliver C. Agustin, Byung-Joo Oh:
Automatic Milled Rice Quality Analysis. FGCN (2) 2008: 112-115 - Youngeun An, Gwangwon Kang, Il-Jung Kim, Hyunsook Chung, Jong-An Park:
Shape from Focus through Laplacian Using 3D Window. FGCN (2) 2008: 46-50 - Long Bora, Heau-Jo Kang:
A Study on the Performance of OFDM Transmission Scheme for QAM Data Symbol. FGCN (2) 2008: 267-270 - Pierre Busnel, Paul El Khoury, Sylvain Giroux, Keqin Li:
Achieving Socio-technical Confidentiality Using Security Pattern in Smart Homes. FGCN (2) 2008: 447-452 - Jian Chen, Degui Feng, Wei Hu, Tianzhou Chen:
A Java Development Platform in Mobile System for Smart Home. FGCN (2) 2008: 226-229 - Tianzhou Chen, Jiangwei Huang, Liangxiang Xiang, Zhenwei Zheng:
A Practical Dynamic Frequency Scaling Scheduling Algorithm for General Purpose Embedded Operating System. FGCN (2) 2008: 213-216 - Jinhai Chen, Qinyou Hu, Renyu Zhao, Peng Guojun, Chun Yang:
Tracking a Vessel by Combining Video and AIS Reports. FGCN (2) 2008: 374-378 - Kyung-chul Cho, Young-Chang Kang, Sun-hyung Kim:
Performance Analysis of the pi/4-DQPSK-OFDM System with Equalizer for the Wireless Multimedia Communication. FGCN (2) 2008: 78-81 - Jae-Myeong Choi, Heau-Jo Kang, Yong-Seok Choi:
A Study on the Wireless Body Area Network Applications and Channel Models. FGCN (2) 2008: 263-266 - Seong-Ho Choi, Hyung-Kun Park, Nam Ho Kim, Sang-Hoon Kim, YunSeop Yu:
Design of A Power-, Delay-, and Emergency-Efficient Protocol of Ubiquitous Sensor Network Systems for Silver Town Applications. FGCN (2) 2008: 306-309 - In-Sik Choi, Ill-Keun Rhee:
Performance Comparison of Time-Frequency Analysis Methods for Radar Signature Analysis. FGCN (2) 2008: 24-27 - Hoon-Ju Chung, Sang-Bong Byun, Hyun-woong Ju, Yun Seon Do, Dae-Hwan Kim, Byeong-Dae Choi, Yong-Hwan Lee:
An LCoS Microdisplay for Video Conference on Wireless Network. FGCN (2) 2008: 3-6 - Qingyun Dai, Hong Bao, Yihong Liu, Zexi Liu, Ke Zhou, Jin Wang:
433MHz Wireless Network Technology for Wireless Manufacturing. FGCN (2) 2008: 393-397 - Jianhua Dai, Xiaochun Liu, Yu Yi, Huaijian Zhang, Jingjing Wang, Shaomin Zhang, Xiaoxiang Zheng:
Experimental Study on Neuronal Spike Sorting Methods. FGCN (2) 2008: 230-233 - Lunman Deng, Jeong-Young Song:
A Number Plate Recognition System for Abnormal Data. FGCN (2) 2008: 137-140 - Kejun Du, Daqing Zhang, Muzaaliff W. Musa, Mounir Mokhtari, Xingshe Zhou:
Handling Activity Conflicts in Reminding System for Elders with Dementia. FGCN (2) 2008: 416-421 - Yongxin Feng, Yuntao Zhao, Chengsheng Pan:
The Research of Reconfiguration Technology in Mobile Ad Hoc Network. FGCN (2) 2008: 173-177 - Fei Ge, Yuan-ni Wang:
An Adaptive Energy Efficient Topology for Wireless Sensor Networks. FGCN (2) 2008: 187-192 - Abderrahim Ghadi, Driss Mammass, Maurice Mignotte, Alain Sartout:
Formalism of the Access Control Model Based on the Marqued Petri Nets. FGCN (2) 2008: 201-204 - Charles Gouin-Vallerand, Sylvain Giroux, Bessam Abdulrazak, Mounir Mokhtari:
Toward a Self-Configuration Middleware for Smart Spaces. FGCN (2) 2008: 463-468 - Bongeun Gu:
Revised Gaze Proximity as Context Information. FGCN (2) 2008: 141-144 - Jaeyong Han, Sunheum Lee, Sunhyung Kim, Sang-Min Han:
Development of Home Network Gateway Supporting both Wire and Wireless Communication. FGCN (2) 2008: 86-89 - Wei He, Chunhe Xia, Cheng Zhang, Yi Ji, Xinyi Ma:
A Network Security Risk Assessment Framework Based on Game Theory. FGCN (2) 2008: 249-253 - Woonkang Heo, Minseok Oh:
Performance of Expanding Ring Search Scheme in AODV Routing Algorithm. FGCN (2) 2008: 128-132 - John Herbert, John O'Donoghue, Xiang Chen:
A Context-Sensitive Rule-Based Architecture for a Smart Building Environment. FGCN (2) 2008: 437-440 - Yul Pyo Hong, Young-Jae Choi, Tae Goo Kim, Yunsik Kwak, Ki Hyung Joe, Hyung-Il Kang, Seok Il Song:
Energy Efficient Data Centric Storage for Sensor Networks Employing Multilevel Grid Techniques. FGCN (2) 2008: 133-136 - Yu-Jin Hong, Ig-Jae Kim, Sang Chul Ahn, Hyoung-Gon Kim:
Activity Recognition Using Wearable Sensors for Elder Care. FGCN (2) 2008: 302-305 - Han-Cheng Hsiang, Hsiang-Chou Kuo, Wei-Kuan Shih:
Security Enhancement for a Novel Mutual Authentication Scheme Based on Quadratic Residues for RFID Systems. FGCN (2) 2008: 197-200 - Hai Hu, Yutang Min, Xianzhong Xie, Furong Wang, Jun Yuan:
Distributed Cooperative Dynamic Spectrum Management Schemes for Industrial Wireless Sensor Networks. FGCN (2) 2008: 381-386
skipping 68 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-20 06:06 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint