![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 199 matches
- 2022
- Mi Tian, Mihai Sima, Michael McGuire:
Fixed-Point Arithmetic for Implementing Massive MIMO Systems. ICACT 2022: 1-11 - Mi Tian, Mihai Sima, Michael McGuire:
Massive MIMO in Fixed-Point Arithmetic. ICACT 2022: 91-95 - Hannah A. S. Adjei, Tan Shunhua, George Kofi Agordzo
, Yangyang Li, Gregory Peprah, Emmanuel S. A. Gyarteng:
SSL Stripping Technique (DHCP Snooping and ARP Spoofing Inspection). ICACT 2022: 187-193 - Satyabrata Aich, Nday Kabulo Sinai, Saurabh Kumar, Mohammed Ali, Yu Ran Choi, Moon-Il Joo, Hee-Cheol Kim:
Protecting Personal Healthcare Record Using Blockchain & Federated Learning Technologies. ICACT 2022: 109-112 - Nada Alzaben, Daniel W. Engels:
End-to-End Routing in SDN Controllers Using Max-Flow Min-Cut Route Selection Algorithm. ICACT 2022: 461-467 - Nada Alzaben, Daniel W. Engels:
End-to-End Routing Algorithm Based on Max-Flow Min-Cut in SDN Controllers. ICACT 2022: 1405-1413 - Hye Young An, Won Seok Choi, Seong Gon Choi:
Real-Time Path Planning for Trajectory Control in Autonomous Driving. ICACT 2022: 154-159 - Changyoung An, Hyeong Min Kwon, Heung-Gyoon Ryu:
Beamforming Design of the Wireless Power Transfer System into Multiple IoT Sensors. ICACT 2022: 197-200 - Jinsuk Baek, Munene W. Kanampiu:
A Strategic Sensor Placement for a Smart Farm Water Sprinkler System: A Computational Model. ICACT 2022: 53-57 - Babu Kaji Baniya:
Intrusion Representation and Classification using Learning Algorithm. ICACT 2022: 279-284 - Xinyan Cao, Guang Chen, Yaxin Zhao, Wei Ren, Jian Cao:
Design and Implementation of a Real-time Target Detection and Tracking System. ICACT 2022: 539-543 - Seung-Jun Cha, Seung-Hyub Jeon, Yeon Jeong Jeong, Jin-Mee Kim, Sungin Jung:
OS noise Analysis on Azalea-unikernel. ICACT 2022: 81-84 - Jaegyeong Cha, Juyong Park, Jongpil Jeong:
A Novel Defect Classification Scheme Based on Convolutional Autoencoder with Skip Connection in Semiconductor Manufacturing. ICACT 2022: 347-352 - Jutiphat Chatsomsanga, Chawalit Benjangkaprasert:
Malware Developing Guide: Encryption and Decryption. ICACT 2022: 275-278 - Shan-Wen Chen, Kuan-Po Liu, Fu-Ching Tsai:
The Visualized Analysis of Bitcoin Change Wallets in the Coin Flow Network. ICACT 2022: 35-41 - Chih-Hung Chen, Yiwei Ma, Ying-Hsun Lai
, Wen-Tsung Chang, Shun-Ching Yang:
Analyzing Disinformation with the Active Propagation Strategy. ICACT 2022: 262-266 - Shiang-Jiun Chen, Yu-Chun Pan, Yi-Wei Ma, Cheng-Mou Chiang:
The Impact of the Practical Security Test during the Software Development Lifecycle. ICACT 2022: 313-316 - Shiang-Jiun Chen, Yu-Chun Pan, Yi-Wei Ma, Cheng-Mou Chiang, Chi-Chin Tsai:
Trustworthy Software Development - practical view of security processes through MVP methodology. ICACT 2022: 412-416 - A. T. C. Chen, R. Petra, K. S. K. Yeo, M. Rakib Uddin:
Dimension Dependent Effective Index Analysis for a Nano-scale Silicon Waveguide in Transverse Mode. ICACT 2022: 1392-1398 - A. T. C. Chen, M. Rakib Uddin:
SOI Rib Waveguide Physical Dimension Dependent Micro Ring Resonator Characterization. ICACT 2022: 398-401 - A. T. C. Chen, M. Rakib Uddin:
Transverse Electric (TE) and Transverse Magnetic (TM) Modes Dependent Effective Index Analysis for a Nano-scale Silicon Waveguide. ICACT 2022: 402-406 - Yoshi Michael Cho, Hiroyuki Imada, Naoto Kawamura, Hyunho Kang, Keiichi Iwamura:
Print to Scan Resistant Watermarking based on Green Noise Diffusion Method using Machine Learning. ICACT 2022: 307-312 - Jong Jin Cho, Miyoung Kang:
Threat Modeling Analysis on FireStormcx's Webcam System. ICACT 2022: 276-281 - Beom-Jun Cho, Ki Bong Kwon, Hyun Chul Kim, Sungboo Kang:
A Study on Multi-media Disaster Information Contents to provide Disaster Alert Service to the Public. ICACT 2022: 150-154 - Hong Jun Choi, Hyuk Lee, Jin-Young Choi:
Is a False Positive really False Positive? ICACT 2022: 145-149 - Jong-Young Choi, Jiwoong Park, Sung-Hwa Lim, Young-Bae Ko:
A RSSI-Based Mesh Routing Protocol based IEEE 802.11p/WAVE for Smart Pole Networks. ICACT 2022: 1-5 - Heechang Chung, Dongil Kim, Sokpal Cho:
A Study on the Service model of risk mitigation on livestock pandemic based on Networks. ICACT 2022: 62-65 - Heechang Chung, Dongil Kim, Sokpal Cho:
A Study on the Cultivation Plan Service at the Preliminary production phase based on bigdata analysis. ICACT 2022: 226-229 - Vu-Tuan Dang, Hong-Quan Do
, Viet-Vu Vu, Byeongnam Yoon:
Facial Expression Recognition: A Survey and its Applications. ICACT 2022: 359-367 - Truong Duy Dinh, Vladimir M. Vishnevsky, Van-Dai Pham, Duc Tran Le
, Ruslan Kirichek, Andrey Koucheryavy:
Determination of Subscribers Coordinates using Flying Network for Emergencies. ICACT 2022: 1309-1318
skipping 169 more matches
loading more results
failed to load more results, please try again later
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-18 05:00 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint