Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 63 matches
- 2021
- Leonard Barolli, Aneta Poniszewska-Maranda, Hyunhee Park:
Innovative Mobile and Internet Services in Ubiquitous Computing - Proceedings of the 14th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2020), Lodz, Poland, 1-3 July, 2020. Advances in Intelligent Systems and Computing 1195, Springer 2021, ISBN 978-3-030-50398-7 [contents] - 2020
- Youngho An, Junyoung Park, Insu Oh, Myoungsu Kim, Kangbin Yim:
Design and Implementation of a Novel Testbed for Automotive Security Analysis. IMIS 2020: 234-243 - Nampoina Andriamilanto, Tristan Allard, Gaëtan Le Guelvouit:
"Guess Who?" Large-Scale Data-Centric Study of the Adequacy of Browser Fingerprints for Web Authentication. IMIS 2020: 161-172 - Dohyeon Bak, Mintae Kim, Jonghoon Lim, Raeseung Jang, Wonyoung Jang, Sun-Young Lee:
Logical Network Separation and Update Inducing Techniques of Non-updated Vaccine Host by Creating Flow Rule in SDN. IMIS 2020: 436-446 - Admir Barolli, Shinji Sakamoto, Seiji Ohara, Leonard Barolli, Makoto Takizawa:
Performance Evaluation of WMN-PSOSA-DGA Simulation System Considering Linearly Decreasing Vmax Method and Rational Decreament of Vmax Method. IMIS 2020: 1-10 - Kevin Bylykbashi, Ermioni Qafzezi, Makoto Ikeda, Keita Matsuo, Leonard Barolli, Makoto Takizawa:
A Fuzzy-Based Simulation System for Driving Risk Management in VANETs Considering Weather Condition as a New Parameter. IMIS 2020: 23-32 - Ya-Lan Chan, Sue-Ming Hsu, Neo Koe Hsin, Mei-Hua Liao:
The Social Performance of University Social Responsibility Elderly Project: The Perspective of Social Return on Investment. IMIS 2020: 561-572 - Ya-Lan Chan, Sue-Ming Hsu, Mei-Hua Liao:
An Inventory Model for Perishable Items Under Upstream and Downstream Trade Credit. IMIS 2020: 552-560 - Chun-Ping Chang, Munkhnaran Duurenjargal, Zolzaya Batjargal, Shyh-Weir Tzang:
Investment Timing and External Effects. IMIS 2020: 498-503 - Chun-Ping Chang, Yung-Shun Tsai, Shyh-Weir Tzang, Zolzaya Batjargal:
The Choice Between Foreign Direct Investment and Export with Industry Competition and Marginal Cost. IMIS 2020: 504-509 - Chiung-Yen Chen, Mei-Hua Huang, Kuan-Ling Li, Ho-Yun Chao, Ke-Jie Shen, Szu-Han Yu:
Is Enforcing the Production and Filing of Corporate Social Responsibility Reports Conducive to Improving Corporate Performance? IMIS 2020: 540-551 - Chen Chen, Weikong Qi, Wenting Jiang, Peng Sun:
A Dynamic Instrumentation Technology for IoT Devices. IMIS 2020: 304-312 - Hsing-Chung Chen, Mosiur Rahaman, Cahya Damarjati:
A Security Analysis Approach for Secure Color-Code Key Exchange Protocol by Using BAN Logic. IMIS 2020: 81-93 - Miralda Cuka, Donald Elmazi, Keita Matsuo, Makoto Ikeda, Leonard Barolli, Makoto Takizawa:
IoT Node Elimination and Selection for Completing Tasks in Opportunistic Networks: A Fuzzy Logic Approach. IMIS 2020: 11-22 - Yifeng Dong, Tianhan Gao:
A Convolutional Neural Network Model for Object Detection Based on Receptive Field. IMIS 2020: 114-124 - Xuhui Fan, Wei Li, Zhimin Wang, Yiyue Sun, Lili Su:
The Analysis of Higher Mathematics Teaching Strategy Based on the Innovative Teaching Mode. IMIS 2020: 344-353 - Tianhan Gao, Lei Zhao:
Pseudonym Schemes Based on Location Privacy Protection in VANETs: A Survey. IMIS 2020: 597-605 - Asif Qumer Gill, Ghassan Beydoun, Mahmood Niazi, Habib Ullah Khan:
Adaptive Architecture and Principles for Securing the IoT Systems. IMIS 2020: 173-182 - Zuan Gu, Tianhan Gao:
A Visual Particle System Based on Mechanism Model Data in Digital Twin. IMIS 2020: 183-193 - Yijia Guo, Yuanwei Hou, Yongle Hao, Wenjue Xu:
Modeling and Analysis of Cyberspace Threat Sources Based on Vulnerabilities. IMIS 2020: 292-303 - Yuanwei Hou, Xiaoxiao Chen, Yongle Hao, Zhiwei Shi, Shiyu Yang:
Survey of Cyberspace Resources Scanning and Analyzing. IMIS 2020: 279-291 - Mei-Hua Huang, Chia-Hui Hsieh, Perng-Fei Huang, Chiung-Yen Chen:
Examining the Impacts of Strategic Alliance - Examples of the Taiwan Semiconductor Industry. IMIS 2020: 519-528 - Kazuki Ikegami, Hiroaki Kikuchi:
Modeling the Risk of Data Breach Incidents at the Firm Level. IMIS 2020: 135-148 - Tomoyuki Ishida, Kanae Sakamoto:
Proposal of a Disaster Evacuation Support System Using Beacon. IMIS 2020: 104-113 - Eunseon Jeong, Junyoung Park, Insu Oh, Myoungsu Kim, Kangbin Yim:
Analysis on Account Hijacking and Remote Dos Vulnerability in the CODESYS-Based PLC Runtime. IMIS 2020: 457-467 - Xinbei Jiang, Tianhan Gao:
An EEG Emotion Classification System Based on One-Dimension Convolutional Neural Networks and Virtual Reality. IMIS 2020: 194-202 - Jiyoon Kim, Soobin Ahn, Jiyoung Lim:
Protocol Design for Boarding Confirmation Through Arduino Sensing. IMIS 2020: 73-80 - Jiha Kim, Hyewon Kim, WooSeok Hyun, Hae-Duck J. Jeong:
An Accounting Ledger System Using the Hyperledger Fabric-Based Blockchain. IMIS 2020: 65-72 - Won-Bin Kim, Im-Yeong Lee, Kangbin Yim:
Group Delegated ID-Based Proxy Re-encryption for PHR. IMIS 2020: 447-456 - Shiyu Li, Baojiang Cui:
Research on Association Analysis Technology of Network Attack Trace Based on Web Log. IMIS 2020: 33-43
skipping 33 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-15 06:15 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint