Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 60 matches
- 2008
- Antoine B. Bagula, Kuzamunu G. Mazandu:
Energy Constrained Multipath Routing in Wireless Sensor Networks. UIC 2008: 453-467 - Benjamin Becker, Manuel J. Huber, Gudrun Klinker:
Utilizing RFIDs for Location Aware Computing. UIC 2008: 216-228 - Martin Berchtold, Till Riedel, Michael Beigl, Christian Decker:
AwarePen - Classification Probability and Fuzziness in a Context Aware Application. UIC 2008: 647-661 - Tibor Bosse, Mark Hoogendoorn, Michel C. A. Klein, Jan Treur:
A Component-Based Ambient Agent Model for Assessment of Driving Behaviour. UIC 2008: 229-243 - Jae-Woo Chang, Seung-Tae Hong:
Intelligent System Architecture for Context-Awareness in Ubiquitous Computing. UIC 2008: 677-686 - Yao-Jen Chang, Shang-Yao Wu:
Intersection Location Service for Vehicular Ad Hoc Networks with Cars in Manhattan Style Movement Patterns. UIC 2008: 284-296 - Mohammad M. R. Chowdhury, Javier Chamizo, Josef Noll, Juan Miguel Gómez:
Capturing Semantics for Information Security and Privacy Assurance. UIC 2008: 105-118 - Alessandra Esposito, Luciano Tarricone, Marco Zappatore, Luca Catarinucci, Riccardo Colella, Angelo DiBari:
A Framework for Context-Aware Home-Health Monitoring. UIC 2008: 119-130 - Hui Fang, Wen-Jing Hsu, Larry Rudolph:
Controlling Uncertainty in Personal Positioning at Minimal Measurement Cost. UIC 2008: 468-481 - Julio A. de Oliveira Filho, Ana Bunoza, Jürgen Sommer, Wolfgang Rosenstiel:
Self-Localization in a Low Cost Bluetooth Environment. UIC 2008: 258-270 - Yo-Ping Huang, Yueh-Tsun Chang, Frode Eika Sandnes:
RFID-Based Interactive Learning in Science Museums. UIC 2008: 697-709 - Yo-Ping Huang, Tsun-Wei Chang, Frode Eika Sandnes:
A Ubiquitous Interactive Museum Guide. UIC 2008: 720-731 - Chung-Ming Huang, Chang-Zhou Tsai:
A SIP-Based Session Mobility Management Framework for Ubiquitous Multimedia Services. UIC 2008: 636-646 - Jadwiga Indulska:
Challenges in the Design and Development of Context-Aware Applications. UIC 2008: 1 - Takahiro Kawamura, Keisuke Umezu, Akihiko Ohsuga:
Mobile Navigation System for the Elderly - Preliminary Experiment and Evaluation. UIC 2008: 578-590 - Tomomi Kawashima, Jianhua Ma, Bernady O. Apduhan, Runhe Huang, Qun Jin:
Robots in Smart Spaces - A Case Study of a u-Object Finder Prototype -. UIC 2008: 61-74 - Kyoung-Yun Kim, Keunho Choi, Ohbyung Kwon:
Rule Selection for Collaborative Ubiquitous Smart Device Development: Rough Set Based Approach. UIC 2008: 386-396 - Jung-Hwan Kim, Kee-Bum Kim, Sajjad Hussain Chauhdary, Min-Woo Cui, Myong-Soon Park:
Energy-Efficient Tracking of Continuous Objects in Wireless Sensor Networks. UIC 2008: 323-337 - Dong-Sub Kim, Ali Kashif Bashir, Ming Xue, Jung-Hwan Kim, Myong-Soon Park:
Energy Efficient In-Network Phase RFID Data Filtering Scheme. UIC 2008: 311-322 - Aliasgar Kutiyanawala, Vladimir A. Kulyukin:
A Cartesian Robot for RFID Signal Distribution Model Verification. UIC 2008: 244-257 - Ohbyung Kwon, Yonnim Lee:
A Structured Methodology of Scenario Generation and System Analysis for Ubiquitous Smart Space Development. UIC 2008: 90-104 - Youngseol Lee, Sung-Bae Cho:
Petri Net-Based Episode Detection and Story Generation from Ubiquitous Life Log. UIC 2008: 535-547 - Deok-Gyu Lee, Jong Wook Han, Jong Hyuk Park, Sang-Soo Yeo, Young-Sik Jeong:
Time Stamp Protocol for Smart Environment Services. UIC 2008: 591-601 - Liang Yan, Chunming Rong:
RFID System Security Using Identity-Based Cryptography. UIC 2008: 482-489 - Daw-Tung Lin, Li-Wei Liu:
Real-Time Detection of Passing Objects Using Virtual Gate and Motion Vector Analysis. UIC 2008: 710-719 - Feiyu Lin, Kurt Sandkuhl:
User-Based Constraint Strategy in Ontology Matching. UIC 2008: 687-696 - Maria B. Line, Martin Gilje Jaatun, Zi Bin Cheah, A. B. M. Omar Faruk, Håvard Husevåg Garnes, Petter Wedum:
Penetration Testing of OPC as Part of Process Control Systems. UIC 2008: 271-283 - Marco Loregian, Marco P. Locatelli:
An Experimental Analysis of Undo in Ubiquitous Computing Environments. UIC 2008: 505-519 - Malamati D. Louta:
Towards a Collaborative Reputation Based Service Provider Selection in Ubiquitous Computing Environments. UIC 2008: 520-534 - Vivek Menon, Bharat Jayaraman, Venu Govindaraju:
Biometrics Driven Smart Environments: Abstract Framework and Evaluation. UIC 2008: 75-89
skipping 30 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-20 15:39 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint