Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 66 matches
- 2018
- Yanning Cao, Xiaoshu Zhang:
Research on Data Mining Method for Breast Cancer Case Data. ICCCS (2) 2018: 71-78 - Yixuan Chai, Guohua Liu, Zhao Chen, Feng Li, Yue Li, Esther Astaewwa Effah:
A Temporal Collaborative Filtering Algorithm Based on Purchase Cycle. ICCCS (2) 2018: 191-201 - Fuli Chen, Rui Fan, Bifeng Guo, Fuyu Ma, Weitao He:
Research into Effects of Shrimp Aquaculture by Extensible Mind Mapping. ICCCS (2) 2018: 45-58 - Zhenjia Chen, Yonghui Zhang, Xia Guo:
The Application of Distributed Database on Spectrum Big Data. ICCCS (2) 2018: 212-222 - Ting Dong, Song-Ya Ma, Pei Zhang:
Controlled Remote Preparation of an Arbitrary Two-Qubit State via the Brown State Under the Noisy Environment. ICCCS (2) 2018: 643-653 - Fei Gui, Yao-jie Chen, Ya-ting Xue:
Research on Flame Generation Method Based on Particle System and Texture Mapping. ICCCS (2) 2018: 79-89 - Cheng Guo, Pengxu Tian, Yingmo Jie, Xinyu Tang:
A Privacy Preserving Similarity Search Scheme over Encrypted High-Dimensional Data for Multiple Data Owners. ICCCS (2) 2018: 484-495 - Yanchao Guo, Linfeng Wei, Jianzhu Lu:
The Design and Implementation of a Backup and Disaster Recovery System for vSphere Data Center Based on Swift Cloud Storage. ICCCS (2) 2018: 242-253 - Huirui Han, Mengxing Huang, Yu Zhang, Uzair Aslam Bhatti:
An Architecture of Secure Health Information Storage System Based on Blockchain Technology. ICCCS (2) 2018: 578-588 - Shan Huang, Ming Li, Hao Chen:
The Quasi-circular Mapping Visualization Based on Extending and Reordering Dimensions for Visual Clustering Analysis. ICCCS (2) 2018: 287-299 - Jianbiao Huang, Linli Tao:
Study on Cloud Logistics Distribution Model of Agricultural Products. ICCCS (2) 2018: 169-181 - Wan Li, Fenling Feng:
Railway Passenger Volume Forecast Based on Web Search Terms and Adversarial Nets. ICCCS (2) 2018: 9-20 - Bangguo Li, Pingzeng Liu, Xiaotong Wu, Xue Wang, Rui Zhao:
Design and Application of Agricultural Product Traceability Management Platform. ICCCS (2) 2018: 684-693 - Bangguo Li, Pingzeng Liu, Xiaotong Wu, Jianyong Zhang:
Design and Implementation of the Product Quality Traceability System for Winter Jujube. ICCCS (2) 2018: 694-705 - Mohan Li, Yanbin Sun, Le Wang, Hui Lu:
Quality-Aware Query Based on Relative Source Quality. ICCCS (2) 2018: 3-8 - Gen Li, Kejie Wen, Yaxuan Wu, Baili Zhang:
Topk Service Composition Algorithm Based on Optimal QoS. ICCCS (2) 2018: 309-321 - Ping Lin, Tao Li, Xiaojie Liu, Hui Zhao, Jin Yang, Fangdong Zhu:
An Immunity-Based Security Threat Detection System for Cyberspace Digital Virtual Assets. ICCCS (2) 2018: 601-611 - Chunxia Liu, Youyu Chen, Shu Tong, Wangdong Jiang, Guang Sun:
A Study on Revenue Distribution of Information Sharing in the C2M Supply Chain. ICCCS (2) 2018: 543-552 - Pai Liu, Fenlin Liu, Daofu Gong:
Video Quality Assessment Algorithm Based on Persistence-of-Vision Effect. ICCCS (2) 2018: 366-376 - Qin Liu, Tinghuai Ma, Jian Li, Wenhai Shen:
Workflow Task Scheduling Algorithm Based on IFCM and IACO. ICCCS (2) 2018: 377-388 - Boyi Liu, Xiangyan Tang, Jieren Cheng, Jiquan Chen:
Design and Verification of a Security Policy to Defense DDoS Attack for Cloud Robot. ICCCS (2) 2018: 718-730 - Xin Lu, Lifeng Cao, Xuehui Du, Zhiyan Hu:
A Tag-Based Protection Method for Multi-tenant Data Security. ICCCS (2) 2018: 553-565 - Hui Lu, Xiang Cui, Le Wang, Yu Jiang, Meng Cui:
The Research on Security Audit for Information System Classified Protection. ICCCS (2) 2018: 300-308 - Wei Luo, Wenping Ma:
A Secure Revocable Identity-Based Proxy Re-encryption Scheme for Cloud Storage. ICCCS (2) 2018: 519-530 - Bin Ma, Yecheng Sun:
Research on Real-Time Monitoring of Human Body Temperature Based on Fiber Bragg Grating Sensing Technology. ICCCS (2) 2018: 124-133 - Xiaofeng Ma, Xiaofeng Song, Chao Fan, Xi Wang:
An Evolutionary Algorithm Based on Multi-view and Prior Information for Community Detection. ICCCS (2) 2018: 589-600 - Qingyu Meng, Huanhuan Zhang, Mingquan Zhou, Shifeng Zhao, Pengbo Zhou:
The Classification of Traditional Chinese Painting Based on CNN. ICCCS (2) 2018: 232-241 - Yongjun Ren, Linhui Kong, Yepeng Liu, Jin Wang:
Consistency Guarantee Method of Electronic Record Based on Blockchain in Cloud Storage. ICCCS (2) 2018: 633-642 - Yaoyao Shang, Shuangmao Yang, Wei Wang:
Botnet Detection with Hybrid Analysis on Flow Based and Graph Based Features of Network Traffic. ICCCS (2) 2018: 612-621 - Yaosheng Shen, Ding Wang, Ping Wang:
Revisiting Anonymous Two-Factor Authentication Schemes for Cloud Computing. ICCCS (2) 2018: 134-146
skipping 36 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-13 11:54 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint