default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 100 matches
- 2007
- Cláudia J. Barenco Abbas, L. Javier García-Villalba, Victoria López López:
Implementation and Attacks Analysis of a Honeypot. ICCSA (2) 2007: 489-502 - Sangim Ahn, Kiwon Chong:
Requirements Change Management on Feature-Oriented Requirements Tracing. ICCSA (2) 2007: 296-307 - Sukyoung Ahn, Youngsong Mun:
Quick Paging IP Scheme Using Residence Pattern of Mobile Node. ICCSA (2) 2007: 226-236 - Suhong Ahn, Yang Na:
On the Ink Transfer Process in Gravure Printing. ICCSA (2) 2007: 907-918 - Manuel Álvarez, Juan Raposo, Alberto Pan, Fidel Cacheda, Fernando Bellas, Victor Carneiro:
Crawling the Content Hidden Behind Web Forms. ICCSA (2) 2007: 322-333 - Hamideh Babaei, Mahmood Fathy, Morteza Romoozi:
Obstacle Mobility Model Based on Activity Area in Ad Hoc Networks. ICCSA (2) 2007: 804-817 - Zhen Cao, Hui Deng, Yuanchen Ma, Po Hu:
Integrating Identity Based Cryptography with Cryptographically Generated Addresses in Mobile IPv6. ICCSA (2) 2007: 514-525 - Mildrey Carbonell, José María Sierra, Jose Antonio Onieva, Javier López, Jianying Zhou:
Estimation of TTP Features in Non-repudiation Service. ICCSA (2) 2007: 549-558 - Vee Liem Chee, Wei-Chuen Yau:
Security Analysis of TORA Routing Protocol. ICCSA (2) 2007: 975-986 - Hongju Cheng, Xiaohua Jia, Hai Liu:
Access Scheduling on the Control Channels in TDMA Wireless Mesh Networks. ICCSA (2) 2007: 247-260 - Hyun-Sook Cho, Bong-Hwan Lee, Kyu-Won Lee:
A Trust Management Model for PACS-Grid. ICCSA (2) 2007: 1097-1106 - Yongyun Cho, Kyoungho Shin, Jongsun Choi, Jaeyoung Choi:
A Context-Adaptive Workflow Language for Ubiquitous Computing Environments. ICCSA (2) 2007: 829-838 - Seokhyang Cho, Kiwon Song, Dongsub Cho, Dongho Won:
Secure Mobile Content Delivery Using Dynamic Group Key Agreement with Batch Verification. ICCSA (2) 2007: 996-1007 - Young-Geun Choi, Jeonil Kang, DaeHun Nyang:
Proactive Code Verification Protocol in Wireless Sensor Network. ICCSA (2) 2007: 1085-1096 - Frank Dévai, Marina L. Gavrilova:
Determining the Visibility of a Planar Set of Line Segments in O(n log log n) Time. ICCSA (2) 2007: 51-62 - Yajun Du, Zheng Pei, Haiming Li, Dan Xiang, Kai Li:
New Fast Algorithm for Constructing Concept Lattice. ICCSA (2) 2007: 434-447 - Muhammet Fikret Ercan:
Parallel Image Understanding on a Multi-DSP System. ICCSA (2) 2007: 1-12 - Amalina Farhi Ahmad Fadzlah, Aziz Deraman:
Measuring the Usability of Software Applications: Metrics for Behaviorness. ICCSA (2) 2007: 448-454 - Akemi Gálvez, Andrés Iglesias, Angel Cobo, Jaime Puig-Pey, Jesús Espinola:
Bézier Curve and Surface Fitting of 3D Point Clouds Through Genetic Algorithms, Functional Networks and Least-Squares Approximation. ICCSA (2) 2007: 680-693 - Tran Hoang Hai, Faraz Idris Khan, Eui-nam Huh:
Hybrid Intrusion Detection System for Wireless Sensor Networks. ICCSA (2) 2007: 383-396 - Young-Ju Han, Seon-Ho Park, Jung-Ho Eom, Tai-Myoung Chung:
Energy-Efficient Distance Based Clustering Routing Scheme for Wireless Sensor Networks. ICCSA (2) 2007: 195-206 - Mohammad Khatim Hasan, Mohamed Othman, Zulkifly Abbas, Jumat Sulaiman, Fatimah Ahmad:
Parallel Solution of High Speed Low Order FDTD on 2D Free Space Wave Propagation. ICCSA (2) 2007: 13-24 - Juan Hernández-Serrano, Josep Pegueroles, Miguel Soriano:
Supporting Mobility in GKM over Ad-Hoc Network Using a Decentralized and Spontaneous Algorithm. ICCSA (2) 2007: 526-539 - Zhi-ping Hu, Yuanjun He, Zong-ying Uo:
View Synthesis of the New Viewpoint Based on Contour Information. ICCSA (2) 2007: 716-726 - Tetsuo Ida, Hidekazu Takahashi, Mircea Marin, Fadoua Ghourabi:
Modeling Origami for Computational Construction and Beyond. ICCSA (2) 2007: 653-665 - Antonio Izquierdo, Joaquín Torres Márquez, José María Sierra, Mildrey Carbonell:
Using Adaptative Encryption for Ubiquitous Environments. ICCSA (2) 2007: 540-548 - Tae-Gun Jeong:
Study on the Nonlinearity of the Nonstationary Impulse Signal Using Reassigned Time-Frequency Analysis. ICCSA (2) 2007: 873-882 - Eun-A Jun, Seok Won Jung, Jeom Goo Kim, Jong In Lim:
Efficient an Implementation Method Research of a Smart Card Atomic Operation. ICCSA (2) 2007: 113-121 - KwangMo Jung, Joongjin Kook, Kwang-Soon Choi, Seong-Dong Kim, Sangwon Min:
Energy Efficient Route Recovery Methods for Wireless Sensor Networks Using Hybrid Checkpointing. ICCSA (2) 2007: 593-601 - Woo Jin Jung, Hyung Joo Ki, Tae-Jin Lee, Hyunseung Choo, Min Young Chung:
Cross-Layer Design for Reducing Handoff Latency in Mobile Network. ICCSA (2) 2007: 216-225
skipping 70 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-21 10:13 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint