Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 83 matches
- 2007
- Mark Adler, Franklin Reynolds:
Vision-Guided "Point and Click" for Smart Rooms. ICSNC 2007: 30 - Rui Agostinho, Manuela Pereira, Mário M. Freire:
Advanced Querying Architecture for DICOM Systems. ICSNC 2007: 53 - Sherif Akoush, Ahmed Sameh:
Movement Prediction Using Bayesian Learning for Neural Networks. ICSNC 2007: 6 - Pedro A. Aranda-Gutiérrez, Ilka Miloucheva:
Automated QoS policy adaptation for heterogeneous access network environments. ICSNC 2007: 65 - Vincenzo Auletta, Carlo Blundo, Emiliano De Cristofaro:
A J2ME transparent middleware to support HTTP connections over Bluetooth. ICSNC 2007: 3 - Marianne Azer, Sherif El-Kassas, Magdy S. El-Soudani:
Threshold Cryptography and Authentication in Ad Hoc Networks Survey and Challenges. ICSNC 2007: 5 - Marianne Azer, Sherif El-Kassas, Magdy S. El-Soudani:
Certification and Revocation Schemes in Ad Hoc Networks Survey and Challenges. ICSNC 2007: 17 - Mâamoun Bernich, Fabrice Mourlin:
Software management based on mobile agents. ICSNC 2007: 64 - Pattarasinee Bhattarakosol, Vasin Suttichaya:
Multiple Equivalent Scale Scan: An Enhancing Technique for Malware Detection. ICSNC 2007: 71 - Hassene Bouhouch, Sihem Guemara El Fatmi:
QoS Routing In Ad Hoc Networks by Integreting Activity in the OLSR Protocol. ICSNC 2007: 1 - Wei-Chih Chen, Shi-Jinn Horng, Pingzhi Fan:
An Enhanced Anti-collision Algorithm in RFID Based on Counter and Stack. ICSNC 2007: 21 - Jiann-Liang Chen, Huan-Wen Tzeng, Chia-Ping Lai:
Routing Mechanism for Reliable Sensor Network Applications. ICSNC 2007: 34 - Huan Chen, Cheng-Shong Wu, Yuan-Sun Chu, Chih-Chuan Cheng, Li-Kuang Tsai:
Energy Residue Aware (ERA) Clustering Algorithm for Leach-based Wireless Sensor Networks. ICSNC 2007: 40 - Nuno Costa, Filipa Ferreira, Nélia Santos, António Pereira:
WSNet - WineCellar An Evolutionary Wireless Sensor Network to Monitor Wine-Cellars. ICSNC 2007: 81 - Nuno Costa, António Pereira, Carlos Serôdio:
Virtual Machines Applied to WSN's: The state-of-the-art and classification. ICSNC 2007: 50 - Danco Davcev, Slobodan Kalajdziski, Kire Trivodaliev:
Multimedia Environment for Mobile Learning. ICSNC 2007: 28 - Hai Dong, Farookh Khadeer Hussain, Elizabeth Chang:
Application of Protégé and SPARQL in the Field of Project Knowledge Management. ICSNC 2007: 74 - G. Shobha, Ranjana R. Chittal, Kamod Kumar:
Medical Applications of Wireless Networks. ICSNC 2007: 82 - Jérôme Galtier:
Analysis and optimization of MAC with constant size congestion window for WLAN. ICSNC 2007: 25 - Marc Garbey, Bilel Hadri, Victoria Hilford, Christof Karmonik:
Parallel Image-Based Hemodynamic Simulator. ICSNC 2007: 78 - Ivan García-Pacheco, Josué García-Matías:
Implementing Virtual Practices using an Alternative Methodology to Develop Educational Software. ICSNC 2007: 31 - Nuno M. Garcia, Przemyslaw Lenkiewicz, Mário M. Freire, Paulo P. Monteiro:
On the Performance of Shortest Path Routing Algorithms for Modeling and Simulation of Static Source Routed Networks -- an Extension to the Dijkstra Algorithm. ICSNC 2007: 60 - Sorin-Marian Georgescu:
An IMS-SOA Architecture for Multimodal Interaction using Distributed Keyword Dictionaries. ICSNC 2007: 44 - Steffen Hallsteinsen, Ivar Jørstad, Do Van Thanh:
Using the mobile phone as a security token for unified authentication. ICSNC 2007: 68 - Hédi Hamdi, Mohamed Mosbah, Adel Bouhoula:
A Domain Specific Language for Securing Distributed Systems. ICSNC 2007: 76 - Poul E. Heegaard, Werner Sandmann:
Efficient Estimation of Loss Rates in Optical Packet Switched Networks with Wavelength Conversion. ICSNC 2007: 59 - Arafat E. Hegazy, Ahmed M. Darwish, R. El-Fouly:
Reducing µTESLA memory requirements. ICSNC 2007: 33 - Jun Heo, Jong Whoi Shin, Ho Sung Kim, DongHoon Shin, Gang Shin Lee, Jae-il Lee:
A Study for a New IT Service Information Protection Framework. ICSNC 2007: 70 - Farookh Khadeer Hussain, Elizabeth Chang, Omar Khadeer Hussain:
State of the art review of the existing PageRankTM based algorithms for trust computation. ICSNC 2007: 75 - J. Y. Jung, J. W. Lee:
ZigBee Device Design and Implementation for Context-Aware U-Healthcare System. ICSNC 2007: 22
skipping 53 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-13 01:58 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint