Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 107 matches
- 2008
- Piyush Agrawal, Ratan K. Ghosh, Sajal K. Das:
Cooperative black and gray hole attacks in mobile ad hoc networks. ICUIMC 2008: 310-314 - Yuhei Akahoshi, Yutaka Kidawara, Katsumi Tanaka:
A database-oriented wrapper for ubiquitous data acquisition/access environments. ICUIMC 2008: 25-32 - João Ascenso, Fernando Pereira:
Hierarchical motion estimation for side information creation in Wyner-Ziv video coding. ICUIMC 2008: 347-352 - J. William Atwood, J. W. Im, Younchan Jung:
Asymmetric model for active measurements in the internet. ICUIMC 2008: 247-250 - Nilanjan Banerjee, Koustuv Dasgupta:
Telecom mashups: enabling web 2.0 for telecom services. ICUIMC 2008: 146-150 - Zhifeng Bao, Huayu Wu, Bo Chen, Tok Wang Ling:
Using semantics in XML query processing. ICUIMC 2008: 157-162 - Matthias R. Brust, Hannes Frey, Steffen Rothkugel:
Dynamic multi-hop clustering for mobile hybrid wireless networks. ICUIMC 2008: 130-135 - Chin-Chen Chang, The Duc Kieu, Yung-Chen Chou:
Using nearest covering codes to embed secret information in grayscale images. ICUIMC 2008: 315-320 - Chin-Chen Chang, Jung-San Lee, Ting-Fang Cheng:
Security design for three-party encrypted key exchange protocol using smart cards. ICUIMC 2008: 329-333 - Wei Chen, Jing Chen, Qing Li:
Adaptive community-based multimedia data retrieval in a distributed environment. ICUIMC 2008: 20-24 - Kwang-Cheng Chen, Yu-Jeng Peng, Neeli R. Prasad, Ying-Chang Liang, Sumei Sun:
Cognitive radio network architecture: part I - general structure. ICUIMC 2008: 114-119 - Kwang-Cheng Chen, Yu-Jeng Peng, Neeli R. Prasad, Ying-Chang Liang, Sumei Sun:
Cognitive radio network architecture: part II - trusted network layer structure. ICUIMC 2008: 120-124 - Sunghyun Cho, Jisu Kim, Jae-Hyun Kim:
Relay assisted soft handover in multihop cellular networks. ICUIMC 2008: 136-139 - Miseon Choi, Wonik Park, Young-Kuk Kim:
A split synchronizing mobile transaction model. ICUIMC 2008: 196-201 - Dongkyoung Chwa, Ji-Wook Kwon:
Compensation of sinusoidal disturbance with time-varying frequency in uncertain nonlinear system using disturbance accommodation method. ICUIMC 2008: 547-550 - Nanshan Du, Yiwen Liang, Li Zhao:
Data-flow skeleton filled with activities driven workflow design. ICUIMC 2008: 570-574 - Adil I. Erzin, Vyacheslav V. Zalyubovskiy, Hyunseung Choo:
Maximizing lifetime for a sensor network. ICUIMC 2008: 436-440 - Jen-Bang Feng, Iuon-Chang Lin, Yen-Ping Chu:
Halftone image resampling by interpolation and error-diffusion. ICUIMC 2008: 409-413 - Shyam K. Gupta, Vikram Goyal, Anand Gupta:
Precomputation of privacy policy parameters for auditing SQL queries. ICUIMC 2008: 87-93 - Tianyong Hao, Zhi Lu, Shitong Wang, Tiansong Zou, Shenhua Gu, Liu Wenyin:
Categorizing and ranking search engine's results by semantic similarity. ICUIMC 2008: 284-288 - Hiroshi Horii, Hayato Yamana:
Optimistic transactional active replication. ICUIMC 2008: 94-100 - Dawei Hu, Shenhua Gu, Shitong Wang, Liu Wenyin, Enhong Chen:
Question recommendation for user-interactive question answering systems. ICUIMC 2008: 39-44 - Nguyen Thi Thanh Huyen, Eui-nam Huh:
An efficient signal range based key pre-distribution scheme ensuring the high connectivity in wireless sensor network. ICUIMC 2008: 441-447 - Yun-Young Hwang, Il-Jin Oh, Hyung-Jun Yim, Kyong-Ha Lee, Kangchan Lee, Seungyun Lee, Kyu-Chul Lee:
Web services on universal networks. ICUIMC 2008: 538-542 - Khandoker Tarik-Ul Islam, Md. Kamrul Hasan, Young-Koo Lee, Sungyoung Lee:
Enhanced 1-NN time series classification using badness of records. ICUIMC 2008: 108-113 - Jun-Hee Jang, Se-Bin Im, Hyung-Jin Choi, Heejin Roh:
DFT-based decision directed channel estimation algorithm for OFDM systems. ICUIMC 2008: 186-190 - HyunHo Jee, Doo Seop Eom, Taeyoung Kim, HunKi Park, Hyoil Lee, JungHyun Han:
Multi-player VR game built upon wireless sensor network. ICUIMC 2008: 525-527 - Young-Hyok Ji, Jae-Hyung Kim, Su-Jin Jang, Chung-Yuen Won, Soo-Seok Kim:
Fuel cell generation system with SEPIC-flyback converter. ICUIMC 2008: 379-383 - Weijia Jia, Dai Bin, Lin Liao:
Architecture of secure cross-platform and network communications. ICUIMC 2008: 321-328 - Sangwoo Jin, Gyehyeon Gyeong, Young Ik Eom:
Design and implementation of VoIP device management scheme in SOHO environments. ICUIMC 2008: 580-584
skipping 77 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-25 13:42 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint