Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 25 matches
- 2019
- Zhenshan Bao, Kaixuan Wang, Wenbo Zhang:
An Auditable and Secure Model for Permissioned Blockchain. IECC 2019: 139-145 - Phanuphong Boontamchauy, Nathapat Supreeyatitikul, Anupan Phungasem, Manurak Rattanasuttikan, Usa Torteanchai:
A Simple Patch Antenna with Wideband Circular Polarization for GNSS Application. IECC 2019: 11-15 - Chun-Young Chang, Lin-Chien Chien, En-Chun Kuo, Yuh-Shyan Hwang:
IoT-based "All-Round 3D Technology Security Circle" in New Taipei City Police Department. IECC 2019: 32-36 - Shu-Yin Chiang, Che-Wei Chang, Kuan-Jheng Liao:
Self-Localization of Robot by the Integration of Laser Sensor and Omni-Vision System. IECC 2019: 65-70 - Thuat Do, Thao Nguyen, Hung Pham:
Delegated Proof of Reputation: a Novel Blockchain Consensus. IECC 2019: 90-98 - Laurin Doerr, Michael Heigl, Dalibor Fiala, Martin Schramm:
Comparison of Energy-Efficient Key Management Protocols for Wireless Sensor Networks. IECC 2019: 21-26 - Huaming Du, Junfang Zeng, Yuguo An, Jing Zhang, Jian Zhao:
Exploration on the Application of Blockchain in the Security System of Smart Park. IECC 2019: 146-153 - Ming-Huwi Horng, Yu-Lun Hong, Yung-Nien Sun, Zhe-Yuan Zhan, Chen-Yu Hong:
Learning One-class Support Vector Machine by Using Artificial Bee Colony Algorithm and Its Application for Disease Classification. IECC 2019: 71-75 - Rishabh Jain, Aniket Dogra:
Solar Energy Distribution Using Blockchain and IoT Integration. IECC 2019: 118-123 - Shafaq Naheed Khan, Mohammed Shael, Munir Majdalawieh:
Blockchain Technology as a Support Infrastructure in E-Government Evolution at Dubai Economic Department. IECC 2019: 124-130 - Pakorn Leesutthipornchai, Denduang Pradubsuwun:
Association Extraction from Functional Testing Scenarios. IECC 2019: 27-31 - Oleksandr A. Letychevskyi, Volodymyr Peschanenko, Viktor Radchenko, Maxim Orlovsky, Andrey Sobol:
Algebraic Approach to Verification and Testing of Distributed Applications. IECC 2019: 37-43 - Keyang Liu, Yukio Ohsawa:
Auction based Rewards Distribution Method in Pool Mining. IECC 2019: 103-110 - Dongjie Liu, Wei Wang, Yang Wang, Yaling Tan:
PhishLedger: A Decentralized Phishing Data Sharing Mechanism. IECC 2019: 84-89 - Chenwei Lou, HuaPeng Wei, Xingqian Li, Jian Zhao, Xiangbin Liu, Hongwei Zhao:
Tom-Talker: Pet Robot Social Incentive System for Urban Autism. IECC 2019: 60-64 - JinHyuck Park, Younghoon Seo, Dong Ryeol Shin, ChoonSung Nam:
A 3D-Touch Interface by Using EMG. IECC 2019: 1-5 - Lalitha Muthu Subramanian, Guruprasad Eswaraiah, Roopa Vishwanathan:
Private and Secure Mixing in Credit Networks. IECC 2019: 52-59 - Sorapong Wachirarattanapornkul:
The Voltage-Mode TITO Biquadratic Filter Based on CCDCVC and URC. IECC 2019: 6-10 - Hsiao-Ling Wu, Chin-Chen Chang, Long-Sheng Chen:
Secure Authentication Scheme with Conditional Privacy Preservation in a Global Mobility Communication Network. IECC 2019: 16-20 - Junfang Zeng, Yong Yuan, Jing Zhang, Yu Liu:
Blockchain in Smart Park: Application Scheme Design. IECC 2019: 76-83 - Remy Remigius Zgraggen:
Smart Insurance Contracts Based on Virtual Currency: Legal Sources and Chosen Issues. IECC 2019: 99-102 - Jing Zhang, Junfang Zeng, Huaming Du, Yuguo An, Jian Zhao:
Catering System Design of Smart Park Based on Blockchain Technology. IECC 2019: 111-117 - Dimitrii Zhelezov, Oliver Fohrmann:
HelixMesh: a Consensus Protocol for IoT. IECC 2019: 44-51 - Qianwei Zhuang, Yuan Liu, Lisi Chen, Zhengpeng Ai:
Proof of Reputation: A Reputation-based Consensus Protocol for Blockchain Based Systems. IECC 2019: 131-138 - Proceedings of the 2019 International Electronics Communication Conference, IECC 2019, Okinawa, Japan, July 7 - 9, 2019. ACM 2019, ISBN 978-1-4503-7177-3 [contents]
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-10 18:15 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint