Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 67 matches
- 2015
- Peng Shi, Mingzhe Fang, Hao Lin, Lianhong Ding:
A Method for Information Source Locating with Incomplete Observation of Online Social Network. IIKI 2015: 98-99 - Arwa Alrawais, Abdulrahman Alhothaily, Xiuzhen Cheng:
X.509 Check: A Tool to Check the Safety and Security of Digital Certificates. IIKI 2015: 130-133 - Yulong Bian, Chenglei Yang, Fengqiang Gao, Hanchao Li, Xiaowen Sun, Xiangxu Meng, Yu Wang:
A Physiological Evaluation Model for Flow-Experience in VR Games: Construction and Preliminary Test. IIKI 2015: 244-249 - Quan Chen, Hong Gao, Siyao Cheng, Zhipeng Cai:
Approximate Scheduling and Constructing Algorithms for Minimum-Energy Multicasting in Duty-Cycled Sensor Networks. IIKI 2015: 163-168 - Weiran Chen, Zuoyou Li, Yue Liang, Jiaojiao Chen, Weiping Zhu:
An Asynchronous Distributed Data Collection Approach for Mobile Group Consumption. IIKI 2015: 19-24 - Xiaolu Cheng, Jessica Lu, Wei Cheng:
A Survey on RFID Applications in Vehicle Networks. IIKI 2015: 146-151 - Man Chu, Guomei Zhang, Shihua Zhu, Guobing Li, Gangming Lv:
Interference Coordination Based on Partial Frequency Band Random Allocation in LTE-Advanced HetNet for Internet of Things. IIKI 2015: 152-157 - Xiaoheng Deng, Lifang He, Jinsong Gui, Qionglin Peng, Tingting He:
Modeling and Analysis MAC Layer Performance for IEEE 802.11s Wireless Mesh Network in Smart Grid. IIKI 2015: 280-283 - Hong Ding, Lin Cao, Hongjun Qiu, Zhangbing Zhou, Lei Shu, Yizhi Ren:
Reputation-Based Conditional Investment Enhances the Evolution of Cooperation in Spatial Public Goods Game. IIKI 2015: 90-93 - Hong Ding, Yao Zhang, Haiyang Hu, Lei Shu, Yizhi Ren:
Insurance Strategy Can Promote Cooperation in the Presence of Antisocial Punishment in Public Goods Game. IIKI 2015: 86-89 - Shihui Duan, Wei Gao, Junping Wang:
A Novel Network Control Architecture for Large Scale Machine in Industrial Internet. IIKI 2015: 229-232 - Li Feng, Jiguo Yu:
A Novel Scheme for Wireless Hot-Spot Networks. IIKI 2015: 284-287 - Yuan Gao, Hong Ao, Quan Zhou, Jian Chu, Bo Zhou, Weigui Zhou, Yi Li:
Optimal Backhaul Resource Allocation with User Pairing in Uplink Coordinated Multicarrier Networks. IIKI 2015: 175-180 - Yuntao Gou, Gang Du, Ning Wang, Dongxia Zhang:
The Design and Realization of a Rotary Inverted Pendulum Based on STM32. IIKI 2015: 185-188 - Lin Wei Guo, Wu Shuo Chen, Wu Hai Yan, Qi Yuan Hua, Mu Chang Li:
Fluidized Bed Agglomeration Diagnose Based on Wavelet Packet Entropy and Gaussian Test. IIKI 2015: 54-57 - Yanqing He, Ying Li, Ling'en Meng:
A New Method of Creating Patent Technology-Effect Matrix Based on Semantic Role Labeling. IIKI 2015: 58-61 - Jian-Hui Huang, Jingping Bi:
A Proportional Fairness Scheduling for Wireless Sensor Networks. IIKI 2015: 266-271 - Dou Hui, Yong Qi, Wei Wei, Houbing Song:
Minimizing Electricity Bills for Geographically Distributed Data Centers with Renewable and Cooling Aware Load Balancing. IIKI 2015: 210-214 - Cun Ji, Shijun Liu, Chenglei Yang, Lei Wu, Li Pan:
IBDP: An Industrial Big Data Ingestion and Analysis Platform and Case Studies. IIKI 2015: 223-228 - Tianjie Jiang, ZhangBing Zhou:
Innovations and Applications in Urban Planning of Smarter City. IIKI 2015: 25-28 - Anton Kos, Anton Umek, Saso Tomazic:
Comparison of Smartphone Sensors Performance Using Participatory Sensing and Cloud Application. IIKI 2015: 181-184 - Xiaoxia Li:
Pansystems Field Problem in Computer Science. IIKI 2015: 45-49 - Pei Li, Jiajun Cheng, Yingwen Chen, Hui Wang:
Analysis of Degree Distribution for a Duplication Model of Social Networks. IIKI 2015: 189-192 - Wanyu Li, Qinghe Du, Lingjia Liu, Pinyi Ren, Yichen Wang, Li Sun:
Dynamic Allocation of RACH Resource for Clustered M2M Communications in LTE Networks. IIKI 2015: 140-145 - Zhen Li, Tao Jing, Yan Huo, Jin Qian:
Worst-Case Jamming for Secure Communications in Multi-antenna Cooperative Cognitive Radio Networks with Energy Harvesting. IIKI 2015: 110-115 - Deng-ao Li, Wen-Hui Niu, Ju-Min Zhao, Shuai Li:
Compression Sensing Acquisition of Beidou Signal Based on MapReduce. IIKI 2015: 70-73 - Qian Li, Weiguo Wu, Zeyu Sun, Lei Wang, Jianhang Huang, Xiaxin Zhou:
A Novel Hierarchal Scheduling Strategy for Rendering System. IIKI 2015: 206-209 - Zhuorong Li, Xiaobo Xie, Xi Zhou, Junqi Guo, Rongfang Bie:
A Generic Framework for Human Motion Recognition Based on Smartphones. IIKI 2015: 299-302 - Juan Li, Hao Zhang, Xue-rong Cui, Yongping Xiong:
Analysis on the Characteristics of Timing Synchronization Samples of IEEE 802.11p. IIKI 2015: 219-222 - Hongliang Liang, Dongyang Wu, Yan Song, Daijie Zhang, Lingqing Xia:
PAPDroid: Personalization Awareness Privacy Protection in Android. IIKI 2015: 122-125
skipping 37 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-26 20:24 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint