![](https://dblp.dagstuhl.de/img/logo.ua.320x120.png)
![](https://dblp.dagstuhl.de/img/dropdown.dark.16x16.png)
![](https://dblp.dagstuhl.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
![search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 53 matches
- 2008
- Gaeil An, Kiyoung Kim:
Real-Time IP Checking and Packet Marking for Preventing ND-DoS Attack Employing Fake Source IP in IPv6 LAN. ATC 2008: 36-46 - Armando Astarloa
, Unai Bidarte
, Jaime Jimenez, Jesús Lázaro
, Iñigo Martínez de Alegría:
Secure Ethernet Point-to-Point Links for Autonomous Electronic Ballot Boxes. ATC 2008: 603-614 - Stefano Bistarelli
, Fabio Martinelli, Francesco Santini
:
A Semantic Foundation for Trust Management Languages with Weights: An Application to the RTFamily. ATC 2008: 481-495 - Alberto Caballero, Juan A. Botía
, Antonio Fernandez Gómez-Skarmeta
:
Adaptability of the TRSIM Model to Some Changes in Agents Behaviour. ATC 2008: 403-417 - Erdal Cayirci:
Sensor Network Applications Implemented by Industry and Their Security Challenges. ATC 2008: 1 - Yue-Shan Chang, Tong-Ying Juang, Chen-Yi Su:
Wireless Sensor Network Assisted Dynamic Path Planning for Transportation Systems. ATC 2008: 615-628 - Lin-Huang Chang, Chun-Hui Sung, Shih-Yi Chiu, Jiun-Jian Liaw:
Intelligent VoIP System in Ad-Hoc Network with Embedded Pseudo SIP Server. ATC 2008: 641-654 - Xiaowei Chen, Kaiyong Zhao, Xiaowen Chu:
SepRep: A Novel Reputation Evaluation Model in Peer-to-Peer Networks. ATC 2008: 86-99 - Hung-Chi Chu, Yi-Ting Hsu, Yong-Hsun Lai:
A Weighted Routing Protocol Using Grey Relational Analysis for Wireless Ad Hoc Networks. ATC 2008: 655-663 - Christoph Dorn, Hong Linh Truong, Schahram Dustdar
:
Measuring and Analyzing Emerging Properties for Autonomic Collaboration Service Adaptation. ATC 2008: 162-176 - Hiroyuki Eto, Tadashi Dohi
, Jianhua Ma:
Simulation-Based Optimization Approach for Software Cost Model with Rejuvenation. ATC 2008: 206-218 - Kieran Greer, Matthias Baumgarten, Chris D. Nugent
, Maurice D. Mulvenna
, Kevin Curran
:
Autonomous Querying for Knowledge Networks. ATC 2008: 249-263 - Chunmei Gui, Quanyuan Wu, Huaimin Wang, Jian Qiang:
Towards Trustworthiness Establishment: A D-S Evidence Theory Based Scorer Reliability Tuned Method for Dishonest Feedback Filtering. ATC 2008: 444-454 - Hadi Hemmati, Rasool Jalili:
Self-reconfiguration in Highly Available Pervasive Computing Systems. ATC 2008: 289-301 - Mike Hinchey
, Emil Vassev:
An Evaluation Study of the Effectiveness of Modeling NASA Swarm-Based Exploration Missions with ASSL. ATC 2008: 316-330 - Shang-Lin Hsieh, Pei-Da Wu, I-Ju Tsai, Bin-Yuan Huang:
A Recoverable Semi-fragile Watermarking Scheme Using Cosine Transform and Adaptive Median Filter. ATC 2008: 629-640 - Ning Hu, Peng Zou, Peidong Zhu, Xin Liu:
Cooperative Management Framework for Inter-domain Routing System. ATC 2008: 567-576 - Martin Gilje Jaatun
, Eirik Albrechtsen, Maria B. Line, Stig Ole Johnsen, Irene Wærø, Odd Helge Longva, Inger Anne Tøndel:
A Study of Information Security Practice in a Critical Infrastructure Application. ATC 2008: 527-539 - Martin Gilje Jaatun
, Tor Olav Grøtan, Maria B. Line:
Secure Safety: Secure Remote Access to Critical Safety Systems in Offshore Installations. ATC 2008: 121-133 - Bojan Jakimovski, Erik Maehle:
Artificial Immune System Based Robot Anomaly Detection Engine for Fault Tolerant Robots. ATC 2008: 177-190 - Florian Kluge, Jörg Mische, Sascha Uhrig, Theo Ungerer:
An Operating System Architecture for Organic Computing in Embedded Real-Time Systems. ATC 2008: 343-357 - Maryna Komarova, Michel Riguidel:
Adjustable Trust Model for Access Control. ATC 2008: 429-443 - Zhengxin Lu, Chen Huang, Furong Wang, Chunming Rong
:
SEMAP: Improving Multipath Security Based on Attacking Point in Ad Hoc Networks. ATC 2008: 134-148 - Hein Meling:
Annotation Markers for Runtime Replication Protocol Selection. ATC 2008: 496-506 - Reinhard Mörgenthaler, Markus Zeller, Josef Jiru:
Towards an Autonomic Peer-to-Peer Middleware for Wireless Sensor Networks. ATC 2008: 358-372 - Christoffer Norvik, John P. Morrison, Dan C. Marinescu, Chen Yu, Gabriela M. Marinescu, Howard Jay Siegel:
Managing Contracts in Pleiades Using Trust Management. ATC 2008: 470-480 - Juryon Paik
, Junghyun Nam, Hee Yong Youn, Ung-Mo Kim:
Discovery of Useful Patterns from Tree-Structured Documents with Label-Projected Database. ATC 2008: 264-278 - Shunshan Piao, Jeongmin Park, Eunseok Lee
:
Performance Problem Determination Using Combined Dependency Analysis for Reliable System. ATC 2008: 577-587 - Holger Prothmann, Fabian Rochner, Sven Tomforde, Jürgen Branke, Christian Müller-Schloer, Hartmut Schmeck
:
Organic Control of Traffic Lights. ATC 2008: 219-233 - Benjamin Satzger, Andreas Pietzowski, Wolfgang Trumler, Theo Ungerer:
Using Automated Planning for Trusted Self-organising Organic Computing Systems. ATC 2008: 60-72
skipping 23 more matches
loading more results
failed to load more results, please try again later
![](https://dblp.dagstuhl.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-29 01:47 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint