


default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 240 matches
- 2014
- Masato Akagi, Xiao Han, Reda Elbarougy
, Yasuhiro Hamada, Junfeng Li:
Emotional Speech Recognition and Synthesis in Multiple Languages toward Affective Speech-to-Speech Translation System. IIH-MSP 2014: 574-577 - Shen Bo, Zhang Huan, Hu Baowen:
Research on Analysis Method of Network User Preference. IIH-MSP 2014: 872-875 - Thach V. Bui, Nguyen K. Vu, Thong T. P. Nguyen, Isao Echizen, Thuc Dinh Nguyen:
Robust Message Hiding for QR Code. IIH-MSP 2014: 520-523 - Chi-Shiang Chan, Yi-Hui Chen, Pei-Yu Lin
:
An Image Hiding Method by Applying Tree Structure on Linking Pixels. IIH-MSP 2014: 110-113 - Chin-Chen Chang, Wei-yi Chen, Ting-Fang Cheng:
A Secure RFID Mutual Authentication Protocol Conforming to EPC Class 1 Generation 2 Standard. IIH-MSP 2014: 642-645 - Kai-Di Chang, Jiann-Liang Chen, Han-Chieh Chao
, Ching Wei Liu:
The Potential Cloud Application Model for Internet of Things - Case Study of Shopping Malls. IIH-MSP 2014: 954-957 - Feng-Cheng Chang
, Hsiang-Cheh Huang
:
Discussions on Implementing Iterative Hard Thresholding Algorithm. IIH-MSP 2014: 17-20 - Hong-Yi Chang, Yu-Huei Huang, Tu-Liang Lin:
A Novel Relay Placement Algorithm Based on Puzzle Games for Indoor Wireless Sensor Networks. IIH-MSP 2014: 682-685 - Hong-Yi Chang, Shih-Chang Huang, Chih-Chun Lai, Zih Huan Hong:
A Novel Recommendation Scheme for Increasing Connectivity in ZigBee Wireless Sensor Networks. IIH-MSP 2014: 674-677 - De Wei Chang, Chin-Feng Lai
, Shih-Yeh Chen, Yueh-Min Huang, Yu-Lin Jeng:
A Concept Maps Oriented E-Book Content Design System for Evaluating Learning Performance. IIH-MSP 2014: 864-867 - Hong-Yi Chang, Hao-Wen Lin, Zih Huan Hong, Tu-Liang Lin:
A Novel Algorithm for Searching Parking Space in Vehicle Ad Hoc Networks. IIH-MSP 2014: 686-689 - Ching-Chun Chang, Yanjun Liu, Thai-Son Nguyen
:
A Novel Turtle Shell Based Scheme for Data Hiding. IIH-MSP 2014: 89-93 - Chen Wei Chang, Wei-Tsong Lee, Hsin-Wen Wei:
FHR-SCTP: The Research of a Quality Aware SCTP Congestion Control Mechanism to Improve Handover Efficiency. IIH-MSP 2014: 654-657 - Heng Yao Chang, Wei-Tsong Lee, Hsin-Wen Wei:
A Novel Protocol UDCP for Improving Fairness and Maintaining the High-Speed Rate of UDP. IIH-MSP 2014: 698-701 - Chia-Wen Chang, Min Da Nian, Yi-Fang Chen, Ching Ho Chi, Chin-Wang Tao:
Design of a Kinect Sensor Based Posture Recognition System. IIH-MSP 2014: 856-859 - Chin-Chen Chang, Chin-Yu Sun:
Polynomial-Based Secret Sharing Scheme Based on the Absolute Moment Block Truncation Coding Technique. IIH-MSP 2014: 485-488 - Ya-Fen Chang, Wei-Liang Tai
, Wei-Na Wu, Wei-Han Li, Yung-Chi Chen:
Comments on Chaotic Maps-Based Password-Authenticated Key Agreement Using Smart Cards. IIH-MSP 2014: 94-97 - Chin-Chen Chang, Hsiao-Ling Wu:
A Large Payload Information Hiding Scheme Using Two-Level Exploiting Modification Direction. IIH-MSP 2014: 512-515 - Chin-Chen Chang, Hsiao-Ling Wu, Ting-Feng Chung:
Applying Histogram Modification to Embed Secret Message in AMBTC. IIH-MSP 2014: 489-492 - Whai En Chen, Bo-En Chen:
An Effective NAT Traversal Mechanism for IMS Applications in 3GPP Networks. IIH-MSP 2014: 889-892 - Whai En Chen, Shih-Yuan Cheng, Yi Lun Ciou:
A Study on Effects of Different Access Modes on Database Performance for SIP Server. IIH-MSP 2014: 902-906 - Chao-Ho Chen, Tsong-Yi Chen, Yu-Chun Lin, Wu-Chih Hu:
Moving-Object Intrusion Detection Based on Retinex-Enhanced Method. IIH-MSP 2014: 281-284 - Tsong-Yi Chen, Chao-Ho Chen, Tzu Feng Tseng, Guan-Ming Luo, Wu-Chih Hu:
HDR Enhancement Based on Bi-curve Mapping for Image Sequences. IIH-MSP 2014: 285-288 - Wen-Yuan Chen, Shih Sung Cheng, Ching-Te Wang, Chin-Fu Tsai, Chiou-Kou Tung:
The Cleaning Machine Path Design Using Image Recognition Techniques. IIH-MSP 2014: 439-442 - Yueh-Hong Chen, Hsiang-Cheh Huang
:
Reversible Image Watermarking Based on Genetic Algorithm. IIH-MSP 2014: 21-24 - Ruey-Maw Chen, Hua Tsun Huang:
Particle Swarm Optimization Enhancement by Applying Global Ratio Based Communication Topology. IIH-MSP 2014: 443-446 - Yan-Haw Chen, Ching-Fu Huang, Shao-I Chu:
A Fast Method for Decoding Reed-Solomon Codes on Processors. IIH-MSP 2014: 293-296 - Yen-Wen Chen, Pei Ying Hsu, Jung Heng Tsai, Po Yin Liao, Meng-Hsien Lin:
A Heuristic Design of Uplink Scheduler in LTE-A Networks. IIH-MSP 2014: 884-888 - Ming-Che Chen, Hui-Tang Lin:
End-to-End Delay Performance Analysis of Anypath Routing over Wireless Mesh Networks. IIH-MSP 2014: 739-743 - Hui-Hui Chen, Hung Sheng Lai, Bor-Jiunn Hwang, Chiao-Wen Kao, Shih-Yu Huang:
Eye Tracking for Analyzing Applied Effects on Instructional Graphics Directing Visual Attention. IIH-MSP 2014: 369-372
loading more results
failed to load more results, please try again later

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
[+][–] Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
[+][–] Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-07-20 00:31 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint
