Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 24 matches
- 2020
- Jianfeng Che, Bo Wang, Shitao Chen:
Analysis of data mining method for short-term wind measurement of wind farm based on multi-technology fusion. Int. J. Inf. Commun. Technol. 17(3): 211-225 (2020) - Bin Dai:
Research on security monitoring system for wind-solar complementary power generation based on internet of things. Int. J. Inf. Commun. Technol. 17(1): 91-106 (2020) - Tianming Feng, Lin Chen, Dahang Fan:
Network teaching target classification system based on cloud computing technology. Int. J. Inf. Commun. Technol. 17(3): 226-241 (2020) - Ahmed Ghenabzia, Okba Kazar, Abdelhak Merizig, Zaoui Sayah, Merouane Zoubeidi:
Multi-agent approach for data mining-based bagging ensembles to improve the decision process for big data. Int. J. Inf. Commun. Technol. 17(4): 380-402 (2020) - Chao-sheng Han:
Modelling the impact of communication technology on e-commerce operation mode. Int. J. Inf. Commun. Technol. 17(3): 242-256 (2020) - Zohra Hmidi, Laïd Kahloul, Saber Benharzallah:
Using priced timed automata for the specification and verification of CSMA/CA in WSNs. Int. J. Inf. Commun. Technol. 17(2): 129-145 (2020) - Pu Chuan Hsian, Ezra Morris Abraham Gnanamuthu, Fook Loong Lo, Mau-Luen Tham:
Reduced complexity per-survivor iterative timing recovery using max-log-MAP algorithm. Int. J. Inf. Commun. Technol. 17(2): 146-163 (2020) - Vivekanand Jha, Amar Kumar Mohapatra, Nupur Prakash:
An energy efficient and load balanced sink mobility for wireless sensor networks. Int. J. Inf. Commun. Technol. 17(1): 65-90 (2020) - Li Li, Ya-fang Zhai, Hong-jie Li:
Research on improved modulation routing and spectrum allocation algorithm in elastic optical networks. Int. J. Inf. Commun. Technol. 17(1): 53-64 (2020) - Xiaofeng Liu:
Symbolic feature extraction of art graphics based on time constraint. Int. J. Inf. Commun. Technol. 17(2): 194-209 (2020) - Tu-Trinh Thi Nguyen, Dinh-Thuan Do:
Impact of co-channel interference on performance of power domain-based multiple access. Int. J. Inf. Commun. Technol. 17(3): 274-287 (2020) - Minh-Sang Van Nguyen, Thi-Anh Hoang, Dinh-Thuan Do:
MISO assisted multiple access by removing orthogonal: enabling D2D transmission and performance analysis. Int. J. Inf. Commun. Technol. 17(4): 364-379 (2020) - Chiyu Pan:
Parallel mining method for symbol application features of complex network images. Int. J. Inf. Commun. Technol. 17(1): 37-52 (2020) - Savita, D. K. Lobiyal:
Inter-contact delay and location information-based routing with adaptive threshold buffer management for delay tolerant networks. Int. J. Inf. Commun. Technol. 17(4): 307-328 (2020) - Mridusmita Sharma, Kandarpa Kumar Sarma:
Deep features-based dialect and mood recognition using Assamese telephonic speech. Int. J. Inf. Commun. Technol. 17(4): 343-363 (2020) - Xiang Sun, Qianmu Li:
Research on automatic annotation of pathological image detail information based on machine learning. Int. J. Inf. Commun. Technol. 17(4): 329-342 (2020) - Rosy Swami, Prodipto Das:
An effective secure data retrieval approach using trust evaluation: HBSEE-CBC. Int. J. Inf. Commun. Technol. 17(4): 403-421 (2020) - Yingjie Wang, Kuanjiu Zhou, Jie Pan, Mingchu Li:
Interrupt nesting method based on time slice in embedded software. Int. J. Inf. Commun. Technol. 17(2): 107-128 (2020) - Shu Xu:
Research on anomaly detection method for hybrid big data subarea based on ant colony algorithm. Int. J. Inf. Commun. Technol. 17(2): 164-177 (2020) - Hao Yang, Wen Cai, Yibo Xia, Wenhua Ouyang, Xin Xie:
Identity authentication system for mobile terminal equipment based on SDN network. Int. J. Inf. Commun. Technol. 17(3): 257-273 (2020) - Bai Yun, Wandong Cai:
Trust circle recommended model based on different fields. Int. J. Inf. Commun. Technol. 17(1): 1-21 (2020) - Lishou Zhang, Yiyi Liu, Shaojun Shen:
Construction of performance monitoring model for cloud computing service platform based on label technology. Int. J. Inf. Commun. Technol. 17(2): 178-193 (2020) - Yucai Zhou, Zhimin Lv, Yuelin Li, Jiangchun Mo:
Research on highway vehicle detection algorithm based on video image. Int. J. Inf. Commun. Technol. 17(1): 22-36 (2020) - Guiming Zhu:
Research on detection method of abnormal capital transfer in electronic commerce based on machine learning. Int. J. Inf. Commun. Technol. 17(3): 288-305 (2020)
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-09 07:43 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint