Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 143 matches
- 2010
- Hiroyuki Agatsuma, Takehiko Abe, Takuya Tajima, Haruhiko Kimura:
Development of Detection System for the Bed Accident Using Ultrasonic Wave Sensor. BWCCA 2010: 766-771 - Akram Ben Ahmed, Ben Abdallah Abderazek, Kenichi Kuroda:
Architecture and Design of Efficient 3D Network-on-Chip (3D NoC) for Custom Multicore SoC. BWCCA 2010: 67-73 - Ailixier Aikebaier, Tomoya Enokido, Makoto Takizawa:
Reliable Message Broadcast Schemes in Distributed Agreement Protocols. BWCCA 2010: 242-249 - Mohammad Reza Akhondi, Alex Talevski, Tsung-Hsien Chou:
Prototype Design and Analysis of Wireless Vibration Sensor. BWCCA 2010: 818-823 - Mohammad Reza Akhondi, Alex Talevski, Tsung-Hsien Chou:
Criteria for Hardware Selection of Wireless Vibration Sensor. BWCCA 2010: 836-841 - Hironori Ando, Leonard Barolli, Arjan Durresi, Fatos Xhafa, Akio Koyama:
An Intelligent Fuzzy-Based Cluster Head Selection System for WSNs and Its Performance Evaluation for D3N Parameter. BWCCA 2010: 648-653 - K. G. Aravind, M. M. Manohara Pai:
A Novel Adaptable Routing Protocol for Wireless Sensor Networks. BWCCA 2010: 373-378 - Daisuke Asahizawa, Yoshitaka Shibata:
Multihopped Wireless Disaster Information Network by Automatic Directional Antenna Control Method. BWCCA 2010: 328-333 - Muhammad Ayaz, Azween B. Abdullah, Ibrahima Faye:
Hop-by-Hop Reliable Data Deliveries for Underwater Wireless Sensor Networks. BWCCA 2010: 363-368 - Admir Barolli, Makoto Takizawa, Fatos Xhafa, Leonard Barolli:
Application of Genetic Algorithms for QoS Routing in Mobile Ad Hoc Networks: A Survey. BWCCA 2010: 250-259 - Mourad Benkaci, Andrei Doncescu, Bruno Jammes:
Feature Selection for Fault Diagnosis Using Fuzzy-ARTMAP Classification and Conflict Intersection. BWCCA 2010: 495-500 - Mohammed Boujettif, Yongge Wang:
Constructivist Approach to Information Security Awareness in the Middle East. BWCCA 2010: 192-199 - Aniello Castiglione, Giuseppe Cattaneo, Maurizio Cembalo, Umberto Ferraro Petrillo:
Source Camera Identification in Real Practice: A Preliminary Experimentation. BWCCA 2010: 417-422 - Aniello Castiglione, Alfredo De Santis, Ugo Fiore, Francesco Palmieri:
An Enhanced Firewall Scheme for Dynamic and Adaptive Containment of Emerging Security Threats. BWCCA 2010: 475-481 - Osman Ceylan, Kazim Firat Taraktas, H. Bulent Yagci:
Enhancing RSSI Technologies in Wireless Sensor Networks by Using Different Frequencies. BWCCA 2010: 369-372 - Hsuan T. Chang, Chang-Sian Chen, Chun-Wen Hung, Day-Fann Shen:
Frequency Domain Analysis of Human Motions in Surveillance Video. BWCCA 2010: 522-526 - Chuan-Yu Chang, Shang-Cheng Li, Pau-Choo Chung, Jui-Yi Kuo, Yung-Chin Tu:
Automatic Facial Skin Defect Detection System. BWCCA 2010: 527-532 - Ben-Jye Chang, Ying-Hsin Liang, Shou-Chi Liang:
Fast Seamless Secure Handoff for Loosely Coupled Systems in Heterogeneous Wireless Mobile Networks. BWCCA 2010: 511-516 - Chin-Ling Chen, Jinn-ke Jan, Chih-Feng Chien:
Based on Mobile RFID Device to Design a Secure Mutual Authentication Scheme for Market Application. BWCCA 2010: 423-428 - Tzung-Her Chen, Yao-Sheng Lee, Ci-Lin Li:
High-Capacity Multi-secret Sharing by Random Grid. BWCCA 2010: 459-462 - Hsing-Chung Chen, Jai-Zong Sun, Zhen-Dong Wu:
Dynamic Forensics System with Intrusion Tolerance Based on Hierarchical Coloured Petri-nets. BWCCA 2010: 660-665 - Chia-Hsin Cheng, Kai-Jie Chen, Gwo-Ruey Lee, Yung-Fa Huang:
Phase Error Cancellation for OFDM Systems Using Adaptive Filters. BWCCA 2010: 643-647 - Yong-Do Choi, Jae-Hyun Jun, Gi-Beom Kil, Sung-Ho Kim:
Bandwidth Reservation Method to Consider Reservation Failure in VLAN. BWCCA 2010: 175-180 - Arjan Durresi, Mimoza Durresi, Zeynep Salih, Leonard Barolli:
Secure Hybrid Communications for Medical Applications. BWCCA 2010: 286-292 - Tomoya Enokido, Ailixier Aikebaier, Makoto Takizawa:
Energy-Efficient Server Selection Algorithms for Network Applications. BWCCA 2010: 159-166 - Jason B. Ernst, Thabo K. R. Nkwe:
Adaptive Mixed Bias Resource Allocation for Wireless Mesh Networks. BWCCA 2010: 622-626 - Hiroyuki Fujioka, Hiroyuki Kano, Sousuke Kakehi:
Character Modeling and Calligraphic Learning by Haptic Device. BWCCA 2010: 737-742 - Kiyotaka Fujisaki, Goshi Satoh, Mitsuo Tateiba:
Relations among 10-Minute Precipitation, Rainfall Intensity and Ku-Band Rain Attenuation in Kyushu Island, Japan. BWCCA 2010: 581-586 - Shigeru Fujita, Kenji Sugawara:
An OWL-Based Ontology to Represent Knowledge about Location, Space and Perceputual Primitives. BWCCA 2010: 780-781 - Keisuke Fujiwara, Yoshinari Nomura, Hideo Taniguchi:
A Mailing List Management System Mashing-Up with Web Services. BWCCA 2010: 695-700
skipping 113 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-19 21:30 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint