Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 154 matches
- 2012
- Zhenghai Ai:
A New TOPSIS with Triangular Fuzzy Number and Uncertain Weight Based on Cosines Similar Degree. CIS 2012: 17-21 - Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
Building the Bridges - A Proposal for Merging Different Paradigms in Mobile NFC Ecosystem. CIS 2012: 646-652 - Awad Kh. Al-Asmari, Ahmed S. Salama, Abdullah M. Iliyasu, Mohammed A. Al-Qodah:
A DWT Ordering Scheme for Hiding Data in Images Using Pixel Value Difference. CIS 2012: 553-557 - Yang Cai, Qiuliang Xu, Zhihua Zheng:
A Provably Secure Identity-Based Key Agreement Protocol from Key Encapsulation Scheme. CIS 2012: 636-640 - Ying Cao, Jiachen Liu, Qiguang Miao, Weisheng Li:
Osiris: A Malware Behavior Capturing System Implemented at Virtual Machine Monitor Layer. CIS 2012: 534-538 - Yan Cao, Qiang Wei, Qingxian Wang:
The Method for Parallel Approach to Sensitive Point Based on Dynamic Symbolic Execution. CIS 2012: 661-665 - Liping Chen:
Services Selection of QoS-based Skyline Computation for Web Service Composition. CIS 2012: 601-604 - Lanxiang Chen, Zhen Peng:
The Design Principles for User-centered Remote Data Possession Checking. CIS 2012: 615-618 - Guojian Cheng, Yao An, Zhe Wang, Kai Zhu:
Oil Well Placement Optimization Using Niche Particle Swarm Optimization. CIS 2012: 61-64 - Zhi-Tao Cui, Ke Jian:
A New Algorithm to Estimate Mixing-Matrix of Underdetermined Blind Signal Separation. CIS 2012: 374-377 - Jie Cui, Qiaoyan Wen:
Analysis on Operating Mechanism of SecurityKISS. CIS 2012: 666-669 - Weijun Dai, Ji Ge:
Research on Vision-based Intelligent Vehicle Safety Inspection and Visual Surveillance. CIS 2012: 219-222 - Xiaodong Ding, Quan Wang, Pengfei Yang, Haijing Zhou, Yuyan Huang, Haitao Weng, Zhongbin Pan:
Security System for Internal Network Printing. CIS 2012: 596-600 - Ning Dong, Fei Wei, Yuping Wang:
Preference Based Multiobjective Evolutionary Algorithm for Constrained Optimization Problems. CIS 2012: 65-70 - Yingni Duan, Haifeng Zhang, Hong Lv, Junchu Fang:
Research on the First Class M Subsequence. CIS 2012: 503-506 - Tianxiang Feng:
Computer Realization of Solving n-order Incomplete Four Angles Problem. CIS 2012: 173-176 - Xin-Lei Feng, Liping Jia:
Further Research on Group Consensus of Multi-agent Systems. CIS 2012: 190-194 - Shuang Feng, Yingqiu Ma, Jinquan Li:
A Kind of Nonlinear and Non-convex Optimization Problems under Mixed Fuzzy Relational Equations Constraints with Max-min and Max-average Composition. CIS 2012: 154-158 - Dongmei Fu, Xiao Yu, Tingting Wang:
Segmentation Algorithm Study for Infrared Images with Occluded Target Based on Artificial Immune System. CIS 2012: 350-353 - Wei Gao, Zhenyou Wang:
One-round Tripartite Authenticated Batch-Keys Agreement Protocol from Paring. CIS 2012: 500-502 - Wei Gao, Zhenyou Wang, Fei Li:
On Generic Construction for Private Designated Verifier Signatures. CIS 2012: 497-499 - Xiao Zhi Gao, Jing Wang, Jarno M. A. Tanskanen, Rongfang Bie, Ping Guo:
BP Neural Networks with Harmony Search Method-based Training for Epileptic EEG Signal Classification. CIS 2012: 252-257 - Xiao Zhi Gao, Ying Wu, Xiaolei Wang, Xianlin Huang, Kai Zenger, Xiaofeng Wang:
A Modified PSO Method Based on Cultural Algorithm and Quantum Computing. CIS 2012: 5-10 - Xiao Zhi Gao, Xiaolei Wang, Kai Zenger, Xiaofeng Wang:
A Niching Harmony Search Method for Multi-modal Optimization. CIS 2012: 22-27 - Jianlan Guo, Yuqiang Chen, Chongjie Dong:
The development and implementation of a network-faxing service system. CIS 2012: 619-622 - Jianlan Guo, Yijun Liu, Yuqiang Chen:
Research on reliable on-chip network using asynchronous logic. CIS 2012: 695-698 - Xiaofang Guo, Xiaoli Wang, Mingzhao Wang, Yuping Wang:
A New Objective Reduction Algorithm for Many-Objective Problems: Employing Mutual Information and Clustering Algorithm. CIS 2012: 11-16 - Jun Guo, Liji Wu, Xiangming Zhang, Xiangyu Li:
Design and Implementation of a Fault Attack Platform for Smart IC Card. CIS 2012: 653-656 - Guoxi Han, Jun He, Jianqing Qi:
An Optimization Design Method of Integrated Radar and Jammer Signal Modulated by Bi-phase Sequences of Chaos. CIS 2012: 44-47 - Guoqiang Hang, Yonghui Liao, Yang Yang, Danyan Zhang, Xiaohui Hu:
Neuron-MOS Based Schmitt Trigger with Controllable Hysteresis. CIS 2012: 200-203
skipping 124 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-19 07:47 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint