Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 175 matches
- 2017
- Meng Bi, Andi Wang, Jian Xu, Fucai Zhou:
DDOS Attack Detection System Based on Analysis of Users' Behaviors for Application Layer. CSE/EUC (1) 2017: 596-599 - Ya-Ping Chang, Wei Li, Zhongming Yang:
Network Intrusion Detection Based on Random Forest and Support Vector Machine. CSE/EUC (1) 2017: 635-638 - Hongli Chen:
A Personalized Recommendation Algorithm Based on the Fusion of Trust Relation and Time Series. CSE/EUC (1) 2017: 3-6 - Jinhui Chen, Junying Chen, Huaqing Min:
An Evolutionary Algorithm Using Multi-Strategy Combination for Single Objective Optimization Problem. CSE/EUC (1) 2017: 655-658 - Zhaoyi Chen, Hui Tian, Jing Lu, Fulin Nan, Yiqiao Cai, Tian Wang, Yonghong Chen:
Secure Logging and Public Audit for Operation Behavior in Cloud Storage. CSE/EUC (1) 2017: 444-450 - Xiaoxiao Chen, Xiaodong Yan, Arun:
Development and Design of Micro-Course System Based on Wechat Platform. CSE/EUC (1) 2017: 354-357 - Jianming Cui, Xiaojun Zhang, Yihui Liu, Ning Cao:
A More Secure and Practical Remote User Authentication Scheme for Multi-Server Environment. CSE/EUC (1) 2017: 537-540 - Baojiang Cui, BaiHui Zhang, Kaiyue Wang:
A Data Masking Scheme for Sensitive Big Data Based on Format-Preserving Encryption. CSE/EUC (1) 2017: 518-524 - Yunsheng Deng, Ping Miao, Hongyong Yang:
Cooperation of Improved Hk Networks Based on Prisoner Dilemma Game. CSE/EUC (1) 2017: 23-27 - WuYang Ding, Bo Liu, Yanshan Xiao:
Real-Time Face Recognition Based on Sparse Illumination Learning. CSE/EUC (1) 2017: 272-277 - Yong Ding, Xiumin Li:
Policy Based on Homomorphic Encryption and Retrieval Scheme in Cloud Computing. CSE/EUC (1) 2017: 568-571 - Zhiping Fan, Musheng Cai, Xie Li, Jianfeng Chen:
A New Dynamic Energy-Based Clustering Model for Wireless Sensor Networks. CSE/EUC (1) 2017: 619-622 - Yuanyuan Fan, Qingzhong Liang:
An Improved Method for Detection of the Pedestrian Flow Based on RFID. CSE/EUC (1) 2017: 69-72 - Wangsheng Fang, Hui Wang, Zhongdong Hu:
Filter Anchor Node Localization Algorithm Based on Rssi for Underground Mine Wireless Sensor Networks. CSE/EUC (1) 2017: 673-676 - Yuxiang Feng, Wenhao Wang, Yukai Weng, Huanming Zhang:
A Replay-Attack Resistant Authentication Scheme for the Internet of Things. CSE/EUC (1) 2017: 541-547 - Min Gai, Shanshan Zhao, Yan Li:
Establishment of Data Collection and Transmission Optimization Model Based on TRIZ. CSE/EUC (1) 2017: 165-170 - Yuan Gao, Hong Ao, Zenghui Feng, Weigui Zhou, Su Hu, Xiangyang Li:
Modeling and Practise of Satellite Communication Systems Using Physical Layer Security: A Survey. CSE/EUC (1) 2017: 829-832 - Renchu Guan, Xu Wang, Maurizio Marchese, Yanchun Liang, Chen Yang:
A Feature Space Learning Model Based on Semi-Supervised Clustering. CSE/EUC (1) 2017: 403-409 - Chen Guo, Zhenwei Liu, Zibo Qi, Wei Gao, Ying Wu:
Research on the Frequency Spectrum of Electric Bicycle DC Fault Arc. CSE/EUC (1) 2017: 716-719 - Zhenyu Guo, Yujuan Sun, Muwei Jian:
Three Dimensional Surface Reconstruction Based on the Reference Object and PMS. CSE/EUC (1) 2017: 728-731 - Xi Guo, Yuanzhen Wen, Dongyuan Ma, Yuhui Jin, Haitao Yu:
Research on Scene Parsing Algorithm Cascading Object Detection Network. CSE/EUC (1) 2017: 459-464 - Zhifeng Hao, Ruichu Cai, Yiyang Yang, Wen Wen, Lixin Liang:
A Dynamic Conditional Random Field Based Framework for Sentence-Level Sentiment Analysis of Chinese Microblog. CSE/EUC (1) 2017: 135-142 - Xiaxu He, Pengfei Liu:
Empirical Study on the Construction of a Unified Information System with Big Data Analysis: A Case of Social Work Organizations and Civil Affairs Departments. CSE/EUC (1) 2017: 228-233 - Wei He, Bo Liu, Yanshan Xiao:
Multi-View Action Recognition Method Based on Regularized Extreme Learning Machine. CSE/EUC (1) 2017: 854-857 - Xiaxu He, Pengfei Liu, Weifeng Zhang:
Design and Implementation of a Unified Mooc Recommendation System for Social Work Major: Experiences and Lessons. CSE/EUC (1) 2017: 219-223 - Tianwen He, Hong Wang, Baofang Hu:
Evaluate the Chinese Version of Machine Translation Based on Perplexity Analysis. CSE/EUC (1) 2017: 278-281 - Yinghan Hong, Zhifeng Hao, Guizhen Mai, Bingfeng Chen, Rui Xie:
An Approach for Inferring Causal Directions from Multi-Dimensional Networks. CSE/EUC (1) 2017: 388-392 - Zhao Hong, Guo Nan:
Java Source Code Protection Based on JNI and AES Algorithm. CSE/EUC (1) 2017: 846-849 - Yan-ling Hu:
Analysis on the Internal Control of Enterprise Accounting under Computer Network Environment. CSE/EUC (1) 2017: 712-715 - Guan Hui, Zhang Yan, Bin Zhang, Fahong Yu:
Improved RFID Anti-Collision Algorithm Based on Quad-Tree. CSE/EUC (1) 2017: 171-175
skipping 145 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-03-29 02:09 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint