Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 347 matches
- 2008
- Mojtaba Abolghasemi, Hassan Aghaeinia, Karim Faez, Mohammad Ali Mehrabi:
Steganalysis of LSB Matching Based on Co-occurrence Matrix and Removing Most Significant Bit Planes. IIH-MSP 2008: 1527-1530 - Shiraz Ahmad, Zhe-Ming Lu:
Intelligent Watermark Recovery Using Spatial Domain Extension. IIH-MSP 2008: 735-739 - Ang Li, Nannan Geng, Hong Gao:
Design and Implementation of A New Practical Grid. IIH-MSP 2008: 933-936 - Naofumi Aoki:
A Technique of Lossless Steganography for G.711 Telephony Speech. IIH-MSP 2008: 608-611 - Janani Arthanari, Arputharaj Kannan:
ASCON - A Synchronization-Concurrency Control Model For Distributed Multimedia Systems. IIH-MSP 2008: 1557-1560 - Nima Asadi, Mansour Jamzad, Hedieh Sajedi:
Improvements of Image-Steganalysis Using Boosted Combinatorial Classifiers and Gaussian High Pass Filtering. IIH-MSP 2008: 1508-1511 - Yusuke Atomori, Isao Echizen, Hiroshi Yoshiura:
Picture Watermarks Surviving General Affine Transformation and Random Distortion. IIH-MSP 2008: 315-318 - Linda Yunlu Bai, Yongfeng Huang, Guannan Hou, Bo Xiao:
Covert Channels Based on Jitter Field of the RTCP Header. IIH-MSP 2008: 1388-1391 - Wansu Bao, Yun Wei:
A Forward Secure Ring Signature Scheme. IIH-MSP 2008: 215-218 - Abdelhamid Benhocine, Lamri Laouamer, Laurent Nana, Anca Pascu:
A New Approach against Color Attacks of Watermarked Images. IIH-MSP 2008: 969-972 - Jing Bi, Shu-Chang Liu:
A Speaker Identification System for Video Content Analysis. IIH-MSP 2008: 200-203 - Halvor Borgen, Patrick Bours, Stephen D. Wolthusen:
Visible-Spectrum Biometric Retina Recognition. IIH-MSP 2008: 1056-1062 - Larbi Boubchir, Ayoub Otmani, Nadia Zerida:
The 2nd BOWS Contest: Wavelet-Based Bayesian Denoising Attack on Image Watermarking. IIH-MSP 2008: 473-476 - Patrick Bours, Kirsi Helkala:
Face Recognition Using Separate Layers of the RGB Image. IIH-MSP 2008: 1035-1042 - Chin-Chen Chang, Shih-Chang Chang:
An Improved Authentication Key Agreement Protocol Based on Elliptic Curve for Wireless Mobile Networks. IIH-MSP 2008: 1375-1378 - Feng-Cheng Chang, Chin-Yuan Chang, Hsueh-Ming Hang:
A Study on the Meta-data Design for Long-Term Digital Multimedia Preservation. IIH-MSP 2008: 95-98 - Feng-Cheng Chang, Hsueh-Ming Hang:
An Improved Presentation Method for Relevance Feedback in a Content-Based Image Retrieval System. IIH-MSP 2008: 91-94 - Chin-Chen Chang, Chia-Chen Lin, T. Hoang Ngan Le, Hoai Bac Le:
A New Probabilistic Visual Secret Sharing Scheme for Color Images. IIH-MSP 2008: 1305-1308 - Cheung-Wen Chang, Yung-Nien Sun:
Hand Detections Based on Invariant Skin-Color Models Constructed Using Linear and Nonlinear Color Spaces. IIH-MSP 2008: 577-580 - Shengbing Che, Bin Ma, Zuguo Che:
An Adaptive and Fragile Image Watermarking Algorithm Based on Composite Chaotic Iterative Dynamic System. IIH-MSP 2008: 159-162 - Chao-Yu Chen, Chao-Ho Chen, Tien-Hsiang Huang, Chin-Hsing Chen:
An Adaptive Image Frequency Subbanding Method for High-Frequency Pixel Estimation. IIH-MSP 2008: 643-646 - Tsong-Yi Chen, Thou-Ho Chen, Yin-Ting Lin, Yin-Chan Chang, Da-Jinn Wang:
H.264 Video Authentication Based on Semi-fragile Watermarking. IIH-MSP 2008: 659-662 - Hsi-Kuan Chen, Chin-Hsing Chen, Shih-Jen Wang:
Robust Superresolution Reconstruction from Compressed Video Sequences with Occlusion. IIH-MSP 2008: 639-642 - Meihua Chen, Liang He, Xueming Cai, Weiwei Xia:
Trust Evaluation Model for Composite Service Based on Subjective Logic. IIH-MSP 2008: 1482-1485 - Zu-jue Chen, Wei Jia, Zhi-xiong Zhang:
Video Monitoring System Based on Amending Model of Motion Vector. IIH-MSP 2008: 822-825 - Lishui Chen, Guizhong Liu:
A Delivery System for Scalable Video Streaming Using the Scalability Extension of H.264/AVC over DiffServ Networks. IIH-MSP 2008: 665-669 - Fang Chen, Wei Li, Xiaoqiang Li:
Audio Quality-Based Authentication Using Wavelet Packet Decomposition and Best Tree Selection. IIH-MSP 2008: 1265-1268 - Yen-Wei Chen, Shouta Sobue, Xinyin Huang:
Mapping Functions of Color Image Features and Human KANSEI. IIH-MSP 2008: 725-728 - Duan-Yu Chen, Hsiao-Rong Tyan, Sheng-Wen Shih, Hong-Yuan Mark Liao:
Dynamic Visual Saliency Modeling for Video Semantics. IIH-MSP 2008: 188-191 - Yuan-Bo Chen, Chih-Jen Yang, Gwo-Jia Jong:
Intelligent Campus Multi-application RFID Integration System. IIH-MSP 2008: 504-507
skipping 317 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-20 05:08 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint