Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 55 matches
- 2012
- Edson Antonio Batista, L. Gonda, Alexandre C. R. da Silva, Silvano R. Rossi, M. C. Pereira, Aparecido Augusto de Carvalho, C. E. Cugnasca:
HW/SW for an intelligent transducer network based on IEEE 1451 standard. Comput. Stand. Interfaces 34(1): 1-13 (2012) - Rubén Béjar, Miguel Ángel Latre, Javier Nogueras-Iso, Pedro R. Muro-Medrano, F. Javier Zarazaga-Soria:
An RM-ODP enterprise view for spatial data infrastructures. Comput. Stand. Interfaces 34(2): 263-272 (2012) - Piotr Bilski, Wieslaw Winiecki:
Methods of assessing the time efficiency in the virtual measurement systems. Comput. Stand. Interfaces 34(6): 485-492 (2012) - Pavlo Bykovyy, Volodymyr Kochan, Anatoly Sachenko, Serkan Aksoy, George Markowsky:
Security network interface for alarm systems. Comput. Stand. Interfaces 34(6): 468-475 (2012) - César Jesús Pardo Calvache, Francisco J. Pino, Félix García, Mario Piattini, Maria Teresa Baldassarre:
An ontology for the harmonization of multiple standards and models. Comput. Stand. Interfaces 34(1): 48-59 (2012) - Domenico Luca Carnì, Giuseppe Fedele:
Multi-Sine Fitting Algorithm enhancement for sinusoidal signal characterization. Comput. Stand. Interfaces 34(6): 535-540 (2012) - Salvatore Cavalieri:
Modelling and analysing congestion in KNXnet/IP. Comput. Stand. Interfaces 34(3): 305-313 (2012) - Jengchung V. Chen, Fu-Chi Chen, J. Michael Tarn, David C. Yen:
Improving network congestion: A RED-based FuzzyPID approach. Comput. Stand. Interfaces 34(5): 426-438 (2012) - Alexey Cheptsov, Bastian Koller, Davide Adami, Franco Davoli, Szymon Mueller, Norbert Meyer, Paolo Lazzari, Stefano Salon, Johannes Watzl, Michael Schiffers, Dieter Kranzlmüller:
e-Infrastructure for Remote Instrumentation. Comput. Stand. Interfaces 34(6): 476-484 (2012) - Michele Chinosi, Alberto Trombetta:
BPMN: An introduction to the standard. Comput. Stand. Interfaces 34(1): 124-134 (2012) - David C. Chou, Amy Y. Chou:
Awareness of Green IT and its value model. Comput. Stand. Interfaces 34(5): 447-451 (2012) - Ruilong Deng, Jiming Chen, Jialu Fan, Youxian Sun:
A general approach for building Linux on sensor node Imote2. Comput. Stand. Interfaces 34(1): 101-108 (2012) - Jose Ángel Dianes, Manuel Díaz, Bartolomé Rubio:
Using standards to integrate soft real-time components into dynamic distributed architectures. Comput. Stand. Interfaces 34(2): 238-262 (2012) - Nguyen Quoc Dinh, Dong-Sung Kim:
Performance evaluation of priority CSMA-CA mechanism on ISA100.11a wireless network. Comput. Stand. Interfaces 34(1): 117-123 (2012) - Liming Fang, Willy Susilo, Chunpeng Ge, Jiandong Wang:
Hierarchical conditional proxy re-encryption. Comput. Stand. Interfaces 34(4): 380-389 (2012) - Pierre M. Fiorini, Lester Lipsky:
Search marketing traffic and performance models. Comput. Stand. Interfaces 34(6): 517-526 (2012) - Dorian Gorgan, Victor Bacu, Teodor Stefanut, Denisa Rodila, Danut Mihon:
Earth Observation application development based on the Grid oriented ESIP satellite image processing platform. Comput. Stand. Interfaces 34(6): 541-548 (2012) - Domenico Grimaldi, Anatoly Sachenko:
Intelligent DAQ's, advanced computing and interfacing systems. Comput. Stand. Interfaces 34(6): 467 (2012) - Xin He, Ram Kumar, Liping Mu, Terje Gjøsæter, Frank Y. Li:
Formal verification of a Cooperative Automatic Repeat reQuest MAC protocol. Comput. Stand. Interfaces 34(4): 343-354 (2012) - Med Lassaad Kaddachi, Adel Soudani, Vincent Lecuire, Kholdoun Torki, Leila Makkaoui, Jean-Marie Moureaux:
Low power hardware-based image compression solution for wireless camera sensor networks. Comput. Stand. Interfaces 34(1): 14-23 (2012) - Dietrich Kammer, Jan Wojdziak, Thomas Ebner, Ingmar S. Franke, Rainer Groh:
A component-oriented framework for experimental computer graphics. Comput. Stand. Interfaces 34(1): 93-100 (2012) - Yung-Wei Kao, Chia Feng Lin, Kuei-An Yang, Shyan-Ming Yuan:
A Web-based, Offline-able, and Personalized Runtime Environment for executing applications on mobile devices. Comput. Stand. Interfaces 34(1): 212-224 (2012) - Yung-Wei Kao, Shyan-Ming Yuan:
User-configurable semantic home automation. Comput. Stand. Interfaces 34(1): 171-188 (2012) - Monika Kapus-Kolar:
New state-recognition patterns for conformance testing of finite state machine implementations. Comput. Stand. Interfaces 34(4): 390-395 (2012) - Yuan-Cheng Lai, Yen-Hung Chen:
Heuristic algorithms for two-dimensional uplink burst construction in IEEE 802.16 networks. Comput. Stand. Interfaces 34(1): 68-79 (2012) - Gregory S. Lee, Bhavani Thuraisingham:
Cyberphysical systems security applied to telesurgical robotics. Comput. Stand. Interfaces 34(1): 225-229 (2012) - ChunLei Li, Yunhong Wang, Bin Ma, Zhaoxiang Zhang:
Tamper detection and self-recovery of biometric images using salient region-based authentication watermarking scheme. Comput. Stand. Interfaces 34(4): 367-379 (2012) - Wen-Yau Liang, Chun-Che Huang, Tzu-Liang (Bill) Tseng, Yin-Chen Lin, Juotzu Tseng:
The evaluation of intelligent agent performance - An example of B2C e-commerce negotiation. Comput. Stand. Interfaces 34(5): 439-446 (2012) - Jian-Zhu Lu, Jipeng Zhou:
Preventing delegation-based mobile authentications from man-in-the-middle attacks. Comput. Stand. Interfaces 34(3): 314-326 (2012) - Ihor Maykiv, Andrew Stepanenko, D. Wobschall, Roman V. Kochan, Volodymyr Kochan, Anatoly Sachenko:
Software-hardware method of serial interface controller implementation. Comput. Stand. Interfaces 34(6): 509-516 (2012)
skipping 25 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-25 10:29 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint