Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 266 matches
- 2014
- Omar B. Abdul-Ghafoor, Mahamod Ismail, Rosdiadee Nordin, Musbah Shaat:
Resource Allocation in Multiuser Multi-Carrier Cognitive Radio Network via Game and Supermarket Game Theory: Survey, Tutorial, and Open Research Directions. KSII Trans. Internet Inf. Syst. 8(11): 3674-3710 (2014) - Muntadher Qasim Abdulhasan, Mustafa Ismael Salman, Chee Kyun Ng, Nor Kamariah Noordin, Shaiful J. Hashim, Fazirulhisham Hashim:
Review of Channel Quality Indicator Estimation Schemes for Multi-User MIMO in 3GPP LTE/LTE-A Systems. KSII Trans. Internet Inf. Syst. 8(6): 1848-1868 (2014) - Muhammad Khalil Afzal, Byung-Seo Kim, Sung Won Kim:
A Leader-Based Reliable Multicast MAC Protocol for Multimedia Applications. KSII Trans. Internet Inf. Syst. 8(1): 183-195 (2014) - Hyunchul Ahn, Seongjin Kim, Jae Kyeong Kim:
GA-optimized Support Vector Regression for an Improved Emotional State Estimation Model. KSII Trans. Internet Inf. Syst. 8(6): 2056-2069 (2014) - G. Akilarasu, S. Mercy Shalinie:
Trust Based Authentication and Key Establishment for Secure Routing in WMN. KSII Trans. Internet Inf. Syst. 8(12): 4661-4676 (2014) - Abdulmalek Al-Hemyari, Mahamod Ismail, Rosilah Hassan, Sabri Saeed:
Lightweight Multicast Routing Based on Stable Core for MANETs. KSII Trans. Internet Inf. Syst. 8(12): 4411-4431 (2014) - Salman Ali, Saad B. Qaisar, Emad A. Felemban:
imensioning of Linear and Hierarchical Wireless Sensor Networks for Infrastructure Monitoring with Enhanced Reliability. KSII Trans. Internet Inf. Syst. 8(9): 3034-3055 (2014) - Mallikarjun Avula, Sanggon Lee, Seong-Moo Yoo:
Security Framework for Hybrid Wireless Mesh Protocol in Wireless Mesh Networks. KSII Trans. Internet Inf. Syst. 8(6): 1982-2004 (2014) - Aisha Azeem, Muhammad Sharif, Jamal Hussain Shah, Mudassar Raza:
Face Recognition Invariant to Partial Occlusions. KSII Trans. Internet Inf. Syst. 8(7): 2496-2511 (2014) - Tamer M. Barakat:
A New Sender-Side Public-Key Deniable Encryption Scheme with Fast Decryption. KSII Trans. Internet Inf. Syst. 8(9): 3231-3249 (2014) - Zdenek Becvar, Jan Plachy:
Radio Resource Sharing Among Users in Hybrid Access Femtocells. KSII Trans. Internet Inf. Syst. 8(8): 2590-2606 (2014) - Sahana Bhosale, Rohin D. Daruwala:
Multi-criteria Vertical Handoff Decision Algorithm Using Hierarchy Modeling and Additive Weighting in an Integrated WiFi/WiMAX/UMTS Environment- A Case Study. KSII Trans. Internet Inf. Syst. 8(1): 35-57 (2014) - Hye Won Byun, Sung-Ho Chin, Kwang-Sik Chung:
Design and Implementation of Repeatable and Short-spanned m-Learning Model for English Listening and Comprehension Mobile Digital TextbookContents on Smartphone. KSII Trans. Internet Inf. Syst. 8(8): 2814-2832 (2014) - Chul-Hoon Byun, Chang-Kyun Jeon, Taek Lee, Hoh Peter In:
Self-adaptive testing to determine sample size for flash memory solutions. KSII Trans. Internet Inf. Syst. 8(6): 2139-2151 (2014) - Young-Joon Chai, Hyun-Ki Hong, TaeYong Kim:
Disjoint Particle Filter to Track Multiple Objects in Real-time. KSII Trans. Internet Inf. Syst. 8(5): 1711-1725 (2014) - Chi-Shiang Chan, Yung-Chen Chou, Yi-Hui Chen, Yuan-Yu Tsai:
Role-Balance Based Multi-Secret Images Sharing using Boolean Operations. KSII Trans. Internet Inf. Syst. 8(5): 1785-1800 (2014) - Hon-Hang Chang, Yung-Chen Chou, Timothy K. Shih:
Indicator Elimination for Locally Adaptive Scheme Using Data Hiding Technique. KSII Trans. Internet Inf. Syst. 8(12): 4624-4642 (2014) - Chin-Chen Chang, Thai Son Nguyen, Chia-Chen Lin:
Reversible Data Hiding Scheme for VQ Indices Based on Absolute Difference Trees. KSII Trans. Internet Inf. Syst. 8(7): 2572-2589 (2014) - Zamree Che-aron, Aisha Hassan Abdalla, Khaizuran Abdullah, Md. Arafatur Rahman:
FTCARP: A Fault-Tolerant Routing Protocol for Cognitive Radio Ad Hoc Networks. KSII Trans. Internet Inf. Syst. 8(2): 371-388 (2014) - Jeanne Chen, Tung-Shou Chen, Wien Hong, Gwoboa Horng, Han-Yan Wu, Chih-Wei Shiu:
A New Reference Pixel Prediction for Reversible Data Hiding with Reduced Location Map. KSII Trans. Internet Inf. Syst. 8(3): 1105-1118 (2014) - Yihong Chen, Quanyuan Feng:
An Efficient Anti-collision Algorithm for the EPCglobal Class-1 Generation-2 System under the Dynamic Environment. KSII Trans. Internet Inf. Syst. 8(11): 3997-4015 (2014) - Rui Chen, Minghu Wu, Jie Yang, Xiongli Rui:
Priority-based Unequal Error Protection Scheme of Data partitioned H.264 video with Hierarchical QAM. KSII Trans. Internet Inf. Syst. 8(11): 4189-4202 (2014) - Ji-Jian Chin, Swee-Huay Heng, Raphael C.-W. Phan:
An Efficient and Provable Secure Certificateless Identification Scheme in the Standard Model. KSII Trans. Internet Inf. Syst. 8(7): 2532-2553 (2014) - Hye-Jeong Cho, Chae-Bong Sohn, Seoung-Jun Oh:
Video Content-Based Bit Rate Estimation Scheme for Transcoding in IPTV Services. KSII Trans. Internet Inf. Syst. 8(3): 1040-1057 (2014) - Yongjoo Cho, Ki-Young Seo, Kyoung Shin Park:
Enhancing Depth Accuracy on the Region of Interest in a Scene for Depth Image Based Rendering. KSII Trans. Internet Inf. Syst. 8(7): 2434-2448 (2014) - Young-Min Cho, Janghoon Yang, Jeong-Wook Seo, Dong Ku Kim:
Sum MSE Minimization for Downlink Multi-Relay Multi-User MIMO Network. KSII Trans. Internet Inf. Syst. 8(8): 2722-2742 (2014) - Mi-Jung Choi, Jun-Sang Park, Myung-Sup Kim:
Integrated Internet Application-level Traffic Classification. KSII Trans. Internet Inf. Syst. 8(3): 838-856 (2014) - M. Sanaullah Chowdhury, Pervez Khan, Jai-Jin Jung, Kyung Sup Kwak:
Modeling Slotted Aloha of WBAN in Non-Saturated Conditions. KSII Trans. Internet Inf. Syst. 8(6): 1901-1913 (2014) - Jong-Moon Chung, Chang Hyun Kim, Daeyoung Lee:
A Minimum Energy Consuming Mobile Device Relay Scheme for Reliable QoS Support. KSII Trans. Internet Inf. Syst. 8(2): 618-633 (2014) - Yongwha Chung, Haelyeon Kim, Hansung Lee, Daihee Park, Taewoong Jeon, Hong-Hee Chang:
A Cost-Effective Pigsty Monitoring System Based on a Video Sensor. KSII Trans. Internet Inf. Syst. 8(4): 1481-1498 (2014)
skipping 236 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-03-19 07:33 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint