Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 75 matches
- 2010
- Md. Atiqur Rahman Ahad, Joo Kooi Tan, Hyoungseop Kim, Seiji Ishikawa:
Analysis of Motion Self-Occlusion Problem Due to Motion Overwriting for Human Activity Recognition. J. Multim. 5(1): 36-46 (2010) - Mohiuddin Ahmad, Muhammad Muinul Islam, Lutfunessa Lata, Taohida Taslima, Masayoshi Yamada:
CLG Optical Flow Approach and Frequency Analysis of Cranial Ultrasonogram Image Sequences. J. Multim. 5(1): 47-54 (2010) - Mohiuddin Ahmad, Irine Parvin, Seong-Whan Lee:
Silhouette History and Energy Image Information for Human Movement Recognition. J. Multim. 5(1): 12-21 (2010) - Md. Ashad Alam, Mohammed Nasser, Kenji Fukumizu:
A Comparative Study of Kernel and Robust Canonical Correlation Analysis. J. Multim. 5(1): 3-11 (2010) - Atta Badii, David Fuschi, Meng Zhu:
Migrating from Process Automation to Process Management Support: A Holistic Approach to Software Engineering applied to Media Production. J. Multim. 5(2): 104-109 (2010) - G. M. Beumer, Raymond N. J. Veldhuis:
A Practical Subspace Approach To Landmarking. J. Multim. 5(3): 276-289 (2010) - Fateh Boutekkouk, Mohamed Benmohammed:
Using UML as a Front-end for StreamIt Programs Verification and Generation. J. Multim. 5(5): 501-513 (2010) - Hongming Cai, Xiaoxiong Tian, Nan Li, Boyi Xu:
Framework of Geometry Modeling Integrated Platform based on Services for Large-scale Information Visualization. J. Multim. 5(4): 361-368 (2010) - Chien-Ping Chang, Ko-Chin Chang, Po Chun Chen, Jen-Chun Lee, Te-Ming Tu:
Multi-frame Images Fusion with Image Enhancement for Different Focus Points. J. Multim. 5(5): 528-540 (2010) - Kasturi Chatterjee, Shu-Ching Chen:
A Multimedia Data Management Approach with GeM-Tree. J. Multim. 5(4): 302-309 (2010) - Shengbing Che, Zuguo Che, Xu Shu:
Research on image self-recovery algorithm based on DCT. J. Multim. 5(3): 290-297 (2010) - Wei-Ming Chen, Wen-Lin Chang, Chia-Chen Chang:
Diagnostic System for 3D Ultrasonography Based on Gabor Filter. J. Multim. 5(6): 613-621 (2010) - Xi Chen, Shiguo Lian:
On the DCT Based Joint Fingerprint Embedding and Decryption Scheme. J. Multim. 5(5): 473-480 (2010) - Daniel G. Costa, Sergio Vianna Fialho:
A P2P Architecture to Support Mobile Real-Time Multimedia Communications. J. Multim. 5(5): 514-521 (2010) - Weihui Dai:
Multi-criterion Optimization Approach to Ill-posed Inverse Problem with Visual Feature's Recovery. J. Multim. 5(3): 240-247 (2010) - Kalyan Kumar Debnath, Sultan Uddin Ahmed, M. Shahjahan, Kazuyuki Murase:
A Paper Currency Recognition System Using Negatively Correlated Neural Network Ensemble. J. Multim. 5(6): 560-567 (2010) - Yihua Ding, Jianhui Zhao, Zhiyong Yuan, Yuanyuan Zhang, Chengjiang Long, Lu Xiong:
Constrained Surface Recovery Using RBF and Its Efficiency Improvements. J. Multim. 5(1): 55-62 (2010) - Bo Hang, Ruimin Hu, Ye Ma:
Virtual Conference Audio Reconstruction Based on Spatial Object. J. Multim. 5(3): 224-231 (2010) - Mohammad Anamul Haque, A. K. M. Kamrul Islam, Md. Imdadul Islam:
Demystifying the Digital Adaptive Filters Conducts in Acoustic Echo Cancellation. J. Multim. 5(6): 568-579 (2010) - Yingkun Hou, Chunxia Zhao, Mingxia Liu, Zhengli Zhu, Deyun Yang:
Semisubsampled Wavelet Transform Based Image Watermarking with Strong Robustness to Rotation Attacks. J. Multim. 5(4): 385-392 (2010) - Juan-li Hu, Jia-bing Deng, Shan-shan Zou:
A Novel Algorithm for Color Space Conversion Model from CMYK to LAB. J. Multim. 5(2): 159-166 (2010) - Bin Hu, Shengjin Wang, Xiaoqing Ding:
Multi Features Combination for Pedestrian Detection. J. Multim. 5(1): 79-84 (2010) - Mohammad Nurul Huda, Manoj Banik, Muhammad Ghulam, Mashud Kabir, Bernd J. Kröger:
Effects of Syllable Language Model on Distinctive Phonetic Features (DPFs) based Phoneme Recognition Performance. J. Multim. 5(6): 543-550 (2010) - Ebroul Izquierdo, Anthony T. S. Ho, Hyoung Joong Kim, Qianni Zhang:
Guest Editorial. J. Multim. 5(2): 93-94 (2010) - Tijana Janjusevic, Sergio Benini, Ebroul Izquierdo, Riccardo Leonardi:
Random Assisted Browsing of Rushes Archives. J. Multim. 5(2): 142-150 (2010) - Jianguo Jiang, Yang Liu, Zhaopin Su, Guofu Zhang, Shiyi Xing:
An Improved Selective Encryption for H.264 Video based on Intra Prediction Mode Scrambling. J. Multim. 5(5): 464-472 (2010) - Mohammad A. Karim, M. Manzur Murshed, Manoranjan Paul, Shuqun Zhang:
Guest Editorial. J. Multim. 5(1): 1-2 (2010) - Dimitrios Koukopoulos, Georgios D. Styliaras:
Security in Collaborative Multimedia Web-based Art Projects. J. Multim. 5(5): 404-416 (2010) - C. M. Kung:
A Robust Oblivious Watermark System base on Hybrid Error Correct Code. J. Multim. 5(3): 232-239 (2010) - Fan Li, Guizhong Liu, Lijun He:
Cross-Layer Approach to Multiuser H.264 Video Transmission over Wireless Networks. J. Multim. 5(2): 110-117 (2010)
skipping 45 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-25 02:40 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint