Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/ijipt/ijipt9.bht:"
@article{DBLP:journals/ijipt/ArunalathaE16, author = {G. Arunalatha and M. Ezhilarasan}, title = {Detecting liveness of fingerprint biometrics}, journal = {Int. J. Internet Protoc. Technol.}, volume = {9}, number = {4}, pages = {196--206}, year = {2016}, url = {https://doi.org/10.1504/IJIPT.2016.10002240}, doi = {10.1504/IJIPT.2016.10002240}, timestamp = {Thu, 16 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipt/ArunalathaE16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipt/BalakrishnanS16, author = {Senthil Murugan Balakrishnan and Arun Kumar Sangaiah}, title = {Aspect-oriented middleware framework for resolving service discovery issues in Internet of Things}, journal = {Int. J. Internet Protoc. Technol.}, volume = {9}, number = {2/3}, pages = {62--78}, year = {2016}, url = {https://doi.org/10.1504/IJIPT.2016.079546}, doi = {10.1504/IJIPT.2016.079546}, timestamp = {Thu, 16 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipt/BalakrishnanS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipt/BarouniM16, author = {Foued Barouni and Bernard Moulin}, title = {{K-CEP:} a knowledge-based complex event processing framework to manage qualitative spatiotemporal patterns}, journal = {Int. J. Internet Protoc. Technol.}, volume = {9}, number = {4}, pages = {174--186}, year = {2016}, url = {https://doi.org/10.1504/IJIPT.2016.10002231}, doi = {10.1504/IJIPT.2016.10002231}, timestamp = {Thu, 16 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipt/BarouniM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipt/BhushanR16, author = {S. Bharath Bhushan and Pradeep Reddy}, title = {{BB-LBA:} biogeography-based load balancing algorithm in multi cloud domain}, journal = {Int. J. Internet Protoc. Technol.}, volume = {9}, number = {2/3}, pages = {100--106}, year = {2016}, url = {https://doi.org/10.1504/IJIPT.2016.079545}, doi = {10.1504/IJIPT.2016.079545}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipt/BhushanR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipt/BuvanaSM16, author = {M. Buvana and M. Suganthi and K. Muthumayil}, title = {Linear discriminant analysis-based service discovery algorithm in {MANET}}, journal = {Int. J. Internet Protoc. Technol.}, volume = {9}, number = {2/3}, pages = {90--99}, year = {2016}, url = {https://doi.org/10.1504/IJIPT.2016.079543}, doi = {10.1504/IJIPT.2016.079543}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijipt/BuvanaSM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipt/CollottaP16, author = {Mario Collotta and Giovanni Pau}, title = {A power management solution for Bluetooth low energy in smart homes of internet of things}, journal = {Int. J. Internet Protoc. Technol.}, volume = {9}, number = {2/3}, pages = {53--61}, year = {2016}, url = {https://doi.org/10.1504/IJIPT.2016.079544}, doi = {10.1504/IJIPT.2016.079544}, timestamp = {Thu, 16 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipt/CollottaP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipt/DadkhahJMSWR16, author = {Mehdi Dadkhah and Mohammad Davarpanah Jazi and Majid Saidi Mobarakeh and Shahaboddin Shamshirband and Xiaojun Wang and Sachin Raste}, title = {An overview of phishing attacks and their detection techniques}, journal = {Int. J. Internet Protoc. Technol.}, volume = {9}, number = {4}, pages = {187--195}, year = {2016}, url = {https://doi.org/10.1504/IJIPT.2016.10002236}, doi = {10.1504/IJIPT.2016.10002236}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipt/DadkhahJMSWR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipt/GaffarK16, author = {H. Abdul Gaffar and P. Venkata Krishna}, title = {A virtual backoff algorithm-based {MAC} protocol for underwater acoustic sensor networks}, journal = {Int. J. Internet Protoc. Technol.}, volume = {9}, number = {2/3}, pages = {129--137}, year = {2016}, url = {https://doi.org/10.1504/IJIPT.2016.079549}, doi = {10.1504/IJIPT.2016.079549}, timestamp = {Thu, 16 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipt/GaffarK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipt/IsmailK16, author = {Ahmed Ismail and Wolfgang Kastner}, title = {Vertical integration in industrial enterprises and distributed middleware}, journal = {Int. J. Internet Protoc. Technol.}, volume = {9}, number = {2/3}, pages = {79--89}, year = {2016}, url = {https://doi.org/10.1504/IJIPT.2016.079547}, doi = {10.1504/IJIPT.2016.079547}, timestamp = {Thu, 16 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipt/IsmailK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipt/JadidoleslamyAB16, author = {Hossein Jadidoleslamy and Mohammad Reza Aref and Hossein Bahramgiri}, title = {A statistical distributed multipath routing protocol in wireless sensor networks}, journal = {Int. J. Internet Protoc. Technol.}, volume = {9}, number = {4}, pages = {161--173}, year = {2016}, url = {https://doi.org/10.1504/IJIPT.2016.10002227}, doi = {10.1504/IJIPT.2016.10002227}, timestamp = {Thu, 16 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipt/JadidoleslamyAB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipt/Karuppiah16, author = {Marimuthu Karuppiah}, title = {Remote user authentication scheme using smart card: a review}, journal = {Int. J. Internet Protoc. Technol.}, volume = {9}, number = {2/3}, pages = {107--120}, year = {2016}, url = {https://doi.org/10.1504/IJIPT.2016.079548}, doi = {10.1504/IJIPT.2016.079548}, timestamp = {Thu, 16 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipt/Karuppiah16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipt/NarayananBP16, author = {Swathi Jamjala Narayanan and Rajen B. Bhatt and Ilango Paramasivam}, title = {User localisation using wireless signal strength - an application for pattern classification using fuzzy decision tree}, journal = {Int. J. Internet Protoc. Technol.}, volume = {9}, number = {2/3}, pages = {138--150}, year = {2016}, url = {https://doi.org/10.1504/IJIPT.2016.079551}, doi = {10.1504/IJIPT.2016.079551}, timestamp = {Thu, 16 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipt/NarayananBP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipt/RajeshRV16, author = {G. Rajesh and X. Mercilin Raajini and B. Vinayagasundaram}, title = {Fuzzy trust-based aggregator sensor node election in internet of things}, journal = {Int. J. Internet Protoc. Technol.}, volume = {9}, number = {2/3}, pages = {151--160}, year = {2016}, url = {https://doi.org/10.1504/IJIPT.2016.079550}, doi = {10.1504/IJIPT.2016.079550}, timestamp = {Thu, 16 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipt/RajeshRV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipt/SanjeeviBV16, author = {P. Sanjeevi and G. Balamurugan and P. Viswanathan}, title = {The improved {DROP} security based on hard {AI} problem in cloud}, journal = {Int. J. Internet Protoc. Technol.}, volume = {9}, number = {4}, pages = {207--217}, year = {2016}, url = {https://doi.org/10.1504/IJIPT.2016.10002241}, doi = {10.1504/IJIPT.2016.10002241}, timestamp = {Thu, 16 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipt/SanjeeviBV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipt/YueWC16, author = {Wenjing Yue and Cong Wu and Zhi Chen}, title = {Cooperative spectrum sensing based on side information for cognitive radio sensor networks in internet of things applications}, journal = {Int. J. Internet Protoc. Technol.}, volume = {9}, number = {2/3}, pages = {121--128}, year = {2016}, url = {https://doi.org/10.1504/IJIPT.2016.079552}, doi = {10.1504/IJIPT.2016.079552}, timestamp = {Thu, 16 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipt/YueWC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipt/BalaVM15, author = {Mohammad Irfan Bala and Sheetal Vij and Debajyoti Mukhopadhyay}, title = {Automated negotiation with behaviour prediction}, journal = {Int. J. Internet Protoc. Technol.}, volume = {9}, number = {1}, pages = {44--50}, year = {2015}, url = {https://doi.org/10.1504/IJIPT.2015.074339}, doi = {10.1504/IJIPT.2015.074339}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijipt/BalaVM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipt/DowLY15, author = {Chyi{-}Ren Dow and Po{-}Yu Lai and Jhen{-}He Ye}, title = {A moving context-aware and location-based paratransit system}, journal = {Int. J. Internet Protoc. Technol.}, volume = {9}, number = {1}, pages = {34--43}, year = {2015}, url = {https://doi.org/10.1504/IJIPT.2015.074328}, doi = {10.1504/IJIPT.2015.074328}, timestamp = {Thu, 16 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipt/DowLY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipt/IyerS15, author = {Sridhar Iyer and Shree Prakash Singh}, title = {Launch power determination algorithm for dynamic traffic provisioning in mixed-line-rate optical wavelength division multiplexed networks}, journal = {Int. J. Internet Protoc. Technol.}, volume = {9}, number = {1}, pages = {23--33}, year = {2015}, url = {https://doi.org/10.1504/IJIPT.2015.074318}, doi = {10.1504/IJIPT.2015.074318}, timestamp = {Thu, 16 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipt/IyerS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipt/JiangDLG15, author = {Linmei Jiang and Songsong Dai and Niansheng Liu and Donghui Guo}, title = {A pairing-based password authentication scheme using smart card with user anonymity}, journal = {Int. J. Internet Protoc. Technol.}, volume = {9}, number = {1}, pages = {12--22}, year = {2015}, url = {https://doi.org/10.1504/IJIPT.2015.074314}, doi = {10.1504/IJIPT.2015.074314}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipt/JiangDLG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipt/RudraV15, author = {Bhawana Rudra and O. P. Vyas}, title = {Exploration of access control mechanisms for service-oriented network architecture}, journal = {Int. J. Internet Protoc. Technol.}, volume = {9}, number = {1}, pages = {1--11}, year = {2015}, url = {https://doi.org/10.1504/IJIPT.2015.074312}, doi = {10.1504/IJIPT.2015.074312}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipt/RudraV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.