Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 131 matches
- 2016
- Bharati Ainapure, Deven Shah, A. Ananda Rao:
Performance Analysis of Virtual Machine Introspection Tools in Cloud Environment. ICIA 2016: 27:1-27:6 - Anurag, Deepak Arora, Upendra Kumar:
Protecting Sensitive Warehouse Data through UML based Modeling. ICIA 2016: 31:1-31:6 - P. J. Arathy, Vrinda V. Nair:
Analysis of Spoofing Detection using Video Subsection Processing. ICIA 2016: 76:1-76:6 - A. Christiyana Arulselvi, Sendhilkumar Selvaraju, G. S. Mahalakshmi:
Provenance based Trust computation for Recommendation in Social Network. ICIA 2016: 114:1-114:7 - Mithlesh Arya, Namita Mittal, Girdhari Singh:
Cervical Cancer Detection Using Segmentation on Pap smear Images. ICIA 2016: 29:1-29:5 - M. Auxilia, K. Raja:
Knowledge Based Security Model for Banking in Cloud. ICIA 2016: 51:1-51:6 - R. Bala, N. P. Gopalan:
Security Enhancement using a modified AES algorithm. ICIA 2016: 4:1-4:5 - V. Balaji, K. S. Kuppusamy:
Accessibility Evaluation of Indian Railway Websites. ICIA 2016: 59:1-59:6 - S. Balamurugan, S. Saraswathi:
A Comprehensive Survey on Workflow Scheduling Algorithms in Various Environments. ICIA 2016: 21:1-21:6 - Adrija Bhattacharya, Sankhayan Choudhury:
An Efficient Service Selection Approach through a Goodness Measure of the Participating QoS. ICIA 2016: 94:1-94:6 - Pranjal S. Bogawar, Kishor K. Bhoyar:
Soft Computing Approaches to Classification of Emails for Sentiment Analysis. ICIA 2016: 22:1-22:7 - Balaji Chandrasekaran, Ramadoss Balakrishnan:
Attribute Based Encryption Using Quadratic Residue for the Big Data in Cloud Environment. ICIA 2016: 19:1-19:4 - M. Chitra, S. Siva Sathya:
Bidirectional Data Dissemination in Vehicular Ad Hoc Networks using Epidemic Spreading Model. ICIA 2016: 57:1-57:8 - K. Chitra, V. Prasanna Venkatesan:
Spatial Domain Watermarking Technique: An Introspective Study. ICIA 2016: 50:1-50:6 - T. Neelima Chowdary, P. Prudhvi Raj, Ch. Anupama, D. Haritha:
Location & User Profile based Mobile Application Access. ICIA 2016: 2:1-2:8 - Salil Dabholkar, Yuvraj Patadia, Prajyoti Dsilva:
Automatic Document Summarization using Sentiment Analysis. ICIA 2016: 49:1-49:6 - Udaya Dayanandan, K. Vivekanandan:
An Empirical Evaluation model for Software Architecture Maintainability for Object oriented Design. ICIA 2016: 98:1-98:4 - Dipankar Deb, Nabendu Chaki:
A Framework towards Generating Effective Business Process Model by Goal based Pruning. ICIA 2016: 90:1-90:4 - Padmashree Desai, Jagadeesh Pujari, Anita Kinnikar:
An Image Retrieval using combined approach Wavelets and Local Binary Pattern. ICIA 2016: 67:1-67:6 - Jayalatchumy Dhanpal, Thambidurai Perumal, Udhayakumaran:
Efficient Graph Clustering Algorithm and its use in Prediction of Students Performance. ICIA 2016: 39:1-39:5 - Leena Mary Francis, K. C. Visalatchi, N. Sreenath:
End to End Text Recognition from Natural Scene. ICIA 2016: 44:1-44:5 - A. Sivagnana Ganesan, T. Chithralekha:
A Survey on Survey of Migration of Legacy Systems. ICIA 2016: 72:1-72:10 - Vaithianathan Geetha:
Smart Sensing based Societal Applications in Public Cloud Environment. ICIA 2016: 9:1-9:6 - S. Geetha, J. Madhusudanan, M. Krishnamoorthy, V. Prasanna Venkatesan:
Design of Emotions context based Smart ATM Environment. ICIA 2016: 63:1-63:6 - Neenu George, K. Chandrasekaran, A. Binu:
Optimization-Aware Scheduling in Cloud Computing. ICIA 2016: 15:1-15:5 - Karthi Govindharaju, M. Ezhilarasan:
Securing Biometric Template using a Hybrid Scheme. ICIA 2016: 105:1-105:5 - S. Gunasekaran, L. Sai Ramesh, S. Sabena, K. Selvakumar, Sannasi Ganapathy, Arputharaj Kannan:
Dynamic Scheduling Algorithm for Reducing Start Time in Hadoop. ICIA 2016: 123:1-123:4 - Somya Gupta, Namita Mittal, Alok Kumar:
Rake-Pmi Automated Keyphrase Extraction: An unsupervised approach for automated extraction of keyphrases. ICIA 2016: 102:1-102:6 - Harsha Gwalani, Namita Mittal, Ankit Vidyarthi:
Classification of brain tumours Using Genetic Algorithms as a Feature Selection Method (GAFS). ICIA 2016: 32:1-32:5 - Yasir Hamid, M. Sugumaran, Ludovic Journaux:
Machine Learning Techniques for Intrusion Detection: A Comparative Analysis. ICIA 2016: 53:1-53:6
skipping 101 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-10 14:45 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint