default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 28 matches
- 2017
- Anu G. Aggarwal, Akash Sharma:
An Innovative B2C E-commerce Websites Selection using the ME-OWA and Fuzzy AHP. ICITKM 2017: 13-19 - Anu G. Aggarwal, Himanshu Sharma, Abhishek Tandon:
An Intuitionistic Approach for Ranking OTA Websites under Multi Criteria Group Decision Making Framework. ICITKM 2017: 21-27 - Anu G. Aggarwal, Vibha Verma, Sameer Anand:
Architecture-based Optimal Software Reliability Allocation under uncertain preferences. ICITKM 2017: 3-12 - Neeraj Bhargava, Aakanksha Jain, Abhishek Kumar, Dac-Nhuong Le:
Detection of Malicious Executables Using Rule Based Classification Algorithms. ICITKM 2017: 35-38 - Neeraj Bhargava, Aakanksha Jain, Abhishek Kumar, Pramod Singh Rathore, Anuja Bansal:
Clustered Comparative Analysis of Security Sensor Discrimination Data. ICITKM 2017: 29-33 - Kumar Bijoy:
Financial Inclusion in India and PMJDY: A Critical Review. ICITKM 2017: 39-46 - Bhawna Chaudhary, Sheetal Singh:
Vehicular Ad-Hoc Network for Smart Cities. ICITKM 2017: 47-51 - Neha Gandhi, Neha Gondwal, Abhishek Tandon:
Reliability Modeling of OSS Systems based on Innovation-Diffusion Theory and Imperfect Debugging. ICITKM 2017: 53-58 - Sugandha Gupta, Anamika Gupta:
E-Assessment Tools for Programming Languages: A Review. ICITKM 2017: 65-70 - Pankaj Gupta, Bharat Bhushan Sagar:
Usability Of An E-Commerce Website Using Information Mining and Artificial Intelligence. ICITKM 2017: 59-64 - Vaishali Kalra, Rashmi Aggarwal:
Importance of Text Data Preprocessing & Implementation in RapidMiner. ICITKM 2017: 71-75 - Gurjeet Kaur, Anu G. Aggarwal, Aman Kedia:
A study of Optimal Testing Resource Allocation Problem for Modular Software with Change Point. ICITKM 2017: 77-84 - Naveen Kumar, Prakarti Triwedi, Pramod Singh Rathore:
An Adaptive Approach for image adaptive watermarking using Elliptical curve cryptography (ECC). ICITKM 2017: 89-92 - Pramod Kumar, Prakarti Triwedi, Surbhi Sharma:
An Adaptive Approach Digital Image Watermarking based on Discrete Wavelet Transform (DWT). ICITKM 2017: 85-88 - Mohan Debarchan Mohanty, Mihir Narayan Mohanty:
Design of Intelligent PD Controller for Water Supply in Healthcare Systems. ICITKM 2017: 93-96 - Saumendra Kumar Mohapatra, Hemanta Kumar Palo, Mihir Narayan Mohanty:
Detection of Arrhythmia using Neural Network. ICITKM 2017: 97-100 - Jyoti Patharia, Rakesh Rathi:
An Efficient Load Balancing Algorithms in Stream Processing With the Cloud Computing Environment. ICITKM 2017: 101-106 - Rashmirekha Ram, Mihir Narayan Mohanty:
The Use of Deep Learning in Speech Enhancement. ICITKM 2017: 107-111 - T. V. M. Sairam, R. Rajalakshmi:
A Survey on Advanced Approaches of EHR in inter-related data using Machine Learning. ICITKM 2017: 113-119 - Pankaj Sambyal, Anamika Rustagi, Sonia Rani, Chinab Bhudhiraja, Bhawna Sharma:
Result Analysis Suite: A Completely Automated Result Analysis Solution. ICITKM 2017: 121-123 - Sreenivas Sasubilli, Kumar Attangudi Perichiappan Perichappan, P. Srinivas Kumar, Abhishek Kumar:
An Approach towards economical hierarchic Search over Encrypted Cloud. ICITKM 2017: 125-129 - Gopinadh Sasubilli, Uday Shankar Sekhar, Surbhi Sharma, Swati Sharma:
A Contemplating approach for Hive and Map reduce for efficient Big Data Implementation. ICITKM 2017: 131-135 - Aditi Sharma, Gurjeet Kaur, Jatin Bansal:
A comparative analysis of promethee, ahp and topsis aiding in financial analysis of firm performance. ICITKM 2017: 145-150 - Akrati Sharma, V. P. Sharma, Hitesh Sharma:
A Perspective Approach (OABC) Algorithm using Square Odd Routing for minimized Energy Consumption. ICITKM 2017: 151-154 - Geeta Sharma, Neha Sharma, Tanya Singh, Rashmi Agrawal:
A Detailed Study of EEG based Brain Computer Interface. ICITKM 2017: 137-143 - Arokia R. Terrance, Shruti Shrivastava, Asmita Kumari:
Importance of Search Engine Marketing in the Digital World. ICITKM 2017: 155-158 - Mood Venkanna, Rameshwar Rao, P. Chandra Sekhar:
Application of ASIP in Embedded Design with Optimized Clock Management. ICITKM 2017: 159-163 - Ajay Jaiswal, Vijender Kumar Solanki, Zhongyu (Joan) Lu, Nikhil Rajput:
Proceedings of the First International Conference on Information Technology and Knowledge Management, New Delhi, India, December 22-23, 2017. Annals of Computer Science and Information Systems 14, 2017, ISBN 978-83-949419-2-5 [contents]
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-04 09:40 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint