default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 535 matches
- 2008
- Sahar Adabi, Sam Jabbehdari, Amir Masoud Rahmani, Sepideh Adabi:
SBCA: Score Based Clustering Algorithm for Mobile AD-hoc Networks. ICYCS 2008: 427-431 - Ruo Ando, Youki Kadobayashi, Yoichi Shinoda:
An Enhancement of Trusted Domain Enforcement using VMM Interruption Mechanism. ICYCS 2008: 2222-2229 - Bocheng Bao, Zhong Liu, Zhusheng Kang, Jianping Xu, Xiaohua Qiao:
An Unsymmetrical Hyperchaotic Attractor. ICYCS 2008: 2983-2988 - Yubin Bao, Jie Song, Daling Wang, Derong Shen, Ge Yu:
A Role and Context Based Access Control Model with UML. ICYCS 2008: 1175-1180 - Xulei Bao, Guangyi Wang, Cuiping Wang, Wei Feng:
Experimental Investigation on Impulsive Synchronization of Chaotic PN Sequences Based on FPGA. ICYCS 2008: 2914-2918 - Kai Bu, Zhixin Sun:
A Method Based on AMHI for DDoS Attacks Detection and Defense. ICYCS 2008: 1571-1576 - Yanping Cai, Shu Cheng, Yanping He, Ping Xu:
Application of Image Recognition Technology based on Fractal Dimension for Diesel Engine Fault Diagnosis. ICYCS 2008: 2948-2953 - Shu-Bin Cai, Zhong Ming, Shixian Li:
BALC: A Belief Extension of Description Logic ALC. ICYCS 2008: 1711-1716 - Jiangdong Cai, Daoming Zhang, Zhenquan Jiang:
Study on the Nonlinear Dynamic Characteristic of Cone Penetrate Test Curve. ICYCS 2008: 2830-2834 - Yong Cao, Qingxin Zhu:
Improved Metrics for Encapsulation Based on Information Hiding. ICYCS 2008: 742-747 - Kai Cao, Xiaoyun Zhu:
Research and Design of Educational Resource Information Center for Investors Based on J2EE. ICYCS 2008: 2470-2475 - Emanuele Cesena, Gianluca Ramunno, Davide Vernizzi:
Towards Trusted Broadcast Encryption. ICYCS 2008: 2125-2130 - Zhiming Chang, XinJun Mao, Zhichang Qi:
Formal Analysis of Architectural Policies of Self-Adaptive Software by Bigraph. ICYCS 2008: 118-123 - Yonggang Che:
Evaluating the Data Access Efficiency of Imagine Stream Processor with Scientific Applications. ICYCS 2008: 194-199 - Gang Chen:
A Design of Data Rebuilding for Decision Support in E-Government System. ICYCS 2008: 965-970 - Baiqiang Chen:
Strategies on Algebraic Attacks Using SAT Solvers. ICYCS 2008: 2204-2209 - Liangsheng Chen:
On the Chaotic Dynamics Analysis of China Stock Market. ICYCS 2008: 3011-3015 - Lei Chen, Haiming Chen:
Efficient Type Checking for a Subclass of Regular Expression Types. ICYCS 2008: 1647-1652 - Lin Chen, Fangyue Chen, Fangfang Chen, Weifeng Jin:
Complex Symbolic Dynamics of Bernoulli Shift Cellular Automata Rule. ICYCS 2008: 2868-2873 - Fangfang Chen, Fangyue Chen, Weifeng Jin, Lin Chen:
Topological Entropy and Complexity of One Class of Cellular Automata Rules. ICYCS 2008: 2863-2867 - Guangxi Chen, Yan Cheng, Yinghao Wang:
A Robust Adaptive Video Watermarking Algorithm Based on HVS. ICYCS 2008: 1424-1428 - Yun Chen, Guanrong Chen, Xiaofeng Wu:
A Note on Chaos Synchronization of Generalized Lorenz Systems. ICYCS 2008: 2900-2902 - Baifan Chen, Zixing Cai, Zheng Xiao, Jinxia Yu, Limei Liu:
Real-time Detection of Dynamic Obstacle Using Laser Radar. ICYCS 2008: 1728-1732 - Hong Chen, Qun Ding, Jing Pang:
Study on the Chaotic Wave. ICYCS 2008: 2824-2829 - Xiaolin Chen, Hui Deng, Feng Wang, Mu Mu, Sanglu Lu:
A Deployable Architecture against Application-level DDoS Attacks. ICYCS 2008: 2180-2185 - Xiaofeng Chen, Dengguo Feng:
A New Direct Anonymous Attestation Scheme from Bilinear Maps. ICYCS 2008: 2308-2313 - Xiaoqing Chen, Zhongxi Hou, Jianxia Liu:
Real-Parameter Optimization with Modified Differential Evolution. ICYCS 2008: 1641-1646 - Xin Chen, Huaping Hu, Bo Liu, Fengtao Xiao, Zunguo Huang:
Performance Analysis of the HLLACF. ICYCS 2008: 2120-2124 - Xiaohong Chen, Zhi Jin:
A Scenario-Based Problem Decomposition. ICYCS 2008: 1150-1155 - Jinyu Chen, Ten Long, Kangming Deng:
The Consistency of Materialized View Maintenance and Drill-Down in a Warehousing Environment. ICYCS 2008: 1169-1174
skipping 505 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-12 06:26 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint