![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 28 matches
- 2005
- Tarek K. Alameldin, Saeed Iqbal, Vishal Saberwal:
Security Enhancement on Mobile Devices Using Steganography. ISWS 2005: 29-34 - Edgardo Ambrosi, Marco Bianchi, Carlo Gaibisso, Giorgio Gambosi, Flavio Lombardi:
Extending the UDDI API for service instance ranking. ISWS 2005: 104-110 - Hiroki Asami:
A technique of visualization for web search. ISWS 2005: 66-69 - Jagadish Beeram, Paul Juell:
Distributed Hierarchical Indexing of Publications. ISWS 2005: 70-74 - Siegfried Benkner, Gerhard Engelbrecht:
Generic QoS Support for Application Web Services. ISWS 2005: 151-157 - Sebastian Carbajales, Michael Bauer:
Securing Web Services: Maintaining Data Confidentiality through a Secure WDSL Binding. ISWS 2005: 16-22 - Chien-Ming Chen, Ming-Wei Su, Hanna S. Yuan, Woei-Chyn Chu:
The Design of a Dengue Virus Relational Database to Facilitate Its Bioinformatics Applications. ISWS 2005: 180- - Jaime Delgado, Miguel Sales Dias, Carlos Serrão:
Using Web-Services to Manage and Control Access to Multimedia Content. ISWS 2005: 23-28 - Weichang Du, Eltaher El-Shanta:
Web Services Infrastructure for E-Marketplaces Based on Business Patterns. ISWS 2005: 132-135 - Deke Guo, Honghui Chen, Xueshan Luo, Wei Ming Zhang:
Enhance Uddi and Design Peer-to-Peer Network for Uddi to Realize Decentralized Web Service Discovery. ISWS 2005: 59-65 - Sofie Van Hoecke, Wouter Haerick, Gregory De Jans, Filip De Turck, Eric Laermans, Bart Dhoedt, Piet Demeester:
Design and Implementation of a Secure Media Content Delivery Broker Architecture. ISWS 2005: 3-9 - Sarath Indrakanti, Vijay Varadharajan, Michael Hitchens:
Analysis of Existing Authorization Models and Requirements for Design of Authorization Framework for the Service Oriented Architecture. ISWS 2005: 35-44 - Dong-Ho Kim, Sung-Woo Jun, Seong-Jun Yoo:
Implementation of an e-Card Mailing System Based on Web services Architecture. ISWS 2005: 143-150 - Tai-Jong Kim, Gyung-Leen Park, Min-Cheol Kim:
On Employing Ontology to u-Learning. ISWS 2005: 162-168 - Whe Dar Lin:
Web Services and Applications Framework of Real Time Systems. ISWS 2005: 111-117 - Wei Liu, Keqing He, Yanfan He:
Maintaining Consistency of Ontologies Registry with Description Logic. ISWS 2005: 136-142 - Oksana N. Myronovych, Yuri E. Boreisha:
Web Services-Based Virtual Data Warehouse as an Integration and ETL Tool. ISWS 2005: 52-58 - Jayathi S. Raghavan:
Database Architecture for a Versatile Scheduling Tool. ISWS 2005: 176-179 - Mohamed Adel Serhani, Rachida Dssouli, Houari A. Sahraoui, Abdelhakim Hafid, Abdelghani Benharref:
Toward A new Approach for Web Services Development Life Cycle. ISWS 2005: 94-103 - M. Omair Shafiq, Arshad Ali, Hafiz Farooq Ahmad, Hiroki Suguri:
Multi Agent Systems for Enhancement of Grid/Web Services Platforms. ISWS 2005: 121-131 - Carl Stent, Nick Howard, Mohamad Saraee, Edward Thompson:
Viability of Implementing Data Mining Algorithms as a Web Service. ISWS 2005: 158-161 - Hicham Tout:
An Adaptive Access Control Policy Management Framework. ISWS 2005: 10-15 - Enn Tyugu, Mihhail Matskin:
Logical Instruments for Dynamic Web Service Composition. ISWS 2005: 87-93 - Suneetha Uppu, Doan B. Hoang, Tom Hintz:
A Novel Exception Handling Scheme for Out Patient Workflow in a Wireless Handheld Hospital Environment. ISWS 2005: 169-175 - Sankararaman Venkatesh, Arun Gokak, Bapu Bindhumadhava:
Web Services based Data Acquisition System Implementation. ISWS 2005: 75-86 - Samhitha Wukkalam, A. Louise Perkins:
A Simple Design to Implement a Dynamic Workflow Management System. ISWS 2005: 118-120 - Junli Yuan, Chi-Hung Chi, Qibin Sun:
Modeling Retrieval Parallelism in Web Content Delivery. ISWS 2005: 45-51 - Hamid R. Arabnia:
Proceedings of The 2005 International Symposium on Web Services and Applications, ISWS 2005, Las Vegas, Nevada, USA, June 27-30, 2005. CSREA Press 2005, ISBN 1-932415-72-6 [contents]
loading more results
failed to load more results, please try again later
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-08-01 09:00 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint