Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 212 matches
- 2019
- Lokesh B. Bhajantri, Tabassum N. Mujawar:
A Comprehensive Review of Access Control Mechanism Based on Attribute Based Encryption Scheme for Cloud Computing. Int. J. Adv. Pervasive Ubiquitous Comput. 11(3): 33-52 (2019) - Praveen S. Challagidad, Mahantesh N. Birje:
Local and Remote Recovery of Cloud Services Using Backward Atomic Backup Recovery Technique for High Availability in Strongly Consistent Cloud Service: Recovery of Cloud Service for High Availability. Int. J. Adv. Pervasive Ubiquitous Comput. 11(4): 16-33 (2019) - Afef Gueidi, Hamza Gharsellaoui, Samir Ben Ahmed:
The Rise of Robotics Data for Real-Time Management Based on New NoSQL Solution. Int. J. Adv. Pervasive Ubiquitous Comput. 11(2): 11-26 (2019) - Yousif Ahmed Hamad, Konstantin Vasilievich Simonov, Mohammad B. Naeem:
Detection of Brain Tumor in MRI Images, Using a Combination of Fuzzy C-Means and Thresholding. Int. J. Adv. Pervasive Ubiquitous Comput. 11(1): 45-60 (2019) - Rakshith M. D. Hegde, Harish H. Kenchannavar:
A Survey on Predicting Resident Intentions Using Contextual Modalities in Smart Home. Int. J. Adv. Pervasive Ubiquitous Comput. 11(4): 44-59 (2019) - Nada Ahmed J., Abdul Monem S. Rahma, Maha A. Hmmood Alrawi:
A Novel Coding and Discrimination (CODIS) Algorithm to Extract Features from Arabic Texts to Discriminate Arabic Poems. Int. J. Adv. Pervasive Ubiquitous Comput. 11(1): 1-14 (2019) - Song Ji, Weifang Zhai, Yiran Jiang:
Design of Workflow Engine Based on Relational Structures. Int. J. Adv. Pervasive Ubiquitous Comput. 11(4): 34-43 (2019) - Mohammed Y. Kamil, Ali Mohammed Salih:
Breast Tumor Detection Via Fuzzy Morphological Operations. Int. J. Adv. Pervasive Ubiquitous Comput. 11(1): 33-44 (2019) - Yosra Abdulaziz Mohammed:
Infant Cry Recognition System: A Comparison of System Performance based on CDHMM and ANN. Int. J. Adv. Pervasive Ubiquitous Comput. 11(1): 15-32 (2019) - Kamalendu Pal:
RFID Tag Collision Problem in Supply Chain Management. Int. J. Adv. Pervasive Ubiquitous Comput. 11(3): 1-12 (2019) - Vishal Passricha, Ashish Chopra, Shubhanshi Singhal:
Secure Deduplication Scheme for Cloud Encrypted Data. Int. J. Adv. Pervasive Ubiquitous Comput. 11(2): 27-40 (2019) - Vishal Passricha, Shubhanshi Singhal:
Hindi and Punjabi Continuous Speech Recognition Using CNSVM. Int. J. Adv. Pervasive Ubiquitous Comput. 11(4): 1-15 (2019) - Stefan Piasecki:
Gamification in Educational Contexts: A Critical View on Mechanisms and Methodology. Int. J. Adv. Pervasive Ubiquitous Comput. 11(2): 41-67 (2019) - Padma Lochan Pradhan:
A Literature Survey on Risk Assessment for Unix Operating System: Risk Assessment on UNIX OS. Int. J. Adv. Pervasive Ubiquitous Comput. 11(3): 13-32 (2019) - Vikram Singh:
Predicting Search Intent Based on In-Search Context for Exploratory Search. Int. J. Adv. Pervasive Ubiquitous Comput. 11(3): 53-75 (2019) - Weifang Zhai, Yiran Jiang, Song Ji:
Research on the Application of Data Mining Algorithms in Intelligent Transportation. Int. J. Adv. Pervasive Ubiquitous Comput. 11(2): 1-10 (2019) - 2018
- Reinhard Bauer, Martin Sankofi, Petra Szucsich, Klaus Himpsl-Gutermann:
An APPsolute Beginner's Guide for Action Research. Int. J. Adv. Pervasive Ubiquitous Comput. 10(3): 1-22 (2018) - Lokesh B. Bhajantri, Vasudha V. Ayyannavar:
Cognitive Agent Based Data Synchronization in Ubiquitous Networks: A Survey. Int. J. Adv. Pervasive Ubiquitous Comput. 10(2): 1-17 (2018) - Victoria M. Cardullo, Vassiliki I. Zygouris-Coe, Nance S. Wilson:
Technology and the Preparation of Students. Int. J. Adv. Pervasive Ubiquitous Comput. 10(3): 38-69 (2018) - Widad Ettazi, Hatim Hafiddi, Mahmoud Nassar:
A Context-Driven Commit Protocol for Enhancing Transactional Services Performance in Pervasive Environments. Int. J. Adv. Pervasive Ubiquitous Comput. 10(4): 14-28 (2018) - Dusan Fister, Iztok Fister, Iztok Fister Jr.:
Deep Analytics in Sport Community Forums. Int. J. Adv. Pervasive Ubiquitous Comput. 10(2): 18-37 (2018) - Ran Gao, Liu Ye:
Design and Development of Member Platform of Public Platform for Service Outsourcing Association. Int. J. Adv. Pervasive Ubiquitous Comput. 10(1): 1-22 (2018) - Ibrahim Gharbi, Hamza Gharsellaoui, Sadok Bouamama:
New Hybrid Genetic Based Approach for Real-Time Scheduling of Reconfigurable Embedded Systems. Int. J. Adv. Pervasive Ubiquitous Comput. 10(1): 23-36 (2018) - Chetna Laroiya, Vijay Bhushan Aggarwal:
At Sensor Diagnosis for Smart Healthcare: Probability or Conditional Probability Based Approach vs. k-Nearest Neighbour. Int. J. Adv. Pervasive Ubiquitous Comput. 10(4): 1-13 (2018) - Longzhuang Li, Ajay K. Katangur, Naga Nandini Karuturi:
SmartNotify: An Intelligent Location Based Notification System Using Users' Activities and Points of Interests. Int. J. Adv. Pervasive Ubiquitous Comput. 10(1): 37-50 (2018) - Ebba Ossiannilsson:
Increasing Access, Social Inclusion, and Quality Through Mobile Learning. Int. J. Adv. Pervasive Ubiquitous Comput. 10(4): 29-44 (2018) - Bhupesh Rawat, Sanjay K. Dwivedi:
State of the Art Recommendation Approaches: Their Issues and Future Research Direction in E-Learning A Survey. Int. J. Adv. Pervasive Ubiquitous Comput. 10(1): 51-76 (2018) - Nejla Rouissi, Hamza Gharsellaoui, Sadok Bouamama:
A New Spread Spectrum Based Approach for Ensuring Energy Efficiency and Security in Wireless Sensor Networks. Int. J. Adv. Pervasive Ubiquitous Comput. 10(4): 45-57 (2018) - Eduardo Adrián Toloza, Wolfram Lothar Laaser:
Social Media and Autonomous Learning at a Latin America University: The Social Neuroscience Role of the Developing Metacognitive Capacities. Int. J. Adv. Pervasive Ubiquitous Comput. 10(2): 38-57 (2018) - M. O. Yusuf, Bolanle Idayat Lawal, Mary Bose Oyewusi:
Benefits of Effective Utilization of Mobile Technologies and Inquiry-Based Teaching Methods in University of Ilorin, Nigeria. Int. J. Adv. Pervasive Ubiquitous Comput. 10(3): 23-37 (2018)
skipping 182 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-17 03:59 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint