Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 92 matches
- 2017
- Leonard Barolli, Fatos Xhafa, Kangbin Yim:
Advances on Broad-Band Wireless Computing, Communication and Applications, Proceedings of the 11th International Conference On Broad-Band Wireless Computing, Communication and Applications, BWCCA 2016, Soonchunhyang University, Asan, Korea, November 5-7, 2016. Lecture Notes on Data Engineering and Communications Technologies 2, Springer 2017, ISBN 978-3-319-49105-9 [contents] - 2016
- Qi Jiang, Bingyan Li, Jianfeng Ma:
On the Security of Three-factor Authentication Scheme for Telecare Medical Information Systems. BWCCA 2016: 879-884 - Alaa Ahmed Almarzuqi, Seyed Mohammed Buhari:
Enhance Robotics ability in Hand Gesture Recognition by Using Leap Motion Controller. BWCCA 2016: 513-523 - Rui An, Hui Feng, Qin Liu, Li Li:
Three elliptic curve cryptography-based RFID authentication protocols for Internet of Things. BWCCA 2016: 857-878 - Duha Binte Asim, Nadeem Javaid:
Enhanced energy conditioned mean square error algorithm for wireless sensor networks. BWCCA 2016: 243-254 - SeungHyeon Bak, Pan-Koo Kim:
Korean spelling error correction using a Hangul similarity algorithm. BWCCA 2016: 223-229 - Admir Barolli, Tetsuya Oda, Makoto Ikeda, Leonard Barolli, Fatos Xhafa, Makoto Takizawa:
Comparison Analysis by WMN-GA Simulation System for Different WMN Architectures, Normal and Uniform Distributions, DCF and EDCA Functions. BWCCA 2016: 129-142 - Kevin Bylykbashi, Evjola Spaho, Leonard Barolli, Makoto Takizawa:
Effect of Node Density and Node Movement Model on Performance of a VDTN. BWCCA 2016: 153-161 - JunSeok Cha, Pan-Koo Kim:
The Automatic Text Summarization Using Semantic Relevance And Hierarchical Structure Of Wordnet. BWCCA 2016: 215-222 - Baojiang Cui, Chong Wang, Guowei Dong, Jinxin Ma:
A program behavior recognition algorithm based on assembly instruction sequence similarity. BWCCA 2016: 13-20 - Baojiang Cui, Yang Wei, Songling Shan, Jinxin Ma:
The generation of XSS attacks developing in the detect detection. BWCCA 2016: 353-361 - Sanjay K. Dhurandher, Satya Jyoti Borah, Isaac Woungang, Sahil Gupta, Pragya Kuchal, Makoto Takizawa, Leonard Barolli:
A Probabilistic Encounter and Distance-based Routing Protocol for Opportunistic Networks. BWCCA 2016: 491-499 - Tsuyoshi Donen, Shingo Otsubo, Ryo Nishide, Hideyuki Takada:
Reduction of Network Traffic by Using the Peer Cache Mechanism in Co-located Collaborative Web Search on Smartphones. BWCCA 2016: 315-322 - Shuhong Duan, Zhenhua Liu, Peilin Zhou:
A privacy-preserving personal health record with searchability and revocability using attribute-based encryption. BWCCA 2016: 831-838 - Dilawaer Duolikun, Shigenari Nakamura, Ryo Watanabe, Tomoya Enokido, Makoto Takizawa:
Energy-aware Migration of Virtual Machines in a Cluster. BWCCA 2016: 21-32 - Keisuke Ebisu, Takaaki Inaba, Donald Elmazi, Makoto Ikeda, Leonard Barolli, Elis Kulla:
A Fuzzy-Based Wireless Sensor and Actuator Network: Simulation and Experimental Results. BWCCA 2016: 693-701 - Donald Elmazi, Tetsuya Oda, Evjola Spaho, Elis Kulla, Makoto Ikeda, Leonard Barolli:
A Fuzzy-Based Simulation System for Actor Selection in Wireless Sensor and Actor Networks Considering as a New Parameter Density of Actor Nodes. BWCCA 2016: 163-174 - Tomoya Enokido, Makoto Takizawa:
An Energy-Efficient Process Replication Algorithm in Virtual Machine Environments. BWCCA 2016: 105-114 - Nobuo Funabiki, Minako Dake, Khin Khin Zaw, Wen-Chung Kao:
A Workbook Design for Fill-in-Blank Problems in Java Programming Learning Assistant System. BWCCA 2016: 331-342 - Nguyen Viet Ha, Kazumi Kumazoe, Masato Tsuru:
TCP with network coding meets loss burstiness estimation for lossy networks. BWCCA 2016: 303-314 - Yoshiaki Hori, Seiichiro Mizoguchi, Ryosuke Miyazaki, Akira Yamada, Yaokai Feng, Ayumu Kubota, Kouichi Sakurai:
A Comprehensive Security Analysis Checksheet for OpenFlow Networks. BWCCA 2016: 231-242 - Yanjun Hou, Wenan Zhou, Lijun Song, Mengyu Gao:
A QoE Estimation Model for Video Streaming over 5G Millimeter Wave Network. BWCCA 2016: 93-104 - Cheng-Ying Hsu, Shang-En Yang, Hung-Yuan Chen, Fang-Yie Leu, Yao-Chung Fan:
Inferring Smartphone User Demographics from Wi-Fi trace Logs: A Study of Users' Privacy Concerns. BWCCA 2016: 739-746 - Jong-Hyuk Im, Mun-Kyu Lee:
Password Authentication Using One-Time Key-Based Signature and Homomorphic Encryption. BWCCA 2016: 467-474 - Takaaki Inaba, Shinji Sakamoto, Tetsuya Oda, Makoto Ikeda, Leonard Barolli:
A Testbed for Admission Control in WLAN: A Fuzzy Approach and Its Performance Evaluation. BWCCA 2016: 559-571 - Xiaohui Jin, Congxian Yin, Pengpeng Yang, Baojiang Cui:
An Attack Detection System for Multiple Web Applications Based on Big Data Platform. BWCCA 2016: 371-376 - Hiroki Kataoka, Atsuhiro Sawada, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa:
Simple Energy-efficient Server Selection Algorithm in a Scalable Cluster. BWCCA 2016: 573-584 - Kengo Katayama, Yusuke Okamoto, Elis Kulla, Noritaka Nishihara:
Variable Neighborhood Search Algorithms for the Node Placement Problem in Multihop Networks. BWCCA 2016: 631-638 - Muhammad Awais Khan, Arshad Sher, Ahmad Raza Hameed, Naeem Jan, Junaid Shabir Abassi, Nadeem Javaid:
Network lifetime maximization via energy hole alleviation in wireless sensor networks. BWCCA 2016: 279-290 - Yun-Sam Kim, Gunhee Lee, Jungmin Kang:
Lightweight IEC 61850 Secure Communication Module for Microgrids. BWCCA 2016: 443-451
skipping 62 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-25 03:21 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint