Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 42 matches
- 2013
- Abbas Muhsin Al-Bakry, Talib T. Al-Fatlawii:
Intelligent web content filtering system using MAS. FGCT 2013: 103-107 - Walid A. Al-Hussaibi:
Low complexity receive antenna selection for correlated MU-MIMO uplink channels. FGCT 2013: 219-225 - Fawaz Alassery, Walid K. M. Ahmed, Mohsen Sarraf, Victor B. Lawrence:
Power saving and throughput analysis of a novel MAC algorithm in WSN. FGCT 2013: 184-189 - Thamer A. Alghamdi, Aboubaker Lasebae, Mahdi Aiash:
Security analysis of the constrained application protocol in the Internet of Things. FGCT 2013: 163-168 - Saqer Alhloul:
Analyzing the effects of mobile station circular motion on early-late tracking loops using the normalized timing error PDF derived from a Fokker-Planck equation. FGCT 2013: 27-32 - Syed Imran Ali:
Adoption of cloud computing in manufacturing industry supply chains, a hype or a myth? FGCT 2013: 69-72 - Terence Ambra, Federica Paganelli, Alessandro Fantechi, Dino Giuli, Lorenzo Mazzi:
Resource-oriented design towards the convergence of Web-centric and Telecom-centric services. FGCT 2013: 120-125 - Jack Fernando Bravo-Torres, Martín López Nores, Yolanda Blanco-Fernández, José Juan Pazos-Arias:
Leveraging short-lived social networks in vehicular environments. FGCT 2013: 196-200 - Shlomi Dolev, Idan Heimlich Shtacher, Bracha Shapira, Yuval Elovici, Guy Messalem, Dudu Mimran, Marina Kopeetsky:
Exploiting simultaneous usage of different wireless interfaces for security and mobility. FGCT 2013: 21-26 - Agung Fatwanto:
Natural language requirements specification analysis using Part-of-Speech Tagging. FGCT 2013: 98-102 - Michal Gorawski, Krzysztof Grochla:
The real-life mobility model: RLMM. FGCT 2013: 201-206 - Neeraj Gupta, Chandra Shekhar Rai:
Non-saturation throughput analysis of IEEE 802.11 DCF considering short retry limit for single hop ad hoc networks. FGCT 2013: 10-15 - Mohammad Reza Jabbarpour, Hossein Malakooti, Masumeh Sadat Taheri, Rafidah Md Noor:
The comparative analysis of velocity and density in VANET using prediction-based intelligent routing algorithms. FGCT 2013: 54-58 - Elmira Yu. Kalimulina:
Analytical modelling of communication network with unreliable servers and finite buffers. FGCT 2013: 33-37 - Ahmed Kausar, Hamood ur Rahman, Shafaq Kausar, Tayyab Hassan:
Smart adaptive beam forming antenna for interference minimization. FGCT 2013: 6-9 - Hathairat Ketmaneechairat, Dussadee Seewungkum, Mirko Caspar:
Web-based virtual classroom system model based on asynchronous and synchronous learning. FGCT 2013: 108-113 - Samad Salehi Kolahi, Yuqing Rico Cao, Hong Chen:
Bandwidth-IPSec security trade-off in IPv4 and IPv6 in Windows 7 environment. FGCT 2013: 148-152 - Denis Martin:
Protocol composition revisited: A template-based transport architecture. FGCT 2013: 178-183 - V. Mora-Afonso, Pino Caballero-Gil, Jezabel Molina-Gil:
Strong authentication on smart wireless devices. FGCT 2013: 137-142 - Yaser Mowafi, Ahmad Zmily, Dhiah el Diehn I. Abou-Tair, Dirar Abu-Saymeh:
Tracking human mobility at mass gathering events using WISP. FGCT 2013: 157-162 - Fabrizio Mulas, Paolo Pilloni, Matteo Manca, Ludovico Boratto, Salvatore Carta:
Using new communication technologies and social media interaction to improve the motivation of users to exercise. FGCT 2013: 87-92 - Mohamed S. Nabi, Miss Laiha Mat Kiah, A. A. Zaidan, B. B. Zaidan:
Suitability of adopting S/MIME and OpenPGP email messages protocol to secure electronic medical records. FGCT 2013: 93-97 - Maurizio Naldi, Marta Flamini, Giuseppe D'Acquisto:
A comparison of sanctioning approaches for security breaches. FGCT 2013: 126-131 - Taishi Nose, Reiko Hishiyama:
Analysis of self-tagging during conversational chat in multilingual gaming simulation. FGCT 2013: 81-86 - Sung-Jin Ok, Jung-Ha Kang, Eum-Gi Kim:
Wireless LAN packet concatenation algorithm. FGCT 2013: 1-5 - Oladimeji Onalaja, Ming Fei Siyau, S. L. Ling, Mohammad Ghavami:
UWB-based indoor 3D position estimation for future generation communication applications. FGCT 2013: 16-20 - Michail G. Papoutsidakis, Dimitrios D. Piromalis, N. Alafodimos:
Modem wireless communication for Ad Hoc continuous monitoring of a control process. FGCT 2013: 38-43 - Ali Hussein Raheem, Aboubaker Lasebae, Mahdi Aiash, Jonathan Loo:
Supporting communications in the IoTs using the location/ID split protocol: A security analysis. FGCT 2013: 143-147 - Rand Raheem, Aboubaker Lasebae, Mahdi Aiash, Jonathan Loo:
From fixed to mobile femtocells in LTE systems: Issues and challenges. FGCT 2013: 207-212 - M. A. Al Rashed, Ousmane Abdoulaye Oumar, Damanjit Singh:
A real time GSM/GPS based tracking system based on GSM mobile phone. FGCT 2013: 65-68
skipping 12 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-24 21:06 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint