Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 24 matches
- 2013
- Komate Amphawan, Philippe Lenca:
Mining Top-k Frequent/Regular Patterns Based on User-Given Trade-Off between Frequency and Regularity. IAIT 2013: 1-12 - Gerhard Backfried, Johannes Göllner, Gerald Quirchmayr, Karin Rainer, Gert Kienast, Georg Thallinger, Christian Schmidt, Mark Pfeiffer, Christian Meurers, Andreas Peer:
Cross-Media Analysis for Communication during Natural Disasters. IAIT 2013: 13-22 - Thepparit Banditwattanawong, Putchong Uthayopas:
An Intelligent Cloud Cache Replacement Scheme. IAIT 2013: 23-34 - Kornkanok Churin, Jitdumrong Preechasuk, Chantana Chantrapornchai:
Exploring Video Steganography for Hiding Images Based on Similar Lifting Wavelet Coefficients. IAIT 2013: 35-46 - Moulay Rachid Douiri, Mohamed Cherkaoui:
Rotor Time Constant Identification Approaches Based on Back-Propagation Neural Network for Indirect Vector Controlled Induction Machine. IAIT 2013: 47-57 - Seyedeh Sabereh Hosseini, Seyed Ali Mirzapour, Kuan Yew Wong:
Improving Multi-Floor Facility Layout Problems Using Systematic Layout Planning and Simulation. IAIT 2013: 58-69 - Hiroyuki Kamiya, Ryota Yokote, Yasuo Matsuyama:
Icon Placement Regularization for Jammed Profiles: Applications to Web-Registered Personnel Mining. IAIT 2013: 70-79 - Baljeet Kaur, Sushila Madan:
A Paradigm Approach to Generate Trust Index Using 3C3G Framework for B2C E-Commerce Websites. IAIT 2013: 80-92 - Varin Khera, Chun Che Fung, Sivadon Chaisiri:
A Review of Security Risks in the Mobile Telecommunication Packet Core Network. IAIT 2013: 93-103 - Aleksandrina Kovacheva:
Efficient Code Obfuscation for Android. IAIT 2013: 104-119 - Sirikorn Krompho, Nalinpat Porrawatpreyakorn:
Identifying Factors Influencing Hybrid Self-regulated and Collaborative Learning: Toward an End-User Training Framework. IAIT 2013: 120-130 - Ashraf Y. A. Maghari, Ibrahim Venkat, Iman Yi Liao, Bahari Belaton:
Effect of Training Sample on Reconstructing 3D Face Shapes from Feature Points. IAIT 2013: 131-140 - Muhammad Faran Majeed, Vatcharaporn Esichaikul, Mah e No:
Use of Multi-agent Based Platform for Providing Document-Centric Interoperability in the Realm of E-government. IAIT 2013: 141-149 - Priyanka Manchanda:
Analysis of Optimization Techniques to Improve User Response Time of Web Applications and Their Implementation for MOODLE. IAIT 2013: 150-161 - S. M. Mizanoor Rahman:
Evaluating and Benchmarking the Interactions between a Humanoid Robot and a Virtual Human for a Real-World Social Task. IAIT 2013: 184-197 - Geetanjali Sahi, Sushila Madan:
Assessing the Differential Effect of Web Usability Dimensions on Perceived Usefulness of a B2C E-Commerce Website. IAIT 2013: 198-211 - Takayuki Sasajima, Shin-ya Nishizaki:
Event-Driven Implementation of Layer-7 Load Balancer. IAIT 2013: 162-172 - Pisal Setthawong, Vajirasak Vanijja:
Modified Deformable Parts Model for Side Profile Facial Feature Detection. IAIT 2013: 212-220 - Chaiyawut Sookpalng, Vajirasak Vanijja:
Design of Disease Management System for Chronic Heart Failure: A Case Study from Advanced Heart Failure Clinic at King Chulalongkorn Memorial Hospital. IAIT 2013: 221-231 - Tuul Triyason, Prasert Kanthamanon:
Effect of Codec Bit Rate and Packet Loss on Thai Speech Recognition over IP. IAIT 2013: 232-241 - Maria Concetta De Vivo, Alberto Polzonetti, Pietro Tapanelli:
RFID Privacy and Security Risks: Italian Case Study. IAIT 2013: 173-183 - Kiattisak Yochanang, Therdpong Daengsi, Tuul Triyason, Pongpisit Wuttidittachotti:
A Comparative Study of VoIP Quality Measurement from G.711 and G.729 Using PESQ and Thai Speech. IAIT 2013: 242-255 - Lingling Zhao, Xianglei Dong, Peijun Ma, Xiaohong Su, Chunmei Shi:
A New Multi-sensor Track Association Approach Based on Intuitionistic Fuzzy Clustering. IAIT 2013: 256-266 - Borworn Papasratorn, Nipon Charoenkitkarn, Vajirasak Vanijja, Vithida Chongsuphajaisiddhi:
Advances in Information Technology - 6th International Conference, IAIT 2013, Bangkok, Thailand, December 12-13, 2013. Proceedings. Communications in Computer and Information Science 409, Springer 2013, ISBN 978-3-319-03782-0 [contents]
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-01 15:26 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint