default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 136 matches
- 2014
- Durga Prasad Mohapatra, Srikanta Patnaik:
Intelligent Computing, Networking, and Informatics, Proceedings of the International Conference on Advanced Computing, Networking, and Informatics, ICACNI 2013, Raipur, Chhattisgarh, India, 12-14 June 2013. Advances in Intelligent Systems and Computing 243, Springer 2014, ISBN 978-81-322-1664-3 [contents] - 2013
- Syed Mutahar Aaqib, Lalitsen Sharma:
Using a Cluster for Efficient Scalability Evaluation of Multithreaded and Event-Driven Web Servers. ICACNI 2013: 627-636 - Mohsen Abdoli, Reza Entezari-Maleki, Ali Movaghar:
A Rank-Based Hybrid Algorithm for Scheduling Data- and Computation-Intensive Jobs in Grid Environments. ICACNI 2013: 785-796 - S. Akhilan, S. R. Balasundaram:
Personalizing News Documents Using Modified Page Rank Algorithms. ICACNI 2013: 1055-1061 - Mary Alias, Chinnanadar Ramachandran Rene Robin:
An Ontology-Based Software Development Environment Using Upgraded Functionalities of Clojure. ICACNI 2013: 619-625 - A. V. AnanthaLakshmi, G. Florence Sudha:
Transistor Representation of a Low-Power Reversible 32-Bit Comparator. ICACNI 2013: 67-79 - E. Anupriya, N. Ch. S. N. Iyengar:
Concept Based Clustering of Documents with Missing Semantic Information. ICACNI 2013: 579-589 - S. Asha, C. Chellappan:
Partial Fingerprint Matching Using Minutiae Subset. ICACNI 2013: 445-452 - K. B. Ashwini, G. T. Raju:
Extending Network Lifetime by Time-Constrained Data Aggregation in Wireless Sensor Networks. ICACNI 2013: 11-16 - J. Jai Jaganath Babu, Gnanou Florence Sudha:
Non-subsampled Contourlet Transform-Based Image Denoising in Ultrasound Images Using Elliptical Directional Windows and Block-Based Noise Estimation. ICACNI 2013: 241-250 - Anita Bai:
Multiobjective Clustering Using Support Vector Machine: Application to Microarray Cancer Data. ICACNI 2013: 1209-1215 - Anita Bai, Anima Pradhan:
Feature Extraction and Classification of Microarray Cancer Data Using Intelligent Techniques. ICACNI 2013: 1277-1284 - Sambit Bakshi, Rahul Raman, Pankaj Kumar Sa:
A Novel Approach for Eye Gaze and Tilt Estimation. ICACNI 2013: 1187-1193 - Kaliuday Balleda, D. Satyanvesh, P. K. Baruah:
GenSeeK: A Novel Parallel Multiple Pattern Recognition Algorithm for DNA Sequences. ICACNI 2013: 1001-1006 - Neha Baranwal, Ganesh Jaiswal, Gora Chand Nandi:
A Speech Recognition Technique Using MFCC with DWT in Isolated Hindi Words. ICACNI 2013: 697-703 - Vaibhav Bhardwaj, Sudhanshu Prakash Tiwari:
Solving Planar Graph Coloring Problem Using PSO with SPV Rule. ICACNI 2013: 955-965 - Kishore Biradar, Radhika M. Pai, M. M. Manohara Pai, Joseph Mouzna:
Secure Adaptive Traffic Lights System for VANETs. ICACNI 2013: 873-883 - Adonu Celestine, J. Dinesh Peter:
Modified Graph-Cut Algorithm with Adaptive Shape Prior. ICACNI 2013: 473-479 - Aartika Chandrakar, Rajib Sarkar:
Secure Routing Technique in MANET: A Review. ICACNI 2013: 1291-1307 - U. Chandrasekhar, Digvijay Singh:
Understanding Query Vulnerabilities for Various SQL Injection Techniques. ICACNI 2013: 1063-1075 - Rama Seshagiri Rao Channapragada, Munaga V. N. K. Prasad:
Digital Watermarking Based on Magic Square and Ridgelet Transform Techniques. ICACNI 2013: 143-161 - Devendra Chaphekar, Bhisham Sonkar, Gupteshwar Gupta:
Study of Framework of Mobile IP and MANET Integration. ICACNI 2013: 985-992 - Ananya Chatterjee, Arun Mishra:
Securing the Root Through SELinux. ICACNI 2013: 653-659 - Himadri Chauhan, Vipin Kumar, Sumit Pundir, Emmanuel S. Pilli:
Comparative Analysis and Research Issues in Classification Techniques for Intrusion Detection. ICACNI 2013: 675-685 - P. K. A. Chitra, S. Appavu alias Balamurugan:
Performance Analysis of Transformation Methods in Multi-Label Classification. ICACNI 2013: 1233-1239 - A. B. Arockia Christopher, S. Appavu alias Balamurugan:
Prediction of Warning Level in Aircraft Accidents using Classification Techniques: An Empirical Study. ICACNI 2013: 1217-1223 - Suman Das:
Generation of AES-like 8-bit Random S-Box and Comparative Study on Randomness of Corresponding Ciphertexts with Other 8-bit AES S-Boxes. ICACNI 2013: 303-318 - Himansu Das, Gouri Sankar Panda, Bhagaban Muduli, Pradeep Kumar Rath:
The Complex Network Analysis of Power Grid: A Case Study of the West Bengal Power Network. ICACNI 2013: 17-29 - Sanjoy Das, Ram Shringar Raw, Indrani Das, Rajib Sarkar:
Performance Analysis of Routing Protocols for VANETs with Real Vehicular Traces. ICACNI 2013: 45-56 - Prajna Parimita Dash, Dipti Patra, Sudhansu Kumar Mishra:
Local Binary Pattern as a Texture Feature Descriptor in Object Tracking Algorithm. ICACNI 2013: 541-548
skipping 106 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-29 03:00 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint