![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 50 matches
- 2017
- Fathy S. Elkazzaz, Mohammed A. H. Abozied
, Chunming Hu:
Hybrid RRT/DE Algorithm for High Performance UCAV Path Planning. ICNCC 2017: 235-242 - Jisong Fan, Hui Ren, Chengxiang Tian:
An Analysis of Wargame Rules Simulation Based on Stochastic Lanchester Models. ICNCC 2017: 135-139 - Aruna Govada
, Abhinav Patluri, Atmika Honnalgere:
Association Rule Mining using Apriori for Large and Growing Datasets under Hadoop. ICNCC 2017: 14-17 - Wenxia Guo, Xiaoqin Ren, Wenhong Tian, Srikumar Venugopal:
Self-Adaptive Consolidation of Virtual Machines For Energy-Efficiency in the Cloud. ICNCC 2017: 120-124 - Ling Guo, Yue Yuan:
Forecast Method of Short - term Passenger Flow on Urban Rail Transit. ICNCC 2017: 24-28 - Majun He, GuoZhong Li, Chaojie Huang, Yufei Ye, Wenhong Tian:
A Comparative Study of Data Skew in Hadoop. ICNCC 2017: 1-6 - Jieping Hu, Shulin Yang, Bin Wang, Guyang Wang:
Design and Implementation of Remote Service Diagnosis System for Printing Machine. ICNCC 2017: 145-149 - Chengcheng Huang, Wei Peng, Housen Li, Lizhi Cheng, Hao Jiang:
Computing Diagonals of Toeplitz Pentadiagonal Matrix Inverses via Matrix Möbius Transformations. ICNCC 2017: 69-74 - Hajime Kawagoe, Masashi Sugano
:
Implementation of Time Synchronization for Energy Harvesting Wireless Sensor Network. ICNCC 2017: 175-178 - Mengyue Li, Yuchun Guo, Yishuai Chen:
CNN-based Commercial Detection in TV Broadcasting. ICNCC 2017: 48-53 - Meng Li, Yasushi Shinjo:
Grouper: A Framework for Developing Mobile Applications using a Secret Sharing Scheme and Untrusted Servers. ICNCC 2017: 125-134 - Shaowei Li, Shengzheng Wang:
Design Method for Ship Handling Simulator Based On CPLD. ICNCC 2017: 243-247 - Shaowei Li, Shengzheng Wang:
Design and Implementation of Sounder Simulator Based on Cross-platform. ICNCC 2017: 248-252 - Mingda Li, Qingxv Xiong, Long Yuan:
A Network Interconnection System and Framework Based on Semantic Communication. ICNCC 2017: 187-190 - Jingxi Liang, Wen Zhao, Wei Ye:
Anomaly-Based Web Attack Detection: A Deep Learning Approach. ICNCC 2017: 80-85 - Lu Liu, Shuqing Li:
A New Method of Recognizing Enterprise Core Financial Indexes Based on Similarity Calculation. ICNCC 2017: 212-216 - Chunmei Liu, Lingjuan Miao, Tian Dai:
A Fuzzy Pattern Based ICCP Matching Algorithm in Gravity-Aided Navigation. ICNCC 2017: 54-58 - Yujing Liu, Zhilin Wang, Nan Li:
A Case Study of Detecting and Characterizing Large-Scale Prefix Hijackings in the Internet. ICNCC 2017: 110-114 - Christian Ango Mbom, James Kweku Nkrumah Nyarko, Rugui Yao, Ling Wang:
Interference Alignment for Cellular Networks with Jacobian Eigenvalue. ICNCC 2017: 179-182 - Yafei Ouyang, Qun Niu, Yang Zhang:
Combined Heat and Power Economic Dispatch Using Differential Evolution. ICNCC 2017: 222-226 - Shifei Qian, Feng Luo, Jinpeng Xu:
An Analysis of Frame Replication and Elimination for Time-Sensitive Networking. ICNCC 2017: 166-170 - Feng Qu, Jitao Zhang, Zetian Shao, Shuzhuang Qi:
An Intrusion Detection Model Based on Deep Belief Network. ICNCC 2017: 97-101 - Fatin Hamadah Rahman, Thien-Wan Au, S. H. Shah Newaz, Wida Susanty Suhaili
:
Trustworthiness in Fog: A Fuzzy Approach. ICNCC 2017: 207-211 - Mohammad Abu Sarhan, Min Ding, Xin Chen, Min Wu:
Performance Study of Neural Network and ANFIS Based MPPT Methods For Grid Connected PV System. ICNCC 2017: 227-234 - Kai Shu, Yanteng Wang, Guanghui Zhao:
Beamforming with Enhanced CNN Network. ICNCC 2017: 197-201 - Haobin Sun, Shengli Liu, Da Xiao, Ruiqing Xiao:
Applying Binary Patch Comparison to Cisco IOS. ICNCC 2017: 38-42 - Zheng Sun, Fuyou Miao, Yang Xu, Qiyu Shao, Weihua Wang, Xingfu Wang, Chenxi Shao:
Community detection in complex networks using flow simulation. ICNCC 2017: 150-155 - Yifan Tian, Jiabao Wang, Zhenji Zhou, Shengli Zhou:
CNN-Webshell: Malicious Web Shell Detection with Convolutional Neural Network. ICNCC 2017: 75-79 - Yutong Wang, Yuge Liu:
Research on Facial Expression Recognition based on Kinect. ICNCC 2017: 29-33 - Chengcheng Wang, Yuqing Lan:
PFESG: Permission-based Android Malware Feature Extraction Algorithm. ICNCC 2017: 106-109
skipping 20 more matches
loading more results
failed to load more results, please try again later
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-12 00:47 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint