Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 125 matches
- 2014
- Ahmed Abdelgawad:
Distributed data fusion algorithm for Wireless Sensor Network. ICNSC 2014: 334-337 - Layla AlAbdulkarim, Eric Molin, Zofia Lukszo, Theo Fens:
Acceptance of ICT-intensive socio-technical infrastructure systems: Smart metering case in the Netherlands. ICNSC 2014: 399-404 - Salman AlQahtani:
Study of an admission control with adaptive probability in relay enhanced LTE-Advanced networks. ICNSC 2014: 372-379 - Salman AlQahtani, Hassan Ahmed:
An admission control scheme for secondary users in cognitive radio networks. ICNSC 2014: 245-250 - Abdulaziz S. Alsayyari, Ivica Kostanic, Carlos E. Otero:
An empirical path loss model for Wireless Sensor Network deployment in an artificial turf environment. ICNSC 2014: 637-642 - Matthew Anderson, Sandeep K. Shukla:
APECS code synthesis: Extending ocarina for multi-threaded code synthesis from AADL models for Safety Critical applications. ICNSC 2014: 36-41 - D. Arivudainambi, Sethuraman Balaji, Duraisamy Rekha:
Improved memetic algorithm for energy efficient target coverage in wireless sensor networks. ICNSC 2014: 261-266 - David Caicedo, Ashish Pandharipande, Frans M. J. Willems:
Light sensor calibration and dimming sequence design in distributed lighting control systems. ICNSC 2014: 344-349 - Ni-Bin Chang, A. James Crawford, Golam Mohiuddin:
Flow measurements with a cross-type Automatic Pulse Tracer Velocimeter (APTV) in heterogeneous environments. ICNSC 2014: 643-648 - Ni-Bin Chang, Sanaz Imen, L. Mullen, Chi-Farn Chen, Miguel Conrado Valdez, J. Yang:
Multisensor analysis of teleconnection signals in relation to terrestrial precipitation and forest greenness in North and Central America. ICNSC 2014: 649-654 - Daniel Yuh Chao, Tsung Hsien Yu, Chia Chang Liou:
Enumeration of reachable, forbidden, live, and deadlock states of bottom k-th order system (with a left side non-sharing resource place) of Petri nets. ICNSC 2014: 572-577 - Daniel Yuh Chao, Tsung Hsien Yu, Sou-Chein Wu:
Closed form formula construction to enumerate control related states of K-th order S3PR system (with a Top Left side non-sharing resource place) of Petri nets. ICNSC 2014: 132-137 - Yen-Lin Chen, Yo-Ping Huang, Hsin-Han Chiang, Tsu-Tian Lee:
Ubiquitous knowledge-based framework for personalized home healthcare systems. ICNSC 2014: 673-678 - Jun Chen, Ratnesh Kumar:
Failure diagnosis of discrete-time stochastic systems subject to temporal logic correctness requirements. ICNSC 2014: 42-47 - Lijun Chen, Zhaoyuan Liu, Weiwei Jia:
A snapshot system based on cloud storage Log-Structured Block System. ICNSC 2014: 392-398 - Zhongbo B. Chen, Xingwei W. Pan, Li Li, Qijun Chen, Weisheng S. Xu:
A new release control policy (WRELM) for semiconductor wafer fabrication facilities. ICNSC 2014: 64-68 - Shuangwu Chen, Jian Yang, Enzhong Yang, Hongsheng Xi:
Receiver-driven adaptive layer switching algorithm for scalable video streaming over wireless networks. ICNSC 2014: 221-226 - Chabane Chenane, Hichem Arioui, Dalil Ichalal, Saïd Mammar, Sebastien Glaser:
Analysis of the leaning limit dynamics of Powered Two Wheeled vehicles. ICNSC 2014: 701-706 - Hung-Chi Chu, Hao Yang:
A simple image-based object velocity estimation approach. ICNSC 2014: 102-107 - Hou-Kun Dai, Zong-Xiao Yang, Lei Song:
Mathematical modeling for H-type vertical axis wind turbine. ICNSC 2014: 695-700 - Jijie Deng, Zhengcai Cao, Min Liu:
A bottleneck prediction and rolling horizon scheme combined dynamic scheduling algorithm for semiconductor wafer fabrication. ICNSC 2014: 58-63 - Yizhou Dong, Ming Yu:
An application-specific routing algorithm to maximize flow-lifetime in sensor networks. ICNSC 2014: 19-23 - Mohammadreza Doostmohammadian, Sepideh Pourazarm, Usman A. Khan:
Distributed algorithm for shortest path problem via randomized strategy. ICNSC 2014: 463-467 - R. Elakkiya, K. Selvamani, Kanimozhi Sakthivel:
An enhanced model for effective recognition and segmentation of SLG in dynamic video sequence using boosted learning algorithm. ICNSC 2014: 108-113 - Omair Fatmi, Deng Pan:
Distributed multipath routing for data center networks based on stochastic traffic modeling. ICNSC 2014: 536-541 - M'hamed Frad, Hichem Maaref, Samir Otmane, Abdellatif Mtibaa:
SPIDAR calibration based on regression methods. ICNSC 2014: 679-684 - Xiuwen Fu, Wenfeng Li:
Cascading failures of wireless sensor networks. ICNSC 2014: 631-636 - Guoqin Gao, Ming Li:
Study on navigating path recognition for the greenhouse mobile robot based on K-means algorithm. ICNSC 2014: 451-456 - Xiongfei Geng, Yongcai Wang, Haoran Feng, Zhoufeng Chen:
Hybrid radio-map for noise tolerant wireless indoor localization. ICNSC 2014: 233-238 - Rober Grimes, Junhua Ding:
Development of a novel cryptography tool for personal communication. ICNSC 2014: 411-416
skipping 95 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-21 11:35 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint