Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 92 matches
- 2008
- Ejaz Ahmed, Andrew J. Clark, George M. Mohay:
A Novel Sliding Window Based Change Detection Algorithm for Asymmetric Traffic. NPC Workshops 2008: 168-175 - Saleh I. Almotairi, Andrew J. Clark, George M. Mohay, Jacob Zimmermann:
Characterization of Attackers? Activities in Honeypot Traffic Using Principal Component Analysis. NPC Workshops 2008: 147-154 - María-Dolores Cano, Juan A. Romero, Fernando Cerdán:
Experimental Tests on SCTP over IPSec. NPC Workshops 2008: 96-102 - Rong-Jian Chen, Jui-Lin Lai:
Novel Stream Cipher Using 2-D Hybrid CA and Variable Ordered Recursive CA Substitutions. NPC Workshops 2008: 74-81 - Yanwei Chen, Demin Li, Chenwen Wang, Jiacun Wang:
MFDSSF: A Mobile Fuzzy Decision Support System for Firefighter Cooperation in Ad Hoc Networks. NPC Workshops 2008: 475-482 - Ji-Xi Chen, Qi Xu, Xinjian Gu, Guoning Qi, Hong-Fei Zhan:
Research on the Modeling of Semantic-Based Web Resources Feature. NPC Workshops 2008: 499-503 - Bo Chen, Guosun Zeng, Li Li:
Attribute Delegation Authorization Based on Subjective Trust Evaluation. NPC Workshops 2008: 42-49 - Aixiang Cui, Duanbing Chen, Yan Fu:
Community Detection Based on Weighted Networks. NPC Workshops 2008: 273-280 - Bin Dai, Yuan Luo, A. J. Han Vinck:
Wiretap Channel with Side Information from Part of Encoder. NPC Workshops 2008: 353-357 - Yusheng Dou, Mingze Bai, Hongjian Li, Hong Tang:
Parallel Computing in Semiclassical Dynamics Simulation of Photochemical Reactions. NPC Workshops 2008: 267-272 - Zi-fu Fan, Xu-yan Yang, Xiaoyu Wan:
Research on Mapping of MPCC SCF to SIP Protocol in Parlay/OSA API. NPC Workshops 2008: 323-327 - Yuan Feng, Lipeng Zhang, Peng Zhou:
EBMD: Energy-Balanced Multi-path Data Propation Algorithm for Sensor Networks. NPC Workshops 2008: 531-540 - Qi Gao, Junwei Yan, Min Liu:
A Semantic Approach to Recommendation System Based on User Ontology and Spreading Activation Model. NPC Workshops 2008: 488-492 - Fei Gao, Wen Tao Zhu:
A Dual-Head Cluster Based Secure Aggregation Scheme for Sensor Networks. NPC Workshops 2008: 103-110 - Junwei Ge, Yiqiu Fang, Shayne Flint:
Chaos of Software Requirements. NPC Workshops 2008: 251-257 - Pingli Gu, Jiuyun Xu, Changbao Li, Youxiang Duan:
Towards Mapping Large Scale Ontologies Based on RFCA with Attribute Reduction. NPC Workshops 2008: 407-411 - Xinjie Guan, Xili Wan, Junzhou Luo:
A Maximum Entropy Based Multi-dimensional Trust Model. NPC Workshops 2008: 226-232 - Zhongwen Guo, Xiaodong Liu, Yuan Feng:
An Adaptive Transmission Control Mechanism for Underwater Acoustic Sensor Network. NPC Workshops 2008: 525-530 - Sarosh Hashmi, John Brooke:
Towards Time Limited Secure Agent Execution on Malicious Host: A Concept Paper. NPC Workshops 2008: 155-162 - Li He, Shunzheng Yu, Min Li:
Anomaly Detection Based on Available Bandwidth Estimation. NPC Workshops 2008: 176-183 - Suk Yu Hui, Kai-Hau Yeung, Kin Yeung Wong:
Optimal Placement of Mesh Points in a Wireless Mesh Network Using Multi-path Routing Protocol. NPC Workshops 2008: 399-403 - Md. Rafiqul Islam, Jaipal Singh, Ashley Chonka, Wanlei Zhou:
Multi-classifier Classification of Spam Email on a Ubiquitous Multi-core Architecture. NPC Workshops 2008: 210-217 - Georg von Krogh, Seonwoo Kim, Zeynep Erden:
Fostering the Knowledge-Sharing Behavior of Customers in Interorganizational Healthcare Communities. NPC Workshops 2008: 426-433 - David Lai, Zhongwei Zhang:
Self-Authentication of Encrypted Channels in Service Network Graph. NPC Workshops 2008: 163-167 - Min Li, Xueyue Cao, Leiming Xu, Ping Zhang, Chi Yuan, Shuping Peng, Zhengbin Li:
A Distributed Fast Light-path Set-up Protocol for Grid over OBS Networks. NPC Workshops 2008: 375-382 - Hongjian Li, Hong Tang, Shixin Sun, Yusheng Dou:
A Parallel Algorithm for Simulating Photochemical Reaction. NPC Workshops 2008: 258-262 - Min Li, Shunzheng Yu, Li He:
Detecting Network-Wide Traffic Anomalies Based on Spatial HMM. NPC Workshops 2008: 198-203 - Peng Lin, WenLong Luo, Yanbing Liu:
A Spatial Renewal Video Traffic Model Based on Buffering Metrics. NPC Workshops 2008: 310-314 - Lian Lin, Zhongwen Li, Liang Shi:
Spam Mail Filtering Based on Network Processor. NPC Workshops 2008: 184-189 - Donglin Liu:
Synchronization of Discrete Chaotic Dynamical Systems Using Active Control. NPC Workshops 2008: 56-59
skipping 62 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-31 02:52 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint