Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 138 matches
- 2013
- Mazlan Abbas, Nur Husna Md Yusof, Norsheila Fisal:
Performance evaluation of Binary Spray and Wait OppNet protocol in the context of emergency scenario. PerCom Workshops 2013: 517-522 - Ara Alexanyan, Hakob Aslanyan, José D. P. Rolim:
Symmetric-key encryption scheme based on the strong generating sets of permutation groups. PerCom Workshops 2013: 470-474 - Mohammad S. Almalag, Stephan Olariu, Michele C. Weigle, Samy El-Tawab:
Peer-to-peer file sharing in VANETs using TC-MAC. PerCom Workshops 2013: 84-89 - Moustafa Alzantot, Moustafa Youssef:
Demonstrating CrowdInside: A system for the automatic construction of indoor floor-plans. PerCom Workshops 2013: 321-323 - Wolfgang Apolinarski, Marcus Handte, Muhammad Umer Iqbal, Pedro José Marrón:
PIggy-backed key exchange using online services (PIKE). PerCom Workshops 2013: 309-311 - Yusuke Ariyoshi, Junzo Kamahara, Naoki Tanaka, Katsutoshi Hirayama, Takashi Nagamatsu, Yuuichi Teranishi:
Location-dependent content-based image retrieval system based on a P2P mobile agent framework. PerCom Workshops 2013: 72-77 - Valerio Arnaboldi, Marco Conti, Franca Delmastro, Giovanni Minutiello, Laura Ricci:
Sensor Mobile Enablement (SME): A light-weight standard for opportunistic sensing services. PerCom Workshops 2013: 236-241 - Udayanto Dwi Atmojo, Zoran Salcic, Kevin I-Kai Wang:
System-level approach to the design of collaborative distributed systems based on wireless sensor and actuator networks. PerCom Workshops 2013: 634-639 - Gernot Bahle, Paul Lukowicz, Kai Kunze, Koichi Kise:
I see you: How to improve wearable activity recognition by leveraging information from environmental cameras. PerCom Workshops 2013: 409-412 - Gerald Bauer, Ulf Blanke, Paul Lukowicz, Bernt Schiele:
User independent, multi-modal spotting of subtle arm actions with minimal training data. PerCom Workshops 2013: 8-13 - Filipe Beato, Mauro Conti, Bart Preneel:
Friend in the Middle (FiM): Tackling de-anonymization in social networks. PerCom Workshops 2013: 279-284 - Sven Bendel, Thomas Springer, Daniel Schuster, Alexander Schill, Ralf Ackermann, Michael Ameling:
A service infrastructure for the Internet of Things based on XMPP. PerCom Workshops 2013: 385-388 - Kyle E. Benson, Nalini Venkatasubramanian:
Improving sensor data delivery during disaster scenarios with resilient overlay networks. PerCom Workshops 2013: 547-552 - Kevin Benton, L. Jean Camp, Vaibhav Garg:
Studying the effectiveness of android application permissions requests. PerCom Workshops 2013: 291-296 - Luca Bergesio, Inigo Marquinez, Ana M. Bernardos, Juan A. Besada, José R. Casar:
PERSEO: A system to personalize the environment response through smart phones and objects. PerCom Workshops 2013: 640-645 - Muhammed Fatih Bulut, Murat Demirbas:
Energy efficient proximity alert on Android. PerCom Workshops 2013: 157-162 - Laurie L. Butgereit, Reinhardt A. Botha:
An architecture for synchronous micro-volunteering in Africa using social media. PerCom Workshops 2013: 175-180 - Carlo Caprini, Mattia Zeni, Nicola Conci, Iacopo Carreras, Daniele Miorandi:
TinyBox: Social, local, mobile content sharing. PerCom Workshops 2013: 300-302 - Darren Carlson, Bashar Altakrouri, Andreas Schrader:
Reinventing the share button for physical spaces. PerCom Workshops 2013: 318-320 - Iacopo Carreras, Daniele Miorandi, Andrei Tamilin, Emmanuel Ssebaggala, Nicola Conci:
Matador: Mobile task detector for context-aware crowd-sensing campaigns. PerCom Workshops 2013: 212-217 - Iacopo Carreras, Daniele Miorandi, Andrei Tamilin, Emmanuel Ssebaggala, Nicola Conci:
Crowd-sensing: Why context matters. PerCom Workshops 2013: 368-371 - Lien-Wu Chen, Chia-Chen Chang, Pranay Sharma, Jen-Hsiang Cheng, Chien-Cheng Wu, Yu-Chee Tseng:
A lane-level dynamic traffic control system for driving efficiency optimization based on vehicular networks. PerCom Workshops 2013: 297-299 - Chien-Ming Cheng:
A two-tier VANET/P2P system for information retrieval in vehicular environments. PerCom Workshops 2013: 415-416 - Gualtiero Colombo, Matthew J. Chorley, Vlad Tanasescu, Stuart M. Allen, Christopher B. Jones, Roger M. Whitaker:
Will you like this place? A tag-based place representation approach. PerCom Workshops 2013: 224-229 - Pietro Cottone, Giuseppe Lo Re, Gabriele Maida, Marco Morana:
Motion sensors for activity recognition in an ambient-intelligence scenario. PerCom Workshops 2013: 646-651 - Waltenegus Dargie, Eldora, Julian Mendez, Christoph Möbius, Kateryna Rybina, Veronika Thost, Anni-Yasmin Turhan:
Situation recognition for service management systems using OWL 2 reasoners. PerCom Workshops 2013: 31-36 - Murat Demirbas, Yavuz Selim Yilmaz, Muhammed Fatih Bulut:
Eywa: Crowdsourced and cloudsourced omniscience. PerCom Workshops 2013: 193-198 - Antoine Desmet, Erol Gelenbe:
Graph and analytical models for emergency evacuation. PerCom Workshops 2013: 523-527 - Raheleh B. Dilmaghani, Ramesh R. Rao:
Supervisory decision making in emergency response application. PerCom Workshops 2013: 553-558 - Soufiene Djahel, Mazeiar Salehie, Irina Tal, Pooyan Jamshidi:
Adaptive traffic management for secure and efficient emergency services in smart cities. PerCom Workshops 2013: 340-343
skipping 108 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-24 15:42 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint