default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 27 matches
- 2015
- Shailesh Acharya, Ashok Kumar Pant, Prashnna Kumar Gyawali:
Deep learning based large scale handwritten Devanagari character recognition. SKIMA 2015: 1-6 - Muhammad Sajjad Akbar, Hongnian Yu, Shuang Cang:
A holistic simulation model for remote patient monitoring systems using Wireless Body Area Sensor Networks (WBASNs). SKIMA 2015: 1-5 - Foteini Andriopoulou, Ilias Politis, Asimakis Lykourgiotis, Tasos Dagiuklas, Dionisios Serras, Yacine Rebahi:
EMYNOS: A next generation emergency communication platform for people with disabilities. SKIMA 2015: 1-8 - Ikram Asghar, Shuang Cang, Hongnian Yu:
A systematic mapping study on assitive technologies for people with dementia. SKIMA 2015: 1-8 - Deepak Bhardwaj, Kotaro Kataoka, V. Amith Vikram, Vishal Hirani:
Hybrid approach to distributed Wi-Fi performance assessment for multi-floor structures. SKIMA 2015: 1-8 - Jagdish Bhatta, Lok Prakash Pandey:
Performance analysis of various optimization techniques for elliptic curve cryptosystems on resource-constrained devices. SKIMA 2015: 1-7 - Munmun Bhattacharya, Papri Mani:
Preserving privacy in social network graph with K-anonymize degree sequence generation. SKIMA 2015: 1-7 - Wei Chen, Li Zhang, Ling Shao, Rosemary Bass, Chenyu Liu, M. Alamgir Hossain:
Modelling of tumour-induced angiogenesis with regress by immune factor. SKIMA 2015: 1-8 - Bidur Devkota, Bikram Adhikar, Deepanjal Shrestha:
Integrating romanized Nepali spellchecker with SMS based decision support system for Nepalese farmers. SKIMA 2015: 1-6 - Madeleine El-Zaher, Baudouin Dafflon, Franck Gechter:
A cyber-physical model for platoon system. SKIMA 2015: 1-8 - Umar Farooq, Tej Prasad Dhamala, Antoine Nongaillard, Yacine Ouzrout, Muhammad Abdul Qadir:
A word sense disambiguation method for feature level sentiment analysis. SKIMA 2015: 1-8 - Netra Gyawali, Bikram Paudel, Baburam Subedi:
Improved active power sharing strategy for ELC Controlled Synchronous Generators Based Islanded Micro Grid application. SKIMA 2015: 1-5 - Magne Jørgensen:
The effect of the time unit on software development effort estimates. SKIMA 2015: 1-5 - Sirinrat Khwanpheng, Khin T. Lwin, Roungsan Chaisricharoen, Punnarumol Temdee:
Collaborative crosschecking system of observed loss estimation for disaster relief management. SKIMA 2015: 1-5 - Piang-or Loahavilai, Nopasit Chakpitak, Pradorn Sureephong, Keshav P. Dahal:
Serious game to motivate the knowledge sharing among knowledge technicians in machinery relocation of foreign direct investment. SKIMA 2015: 1-7 - Chunbo Luo, Pablo Casaseca-de-la-Higuera, Xinheng Wang, Keshav P. Dahal, Cheng Jin, Peng Ren:
On the study of wireless signal noise for designing network infrastructure of knowledge management systems. SKIMA 2015: 1-8 - Emilia Mendes:
Key note speech 1: Predicting the overall value of decisions relating to software. SKIMA 2015: I-II - Napaporn Reeveerakul:
A practical way to integrate simulation based on SCOR model. SKIMA 2015: 1-5 - Nischal Regmi, Shailesh B. Pandey:
A regression analysis into Nepali ICT's energy consumption and its implications. SKIMA 2015: 1-8 - Hari Prasad Rimal, Morris Breuna, Nava Raj Karki, Ajit Kumar Verma:
Control of PMSG based wind turbines for renewables based DC distribution. SKIMA 2015: 1-7 - Mohammad Shameem, Chiranjeev Kumar, Bibhas Chandra:
Communication related issues in GSD: An exploratory study. SKIMA 2015: 1-5 - Dipesh Shrestha, Sanjeeb Prasad Panday:
Visual cryptography using image pixel transparency with cover image. SKIMA 2015: 1-4 - Ajaya Shrestha, Arun Timalsina:
Color image steganography technique using daubechies discrete wavelet transform. SKIMA 2015: 1-7 - Nilam Nur Amir Sjarif, Siti Mariyam Shamsuddin:
Human action invarianceness for human action recognition. SKIMA 2015: 1-7 - Sami Smadi, Nauman Aslam, Li Zhang, Rafe Alasem, M. Alamgir Hossain:
Detection of phishing emails using data mining algorithms. SKIMA 2015: 1-8 - Prem Lal Tamang, Pradip Kumar Paudyal:
A DBMS based inventory model and its timeframe study in automobile spare parts import management. SKIMA 2015: 1-8 - 9th International Conference on Software, Knowledge, Information Management and Applications, SKIMA 2015, Kathmandu, Nepal, December 15-17, 2015. IEEE 2015, ISBN 978-1-4673-6744-8 [contents]
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-29 07:21 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint