Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 80 matches
- 2007
- Fernando Alonso-Fernandez, Julian Fiérrez-Aguilar, Hartwig Fronthaler, Klaus Kollreider, Javier Ortega-Garcia, Joaquin Gonzalez-Rodriguez, Josef Bigün:
Combining multiple matchers for fingerprint verification: A case study in biosecure network of excellence. Ann. des Télécommunications 62(1-2): 62-82 (2007) - Eitan Altman, Rachid El Azouzi:
La théorie des jeux non-coopératifs appliquée aux réseaux de télécommunication. Ann. des Télécommunications 62(7-8): 827-846 (2007) - Houssem Assadi, Philippe Owezarski, Ben Anderson:
Analysis of Internet traffic and usage traces. Ann. des Télécommunications 62(3-4): 275-278 (2007) - Houssem Assadi, Philippe Owezarski, Ben Anderson:
Analyse de trafic et de traces d'usage de l'internet. Ann. des Télécommunications 62(3-4): 279-282 (2007) - Nicolas Auray, Danielle Kaminsky:
The professionalisation paths of hackers in IT security: The sociology of a divided identity. Ann. des Télécommunications 62(11-12): 1312-1326 (2007) - Fabrice Auzanneau, Nicolas Ravot:
Détection et localisation de défauts dans des réseaux filaires de topologie complexe. Ann. des Télécommunications 62(1-2): 193-213 (2007) - Siamak Azodolmolky, Anna Tzanakaki, Ioannis Tomkos:
A simulation study of adaptive burst assembly algorithms in optical burst switched networks with self-similar traffic sources. Ann. des Télécommunications 62(5-6): 584-603 (2007) - Arab Azrar, Ali Chemsa, Rabia Aksas:
Novel analysis and design approaches of the planar antenna arrays. Ann. des Télécommunications 62(9-10): 1053-1078 (2007) - Thomas Beauvisage, Valérie Beaudouin, Houssem Assadi:
Internet 1.0: early users, early uses. Ann. des Télécommunications 62(3-4): 283-304 (2007) - Alexis Bonnecaze, Philippe Trebuchet:
Threshold signature for distributed time stamping scheme. Ann. des Télécommunications 62(11-12): 1353-1364 (2007) - Pierre Borgnat, Patrice Abry, Guillaume Dewaele, Antoine Scherrer, Nicolas Larrieu, Philippe Owezarski, Yann Labit, Laurent Gallon, Julien Aussibal:
Une caractérisation non gaussienne et à longue mémoire du trafic Internet et de ses anomalies: validation expérimentale et application à la détection d'attaque de DDoS/Non Gaussian Long Memory Model for Internet Traffic: Experimental Validation and Application to DDoS Detection. Ann. des Télécommunications 62(11-12): 1401-1428 (2007) - Mohamed Salah Bouassida, Najah Chridi, Isabelle Chrisment, Olivier Festor, Laurent Vigneron:
Automated verification of a key management architecture for hierarchical group protocols. Ann. des Télécommunications 62(11-12): 1365-1387 (2007) - Dominique Boullier, Pascal Jollivet, Frédéric Audren:
Security: always too much and never enough Anthropology of a non-starter market. Ann. des Télécommunications 62(11-12): 1274-1292 (2007) - Merouane Bouzid:
Codage conjoint source-canal des paramètres lsf du codeur FS1016: application de la quantification vectorielle par treillis optimisée pour un canal bruité. Ann. des Télécommunications 62(3-4): 426-463 (2007) - Jean Charlet:
The management of medical knowledge: between non-structured documents and ontologies. Ann. des Télécommunications 62(7-8): 808-826 (2007) - Francis Chateauraynaud, Patrick Trabal:
Des vigiles invisibles: les administrateursréseaux et la sécurité informatique. Ann. des Télécommunications 62(11-12): 1293-1311 (2007) - Jan Coppens, Stijn De Smet, Steven Van den Berghe, Filip De Turck, Piet Demeester:
Packet filter optimization techniques for high-speed network monitoring. Ann. des Télécommunications 62(3-4): 387-407 (2007) - Frédéric Cuppens, Hervé Debar, Danielle Boulanger, Alban Gabillon:
Introduction Selection of articles from the SAR-SSI 2006. Ann. des Télécommunications 62(11-12): 1327 (2007) - Rudy Deca, Omar Cherkaoui, Yvon Savaria, Doug Slone:
Constraint-based model for network service provisioning. Ann. des Télécommunications 62(7-8): 847-870 (2007) - Ibrahim Develi:
A method for predicting rain attenuation in terrestrial point-to-point line of sight links at 97 GHz. Ann. des Télécommunications 62(9-10): 1035-1044 (2007) - Rémi Dorat, Matthieu Latapy, Bernard Conein, Nicolas Auray:
Multi-level analysis of an interaction network between individuals in a mailing-list. Ann. des Télécommunications 62(3-4): 325-349 (2007) - Bernadette Dorizzi, Carmen García-Mateo:
Multimodal Biometrics. Ann. des Télécommunications 62(1-2): 2-10 (2007) - Pascual Ejarque, Ainara Garde, Jan Anguita, Javier Hernando:
On the use of genuine-impostor statistical information for score fusion in multimodal biometrics/sur l'usage de l'information statistioue client-imposteur pour la fusion des scores en biométrie multimodale. Ann. des Télécommunications 62(1-2): 109-129 (2007) - Valérie Fernandez, Henri Isaac:
Assessment of and prospect for research on knowledge management in Europe. Ann. des Télécommunications 62(7-8): 938-945 (2007) - Valérie Fernandez, Suzanne Rivard:
Foreword KM: knowledge networks. Ann. des Télécommunications 62(7-8): 723-733 (2007) - Françoise Fessant, Joël François, Fabrice Clérot:
Characterizing ADSL customer behaviours by network traffic data-mining. Ann. des Télécommunications 62(3-4): 350-368 (2007) - Mounir Frikha, Nihed Bahria El Asghar, Ahmed Kolsi:
Une nouvelle approche pour la gestion de la qualité de service dans les réseaux UMTS. Ann. des Télécommunications 62(9-10): 1013-1034 (2007) - Sonia Garcia-Salicetti, Julian Fiérrez-Aguilar, Fernando Alonso-Fernandez, Claus Vielhauer, Richard M. Guest, Lorène Allano, Doan Trung Tung, Tobias Scheidat, Van-Bao Ly, Jana Dittmann, Bernadette Dorizzi, Javier Ortega-Garcia, Joaquin Gonzalez-Rodriguez, Martino Bacile Di Castiglione, Michael C. Fairhurst:
Biosecure reference systems for on-line signature verification: A study of complementarity. Ann. des Télécommunications 62(1-2): 36-61 (2007) - Matthieu Gautier, Joel Lienard:
Application de la modulation multiporteuse par paquets d'ondelettes aux transmissions sans fil. Ann. des Télécommunications 62(7-8): 871-893 (2007) - Julie Gervais, Pierre Cossette:
Gestion de la connaissance et cartographie cognitive: une étude sur la collaboration interorganisationnelle. Ann. des Télécommunications 62(7-8): 786-807 (2007)
skipping 50 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-25 02:39 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint