Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 72 matches
- 2007
- Sinuhé Arroyo, Alistair Duke, José Manuel López Cobo, Miguel-Ángel Sicilia:
A model-driven choreography conceptual framework. Comput. Stand. Interfaces 29(3): 325-334 (2007) - Filippo Attivissimo, Nicola Giaquinto, Mario Savino:
Worst-case uncertainty measurement in ADC-based instruments. Comput. Stand. Interfaces 29(1): 5-10 (2007) - Bertan Bakkaloglu, Sayfe Kiaei, Bikram Chaudhuri:
Delta-sigma (DeltaSigma) frequency synthesizers for wireless applications. Comput. Stand. Interfaces 29(1): 19-30 (2007) - Ivan Cibrario Bertolotti, Luca Durante, Paolo Maggi, Riccardo Sisto, Adriano Valenzano:
Improving the security of industrial networks by means of formal verification. Comput. Stand. Interfaces 29(3): 387-397 (2007) - Kemal Bicakci:
One-time proxy signatures revisited. Comput. Stand. Interfaces 29(4): 499-505 (2007) - Aleksej Jerman Blazic, Tomaz Klobucar, Borka Dzonova-Jerman-Blazic:
Long-term trusted preservation service using service interaction protocol and evidence records. Comput. Stand. Interfaces 29(3): 398-412 (2007) - Lotfi Boussaid, Abdellatif Mtibaa, Mohamed Abid, Michel Paindavoine:
A real-time shot cut detector: Hardware implementation. Comput. Stand. Interfaces 29(3): 335-342 (2007) - Gianluca Cena, Ivan Cibrario Bertolotti, Adriano Valenzano:
A socket interface for CAN devices. Comput. Stand. Interfaces 29(6): 662-673 (2007) - Kui Fu Chen:
On the condition of four-parameter sine wave fitting. Comput. Stand. Interfaces 29(2): 174-183 (2007) - Tzungher Chen, Gwoboa Horng:
A lightweight and anonymous copyright-protection protocol. Comput. Stand. Interfaces 29(2): 229-237 (2007) - Min-Xiou Chen, Chen-Jui Peng, Ren-Hung Hwang:
SSIP: Split a SIP session over multiple devices. Comput. Stand. Interfaces 29(5): 531-545 (2007) - Kui Fu Chen, Yi-Ming Xue:
Improving four-parameter sine wave fitting by normalization. Comput. Stand. Interfaces 29(2): 184-190 (2007) - Hung-Yu Chien, Che-Hao Chen:
Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards. Comput. Stand. Interfaces 29(2): 254-259 (2007) - Yu-Fang Chung, Kuo-Hsuan Huang, Feipei Lai, Tzer-Shyong Chen:
ID-based digital signature scheme on the elliptic curve cryptosystem. Comput. Stand. Interfaces 29(6): 601-604 (2007) - Ram Dantu, Gabriel Clothier, Anuj Atri:
EAP methods for wireless networks. Comput. Stand. Interfaces 29(3): 289-301 (2007) - Tineke M. Egyedi:
Standard-compliant, but incompatible?! Comput. Stand. Interfaces 29(6): 605-613 (2007) - Angelo Furfaro, Libero Nigro:
Timed verification of hierarchical communicating real-time state machines. Comput. Stand. Interfaces 29(6): 635-646 (2007) - Raju Gangishetti, M. Choudary Gorantla, Manik Lal Das, Ashutosh Saxena:
Threshold key issuing in identity-based cryptosystems. Comput. Stand. Interfaces 29(2): 260-264 (2007) - Douglas Harris, Latifur Khan, Raymond Paul, Bhavani Thuraisingham:
Standards for secure data sharing across organizations. Comput. Stand. Interfaces 29(1): 86-96 (2007) - Xiaoming Hu, Shangteng Huang:
A novel proxy key generation protocol and its application. Comput. Stand. Interfaces 29(2): 191-195 (2007) - Albert H. Huang, Shin-Yuan Hung, David C. Yen:
An exploratory investigation of two internet-based communication modes. Comput. Stand. Interfaces 29(2): 238-243 (2007) - Shin-Yuan Hung, Albert H. Huang, David C. Yen, Chia-Ming Chang:
Comparing the task effectiveness of instant messaging and electronic mail for geographically dispersed teams in Taiwan. Comput. Stand. Interfaces 29(6): 626-634 (2007) - Gülfem Isiklar, Gülçin Büyüközkan:
Using a multi-criteria decision making approach to evaluate mobile phone alternatives. Comput. Stand. Interfaces 29(2): 265-274 (2007) - Jean-Marie Janik, Vincent Fresnaud:
A spectral approach to estimate the INL of A/D converter. Comput. Stand. Interfaces 29(1): 31-37 (2007) - Ho-Won Jung:
Validating the external quality subcharacteristics of software products according to ISO/IEC 9126. Comput. Stand. Interfaces 29(6): 653-661 (2007) - Monika Kapus-Kolar:
Enhanced event structures: Towards a true concurrency semantics for E-LOTOS. Comput. Stand. Interfaces 29(2): 205-215 (2007) - Latifur Khan:
Standards for image annotation using Semantic Web. Comput. Stand. Interfaces 29(2): 196-204 (2007) - Muhammad Khurram Khan, Jiashu Zhang:
Improving the security of 'a flexible biometrics remote user authentication scheme'. Comput. Stand. Interfaces 29(1): 82-85 (2007) - Jung-Min Kim, Byoung-Il Choi, Hyo-Phil Shin, Hyoung-Joo Kim:
A methodology for constructing of philosophy ontology based on philosophical texts. Comput. Stand. Interfaces 29(3): 302-315 (2007) - Jeong Ok Kwon, Ik Rae Jeong, Kouichi Sakurai, Dong Hoon Lee:
Efficient verifier-based password-authenticated key exchange in the three-party setting. Comput. Stand. Interfaces 29(5): 513-520 (2007)
skipping 42 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-23 12:58 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint