![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 39 matches
- 2009
- Beongku An, Tran Trung Duy
, Hyung Yun Kong:
A Cooperative Transmission Strategy using Entropy-based Relay Selection in Mobile Ad-hoc Wireless Sensor Networks with Rayleigh Fading Environments. KSII Trans. Internet Inf. Syst. 3(2): 147-162 (2009) - Sung-Pil Choi, Sung-Hyon Myaeng, Hyun-Yang Cho:
Guiding Practical Text Classification Framework to Optimal State in Multiple Domains. KSII Trans. Internet Inf. Syst. 3(3): 285-308 (2009) - Euri Choi, Yunyoung Nam, Bora Kim, Weduke Cho:
An Incremental Statistical Method for Daily Activity Pattern Extraction and User Intention Inference. KSII Trans. Internet Inf. Syst. 3(3): 219-234 (2009) - Amandeep Dhir, Jyotsna Sengupta:
Security-Aware Optimized Link Routing Protocol for Mobile Ad-Hoc Network. KSII Trans. Internet Inf. Syst. 3(1): 52-83 (2009) - Sook-Jeong Ha, Ihn-Han Bae, Jin-Gyu Kim, Young-Ho Park, Sun-Jin Oh:
An Expanded Patching Technique using Four Types of Streams for True VoD Services. KSII Trans. Internet Inf. Syst. 3(5): 444-460 (2009) - Sunghyuck Hong:
Secure and Efficient Tree-based Group Diffie-Hellman Protocol. KSII Trans. Internet Inf. Syst. 3(2): 178-194 (2009) - Sangkil Jung, Jinseok Lee
, Sangjin Hong:
On Addressing Network Synchronization in Object Tracking with Multi-modal Sensors. KSII Trans. Internet Inf. Syst. 3(4): 344-365 (2009) - Dong-Wook Lee, Jai-Hoon Kim:
Analysis of Optimized Aggregation Timing in Wireless Sensor Networks. KSII Trans. Internet Inf. Syst. 3(2): 209-218 (2009) - Hyoung Do Kim:
Applying Consistency-Based Trust Definition to Collaborative Filtering. KSII Trans. Internet Inf. Syst. 3(4): 366-375 (2009) - Su-Do Kim, Man-Gon Park:
An Adaptation System based on Personalized Web Content Items for Mobile Devices. KSII Trans. Internet Inf. Syst. 3(6): 628-646 (2009) - SangJun Ko, KyungHi Chang:
Fairness-insured Aggressive Sub-channel Allocation and Efficient Power Allocation Algorithms to Optimize the Capacity of an IEEE 802.16e OFDMA/TDD Cellular System. KSII Trans. Internet Inf. Syst. 3(4): 385-398 (2009) - Hong Joo Lee:
A Review of IPTV Threats Based on the Value Chain. KSII Trans. Internet Inf. Syst. 3(2): 163-177 (2009) - Dong Wook Lee, Sung Ha Baek, Hae Young Bae:
aCN-RB-tree: Constrained Network-Based Index for Spatio-Temporal Aggregation of Moving Object Trajectory. KSII Trans. Internet Inf. Syst. 3(5): 527-547 (2009) - Natarajan Meghanathan
:
Use of Tree Traversal Algorithms for Chain Formation in the PEGASIS Data Gathering Protocol for Wireless Sensor Networks. KSII Trans. Internet Inf. Syst. 3(6): 612-627 (2009) - Manar Mohaisen, Hongsun An, KyungHi Chang:
Detection Techniques for MIMO Multiplexing: A Comparative Review. KSII Trans. Internet Inf. Syst. 3(6): 647-666 (2009) - Abedelaziz Mohaisen, Jeong Woon Choi, Dowon Hong:
On the Insecurity of Asymmetric Key-based Architecture in Wireless Sensor Networks. KSII Trans. Internet Inf. Syst. 3(4): 376-384 (2009) - Abedelaziz Mohaisen
, DaeHun Nyang, YoungJae Maeng, KyungHee Lee, Dowon Hong:
Grid-Based Key Pre-Distribution in Wireless Sensor Networks. KSII Trans. Internet Inf. Syst. 3(2): 195-208 (2009) - Sung-Kwun Oh, Ho-Sung Park, Chang-Won Jeong, Su-Chong Joo:
GA-based Feed-forward Self-organizing Neural Network Architecture and Its Applications for Multi-variable Nonlinear Process Systems. KSII Trans. Internet Inf. Syst. 3(3): 309-330 (2009) - Heemin Park, Jeff Burke, Mani B. Srivastava:
Intelligent Lighting Control using Wireless Sensor Networks for Media Production. KSII Trans. Internet Inf. Syst. 3(5): 423-443 (2009) - Byungjoo Park, Eunsang Hwang, Gil-Cheol Park:
Seamless Mobility Management in IP-based Wireless/Mobile Networks with Fast Handover. KSII Trans. Internet Inf. Syst. 3(3): 266-284 (2009) - Shafqat Ur Rehman, Wang-Cheol Song, Gyung-Leen Park:
Associativity-Based On-Demand Multi-Path Routing In Mobile Ad Hoc Networks. KSII Trans. Internet Inf. Syst. 3(5): 475-491 (2009) - Jea-Tek Ryu, Byeong-Hee Roh
, Ki-Yeol Ryu:
Detection of SIP Flooding Attacks based on the Upper Bound of the Possible Number of SIP Messages. KSII Trans. Internet Inf. Syst. 3(5): 507-526 (2009) - Dongmin Seo, Myung Ho Yeo, Myoung-Ho Kim, Jae-Soo Yoo:
A Minimum Sequence Matching Scheme for Efficient XPath Processing. KSII Trans. Internet Inf. Syst. 3(5): 492-506 (2009) - Mina Shim, Seungjo Baek, Taehyoung Park, Jeongseon Seol, Jongin Lim:
Technical Protection Measures for Personal Information in Each Processing Phase in the Korean Public Sector . KSII Trans. Internet Inf. Syst. 3(5): 548-574 (2009) - Minho Shin, William A. Arbaugh:
Efficient Peer-to-Peer Lookup in Multi-hop Wireless Networks. KSII Trans. Internet Inf. Syst. 3(1): 5-25 (2009) - Dongkyoo Shin, Dongil Shin, Quoc-Cuong Nguyen, Seyoung Park:
Real-Time Tracking of Human Location and Motion using Cameras in a Ubiquitous Smart Home. KSII Trans. Internet Inf. Syst. 3(1): 84-95 (2009) - Taeshik Shon, Yongsuk Park:
A Hybrid Adaptive Security Framework for IEEE 802.15.4-based Wireless Sensor Networks. KSII Trans. Internet Inf. Syst. 3(6): 597-611 (2009) - Bong-Soo Sohn:
Topology Preserving Tetrahedral Decomposition Applied To Trilinear Interval Volume Tetrahedrization. KSII Trans. Internet Inf. Syst. 3(6): 667-681 (2009) - Sung-Hak Song, Chang-Hoon Lee, Ju-Hyun Park, Kyo-Jun Koo, Jong-Kook Kim
, Jongsun Park
:
Enhancing Location Estimation and Reducing Computation using Adaptive Zone Based K-NNSS Algorithm. KSII Trans. Internet Inf. Syst. 3(1): 119-133 (2009) - Shanyu Tang, Yongfeng Huang, Yau Jim Yip:
Performance of Database Driven Network Applications from the User Perspective. KSII Trans. Internet Inf. Syst. 3(3): 235-250 (2009)
skipping 9 more matches
loading more results
failed to load more results, please try again later
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-12 04:41 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint