![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 32 matches
- 2006
- Kwang Seon Ahn:
Digital Controller of a Diesel Generator using an Embedded System. J. Inf. Process. Syst. 2(3): 143-146 (2006) - Kyuhee An, Kiyeal Lee, Mokdong Chung:
Design and Implementation of an RFID-based Enterprise Application Framework based on Abstract BP and Kerberos. J. Inf. Process. Syst. 2(3): 170-177 (2006) - Ji-Hye Bae, Hee-Kuk Kang, Yoon-Young Park, Jung-Ho Park:
Monitoring Systems for Embedded Equipment in Ubiquitous Environments. J. Inf. Process. Syst. 2(1): 58-65 (2006) - Ulziitugs Bud, JongTae Lim:
Distance Functions to Detect Changes in Data Streams. J. Inf. Process. Syst. 2(1): 44-47 (2006) - YoonJung Chung, InJung Kim, DoHoon Lee:
A Practical Security Risk Analysis Process and Tool for Information System. J. Inf. Process. Syst. 2(2): 95-100 (2006) - Seong-il Hahm, Seongho Cho, Han Choi, Chong-kwon Kim, Pillwoo Lee:
The Design and Implementation of an Available Bandwidth Measurement Scheme in the K*Grid System. J. Inf. Process. Syst. 2(2): 101-106 (2006) - Youn-Sik Hong, Hye-Sun Hur:
An Evaluation of Multimedia Data Downstream with PDA in an Infrastructure Network. J. Inf. Process. Syst. 2(2): 76-81 (2006) - In Huh, Jae Yong Lee, Byung-Chul Kim:
Decision of Maximum Congestion Window Size for TCP Performance Improvement by Bandwidth and RTT Measurement in Wireless Multi-Hop Networks. J. Inf. Process. Syst. 2(1): 34-38 (2006) - YoungHa Hwang, SungKee Noh, Sang-Ha Kim:
Determination of Optimal Cell Capacity for Initial Cell Planning in Wireless Cellular Networks. J. Inf. Process. Syst. 2(2): 88-94 (2006) - YoungHa Hwang, SungKee Noh, Sang-Ha Kim:
A New Fair Call Admission Control for Integrated Voice and Data Traffic in Wireless Mobile Networks. J. Inf. Process. Syst. 2(2): 107-113 (2006) - Yoon Seok Jeong, Tae Wan Kim, Sunyoung Han, Chun-Hyon Chang:
A Timing Constraint Search Technique for a TMO based Real-time Process. J. Inf. Process. Syst. 2(1): 1-5 (2006) - Yoon-Su Jeong, Sang Ho Lee:
Secure Key Management Protocol in the Wireless Sensor Network. J. Inf. Process. Syst. 2(1): 48-51 (2006) - Yixin Jing, Jinhyung Kim, Dongwon Jeong:
A Universal Model for Policy-Based Access Control-enabled Ubiquitous Computing. J. Inf. Process. Syst. 2(1): 28-33 (2006) - Miheon Jo, Jeonghye Han:
Metaphor and Typeface Based on Children's Sensibilities for e-Learning. J. Inf. Process. Syst. 2(3): 178-182 (2006) - Young-Hyun Jun, Jong-Ho Yun, Jin-Sung Park, Myung-Ryul Choi:
Design of an Image Interpolator for Low Computation Complexity. J. Inf. Process. Syst. 2(3): 153-158 (2006) - Heawon Kang, Sung-Hwan Jung:
An Efficient Audio Watermark Extraction in Time Domain. J. Inf. Process. Syst. 2(1): 13-17 (2006) - Sung-Dong Kim:
A Feature Selection Technique based on Distributional Differences. J. Inf. Process. Syst. 2(1): 23-27 (2006) - Hyo-Soo Kim, Cheong Ho Baek:
A Quality Assurance Process Model on Fault Management. J. Inf. Process. Syst. 2(3): 163-169 (2006) - Hyunjoo Kim, Sooyong Kang, Heon Young Yeom:
Server Selection Schemes Considering Node Status For a Fault-Tolerant Streaming Service on a Peer-to-Peer Network. J. Inf. Process. Syst. 2(1): 6-12 (2006) - Seunghae Kim, Won-Hyuk Lee, Gihwan Cho:
A Study of a Server Selection Model for Selecting a Replicated Server based on Downstream Measurement in the Server-side. J. Inf. Process. Syst. 2(2): 130-134 (2006) - Jun-Wook Lee, Yong-Joon Lee:
A Knowledge Discovery Framework for Spatiotemporal Data Mining. J. Inf. Process. Syst. 2(2): 124-129 (2006) - Jun-Hyung Lee, Zinwon Park, Myung-Kyun Kim:
A Light-weight and Dynamically Reconfigurable RMON Agent System. J. Inf. Process. Syst. 2(3): 183-188 (2006) - Ji-Seung Nam, Hui Gao, Mi-Young Kang, Kyoung-Tae Kim, Seung-Chul Son, Choung-Ung Pom, Kwon Heo:
Scenario-based 3D Objects Synthesizing System Design. J. Inf. Process. Syst. 2(1): 18-22 (2006) - Ji Yeon Park, Kitae Hwang:
Selection of a Competent Wireless Access Point for High Wireless Bandwidth. J. Inf. Process. Syst. 2(3): 159-162 (2006) - Song-Hwa Park, Tae-Hoon Lee, Ki-Dong Chung:
Design of a NAND Flash Memory File System to Improve System Boot Time. J. Inf. Process. Syst. 2(3): 147-152 (2006) - Munho Ryu, Jong Dae Kim, JongWon Kim:
Automatic Reading System for On-off Type DNA Chip. J. Inf. Process. Syst. 2(3): 189-193 (2006) - Jung-Hee Seo, Hung-Bog Park:
Data-Hiding Method using Digital Watermark in the Public Multimedia Network. J. Inf. Process. Syst. 2(2): 82-87 (2006) - Wook-Sun Shin, Doo-Heon Song, Chang-Hun Lee:
Vehicle Classification by Road Lane Detection and Model Fitting Using a Surveillance Camera. J. Inf. Process. Syst. 2(1): 52-57 (2006) - Choonho Son, Jeong-Han Yun, Hyun-Goo Kang, Taisook Han:
Automatic Hardware/Software Interface Generation for Embedded System. J. Inf. Process. Syst. 2(3): 137-142 (2006) - Jin-Hyuk Yang, In-Jeong Chung:
ASVMRT: Materialized View Selection Algorithm in Data Warehouse. J. Inf. Process. Syst. 2(2): 67-75 (2006)
skipping 2 more matches
loading more results
failed to load more results, please try again later
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-22 19:22 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint