default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 49 matches
- 2019
- Fahad Taha AL-Dhief, Naseer Sabri Salim, S. Fouad, N. M. Abdul Latiff, Musatafa Abbas Abbood Albadr:
A review of forest fire surveillance technologies: Mobile ad-hoc network routing protocols perspective. J. King Saud Univ. Comput. Inf. Sci. 31(2): 135-146 (2019) - Mohammed Ahmed Ali Abdualrhman, M. C. Padma:
CS-IBC: Cuckoo search based incremental binary classifier for data streams. J. King Saud Univ. Comput. Inf. Sci. 31(3): 367-377 (2019) - Muhammed Jassem Al-Muhammed, Raed Abu Zitar:
κ-Lookback random-based text encryption technique. J. King Saud Univ. Comput. Inf. Sci. 31(1): 92-104 (2019) - Mohammed Al-aaidroos, Norleyza Jailani, Muriati Mukhtar:
Expert validation on a reference model for e-auctions that conform to Islamic trading principles. J. King Saud Univ. Comput. Inf. Sci. 31(1): 62-71 (2019) - Hanan M. Alghamdi, Ali Selamat:
Arabic Web page clustering: A review. J. King Saud Univ. Comput. Inf. Sci. 31(1): 1-14 (2019) - Mohammed Alruqimi, Noura Aknin:
Bridging the Gap between the Social and Semantic Web: Extracting domain-specific ontology from folksonomy. J. King Saud Univ. Comput. Inf. Sci. 31(1): 15-21 (2019) - Sariga Arjunan, Pothula Sujatha:
A survey on unequal clustering protocols in Wireless Sensor Networks. J. King Saud Univ. Comput. Inf. Sci. 31(3): 304-317 (2019) - Shariq Bashir:
Broken link repairing system for constructing contextual information portals. J. King Saud Univ. Comput. Inf. Sci. 31(2): 147-160 (2019) - Biplab Bhattacharjee, Muhammad Shafi, Animesh Acharjee:
Network mining based elucidation of the dynamics of cross-market clustering and connectedness in Asian region: An MST and hierarchical clustering approach. J. King Saud Univ. Comput. Inf. Sci. 31(2): 218-228 (2019) - Rahime Ceylan, Hasan Koyuncu:
A Novel Rotation Forest Modality Based on Hybrid NNs: RF (ScPSO-NN). J. King Saud Univ. Comput. Inf. Sci. 31(2): 235-251 (2019) - Sujit Das, Saurabh Kumar, Samarjit Kar, Tandra Pal:
Group decision making using neutrosophic soft matrix: An algorithmic approach. J. King Saud Univ. Comput. Inf. Sci. 31(4): 459-468 (2019) - Mazhar Ali Dootio, Asim Imdad Wagan:
Syntactic parsing and supervised analysis of Sindhi text. J. King Saud Univ. Comput. Inf. Sci. 31(1): 105-112 (2019) - Umer Farooq, M. Hassan Aslam, Muhammad Usman:
On the comparison of memristor-transistor hybrid and transistor-only heterogeneous FPGAs. J. King Saud Univ. Comput. Inf. Sci. 31(4): 514-527 (2019) - Shaik Fathimabi, R. B. V. Subramanyam, Durvasula V. L. N. Somayajulu:
MSP: Multiple Sub-graph Query Processing using Structure-based Graph Partitioning Strategy and Map-Reduce. J. King Saud Univ. Comput. Inf. Sci. 31(1): 22-34 (2019) - Nitin Goyal, Mayank Dave, Anil K. Verma:
Data aggregation in underwater wireless sensor network: Recent approaches and issues. J. King Saud Univ. Comput. Inf. Sci. 31(3): 275-286 (2019) - Indra, Edi Winarko, Reza Pulungan:
Trending topics detection of Indonesian tweets using BN-grams and Doc-p. J. King Saud Univ. Comput. Inf. Sci. 31(2): 266-274 (2019) - Abid Ismail, K. S. Kuppusamy, Ajit Kumar, Pawan Kumar Ojha:
Connect the dots: Accessibility, readability and site ranking - An investigation with reference to top ranked websites of Government of India. J. King Saud Univ. Comput. Inf. Sci. 31(4): 528-540 (2019) - Ghaith M. Jaradat, Anas Bassam Al-Badareen, Masri Ayob, Mutasem Alsmadi, Ibrahim Almarashdeh, Mahmoud Ash-Shuqran, Eyas Al-Odat:
Hybrid Elitist-Ant System for Nurse-Rostering Problem. J. King Saud Univ. Comput. Inf. Sci. 31(3): 378-384 (2019) - Abraham Jobin, Paul Varghese:
An imperceptible spatial domain color image watermarking scheme. J. King Saud Univ. Comput. Inf. Sci. 31(1): 125-133 (2019) - Shyam P. Joy, Priya Chandran:
A formal framework for verifying IKA property of protocols. J. King Saud Univ. Comput. Inf. Sci. 31(3): 318-326 (2019) - Kapil Juneja:
Multiple feature descriptors based model for individual identification in group photos. J. King Saud Univ. Comput. Inf. Sci. 31(2): 185-207 (2019) - Archana B. Kanwade, Vinayak K. Bairagi:
Classification of COPD and normal lung airways using feature extraction of electromyographic signals. J. King Saud Univ. Comput. Inf. Sci. 31(4): 506-513 (2019) - Oscar Karnalim:
IR-based technique for linearizing abstract method invocation in plagiarism-suspected source code pair. J. King Saud Univ. Comput. Inf. Sci. 31(3): 327-334 (2019) - Amanpreet Kaur, Padam Kumar, Govind P. Gupta:
A weighted centroid localization algorithm for randomly deployed wireless sensor networks. J. King Saud Univ. Comput. Inf. Sci. 31(1): 82-91 (2019) - Md. Khairullah:
A novel steganography method using transliteration of Bengali text. J. King Saud Univ. Comput. Inf. Sci. 31(3): 348-366 (2019) - Vinod Kumar Khera, R. K. Sharma, A. K. Gupta:
A heuristic fault based optimization approach to reduce test vectors count in VLSI testing. J. King Saud Univ. Comput. Inf. Sci. 31(2): 229-234 (2019) - Manoj Kumar, Manoj Diwakar:
A new exponentially directional weighted function based CT image denoising using total variation. J. King Saud Univ. Comput. Inf. Sci. 31(1): 113-124 (2019) - Ajit Kumar, K. S. Kuppusamy, Gnanasekaran Aghila:
A learning model to detect maliciousness of portable executable using integrated feature set. J. King Saud Univ. Comput. Inf. Sci. 31(2): 252-265 (2019) - Sangeeta Lal, Neetu Sardana, Ashish Sureka:
Three-level learning for improving cross-project logging prediction for if-blocks. J. King Saud Univ. Comput. Inf. Sci. 31(4): 481-496 (2019) - Abdul Majeed:
Attribute-centric anonymization scheme for improving user privacy and utility of publishing e-health data. J. King Saud Univ. Comput. Inf. Sci. 31(4): 426-435 (2019)
skipping 19 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-01 07:09 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint