default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 63 matches
- 2009
- G. G. Md. Nawaz Ali, Rajib Chakraborty, Md. Shihabul Alam:
Performance Analysis of Different Routing Algorithms for Load Distribution in Multipath Packet Switched Network. CIT (2) 2009: 325-330 - Hisato Aota, Yuichi Yaguchi, Kenta Iseki, Ryuichi Oka:
Extracting Motion Features of Objects Based on Full Pixel Matching. CIT (2) 2009: 300-305 - Yubin Bao, Jie Song, Jingang Shi, Ge Yu:
Case Study on Modeling Approaches and Framework of Scientific Data Cleaning. CIT (2) 2009: 266-271 - Rabindra Bista, Yong-Ki Kim, Jae-Woo Chang:
A New Approach for Energy-Balanced Data Aggregation in Wireless Sensor Networks. CIT (2) 2009: 9-15 - Omid Bushehrian:
A New Metric for Automatic Program Partitioning. CIT (2) 2009: 260-265 - Chin-Chen Chang, Shih-Yi Lin, Jen-Ho Yang:
Efficient User Authentication and Key Establishment Protocols with Perfect Forward Secrecy for Mobile Devices. CIT (2) 2009: 131-135 - Lin Chen, Zhitang Li, Cuixia Gao, Yingshu Liu:
Modeling and Analyzing Dynamic Forensics System Based on Intrusion Tolerance. CIT (2) 2009: 230-235 - Xianqin Chen, Xiang Long, Xiaopeng Gao, Junjie Ma:
TACS: A Transparent Application Bandwidth Management System. CIT (2) 2009: 46-51 - Jian Chen, Roman Y. Shtykh, Qun Jin:
A Web Recommender System Based on Dynamic Sampling of User Information Access Behaviors. CIT (2) 2009: 172-177 - Jae-Kark Choi, Ki-Hyuk Kwon, Sang-Jo Yoo:
QoS-Aware Channel Sensing Scheduling in Cognitive Radio Networks. CIT (2) 2009: 63-68 - Jianliang Gao, Jia Hu, Geyong Min:
Performance Modelling of IEEE 802.15.4 MAC in LR-WPAN with Bursty ON-OFF Traffic. CIT (2) 2009: 58-62 - Navin Gautam, Won-Il Lee, Jae-Young Pyun:
Track-Sector Clustering for Energy Efficient Routing in Wireless Sensor Networks. CIT (2) 2009: 116-121 - Haosong Gou, Younghwan Yoo, Hongqing Zeng:
A Partition-Based LEACH Algorithm for Wireless Sensor Networks. CIT (2) 2009: 40-45 - Zhitao Guan, Guangwei Yan, Heqing Huang:
A Novel Top-k Query Scheme in Unstructured P2P Networks. CIT (2) 2009: 16-21 - Uma Gunasilan, Thenesh Gunasilan:
Operative Factors Contributing to the Selection of Fiber-Optic Techniques for Remote Measurement of Strain/Stress. CIT (2) 2009: 361-368 - Nan Hao, Hai-Hua Du, Sang-Jo Yoo:
Iterative Wireless Sensor Network Positioning Based on Time Synchronization. CIT (2) 2009: 52-57 - Xin He, Ke Yin, Xiaolin Gui:
The Area Coverage Algorithm to Maintain Connectivity for WSN. CIT (2) 2009: 81-86 - Ning Hu, Peidong Zhu, Peng Zou:
Reputation Mechanism for Inter-domain Routing Security Management. CIT (2) 2009: 98-103 - Kyung Su Hwang, Jian Feng Cui, Heung Seok Chae:
An Automated Approach to Componentization of Java Source Code. CIT (2) 2009: 205-210 - Paul Istoan, Grégory Nain, Gilles Perrouin, Jean-Marc Jézéquel:
Dynamic Software Product Lines for Service-Based Systems. CIT (2) 2009: 193-198 - Guang Jin, Fei Zhang, Yuan Li, Honghao Zhang, Jiangbo Qian:
A Hash-Based Path Identification Scheme for DDoS Attacks Defense. CIT (2) 2009: 219-224 - Hyunduk Kim, Boseon Yu, Wonik Choi, Moonju Park, Jinseok Chae:
Distance Based Pre-cluster Head Selection Scheme for a Chain-Based Protocol. CIT (2) 2009: 110-115 - Yun-Jung Lee, Min-Jung Bae, Gyun Woo, Hwan-Gue Cho:
A Personalized Visualizing and Filtering System for a Large Set of Responding Messages on Internet Discussion Forums. CIT (2) 2009: 160-165 - Ju-Hyun Lee, Jae-Kark Choi, Sang-Jo Yoo:
Group Node Contention Algorithm for Avoiding Continuous Collisions in LR-WPAN. CIT (2) 2009: 69-74 - Verayuth Lertnattee, Sinthop Chomya, Thanaruk Theeramunkong, Virach Sornlertlamvanich:
Applying Collective Intelligence for Search Improvement on Thai Herbal Information. CIT (2) 2009: 178-183 - Yanli Liu, Dan Qi, Bolormaa Khurelbaatar, Book-Sung Park, Chul-Ju Kim:
Internal Antenna Handset with Ni/Ag/Ni Hetero Structure. CIT (2) 2009: 356-360 - Zhaobin Liu, Wenyu Qu, Keqiu Li, Ruoyu Fan:
Object Oriented Property Attestation for Trusted Storage. CIT (2) 2009: 93-97 - Lan Liu, Xiaoping Xu, Yunli Qiu:
A Kind of Fuzzy Constraint Correlation Algorithm Based on Prerequisites and Consequences of Security Event. CIT (2) 2009: 225-229 - Yabin Liu, Huanguo Zhang, Liqiang Zhang, Bo Zhao:
Research on Unified Network Access Control Architecture. CIT (2) 2009: 295-299 - Jun Ma, Kenta Iseki, Yuichi Yaguchi, Ryuichi Oka:
Segmentation-Free Object Recognition Using Full Pixel Matching. CIT (2) 2009: 283-288
skipping 33 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-24 02:58 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint