default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 180 matches
- 2010
- Refka Abdellaoui, Marc Pasquet:
Secure Communication for Internet Payment in Heterogeneous Networks. AINA 2010: 1085-1092 - Nobutoshi Abe, Yusuke Arai, Michiko Nishiyama, Norihiko Shinomiya, Kazuhiro Watanabe, Yoshimi Teshigawara:
A Study on Sensor Multiplicity in Optical Fiber Sensor Networks. AINA 2010: 519-525 - Meisam Aboudi, Alex Talevski:
Environmental Sustainability and Improved Quality of Life Through Service Convergence Technologies. AINA 2010: 982-987 - Tarem Ahmed:
Flow Vector Prediction in Large IP Networks. AINA 2010: 342-349 - Ejaz Ahmed, Nik Bessis, Yong Yue, Muhammad Sarfraz:
Data Mapping, Matching and Loading Using Grid Services. AINA 2010: 1158-1164 - Ashir Ahmed, Lutfe Kabir, Hiroto Yasuura:
An Information Platform for Low-Literate Villagers. AINA 2010: 1271-1277 - Ailixier Aikebaier, Tomoya Enokido, Makoto Takizawa:
Trustworthiness among Peer Processes in Distributed Agreement Protocol. AINA 2010: 565-572 - Mohammad Reza Akhondi, Alex Talevski, Simon Carlsen, Stig Petersen:
Applications of Wireless Sensor Networks in the Oil, Gas and Resources Industries. AINA 2010: 941-948 - Anas Al-Roubaiey, Tarek R. Sheltami, Ashraf S. Mahmoud, Elhadi M. Shakshuki, Hussein T. Mouftah:
AACK: Adaptive Acknowledgment Intrusion Detection for MANET with Node Detection Enhancement. AINA 2010: 634-640 - Amina Al-Sawaai, Irfan-Ullah Awan, Rod J. Fretwell:
Performance of Weighted Fair Queuing System with Multi-class Jobs. AINA 2010: 50-57 - Julia Albath, Mayur Thakur, Sanjay Madria:
Energy Constrained Dominating Set for Clustering in Wireless Sensor Networks. AINA 2010: 812-819 - Khaled Almiani, Anastasios Viglas, Lavy Libman:
Mobile Element Path Planning for Time-Constrained Data Gathering in Wireless Sensor Networks. AINA 2010: 843-850 - Abdullah Mohammed Almuhaideb, Mohammed A. Alhabeeb, Phu Dung Le, Bala Srinivasan:
Beyond Fixed Key Size: Classifications Toward a Balance Between Security and Performance. AINA 2010: 1047-1053 - Mohamed Alnas, Irfan-Ullah Awan, D. R. W. Holton:
A Cross-Layer Decision for Mobile IP Handover. AINA 2010: 641-646 - Faeiz Alserhani, Monis Akhlaq, Irfan-Ullah Awan, Andrea J. Cullen, Pravin Mirchandani:
MARS: Multi-stage Attack Recognition System. AINA 2010: 753-759 - Hani Alzaid, DongGook Park, Juan Manuel González Nieto, Ernest Foo:
Mitigating Sandwich Attacks Against a Secure Key Management Scheme in Wireless Sensor Networks for PCS/SCADA. AINA 2010: 859-865 - Luciana Arantes, Maria Gradinariu Potop-Butucaru, Pierre Sens, Mathieu Valero:
Enhanced DR-Tree for Low Latency Filtering in Publish/Subscribe Systems. AINA 2010: 58-65 - Mohammed Jubaer Arif, Shanika Karunasekera, Santosh Kulkarni, Ajith Gunatilaka, Branko Ristic:
Internet Host Geolocation Using Maximum Likelihood Estimation Technique. AINA 2010: 422-429 - Alireza Attar, Haoming Li, Victor C. M. Leung:
Increasing TCP Throughput and Fairness in Cognitive WLAN over Fiber. AINA 2010: 1069-1076 - Youakim Badr, Guy Caplat:
Software-as-a-Service and Versionology: Towards Innovative Service Differentiation. AINA 2010: 237-243 - Gianmarco Baldini, Stefano Braghin, Igor Nai Fovino, Alberto Trombetta:
Adaptive and Distributed Access Control in Cognitive Radio Networks. AINA 2010: 988-995 - Martin Bateman, Saleem N. Bhatti:
TCP Testing: How Well Does ns2 Match Reality?. AINA 2010: 276-284 - Lyn Beazley:
The Crucial Role of Information Communication Technology in Western Australia. AINA 2010: 1 - Tomasz P. Bednarz, Con Caris, Jeremy P. Thompson, Chris Wesner, Mark T. Dunn:
Human-Computer Interaction Experiments. AINA 2010: 1323-1327 - Benjamin Bock, David Huemer, A Min Tjoa:
Towards More Trustable Log Files for Digital Forensics by Means of . AINA 2010: 1020-1027 - Wolfgang Boehmer:
Analyzing Human Behavior Using Case-Based Reasoning with the Help of Forensic Questions. AINA 2010: 1189-1194 - Christian Bohn, Kjetil Nørvåg:
Extracting Named Entities and Synonyms from Wikipedia. AINA 2010: 1300-1307 - François Bonnet, Michel Raynal:
Consensus in Anonymous Distributed Systems: Is There a Weakest Failure Detector?. AINA 2010: 206-213 - Michael L. Brodie:
Data Integration at Scale: From Relational Data Integration to Information Ecosystems. AINA 2010: 2-3 - Justus Bross, Matthias Quasthoff, Philipp Berger, Patrick Hennig, Christoph Meinel:
Mapping the Blogosphere with RSS-Feeds. AINA 2010: 453-460
skipping 150 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-20 01:39 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint