Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 106 matches
- 2011
- Amuda James Abu, Steven Gordon:
Impact of Delay Variability on LEDBAT Performance. AINA 2011: 708-715 - Ailixier Aikebaier, Tomoya Enokido, Makoto Takizawa:
Trustworthiness-Based Broadcast Algorithm in Scalable P2P Group. AINA 2011: 143-150 - Markus Aleksy, Bernd Stieger:
Mobile Service Business Patterns. AINA 2011: 62-68 - Norah Saleh Alghamdi, J. Wenny Rahayu, Eric Pardede:
Object-Based Methodology for XML Data Partitioning (OXDP). AINA 2011: 307-315 - Faeiz Alserhani, Monis Akhlaq, Irfan-Ullah Awan, Andrea J. Cullen:
Event-Based Alert Correlation System to Detect SQLI Activities. AINA 2011: 175-182 - Gustavo Medeiros de Araújo, Leandro Buss Becker:
A Network Conditions Aware Geographical Forwarding Protocol for Real-Time Applications in Mobile Wireless Sensor Networks. AINA 2011: 38-45 - Mehmet Emin Aydin, Nik Bessis, Eleana Asimakopoulou, Fatos Xhafa, Joyce Y. Wu:
Scanning Environments with Swarms of Learning Birds: A Computational Intelligence Approach for Managing Disasters. AINA 2011: 332-339 - Rajiv Bagai, Bin Tang:
Data Caching for Enhancing Anonymity. AINA 2011: 135-142 - Bo Bai, Baoming Bai, Xiao Ma:
Semi-random Kite Codes over Fading Channels. AINA 2011: 639-645 - Christopher J. O. Baker, Rajaraman Kanagasabai:
Extraction and Grounding of Protein Mutations via Semantic Integration of Text and Sequence Information. AINA 2011: 556-563 - Jesus M. Barbero, Eugenio Santos, Abraham Gutiérrez:
Services Between Video Producers and Broadcasters: Do We Need a Standard? AINA 2011: 610-616 - Mahmoud Barhamgi, Djamal Benslimane, Chirine Ghedira, Alda Lopes Gançarski:
Privacy-Preserving Data Mashup. AINA 2011: 467-474 - Admir Barolli, Fatos Xhafa, Christian Sánchez, Makoto Takizawa:
A Study on the Performance of Search Methods for Mesh Router Nodes Placement Problem. AINA 2011: 756-763 - Cristina Basescu, Alexandra Carpen-Amarie, Catalin Adrian Leordeanu, Alexandru Costan, Gabriel Antoniu:
Managing Data Access on Clouds: A Generic Framework for Enforcing Security Policies. AINA 2011: 459-466 - Martin Bateman, Saleem Bhatti:
Simple, Weakly-coupled, Invisible Middleware (SWIM). AINA 2011: 232-239 - Razvan Beuran, Junya Nakata, Yasuo Tan, Yoichi Shinoda:
IEEE 802.15.4 Network Emulation Testbed. AINA 2011: 451-458 - Nguyen Ngoc Chan, Walid Gaaloul, Samir Tata:
A Web Service Recommender System Using Vector Space Model and Latent Semantic Indexing. AINA 2011: 602-609 - Yeim-Kuan Chang, Han-Chen Chen:
Layered Cutting Scheme for Packet Classification. AINA 2011: 675-681 - Yeim-Kuan Chang, Hsin-Mao Chen:
Set Pruning Segment Trees for Packet Classification. AINA 2011: 688-694 - Punyasha Chatterjee, Nabanita Das:
Distributed Data Gathering with Graded Node Distribution in Sensor Networks to Maximize Lifetime. AINA 2011: 435-442 - Hongbing Cheng, Chunming Rong, Geng Yang:
Design and Analysis of a Secure Routing Protocol Algorithm for Wireless Sensor Networks. AINA 2011: 475-480 - Wei-Kuo Chiang, Zih-Hao Luo:
CAMEL-SIF: A Gateway for Service Invocation from Circuit Switched Domain to IP Multimedia Subsystem. AINA 2011: 740-747 - Belkacem Chikhaoui, Shengrui Wang, Hélène Pigot:
A Frequent Pattern Mining Approach for ADLs Recognition in Smart Environments. AINA 2011: 248-255 - Jae-Kark Choi, Sang-Jo Yoo:
Zone-Based Distributed Sensing Scheme in Decentralized Cognitive Radio Networks. AINA 2011: 17-22 - Wei Ding, Shou-Hsuan Stephen Huang:
Detecting Intruders Using a Long Connection Chain to Connect to a Host. AINA 2011: 121-128 - Arjan Durresi, Mimoza Durresi, Vamsi Paruchuri, Leonard Barolli:
Ad Hoc Communications for Emergency Conditions. AINA 2011: 787-794 - Mourad Elhadef:
Solving the PMC-Based System-Level Fault Diagnosis Problem Using Hopfield Neural Networks. AINA 2011: 216-223 - Tomoya Enokido, Ailixier Aikebaier, Makoto Takizawa:
An Integrated Power Consumption Model for Communication and Transaction Based Applications. AINA 2011: 695-702 - Hui Fang, Qinghua Zhu, Jie Zhang:
An Empirical Analysis of the Impact of Online Reviews on Product Sales in the Chinese Context. AINA 2011: 183-190 - Giuseppe Fenza, Domenico Furno, Vincenzo Loia:
Enhanced Healthcare Environment by Means of Proactive Context Aware Service Discovery. AINA 2011: 625-632
skipping 76 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-06 16:51 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint