Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 130 matches
- 2015
- Mohammad Aazam, Eui-Nam Huh:
Fog Computing Micro Datacenter Based Dynamic Resource Estimation and Pricing Model for IoT. AINA 2015: 687-694 - Mamun I. Abu-Tair, Saleem N. Bhatti:
Upgrading 802.11 deployments: A Critical Examination of Performance. AINA 2015: 844-851 - Kentaro Aburada, Yoshihiro Kita, Mirang Park, Naonobu Okazaki:
Content Access Control Scheme for P2P Networks Using a Reputation Value. AINA 2015: 527-533 - Ralph Adaimy, Wassim El-Hajj, Ghassen Ben Brahim, Hazem M. Hajj, Haïdar Safa:
A Framework for Secure Information Flow Analysis in Web Applications. AINA 2015: 434-441 - Mahmood Ahmad, Zeeshan Pervez, Byeong Ho Kang, Sungyoung Lee:
O-Bin: Oblivious Binning for Encrypted Data over Cloud. AINA 2015: 352-357 - Mahdieh Ahmadi, Mohammed Gharib, Fatemeh Ghassemi, Ali Movaghar:
Probabilistic Key Pre-Distribution for Heterogeneous Mobile Ad Hoc Networks Using Subjective Logic. AINA 2015: 185-192 - Yohei Akiyama, Yuji Kasai, Masaya Iwata, Eiichi Takahashi, Fumiaki Sato, Masahiro Murakawa:
Anomaly Detection of Solar Power Generation Systems Based on the Normalization of the Amount of Generated Electricity. AINA 2015: 294-301 - Norah Saleh Alghamdi, J. Wenny Rahayu, Eric Pardede:
Efficient Processing of Queries over Recursive XML Data. AINA 2015: 134-142 - Asma Alkalbani, Akshatha Shenoy, Farookh Khadeer Hussain, Omar Khadeer Hussain, Yanping Xiang:
Design and Implementation of the Hadoop-Based Crawler for SaaS Service Discovery. AINA 2015: 785-790 - Rajoua Anane, Ridha Bouallegue, Kosai Raoof:
Extensive Simulation Performance Evaluation of MSK Scheme with Error Correcting Codes in Wireless Sensor Networks. AINA 2015: 400-405 - Deepali Arora, Kin Fun Li, Stephen W. Neville:
Consumers' Sentiment Analysis of Popular Phone Brands and Operating System Preference Using Twitter Data: A Feasibility Study. AINA 2015: 680-686 - Abdalla Artail, Karim Frenn, Haïdar Safa, Hassan Artail:
A Framework of Mobile Cloudlet Centers Based on the Use of Mobile Devices as Cloudlets. AINA 2015: 777-784 - Admir Barolli, Tetsuya Oda, Leonard Barolli, Fatos Xhafa, Vincenzo Loia, Kazunori Uchida:
Performance Analysis of WMN-GA Simulation System for Different WMN Architectures Considering OLSR. AINA 2015: 207-214 - Danilo Valeros Bernardo, Bee Bee Chua:
Introduction and Analysis of SDN and NFV Security Architecture (SN-SECA). AINA 2015: 796-801 - Bruce Ndibanje, Hyunho Kim, Young-Jin Kang, Young-Sil Lee, Hoon-Jae Lee:
On Modeling Protocol-Based Clustering Tag in RFID Systems with Formal Security Analysis. AINA 2015: 498-505 - Bruce Ndibanje, Hyunho Kim, Suhyun Park, Hoon-Jae Lee:
An Efficient and Provable Secret Shared Key Computation for Cryptographic Protocol Across Insecure Channel. AINA 2015: 143-147 - Thach V. Bui, Thuc Dinh Nguyen, Noboru Sonehara, Isao Echizen:
Efficient Authentication, Traitor Detection, and Privacy-Preserving for the Most Common Queries in Two-Tiered Wireless Sensor Networks. AINA 2015: 365-372 - Arcangelo Castiglione, Alfredo De Santis, Raffaele Pizzolante, Aniello Castiglione, Vincenzo Loia, Francesco Palmieri:
On the Protection of fMRI Images in Multi-domain Environments. AINA 2015: 476-481 - ByungRae Cha, Sun Park, Sujeong Shim, JongWon Kim:
Secured mVoIP Service over Cloud and Container-Based Improvement. AINA 2015: 791-795 - Yuanfang Chen, Xiaoming Li:
A Thread Merging Transformation to Improve Throughput of Multiple Programs. AINA 2015: 118-125 - Chia-Hsing Cheng, Yung-Fa Huang, Hsing-Chung Chen, Tsung-Yu Yao:
Neural Network-Based Estimation for OFDM Channels. AINA 2015: 600-604 - Rudyar Cortés, Xavier Bonnaire, Olivier Marin, Pierre Sens:
Free Split: A Write-Ahead Protocol to Improve Latency in Distributed Prefix Tree Indexing Structures. AINA 2015: 658-665 - Matteo Cristani, Erisa Karafili, Claudio Tomazzoli:
Improving Energy Saving Techniques by Ambient Intelligence Scheduling. AINA 2015: 324-331 - Subhasis Dash, Satya Sundar Mallick, R. C. Hansdah, Amulya Ratna Swain:
A Distributed Approach to Construct Hierarchical Structure for Routing with Balanced Energy Consumption in WSNs. AINA 2015: 382-388 - Dilawaer Duolikun, Tomoya Enokido, Hui-Huang Hsu, Makoto Takizawa:
Asynchronous Migration of Process Replicas in a Cluster. AINA 2015: 271-278 - Hiroyuki Endo, Shinnosuke Furuya, Ken-ichi Okada:
MR Manual and Authoring Tool with Afterimages. AINA 2015: 890-895 - Tomoya Enokido, Makoto Takizawa:
Energy-Efficient Delay Time-Based Process Allocation Algorithm for Heterogeneous Server Clusters. AINA 2015: 279-286 - Masaru Eto, Ryo Katsuma, Morihiko Tamai, Keiichi Yasumoto:
Efficient Coverage of Agricultural Field with Mobile Sensors by Predicting Solar Power Generation. AINA 2015: 62-69 - Oussama Ghorbel, Mohamed Abid, Hichem Snoussi:
A Novel Outlier Detection Model Based on One Class Principal Component Classifier in Wireless Sensor Networks. AINA 2015: 70-76 - Emna Hachicha, Walid Gaaloul:
Towards Resource-aware Business Process development in the Cloud. AINA 2015: 761-768
skipping 100 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-23 22:32 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint