Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 56 matches
- 2010
- Jinho Ahn:
Scalable Message Logging Algorithm for Geographically Distributed Broker-based Sensor Networks. CAINE 2010: 279-284 - Hisham Al-Mubaid:
Data Mining and Analysis of Material Data using Feature Clustering for Radiation Shielding. CAINE 2010: 49-54 - Julia Albath, Jennifer L. Leopold, Chaman L. Sabharwal, Anne M. Maglia:
RCC-3D: Qualitative Spatial Reasoning in 3D. CAINE 2010: 74-79 - Abdullah Sharaf Alghamdi, Tazar Hussain, Gul Faraz Khan:
Enhancing C4I Security using Intrusion Detection and Prevention System. CAINE 2010: 202-207 - Abdullah Sharaf Alghamdi, Hanif Ullah, Iftikhar Ahmad:
Evaluating Encryption Techniques for C4I System. CAINE 2010: 196-201 - Min Kyung An, Nhat X. Lam, Dung T. Huynh, Trac N. Nguyen:
Minimum Data Aggregation Schedule in Wireless Sensor Networks. CAINE 2010: 257-263 - Michael A. Bauer, N. Stewart McIntyre, Christ Armstrong, Dioni Madreno, Elder Mathias, Dylan Maxwell, Renfei Feng, Nathaniel S. A. Sherry, Marina Suominen-Fuller, Jinhui Qin:
The Science Studio: Remote Control and Experiment Management forSynchrotrons. CAINE 2010: 232-238 - Steven S. Beauchemin, Michael A. Bauer, Denis Laurendeau, Taha Kowsari, Ji Cho, Morgan Hunter, Kyle Charbonneau, Owen McCarthy:
RoadLab: An In-Vehicle Laboratory for Developing On-Board i-ADAS. CAINE 2010: 7-12 - Aneeta Bhattacharyya, Jennifer L. Wong:
A Resilient Actuation Attack on Wireless Sensor Networks. CAINE 2010: 251-256 - Art Black, Mohammad Muztaba Fuad:
Survey and Classification of Software Technologies for Multi-core Architecture. CAINE 2010: 26-30 - Kandyce M. Bohannon, Tina V. Johnson:
Cellular Automaton as an Epidemiological Model: A New Twist on Old Ideas. CAINE 2010: 127-131 - William E. Brandstetter III, Joseph D. Mahsman, Cody J. White, Sergiu M. Dascalu, Frederick C. Harris Jr.:
Multi-Resolution Deformation in Out-of-Core Terrain Rendering. CAINE 2010: 98-104 - Rachel Cook, Gongzhu Hu:
Hidden Patterns: Clustering Diabetes Data. CAINE 2010: 138-143 - Shameka Dawson, Briana Lowe Wellman, Monica Anderson:
The Effect of Interaction on Robotic Sensor Network Experiments. CAINE 2010: 285-290 - Dwight D. Egbert, Nathaniel Janca, Mikaal Zaidi:
Fast and Simple Training for Neuro-Control of Video Games. CAINE 2010: 1-6 - Shashank Gudupally, Hisham Al-Mubaid:
A Comparative Approach of Word Similarity and Synonymy. CAINE 2010: 80-85 - Pranshu Gupta, David A. Gustafson:
Object-oriented Testing beyond Statement Coverage. CAINE 2010: 150-155 - Hossein Hakimzadeh, Robert Batzinger, Susan Gordon:
MINI-DB: Demystifying the Inner Workings of Database Systems. CAINE 2010: 43-48 - Roger V. Hoang, Joshua Hegie, Frederick C. Harris Jr.:
Scrybe: A Tablet Interface for Virtual Environments. CAINE 2010: 105-110 - Donna L. Hudson, Maurice E. Cohen:
Models for Personalized Healthcare. CAINE 2010: 121-126 - Mahesh Khadka, Benjamin Popp, Kayikkalthop M. George, Nohpill Park:
A New Approach for Time Series Forecasting based on Genetic Algorithm. CAINE 2010: 226-231 - Brooks E. Latta, Kenneth G. Ricks:
Differential Drive Robot Model, Simulation, and Verification. CAINE 2010: 13-20 - Moonnoh Lee, Gordon K. Lee, Hong-Kyu Lee, Stuart Harvey Rubin:
A Robust Controller Design with Multiple Constraints Using Genetic Algorithms and LMI Approach. CAINE 2010: 220-225 - Hong-Kyu Lee, Dong Hwan Lee, Ran Zhao, Gordon K. Lee, Moonnoh Lee:
On Parameter Selection for Reducing Premature Convergence of Genetic Algorithms. CAINE 2010: 214-219 - Ilhyun Lee, Haesun K. Lee, Vladan Vuckovic:
Wireless Programming to Build Corobot. CAINE 2010: 176-179 - Chung-Hong Lee, Hsin-Chang Yang, Tzan-Feng Chien:
DBHTE: A Novel Algorithm for Extracting Real-time Microblogging Topics. CAINE 2010: 55-60 - Andrea Lincoln, Ying Wei Lin:
Fault Tolerance of Node Failures in a Stochastic Localization Algorithm for Wireless Sensor Networks. CAINE 2010: 264-168 - Yi Lu, Gloria C. Regisford:
Identify Disease Related Genes by Differentiating Pooled Microarray Expression Data. CAINE 2010: 132-137 - Hadi Tabatabaee Malazi, Kamran Zamanifar:
Handling Uncertainty in Composite Event Detection. CAINE 2010: 309-314 - James D. McCaffrey:
An Empirical Study of Simulated Bee Colony Algorithm Parameter Values. CAINE 2010: 170-175
skipping 26 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-05 01:19 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint