Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 43 matches
- 2016
- Shadha Mohamed AlAmri, Lin Guan:
Exploring the Firewall Security Consistency in Cloud Computing during Live Migration. ICCCNT 2016: 40:1-40:6 - Ameena Ahammed, Reeba R.:
A New Method for Image Watermarking Based on Reversible Technique. ICCCNT 2016: 42:1-42:5 - Muqeet Ali, Mohamed G. Gouda:
Nonrepudiation Protocols in Cloud Systems. ICCCNT 2016: 23:1-23:6 - Muqeet Ali, Rezwana Reaz, Mohamed G. Gouda:
Two-phase Nonrepudiation Protocols. ICCCNT 2016: 22:1-22:8 - Zainab M. Aljazzaf:
SOA Extension for Supporting QoS Bootstrapping. ICCCNT 2016: 6:1-6:6 - Subith Babu, Mahesh Jangid:
Touching character segmentation of Devanagari script. ICCCNT 2016: 26:1-26:5 - Yang Chen:
Quantifying Energy Provisioning's Impact on Wireless Networks. ICCCNT 2016: 2:1-2:6 - C. S. Chetan, Vinay B. Biradar, Premananda B. S.:
A Novel Approach to improve Speech Intelligibility through Critical Band Enhancement. ICCCNT 2016: 16:1-16:5 - Pranose J. Edavoor, Sithara Raveendran, Arjun T. V., Sumesh K. P., Kumar Y. B. Nithin, M. H. Vasantha:
FPGA realisation of PSNR and BPP driven Adaptive Compression and Encryption Algorithm for RGB Images. ICCCNT 2016: 35:1-35:6 - Mahdieh Grailoo, Ashish Joshi, Mounika Mulkalapally, Tooraj Nikoubin:
Power and Energy Efficient Standard Cells with CDM Logic Style for Optimization of Multiplier Structures. ICCCNT 2016: 10:1-10:5 - Kento Hamda, Genya Ishigaki, Yoichi Sakai, Norihiko Shinomiya:
Significance Analysis for Edges in a Graph by means of Leveling Variables on Nodes. ICCCNT 2016: 27:1-27:5 - Mitsunobu Homma, Norihiko Shinomiya:
Finding Tie-sets with the Minimal Number of Total Elements for Effective Failure Recovery. ICCCNT 2016: 9:1-9:5 - Mahesh Jangid, Sumit Srivastava:
Accuracy Enhancement of Devanagari Character Recognition by Gray level Normalization. ICCCNT 2016: 25:1-25:5 - Jamshaid Iqbal Janjua, Aatka Ali, Muhammad Umar Chaudhry:
OPENTCQ: Towards Change Management in Hybrid Agile Model. ICCCNT 2016: 38:1-38:8 - Jetendra Joshi, Akshay, Amrit Bagga, Rahul Aggarwal, Manash Jyoti Deka, Urjit, Abhinav:
SmartGarbage Monitoring System. ICCCNT 2016: 7:1-7:5 - Ashish Joshi, Thejaswani Putta, Tooraj Nikoubin:
Power and Energy Efficient Standard Cell Library Design in CDM Logic Style with FinFET Transistors. ICCCNT 2016: 12:1-12:5 - Amritesh Kumar, Debasis Das:
Efficient Algorithm for Routing in Dynamic Wireless Networks. ICCCNT 2016: 28:1-28:6 - Anjan Kumar, Gaurav Kumar Sharma, Tarun Agrawal, Divya Agrawal:
A Designing of Random Access Memory Using Different IO Standard Technology. ICCCNT 2016: 31:1-31:8 - Jeril Kuriakose, Sandeep Joshi:
Removing the Outliers of Diverse Zero-Knowledge Proof Systems using Mahalanobis Distance. ICCCNT 2016: 15:1-15:7 - Bikash Lamsal, Noriko Kojima, Naofumi Matsumoto:
An Unscented Kalman filter based novel face detector and its robust system for illumination variant images using stochastic resonance. ICCCNT 2016: 8:1-8:8 - Mounika Mulkalapally, Jacob Manning, Paul Gatewood, Tooraj Nikoubin:
High Speed, Area and Power Efficient 32-bit Vedic Multipliers. ICCCNT 2016: 11:1-11:7 - Obinna Okonor, Stylianos Georgoulas, Mahmoud Abdullahi:
Disruption/Time-aware Green Traffic Engineering for Core ISP Networks. ICCCNT 2016: 30:1-30:6 - Binal Parekh, Mosin Hasan:
ILP: Approach to Energy Efficient VM migration. ICCCNT 2016: 21:1-21:7 - Ashish Patankar, Tooraj Nikoubin:
Wearable System for Obstacle Detection and Human Assistance Using Ultrasonic Sensor Array. ICCCNT 2016: 14:1-14:6 - Vishwas Patel, Mosin Hasan:
Parallel Ratio Based CF for Recommendation System. ICCCNT 2016: 34:1-34:4 - Nikhil Patil, Teja Geddamuri, Tooraj Nikoubin:
Complement Based Logic Design (CBLD) for Area and Power Efficiency of Arithmetic Building Blocks. ICCCNT 2016: 13:1-13:6 - M. Pravin, T. V. P. Sundararajan:
Energy Efficient and Collision Reduction Routing Method for Wireless Sensor Networks using Cognitive Radio. ICCCNT 2016: 5:1-5:3 - Yenumula B. Reddy:
GPU-based Design for Fingerprint Matching. ICCCNT 2016: 36:1-36:8 - Arvinda Kumar C. S., Premananda B. S., K. J. Kumar:
Design and Development of High-speed Data Acquisition System with Cyclone FPGA. ICCCNT 2016: 17:1-17:5 - Shruti Sharma:
Power and delay analysis of various C-element topologies: a comparative study. ICCCNT 2016: 39:1-39:5
skipping 13 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-06 20:58 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint