Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 163 matches
- 2020
- Muhammad Hanif, Hyeongdeok Yoon, Choonhwa Lee:
A Backpressure Mitigation Scheme in Distributed Stream Processing Engines. ICOIN 2020: 713-716 - Khizar Abbas, Talha Ahmed Khan, Adeel Rafiq, Wang-Cheol Song, Seung-Joon Seok:
An LTE-WiFi Spectrum Aggregation System for 5G Network: A Testbed. ICOIN 2020: 753-755 - Yu Abiko, Takato Saito, Daizo Ikeda, Ken Ohta, Tadanori Mizuno, Hiroshi Mineno:
Radio Resource Allocation Method for Network Slicing using Deep Reinforcement Learning. ICOIN 2020: 420-425 - Hussain Ahmad, Areeba Arif, Asad Masood Khattak, Anam Habib, Muhammad Zubair Asghar, Babar Shah:
Applying Deep Neural Networks for Predicting Dark Triad Personality Trait of Online Users. ICOIN 2020: 102-105 - Ijaz Ahmad, Bumshik Lee, Seokjoo Shin:
Analysis of Chinese Remainder Theorem for Data Compression. ICOIN 2020: 634-636 - Usman Akhtar, Jong Won Lee, Hafiz Syed Muhammad Bilal, Taqdir Ali, Wajahat Ali Khan, Sungyoung Lee:
The Impact of Big Data In Healthcare Analytics. ICOIN 2020: 61-63 - Fakhare Alam, Muhammad Afzal, Khalid Mahmood Malik:
Comparative Analysis of Semantic Similarity Techniques for Medical Text. ICOIN 2020: 106-109 - Syed Imran Ali, Wajahat Ali Khan, Sungyoung Lee, Sang-Ho Lee:
Cost-Sensitive Feature Selection using Particle Swarm Optimization: A Post-Processing Approach. ICOIN 2020: 97-101 - Fadi A. Aloul, Imran A. Zualkernan, Shams Shapsough, Mohammed Towheed:
A Monitoring and Control Gateway for IoT Edge Devices in Smart Home. ICOIN 2020: 696-701 - Madyan Alsenwi, Yan Kyaw Tun, Shashi Raj Pandey, Nway Nway Ei, Choong Seon Hong:
UAV-Assisted Multi-Access Edge Computing System: An Energy-Efficient Resource Management Framework. ICOIN 2020: 214-219 - Madiha Amjad, Marios Lestas, Hassaan Khaliq Qureshi, Taqwa Saeed, Andreas Pitsillides:
Concentration Gradient based Routing for Molecular Nanonetworks. ICOIN 2020: 336-341 - Changyoung An, Heung-Gyoon Ryu:
Multi-Mode OFDM Communication System Using the Multiple Constellations. ICOIN 2020: 432-436 - Muhammad Zaki Ansaar, Jamil Hussain, Jae Hun Bang, Sungyoung Lee, Kim Young Shin, Kim Young Woo:
The mHealth Applications Usability Evaluation Review. ICOIN 2020: 70-73 - Tsuyoshi Arai, Yasuo Okabe, Yoshinori Matsumoto, Koji Kawamura:
Detection of Bots in CAPTCHA as a Cloud Service Utilizing Machine Learning. ICOIN 2020: 584-589 - Youness Arjoune, Fatima Salahdine, Md. Shoriful Islam, Elias Ghribi, Naima Kaabouch:
A Novel Jamming Attacks Detection Approach Based on Machine Learning for Wireless Communication. ICOIN 2020: 459-464 - Rameez Asif:
Quantum Secure Routing for Future Internet. ICOIN 2020: 121-125 - Ferheen Ayaz, Saqib Ayaz:
Analysis of GFDM as a Robust 5G Communication Technique in Noisy Environment. ICOIN 2020: 811-813 - Jaejeong Bang, Youngju Nam, Hyun-Seok Choi, Euisin Lee, Seungmin Oh:
Cooperative Content Downloading Protocol Based on the Mobility Information of Vehicles in Intermittently Connected Vehicular Networks. ICOIN 2020: 273-277 - Ryohei Banno, Kazuyuki Shudo:
Skip Suffix Array: A Partial Match Retrieval Method on Structured Overlay Networks. ICOIN 2020: 487-492 - Gaurang Bansal, Ashutosh Bhatia:
A Fast, Secure and Distributed Consensus Mechanism for Energy Trading Among Vehicles using Hashgraph. ICOIN 2020: 772-777 - Gaurang Bansal, Naren Naren, Vinay Chamola:
RAMA: Real-Time Automobile Mutual Authentication Protocol Using PUF. ICOIN 2020: 265-270 - Johann Bauer:
An Algorithm for IoT Device Identification. ICOIN 2020: 255-261 - Yared Zerihun Bekele, Young-June Choi:
Access Point Selection Using Reinforcement Learning in Dense Mobile Networks. ICOIN 2020: 676-681 - Abhijan Bhattacharyya, Bhaskar Sardar, Debashis Saha:
Impact on V2V VoIP Traffic between to ProSe-enabled End-points while Switching between Infrastructure Mode and Direct Mode. ICOIN 2020: 747-752 - Hafiz Syed Muhammad Bilal, Usman Akhtar, Shin Won Chul, Sungyoung Lee:
Just in time Intervention for Personalized Healthcare: Behavior-Context based Intervention Adaptation. ICOIN 2020: 64-69 - Philip Branch, Tony Cricenti:
A LoRa Based Wireless Relay Network for Actuator Data. ICOIN 2020: 190-195 - Seunggyu Byeon, Jong-Deok Kim:
PcLoRa: Point-coordinating LoRa with new Channel Structure for massive, reliable and low- latency IoT. ICOIN 2020: 596-601 - Sergio Duque Castilho, Eduardo P. Godoy, Fadir Salmen:
Implementing Security and Trust in IoT/M2M using Middleware. ICOIN 2020: 726-731 - Seung-Jun Cha, Seung-Hyub Jeon, Ramneek, Yeon Jeong Jeong, Jin-Mee Kim, Sungin Jung:
Network Servers for Multikernel OS on Manycore Systems. ICOIN 2020: 126-129 - Ka-Hou Chan, Sio Kei Im, Wei Ke:
Self-Adaptive Layer: An Application of Function Approximation Theory to Enhance Convergence Efficiency in Neural Networks. ICOIN 2020: 447-452
skipping 133 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-23 08:14 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint