default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 112 matches
- 2015
- Erick Christian Garcia Alvarez, Shengbei Wang, Masashi Unoki:
An Automatic Watermarking in CELP Speech Codec Based on Formant Tuning. IIH-MSP 2015: 160-163 - Bin Cai:
Formalized Description and Analysis of FTP on Petri Net. IIH-MSP 2015: 176-179 - Jiangang Chen, Xuefeng Bai, Guowei Huang:
Two-Dimensional Extended Feature Line Space for Feature Extraction. IIH-MSP 2015: 282-285 - Tsong-Yi Chen, Chao-Ho Chen, Guan-Ming Luo, Wu-Chih Hu, Johng-Chern Chern:
Vehicle Detection in Nighttime Environment by Locating Road Lane and Taillights. IIH-MSP 2015: 60-63 - Yueh-Hong Chen, Hsiang-Cheh Huang:
Progressive Watermarking for Images with Regions of Interest. IIH-MSP 2015: 25-28 - Chang-Ting Chen, Yi-Chien Liao, Chien-Fu Lai, Bor-Shyh Lin, Che-Chuan Wang, Jinn-Rung Kuo:
Optical Technique for Estimating Cerebral Perfusion Pressure. IIH-MSP 2015: 57-59 - Jui-Chuan Cheng, Te-Jen Su, Tsung-Ying Li, Chia-Hua Wu:
The Noise Reduction of Speech Signals Based on RBFN. IIH-MSP 2015: 449-452 - Liou Chu:
An Auxiliary Teaching Management System by Applying Six Sigma Method. IIH-MSP 2015: 9-12 - Yu-Chi Chung, I-Fang Su, Chiang Lee, Pin-Chieh Huang:
Finding All Competitive Products Using the Dominant Relationship Analysis. IIH-MSP 2015: 133-137 - Yousra Ahmed Fadil, Jean-François Couchot, Raphaël Couturier, Christophe Guyeux:
Steganalyzer Performances in Operational Contexts. IIH-MSP 2015: 429-432 - Qianqian Fang, Huaxing Xu, Risheng Xia, Junfeng Li, Yonghong Yan:
Equalization of Sound Reproduction System Based on the Human Perception Characteristics. IIH-MSP 2015: 380-383 - Guandong Gao, Kebin Jia, Bin Jiang:
An Automatic Geometric Features Extracting Approach for Facial Expression Recognition Based on Corner Detection. IIH-MSP 2015: 302-305 - Haihui Gao, Yong Peng, Kebin Jia, Zhe Wen, Hanjing Li:
Cyber-Physical Systems Testbed Based on Cloud Computing and Software Defined Network. IIH-MSP 2015: 337-340 - Zhenzhen Gong, Shaozhang Niu, Hongli Han:
Tamper Detection Method for Clipped Double JPEG Compression Image. IIH-MSP 2015: 185-188 - Binjie Gu, Yong Fang, Peng Jia, Liang Liu, Lei Zhang, Meilin Wang:
A New Static Detection Method of Malicious Document Based on Wavelet Package Analysis. IIH-MSP 2015: 333-336 - Feng Guo, Deshun Yang, Xiaoou Chen:
Using Deep Belief Network to Capture Temporal Information for Audio Event Classification. IIH-MSP 2015: 421-424 - Shu-Jian Han, Li Zhu, Zheng Li:
Modeling and Analysis of Intelligence Assurance System Based on the Complex Networks Theory. IIH-MSP 2015: 180-184 - Ran Hu, Wenfa Qi, Zongming Guo:
Feature Reduction of Multi-scale LBP for Texture Classification. IIH-MSP 2015: 397-400 - Hsiang-Cheh Huang, Feng-Cheng Chang:
Visual Cryptography for Compressed Sensing of Images with Transmission over Multiple Channels. IIH-MSP 2015: 21-24 - Ching-Fu Huang, Yan-Haw Chen:
Efficient Software Method for Decoding of the (71, 36, 11) Quadratic Residue Code. IIH-MSP 2015: 45-48 - Chieh-Ling Huang, Yu-Hsiang Huang, Jwu-Jenq Chen:
Life Events Segmentation Based on Lifelog Recorded by Wearable Device. IIH-MSP 2015: 129-132 - Hsiang-Cheh Huang, Chuan-Chang Lin, Yueh-Hong Chen:
Fidelity Enhancement of Reversible Data Hiding for Images with Prediction-Based Concepts. IIH-MSP 2015: 13-16 - Hsiang-Cheh Huang, Jiun Lin, Yuh-Yih Lu:
Ownership Protection for Progressive Transmission of Color Images with Reversible Data Hiding. IIH-MSP 2015: 5-8 - Yukio Iwaya, Makoto Otani, Takao Tsuchiya, Junfeng Li:
Virtual Auditory Display on a Smartphone for High-Resolution Acoustic Space by Remote Rendering. IIH-MSP 2015: 368-371 - Chia-Nan Kao, Yung-Cheng Chang, Nen-Fu Huang, I-Ju Liao, Rong-Tai Liu, Hsien-Wei Hung, Che-Wei Lin:
Automatic NIDS Rule Generating System for Detecting HTTP-like Malware Communication. IIH-MSP 2015: 199-202 - Tetsuya Kojima, Akihiro Oizumi, Udaya Parampalli:
Properties of an Emergency Broadcasting System Based on Audio Data Hiding. IIH-MSP 2015: 142-145 - Dan Le, Qiong Li, Lu Shan, Xiamu Niu:
A New Reduced-Latency SC Decoder for Polar Codes. IIH-MSP 2015: 215-218 - Chin-Feng Lee, Si-Ting Chen, Jau-Ji Shen:
Reversible Dual-image Data Embedding on Pixel Differences Using Histogram Modification Shifting and Cross Magic Matrix. IIH-MSP 2015: 113-116 - Chin-Feng Lee, Yu-Ju Tseng:
An Improvement to Image Interpolating Based Data Embedding Using Reversible Pixel Shifting Modification and Direction Modification Operation. IIH-MSP 2015: 117-120 - Yuechuan Li, Yidong Li:
On Preserving Private Geosocial Networks against Practical Attacks. IIH-MSP 2015: 417-420
skipping 82 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-22 13:22 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint