Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 32 matches
- 2015
- Tamal Adhikary, Amit Kumar Das, Md. Abdur Razzaque, Muhammad Enamul Hoque Chowdhury, Shohana Parvin:
Test implementation of a sensor device for measuring soil macronutrients. NSysS 2015: 1-8 - Sahan Ahmad, Kazi Md. Rokibul Alam, Habibur Rahman, Shinsuke Tamura:
A comparison between symmetric and asymmetric key encryption algorithm based decryption mixnets. NSysS 2015: 1-5 - Shamir Ahmed, A. S. M. Rizvi, Rifat Sabbir Mansur, Md. Rafatul Amin, A. B. M. Alim Al Islam:
User identification through usage analysis of electronic devices. NSysS 2015: 1-6 - Mahmuda Akter, Md. Obaidur Rahman, Md. Nazrul Islam, Md. Ahsan Habib:
Incremental clustering-based object tracking in wireless sensor networks. NSysS 2015: 1-6 - Touhidul Alam, Mohammad Rashed Iqbal Faruque, Mohammad Tariqul Islam:
Probe-fed rectangular patch antenna for wireless communication. NSysS 2015: 1-4 - T. I. Chowdhury, M. M. Rahman, Sadre-Ala Parvez, A. K. M. M. Alam, Abul Basher, Abusayeed Alam, Shahriar Rizwan:
A multi-step approach for RSSi-based distance estimation using smartphones. NSysS 2015: 1-5 - S. M. Ferdous, M. Sohel Rahman:
A metaheuristic approach for application partitioning in mobile system. NSysS 2015: 1-6 - A. B. M. Alim Al Islam, Chowdhury Sayeed Hyder, Kazi Hasan Zubaer:
Digging the innate reliability of wireless networked systems. NSysS 2015: 1-10 - Md. Lisul Islam, Novia Nurain, Swakkhar Shatabda, M. Sohel Rahman:
FGPGA: An efficient genetic approach for producing feasible graph partitions. NSysS 2015: 1-8 - Kazi Sinthia Kabir, Iftakhar Ahmad, Akhter Al Amin, Maruf Zaber, Tanzila Choudhury, Bashir M. Sabquat Bahar Talukder, A. B. M. Alim Al Islam:
Q-Nerve: Propagating signal of a damaged nerve using quantum networking. NSysS 2015: 1-10 - Tanjida Kabir, Novia Nurain, Md. Humayun Kabir:
Pro-AODV (Proactive AODV): Simple modifications to AODV for proactively minimizing congestion in VANETs. NSysS 2015: 1-6 - Fahim Hasan Khan, Mohammed Eunus Ali, Himel Dev:
A hierarchical approach for identifying user activity patterns from mobile phone call detail records. NSysS 2015: 1-6 - Taslim Arefin Khan, Mainuddin Ahmad Jonas, S. M. Hasanur Rashid, Mushfequr Rahman, Mohammad Saifur Rahman, A. B. M. Alim Al Islam:
Sign of life: A system for escalating post-disaster rescue missions in ready-made garment factories. NSysS 2015: 1-6 - Ahmed Khurshid, Md. Humayun Kabir, Rajkumar Das:
Modified TCP NewReno for wireless networks. NSysS 2015: 1-6 - Md. Mosiur Rahman Lunar, A. B. M. Alim Al Islam:
A study on combining power management and power control for wireless sensor networks. NSysS 2015: 1-4 - Mahmuda Naznin, Abu Sayed Chowdhury:
ZDG: Energy efficient zone based data gathering in a wireless sensor network. NSysS 2015: 1-7 - Fernaz Narin Nur, Selina Sharmin, Md. Abdur Razzaque, Md. Shariful Islam:
A duty cycle directional MAC protocol for wireless sensor networks. NSysS 2015: 1-9 - Novia Nurain, Moin Mostakim, A. B. M. Alim Al Islam:
Towards empirical study based mathematical modeling for throughput of MANETs. NSysS 2015: 1-6 - Md. Tarikul Islam Papon, Ishtiyaque Ahmad, Nazmus Saquib, Ashikur Rahman:
Non-invasive heart rate measuring smartphone applications using on-board cameras: A short survey. NSysS 2015: 1-6 - Md. Khaledur Rahman, Md. Yusuf Sarwar Uddin, Nashid Shahriar, Mostafizur Rahman:
Sponge: A searchable P2P mobile app store using DHTs. NSysS 2015: 1-6 - A. S. M. Rizvi, Shamir Ahmed, Minhajul Bashir, Md. Yusuf Sarwar Uddin:
MediaServ: Resource optimization in subscription based media crowdsourcing. NSysS 2015: 1-5 - Md. Nazmus Sadat, Muhammad Tasnim Mohiuddin, Md. Yusuf Sarwar Uddin:
On bounded message replication in delay tolerant networks. NSysS 2015: 1-10 - Nazmus Saquib, Md. Tarikul Islam Papon, Ishtiyaque Ahmad, Ashikur Rahman:
Measurement of heart rate using photoplethysmography. NSysS 2015: 1-6 - Suri Dipannita Sayeed, Md. Sajid Hasan, Md. Saidur Rahman:
Measuring topological robustness of scale-free networks using biconnected components. NSysS 2015: 1-6 - Ayon Sen, A. S. M. Sohidull Islam, Md. Yusuf Sarwar Uddin:
MARQUES: Distributed multi-attribute range query solution using space filling curve on DTHs. NSysS 2015: 1-9 - Selina Sharmin, Fernaz Narin Nur, Md. Abdur Razzaque, Md. Mustafizur Rahman:
Network lifetime aware area coverage for clustered directional sensor networks. NSysS 2015: 1-9 - Farah Tanjeem, Md. Yusuf Sarwar Uddin, A. K. M. Ashikur Rahman:
Wireless media access depending on packet size distribution over error-prone channels. NSysS 2015: 1-7 - Muhammad Nur Yanhaona, Md Anindya Prodhan, Andrew S. Grimshaw:
An agent-based distributed monitoring framework (Extended abstract). NSysS 2015: 1-10 - Shaolin Zaman, Nafeez Abrar, Anindya Iqbal:
Incentive model design for participatory sensing: Technologies and challenges. NSysS 2015: 1-6 - Mehedee Zaman, Tazrian Siddiqui, Mohammad Rakib Amin, Md. Shohrab Hossain:
Malware detection in Android by network traffic analysis. NSysS 2015: 1-5
skipping 2 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-27 11:01 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint