Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 87 matches
- 2013
- Rajeev Agrawal, Amit Sehgal:
Network Selection for Remote Healthcare Systems through Mapping between Clinical and Network Parameter. QSHINE 2013: 31-41 - Nagaraj Ambika, G. T. Raju:
DRMWSN-Detecting Replica Nodes Using Multiple Identities in Wireless Sensor Network. QSHINE 2013: 866-878 - Farid Arfi, Jean-Michel Ilié, Djamel-Eddine Saïdouni:
Pruning Search Spaces of RATA Model for the Job-Shop Scheduling. QSHINE 2013: 387-401 - Mohd Ashraf, Rajesh Mishra:
Extended Ant Colony Optimization Algorithm (EACO) for Efficient Design of Networks and Improved Reliability. QSHINE 2013: 939-950 - Reema Aswani, N. Hema:
RoboGardner: A Low-Cost System with Automatic Plant Identification Using Markers. QSHINE 2013: 309-324 - Puneet Azad, Vidushi Sharma:
Clusterhead Selection Using Multiple Attribute Decision Making (MADM) Approach in Wireless Sensor Networks. QSHINE 2013: 141-154 - A. Balu, Kuppusamy Krishnamoorthy:
Ciphertext-Policy Attribute-Based Encryption with User Revocation Support. QSHINE 2013: 696-705 - Akanksha Bhardwaj, Prachi Badera, K. Rajalakshmi:
Fault Tolerant Range Grouping Routing in Dynamic Networks. QSHINE 2013: 218-227 - Shalini Bhartiya, Deepti Mehrotra:
Threats and Challenges to Security of Electronic Health Records. QSHINE 2013: 543-559 - Tapasi Bhattacharjee, Jyoti Prakash Singh:
Secret Image Sharing Scheme Based on Pixel Replacement. QSHINE 2013: 517-526 - Utharn Buranasaksee, Kriengkrai Porkaew, Umaporn Supasitthimethee:
A Generalized Model for Internet-Based Access Control Systems with Delegation Support. QSHINE 2013: 975-988 - Kumar Chanchal, D. K. Lobiyal:
NTTM: Novel Transmission Time Based Mechanism to Detect Wormhole Attack. QSHINE 2013: 485-495 - D. Chandramohan, T. Vengattaraman, D. Rajaguru, Ramachandran Baskaran, P. Dhavachelvan:
A Privacy Preserving Representation for Web Service Communicators' in the Cloud. QSHINE 2013: 496-506 - Arup Kr. Chattopadhyay, Chandan Kr. Bhattacharyya:
Deployment of Sensors in Regular Terrain in Form of Interconnected WSN Units. QSHINE 2013: 228-237 - Ankita Chaturvedi, Aditi Kar Gangopadhyay:
On Generalized Nega-Hadamard Transform. QSHINE 2013: 771-777 - Goutam Datta, Bushan L. Raina:
Fuzzy Approach for Image Near-Duplicate Detection Using Gray Level Vertex Matching in Attribute Relational Bipartite Graphs. QSHINE 2013: 402-414 - Suddhasil De, Diganta Goswami, Sukumar Nandi:
Formal Modeling of Mobile Middleware for Tuple Space Coordination over Multiple Heterogeneous Networks. QSHINE 2013: 415-430 - Rohtash Dhiman, Priyanka, Jasbir Singh Saini:
Wavelet Analysis of Electrical Signals from Brain: The Electroencephalogram. QSHINE 2013: 283-289 - Yashpal Dutta, Varun Sethi:
Performance Analysis of Cryptographic Acceleration in Multicore Environment. QSHINE 2013: 658-667 - Rajesh Duvvuru, Sunil Kumar Singh, Gudikhandula Narasimha Rao, Ashok Kote, Bangaru Bala Krishna, Moturu Vijaya Raju:
Scheme for Assigning Security Automatically for Real-Time Wireless Nodes via ARSA. QSHINE 2013: 185-196 - Xinxin Fan, Kalikinkar Mandal, Guang Gong:
WG-8: A Lightweight Stream Cipher for Resource-Constrained Smart Devices. QSHINE 2013: 617-632 - Narayan Gowraj, Srinivas Avireddy, Sruthi Prabhu:
GAS: A Novel Grid Based Authentication System. QSHINE 2013: 578-590 - Pooja Gupta, Brijesh Kumar, Bushan L. Raina:
QoS Support Downlink for WiMAX Network. QSHINE 2013: 989-997 - Sanjeev Jain, Indrasen Singh, Vijay Shanker Tripathi, Sudarshan Tiwari:
Design and Analysis of Small Planar Antenna Based on CRLH Metamaterial for WSN Application. QSHINE 2013: 290-297 - Rahul Johari, Neelima Gupta, Sandhya Aneja:
DSG-PC: Dynamic Social Grouping Based Routing for Non-uniform Buffer Capacities in DTN Supported with Periodic Carriers. QSHINE 2013: 1-15 - Asutosh Kar, Mahesh Chandra:
Reduced Complexity Pseudo-fractional Adaptive Algorithm with Variable Tap-Length Selection. QSHINE 2013: 451-460 - Sonam Devgan Kaul, Amit K. Awasthi:
Analysis and Improvement of an Authentication Scheme Using Smart Cards. QSHINE 2013: 719-728 - Amir Khan, Mohd. Hasan, Anwar Sadat, Shamsuz Z. Usmani:
6H-SiC Based Power VJFET and Its Temperature Dependence. QSHINE 2013: 325-332 - Ravi Kishore Kodali, Sushant Chougule:
Hybrid Key Management Technique for WSN's. QSHINE 2013: 854-865 - Bhavnesh Kumar, Yogesh Kumar Chauhan, Vivek Shrivastava:
Simulation and Modeling of a Constant Voltage Controller Based Solar Powered Water Pumping System. QSHINE 2013: 365-376
skipping 57 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-25 19:40 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint