Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 91 matches
- 2016
- Amal Babour, Javed I. Khan, Fatema Nafa:
Deepening Prose Comprehension by Incremental Free Text Conceptual Graph Mining and Knowledge. CyberC 2016: 208-215 - Alexander S. Basan, Elena Basan, Oleg B. Makarevich:
Methodology of Countering Attacks for Wireless Sensor Networks Based on Trust. CyberC 2016: 409-412 - Leilei Chang, Xiaowei Ma, Liuying Wang, Xiaodong Ling:
Comparative Analysis on the Conjunctive and Disjunctive Assumptions for the Belief Rule Base. CyberC 2016: 153-156 - Qinyin Chen, Yanting Hu, Zhe Chen:
Node Localization Algorithm of Wireless Sensor Networks for Large Electrical Equipment Monitoring Application. CyberC 2016: 390-397 - Shuai Chen, Bing Li:
A Dynamic Reseeding DRBG Based on SRAM PUFs. CyberC 2016: 50-53 - Wengang Chen, Ruijie Wang, Run-ze Wu, Liangrui Tang, Junli Fan:
Multi-Source and Heterogeneous Data Integration Model for Big Data Analytics in Power DCS. CyberC 2016: 238-242 - Yinglong Diao, Ke-yan Liu, Lijuan Hu, Dongli Jia, Weijie Dong:
Classification of Massive User Load Characteristics in Distribution Network Based on Agglomerative Hierarchical Algorithm. CyberC 2016: 169-172 - Ren Duan, Dingyi Fang, Chengui Zhao:
A QoS Opportunistic Routing Based on Directional Transmission for Wireless Sensor Networks. CyberC 2016: 471-480 - Chao Fan, Junxuan Huang, Dan Yang, Zhihai Rong:
Modeling POI Transition Network of Human Mobility. CyberC 2016: 364-367 - Kai-Yin Fok, Chi-Tsun Cheng, Chi K. Tse, Nuwan Ganganath:
A Relaxation Scheme for TSP-Based 3D Printing Path Optimizer. CyberC 2016: 382-385 - Zhihua Gan, Mingquan Zhang, Zhimin Gu, Jizan Zhang:
Minimizing Energy Consumption for Embedded Multicore Systems Using Cache Configuration and Task Mapping. CyberC 2016: 328-334 - Nuwan Ganganath, Chi-Tsun Cheng, Chi K. Tse:
Rapidly Replanning A. CyberC 2016: 386-389 - Fang Gao, Zhangqin Huang, Shulong Wang, Xinrong Ji:
A Scalable Object Detection Framework Based on Embedded Manycore Cluster. CyberC 2016: 142-145 - Xiongfei Geng:
Ship Scheduling in Inland Waterway Networks Based on Cellular Automata Graph. CyberC 2016: 450-453 - Chen Guo, Yong Chai, Cong Wang:
Multi-Source Heterogeneous Data Recognition Based on Linguistic Labels. CyberC 2016: 278-285 - Daojun Han, Ling Gong, Fen Qin:
A Dynamic Access Control Policy Based on Hierarchical Description. CyberC 2016: 76-80 - Xianwen He, Gaoming Huang, Gaoqi Dou, Jun Gao:
Semi-Blind Channel Estimation and Symbol Detection Using Combined Superimposed Training. CyberC 2016: 286-289 - Lijuan Hu, Ke-yan Liu, Yinglong Diao, Xiaoli Meng, Wanxing Sheng:
Operational Reliability Evaluation Method Based on Big Data Technology. CyberC 2016: 341-344 - Min Huang, Kai Bu, Hanlin Wang, Kaiwen Zhu:
Reviving Android Malware with DroidRide: And How Not To. CyberC 2016: 27-34 - Dongli Jia:
Study on Evaluation of Voltage Sag Exposed Areas in Large Scale Complex Distribution Network. CyberC 2016: 459-464 - Yifan Jia, Li Qu:
Improve the Performance of Link Prediction Methods in Citation Network by Using H-Index. CyberC 2016: 220-223 - Bo Jiao, Xuejun Yuan, Fei Huang, Xun-Long Pang, Yican Jin, Zhe Han:
Performance of Two Normalized Laplacian Spectral Features on Sampling Algorithms. CyberC 2016: 434-437 - Guihua Kang, Hongbo Kang:
A New Quasi Periodic Triggering Mechanism of Handover under a High Speed Mobile Environment. CyberC 2016: 423-428 - Hyeunjee Kim, Hoonha Choi, Youngwoo Kim, Jaechun No:
MS2: NAND-Flash SSD-Based Multi-Layered Storage Management System. CyberC 2016: 100-104 - Xinling Kong, Yonghong Chen, Hui Tian, Tian Wang, Yiqiao Cai, Xin Chen:
A Novel Botnet Detection Method Based on Preprocessing Data Packet by Graph Structure Clustering. CyberC 2016: 42-45 - Shuo Lei, Zexi Li, Binglin Wu, Haiquan Wang:
Research on Multi-Objective Bus Route Planning Model Based on Taxi GPS Data. CyberC 2016: 249-255 - Aiguo Li, Yongwei Li:
Portable RFID Location System in Security Field. CyberC 2016: 413-417 - Xing Li, Guolin Li, Rick Fishbune:
A Novel Missing-Rate-Oriented Selective Algorithm for Handling Missing Data by Minimizing Imputation. CyberC 2016: 234-237 - Xingguo Li, Junfeng Wang, Linlin Bei:
LEACH Protocol and Its Improved Algorithm in Wireless Sensor Network. CyberC 2016: 418-422 - Xiaoli Lin, Wei Huangfu, Fei Wang, Liyuan Liu, Keping Long:
A Breast Cancer Risk Classification Model Based on the Features Selected by Novel F-Score Index for the Imbalanced Multi-Feature Dataset. CyberC 2016: 198-203
skipping 61 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-08-01 06:00 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint