default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 106 matches
- 2012
- Ruth Agada, Jie Yan:
Research to Improve Communication by Animated Pedagogical Agents. J. Next Gener. Inf. Technol. 3(1): 58-69 (2012) - Ali Amer Ahmed, R. B. Ahmad, Saadi A. Alobaidi, Abid Yahya, Layth A. Hassnawi, Zaid Ghanim Ali, Hazim H. Tahir:
Sliding Mode Simulation and Robustness Controller. J. Next Gener. Inf. Technol. 3(2): 19-28 (2012) - Sabah S. Al-Fedaghi:
Toward a New Methodology of Software Evolution. J. Next Gener. Inf. Technol. 3(4): 78-87 (2012) - Abbas Fadhil Mohammed Ali Aljuboori, Do Jae Su, Franz Ko:
Web Site Evaluation: Trends and Existing Approaches. J. Next Gener. Inf. Technol. 3(2): 57-64 (2012) - Faisal Alshuwaier, Abdullah A. Alshwaier, Ali Areshey:
Effective Use of Cloud Computing Services in Education. J. Next Gener. Inf. Technol. 3(4): 62-77 (2012) - Anwar Alyatama, Kassem Saleh, Nidal Nasser:
A Novel Hierarchical and Heterogeneous Mobile Agent-Based Wireless Sensor Networks (HHMA-WSN) Architecture. J. Next Gener. Inf. Technol. 3(4): 1-9 (2012) - Masoud Barati, Ehsan Akbari:
A Backbone Formation And Learning Automata-Based Algorithm for Improving Life Time in Wireless Sensor Networks. J. Next Gener. Inf. Technol. 3(3): 75-86 (2012) - Cahyo Crysdian, Abdul Hanan Abdullah:
The Application of Multi Gradient Operators to Enhance Watershed Transform for Generic Medical Segmentation. J. Next Gener. Inf. Technol. 3(4): 45-53 (2012) - Ganesh Chandra Deka, Jasni Mohamad Zain, Prabhat Mahanti:
ICT's Role in e-Governance in India and Malaysia: A Review. J. Next Gener. Inf. Technol. 3(1): 7-16 (2012) - Guifang Duan, Shuci Wu, Yen-Wei Chen:
Robust Facial Feature Point Extraction via Viewpoint-Specific Active Appearance Model. J. Next Gener. Inf. Technol. 3(3): 10-18 (2012) - Fernando Ferri, Arianna D'Ulizia, Patrizia Grifoni:
Multimodal Language Specification for Human Adaptive Mechatronics. J. Next Gener. Inf. Technol. 3(1): 47-57 (2012) - Zhijiang Gao, Huaxin Zeng, Yu Xia:
Bidirectional Feedback Packet Scheduling for CICQ Switches. J. Next Gener. Inf. Technol. 3(2): 28-36 (2012) - Farid Ghani, Musfira Jilani, Mohit Raghav, Omar Farooq, Yusuf Uzzaman Khan:
Development of Brain Computer Interface for Elbow Movement Detection. J. Next Gener. Inf. Technol. 3(3): 66-74 (2012) - Marjan Gusev, Sasko Ristov:
Performance Gains and Drawbacks using Set Associative Cache. J. Next Gener. Inf. Technol. 3(3): 87-98 (2012) - Seonmin Hwang, Bok-Hee Song, Han-Kyung Yun:
Fuzzy Inference of Textile Animation Using Explicit Midpoint Rule. J. Next Gener. Inf. Technol. 3(4): 54-62 (2012) - Hajar Mat Jani:
Modeling Total Quality Management in Higher Education with Case-Based Reasoning. J. Next Gener. Inf. Technol. 3(3): 99-109 (2012) - Inwhee Joe, Hyojin Lee, Kyu-Seek Sohn:
A Group-based Mobile MPLS Protocol for Fast Handover and Low Power Consumption. J. Next Gener. Inf. Technol. 3(1): 36-46 (2012) - Fazal Wahab Karam, Terje Jensen:
Vertical Handover in Next Generation Wireless Networks. J. Next Gener. Inf. Technol. 3(4): 10-25 (2012) - Donggyu Kim, Kwang-Seok Hong, Kwang-Woo Chung:
Implementation of Portable Multi-Channel EEG and Head Motion Signal Acquisition System. J. Next Gener. Inf. Technol. 3(4): 26-34 (2012) - Yadav Kuleesha, Lin Feng:
Biomedical Image Visualization as a Web Application. J. Next Gener. Inf. Technol. 3(1): 17-27 (2012) - Sangyun Lee:
Java Garbage Collection for Embedded Java Virtual Machines: Design, Implementation, and Performance Evaluation. J. Next Gener. Inf. Technol. 3(3): 27-40 (2012) - Kun Lee:
Multiresolution Volumetric Medical Data Modeling Based on Gaussian Curvature by Using Weighted Alpha. J. Next Gener. Inf. Technol. 3(3): 41-51 (2012) - Akira Murayama, Akinori Kanasugi:
A Processor for GA based on Redundant Binary Number using FPGA. J. Next Gener. Inf. Technol. 3(3): 1-9 (2012) - Pusik Park, Rustam Rakhimov Igorevich, Jongchan Choi, Dugki Min, Jongho Yoon:
Angular Depth Map Generation for Gesture Recognition. J. Next Gener. Inf. Technol. 3(2): 1-8 (2012) - Jigisha N. Patel, Suprava Patnaik, Murali D.:
Multilayered JPEG Image Transmission over SUI Channel Using UEP and Error Concealment Techniques. J. Next Gener. Inf. Technol. 3(3): 19-26 (2012) - Zahra Riahi Samani, Mehrnoush Shamsfard:
On The Application of Fuzzy Ontology for Qualitative Spatial Reasoning. J. Next Gener. Inf. Technol. 3(2): 9-18 (2012) - Sunil K. Timalsina, Sangman Moh:
A Review on NFC and NFC-Based Mobile Payment Solution. J. Next Gener. Inf. Technol. 3(4): 35-44 (2012) - Kelvin C. K. Wong, William K. Cheung:
Evaluating ICT Literacy Differences in Arts and Science Students. J. Next Gener. Inf. Technol. 3(1): 1-6 (2012) - Gongjun Yan, Weiming Yang, Jingli Lin, Danda B. Rawat:
Cross-layer Location Information Security in Vehicular Networks. J. Next Gener. Inf. Technol. 3(2): 37-56 (2012) - Sherin M. Youssef, Saleh Mesbah, Yasmine M. Mahmoud:
A Hybrid Wavelet-based Image Retrieval. J. Next Gener. Inf. Technol. 3(3): 52-65 (2012)
skipping 76 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-09 17:12 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint