Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 31 matches
- 2011
- Qi-Ding Cao, Hui-Yi Zhang, Jian-Jiang Wang, Hongtao Wang:
The construction of CPU-card-based e-card system for campus. ICCC 2011: 113-116 - Haitao Che, Shijie Zhuang, Lianbo Jiang, Hong Hao, Hongbing Zhang:
Design of wireless transmission digital thermometer. ICCC 2011: 13-16 - Haijiang Chen, Lianbo Jiang, Hong Hao, Hongbing Zhang:
The modeling and controlling of smart car motor based on laser sensor. ICCC 2011: 17-19 - Jiazhao Chen, Liang Qi, Yuxiang Zhang:
Numerical simulation of evaporation and diffusion of liquid propellant based on fluent. ICCC 2011: 54-58 - Jing Dong, Jun Han, Jing Liu, Huibin Yin:
The design of on-line item bank system based on cloud computing platform GAE. ICCC 2011: 71-74 - Bao Hong, Yufang Shi, Xu Bo:
Video based abnormal behavior detection. ICCC 2011: 32-35 - Guannan Hu, Wu Zhang, Wenhao Zhu, Shijun Shen:
A dynamic user-integrated cloud computing architecture. ICCC 2011: 36-40 - Xianpeng Huangfu, Pei Zhang, Hao Xu:
An extensible framework for grid information service virtualized process. ICCC 2011: 63-67 - Yuantao Jiang, Siqin Yu, Zhifeng Xu:
Simulation of e-commerce diffusion model based on Netlogo. ICCC 2011: 99-102 - Ying Jing, Jun Han, Jing Liu, Lin Liu:
Architecture of AppScale-based network teaching platform. ICCC 2011: 75-79 - Wu Jun, Mei Lei, Zhong Luo:
Data security mechanism based on hierarchy analysis for internet of things. ICCC 2011: 68-70 - Xiang Li, Jing Liu, Jun Han, Qian Zhang:
The architecture design of micro-learning platform based on cloud computing. ICCC 2011: 80-83 - Xun Liang:
CRM business cloud computing. ICCC 2011: 103-106 - Haoming Liang, Wenbo Chen, Kefu Shi:
Cloud computing: programming model and information exchange mechanism. ICCC 2011: 10-12 - Li Lin, Zhong Luo, Guan Li:
Multi-source data management on internet of city tunnels. ICCC 2011: 92-95 - Lin Liu, Jun Han, Jing Liu, Ying Jing:
Education cloud test platform based on eucalyptus and app scale. ICCC 2011: 84-87 - Fanqi Meng, Tiening Wang, Nansong Hu, Hongguang Li:
Research of the application of cloud computing theory in emergent material support. ICCC 2011: 50-53 - Wudi Mu, Luyi Yang, Dong Wang, Guangzheng Zhang:
Color-based image segmentation on UAV reconnaissance videos with Matlab. ICCC 2011: 28-31 - QingWei Ping:
Analysis of ocean clutter for wide-band radar based on real data. ICCC 2011: 121-124 - Qiuleji, Lianbo Jiang, Hong Hao, Hongbing Zhang:
The smart car based on laser control. ICCC 2011: 88-91 - Gerald Schaefer:
Computational intelligence techniques for colour clustering. ICCC 2011: 1-5 - Rong Wang, Xiaogang Yang:
The research and implementation of super-resolution reconstruction for multi-frame blurring images. ICCC 2011: 59-62 - Jianping Wang, Yunsheng Zhang, Hong-xia Huang, Guo Zhang:
Analysis and compute of real-time signal flow delay for network on-chip. ICCC 2011: 107-112 - Xianmin Wei:
Study of chord model based on hybrid structure. ICCC 2011: 41-44 - Xianmin Wei:
Clustering algorithm based on the combination of genetic algorithm and ant colony algorithm. ICCC 2011: 45-49 - Xia Wei, Liu Nian:
A solution of wisdom campus based on RFID-SIM. ICCC 2011: 117-120 - Chun Wu, Mei-ge Wang, Wenbo Wang:
Speckle denoising method for SAR based on EMD. ICCC 2011: 96-98 - Jinchao Yang, Xiang Zhang, Hongbin Suo, Li Lu, Jianping Zhang, Yonghong Yan:
Language recognition with language total variability. ICCC 2011: 6-9 - Xiao-yin Zhang:
The mechanism of copyright protection based on static software watermark. ICCC 2011: 24-27 - BaoRong Zhong, Hong Du:
Implementation on remote monitoring system of oil well. ICCC 2011: 20-23
skipping 1 more match
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-12 09:36 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint