default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 33 matches
- 2007
- Wael Adi, Bassel Soudan:
Bio-Inspired Electronic-Mutation with genetic properties for Secured Identification. BLISS 2007: 133-136 - Nikolaos G. Bartzoudis, Klaus D. McDonald-Maier:
An adaptive processing node architecture for validating sensors reliability in a wind farm. BLISS 2007: 83-86 - Walid Riad Boukabou, Ahmed Bouridane:
An Improved LDA Approach with DFB Preprocessing for Face Recognition. BLISS 2007: 106-110 - Martin Drahanský:
Sinusoidal Shape of a Papillary Line Crosscut. BLISS 2007: 19-24 - Charlie D. Frowd, Vicki Bruce, Carol Gannon, Mark Robinson, Colin Tredoux, Jo Park, Alex H. McIntyre, Peter J. B. Hancock:
Evolving the Face of a Criminal: How to Search a Face Space More Effectively. BLISS 2007: 3-10 - Sue Ellen Haupt, Randy L. Haupt, George S. Young:
Using Genetic Algorithms in Chem-Bio Defense Applications. BLISS 2007: 151-154 - Andrew B. T. Hopkins, Klaus D. McDonald-Maier, W. Gareth J. Howells, Ahmet T. Erdogan, Tughrul Arslan:
I2S3 the Integrated Intelligent Secure Sensor Systems Project. BLISS 2007: 137-140 - Daniel Howard, Joseph Kolibal:
Image Analysis by Means of the Stochastic Matrix Method of Function Recovery. BLISS 2007: 97-101 - W. Gareth J. Howells, Klaus D. McDonald-Maier, T. Binzegger, M. P. Young:
MAVIS: A Secure Formal Computational Paradigm based on the Mammalian Visual System. BLISS 2007: 115-118 - H. J. Kadim:
Modelling of Anticipatory Behaviour for Self-Control and Adaptability with Applications to Autonomous Systems. BLISS 2007: 91-96 - H. J. Kadim, Christopher M. Wood:
Prediction of Protein Conformation with Potential Applications to Medical Diagnosis and Defence. BLISS 2007: 155-158 - Adem Karahoca, Turkalp Kucur, Nizamettin Aydin:
Data Mining Usage in Emboli Detection. BLISS 2007: 159-162 - Haeng-Kon Kim:
Frameworks of Indexing Mechanism for Mobile Devices. BLISS 2007: 47-50 - Hak-Man Kim, Dong-Joo Kang, Tai-Hoon Kim:
Flexible Key Distribution for SCADA Network using Multi-Agent System. BLISS 2007: 29-34 - Tai-Hoon Kim, Seoksoo Kim, Gilcheol Park:
Block Model Application for Decision Support Systems. BLISS 2007: 25-28 - Kun Lin, Lin Yuan, Gang Qu:
SecureGo: A Hardware-Software Co-Protection against Identity Theft in Online Transaction. BLISS 2007: 59-64 - Oana Muntean, Mihai Oltean:
Processing Bank Checks with Genetic Programming and Histograms. BLISS 2007: 102-105 - Mircea Gh. Negoita:
Artificial Immune Systems -- an Emergent Technology Performing the Defence of Complex Systems. BLISS 2007: 145-150 - Youngho Park, Won-Young Lee, Kyung Hyune Rhee:
Authenticated On-Demand Ad Hoc Routing Protocol without Pre-shared Key Distribution. BLISS 2007: 41-46 - Lukás Sekanina, Tomas Hruska, Tomás Vojnar, Dusan Kolár, Jan Cernocký:
On Some Directions in Security-Oriented Research. BLISS 2007: 141-144 - Vlad P. Shmerko, Svetlana N. Yanushkevich, Hyunsuk Moon, Adrian Stoica, Ronald R. Yager:
Accelerating Decision Making Support in Biometric Assistant for Remote Temperature Measures. BLISS 2007: 11-14 - Konstantinos Sirlantzis, W. Gareth J. Howells, Toby Lloyd-Jones, Michael C. Fairhurst:
A Multi-Classifier Approach to Modelling Human and Automatic Visual Cognition. BLISS 2007: 111-114 - Chul Sur, Chae Duk Jung, Kyung Hyune Rhee:
Multi-receiver Certificate-Based Encryption and Application to Public Key Broadcast Encryption. BLISS 2007: 35-40 - Turgay Temel, Nizamettin Aydin:
A Threshold Free Clustering Algorithm for Robust Unsupervised Classification. BLISS 2007: 119-122 - A. Ian Thompson, Ahmed Bouridane, Fatih Kurugollu:
Spread Transform Watermarking for Digital Multimedia Using the Complex Wavelet Domain. BLISS 2007: 123-132 - Jim Tørresen, Kyrre Glette:
Making Hardware Soft in Intelligent Systems. BLISS 2007: 87-90 - Erfu Yang, Ahmet T. Erdogan, Tughrul Arslan, Nick Barton:
Multi-Objective Evolutionary Optimizations of a Space-Based Reconfigurable Sensor Network under Hard Constraints. BLISS 2007: 72-75 - Erfu Yang, Ahmet T. Erdogan, Tughrul Arslan, Nick Barton:
An Improved Particle Swarm Optimization Algorithm for Power-Efficient Wireless Sensor Networks. BLISS 2007: 76-82 - Sang-Soo Yeo, Kouichi Sakurai, Jin Kwak:
A Practical Proxy Device for Protecting RFID Tag's Identifier. BLISS 2007: 55-58 - Siti Yuhaniz, Tanya Vladimirova, Scott Gleason:
An Intelligent Decision-Making System for Flood Monitoring from Space. BLISS 2007: 65-71
skipping 3 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-12-19 03:20 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint