default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 28 matches
- 2020
- Tanzin Ahammad, Mahedi Hasan, Mohammad Hasan, Md. Sabir Hossain, Ariful Hoque, Md. Mamunur Rashid:
A New Approach to Solve Job Sequencing Problem Using Dynamic Programming with Reduced Time Complexity. COMS2 2020: 317-328 - Hamed Alqahtani, Iqbal H. Sarker, Asra Kalim, Syed Md. Minhaz Hossain, Sheikh Ikhlaq, Sohrab Hossain:
Cyber Intrusion Detection Using Machine Learning Classification Techniques. COMS2 2020: 121-131 - Hardik H. Bhatt, Anand P. Mankodia:
Deep Recurrent Neural Network with Tanimoto Similarity and MKSIFT Features for Medical Image Search and Retrieval. COMS2 2020: 42-54 - Kushal Bhavsar, Keyurbhai A. Jani, Rakeshkumar Vanzara:
Indian Currency Recognition from Live Video Using Deep Learning. COMS2 2020: 70-81 - Madhavi Dave, Mohanish Patel, Jyotika Doshi, Harshal A. Arolkar:
Ponte Message Broker Bridge Configuration Using MQTT and CoAP Protocol for Interoperability of IoT. COMS2 2020: 184-195 - Flávio Alves Ferreira, Paulo Roberto Guardieiro:
A New Channel-Aware Downlink Scheduling Algorithm for LTE-A and 5G HetNets. COMS2 2020: 173-183 - Sohrab Hossain, Ahmed Abtahee, Imran Kashem, Mohammed Moshiul Hoque, Iqbal H. Sarker:
Crime Prediction Using Spatio-Temporal Data. COMS2 2020: 277-289 - Md. Sabir Hossain, Snaholata Mondal, Rahma Simin Ali, Mohammad Hasan:
Optimizing Complexity of Quick Sort. COMS2 2020: 329-339 - Sohrab Hossain, Dhiman Sarma, Rana Jyoti Chakma, Wahidul Alam, Mohammed Moshiul Hoque, Iqbal H. Sarker:
A Rule-Based Expert System to Assess Coronary Artery Disease Under Uncertainty. COMS2 2020: 143-159 - Md. Mahmudul Haque Joy, Mohammad Hasan, Abu Saleh Musa Miah, Abir Ahmed, Sadia Anwar Tohfa, Md. Farukul Islam Bhuaiyan, Ashrafun Zannat, Md. Mamunur Rashid:
Multiclass MI-Task Classification Using Logistic Regression and Filter Bank Common Spatial Patterns. COMS2 2020: 160-170 - Bhavin A. Kayasth, Rachna M. Patel:
ITS Based OBU: A Fallback Mechanism in Vehicular Ad-Hoc Network. COMS2 2020: 196-209 - Gaurang Lakhani, Amit Kothari:
Coordinator Controller Election Algorithm to Provide Failsafe Through Load Balancing in Distributed SDN Control Plane. COMS2 2020: 234-250 - Mikhail A. Nakhatovich, Ilya Y. Surikov, Vladimir Chernook, Natalia Chernook, Daniil A. Savchuk:
Applications of Classical and Deep Learning Techniques for Polar Bear Detection and Recognition from Aero Photography. COMS2 2020: 3-15 - Archana M. Nayak, Nirbhay Chaubey:
Predicting Passenger Flow in BTS and MTS Using Hybrid Stacked Auto-encoder and Softmax Regression. COMS2 2020: 29-41 - Kaushika Pal, Biraj V. Patel:
Emotion Classification with Reduced Feature Set SGDClassifier, Random Forest and Performance Tuning. COMS2 2020: 95-108 - Dhruvi J. Ka Patel, Mosin I. Hasan, Narendar M. Patel:
Demystifying Computational Techniques Used to Diagnose Tuberculosis. COMS2 2020: 55-69 - Mayura Patil, Nilima Dongre:
Melanoma Detection Using HSV with SVM Classifier and De-duplication Technique to Increase Efficiency. COMS2 2020: 109-120 - Radhanath Patra:
Prediction of Lung Cancer Using Machine Learning Classifier. COMS2 2020: 132-142 - Khyati Rami, Vinod Desai:
Malware Detection Framework Using PCA Based ANN. COMS2 2020: 298-313 - Vikas Sihag, Ashawani Swami, Manu Vardhan, Pradeep Singh:
Signature Based Malicious Behavior Detection in Android. COMS2 2020: 251-262 - Ilya Y. Surikov, Mikhail A. Nakhatovich, Sergey Y. Belyaev, Daniil A. Savchuk:
Floor Plan Recognition and Vectorization Using Combination UNet, Faster-RCNN, Statistical Component Analysis and Ramer-Douglas-Peucker. COMS2 2020: 16-28 - Darshan Tank, Akshai Aggarwal, Nirbhay Chaubey:
A Method for Malware Detection in Virtualization Environment. COMS2 2020: 263-276 - Rohit M. Thanki, Ashish Kothari:
Color Image Watermarking in Encryption Domain. COMS2 2020: 290-297 - Nirbhay Chaubey, Satyen Parikh, Kiran Amin:
Computing Science, Communication and Security - First International Conference, COMS2 2020, Gujarat, India, March 26-27, 2020, Revised Selected Papers. Communications in Computer and Information Science 1235, Springer 2020, ISBN 978-981-15-6647-9 [contents] - (Withdrawn) RETRACTED CHAPTER: Management System for Optimizing Public Transport Networks: GPS Record. COMS2 2020: 222-233
- (Withdrawn) RETRACTED CHAPTER: Software Project Planning Through Comparison of Bio-inspired Algorithms. COMS2 2020: 340-351
- (Withdrawn) RETRACTED CHAPTER: Optimization of Driving Efficiency for Pre-determined Routes: Proactive Vehicle Traffic Control. COMS2 2020: 82-94
- (Withdrawn) RETRACTED CHAPTER: Design of a Network with VANET Sporadic Cloud Computing Applied to Traffic Accident Prevention. COMS2 2020: 210-221
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-21 13:44 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint