default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 101 matches
- 2016
- Babar Ali, Nadeem Javaid, Saif ul Islam, Ghufran Ahmed, Umar Qasim, Zahoor Ali Khan:
RSM and VSM: Two New Routing Protocols for Underwater WSNs. INCoS 2016: 173-179 - Alexander Amigud, Joan Arnedo-Moreno, Thanasis Daradoumis, Ana-Elena Guerrero-Roldán:
A Behavioral Biometrics Based and Machine Learning Aided Framework for Academic Integrity in E-Assessment. INCoS 2016: 255-262 - Javier Arellano-Verdejo, Enrique Alba:
Optimal Allocation of Public Parking Slots Using Evolutionary Algorithms. INCoS 2016: 222-228 - Jésica de Armas, Pere Tuset, Tengfei Chang, Ferran Adelantado, Thomas Watteyne, Xavier Vilajosana:
Determinism through Path Diversity: Why Packet Replication Makes Sense. INCoS 2016: 150-154 - Abir Awad, Sara Kadry, Guraraj Maddodi, Saul Gill, Brian Lee:
Data Leakage Detection Using System Call Provenance. INCoS 2016: 486-491 - David Bañeres:
Towards a Personalized Summative Model Based on Learner's Preferences. INCoS 2016: 339-344 - David Bañeres, Jordi Conesa:
eOrient@ - A Recommender System to Address Life-Long Learning and Promote Employability. INCoS 2016: 351-356 - Alessandra De Benedictis, Valentina Casola, Massimiliano Rak, Umberto Villano:
Cloud Security: From Per-Provider to Per-Service Security SLAs. INCoS 2016: 469-474 - Peter Beno, Vladimir Pavelka, Frantisek Duchon, Martin Dekan:
Using Octree Maps and RGBD Cameras to Perform Mapping and A* Navigation. INCoS 2016: 66-72 - Ferdinando Campanile, Gianfranco Cerullo, Salvatore D'Antonio, Giovanni Mazzeo, Gaetano Papale, Luigi Sgaglione:
A Multi-sensor Data Fusion Approach for Detecting Direct Debit Frauds. INCoS 2016: 480-485 - Wenbin Cao, Qiwei Hu, Wenyuan Song, Yutao Wu:
Mission-Oriented Maintenance Optimization Subject to Resources Constraints. INCoS 2016: 237-243 - Wenbin Cao, Wenyuan Song, Qiwei Hu, Yinxia Du:
An Exact Method for Solving Selective Maintenance Problems Considering Imperfect Maintenance. INCoS 2016: 522-526 - Liying Chen, Feng Wang, Yutao Wu:
Research on Selecting Emergency Material Production Enterprises Based on Productivity Reserve. INCoS 2016: 423-427 - Lei Chen, Jing Zhang, Lijun Cai, Ziyun Deng, Tinqing He, Xu An Wang:
Locality-Aware and Energy-Aware Job Pre-Assignment for Mapreduce. INCoS 2016: 59-65 - Ben Cheng, Shan Hu, Jiang-Wei Wang, Yun-Yuan Dong:
A Goal Programming Approach for Group Decision Making with Four Incomplete Preference Relations. INCoS 2016: 435-438 - Haiming Cheng, Ling Huang, He Xu, Yifan Hu, Xu An Wang:
Design and Implementation of Library Books Search and Management System Using RFID Technology. INCoS 2016: 392-397 - Lu Cheng, Peng Xu, Yuechuan Wei:
New Related-Key Impossible Differential Attack on MIBS-80. INCoS 2016: 203-206 - Kuo Chi, Jianshe Kang, Kun Wu, Xu An Wang:
Bayesian Parameter Estimation of Weibull Mixtures Using Cuckoo Search. INCoS 2016: 411-414 - Ziyun Deng, Jing Zhang:
A Cloud Platform for CAE Simulation in Supercomputing Enviroment. INCoS 2016: 49-52 - Giuliana Dettori:
Learning through the Design of Interactive Storie: Exploring the Concept of Storyworld. INCoS 2016: 370-374 - Ye Ding, He Xu, Peng Li, Jie Ding:
Review of Virtual Memory Optimization in Cloud Environment. INCoS 2016: 53-58 - Yun-Yuan Dong:
The Features of Low-Connectivity Essential Proteins. INCoS 2016: 251-254 - Yukun Dong, Yalan Wang:
Fully Detection of Illegal Value Use Defects. INCoS 2016: 492-497 - Martina Drahosová, Peter Balco:
The Benefits and Risks of Enterprise Social Networks. INCoS 2016: 15-19 - Mudassir Ejaz, Anwar Khan, Muhammad, Umar Qasim, Zahoor Ali Khan, Nadeem Javaid:
Position Aware Mobility Pattern of AUVs for Avoiding Void Zone in Underwater WSNs. INCoS 2016: 332-338 - Giuseppe Fenza, Vincenzo Loia, Francesco Orciuoli:
Providing Smart Objects with Intelligent Tutoring Capabilities by Semantic Technologies. INCoS 2016: 103-109 - Akihiro Fujihara:
Estimating Proper Communication Distance for Epidemic Routing in Japanese Urban Areas Using SNS-Based People Flow Data. INCoS 2016: 1-8 - Satoshi Furutani, Chisa Takano, Masaki Aida:
Proposal of the Network Resonance Method for Estimating Eigenvalues of the Scaled Laplacian Matrix. INCoS 2016: 451-456 - David Gañán, Santi Caballé, Robert Clarisó, Jordi Conesa:
A Prototype of an eLearning Platform in Support for Learning Analytics and Gamification. INCoS 2016: 362-369 - Tatyana Golubeva, Sergey Konshin:
The Research of Possibility of Sharing Use of Wireless and Mobile Technologies for Organizing the Radio Channels of Operation Control System of Earthmoving and Construction Machines. INCoS 2016: 9-14
skipping 71 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-12-16 20:30 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint