default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 29 matches
- 2017
- Alyaa Al-Barrak, Ali Al-Sherbaz, Triantafyllos Kanakis, Robin Crockett:
Enhancing BER Performance Limit of BCH and RS Codes Using Multipath Diversity. Comput. 6(2): 21 (2017) - Alaa A. S. Al-Rubaie, Zina Abu-Almaalie, Zabih Ghassemlooy:
BICM-ID with Physical Layer Network Coding in TWR Free Space Optical Communication Links. Comput. 6(3): 24 (2017) - Ismail Amin Ali, Sandro Moiron, Martin Fleury, Mohammed Ghanbari:
Data Partitioning Technique for Improved Video Prioritization. Comput. 6(3): 23 (2017) - Miada Almasre, Hana Al-Nuaim:
Comparison of Four SVM Classifiers Used with Depth Sensors to Recognize Arabic Sign Language Words. Comput. 6(2): 20 (2017) - Adeel Anjum, Guillaume Raschia:
BangA: An Efficient and Flexible Generalization-Based Algorithm for Privacy Preserving Data Publication. Comput. 6(1): 1 (2017) - Mamdouh Babi, Wenbing Zhao:
Towards Trustworthy Collaborative Editing. Comput. 6(2): 13 (2017) - Joy Backhaus, Debora Jeske, Herbert Poinstingl, Sarah Koenig:
Assessing Efficiency of Prompts Based on Learner Characteristics. Comput. 6(1): 7 (2017) - Xin Chen, Jingbin Hao, Hao Liu, Zhengtong Han, Shengping Ye:
Research on Similarity Measurements of 3D Models Based on Skeleton Trees. Comput. 6(2): 17 (2017) - Samah Felemban, Michael Gardner, Victor Callaghan:
Towards Recognising Learning Evidence in Collaborative Virtual Environments: A Mixed Agents Approach. Comput. 6(3): 22 (2017) - Grigorios Kalliatakis, Alexandros Stergiou, Nikolaos Vidakis:
Conceiving Human Interaction by Visualising Depth Data of Head Pose Changes and Emotion Recognition via Facial Expressions. Comput. 6(3): 25 (2017) - Adrian Kampa, Grzegorz Golda, Iwona Paprocka:
Discrete Event Simulation Method as a Tool for Improvement of Manufacturing Systems. Comput. 6(1): 10 (2017) - Imdadul Karim, Quoc-Tuan Vien, Tuan Anh Le, Glenford Mapp:
A Comparative Experimental Design and Performance Analysis of Snort-Based Intrusion Detection System in Practical Computer Networks. Comput. 6(1): 6 (2017) - Andrej Kosir, Gregor Strle:
Emotion Elicitation in a Socially Intelligent Service: The Typing Tutor. Comput. 6(2): 14 (2017) - Milko Krachunov, Maria Nisheva, Dimitar Vassilev:
Application of Machine Learning Models in Error and Variant Detection in High-Variation Genomics Datasets. Comput. 6(4): 29 (2017) - Sang-won Leigh, Harpreet Sareen, Hsin-Liu Cindy Kao, Xin Liu, Pattie Maes:
Body-Borne Computers as Extensions of Self. Comput. 6(1): 12 (2017) - Gian Domenico Licciardo, Carmine Cappetta, Luigi Di Benedetto:
Design of a Convolutional Two-Dimensional Filter in FPGA for Image Processing Applications. Comput. 6(2): 19 (2017) - Amjad Mahmood, Salman A. Khan:
Hard Real-Time Task Scheduling in Cloud Computing Using an Adaptive Genetic Algorithm. Comput. 6(2): 15 (2017) - Rino Micheloni, Luca Crippa, Cristian Zambelli, Piero Olivo:
Architectural and Integration Options for 3D NAND Flash Memories. Comput. 6(3): 27 (2017) - Sparsh Mittal:
A Survey of Soft-Error Mitigation Techniques for Non-Volatile Memories. Comput. 6(1): 8 (2017) - Hamid Reza Nasrinpour, Amir Massah Bavani, Mohammad Teshnehlab:
Grouped Bees Algorithm: A Grouped Version of the Bees Algorithm. Comput. 6(1): 5 (2017) - Brian Ondiege, Malcolm Clarke, Glenford Mapp:
Exploring a New Security Framework for Remote Patient Monitoring Devices. Comput. 6(1): 11 (2017) - Andrea Silvagni:
3D NAND Flash Based on Planar Cells. Comput. 6(4): 28 (2017) - Alessandro S. Spinelli, Christian Monzio Compagnoni, Andrea L. Lacaita:
Reliability of NAND Flash Memories: Planar Cells and Emerging Issues in 3D Devices. Comput. 6(2): 16 (2017) - James Stallwood, Ashok Ranchhod:
The Right to Remember: Implementing a Rudimentary Emotive-Effect Layer for Frustration on AI Agent Gameplay Strategy. Comput. 6(2): 18 (2017) - Qingquan Sun, Ju Shen, Haiyan Qiao, Xin-Lin Huang, Chen Chen, Fei Hu:
Static Human Detection and Scenario Recognition via Wearable Thermal Sensing System. Comput. 6(1): 3 (2017) - Maryam Taherian, Mehrdad Maeen, Majid Haghparast:
Promoting the Quality Level of Signaling in Railway Transportation System Taking Advantage from Wireless Sensor Networks Technology. Comput. 6(3): 26 (2017) - Fasee Ullah, Abdul Hanan Abdullah, Omprakash Kaiwartya, Marina Md Arshad:
Traffic Priority-Aware Adaptive Slot Allocation for Medium Access Control Protocol in Wireless Body Area Network. Comput. 6(1): 9 (2017) - Patrizia Vizza, Giuseppe Tradigo, Domenico Mirarchi, Roberto Bruno Bossio, Pierangelo Veltri:
On the Use of Voice Signals for Studying Sclerosis Disease. Comput. 6(4): 30 (2017) - Tri Vu, Feng Lin, Nabil Alshurafa, Wenyao Xu:
Wearable Food Intake Monitoring Technologies: A Comprehensive Review. Comput. 6(1): 4 (2017)
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-01-09 13:59 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint