Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 20 matches
- 2022
- Farhana Ajaz, Mohd Naseem, Sparsh Sharma, Gaurav Dhiman, Mohammad Shabaz, S. Vimal:
Architecture and routing protocols for internet of vehicles: a review. Int. J. Ad Hoc Ubiquitous Comput. 40(1/2/3): 159-175 (2022) - S. Amudha, M. Murali:
F-CHILS maps - a novel encryption scheme for secured medical data transmission using FoG-ban environment. Int. J. Ad Hoc Ubiquitous Comput. 40(1/2/3): 67-79 (2022) - Purshottam J. Assudani, P. Balakrishnan:
A novel bio-inspired approach for VM load balancing and efficient resource management in cloud. Int. J. Ad Hoc Ubiquitous Comput. 40(1/2/3): 214-224 (2022) - Erukala Suresh Babu, Mekala Srinivasa Rao, Naganjaneyulu Satuluri, M. Srinivasa Sesha Sai, Rajendra Kumar Ganiya:
Secure exchange and effectual verification of educational academic records using hyperledger fabric block chain system. Int. J. Ad Hoc Ubiquitous Comput. 40(1/2/3): 194-213 (2022) - Suneetha Bulla, Bobba Basaveswararao, Gangadhara Rao Kancherla, K. Chandan, Sirisati Ranga Swamy:
A secure new HRF mechanism for mitigate EDoS attacks. Int. J. Ad Hoc Ubiquitous Comput. 40(1/2/3): 20-29 (2022) - Sateesh Kumar Reddy Chirasani, Suchetha Manikandan:
An optimised machine learning algorithm for classification of epileptic seizures using EMD-based dynamic features of EEG. Int. J. Ad Hoc Ubiquitous Comput. 40(1/2/3): 127-138 (2022) - Rajendra Kumar Ganiya, Duggineni Veeraiah, Suneetha Bulla, J. Nageswara Rao, G. J. Sunny Deol:
Efficiency evaluation of HRF mechanism on EDoS attacks in cloud computing services. Int. J. Ad Hoc Ubiquitous Comput. 40(1/2/3): 225-238 (2022) - D. N. V. S. L. S. Indira, R. Abinaya, Suresh Babu Chandanapalli, Ramesh Vatambeti:
Secured personal health records using pattern-based verification and two-way polynomial protocol in cloud infrastructure. Int. J. Ad Hoc Ubiquitous Comput. 40(1/2/3): 139-147 (2022) - J. N. V. R. Swarup Kumar, D. Suresh:
Design and implementation of a mobility support adaptive trickle algorithm for RPL in vehicular IoT networks. Int. J. Ad Hoc Ubiquitous Comput. 40(1/2/3): 38-49 (2022) - Mohana Sundaram Kuppusamy, D. Nageswari, J. Prakash:
Cuckoo search assisted fuzzy logic algorithm for smart WSN routing system. Int. J. Ad Hoc Ubiquitous Comput. 40(1/2/3): 106-115 (2022) - B. Madhuravani, D. S. R. Murthy, S. Viswanadha Raju:
A dynamic preserving-based WSN framework for medical disease prediction. Int. J. Ad Hoc Ubiquitous Comput. 40(1/2/3): 10-19 (2022) - M. Nagageetha, N. V. K. Ramesh:
A feature ranking-based deep learning secure framework for multi-class leaf disease detection. Int. J. Ad Hoc Ubiquitous Comput. 40(1/2/3): 80-93 (2022) - Ravi Prakash, Shashank Pushkar:
An approach using heuristic pheromones-based ACO modelling for green vehicle routing optimisation. Int. J. Ad Hoc Ubiquitous Comput. 40(1/2/3): 187-193 (2022) - J. Premalatha, Iwin Thanakumar Joseph Swamidason, Pon Harshavardhanan, S. P. Anandaraj, V. Jeyakrishnan:
Analytical review on secure communication protocols for 5G and IoT networks. Int. J. Ad Hoc Ubiquitous Comput. 40(1/2/3): 50-66 (2022) - C. V. Subhaskar Reddy, M. V. Subramanyam, P. Ramana Reddy:
Improving QOS in flow controlled CR-ad hoc network with multi criteria routing assisted with cooperative caching and information redundancy. Int. J. Ad Hoc Ubiquitous Comput. 40(1/2/3): 30-37 (2022) - N. Sivaranjani, Jayaraj Jayabharathy:
Forecasting the decision making process of Supreme Court using hierarchical convolutional neural network. Int. J. Ad Hoc Ubiquitous Comput. 40(1/2/3): 116-126 (2022) - V. Devi Satya Sri, Srikanth Vemuru:
A filter-based machine learning classification framework for cloud-based medical databases. Int. J. Ad Hoc Ubiquitous Comput. 40(1/2/3): 94-105 (2022) - Venkata Nagaraju Thatha, A. Sudhir Babu, D. Haritha:
Privacy-preserving smart contracts for fuzzy WordNet-based document representation and clustering using regularised K-means method. Int. J. Ad Hoc Ubiquitous Comput. 40(1/2/3): 2-9 (2022) - Thotakura Veeranna, Kiran Kumar Reddy:
Sliding window assisted mutual redundancy-based feature selection for intrusion detection system. Int. J. Ad Hoc Ubiquitous Comput. 40(1/2/3): 176-186 (2022) - M. S. Vinmathi, M. S. Josephine, V. Jeyabalaraja:
An energy and delay aware routing protocol for wireless sensor network assisted IoT to maximise network lifetime. Int. J. Ad Hoc Ubiquitous Comput. 40(1/2/3): 148-158 (2022)
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-12 09:47 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint