


default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 61 matches
- 2009
- Atefeh Ahmadi, Reza Berangi:
Automatic Location Update using IPV6 Addressing Format for Next Generation Network. J. Convergence Inf. Technol. 4(2): 132-137 (2009) - Hosein Alizadeh, Behrouz Minaei-Bidgoli, Saeed K. Amirgholipour:
A New Method for Improving the Performance of K Nearest Neighbor using Clustering Technique. J. Convergence Inf. Technol. 4(2): 84-92 (2009) - Hanan Ahmed Hosni Mahmoud Abd Alla, Lilac A. E. Al-Safadi:
A Multi Join Algorithm Utilizing Double Indices. J. Convergence Inf. Technol. 4(4): 55-60 (2009) - Marcelo de Carvalho Alves, Fabio Moreira da Silva, Tomas de Aquino Ferreira, Flavio Castro Silva:
Neuro-fuzzy operational performance of a coffee harvester machine. J. Convergence Inf. Technol. 4(2): 52-59 (2009) - E. A. Mary Anita, V. Vasudevan:
Black Hole Attack on Multicast Routing Protocols. J. Convergence Inf. Technol. 4(2): 64-68 (2009) - Hasina Attaullah, Muhammad Younus Javed:
QoS based Vertical handover between UMTS, WiFi and WiMAX Networks. J. Convergence Inf. Technol. 4(3): 59-64 (2009) - Marjan Bahrololum, Elham Salahi, Mahmoud Khaleghi:
An Improved Intrusion Detection Technique based on two Strategies Using Decision Tree and Neural Network. J. Convergence Inf. Technol. 4(4): 96-101 (2009) - Zdenek Becvar:
Efficiency of Handover Prediction Based on Handover History. J. Convergence Inf. Technol. 4(4): 41-47 (2009) - Siwoo Byun:
Enhanced Index Management for Accelerating Hybrid Storage Systems. J. Convergence Inf. Technol. 4(2): 164-169 (2009) - Lin Chen, Zongfang Zhou:
A Measure on Joint Default Risk Based Credit Rating Information and Combinatorial Copula Function. J. Convergence Inf. Technol. 4(1): 39-46 (2009) - Ming-Tao Chou:
The Logarithm Function with a Fuzzy Time Series. J. Convergence Inf. Technol. 4(1): 47-51 (2009) - Ruma Dutta, Indranil Ghosh, Anirban Kundu, Debajyoti Mukhopadhyay:
An Advanced Partitioning Approach of Web Page Clustering utilizing Content & Link Structure. J. Convergence Inf. Technol. 4(3): 65-71 (2009) - Ruma Dutta, Anirban Kundu, Rana Dattagupta, Debajyoti Mukhopadhyay:
An Approach to Web Page Prediction Using Markov Model and Web Page Ranking. J. Convergence Inf. Technol. 4(4): 61-67 (2009) - Saeedreza Ehteram, Alborz Rezazadeh Sereshkeh, Seyed Zeinolabedin Moussavi, Ali Sadr, Ali Akbar Jalali:
Utilizing a Pattern Recognition Controller and Linear Discriminate Analysis for MFL Defect Detection. J. Convergence Inf. Technol. 4(1): 11-19 (2009) - Reza Entezari-Maleki, Arash Rezaei, Behrouz Minaei-Bidgoli:
Comparison of Classification Methods Based on the Type of Attributes and Sample Size. J. Convergence Inf. Technol. 4(3): 94-102 (2009) - S. N. Geethalakshmi:
Impact of non-technical components on Success and Failure of Software Development. J. Convergence Inf. Technol. 4(1): 33-38 (2009) - Jin-Kyoung Heo:
Distributed Object Activation for Web Application Encipherment Key. J. Convergence Inf. Technol. 4(1): 58-62 (2009) - Wann-Jyi Horng, Jih-Ming Chyan:
A DCC Analysis of Two Stock Market Returns Volatility with an Oil Price Factor: An Evidence Study of Singapore and Thailand's Stock Markets. J. Convergence Inf. Technol. 4(1): 63-69 (2009) - Wann-Jyi Horng, Chi-Ming Kuan:
A DCC Analysis of Two Exchange Rate Market Returns Volatility with an Japan Dollars Factor: Study of Taiwan and Korea Exchange Rate Markets. J. Convergence Inf. Technol. 4(4): 7-13 (2009) - Guo-Sheng Hu, Feng-Feng Zhu, Guo-Hong Zhang:
Transportation Reliability Based Distribution Center Decision. J. Convergence Inf. Technol. 4(1): 52-57 (2009) - YunYoung Hur, Jeonghye Han:
Analysis on Children's Tolerance to Weak Recognition of Storytelling Robots. J. Convergence Inf. Technol. 4(3): 103-109 (2009) - Md. Imdadul Islam, M. Ruhul Amin:
Determination of Save Operating Border of Asynchronous Data Traffic Based on MMPP. J. Convergence Inf. Technol. 4(4): 31-35 (2009) - Kim Yong Jae:
A Study on The Global Standards Of The E-Trade Process on The Basis ebXML & Web Services. J. Convergence Inf. Technol. 4(4): 102-110 (2009) - S. Janakiraman, V. Vasudevan:
An Intelligent Distributed Intrusion Detection System using Genetic Algorithm. J. Convergence Inf. Technol. 4(1): 70-76 (2009) - A. N. M. Rezaul Karim, Md. Golam Rabiul Alam:
Dynamic Threshold for Morphological Change Detection Algorithm. J. Convergence Inf. Technol. 4(3): 53-58 (2009) - Mithun Karmakar, Dhruba K. Bhattacharyya:
Privacy Preserving Data Mining Using Matrix Algebraic Approach. J. Convergence Inf. Technol. 4(3): 38-44 (2009) - Sung Wan Kim:
Improved Processing of Path Query on RDF Data Using Suffix Array. J. Convergence Inf. Technol. 4(3): 45-52 (2009) - Pyung-Soo Kim, Jeong-Hun Choi:
A New Mechanism for Available Bandwidth Estimation. J. Convergence Inf. Technol. 4(3): 72-76 (2009) - Hyoung Do Kim, Ju-Han Kim:
DNA Data Compression Based on the Whole Genome Sequence. J. Convergence Inf. Technol. 4(3): 82-85 (2009) - Hoon Ko, Carlos Filipe Freitas, Goreti Marreiros, Carlos Ramos:
A Study on Users Authentication Method for Safety Group Decision System in Dynamic Small Group. J. Convergence Inf. Technol. 4(4): 68-76 (2009)
skipping 31 more matches
loading more results
failed to load more results, please try again later

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-03-13 04:05 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint