default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 44 matches
- 2015
- Mishal Almazrooie, Azman Samsudin, Manmeet Mahinderjit Singh:
Improving the Diffusion of the Stream Cipher Salsa20 by Employing a Chaotic Logistic Map. J. Inf. Process. Syst. 11(2): 310 (2015) - Chaimae Anibou, Mohamed Nabil Saidi, Driss Aboutajdine:
Classification of Textured Images Based on Discrete Wavelet Transform and Information Fusion. J. Inf. Process. Syst. 11(3): 421-437 (2015) - Gran Badshah, Siau-Chuin Liew, Jasni Mohamad Zain, Mushtaq Ali:
Secured Telemedicine Using Whole Image as Watermark with Tamper Localization and Recovery Capabilities. J. Inf. Process. Syst. 11(4): 601-615 (2015) - Udayan Baruah, Shyamanta M. Hazarika:
A Dataset of Online Handwritten Assamese Characters. J. Inf. Process. Syst. 11(3): 325-341 (2015) - Souad Bekkouch, Kamel Mohamed Faraoun:
Robust and Reversible Image Watermarking Scheme Using Combined DCT-DWT-SVD Transforms. J. Inf. Process. Syst. 11(3): 406-420 (2015) - Nawel Bendimerad, Kechar Bouabdellah:
Rotational Wireless Video Sensor Networks with Obstacle Avoidance Capability for Improving Disaster Area Coverage. J. Inf. Process. Syst. 11(4): 509-527 (2015) - Meryem Benyoussef, Samira Mabtoul, Mohamed El Marraki, Driss Aboutajdine:
Robust ROI Watermarking Scheme Based on Visual Cryptography: Application on Mammograms. J. Inf. Process. Syst. 11(4): 495-508 (2015) - Nadia Boumkheld, Mounir Ghogho, Mohammed El Koutbi:
Energy Consumption Scheduling in a Smart Grid Including Renewable Energya Smart Grid Including Renewable Energy. J. Inf. Process. Syst. 11(1): 116-124 (2015) - Siwoo Byun, Seok-Woo Jang:
A Column-Aware Index Management Using Flash Memory for Read-Intensive Databases. J. Inf. Process. Syst. 11(3): 389-405 (2015) - Sang-Il Choi, Sanghun Lee, Seok Joo Koh, Sang-Kyu Lim, Insu Kim, Tae Gyu Kang:
Fast Device Discovery for Remote Device Management in Lighting Control Networks. J. Inf. Process. Syst. 11(1): 125-133 (2015) - Amine Dahane, Berrached Nasr-Eddine, Abdelhamid Loukil:
A Virtual Laboratory to Practice Mobile Wireless Sensor Networks: A Case Study on Energy Efficient and Safe Weighted Clustering Algorithm. J. Inf. Process. Syst. 11(2): 205-228 (2015) - Majdi Dammak, Ali Wali, Adel M. Alimi:
Viewer's Affective Feedback for Video Summarization. J. Inf. Process. Syst. 11(1): 76-94 (2015) - Maheshi B. Dissanayake, Dilanga L. B. Abeyrathna:
Performance Comparison of HEVC and H.264/AVC Standards in Broadcasting Environments. J. Inf. Process. Syst. 11(3): 483 (2015) - Khac Phong Do, Ba Tung Nguyen, Xuan Thanh Nguyen, Quang Hung Bui, Tran Nguyen Le, Thi Nhat Thanh Nguyen, Van Quynh Vuong, Huy Lai Nguyen, Thanh Ha Lê:
Spatial Interpolation and Assimilation Methods for Satellite and Ground Meteorological Data in Vietnam. J. Inf. Process. Syst. 11(4): 556-572 (2015) - Aly Mohamed El-Semary, Mohamed Mostafa Abdel-Azim:
Counter Chain: A New Block Cipher Mode of Operation. J. Inf. Process. Syst. 11(2): 266-279 (2015) - Yongbin Gao, Hyo Jong Lee:
Viewpoint Unconstrained Face Recognition Based on Affine Local Descriptors and Probabilistic Similarity. J. Inf. Process. Syst. 11(4): 643 (2015) - Govind P. Gupta, Manoj Misra, Kumkum Garg:
An Energy Efficient Distributed Approach-Based Agent Migration Scheme for Data Aggregation in Wireless Sensor Networks. J. Inf. Process. Syst. 11(1): 148 (2015) - Bong-Joo Jang, Suk Hwan Lee, Sanghun Lim, Ki-Ryong Kwon:
Biological Infectious Watermarking Model for Video Copyright Protection. J. Inf. Process. Syst. 11(2): 280-294 (2015) - Young-Ae Jeon, Sangsung Choi, Dae-Young Kim, Kwang-il Hwang:
An Adaptive Superframe Duration Allocation Algorithm for Resource-Efficient Beacon Scheduling. J. Inf. Process. Syst. 11(2): 295-309 (2015) - Haejae Jung:
A Memory Efficient Anti-Collision Protocol to Identify Memoryless RFID Tags. J. Inf. Process. Syst. 11(1): 95-103 (2015) - Hyun-Syug Kang:
A Real-Time Integrated Hierarchical Temporal Memory Network for the Real-Time Continuous Multi-Interval Prediction of Data Streams. J. Inf. Process. Syst. 11(1): 39-56 (2015) - Seung-Shik Kang:
Word Similarity Calculation by Using the Edit Distance Metrics with Consonant Normalization. J. Inf. Process. Syst. 11(4): 573-582 (2015) - Jinsuk Kim, Dong-Hoon Yoo, Heejin Jang, Kimoon Jeong:
WebSHArk 1.0: A Benchmark Collection for Malicious Web Shell Detection. J. Inf. Process. Syst. 11(2): 229-238 (2015) - Danielle H. Lee:
Personalizing Information Using Users' Online Social Networks: A Case Study of CiteULike. J. Inf. Process. Syst. 11(1): 1-21 (2015) - Hyoung-Gyu Lee, So-Young Park, Hae-Chang Rim, Do-Gil Lee, Hong-Woo Chun:
A Maximum Entropy-Based Bio-Molecular Event Extraction Model that Considers Event Generation. J. Inf. Process. Syst. 11(2): 248-265 (2015) - Chang Liu, Sang-Hwa Chung, Han-You Jeong, Ik-Joo Jung:
An Enhanced Message Priority Mechanism in IEEE 802.11p Based Vehicular Networks. J. Inf. Process. Syst. 11(3): 465-482 (2015) - Nandini Malhotra, Geeta Nagpal:
Genetic Symmetric Key Generation for IDEA. J. Inf. Process. Syst. 11(2): 239-247 (2015) - Fatemeh Momenipour Moghadam, Mohammad Reza Keyvanpour:
Comparative Study of Various Persian Stemmers in the Field of Information Retrieval. J. Inf. Process. Syst. 11(3): 450-464 (2015) - Manar Mohaisen:
A Review of Fixed-Complexity Vector Perturbation for MU-MIMO. J. Inf. Process. Syst. 11(3): 354-369 (2015) - Tam Nguyen, Gueesang Lee:
A Lightweight and Effective Music Score Recognition on Mobile Phones. J. Inf. Process. Syst. 11(3): 438-449 (2015)
skipping 14 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-01-03 02:47 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint