default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 23 matches
- 2018
- Chin-Chen Chang, Yi-Ping Chiu, Chia-Chen Lin, Yi-Hui Chen:
Distortion Free Progressive BTC based Secret Image Sharing. J. Netw. Intell. 3(3): 195-213 (2018) - Bao-Rong Chang, Hsiu Fen Tsai, Hsia-Chung Huang:
Implementation of Smart Mobile Point-of-Sale Cash Register System. J. Netw. Intell. 3(3): 170-188 (2018) - Chin-Ling Chen, Yung-Wen Tang:
On the Basis of Eye Tracker to Design A Remote Home Care Application System. J. Netw. Intell. 3(4): 247-258 (2018) - Baoxiang Du, Junhua Zhu, Qun Ding:
Optimization of multi-scale kernel chaotic time series prediction method based on the joint parameters were optimized with variable particle swarm. J. Netw. Intell. 3(4): 291-304 (2018) - Chunlei Fan, Qun Ding:
ARM-embedded Implementation of H.264 Selective Encryption Based on Chaotic Stream Cipher. J. Netw. Intell. 3(1): 9-15 (2018) - Chate Harold, Niquice Nelta:
Blind Images Quality Assessment of Distorted Screen Content Images. J. Netw. Intell. 3(2): 91-101 (2018) - Tzung-Pei Hong, Jimmy Ming-Tai Wu, Yan-Kang Li, Chun-Hao Chen:
Generalizing Concept-Drift Patterns for Fuzzy Association Rules. J. Netw. Intell. 3(2): 126-137 (2018) - Shangguan Hong, Anhong Wang, Xiong Zhang, Zhiguo Gui:
Low-Dose CT Image Processing Using Artifact Suppressed Total Generalized Variation. J. Netw. Intell. 3(1): 26-49 (2018) - Gwo-Jiun Horng, Tun-Yu Chang, Hsin-Te Wu:
The Adaptive Node-Selection Mechanism Scheme in Solar-Powered Wireless Sensor Networks. J. Netw. Intell. 3(1): 58-73 (2018) - Yung-Fa Huang, Chung-Hsin Hsu:
Energy Efficiency of Dynamically Distributed Clustering Routing for Naturally Scattering Wireless Sensor Networks. J. Netw. Intell. 3(1): 50-57 (2018) - Mao-Hsiung Hung, Qian Chen, Yi Chen:
A Review of Handling Continuous and Unknown Attribute Values of C4.5 Algorithm. J. Netw. Intell. 3(1): 1-8 (2018) - Chung-Ming Kuo, Nai-Chung Yang, Shen-Cha Tseng, Meng-Tso Chen:
A Novel Texture Descriptor for Texture Image Retrieving. J. Netw. Intell. 3(4): 278-290 (2018) - Chin-Feng Lee, Ya-Chen Li, Shu-Chuan Chu, John F. Roddick:
Data Hiding Scheme Based on A Flower-Shaped Reference Matrix. J. Netw. Intell. 3(2): 138-151 (2018) - Chin-Feng Lee, Yi-Jia Wang, Shu-Chuan Chu, John F. Roddick:
An Adaptive Content-Based Image Retrieval Method Exploiting an Affine Invariant Region Based on a VQ-applied Quadtree Robust to Geometric Distortions. J. Netw. Intell. 3(3): 214-234 (2018) - Chunyuan Liu, Qun Ding:
Complexity Analysis and Research based on the Chaotic System of Sample Entropy. J. Netw. Intell. 3(3): 162-169 (2018) - Trong-The Nguyen, Thi-Kien Dao, Jeng-Shyang Pan, Mong-Fong Horng, Chin-Shiuh Shieh:
An Improving Data Compression Capability in Sensor Node to Support SensorML-Compatible for Internet-of-Things. J. Netw. Intell. 3(2): 74-90 (2018) - Sung-Tung Shih, Lui Kam:
Multi-Fractal Texture Segmentation for Off-Road Robot Vision Application. J. Netw. Intell. 3(3): 189-194 (2018) - Pei-Feng Shiu, Chia-Chen Lin, Jinn-Ke Jan, Ya-Fen Chang:
A DCT-based Robust Watermarking Scheme Surviving JPEG Compression with Voting Strategy. J. Netw. Intell. 3(4): 259-277 (2018) - Yi-Jen Su, Hsin-Te Wu, Yue-Qun Chen, Wu-Chih Hu:
Using CCLM to Promote the Accuracy of Intelligent Sentiment Analysis Classifier for Chinese Social Media Service. J. Netw. Intell. 3(2): 113-125 (2018) - Yiru Sun, Weimin Zheng:
An Identity-Based Ring Signcryption Scheme in Ideal Lattice. J. Netw. Intell. 3(3): 152-161 (2018) - Yuanyun Wang, Jun Wang, Chengzhi Deng, Huasheng Zhu, Shengqian Wang:
L1-L2 Norms Based Target Representation for Visual Tracking. J. Netw. Intell. 3(2): 102-112 (2018) - Tsu-Yang Wu, Chien-Ming Chen, King-Hang Wang, Jeng-Shyang Pan, Weimin Zheng, Shu-Chuan Chu, John F. Roddick:
Security Analysis of Rhee et al.'s Public Encryption with Keyword Search Schemes: A Review. J. Netw. Intell. 3(1): 16-25 (2018) - Zhenfei Zhao, Hao Luo, Shu-Chuan Chu, Yongheng Shang, Xiaofeng Wu:
An Immersive Online Shopping System Based on Virtual Reality. J. Netw. Intell. 3(4): 235-246 (2018)
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-01-01 03:57 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint