default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 101 matches
- 2008
- Sufyan Ababneh, Rashid Ansari, Ashfaq A. Khokhar:
Scalable multimedia-content integrity verification with robust hashing. EIT 2008: 263-266 - Sufyan Ababneh, Ashfaq A. Khokhar, Rashid Ansari:
A multimedia-content authentication and recovery protocol in peer-to-peer networks. EIT 2008: 90-95 - Olatunde O. Abiona, Tricha Anjali, Lawrence O. Kehinde:
Simulation of a cyclic multicast proxy server. EIT 2008: 102-107 - Olatunde O. Abiona, Tricha Anjali, Clement E. Onime, Lawrence O. Kehinde:
Proxy server experiment and the changing nature of the web. EIT 2008: 242-245 - Ankit Agrawal, Xiaoqiu Huang:
DNAlignTT: Pairwise DNA alignment with sequence specific transition-transversion ratio. EIT 2008: 453-455 - Ankit Agrawal, S. K. Khaitan:
A new heuristic for multiple sequence alignment. EIT 2008: 215-217 - Ankit Agrawal, Ankush Mittal, Rahul Jain, Raghav Takkar:
An adaptive fuzzy thresholding algorithm for exon prediction. EIT 2008: 211-214 - Mahmood Al-khassaweneh, Selin Aviyente:
Image encryption scheme based on using least square approximation techniques. EIT 2008: 108-111 - N. Alaraje, Guy Hembroff:
Impact of NoFPGA IP router architecture on link bandwidth. EIT 2008: 254-257 - Karl Altenburg, Karthik Namasivayam:
A multiagent multicellular systems biology model of Trichoplax adhaerens. EIT 2008: 456-460 - Tarik Aouam, Zuwei Yu:
Multistage stochastic hydrothermal scheduling. EIT 2008: 66-71 - Redge Bartholomew:
Globally distributed software development using an immersive virtual environment. EIT 2008: 355-360 - Ali M. Bazzi, Dima A. Fares:
GIS-based wind farm site selection in Lebanon. EIT 2008: 201-204 - Ali M. Bazzi, Sami H. Karaki:
Simulation of a new maximum power point tracking technique for multiple photovoltaic arrays. EIT 2008: 175-178 - Kito Berg-Taylor, Keehong Seo, Soon-Jo Chung:
Development of a car-like online navigation testbed. EIT 2008: 337-342 - Tamkeen M. Bhatti:
Designing a 5th order median filter with systolic array implementation. EIT 2008: 179-182 - Tamkeen M. Bhatti, F. A. Bhatti:
Charged based MOS transistor modeling in weak inversion. EIT 2008: 294-299 - Matt Bone, Peter F. Nabicht, Konstantin Läufer, George K. Thiruvathukal:
Taming XML: Objects first, then markup. EIT 2008: 488-493 - Haibo Cao, Robert J. Weber:
Vapor HF sacrificial etching for phosphorus doped polycrystalline silicon membrane structures. EIT 2008: 289-293 - Koray Çelik, Soon-Jo Chung, Arun K. Somani:
Mono-vision corner SLAM for indoor navigation. EIT 2008: 343-348 - Baozhen Chen, Chengwu Tao, Sumarlin William, Santosh Pandey:
Biochemical sensing of charged polyelectrolytes with a novel CMOS floating-gate device architecture. EIT 2008: 300-303 - Paul Vincent Craven:
Architecture of an ATCS network simulator. EIT 2008: 310-315 - Donald Ephraim Curtis, Teodor Rus, Jan H. Jensen:
Application driven software for chemistry. EIT 2008: 361-366 - Hossein Daneshi, Azim Lotfjou Choobbari, Mohammad Shahidehpour, Zuyi Li:
Mixed integer programming method to solve security constrained unit commitment with restricted operating zone limits. EIT 2008: 187-192 - Hossein Daneshi, Mohammad Shahidehpour, Azim Lotfjou Choobbari:
Long-term load forecasting in electricity market. EIT 2008: 395-400 - Abdunnaser Diaf, Nasser Noroozi:
Some practical issues on implementing distributed multi-agent reasoning systems. EIT 2008: 30-36 - R. Gary Diaz:
An application of networked embedded computer systems to provide distributed decision making for intelligent logistics. EIT 2008: 37-40 - Amit Diwadkar, Umesh Vaidya, Arvind U. Raghunathan:
Lyapunov measure and control of periodic orbit. EIT 2008: 48-53 - Shady M. Elashhab, Mohamed A. Zohdy:
PEM fuel cell system identification and model order reduction for Hinfin; loop shaping controller design. EIT 2008: 60-65 - Taisir Eldos, Rasha Omari:
A unified backward approach to the code book design problem. EIT 2008: 425-430
skipping 71 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-12-21 10:56 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint