|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 709 occurrences of 525 keywords
|
|
|
Results
Found 2929 publication records. Showing 2899 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
123 | Inyoung Shin, Ngoc Duy Pham, Hyunseung Choo |
Virtual Convex Polygon Based Hole Boundary Detection and Time Delay Based Hole Detour Scheme in WSNs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (8) ![In: Human Interface and the Management of Information. Designing Information Environments, Symposium on Human Interface 2009, Held as Part of HCI International 2009, San Diego, CA, USA, July 19-24, 2009, Procceedings, Part I, pp. 619-627, 2009, Springer, 978-3-642-02555-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Hole Problem, Wireless Sensor Networks (WSNs), Geographic Routing |
122 | Nicola Santoro |
Close Encounters with a Black Hole or Explorations and Gatherings in Dangerous Graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FUN ![In: Fun with Algorithms, 4th International Conference, FUN 2007, Castiglioncello, Italy, June 3-5, 2007, Proceedings, pp. 14, 2007, Springer, 978-3-540-72913-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Harmful Host, Anonymous Agents, Robots, Mobile Agents, Asynchronous, Exploration, Tokens, Rendezvous, Anonymous Networks, Whiteboards, Gathering |
97 | Marcin Janaszewski, Michel Couprie, Laurent Babout |
Geometric Approach to Hole Segmentation and Hole Closing in 3D Volumetric Objects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIARP ![In: Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, 14th Iberoamerican Conference on Pattern Recognition, CIARP 2009, Guadalajara, Jalisco, Mexico, November 15-18, 2009. Proceedings, pp. 255-262, 2009, Springer, 978-3-642-10267-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
95 | Fucai Yu, Soochang Park, Ye Tian, Minsuk Jin, Sang-Ha Kim 0001 |
Efficient Hole Detour Scheme for Geographic Routing in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VTC Spring ![In: Proceedings of the 67th IEEE Vehicular Technology Conference, VTC Spring 2008, 11-14 May 2008, Singapore, pp. 153-157, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
92 | Ye Tian, Fucai Yu, Younghwan Choi, Soochang Park, Euisin Lee, Min-Sook Jin, Sang-Ha Kim 0001 |
Energy-Efficient Data Dissemination Protocol for Detouring Routing Holes in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: Proceedings of IEEE International Conference on Communications, ICC 2008, Beijing, China, 19-23 May 2008, pp. 2322-2326, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
84 | Hesiri Weerasinghe, Huirong Fu |
Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FGCN (2) ![In: Future Generation Communication and Networking, FGCN 2007, Ramada Plaza Jeju, Jeju-Island, Korea, December 6-8, 2007, Proceedings, pp. 362-367, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Cooperative Black Hole attack, MANET, AODV |
84 | Jurek Czyzowicz, Dariusz R. Kowalski, Euripides Markou, Andrzej Pelc |
Searching for a Black Hole in Tree Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OPODIS ![In: Principles of Distributed Systems, 8th International Conference, OPODIS 2004, Grenoble, France, December 15-17, 2004, Revised Selected Papers, pp. 67-80, 2004, Springer, 3-540-27324-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
algorithm, mobile agent, tree, black hole |
76 | Junyu Dong, Sha Ma, Li Li, Zhongda Yu |
Hole Filling on Three-Dimensional Surface Texture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICME ![In: Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, ICME 2007, July 2-5, 2007, Beijing, China, pp. 1299-1302, 2007, IEEE Computer Society, 1-4244-1017-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
75 | Fucai Yu, Euisin Lee, Younghwan Choi, Soochang Park, Donghun Lee, Ye Tian, Sang-Ha Kim 0001 |
A modeling for hole problem in wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: Proceedings of the International Conference on Wireless Communications and Mobile Computing, IWCMC 2007, Honolulu, Hawaii, USA, August 12-16, 2007, pp. 370-375, 2007, ACM, 978-1-59593-695-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
hole problem, wireless sensor network, geographic forwarding |
75 | Stefan Dobrev, Nicola Santoro, Wei Shi 0001 |
Locating a Black Hole in an Un-oriented Ring Using Tokens: The Case of Scattered Agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Euro-Par ![In: Euro-Par 2007, Parallel Processing, 13th International Euro-Par Conference, Rennes, France, August 28-31, 2007, Proceedings, pp. 608-617, 2007, Springer, 978-3-540-74465-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Un-oriented, Mobile Agent, Anonymous, Asynchronous, Ring, Token, Scattered, Black Hole |
75 | Jian Yin 0006, Sanjay Kumar Madria |
A Hierarchical Secure Routing Protocol against Black Hole Attacks in Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SUTC (1) ![In: IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC 2006), 5-7 June 2006, Taichung, Taiwan, pp. 376-383, 2006, IEEE Computer Society, 0-7695-2553-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Black hole attack, Sensor networks |
75 | Ralf Klasing, Euripides Markou, Tomasz Radzik, Fabiano Sarracco |
Approximation Bounds for Black Hole Search Problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OPODIS ![In: Principles of Distributed Systems, 9th International Conference, OPODIS 2005, Pisa, Italy, December 12-14, 2005, Revised Selected Papers, pp. 261-274, 2005, Springer, 3-540-36321-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
black hole search, approximation algorithm, mobile agent, inapproximability, graph exploration |
75 | Ralf Klasing, Euripides Markou, Tomasz Radzik, Fabiano Sarracco |
Hardness and Approximation Results for Black Hole Search in Arbitrary Graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIROCCO ![In: Structural Information and Communication Complexity, 12th International Colloquium, SIROCCO 2005, Mont Saint-Michel, France, May 24-26, 2005, Proceedings, pp. 200-215, 2005, Springer, 3-540-26052-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
black hole search, approximation algorithm, mobile agent, NP-hardness, graph exploration |
66 | Chih-Yung Chang, Wei-Cheng Chu, Chih-Yu Lin, Chien-Fu Cheng |
Energy-balanced hole-movement mechanism for temporal full-coverage in mobile WSNs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, IWCMC 2010, Caen, France, June 28 - July 2, 2010, pp. 89-93, 2010, ACM, 978-1-4503-0062-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
wireless sensor networks, coverage, mobile sensor, hole |
66 | Akiyo Nadamoto, Eiji Aramaki, Takeshi Abekawa, Yohei Murakami |
Content hole search in community-type content. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 18th International Conference on World Wide Web, WWW 2009, Madrid, Spain, April 20-24, 2009, pp. 1223-1224, 2009, ACM, 978-1-60558-487-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
content hole search, community, blog, SNS |
66 | Chang-Wu Yu 0001, Tung-Kuang Wu, Rei-Heng Cheng, Shun Chao Chang |
A Distributed and Cooperative Black Hole Node Detection and Elimination Mechanism for Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAKDD Workshops ![In: Emerging Technologies in Knowledge Discovery and Data Mining, PAKDD 2007, International Workshops, Nanjing, China, May 22-25, 2007, Revised Selected Papers, pp. 538-549, 2007, Springer, 978-3-540-77016-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Security, Ad Hoc Networks, Wireless Networks, Black Hole |
58 | John William Branch, Flavio Prieto, Pierre Boulanger |
A Hole-Filling Algorithm for Triangular Meshes Using Local Radial Basis Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMR ![In: Proceedings of the 15th International Meshing Roundtable, Birmingham, Alabama, USA, September 17-20, 2006, Proceedings, pp. 411-431, 2006, Springer, 978-3-540-34957-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
58 | John William Branch, Flavio Prieto, Pierre Boulanger |
Automatic Hole-Filling of Triangular Meshes Using Local Radial Basis Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
3DPVT ![In: 3rd International Symposium on 3D Data Processing, Visualization and Transmission (3DPVT 2006), 14-16 June 2006, Chapel Hill, North Carolina, USA, pp. 727-734, 2006, IEEE Computer Society, 978-0-7695-2825-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
58 | Stefan Dobrev, Paola Flocchini, Nicola Santoro |
Improved Bounds for Optimal Black Hole Search with a Network Map. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIROCCO ![In: Structural Information and Communication Complexity, 11th International Colloquium , SIROCCO 2004, Smolenice Castle, Slovakia, June 21-23, 2004, Proceedings, pp. 111-122, 2004, Springer, 3-540-22230-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
56 | Wei Shi 0001 |
Black Hole Search with Tokens in Interconnected Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSS ![In: Stabilization, Safety, and Security of Distributed Systems, 11th International Symposium, SSS 2009, Lyon, France, November 3-6, 2009. Proceedings, pp. 670-682, 2009, Springer, 978-3-642-05117-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Un-oriented, Mobile Agent, Ring, Token, Scattered, Black Hole |
56 | Wei Zhao, Shuming Gao, Hongwei Lin |
A robust hole-filling algorithm for triangular mesh. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Vis. Comput. ![In: Vis. Comput. 23(12), pp. 987-997, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Poisson equation, Triangular mesh, Hole-filling, Harmonic Function |
56 | K. Murugesan, P. Elango |
CNN Based Hole Filler Template Design Using Numerical Integration Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICANN (1) ![In: Artificial Neural Networks - ICANN 2007, 17th International Conference, Porto, Portugal, September 9-13, 2007, Proceedings, Part I, pp. 490-500, 2007, Springer, 978-3-540-74689-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Hole-filler template, Numerical Integration algorithms, Euler method, Modified-Euler method, RK-method, Cellular neural network |
56 | Stefan Dobrev, Paola Flocchini, Giuseppe Prencipe, Nicola Santoro |
Searching for a black hole in arbitrary networks: optimal mobile agents protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Distributed Comput. ![In: Distributed Comput. 19(1), pp. 1-35, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Topological knowledge, Mobile agents, Distributed search, Black hole, Malicious host |
56 | Sameer Singh 0002, Markos Markou |
A black hole novelty detector for video analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pattern Anal. Appl. ![In: Pattern Anal. Appl. 8(1-2), pp. 102-114, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Neural networks, Video analysis, Novelty detection, Object classification, Black hole |
56 | Bertram J. Unger, A. Nicolaidis, Peter J. Berkelman, A. Thompson, Susan J. Lederman, Roberta L. Klatzky, Ralph L. Hollis |
Virtual Peg-in-Hole Performance Using a 6-DOF Magnetic Levitation Haptic Device: Comparison with Real Forces and with Visual Guidance Alone. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Symposium on Haptic Interfaces for Virtual Environment and Teleoperator Systems ![In: 10th Symposium on Haptic Interfaces for Virtual Environment and Teleoperator Systems, HAPTICS 2002, Orlando, Florida, USA, March 24-25, 2002, Proceedings, pp. 263-270, 2002, IEEE Computer Society, 0-7695-1489-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
peg-in-hole, virtual reality, haptics, force feedback, task analysis |
56 | Subbiah Baskaran, Narayanan Ramachandran, David Noever |
Probabilistic and Other Neural Nets in Multi-Hole Probe Calibration and Flow Angularity Pattern Recognition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pattern Anal. Appl. ![In: Pattern Anal. Appl. 2(1), pp. 92-98, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Calibration wind tunnel, Multi-hole probes, Probabilistic neural nets, Numerical simulation, Fluid dynamics |
55 | M. F. Hole, Kjell Jørgen Hole |
Low-complexity decoding of partial unit memory codes on precoded partial-response channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Theory ![In: IEEE Trans. Inf. Theory 43(3), pp. 1052-1058, 1997. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
55 | M. F. Hole, Kjell Jørgen Hole |
Tight bounds on the minimum average weight per branch for rate (N-1)/N convolutional codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Theory ![In: IEEE Trans. Inf. Theory 43(4), pp. 1301-1305, 1997. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
55 | Fucai Yu, Younghwan Choi, Soochang Park, Euisin Lee, Ye Tian, Sang-Ha Kim 0001 |
Virtual Circle Based Geometric Modeling of Holes for Geographic Routing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNC ![In: WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008 - April 3 2008, Las Vegas, Nevada, USA, Conference Proceedings, pp. 2426-2431, 2008, IEEE, 978-1-4244-1997-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
52 | Kostas Daniilidis, Reinhard Klette, Ales Leonardis (eds.) |
Imaging Beyond the Pin-hole Camera. 12th Seminar on Theoretical Foundations of Computer Vision, 13.06. - 18.06.2004 ![Search on Bibsonomy](Pics/bibsonomy.png) |
Imaging Beyond the Pin-hole Camera. 12th Seminar on Theoretical Foundations of Computer Vision ![Internationales Begegnungs- und Forschungszentrum für Informatik (IBFI), Schloss Dagstuhl, Germany The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
52 | Ralf Reulke, Aloysius Wehr, Denis Griesbach |
Mobile Panoramic Mapping using CCD-Line Camera and Laser Scanner. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Imaging Beyond the Pin-hole Camera. 12th Seminar on Theoretical Foundations of Computer Vision ![In: Imaging Beyond the Pin-hole Camera. 12th Seminar on Theoretical Foundations of Computer Vision, 13.06. - 18.06.2004, 2004, Internationales Begegnungs- und Forschungszentrum für Informatik (IBFI), Schloss Dagstuhl, Germany. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
52 | Kostas Daniilidis, Reinhard Klette, Ales Leonardis |
04251 - Imaging Beyond the Pinhole Camera. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Imaging Beyond the Pin-hole Camera. 12th Seminar on Theoretical Foundations of Computer Vision ![In: Imaging Beyond the Pin-hole Camera. 12th Seminar on Theoretical Foundations of Computer Vision, 13.06. - 18.06.2004, 2004, Internationales Begegnungs- und Forschungszentrum für Informatik (IBFI), Schloss Dagstuhl, Germany. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
51 | E. L. Lohse |
Hollerith punched card code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Commun. ACM ![In: Commun. ACM 11(4), pp. 275-281, 1968. The full citation details ...](Pics/full.jpeg) |
1968 |
DBLP DOI BibTeX RDF |
USA standard, card code, hole-patterns, hole-patterns assignment, punched card hole, punched card systems, punched code |
49 | Huawei Miao, Chia-Ching Ooi, Xiaowen Wu, Christian Schindelhauer |
Coverage-hole trap model in target tracking using distributed relay-robot network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), Sierre, Switzerland, March 22-26, 2010, pp. 1299-1304, 2010, ACM, 978-1-60558-639-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
49 | Stefan Dobrev, Paola Flocchini, Giuseppe Prencipe, Nicola Santoro |
Mobile Search for a Black Hole in an Anonymous Ring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Algorithmica ![In: Algorithmica 48(1), pp. 67-90, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
49 | Stefan Dobrev, Nicola Santoro, Wei Shi 0001 |
Scattered Black Hole Search in an Oriented Ring using Tokens. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 21th International Parallel and Distributed Processing Symposium (IPDPS 2007), Proceedings, 26-30 March 2007, Long Beach, California, USA, pp. 1-8, 2007, IEEE. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
49 | Max J. Egenhofer, Maria Vasardani |
Spatial Reasoning with a Hole. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COSIT ![In: Spatial Information Theory, 8th International Conference, COSIT 2007, Melbourne, Australia, September 19-23, 2007, Proceedings, pp. 303-320, 2007, Springer, 978-3-540-74786-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
49 | Amir Averbuch, G. Gelles, Alon Schclar |
Fast Hole-Filling in Images Via Fast Comparison of Incomplete Patches. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MRCS ![In: Multimedia Content Representation, Classification and Security, International Workshop, MRCS 2006, Istanbul, Turkey, September 11-13, 2006, Proceedings, pp. 738-744, 2006, Springer, 3-540-39392-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
49 | Stefan Dobrev, Paola Flocchini, Rastislav Kralovic, Nicola Santoro |
Exploring an Unknown Graph to Locate a Black Hole Using Tokens. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IFIP TCS ![In: Fourth IFIP International Conference on Theoretical Computer Science (TCS 2006), IFIP 19th World Computer Congress, TC-1 Foundations of Computer Science, August 23-24, 2006, Santiago, Chile, pp. 131-150, 2006, Springer, 0-387-34633-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
49 | Stefan Dobrev, Paola Flocchini, Giuseppe Prencipe, Nicola Santoro |
Mobile Search for a Black Hole in an Anonymous Ring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DISC ![In: Distributed Computing, 15th International Conference, DISC 2001, Lisbon, Portugal, October 3-5, 2001, Proceedings, pp. 166-179, 2001, Springer, 3-540-42605-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
47 | Akiyo Nadamoto, Eiji Aramaki, Takeshi Abekawa, Yohei Murakami |
Content hole search in community-type content using Wikipedia. ![Search on Bibsonomy](Pics/bibsonomy.png) |
iiWAS ![In: iiWAS'2009 - The Eleventh International Conference on Information Integration and Web-based Applications and Services, 14-16 December 2009, Kuala Lumpur, Malaysia, pp. 25-32, 2009, ACM, 978-1-60558-660-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
content hole search, community, blog, SNS |
47 | Stefan Dobrev, Paola Flocchini, Nicola Santoro |
Cycling Through a Dangerous Network: A Simple Efficient Strategy for Black Hole Search. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS ![In: 26th IEEE International Conference on Distributed Computing Systems (ICDCS 2006), 4-7 July 2006, Lisboa, Portugal, pp. 57, 2006, IEEE Computer Society, 0-7695-2540-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Undetectable Failure, Black Hole Search, Mobile Agents, Malicious Host |
47 | Colin Cooper, Ralf Klasing, Tomasz Radzik |
Searching for Black-Hole Faults in a Network Using Multiple Agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OPODIS ![In: Principles of Distributed Systems, 10th International Conference, OPODIS 2006, Bordeaux, France, December 12-15, 2006, Proceedings, pp. 320-332, 2006, Springer, 3-540-49990-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
black hole faults, mobile agent, Graph exploration |
47 | Yanqiong Fei, Xifang Zhao |
An Assembly Process Modeling and Analysis for Robotic Multiple Peg-in-hole. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Intell. Robotic Syst. ![In: J. Intell. Robotic Syst. 36(2), pp. 175-189, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
assembly process, multiple peg-in-hole |
47 | Stefan S. Dantchev |
Resolution Width-Size Trade-offs for the Pigeon-Hole Principle. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCC ![In: Proceedings of the 17th Annual IEEE Conference on Computational Complexity, Montréal, Québec, Canada, May 21-24, 2002, pp. 39-43, 2002, IEEE Computer Society, 0-7695-1468-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Pigeon-Hole Principle, Width-Size trade-off, Resolution, Propositional Proof Complexity |
46 | Marwan Fayed, Hussein T. Mouftah |
Characterizing the Impact of Routing Holes on Geographic Routing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Systems Communications ![In: Systems Communications 2005 (ICW / ICHSN / ICMCS / SENET 2005), 14-17 August 2005, Montreal, Canada, pp. 401-406, 2005, IEEE Computer Society, 0-7695-2422-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
46 | Ying-Hong Wang, Kuo-Feng Huang, Shaing-Ting Lin |
A Grid-Based Hole Detection Scheme in WSNs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NBiS ![In: The 14th International Conference on Network-Based Information Systems, NBiS 2011, Tirana, Albania, September 7-9, 2011, pp. 202-207, 2011, IEEE Computer Society, 978-1-4577-0789-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
Grid-based network, Hole Detection, Wireless Sensor Networks, Coverage Hole |
46 | Jiwen Cai, Ping Yi, Jialin Chen, Zhiyang Wang, Ning Liu |
An Adaptive Approach to Detecting Black and Gray Hole Attacks in Ad Hoc Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: 24th IEEE International Conference on Advanced Information Networking and Applications, AINA 2010, Perth, Australia, 20-13 April 2010, pp. 775-780, 2010, IEEE Computer Society, 978-0-7695-4018-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Gray Hole, Intrusion Detection, Ad Hoc, Cross Layer Design, DSR, Black Hole |
44 | Gen Li, Xiuzi Ye, Sanyuan Zhang |
An algorithm for filling complex holes in reverse engineering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Eng. Comput. ![In: Eng. Comput. 24(2), pp. 119-125, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Reverse engineering, Point cloud, Triangular mesh, Hole filling |
44 | Nikolaos C. Gabrielides, Alexandros I. Ginnis, Panagiotis D. Kaklis |
Constructing smooth branching surfaces from cross sections. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Symposium on Solid and Physical Modeling ![In: Proceedings of the ACM Symposium on Solid and Physical Modeling 2006, Cardiff University, Wales, UK, June 6-8, 2006, pp. 161-170, 2006, ACM, 1-59593-358-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
G1 surfaces, branching surfaces, design, reconstruction, skinning, trimming, hole filling, cross sections, shape preserving interpolation |
40 | Soufiene Djahel, Farid Naït-Abdesselam, Ashfaq A. Khokhar |
An Acknowledgment-Based Scheme to Defend Against Cooperative Black Hole Attacks in Optimized Link State Routing Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: Proceedings of IEEE International Conference on Communications, ICC 2008, Beijing, China, 19-23 May 2008, pp. 2780-2785, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
40 | Elmar Gerhards-Padilla, Nils Aschenbruck, Peter Martini, Marko Jahnke, Jens Tölle |
Detecting Black Hole Attacks in Tactical MANETs using Topology Graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: 32nd Annual IEEE Conference on Local Computer Networks (LCN 2007), 15-18 October 2007, Clontarf Castle, Dublin, Ireland, Proceedings, pp. 1043-1052, 2007, IEEE Computer Society, 0-7695-3000-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
40 | Mingxi Zhao, Lizhuang Ma, Zhihong Mao, Zhong Li |
Feature Sensitive Hole Filling with Crest Lines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNC (2) ![In: Advances in Natural Computation, Second International Conference, ICNC 2006, Xi'an, China, September 24-28, 2006. Proceedings, Part II, pp. 660-663, 2006, Springer, 3-540-45907-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
40 | Stefan Dobrev, Rastislav Kralovic, Nicola Santoro, Wei Shi 0001 |
Black Hole Search in Asynchronous Rings Using Tokens. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIAC ![In: Algorithms and Complexity, 6th Italian Conference, CIAC 2006, Rome, Italy, May 29-31, 2006, Proceedings, pp. 139-150, 2006, Springer, 3-540-34375-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
40 | Stefan Funke |
Topological hole detection in wireless sensor networks and its applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIALM-POMC ![In: Proceedings of the DIALM-POMC Joint Workshop on Foundations of Mobile Computing, Cologne, Germany, September 2, 2005, pp. 44-53, 2005, ACM, 1-59593-092-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
routing, graph theory, topology, embedding, virtual coordinates |
40 | Stefan Dobrev, Paola Flocchini, Giuseppe Prencipe, Nicola Santoro |
Multiple Agents RendezVous in a Ring in Spite of a Black Hole. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OPODIS ![In: Principles of Distributed Systems, 7th International Conference, OPODIS 2003 La Martinique, French West Indies, December 10-13, 2003 Revised Selected Papers, pp. 34-46, 2003, Springer, 3-540-22667-2. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
40 | Graham M. Seed, Douglas E. R. Clark, Raffaella Ocone, Xiaoyan Y. Yang |
Four Colouring the Vertices of the Triangulation of a Polygon Containing a Hole. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (3) ![In: Computational Science and Its Applications - ICCSA 2003, International Conference, Montreal, Canada, May 18-21, 2003, Proceedings, Part III, pp. 894-902, 2003, Springer, 3-540-40156-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
40 | Josef Pauli, Arne Schmidt 0002, Gerald Sommer |
Servoing Mechanisms for Peg-In-Hole Assembly Operations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RobVis ![In: Robot Vision, International Workshop RobVis 2001, Auckland, New Zealand, February 16-18, 2001, Proceeding, pp. 157-166, 2001, Springer, 3-540-41694-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
40 | Michele Conforti, Gérard Cornuéjols, Ajai Kapoor, Kristina Vuskovic |
Finding an Even Hole in a Graph. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOCS ![In: 38th Annual Symposium on Foundations of Computer Science, FOCS '97, Miami Beach, Florida, USA, October 19-22, 1997, pp. 480-485, 1997, IEEE Computer Society, 0-8186-8197-7. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
38 | Martin P. van Exter, Erwin Altewischer, J. P. (Han) Woerdman |
Coherent Polarization Transfer through Sub-wavelength Hole Arrays. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NanoNet ![In: Nano-Net - 4th International ICST Conference, Nano-Net 2009, Lucerne, Switzerland, October 18-20, 2009. Proceedings, pp. 76-83, 2009, Springer, 978-3-642-04849-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
surface plasmon, hole array, polarization, entanglement |
38 | Stavros D. Nikolopoulos, Leonidas Palios |
Hole and antihole detection in graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SODA ![In: Proceedings of the Fifteenth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2004, New Orleans, Louisiana, USA, January 11-14, 2004, pp. 850-859, 2004, SIAM, 0-89871-558-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
antihole, co-connectivity, weakly chordal graph, hole |
37 | Yoram Adler, Eitan Farchi, Moshe Klausner, Dan Pelleg, Orna Raz, Moran Shochat, Shmuel Ur, Aviad Zlotnick |
Advanced code coverage analysis using substring holes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSTA ![In: Proceedings of the Eighteenth International Symposium on Software Testing and Analysis, ISSTA 2009, Chicago, IL, USA, July 19-23, 2009, pp. 37-46, 2009, ACM, 978-1-60558-338-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
software testing, coverage analysis |
37 | Maria Vasardani, Max J. Egenhofer |
Comparing Relations with a Multi-holed Region. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COSIT ![In: Spatial Information Theory, 9th International Conference, COSIT 2009, Aber Wrac'h, France, September 21-25, 2009, Proceedings, pp. 159-176, 2009, Springer, 978-3-642-03831-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
37 | Chun-Yen Chen, Kuo-Young Cheng |
A Sharpness-Dependent Filter for Recovering Sharp Features in Repaired 3D Mesh Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Vis. Comput. Graph. ![In: IEEE Trans. Vis. Comput. Graph. 14(1), pp. 200-212, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
37 | Conor McBride |
Clowns to the left of me, jokers to the right (pearl): dissecting data structures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POPL ![In: Proceedings of the 35th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2008, San Francisco, California, USA, January 7-12, 2008, pp. 287-295, 2008, ACM, 978-1-59593-689-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
polynomial, generic programming, iteration, division, stack, differentiation, traversal, datatype, tail recursion, zipper, dissection |
37 | Steve Mann 0001, Ryan E. Janzen, Mark A. Post |
Hydraulophone design considerations: absement, displacement, and velocity-sensitive music keyboard in which each key is a water jet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Multimedia ![In: Proceedings of the 14th ACM International Conference on Multimedia, Santa Barbara, CA, USA, October 23-27, 2006, pp. 519-528, 2006, ACM, 1-59593-447-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
FUNtain, direct user interface, duringtouch, haptic surface, harmelodica, harmelotron (harmellotron), hydraulic-action, hydraulophone, pneumatophone, tracker-action, underwater musical instrument, water-based immersive multimedia, tangible user interface, fluid-user-interface |
37 | Yun-Tao Jia, Shi-Min Hu 0001, Ralph R. Martin |
Video completion using tracking and fragment merging. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Vis. Comput. ![In: Vis. Comput. 21(8-10), pp. 601-610, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Video completion, Tracking, Texture synthesis, Graph cut, Mean shift |
35 | Jérôme Durand-Lose |
Abstract geometrical computation 3: black holes for classical and analog computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Nat. Comput. ![In: Nat. Comput. 8(3), pp. 455-472, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Black hole model, Malament-Hogarth space-time, Hyper-computing, Zeno phenomenon, Analog computation, Arithmetic hierarchy, Abstract geometrical computation |
35 | Minh Thiep Ha, Priyadharshini Sakthivel, Hyunseung Choo |
Bypassing Routing Holes in WSNs with a Predictive Geographic Greedy Forwarding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APNOMS ![In: Management Enabling the Future Internet for Changing Business and New Computing Services, 12th Asia-Pacific Network Operations and Management Symposium, APNOMS 2009, Jeju, South Korea, September 23-25, 2009, Proceedings, pp. 171-180, 2009, Springer, 978-3-642-04491-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Routing hole problem, sensor networks |
35 | Theodore Lim, James M. Ritchie, Richard G. Dewar, Jonathan R. Corney, P. Wilkinson, Mustafa Calis, Marc P. Y. Desmulliez, J.-J. Fang |
Factors affecting user performance in haptic assembly. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Virtual Real. ![In: Virtual Real. 11(4), pp. 241-252, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Haptic assembly, Design for assembly, Peg-in-hole metrics, Human-computer Interaction, Virtual reality, Human factors |
35 | Lei Shu 0001, ZhangBing Zhou, Manfred Hauswirth, Danh Le Phuoc, Peng Yu, Lin Zhang 0012 |
Transmitting streaming data in wireless multimedia sensor networks with holes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MUM ![In: Proceedings of the 6th International Conference on Mobile and Ubiquitous Multimedia, MUM 2007, Oulu, Finland, December 12-14, 2007, pp. 24-33, 2007, ACM, 978-1-59593-916-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
TPGF routing algorithm, hole-bypassing routing, multi-path transmission, multimedia sensor networks, streaming data |
35 | Qi Cheng 0001, Elizabeth Murray |
On Deciding Deep Holes of Reed-Solomon Codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TAMC ![In: Theory and Applications of Models of Computation, 4th International Conference, TAMC 2007, Shanghai, China, May 22-25, 2007, Proceedings, pp. 296-305, 2007, Springer, 978-3-540-72503-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
deep hole, NP-complete, Reed-Solomon codes, algebraic surface |
35 | Seyoun Park, Xiaohu Guo, Hayong Shin, Hong Qin 0001 |
Surface completion for shape and appearance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Vis. Comput. ![In: Vis. Comput. 22(3), pp. 168-180, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Active contour method, Poisson equation, Hole filling |
35 | Tai-Hoon Kim, Sun-myoung Hwang |
Intelligent Method for Building Security Countermeasures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (2) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 10th International Conference, KES 2006, Bournemouth, UK, October 9-11, 2006, Proceedings, Part II, pp. 745-750, 2006, Springer, 3-540-46537-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Security countermeasure, security hole, security engineering |
35 | Mark N. Ellingham, Herbert Fleischner, Martin Kochol, Emanuel Wenger |
Colorability of Planar Graphs with Isolated Nontriangular Faces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Graphs Comb. ![In: Graphs Comb. 20(4), pp. 443-446, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Eulerian triangulation, Hole graph, 3-Coloring |
35 | Jop F. Sibeyn, Michael Kaufmann 0001 |
Deterministic 1-k Routing on Meshes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STACS ![In: STACS 94, 11th Annual Symposium on Theoretical Aspects of Computer Science, Caen, France, February 24-26, 1994, Proceedings, pp. 237-248, 1994, Springer, 3-540-57785-8. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
hot-potato worm-hole routing, meshes, packet routing, theory of parallel and distributed computation |
34 | Marko Jahnke, Jens Tölle, Alexander Finkenbrink, Alexander Wenzel, Elmar Gerhards-Padilla, Nils Aschenbruck, Peter Martini |
Methodologies and frameworks for testing ids in adhoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Q2SWinet ![In: Q2SWinet'07 - Proceedings of the Third ACM Workshop on Q2S and Security for Wireless and Mobile Networks, Chania, Crete Island, Greece, October 22, 2007, pp. 113-122, 2007, ACM, 978-1-59593-806-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
attacks and attack implementations, hardware testbed, reproducible node motion, semi-virtual testbed, smart MANET jamming, worm hole, black hole |
34 | E. L. Lohse |
Correspondences of 8-bit and Hollerith codes for computer environments - a USASI tutorial. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Commun. ACM ![In: Commun. ACM 11(11), pp. 783-789, 1968. The full citation details ...](Pics/full.jpeg) |
1968 |
DBLP DOI BibTeX RDF |
USA standard, card code, hole-patterns, hole-patterns assignment, punched card, punched card code, punched card systems |
30 | Yoram Adler, Eitan Farchi, Moshe Klausner, Dan Pelleg, Orna Raz, Moran Shochat, Shmuel Ur, Aviad Zlotnick |
Automated substring hole analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSE Companion ![In: 31st International Conference on Software Engineering, ICSE 2009, May 16-24, 2009, Vancouver, Canada, Companion Volume, pp. 203-206, 2009, IEEE, 978-1-4244-3494-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
30 | Matulya Bansal, Mark Broadie |
A simulation model to analyze the impact of hole size on putting in golf. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WSC ![In: Proceedings of the 2008 Winter Simulation Conference, Global Gateway to Discovery, WSC 2008, InterContinental Hotel, Miami, Florida, USA, December 7-10, 2008, pp. 2826-2834, 2008, WSC, 978-1-4244-2708-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
30 | Paola Flocchini, David Ilcinkas, Nicola Santoro |
Ping Pong in Dangerous Graphs: Optimal Black Hole Search with Pure Tokens. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DISC ![In: Distributed Computing, 22nd International Symposium, DISC 2008, Arcachon, France, September 22-24, 2008. Proceedings, pp. 227-241, 2008, Springer, 978-3-540-87778-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
dangerous graphs, distributed computing, mobile agents, autonomous robots, graph exploration |
30 | Piyush Agrawal, Ratan K. Ghosh, Sajal K. Das 0001 |
Cooperative black and gray hole attacks in mobile ad hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICUIMC ![In: Proceedings of the 2nd International Conference on Ubiquitous Information Management and Communication, ICUIMC 2008, Suwon, Korea, January 31 - February 01, 2008, pp. 310-314, 2008, ACM, 978-1-59593-993-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
30 | Jingyan Xu, Chi Liu, Yuchuan Wang, Eric C. Frey, Benjamin M. W. Tsui |
Quantitative Rotating Multisegment Slant-Hole SPECT Mammography With Attenuation and Collimator-Detector Response Compensation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Medical Imaging ![In: IEEE Trans. Medical Imaging 26(7), pp. 906-916, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
30 | Ji Zheng, Xin Wang 0002, Xiangyang Xue, Chai-Keong Toh |
A Mobile Agent-Based P2P Autonomous Security Hole Discovery System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNC (3) ![In: Advances in Natural Computation, First International Conference, ICNC 2005, Changsha, China, August 27-29, 2005, Proceedings, Part III, pp. 525-534, 2005, Springer, 3-540-28320-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
30 | Nils Raabe, Oliver Webber, Winfried Theis, Claus Weihs |
Spiralling in BTA Deep-hole Drilling: Models of Varying Frequencies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GfKl ![In: From Data and Information Analysis to Knowledge Engineering, Proceedings of the 29th Annual Conference of the Gesellschaft für Klassifikation e.V., University of Magdeburg, March 9-11, 2005, pp. 510-517, 2005, Springer, 978-3-540-31313-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
30 | Takayuki Matsuno, Toshio Fukuda, Yasuhisa Hasegawa |
Insertion of Long Peg into Tandem Shallow Hole Using Search Trajectory Generation without Force Feedback. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICRA ![In: Proceedings of the 2004 IEEE International Conference on Robotics and Automation, ICRA 2004, April 26 - May 1, 2004, New Orleans, LA, USA, pp. 1123-1128, 2004, IEEE. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
30 | Jérôme Durand-Lose |
Abstract Geometrical Computation for Black Hole Computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MCU ![In: Machines, Computations, and Universality, 4th International Conference, MCU 2004, Saint Petersburg, Russia, September 21-24, 2004, Revised Selected Papers, pp. 176-187, 2004, Springer, 3-540-25261-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
30 | Vito Trianni, Thomas Halva Labella, Marco Dorigo |
Evolution of Direct Communication for a Swarm-bot Performing Hole Avoidance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ANTS Workshop ![In: Ant Colony Optimization and Swarm Intelligence, 4th International Workshop, ANTS 2004, Brussels, Belgium, September 5 - 8, 2004, Proceedings, pp. 130-141, 2004, Springer, 3-540-22672-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
communication, evolutionary robotics, swarm robotics |
30 | Stefan Dobrev, Paola Flocchini, Giuseppe Prencipe, Nicola Santoro |
Searching for a black hole in arbitrary networks: optimal mobile agent protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PODC ![In: Proceedings of the Twenty-First Annual ACM Symposium on Principles of Distributed Computing, PODC 2002, Monterey, California, USA, July 21-24, 2002, pp. 153-161, 2002, ACM, 1-58113-485-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
distributed computing, mobile agents, black holes |
30 | Oded Lachish, Eitan Marcus, Shmuel Ur, Avi Ziv |
Hole analysis for functional coverage data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DAC ![In: Proceedings of the 39th Design Automation Conference, DAC 2002, New Orleans, LA, USA, June 10-14, 2002, pp. 807-812, 2002, ACM, 1-58113-461-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
functional verification, coverage analysis |
30 | Giovanni Simone, Francesco Carlo Morabito |
RBFNN-Based Hole Identification System in Conducting Plates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IJCNN (5) ![In: Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks, IJCNN 2000, Neural Computing: New Challenges and Perspectives for the New Millennium, Como, Italy, July 24-27, 2000, Volume 5, pp. 227-232, 2000, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
29 | Ming-Yang Su, Kun-Lin Chiang, Wei-Cheng Liao |
Mitigation of Black-Hole Nodes in Mobile Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPA ![In: IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2010, Taipei, Taiwan, 6-9 September 2010, pp. 162-167, 2010, IEEE Computer Society, 978-1-4244-8095-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
MANETs (Mobile ad hoc networks), black hole attack, intrusion detection system (IDS) |
29 | Xiao-xing Gao, Chun-ze Zhao, Gui-Ran Chang, Zhen-hua Tan |
Design and Implementation of Drill Hole of PCB Detection System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HIS (2) ![In: 9th International Conference on Hybrid Intelligent Systems (HIS 2009), August 12-14, 2009, Shenyang, China, pp. 462-466, 2009, IEEE Computer Society, 978-0-7695-3745-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
PCB detection, drill Hole detect, digital image processing |
29 | Amitesh Kumar, Alan M. Shih, Yasushi Ito, Douglas H. Ross, Bharat K. Soni |
A Hole-filling Algorithm Using Non-uniform Rational B-splines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMR ![In: Proceedings of the 16th International Meshing Roundtable, October 14-17, 2007, Seattle, Washington, USA, Proceedings, pp. 169-182, 2007, Springer, 978-3-540-75102-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Geometry Repair, Watertight, CSM, Edge Swapping, Delaunay Triangulation, CFD, Mesh Generation, NURBS, Hole Filling |
28 | Stuart Benjamin, Henrik Järleblad, Mirko Salewski, Luke Stagner, Matthew Hole, David Pfefferlé |
Distribution transforms for guiding center orbit coordinates in axisymmetric tokamak equilibria. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Phys. Commun. ![In: Comput. Phys. Commun. 292, pp. 108893, November 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Dean Muir, Kenneth Duru, Matthew Hole, Stuart R. Hudson |
Provably stable numerical method for the anisotropic diffusion equation in toroidally confined magnetic fields. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2306.00423, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Dean Muir, Kenneth Duru, Matthew Hole, Stuart R. Hudson |
An efficient method for the anisotropic diffusion equation in magnetic fields. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2303.15447, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Chirag Jain, Luv Gupta, Manav Ranawat, Varsha Hole |
Securing E-Voting using Hyperledger Fabric: A Permissioned Blockchain Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OCIT ![In: OITS International Conference on Information Technology, OCIT 2023, Raipur, India, December 13-15, 2023, pp. 539-546, 2023, IEEE, 979-8-3503-5823-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Yogesh Hole, Alaa Shather, Ali Hussein Alrubayi, Hawraa Ali Sabah, Hayder Al-Ghanimi, Haider Alchilibi |
Incorporation of Agents with Ontology to Develop a Healthcare Assessment Provision System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IC3I ![In: 6th International Conference on Contemporary Computing and Informatics, IC3I 2023, Gautam Buddha Nagar, India, September 14-16, 2023, pp. 2724-2728, 2023, IEEE, 979-8-3503-0448-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Snehal Hole, Abdul Razzaq T. Zaboun, Hayder Al-Ghanimi, Omad Aldeen Hussen, Haider Alchilibi, Sahar R. Abdul Kadeem |
Augmented Selection of Cluster Heads and Enlightening Network Lifetime in Underwater Wireless Sensor Networks Using Grey Wolf Optimization (GWO). ![Search on Bibsonomy](Pics/bibsonomy.png) |
IC3I ![In: 6th International Conference on Contemporary Computing and Informatics, IC3I 2023, Gautam Buddha Nagar, India, September 14-16, 2023, pp. 2719-2723, 2023, IEEE, 979-8-3503-0448-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 2899 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|