The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for hole with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1949-1970 (20) 1971-1989 (16) 1990-1992 (15) 1993-1995 (24) 1996 (18) 1997 (22) 1998 (30) 1999 (20) 2000 (20) 2001 (43) 2002 (34) 2003 (48) 2004 (74) 2005 (84) 2006 (111) 2007 (112) 2008 (123) 2009 (106) 2010 (96) 2011 (95) 2012 (103) 2013 (106) 2014 (107) 2015 (120) 2016 (133) 2017 (153) 2018 (146) 2019 (157) 2020 (165) 2021 (171) 2022 (195) 2023 (198) 2024 (34)
Publication types (Num. hits)
article(1533) book(2) data(2) incollection(5) inproceedings(1339) phdthesis(13) proceedings(5)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 709 occurrences of 525 keywords

Results
Found 2929 publication records. Showing 2899 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
123Inyoung Shin, Ngoc Duy Pham, Hyunseung Choo Virtual Convex Polygon Based Hole Boundary Detection and Time Delay Based Hole Detour Scheme in WSNs. Search on Bibsonomy HCI (8) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Hole Problem, Wireless Sensor Networks (WSNs), Geographic Routing
122Nicola Santoro Close Encounters with a Black Hole or Explorations and Gatherings in Dangerous Graphs. Search on Bibsonomy FUN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Harmful Host, Anonymous Agents, Robots, Mobile Agents, Asynchronous, Exploration, Tokens, Rendezvous, Anonymous Networks, Whiteboards, Gathering
97Marcin Janaszewski, Michel Couprie, Laurent Babout Geometric Approach to Hole Segmentation and Hole Closing in 3D Volumetric Objects. Search on Bibsonomy CIARP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
95Fucai Yu, Soochang Park, Ye Tian, Minsuk Jin, Sang-Ha Kim 0001 Efficient Hole Detour Scheme for Geographic Routing in Wireless Sensor Networks. Search on Bibsonomy VTC Spring The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
92Ye Tian, Fucai Yu, Younghwan Choi, Soochang Park, Euisin Lee, Min-Sook Jin, Sang-Ha Kim 0001 Energy-Efficient Data Dissemination Protocol for Detouring Routing Holes in Wireless Sensor Networks. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
84Hesiri Weerasinghe, Huirong Fu Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation. Search on Bibsonomy FGCN (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Cooperative Black Hole attack, MANET, AODV
84Jurek Czyzowicz, Dariusz R. Kowalski, Euripides Markou, Andrzej Pelc Searching for a Black Hole in Tree Networks. Search on Bibsonomy OPODIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF algorithm, mobile agent, tree, black hole
76Junyu Dong, Sha Ma, Li Li, Zhongda Yu Hole Filling on Three-Dimensional Surface Texture. Search on Bibsonomy ICME The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
75Fucai Yu, Euisin Lee, Younghwan Choi, Soochang Park, Donghun Lee, Ye Tian, Sang-Ha Kim 0001 A modeling for hole problem in wireless sensor networks. Search on Bibsonomy IWCMC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF hole problem, wireless sensor network, geographic forwarding
75Stefan Dobrev, Nicola Santoro, Wei Shi 0001 Locating a Black Hole in an Un-oriented Ring Using Tokens: The Case of Scattered Agents. Search on Bibsonomy Euro-Par The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Un-oriented, Mobile Agent, Anonymous, Asynchronous, Ring, Token, Scattered, Black Hole
75Jian Yin 0006, Sanjay Kumar Madria A Hierarchical Secure Routing Protocol against Black Hole Attacks in Sensor Networks. Search on Bibsonomy SUTC (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Black hole attack, Sensor networks
75Ralf Klasing, Euripides Markou, Tomasz Radzik, Fabiano Sarracco Approximation Bounds for Black Hole Search Problems. Search on Bibsonomy OPODIS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF black hole search, approximation algorithm, mobile agent, inapproximability, graph exploration
75Ralf Klasing, Euripides Markou, Tomasz Radzik, Fabiano Sarracco Hardness and Approximation Results for Black Hole Search in Arbitrary Graphs. Search on Bibsonomy SIROCCO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF black hole search, approximation algorithm, mobile agent, NP-hardness, graph exploration
66Chih-Yung Chang, Wei-Cheng Chu, Chih-Yu Lin, Chien-Fu Cheng Energy-balanced hole-movement mechanism for temporal full-coverage in mobile WSNs. Search on Bibsonomy IWCMC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF wireless sensor networks, coverage, mobile sensor, hole
66Akiyo Nadamoto, Eiji Aramaki, Takeshi Abekawa, Yohei Murakami Content hole search in community-type content. Search on Bibsonomy WWW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF content hole search, community, blog, SNS
66Chang-Wu Yu 0001, Tung-Kuang Wu, Rei-Heng Cheng, Shun Chao Chang A Distributed and Cooperative Black Hole Node Detection and Elimination Mechanism for Ad Hoc Networks. Search on Bibsonomy PAKDD Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Security, Ad Hoc Networks, Wireless Networks, Black Hole
58John William Branch, Flavio Prieto, Pierre Boulanger A Hole-Filling Algorithm for Triangular Meshes Using Local Radial Basis Function. Search on Bibsonomy IMR The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
58John William Branch, Flavio Prieto, Pierre Boulanger Automatic Hole-Filling of Triangular Meshes Using Local Radial Basis Function. Search on Bibsonomy 3DPVT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
58Stefan Dobrev, Paola Flocchini, Nicola Santoro Improved Bounds for Optimal Black Hole Search with a Network Map. Search on Bibsonomy SIROCCO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
56Wei Shi 0001 Black Hole Search with Tokens in Interconnected Networks. Search on Bibsonomy SSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Un-oriented, Mobile Agent, Ring, Token, Scattered, Black Hole
56Wei Zhao, Shuming Gao, Hongwei Lin A robust hole-filling algorithm for triangular mesh. Search on Bibsonomy Vis. Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Poisson equation, Triangular mesh, Hole-filling, Harmonic Function
56K. Murugesan, P. Elango CNN Based Hole Filler Template Design Using Numerical Integration Techniques. Search on Bibsonomy ICANN (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Hole-filler template, Numerical Integration algorithms, Euler method, Modified-Euler method, RK-method, Cellular neural network
56Stefan Dobrev, Paola Flocchini, Giuseppe Prencipe, Nicola Santoro Searching for a black hole in arbitrary networks: optimal mobile agents protocols. Search on Bibsonomy Distributed Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Topological knowledge, Mobile agents, Distributed search, Black hole, Malicious host
56Sameer Singh 0002, Markos Markou A black hole novelty detector for video analysis. Search on Bibsonomy Pattern Anal. Appl. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Neural networks, Video analysis, Novelty detection, Object classification, Black hole
56Bertram J. Unger, A. Nicolaidis, Peter J. Berkelman, A. Thompson, Susan J. Lederman, Roberta L. Klatzky, Ralph L. Hollis Virtual Peg-in-Hole Performance Using a 6-DOF Magnetic Levitation Haptic Device: Comparison with Real Forces and with Visual Guidance Alone. Search on Bibsonomy Symposium on Haptic Interfaces for Virtual Environment and Teleoperator Systems The full citation details ... 2002 DBLP  DOI  BibTeX  RDF peg-in-hole, virtual reality, haptics, force feedback, task analysis
56Subbiah Baskaran, Narayanan Ramachandran, David Noever Probabilistic and Other Neural Nets in Multi-Hole Probe Calibration and Flow Angularity Pattern Recognition. Search on Bibsonomy Pattern Anal. Appl. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Calibration wind tunnel, Multi-hole probes, Probabilistic neural nets, Numerical simulation, Fluid dynamics
55M. F. Hole, Kjell Jørgen Hole Low-complexity decoding of partial unit memory codes on precoded partial-response channels. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
55M. F. Hole, Kjell Jørgen Hole Tight bounds on the minimum average weight per branch for rate (N-1)/N convolutional codes. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
55Fucai Yu, Younghwan Choi, Soochang Park, Euisin Lee, Ye Tian, Sang-Ha Kim 0001 Virtual Circle Based Geometric Modeling of Holes for Geographic Routing. Search on Bibsonomy WCNC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
52Kostas Daniilidis, Reinhard Klette, Ales Leonardis (eds.) Imaging Beyond the Pin-hole Camera. 12th Seminar on Theoretical Foundations of Computer Vision, 13.06. - 18.06.2004 Search on Bibsonomy Imaging Beyond the Pin-hole Camera. 12th Seminar on Theoretical Foundations of Computer Vision The full citation details ... 2004 DBLP  BibTeX  RDF
52Ralf Reulke, Aloysius Wehr, Denis Griesbach Mobile Panoramic Mapping using CCD-Line Camera and Laser Scanner. Search on Bibsonomy Imaging Beyond the Pin-hole Camera. 12th Seminar on Theoretical Foundations of Computer Vision The full citation details ... 2004 DBLP  BibTeX  RDF
52Kostas Daniilidis, Reinhard Klette, Ales Leonardis 04251 - Imaging Beyond the Pinhole Camera. Search on Bibsonomy Imaging Beyond the Pin-hole Camera. 12th Seminar on Theoretical Foundations of Computer Vision The full citation details ... 2004 DBLP  BibTeX  RDF
51E. L. Lohse Hollerith punched card code. Search on Bibsonomy Commun. ACM The full citation details ... 1968 DBLP  DOI  BibTeX  RDF USA standard, card code, hole-patterns, hole-patterns assignment, punched card hole, punched card systems, punched code
49Huawei Miao, Chia-Ching Ooi, Xiaowen Wu, Christian Schindelhauer Coverage-hole trap model in target tracking using distributed relay-robot network. Search on Bibsonomy SAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
49Stefan Dobrev, Paola Flocchini, Giuseppe Prencipe, Nicola Santoro Mobile Search for a Black Hole in an Anonymous Ring. Search on Bibsonomy Algorithmica The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
49Stefan Dobrev, Nicola Santoro, Wei Shi 0001 Scattered Black Hole Search in an Oriented Ring using Tokens. Search on Bibsonomy IPDPS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
49Max J. Egenhofer, Maria Vasardani Spatial Reasoning with a Hole. Search on Bibsonomy COSIT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
49Amir Averbuch, G. Gelles, Alon Schclar Fast Hole-Filling in Images Via Fast Comparison of Incomplete Patches. Search on Bibsonomy MRCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
49Stefan Dobrev, Paola Flocchini, Rastislav Kralovic, Nicola Santoro Exploring an Unknown Graph to Locate a Black Hole Using Tokens. Search on Bibsonomy IFIP TCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
49Stefan Dobrev, Paola Flocchini, Giuseppe Prencipe, Nicola Santoro Mobile Search for a Black Hole in an Anonymous Ring. Search on Bibsonomy DISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
47Akiyo Nadamoto, Eiji Aramaki, Takeshi Abekawa, Yohei Murakami Content hole search in community-type content using Wikipedia. Search on Bibsonomy iiWAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF content hole search, community, blog, SNS
47Stefan Dobrev, Paola Flocchini, Nicola Santoro Cycling Through a Dangerous Network: A Simple Efficient Strategy for Black Hole Search. Search on Bibsonomy ICDCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Undetectable Failure, Black Hole Search, Mobile Agents, Malicious Host
47Colin Cooper, Ralf Klasing, Tomasz Radzik Searching for Black-Hole Faults in a Network Using Multiple Agents. Search on Bibsonomy OPODIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF black hole faults, mobile agent, Graph exploration
47Yanqiong Fei, Xifang Zhao An Assembly Process Modeling and Analysis for Robotic Multiple Peg-in-hole. Search on Bibsonomy J. Intell. Robotic Syst. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF assembly process, multiple peg-in-hole
47Stefan S. Dantchev Resolution Width-Size Trade-offs for the Pigeon-Hole Principle. Search on Bibsonomy CCC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Pigeon-Hole Principle, Width-Size trade-off, Resolution, Propositional Proof Complexity
46Marwan Fayed, Hussein T. Mouftah Characterizing the Impact of Routing Holes on Geographic Routing. Search on Bibsonomy Systems Communications The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
46Ying-Hong Wang, Kuo-Feng Huang, Shaing-Ting Lin A Grid-Based Hole Detection Scheme in WSNs. Search on Bibsonomy NBiS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF Grid-based network, Hole Detection, Wireless Sensor Networks, Coverage Hole
46Jiwen Cai, Ping Yi, Jialin Chen, Zhiyang Wang, Ning Liu An Adaptive Approach to Detecting Black and Gray Hole Attacks in Ad Hoc Network. Search on Bibsonomy AINA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Gray Hole, Intrusion Detection, Ad Hoc, Cross Layer Design, DSR, Black Hole
44Gen Li, Xiuzi Ye, Sanyuan Zhang An algorithm for filling complex holes in reverse engineering. Search on Bibsonomy Eng. Comput. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Reverse engineering, Point cloud, Triangular mesh, Hole filling
44Nikolaos C. Gabrielides, Alexandros I. Ginnis, Panagiotis D. Kaklis Constructing smooth branching surfaces from cross sections. Search on Bibsonomy Symposium on Solid and Physical Modeling The full citation details ... 2006 DBLP  DOI  BibTeX  RDF G1 surfaces, branching surfaces, design, reconstruction, skinning, trimming, hole filling, cross sections, shape preserving interpolation
40Soufiene Djahel, Farid Naït-Abdesselam, Ashfaq A. Khokhar An Acknowledgment-Based Scheme to Defend Against Cooperative Black Hole Attacks in Optimized Link State Routing Protocol. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
40Elmar Gerhards-Padilla, Nils Aschenbruck, Peter Martini, Marko Jahnke, Jens Tölle Detecting Black Hole Attacks in Tactical MANETs using Topology Graphs. Search on Bibsonomy LCN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
40Mingxi Zhao, Lizhuang Ma, Zhihong Mao, Zhong Li Feature Sensitive Hole Filling with Crest Lines. Search on Bibsonomy ICNC (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
40Stefan Dobrev, Rastislav Kralovic, Nicola Santoro, Wei Shi 0001 Black Hole Search in Asynchronous Rings Using Tokens. Search on Bibsonomy CIAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
40Stefan Funke Topological hole detection in wireless sensor networks and its applications. Search on Bibsonomy DIALM-POMC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF routing, graph theory, topology, embedding, virtual coordinates
40Stefan Dobrev, Paola Flocchini, Giuseppe Prencipe, Nicola Santoro Multiple Agents RendezVous in a Ring in Spite of a Black Hole. Search on Bibsonomy OPODIS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
40Graham M. Seed, Douglas E. R. Clark, Raffaella Ocone, Xiaoyan Y. Yang Four Colouring the Vertices of the Triangulation of a Polygon Containing a Hole. Search on Bibsonomy ICCSA (3) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
40Josef Pauli, Arne Schmidt 0002, Gerald Sommer Servoing Mechanisms for Peg-In-Hole Assembly Operations. Search on Bibsonomy RobVis The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
40Michele Conforti, Gérard Cornuéjols, Ajai Kapoor, Kristina Vuskovic Finding an Even Hole in a Graph. Search on Bibsonomy FOCS The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
38Martin P. van Exter, Erwin Altewischer, J. P. (Han) Woerdman Coherent Polarization Transfer through Sub-wavelength Hole Arrays. Search on Bibsonomy NanoNet The full citation details ... 2009 DBLP  DOI  BibTeX  RDF surface plasmon, hole array, polarization, entanglement
38Stavros D. Nikolopoulos, Leonidas Palios Hole and antihole detection in graphs. Search on Bibsonomy SODA The full citation details ... 2004 DBLP  BibTeX  RDF antihole, co-connectivity, weakly chordal graph, hole
37Yoram Adler, Eitan Farchi, Moshe Klausner, Dan Pelleg, Orna Raz, Moran Shochat, Shmuel Ur, Aviad Zlotnick Advanced code coverage analysis using substring holes. Search on Bibsonomy ISSTA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF software testing, coverage analysis
37Maria Vasardani, Max J. Egenhofer Comparing Relations with a Multi-holed Region. Search on Bibsonomy COSIT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Chun-Yen Chen, Kuo-Young Cheng A Sharpness-Dependent Filter for Recovering Sharp Features in Repaired 3D Mesh Models. Search on Bibsonomy IEEE Trans. Vis. Comput. Graph. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Conor McBride Clowns to the left of me, jokers to the right (pearl): dissecting data structures. Search on Bibsonomy POPL The full citation details ... 2008 DBLP  DOI  BibTeX  RDF polynomial, generic programming, iteration, division, stack, differentiation, traversal, datatype, tail recursion, zipper, dissection
37Steve Mann 0001, Ryan E. Janzen, Mark A. Post Hydraulophone design considerations: absement, displacement, and velocity-sensitive music keyboard in which each key is a water jet. Search on Bibsonomy ACM Multimedia The full citation details ... 2006 DBLP  DOI  BibTeX  RDF FUNtain, direct user interface, duringtouch, haptic surface, harmelodica, harmelotron (harmellotron), hydraulic-action, hydraulophone, pneumatophone, tracker-action, underwater musical instrument, water-based immersive multimedia, tangible user interface, fluid-user-interface
37Yun-Tao Jia, Shi-Min Hu 0001, Ralph R. Martin Video completion using tracking and fragment merging. Search on Bibsonomy Vis. Comput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Video completion, Tracking, Texture synthesis, Graph cut, Mean shift
35Jérôme Durand-Lose Abstract geometrical computation 3: black holes for classical and analog computing. Search on Bibsonomy Nat. Comput. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Black hole model, Malament-Hogarth space-time, Hyper-computing, Zeno phenomenon, Analog computation, Arithmetic hierarchy, Abstract geometrical computation
35Minh Thiep Ha, Priyadharshini Sakthivel, Hyunseung Choo Bypassing Routing Holes in WSNs with a Predictive Geographic Greedy Forwarding. Search on Bibsonomy APNOMS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Routing hole problem, sensor networks
35Theodore Lim, James M. Ritchie, Richard G. Dewar, Jonathan R. Corney, P. Wilkinson, Mustafa Calis, Marc P. Y. Desmulliez, J.-J. Fang Factors affecting user performance in haptic assembly. Search on Bibsonomy Virtual Real. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Haptic assembly, Design for assembly, Peg-in-hole metrics, Human-computer Interaction, Virtual reality, Human factors
35Lei Shu 0001, ZhangBing Zhou, Manfred Hauswirth, Danh Le Phuoc, Peng Yu, Lin Zhang 0012 Transmitting streaming data in wireless multimedia sensor networks with holes. Search on Bibsonomy MUM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF TPGF routing algorithm, hole-bypassing routing, multi-path transmission, multimedia sensor networks, streaming data
35Qi Cheng 0001, Elizabeth Murray On Deciding Deep Holes of Reed-Solomon Codes. Search on Bibsonomy TAMC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF deep hole, NP-complete, Reed-Solomon codes, algebraic surface
35Seyoun Park, Xiaohu Guo, Hayong Shin, Hong Qin 0001 Surface completion for shape and appearance. Search on Bibsonomy Vis. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Active contour method, Poisson equation, Hole filling
35Tai-Hoon Kim, Sun-myoung Hwang Intelligent Method for Building Security Countermeasures. Search on Bibsonomy KES (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Security countermeasure, security hole, security engineering
35Mark N. Ellingham, Herbert Fleischner, Martin Kochol, Emanuel Wenger Colorability of Planar Graphs with Isolated Nontriangular Faces. Search on Bibsonomy Graphs Comb. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Eulerian triangulation, Hole graph, 3-Coloring
35Jop F. Sibeyn, Michael Kaufmann 0001 Deterministic 1-k Routing on Meshes. Search on Bibsonomy STACS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF hot-potato worm-hole routing, meshes, packet routing, theory of parallel and distributed computation
34Marko Jahnke, Jens Tölle, Alexander Finkenbrink, Alexander Wenzel, Elmar Gerhards-Padilla, Nils Aschenbruck, Peter Martini Methodologies and frameworks for testing ids in adhoc networks. Search on Bibsonomy Q2SWinet The full citation details ... 2007 DBLP  DOI  BibTeX  RDF attacks and attack implementations, hardware testbed, reproducible node motion, semi-virtual testbed, smart MANET jamming, worm hole, black hole
34E. L. Lohse Correspondences of 8-bit and Hollerith codes for computer environments - a USASI tutorial. Search on Bibsonomy Commun. ACM The full citation details ... 1968 DBLP  DOI  BibTeX  RDF USA standard, card code, hole-patterns, hole-patterns assignment, punched card, punched card code, punched card systems
30Yoram Adler, Eitan Farchi, Moshe Klausner, Dan Pelleg, Orna Raz, Moran Shochat, Shmuel Ur, Aviad Zlotnick Automated substring hole analysis. Search on Bibsonomy ICSE Companion The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
30Matulya Bansal, Mark Broadie A simulation model to analyze the impact of hole size on putting in golf. Search on Bibsonomy WSC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
30Paola Flocchini, David Ilcinkas, Nicola Santoro Ping Pong in Dangerous Graphs: Optimal Black Hole Search with Pure Tokens. Search on Bibsonomy DISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF dangerous graphs, distributed computing, mobile agents, autonomous robots, graph exploration
30Piyush Agrawal, Ratan K. Ghosh, Sajal K. Das 0001 Cooperative black and gray hole attacks in mobile ad hoc networks. Search on Bibsonomy ICUIMC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
30Jingyan Xu, Chi Liu, Yuchuan Wang, Eric C. Frey, Benjamin M. W. Tsui Quantitative Rotating Multisegment Slant-Hole SPECT Mammography With Attenuation and Collimator-Detector Response Compensation. Search on Bibsonomy IEEE Trans. Medical Imaging The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
30Ji Zheng, Xin Wang 0002, Xiangyang Xue, Chai-Keong Toh A Mobile Agent-Based P2P Autonomous Security Hole Discovery System. Search on Bibsonomy ICNC (3) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
30Nils Raabe, Oliver Webber, Winfried Theis, Claus Weihs Spiralling in BTA Deep-hole Drilling: Models of Varying Frequencies. Search on Bibsonomy GfKl The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
30Takayuki Matsuno, Toshio Fukuda, Yasuhisa Hasegawa Insertion of Long Peg into Tandem Shallow Hole Using Search Trajectory Generation without Force Feedback. Search on Bibsonomy ICRA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
30Jérôme Durand-Lose Abstract Geometrical Computation for Black Hole Computation. Search on Bibsonomy MCU The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
30Vito Trianni, Thomas Halva Labella, Marco Dorigo Evolution of Direct Communication for a Swarm-bot Performing Hole Avoidance. Search on Bibsonomy ANTS Workshop The full citation details ... 2004 DBLP  DOI  BibTeX  RDF communication, evolutionary robotics, swarm robotics
30Stefan Dobrev, Paola Flocchini, Giuseppe Prencipe, Nicola Santoro Searching for a black hole in arbitrary networks: optimal mobile agent protocols. Search on Bibsonomy PODC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF distributed computing, mobile agents, black holes
30Oded Lachish, Eitan Marcus, Shmuel Ur, Avi Ziv Hole analysis for functional coverage data. Search on Bibsonomy DAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF functional verification, coverage analysis
30Giovanni Simone, Francesco Carlo Morabito RBFNN-Based Hole Identification System in Conducting Plates. Search on Bibsonomy IJCNN (5) The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
29Ming-Yang Su, Kun-Lin Chiang, Wei-Cheng Liao Mitigation of Black-Hole Nodes in Mobile Ad Hoc Networks. Search on Bibsonomy ISPA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF MANETs (Mobile ad hoc networks), black hole attack, intrusion detection system (IDS)
29Xiao-xing Gao, Chun-ze Zhao, Gui-Ran Chang, Zhen-hua Tan Design and Implementation of Drill Hole of PCB Detection System. Search on Bibsonomy HIS (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF PCB detection, drill Hole detect, digital image processing
29Amitesh Kumar, Alan M. Shih, Yasushi Ito, Douglas H. Ross, Bharat K. Soni A Hole-filling Algorithm Using Non-uniform Rational B-splines. Search on Bibsonomy IMR The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Geometry Repair, Watertight, CSM, Edge Swapping, Delaunay Triangulation, CFD, Mesh Generation, NURBS, Hole Filling
28Stuart Benjamin, Henrik Järleblad, Mirko Salewski, Luke Stagner, Matthew Hole, David Pfefferlé Distribution transforms for guiding center orbit coordinates in axisymmetric tokamak equilibria. Search on Bibsonomy Comput. Phys. Commun. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
28Dean Muir, Kenneth Duru, Matthew Hole, Stuart R. Hudson Provably stable numerical method for the anisotropic diffusion equation in toroidally confined magnetic fields. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
28Dean Muir, Kenneth Duru, Matthew Hole, Stuart R. Hudson An efficient method for the anisotropic diffusion equation in magnetic fields. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
28Chirag Jain, Luv Gupta, Manav Ranawat, Varsha Hole Securing E-Voting using Hyperledger Fabric: A Permissioned Blockchain Approach. Search on Bibsonomy OCIT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
28Yogesh Hole, Alaa Shather, Ali Hussein Alrubayi, Hawraa Ali Sabah, Hayder Al-Ghanimi, Haider Alchilibi Incorporation of Agents with Ontology to Develop a Healthcare Assessment Provision System. Search on Bibsonomy IC3I The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
28Snehal Hole, Abdul Razzaq T. Zaboun, Hayder Al-Ghanimi, Omad Aldeen Hussen, Haider Alchilibi, Sahar R. Abdul Kadeem Augmented Selection of Cluster Heads and Enlightening Network Lifetime in Underwater Wireless Sensor Networks Using Grey Wolf Optimization (GWO). Search on Bibsonomy IC3I The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 2899 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license