The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for compromise with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1959-1979 (16) 1980-1988 (17) 1989-1990 (18) 1991-1993 (24) 1994-1995 (31) 1996 (22) 1997 (30) 1998 (18) 1999 (35) 2000 (48) 2001 (69) 2002 (79) 2003 (96) 2004 (153) 2005 (195) 2006 (226) 2007 (236) 2008 (251) 2009 (170) 2010 (41) 2011 (28) 2012 (24) 2013 (32) 2014 (25) 2015 (24) 2016 (30) 2017 (29) 2018 (41) 2019 (37) 2020 (41) 2021 (47) 2022 (72) 2023 (66) 2024 (8)
Publication types (Num. hits)
article(714) book(1) data(1) incollection(13) inproceedings(1538) phdthesis(12)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1926 occurrences of 1317 keywords

Results
Found 2279 publication records. Showing 2279 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
6Leandro Soriano Marcolino, Luiz Chaimowicz Traffic control for a swarm of robots: Avoiding group conflicts. Search on Bibsonomy IROS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
6Juan Pablo Gonzalez, Anthony Stentz Using linear landmarks for path planning with uncertainty in outdoor environments. Search on Bibsonomy IROS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
6Leandro Soriano Marcolino, Luiz Chaimowicz Traffic control for a swarm of robots: Avoiding target congestion. Search on Bibsonomy IROS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
6Shan Suthaharan, Abhinav Chawade, Rittwik Jana, Jing Deng 0001 Energy Efficient DNA-Based Scheduling Scheme for Wireless Sensor Networks. Search on Bibsonomy WASA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Sleep-active scheduling, DNA-based scheduling, WSN simulator, wireless sensor network, sensor node
6Shuting Xu, Shuhua Lai, Manying Qiu Privacy preserving churn prediction. Search on Bibsonomy SAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF data mining, privacy, prediction, churn
6Daniel Howard 0001 Bio-inspired simulation tool for PERT. Search on Bibsonomy ICHIT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
6Xiaowang Zhang, Zuoquan Lin An Argumentation-Based Approach to Handling Inconsistencies in DL-Lite. Search on Bibsonomy KI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
6Adi Akavia, Shafi Goldwasser, Vinod Vaikuntanathan Simultaneous Hardcore Bits and Cryptography against Memory Attacks. Search on Bibsonomy TCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
6Ivan Damgård, Jesper Buus Nielsen, Daniel Wichs Universally Composable Multiparty Computation with Partially Isolated Parties. Search on Bibsonomy TCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF public-key infrastructure, multiparty computation, universally composable security
6Tae-Eung Sung Near-optimal delay-constrained MLR scheduler for multimedia embedded wireless channels. Search on Bibsonomy IWCMC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF modified-linear-rule (MLR) scheduler, multiuser wireless fading channels, queueing delay and power constraints, quality of service (QoS)
6Junghwan Rhee, Ryan D. Riley, Dongyan Xu, Xuxian Jiang Defeating Dynamic Data Kernel Rootkit Attacks via VMM-Based Guest-Transparent Monitoring. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
6Gerardo Canfora, Corrado Aaron Visaggio, Vito Paradiso A Test Framework for Assessing Effectiveness of the Data Privacy Policy's Implementation into Relational Databases. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
6Michael Elkin, Shay Solomon Narrow-Shallow-Low-Light Trees with and without Steiner Points. Search on Bibsonomy ESA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
6Alessandro Borri, Maria Domenica Di Benedetto, Maria-Gabriella Di Benedetto Hybrid Modelling, Power Management and Stabilization of Cognitive Radio Networks. Search on Bibsonomy HSCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
6Stefan Funke Of What Use Is Floating-Point Arithmetic in Computational Geometry? Search on Bibsonomy Efficient Algorithms The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
6Vedrana Andersen, Mathieu Desbrun, J. Andreas Bærentzen, Henrik Aanæs Height and Tilt Geometric Texture. Search on Bibsonomy ISVC (1) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
6Golnaz Elahi, Eric S. K. Yu, Nicola Zannone A Modeling Ontology for Integrating Vulnerabilities into Security Requirements Conceptual Foundations. Search on Bibsonomy ER The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
6Hridesh Rajan, Jia Tao 0001, Steve M. Shaner, Gary T. Leavens Tisa: A Language Design and Modular Verification Technique for Temporal Policies in Web Services. Search on Bibsonomy ESOP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
6Cheryl V. Hinds Efficient detection of compromised nodes in a wireless sensor network. Search on Bibsonomy SpringSim The full citation details ... 2009 DBLP  DOI  BibTeX  RDF compromised nodes, wireless sensor networks
6Abel G. Silva-Filho, Cristiano C. de Araújo A methodology for tuning two-level cache hierarchy considering energy and performance. Search on Bibsonomy SBCCI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF exploration mechanism, two-level caches, embedded systems, system-on-chip, low power design, memory hierarchy
6Aidil Izani Jafri, Yean Li Ho ANonce encryption in 802.11i 4-way handshake protocol. Search on Bibsonomy MoMM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF 4-way handshake protocol, ANonce, 802.11i, DoS attack, WLAN security
6Josh A. Meek, Michael K. Bradshaw Web Based Computer Lab Imaging with Grimiore. Search on Bibsonomy SIGUCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF disk cloning, disk imaging, lab configurations, labs
6Jochen Rick, Amanda Harris 0001, Paul Marshall, Rowanne Fleck, Nicola Yuill, Yvonne Rogers Children designing together on a multi-touch tabletop: an analysis of spatial orientation and user interactions. Search on Bibsonomy IDC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF shareable interfaces, touch analysis, collaborative design, multi-touch, log-file analysis, co-located collaboration
6Derek P. Ditch, Bruce M. McMillin The Security Implication of Multiple Observers in a Distributed System. Search on Bibsonomy COMPSAC (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
6Remco M. Dijkman, Marlon Dumas, Luciano García-Bañuelos Graph Matching Algorithms for Business Process Model Similarity Search. Search on Bibsonomy BPM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
6Ali Alsam, Ivar Farup Colour Gamut Mapping as a Constrained Variational Problem. Search on Bibsonomy SCIA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
6Arnaud Zinflou, Caroline Gagné, Marc Gravel Solving the industrial car sequencing problem in a Pareto sense. Search on Bibsonomy IPDPS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
6Jun-Won Ho, Donggang Liu, Matthew K. Wright, Sajal K. Das 0001 Distributed Detection of Replicas with Deployment Knowledge in Wireless Sensor Networks. Search on Bibsonomy PerCom Workshops The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
6Mukesh Kumar Saini, Mohan S. Kankanhalli, Ramesh C. Jain A Flexible Surveillance System Architecture. Search on Bibsonomy AVSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
6Xiaogang Wang, Junzhou Luo, Ming Yang 0001, Zhen Ling A novel flow multiplication attack against Tor. Search on Bibsonomy CSCWD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
6Cristina Cano, Boris Bellalta, Jaume Barceló, Anna Sfairopoulou A Novel MAC Protocol for Event-Based Wireless Sensor Networks: Improving the Collective QoS. Search on Bibsonomy WWIC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Collective QoS, B-MAC, MAC, WSNs
6Claus Weihs, Gero Szepannek Distances in Classification. Search on Bibsonomy ICDM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
6Xu Xu, Yu Hen Hu, Jingping Bi, Wei Liu Adaptive nodes scheduling approach for clustered sensor networks. Search on Bibsonomy ISCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
6Vasily Desnitsky, Igor V. Kotenko Design of Entrusting Protocols for Software Protection. Search on Bibsonomy IF&GIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Security protocol design, Remote entrusting, Protocol analysis and verification, Attacks, Software protection
6Yongsoo Joo, Youngjin Cho, Kyungsoo Lee, Naehyuck Chang Improving application launch times with hybrid disks. Search on Bibsonomy CODES+ISSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF application launch, hybrid disk, pinned set
6David Lo 0001, Leonardo Mariani, Mauro Pezzè Automatic steering of behavioral model inference. Search on Bibsonomy ESEC/SIGSOFT FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF mining automata, dynamic analysis, temporal properties
6Nathan R. Tallent, John M. Mellor-Crummey, Michael W. Fagan Binary analysis for measurement and attribution of program performance. Search on Bibsonomy PLDI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF call path profiling, static analysis, performance tools, binary analysis, hpctoolkit
6Shazia Wasim Sadiq, Ke Deng, Xiaofang Zhou 0001, Xiaochun Yang 0001, Walid G. Aref, Alex Delis, Qing Liu 0001, Kai Xu 0003 Workshop Organizers' Message. Search on Bibsonomy DASFAA Workshops The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
6Arrvindh Shriraman, Sandhya Dwarkadas Refereeing conflicts in hardware transactional memory. Search on Bibsonomy ICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF transactional memory, contention management, conflict detection
6Lihong Xu, Bingkun Zhu, Erik D. Goodman An improved MOCC with feedback control structure based on preference. Search on Bibsonomy GEC Summit The full citation details ... 2009 DBLP  DOI  BibTeX  RDF multi-objective control, evolutionary algorithm, preference
6Keith B. Frikken, Marina Blanton, Mikhail J. Atallah Robust Authentication Using Physically Unclonable Functions. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
6Ghassan Jabbour, Daniel A. Menascé The Insider Threat Security Architecture: A Framework for an Integrated, Inseparable, and Uninterrupted Self-Protection Mechanism. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
6Aaron Beach, Mike Gartrell, Richard Han 0001 Solutions to Security and Privacy Issues in Mobile Social Networking. Search on Bibsonomy CSE (4) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
6Peng Li 0059, Debin Gao, Michael K. Reiter Automatically Adapting a Trained Anomaly Detector to Software Patches. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF software patches, system-call monitoring, binary difference analysis, Anomaly detection
6Zeinab Abbassi, Sihem Amer-Yahia, Laks V. S. Lakshmanan, Sergei Vassilvitskii, Cong Yu 0001 Getting recommender systems to think outside the box. Search on Bibsonomy RecSys The full citation details ... 2009 DBLP  DOI  BibTeX  RDF OTB, outside the box, recommendation, diversity, serendipity
6Stuart E. Schechter, Robert W. Reeder 1 + 1 = you: measuring the comprehensibility of metaphors for configuring backup authentication. Search on Bibsonomy SOUPS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF backup authentication, password reset, authentication
6Paul D. Ezhilchelvan, Dylan Clarke, Isi Mitrani, Santosh K. Shrivastava Proactive Fortification of Fault-Tolerant Services. Search on Bibsonomy OPODIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Primary-Backup, Code randomization, Replication, State machines, Intrusion tolerance, Agreement, Analytical evaluations
6Colleen Swanson, David Jao A Study of Two-Party Certificateless Authenticated Key-Agreement Protocols. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF key agreement, certificateless public key cryptography
6Julien Bringer, Hervé Chabanne, Thomas Icart On Physical Obfuscation of Cryptographic Algorithms. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF POK, stream ciphers, masking, RFID tags, PUF
6Maciej Nikodem Boundary Scan Security Enhancements for a Cryptographic Hardware. Search on Bibsonomy EUROCAST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF IEEE 1149, side-channel attacks, countermeasures, boundary scan
6Andriy Myronenko, Xubo B. Song, David J. Sahn Maximum Likelihood Motion Estimation in 3D Echocardiography through Non-rigid Registration in Spherical Coordinates. Search on Bibsonomy FIMH The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
6Muxin Zhou, Zhenfu Cao Spatial Encryption under Simpler Assumption. Search on Bibsonomy ProvSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
6Ariel Futoransky, Fernando Miranda, José Ignacio Orlicki, Carlos Sarraute Simulating cyber-attacks for fun and profit. Search on Bibsonomy SimuTools The full citation details ... 2009 DBLP  DOI  BibTeX  RDF 0-day, network security, training, network simulation, vulnerability, exploit, penetration test, cyber-attack
6Amaldev Manuel, Ramaswamy Ramanujam Counting Multiplicity over Infinite Alphabets. Search on Bibsonomy RP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
6Zhi Zhang, Xiaoguang Dai, William S. W. Cheung, T. I. Yuk Evaluation of Union bounds for Space-Time codes based on a common function. Search on Bibsonomy CCECE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
6Bharat K. Bhargava, Ruy de Oliveira, Yu Zhang, Nwokedi C. Idika Addressing Collaborative Attacks and Defense in Ad Hoc Wireless Networks. Search on Bibsonomy ICDCS Workshops The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
6Tadahiko Murata, Akinori Taki Many-Objective Optimization for Knapsack Problems Using Correlation-Based Weighted Sum Approach. Search on Bibsonomy EMO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF problem correlation, weighted sum approach, archive-based approach, Many objective optimization
6Johannes Bader 0002, Dimo Brockhoff, Samuel Welten, Eckart Zitzler On Using Populations of Sets in Multiobjective Optimization. Search on Bibsonomy EMO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
6Martin Josef Geiger Multi-criteria Curriculum-Based Course Timetabling-A Comparison of a Weighted Sum and a Reference Point Based Approach. Search on Bibsonomy EMO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Multi-criteria timetabling, reference point approach, iterated local search, threshold accepting
6Ravinder Shankesi, Musab AlTurki, Ralf Sasse, Carl A. Gunter, José Meseguer 0001 Model-Checking DoS Amplification for VoIP Session Initiation. Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
6Nuno Filipe Escudeiro, Alípio Mário Jorge Efficient Coverage of Case Space with Active Learning. Search on Bibsonomy EPIA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
6Bryan Parno, Jonathan M. McCune, Dan Wendlandt, David G. Andersen, Adrian Perrig CLAMP: Practical Prevention of Large-Scale Data Leaks. Search on Bibsonomy SP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
6Mani Arun Kumar, Madan Gopal Text Categorization Using Fuzzy Proximal SVM and Distributional Clustering of Words. Search on Bibsonomy PAKDD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF proximal SVM, fuzzy proximal SVM, support vector machines, Text categorization, distributional clustering
6Jinzhu Chen, Guolong Chen, Wenzhong Guo A Discrete PSO for Multi-objective Optimization in VLSI Floorplanning. Search on Bibsonomy ISICA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF discrete PSO, MOP, floorplanning
6Michael Nelson 0002, Ani Nahapetian, Farinaz Koushanfar, Miodrag Potkonjak SVD-Based Ghost Circuitry Detection. Search on Bibsonomy Information Hiding The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Hardware Trojan horses, gate characterization, singular value decomposition, manufacturing variability
6Alper Kanak, Ibrahim Sogukpinar Classification Based Revocable Biometric Identity Code Generation. Search on Bibsonomy COST 2101/2102 Conference The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
6Ryan D. Riley, Xuxian Jiang, Dongyan Xu Multi-aspect profiling of kernel rootkit behavior. Search on Bibsonomy EuroSys The full citation details ... 2009 DBLP  DOI  BibTeX  RDF kernel rootkit, profiling, malware
6Diana Elena Comes, Steffen Bleul, Thomas Weise 0001, Kurt Geihs A Flexible Approach for Business Processes Monitoring. Search on Bibsonomy DAIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF QoS Aggregation, Quality of Service, Web Services, Monitoring, Business Processes, BPEL
6Jorge L. Hernandez-Ardieta, Ana Isabel González-Tablas Ferreres, Benjamín Ramos Formal Validation of OFEPSP+ with AVISPA. Search on Bibsonomy ARSPA-WITS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF AVISPA, security protocol, Fair exchange, SPAN, formal validation
6Chuong B. Do, Quoc V. Le, Chuan-Sheng Foo Proximal regularization for online and batch learning. Search on Bibsonomy ICML The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
6Simon Brodt, François Bry, Norbert Eisinger Search for More Declarativity. Search on Bibsonomy RR The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
6Rajiv Ramdhany, Paul Grace, Geoff Coulson, David Hutchison 0001 MANETKit: Supporting the Dynamic Deployment and Reconfiguration of Ad-Hoc Routing Protocols. Search on Bibsonomy Middleware The full citation details ... 2009 DBLP  DOI  BibTeX  RDF protocol frameworks, Ad-hoc routing
6Christian Ortolf, Christian Schindelhauer, Arne Vater Classifying peer-to-peer network coding schemes. Search on Bibsonomy SPAA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF peer-to-peer networks, network coding, bittorrent
6Aleksandra Karimaa Security Aspect of the Complexity of Modern Surveillance Systems - An Experience Report. Search on Bibsonomy ICECCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
6Ryan Cochran, Sherief Reda Spectral techniques for high-resolution thermal characterization with limited sensor data. Search on Bibsonomy DAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF spatial estimation, spectral methods, thermal management, thermal sensors
6Jie Zhang 0007, Nishant Patil, Arash Hazeghi, Subhasish Mitra Carbon nanotube circuits in the presence of carbon nanotube density variations. Search on Bibsonomy DAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF CNT correlation, CNT density variation, carbon nanotube, CNT
6Haibing Lu, Yingjiu Li, Vijayalakshmi Atluri, Jaideep Vaidya An efficient online auditing approach to limit private data disclosure. Search on Bibsonomy EDBT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
6Cong Yu 0001, Laks V. S. Lakshmanan, Sihem Amer-Yahia It takes variety to make a world: diversification in recommender systems. Search on Bibsonomy EDBT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
6Juan C. Burguillo-Rial A memetic framework for describing and simulating spatial prisoner's dilemma with coalition formation. Search on Bibsonomy AAMAS (1) The full citation details ... 2009 DBLP  BibTeX  RDF spatial prisoner's dilemma, coalition formation, evolutionary game theory, memetics
6Minyi Li 0001, Quoc Bao Vo, Ryszard Kowalczyk Searching for fair joint gains in agent-based negotiation. Search on Bibsonomy AAMAS (2) The full citation details ... 2009 DBLP  BibTeX  RDF joint gains, pareto-improvement, fairness, mediator, automated negotiation
6Piotr Szczechowiak, Anton Kargl, Michael Scott, Martin Collier On the application of pairing based cryptography to wireless sensor networks. Search on Bibsonomy WISEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF wireless sensor networks, implementation, security protocols, pairing-based cryptography
6Reza Shokri, Marcin Poturalski, Gael Ravot, Panos Papadimitratos, Jean-Pierre Hubaux A practical secure neighbor verification protocol for wireless sensor networks. Search on Bibsonomy WISEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF secure neighbor verification, wireless sensor networks
6Roberto Di Pietro, Claudio Soriente, Angelo Spognardi, Gene Tsudik Collaborative authentication in unattended WSNs. Search on Bibsonomy WISEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF wireless sensor networks, authentication, mobile adversary
6Jing Dong 0006, Reza Curtmola, Cristina Nita-Rotaru Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks. Search on Bibsonomy WISEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF network coding security, security, network coding, wireless network security, pollution attacks
6Loukas Lazos, Sisi Liu, Marwan Krunz Mitigating control-channel jamming attacks in multi-channel ad hoc networks. Search on Bibsonomy WISEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF ad hoc networks, denial of service, multi channel, jamming, control channel
6Wolfgang Weiss, Tobias Bürger, Robert Villa, P. Punitha 0001, Wolfgang Halb Statement-Based Semantic Annotation of Media Resources. Search on Bibsonomy SAMT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF semantic media asset management, Semantic annotation, Information storage and retrieval
6Stefania Castellani, Aaron N. Kaplan, Frédéric Roulland, Jutta Willamowski, Antonietta Grasso Creation and Maintenance of Query Expansion Rules. Search on Bibsonomy ICEIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Domain-specific thesaurus, Information retrieval, Query expansion, Knowledge base management
6Rafael Alonso Clarke, Paola Scifo, Giovanna Rizzo, Flavio Dell'Acqua, Giuseppe Scotti, Ferruccio Fazio Noise Correction on Rician Distributed Data for Fibre Orientation Estimators. Search on Bibsonomy IEEE Trans. Medical Imaging The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
6Kui Ren 0001, Wenjing Lou, Yanchao Zhang LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Security, Wireless sensor networks, integrity and protection
6Jun Yan 0008, Wei Zhang 0002 A time-predictable VLIW processor and its compiler support. Search on Bibsonomy Real Time Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF if-conversion, Compiler, VLIW, WCET analysis, Time-predictability
6Ricardo Marau, Pedro Leite, Manel Velasco, Pau Martí, Luís Almeida 0001, Paulo Pedreiras, Josep M. Fuertes Performing Flexible Control on Low-Cost Microcontrollers Using a Minimal Real-Time Kernel. Search on Bibsonomy IEEE Trans. Ind. Informatics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
6Michael Fink 0002, Michele Covell, Shumeet Baluja Mass personalization: social and interactive applications using sound-track identification. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Mass personalization, Mass media, Audio-finger printing, Real-time, Television
6Nick McKeown, Thomas E. Anderson, Hari Balakrishnan, Guru M. Parulkar, Larry L. Peterson, Jennifer Rexford, Scott Shenker, Jonathan S. Turner OpenFlow: enabling innovation in campus networks. Search on Bibsonomy Comput. Commun. Rev. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF ethernet switch, flow-based, virtualization
6Aaron Walters, David Zage, Cristina Nita-Rotaru A framework for mitigating attacks against measurement-based adaptation mechanisms in unstructured multicast overlay networks. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, adaptivity, overlay networks, insider attacks
6Shamik Sengupta, Mainak Chatterjee, Samrat Ganguly Improving Quality of VoIP Streams over WiMax. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2008 DBLP  DOI  BibTeX  RDF R-score, aggregation, VoIP, WiMax, FEC, fragmentation, ARQ
6János Tapolcai, Pin-Han Ho, Anwar Haque TROP: A Novel Approximate Link-State Dissemination Framework For Dynamic Survivable Routing in MPLS Networks. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Shared protection, Stale link-state, Min-Plus algebra, Singular value decomposition (SVD), Multi-Protocol Label Switching (MPLS)
6Bingbing Ni, Ashraf A. Kassim, Stefan Winkler 0001 A Hybrid Framework for 3-D Human Motion Tracking. Search on Bibsonomy IEEE Trans. Circuits Syst. Video Technol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
6Xiangyang Ji, Yanyan Zheng, Debin Zhao, Feng Wu 0001, Wen Gao 0001 FGS Coding Using Cycle-Based Leaky Prediction Through Multiple Leaky Factors. Search on Bibsonomy IEEE Trans. Circuits Syst. Video Technol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
6Lingxi Li, Christoforos N. Hadjicostis, R. S. Sreenivas Designs of Bisimilar Petri Net Controllers With Fault Tolerance Capabilities. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. Part A The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
6Dariusz Czysz, Grzegorz Mrugalski, Janusz Rajski, Jerzy Tyszer Low-Power Test Data Application in EDT Environment Through Decompressor Freeze. Search on Bibsonomy IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
Displaying result #901 - #1000 of 2279 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license