default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 44 matches
- 2013
- Nagappa U. Bhajantri, Pradeep Kumar R, P. Nagabhushan:
Discriminatory Projection of Camouflaged Texture Through Line Masks. J. Inf. Process. Syst. 9(4): 660 (2013) - Ved Prakash Bhardwaj, Nitin:
On the Minimization of Crosstalk Conflicts in a Destination Based Modified Omega Network. J. Inf. Process. Syst. 9(2): 301-314 (2013) - Menaouer Brahami, Baghdad Atmani, Nada Matta:
Dynamic knowledge mapping guided by data mining: Application on Healthcare. J. Inf. Process. Syst. 9(1): 1-30 (2013) - Wei-Ho Chung, Sunil Kumar, Seethal Paluri, Santosh V. Nagaraj, Annamalai Annamalai, John D. Matyjas:
A Cross-Layer Unequal Error Protection Scheme for Prioritized H.264 Video using RCPC Codes and Hierarchical QAM. J. Inf. Process. Syst. 9(1): 53-68 (2013) - Alexander Crowell, Beng Heng Ng, Earlence Fernandes, Atul Prakash:
The Confinement Problem: 40 Years Later. J. Inf. Process. Syst. 9(2): 189-204 (2013) - Tarun Dubey, Om Prakash Sahu:
Self-Localized Packet Forwarding in Wireless Sensor Networks. J. Inf. Process. Syst. 9(3): 477-488 (2013) - Deepak Ghimire, Joonwhoan Lee:
A Robust Face Detection Method Based on Skin Color and Edges. J. Inf. Process. Syst. 9(1): 141-156 (2013) - Moneeb Gohar, Seok Joo Koh:
A Network-Based Handover Scheme in HIP-Based Mobile Networks. J. Inf. Process. Syst. 9(4): 651-659 (2013) - Pooja Gupta, Sandeep K. Singh, Divakar Yadav, A. K. Sharma:
An Improved Approach to Ranking Web Documents. J. Inf. Process. Syst. 9(2): 217-236 (2013) - Thang Hoang, Thuc Dinh Nguyen, Chuyen Luong, Son Do, Deokjai Choi:
Adaptive Cross-Device Gait Recognition Using a Mobile Accelerometer. J. Inf. Process. Syst. 9(2): 333 (2013) - Ro Man Hwang, Soo Kyun Kim, Syungog An, Dong-Won Park:
The Architectural Pattern of a Highly Extensible System for the Asynchronous Processing of a Large Amount of Data. J. Inf. Process. Syst. 9(4): 567-574 (2013) - Young-Sup Hwang, Jin Baek Kwon, Jae Chan Moon, Seong Je Cho:
Classifying Malicious Web Pages by Using an Adaptive Support Vector Machine. J. Inf. Process. Syst. 9(3): 395-404 (2013) - Woon-hae Jeong, Se-jun Kim, Doo-Soon Park, Jin Kwak:
Performance Improvement of a Movie Recommendation System based on Personal Propensity and Secure Collaborative Filtering. J. Inf. Process. Syst. 9(1): 157-172 (2013) - Mamta Juneja, Parvinder Singh Sandhu:
A New Approach for Information Security using an Improved Steganography Technique. J. Inf. Process. Syst. 9(3): 405-424 (2013) - Pyung Soo Kim:
An Architecture for Home-Oriented IPTV Service Platform on Residential Gateway. J. Inf. Process. Syst. 9(3): 425-434 (2013) - Sung Gyun Kim, Yeong-Geon Seo:
A TRUS Prostate Segmentation using Gabor Texture Features and Snake-like Contour. J. Inf. Process. Syst. 9(1): 103-116 (2013) - Do-keun Kwon, Kihyun Chung, Kyunghee Choi:
A Dynamic Zigbee Protocol for Reducing Power Consumption. J. Inf. Process. Syst. 9(1): 41-52 (2013) - A-Rong Kwon, Kyung-Soon Lee:
Opinion Bias Detection Based on Social Opinions for Twitter. J. Inf. Process. Syst. 9(4): 538-547 (2013) - Hoo-Rock Lee, Kyung-Yul Chung, Kyoung-Son Jhang:
A Study of Wireless Sensor Network Routing Protocols for Maintenance Access Hatch Condition Surveillance. J. Inf. Process. Syst. 9(2): 237-246 (2013) - Hyunjung Lee, Harksoo Kim, Jungyun Seo:
An Integrated Neural Network Model for Domain Action Determination in Goal-Oriented Dialogues. J. Inf. Process. Syst. 9(2): 259-270 (2013) - Sun-Ho Lee, Im-Yeong Lee:
A Secure Index Management Scheme for Providing Data Sharing in Cloud Storage. J. Inf. Process. Syst. 9(2): 287-300 (2013) - Samuel Sangkon Lee, Masami Shishibori, Chia Y. Han:
An Improvement Video Search Method for VP-Tree by using a Trigonometric Inequality. J. Inf. Process. Syst. 9(2): 315-332 (2013) - Seiyoung Lee, Hwan-Seung Yong:
Agile Software Development Framework in a Small Project Environment. J. Inf. Process. Syst. 9(1): 69-88 (2013) - Mingyu Lim, Yunjin Lee:
A Simulation Model of Object Movement for Evaluating the Communication Load in Networked Virtual Environments. J. Inf. Process. Syst. 9(3): 489-498 (2013) - Junping Liu, Sang-Hwa Chung:
An Efficient Load Balancing Scheme for Multi-Gateways in Wireless Mesh Networks. J. Inf. Process. Syst. 9(3): 365-378 (2013) - Komal Mahajan, Ansuyia Makroo, Deepak Dahiya:
Round Robin with Server Affinity: A VM Load Balancing Algorithm for Cloud Based Infrastructure. J. Inf. Process. Syst. 9(3): 379-394 (2013) - Huynh Trung Manh, Gueesang Lee:
Small Object Segmentation Based on Visual Saliency in Natural Images. J. Inf. Process. Syst. 9(4): 592-601 (2013) - Gawed M. Nagi, Rahmita Wirza O. K. Rahmat, Fatimah Khalid, Muhamad Taufik Abdullah:
Region-Based Facial Expression Recognition in Still Images. J. Inf. Process. Syst. 9(1): 173 (2013) - Erdenetuya Namsrai, Tsendsuren Munkhdalai, Meijing Li, Jung-Hoon Shin, Oyun-Erdene Namsrai, Keun Ho Ryu:
A Feature Selection-based Ensemble Method for Arrhythmia Classification. J. Inf. Process. Syst. 9(1): 31-40 (2013) - Kancherla Jonah Nishanth, Vadlamani Ravi:
A Computational Intelligence Based Online Data Imputation Method: An Application For Banking. J. Inf. Process. Syst. 9(4): 633-650 (2013)
skipping 14 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-22 08:37 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint