default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 124 matches
- 2009
- M. I. Afzal, Shin Seoyong, Waqar Mahmood, Sajid Sheikh Muhammad:
Optical wireless recharging model for wireless sensor nodes by using Corner Cube Retroreflectors (CCRs). ICHIT 2009: 626-631 - Yoon-Ae Ahn:
Context awareness inference engine for location based applications. ICHIT 2009: 213-216 - Raja Adeel Akhtar, Abid Ali Minhas, Sohail Jabbar:
Adaptive intra cluster routing for wireless sensor networks. ICHIT 2009: 118-123 - Songnan Bai, Zequn Huang, Hanbyeog Cho, Jaeil Jung:
Movement-aware alternative path routing protocol for vehicular multi-hop communications. ICHIT 2009: 361-367 - Reza Barazideh, Babak Seyfe:
Adaptive PSAM in SIMO systems with imperfect CSI in Rayleigh fading channels. ICHIT 2009: 124-129 - Adrian Brezulianu, Monica Fira, Lucian Fira:
A genetic algorithm approach for a constrained employee scheduling problem as applied to employees at mall type shops. ICHIT 2009: 497-501 - Vignesh Kumar Chandhrasekran, Bhaskar Prasad Rimal, Eunmi Choi, Dugki Min:
Hardware-in-the-Loop simulation of UAV non-linear control system of mini-helicopter. ICHIT 2009: 288-295 - Moon-Haeng Cho, Chan-Woo Chan, Cheol-Hoon Lee:
A framework to support real-time features of intelligent service robots. ICHIT 2009: 8-12 - Jae Hyoung Cho, Jae-Oh Lee:
The structure of the SDP using enablers in the IMS. ICHIT 2009: 451-455 - Beoungil Cho, Hyunsang Youn, Eunseok Lee:
Performability analysis method from reliability and availability. ICHIT 2009: 401-407 - Won-Ho Choi, Se-Won Oh, Gwang Jung, Min-Soo Jung:
Efficient execution of application applets based on persistent object caching in Java card system. ICHIT 2009: 268-272 - Iulian B. Ciocoiu:
ECG signal compression using 2D wavelet foveation. ICHIT 2009: 576-580 - Ruoyu Du, Hyo Jong Lee:
A modified-FCM segmentation algorithm for brain MR images. ICHIT 2009: 25-27 - Burkhard Englert, Pritesh Shah:
On the design and implementation of a secure online password vault. ICHIT 2009: 375-382 - Monica Fira, Liviu Goras:
Biomedical signal compression based on basis pursuit. ICHIT 2009: 541-545 - Haosong Gou, Gang Li, Younghwan Yoo:
A partition-based centralized LEACH algorithm for wireless sensor networks using solar energy. ICHIT 2009: 60-66 - David Grunberg, Robert Ellenberg, Youngmoo E. Kim, Paul Y. Oh:
Creating an autonomous dancing robot. ICHIT 2009: 221-227 - Soojung Ha, Seyun Kim, Minkook Suh, Hyunwoo Seong, Kwang Mo Jeong, Sung-Ho Kim:
A statistical method for structure learning of Bayesian networks from data. ICHIT 2009: 75-78 - ChangHo Han, Choonsuk Oh, EunCheol Shin, ByoungWook Choi:
Comparing two methods for acquiring 3D data of motion capture system by using PSD camera and CCD camera. ICHIT 2009: 558-563 - Insung Han, Hwangbin Ryou:
Service discovery mechanism based on trustable DHT in MANET. ICHIT 2009: 417-424 - ChangHo Han, Youngkee Ryu, Choonsuk Oh:
A 3D coordinate estimation by using reformed two IR LED markers and PSD camera. ICHIT 2009: 473-476 - ChangHo Han, Youngkee Ryu, Choonsuk Oh:
A study on enhanced algorithms for detecting defects of glasses. ICHIT 2009: 521-524 - Alberto Yukinobu Hata, Denis Fernando Wolf, Gustavo Pessin, Fernando Santos Osório:
Terrain mapping and classification using neural networks. ICHIT 2009: 438-442 - Inhwa Hong, Myungseok Kang, Jeongjin Kang, Hagbae Kim:
A context-aware service model using a multi-level prediction algorithm in smart home environments. ICHIT 2009: 485-490 - Hyeyeon Hong, Hanku Lee:
APJava: an aspect-oriented parallel programming model in Java. ICHIT 2009: 530-536 - YouSik Hong, Sun-Jin Oh, Cheonshik Kim, Yong Soon Im, Gyoo-Seok Choi, Eun-Jun Yoon, Yu Cheol Jeon, Chanwoo Moon, Myeon-Koo Kang, Jeongsook Kim:
A study on intelligent cyber university. ICHIT 2009: 525-529 - YouSik Hong, Su-Bong Ryou, Cheonshik Kim, Young Im Cho, Kyung-Sook Kim, Jeong Jin Kang:
Optimal green time calculation using artificial intelligence. ICHIT 2009: 632-636 - Daniel Howard:
Bio-inspired simulation tool for PERT. ICHIT 2009: 537-540 - Tao Hu, May Huang:
A new stereo matching algorithm for binocular vision. ICHIT 2009: 42-44 - Pei-Sheng Huang, Chung-Huang Yang, Tae-Nam Ahn:
Design and implementation of a distributed early warning system combined with intrusion detection system and honeypot. ICHIT 2009: 232-238
skipping 94 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-10 12:36 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint