default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 107 matches
- 2005
- Dario Bottazzi, Antonio Corradi, Rebecca Montanari:
Enabling context-aware group collaboration in MANETs. ISADS 2005: 310-318 - Jiannong Cao, Wei Xu, Alvin T. S. Chan, Jing Li:
A reliable multicast protocol for mailbox-based mobile agent communications. ISADS 2005: 74-81 - Lin Chen, Huan-zhou Li, Yong Hu:
A digital certificate revocation status promulgation scheme based on square residue. ISADS 2005: 208-211 - Ningjiang Chen, Jun Wei, Bo Yang, Jinling Wang, Tao Huang:
A QoS-enable failure detection framework for J2EE application server. ISADS 2005: 542-546 - Shih-Chien Chou:
ADPE: agent-based decentralized process engine. ISADS 2005: 405-412 - Ingo Dahm, Matthias Hebbel, Matthias Hülsbusch, Jochen Kerdels, Walter Nisticò, Carsten Schumann, Michael Wachter:
Decentral control of a robot-swarm. ISADS 2005: 347-351 - Mosaab Daoud, Qusay H. Mahmoud:
Maximizing the route reliability of mobile agents in unreliable environments. ISADS 2005: 97-104 - Huiwen Deng, Yi Wang:
An adaptive fuzzy logic controller with self-tuning scaling factors based on neural networks. ISADS 2005: 392-396 - Yuan Ding, Guo Tao, Pingzhi Fan:
The design and analysis of an electronic evidence and non-repudiation protocol. ISADS 2005: 570-573 - Olaf Drögehorn, Klaus David:
An architectural approach for building platforms is still needed. ISADS 2005: 118-120 - Olaf Drögehorn, Björn Wüst, Klaus David:
Personalised applications and services for a mobile user. ISADS 2005: 473-479 - Q. J. Duan, R. X. Wang, H. S. Feng, L. G. Wang:
Applying synthesized immune networks hypothesis to mobile robots. ISADS 2005: 69-73 - Wang Feng, Xuwei Li, Zhu Hong:
An immune-based model for Web data mining. ISADS 2005: 547-551 - Motohisa Funabashi, Koichi Homma, Toshiro Sasaki:
Socio-technical implications of the ubiquitous information systems. ISADS 2005: 116-117 - Matohisa Funabashi, Koichi Homma, Toshiro Sasaki:
The Yaoyorozu project designing ubiquitous information society in 2010. ISADS 2005: 480-485 - Junichi Funasaka, Kenji Ishida, Hiroyasu Obata, Yukiyoshi Jutori:
A study on primary path switching strategy of SCTP. ISADS 2005: 536-541 - Anurag Garg, Roberto Battiti, Roberto G. Cascella:
Reputation management: experiments on the robustness of ROCQ. ISADS 2005: 725-730 - Xiantai Gou, Weidong Jin:
Multi-agent system for security auditing and worm containment in metropolitan area networks. ISADS 2005: 201-207 - Qing He, Xiaoyun Feng, Jinling Zhu, Hongyun He:
An ideal run mode for mass transit based on ADS. ISADS 2005: 267-274 - Lester T. W. Ho, Francis J. Mullany, Holger Claussen, Louis G. Samuel:
Autonomous organization of wireless network transport in a multi-provider environment. ISADS 2005: 719-724 - Yuji Horikoshi, Naohiro Kaji, Hisayuki Kuriyama, Yosuke Sugiyama:
Autonomous cooperation technology for real-time marketing with high accuracy in autonomous decentralized community system. ISADS 2005: 328-335 - Zhenchun Huang, Bin Du, Gu Lei, He Chuan, Sanli Li:
Distributed grid resource registry meta-service: design and implementation. ISADS 2005: 531-535 - Huihui Huang, Wei Huang, Zhigang Liu, Weirong Chen, Qingquan Qian:
Content-based color image retrieval via lifting scheme. ISADS 2005: 378-383 - Zhixing Huang, Yuhui Qiu:
A bidding strategy for advance resource reservation in sequential ascending auctions. ISADS 2005: 284-288 - Hojae Hyun, Kwangman Koh, Sunyoung Han, Moon-hae Kim, Chun-Hyon Chang:
Lightweight home network middleware supporting mobility management. ISADS 2005: 435-442 - Shinji Inoue, Naoki Ueno, Makoto Amamiya, Yoshiaki Kakuda:
A multiagent-based path rerouting method in MPLS networks. ISADS 2005: 562-565 - Yoshio Ishida:
The future of high-speed train. ISADS 2005: 415-418 - Mika Ishizuka, Masaki Aida:
Achieving power-law placement in wireless sensor networks. ISADS 2005: 661-666 - Yanqing Jiang, Xiaodong Lu, Ivan Luque, Miho Kanda, Koichi Moriyama, Ryuji Takanuki, Yasushi Kuba:
Autonomous node reallocation for achieving load balance under changing users' preference. ISADS 2005: 624-629 - Isao Kaji, Kenji Kano:
Considerations on transaction response time and configuration checking in autonomous decentralized DB (ADDS). ISADS 2005: 33-40
skipping 77 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-12-22 13:42 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint