|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 709 occurrences of 525 keywords
|
|
|
Results
Found 2929 publication records. Showing 2899 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
123 | Inyoung Shin, Ngoc Duy Pham, Hyunseung Choo |
Virtual Convex Polygon Based Hole Boundary Detection and Time Delay Based Hole Detour Scheme in WSNs. |
HCI (8) |
2009 |
DBLP DOI BibTeX RDF |
Hole Problem, Wireless Sensor Networks (WSNs), Geographic Routing |
122 | Nicola Santoro |
Close Encounters with a Black Hole or Explorations and Gatherings in Dangerous Graphs. |
FUN |
2007 |
DBLP DOI BibTeX RDF |
Harmful Host, Anonymous Agents, Robots, Mobile Agents, Asynchronous, Exploration, Tokens, Rendezvous, Anonymous Networks, Whiteboards, Gathering |
97 | Marcin Janaszewski, Michel Couprie, Laurent Babout |
Geometric Approach to Hole Segmentation and Hole Closing in 3D Volumetric Objects. |
CIARP |
2009 |
DBLP DOI BibTeX RDF |
|
95 | Fucai Yu, Soochang Park, Ye Tian, Minsuk Jin, Sang-Ha Kim 0001 |
Efficient Hole Detour Scheme for Geographic Routing in Wireless Sensor Networks. |
VTC Spring |
2008 |
DBLP DOI BibTeX RDF |
|
92 | Ye Tian, Fucai Yu, Younghwan Choi, Soochang Park, Euisin Lee, Min-Sook Jin, Sang-Ha Kim 0001 |
Energy-Efficient Data Dissemination Protocol for Detouring Routing Holes in Wireless Sensor Networks. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
84 | Hesiri Weerasinghe, Huirong Fu |
Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation. |
FGCN (2) |
2007 |
DBLP DOI BibTeX RDF |
Cooperative Black Hole attack, MANET, AODV |
84 | Jurek Czyzowicz, Dariusz R. Kowalski, Euripides Markou, Andrzej Pelc |
Searching for a Black Hole in Tree Networks. |
OPODIS |
2004 |
DBLP DOI BibTeX RDF |
algorithm, mobile agent, tree, black hole |
76 | Junyu Dong, Sha Ma, Li Li, Zhongda Yu |
Hole Filling on Three-Dimensional Surface Texture. |
ICME |
2007 |
DBLP DOI BibTeX RDF |
|
75 | Fucai Yu, Euisin Lee, Younghwan Choi, Soochang Park, Donghun Lee, Ye Tian, Sang-Ha Kim 0001 |
A modeling for hole problem in wireless sensor networks. |
IWCMC |
2007 |
DBLP DOI BibTeX RDF |
hole problem, wireless sensor network, geographic forwarding |
75 | Stefan Dobrev, Nicola Santoro, Wei Shi 0001 |
Locating a Black Hole in an Un-oriented Ring Using Tokens: The Case of Scattered Agents. |
Euro-Par |
2007 |
DBLP DOI BibTeX RDF |
Un-oriented, Mobile Agent, Anonymous, Asynchronous, Ring, Token, Scattered, Black Hole |
75 | Jian Yin 0006, Sanjay Kumar Madria |
A Hierarchical Secure Routing Protocol against Black Hole Attacks in Sensor Networks. |
SUTC (1) |
2006 |
DBLP DOI BibTeX RDF |
Black hole attack, Sensor networks |
75 | Ralf Klasing, Euripides Markou, Tomasz Radzik, Fabiano Sarracco |
Approximation Bounds for Black Hole Search Problems. |
OPODIS |
2005 |
DBLP DOI BibTeX RDF |
black hole search, approximation algorithm, mobile agent, inapproximability, graph exploration |
75 | Ralf Klasing, Euripides Markou, Tomasz Radzik, Fabiano Sarracco |
Hardness and Approximation Results for Black Hole Search in Arbitrary Graphs. |
SIROCCO |
2005 |
DBLP DOI BibTeX RDF |
black hole search, approximation algorithm, mobile agent, NP-hardness, graph exploration |
66 | Chih-Yung Chang, Wei-Cheng Chu, Chih-Yu Lin, Chien-Fu Cheng |
Energy-balanced hole-movement mechanism for temporal full-coverage in mobile WSNs. |
IWCMC |
2010 |
DBLP DOI BibTeX RDF |
wireless sensor networks, coverage, mobile sensor, hole |
66 | Akiyo Nadamoto, Eiji Aramaki, Takeshi Abekawa, Yohei Murakami |
Content hole search in community-type content. |
WWW |
2009 |
DBLP DOI BibTeX RDF |
content hole search, community, blog, SNS |
66 | Chang-Wu Yu 0001, Tung-Kuang Wu, Rei-Heng Cheng, Shun Chao Chang |
A Distributed and Cooperative Black Hole Node Detection and Elimination Mechanism for Ad Hoc Networks. |
PAKDD Workshops |
2007 |
DBLP DOI BibTeX RDF |
Security, Ad Hoc Networks, Wireless Networks, Black Hole |
58 | John William Branch, Flavio Prieto, Pierre Boulanger |
A Hole-Filling Algorithm for Triangular Meshes Using Local Radial Basis Function. |
IMR |
2006 |
DBLP DOI BibTeX RDF |
|
58 | John William Branch, Flavio Prieto, Pierre Boulanger |
Automatic Hole-Filling of Triangular Meshes Using Local Radial Basis Function. |
3DPVT |
2006 |
DBLP DOI BibTeX RDF |
|
58 | Stefan Dobrev, Paola Flocchini, Nicola Santoro |
Improved Bounds for Optimal Black Hole Search with a Network Map. |
SIROCCO |
2004 |
DBLP DOI BibTeX RDF |
|
56 | Wei Shi 0001 |
Black Hole Search with Tokens in Interconnected Networks. |
SSS |
2009 |
DBLP DOI BibTeX RDF |
Un-oriented, Mobile Agent, Ring, Token, Scattered, Black Hole |
56 | Wei Zhao, Shuming Gao, Hongwei Lin |
A robust hole-filling algorithm for triangular mesh. |
Vis. Comput. |
2007 |
DBLP DOI BibTeX RDF |
Poisson equation, Triangular mesh, Hole-filling, Harmonic Function |
56 | K. Murugesan, P. Elango |
CNN Based Hole Filler Template Design Using Numerical Integration Techniques. |
ICANN (1) |
2007 |
DBLP DOI BibTeX RDF |
Hole-filler template, Numerical Integration algorithms, Euler method, Modified-Euler method, RK-method, Cellular neural network |
56 | Stefan Dobrev, Paola Flocchini, Giuseppe Prencipe, Nicola Santoro |
Searching for a black hole in arbitrary networks: optimal mobile agents protocols. |
Distributed Comput. |
2006 |
DBLP DOI BibTeX RDF |
Topological knowledge, Mobile agents, Distributed search, Black hole, Malicious host |
56 | Sameer Singh 0002, Markos Markou |
A black hole novelty detector for video analysis. |
Pattern Anal. Appl. |
2005 |
DBLP DOI BibTeX RDF |
Neural networks, Video analysis, Novelty detection, Object classification, Black hole |
56 | Bertram J. Unger, A. Nicolaidis, Peter J. Berkelman, A. Thompson, Susan J. Lederman, Roberta L. Klatzky, Ralph L. Hollis |
Virtual Peg-in-Hole Performance Using a 6-DOF Magnetic Levitation Haptic Device: Comparison with Real Forces and with Visual Guidance Alone. |
Symposium on Haptic Interfaces for Virtual Environment and Teleoperator Systems |
2002 |
DBLP DOI BibTeX RDF |
peg-in-hole, virtual reality, haptics, force feedback, task analysis |
56 | Subbiah Baskaran, Narayanan Ramachandran, David Noever |
Probabilistic and Other Neural Nets in Multi-Hole Probe Calibration and Flow Angularity Pattern Recognition. |
Pattern Anal. Appl. |
1999 |
DBLP DOI BibTeX RDF |
Calibration wind tunnel, Multi-hole probes, Probabilistic neural nets, Numerical simulation, Fluid dynamics |
55 | M. F. Hole, Kjell Jørgen Hole |
Low-complexity decoding of partial unit memory codes on precoded partial-response channels. |
IEEE Trans. Inf. Theory |
1997 |
DBLP DOI BibTeX RDF |
|
55 | M. F. Hole, Kjell Jørgen Hole |
Tight bounds on the minimum average weight per branch for rate (N-1)/N convolutional codes. |
IEEE Trans. Inf. Theory |
1997 |
DBLP DOI BibTeX RDF |
|
55 | Fucai Yu, Younghwan Choi, Soochang Park, Euisin Lee, Ye Tian, Sang-Ha Kim 0001 |
Virtual Circle Based Geometric Modeling of Holes for Geographic Routing. |
WCNC |
2008 |
DBLP DOI BibTeX RDF |
|
52 | Kostas Daniilidis, Reinhard Klette, Ales Leonardis (eds.) |
Imaging Beyond the Pin-hole Camera. 12th Seminar on Theoretical Foundations of Computer Vision, 13.06. - 18.06.2004 |
Imaging Beyond the Pin-hole Camera. 12th Seminar on Theoretical Foundations of Computer Vision |
2004 |
DBLP BibTeX RDF |
|
52 | Ralf Reulke, Aloysius Wehr, Denis Griesbach |
Mobile Panoramic Mapping using CCD-Line Camera and Laser Scanner. |
Imaging Beyond the Pin-hole Camera. 12th Seminar on Theoretical Foundations of Computer Vision |
2004 |
DBLP BibTeX RDF |
|
52 | Kostas Daniilidis, Reinhard Klette, Ales Leonardis |
04251 - Imaging Beyond the Pinhole Camera. |
Imaging Beyond the Pin-hole Camera. 12th Seminar on Theoretical Foundations of Computer Vision |
2004 |
DBLP BibTeX RDF |
|
51 | E. L. Lohse |
Hollerith punched card code. |
Commun. ACM |
1968 |
DBLP DOI BibTeX RDF |
USA standard, card code, hole-patterns, hole-patterns assignment, punched card hole, punched card systems, punched code |
49 | Huawei Miao, Chia-Ching Ooi, Xiaowen Wu, Christian Schindelhauer |
Coverage-hole trap model in target tracking using distributed relay-robot network. |
SAC |
2010 |
DBLP DOI BibTeX RDF |
|
49 | Stefan Dobrev, Paola Flocchini, Giuseppe Prencipe, Nicola Santoro |
Mobile Search for a Black Hole in an Anonymous Ring. |
Algorithmica |
2007 |
DBLP DOI BibTeX RDF |
|
49 | Stefan Dobrev, Nicola Santoro, Wei Shi 0001 |
Scattered Black Hole Search in an Oriented Ring using Tokens. |
IPDPS |
2007 |
DBLP DOI BibTeX RDF |
|
49 | Max J. Egenhofer, Maria Vasardani |
Spatial Reasoning with a Hole. |
COSIT |
2007 |
DBLP DOI BibTeX RDF |
|
49 | Amir Averbuch, G. Gelles, Alon Schclar |
Fast Hole-Filling in Images Via Fast Comparison of Incomplete Patches. |
MRCS |
2006 |
DBLP DOI BibTeX RDF |
|
49 | Stefan Dobrev, Paola Flocchini, Rastislav Kralovic, Nicola Santoro |
Exploring an Unknown Graph to Locate a Black Hole Using Tokens. |
IFIP TCS |
2006 |
DBLP DOI BibTeX RDF |
|
49 | Stefan Dobrev, Paola Flocchini, Giuseppe Prencipe, Nicola Santoro |
Mobile Search for a Black Hole in an Anonymous Ring. |
DISC |
2001 |
DBLP DOI BibTeX RDF |
|
47 | Akiyo Nadamoto, Eiji Aramaki, Takeshi Abekawa, Yohei Murakami |
Content hole search in community-type content using Wikipedia. |
iiWAS |
2009 |
DBLP DOI BibTeX RDF |
content hole search, community, blog, SNS |
47 | Stefan Dobrev, Paola Flocchini, Nicola Santoro |
Cycling Through a Dangerous Network: A Simple Efficient Strategy for Black Hole Search. |
ICDCS |
2006 |
DBLP DOI BibTeX RDF |
Undetectable Failure, Black Hole Search, Mobile Agents, Malicious Host |
47 | Colin Cooper, Ralf Klasing, Tomasz Radzik |
Searching for Black-Hole Faults in a Network Using Multiple Agents. |
OPODIS |
2006 |
DBLP DOI BibTeX RDF |
black hole faults, mobile agent, Graph exploration |
47 | Yanqiong Fei, Xifang Zhao |
An Assembly Process Modeling and Analysis for Robotic Multiple Peg-in-hole. |
J. Intell. Robotic Syst. |
2003 |
DBLP DOI BibTeX RDF |
assembly process, multiple peg-in-hole |
47 | Stefan S. Dantchev |
Resolution Width-Size Trade-offs for the Pigeon-Hole Principle. |
CCC |
2002 |
DBLP DOI BibTeX RDF |
Pigeon-Hole Principle, Width-Size trade-off, Resolution, Propositional Proof Complexity |
46 | Marwan Fayed, Hussein T. Mouftah |
Characterizing the Impact of Routing Holes on Geographic Routing. |
Systems Communications |
2005 |
DBLP DOI BibTeX RDF |
|
46 | Ying-Hong Wang, Kuo-Feng Huang, Shaing-Ting Lin |
A Grid-Based Hole Detection Scheme in WSNs. |
NBiS |
2011 |
DBLP DOI BibTeX RDF |
Grid-based network, Hole Detection, Wireless Sensor Networks, Coverage Hole |
46 | Jiwen Cai, Ping Yi, Jialin Chen, Zhiyang Wang, Ning Liu |
An Adaptive Approach to Detecting Black and Gray Hole Attacks in Ad Hoc Network. |
AINA |
2010 |
DBLP DOI BibTeX RDF |
Gray Hole, Intrusion Detection, Ad Hoc, Cross Layer Design, DSR, Black Hole |
44 | Gen Li, Xiuzi Ye, Sanyuan Zhang |
An algorithm for filling complex holes in reverse engineering. |
Eng. Comput. |
2008 |
DBLP DOI BibTeX RDF |
Reverse engineering, Point cloud, Triangular mesh, Hole filling |
44 | Nikolaos C. Gabrielides, Alexandros I. Ginnis, Panagiotis D. Kaklis |
Constructing smooth branching surfaces from cross sections. |
Symposium on Solid and Physical Modeling |
2006 |
DBLP DOI BibTeX RDF |
G1 surfaces, branching surfaces, design, reconstruction, skinning, trimming, hole filling, cross sections, shape preserving interpolation |
40 | Soufiene Djahel, Farid Naït-Abdesselam, Ashfaq A. Khokhar |
An Acknowledgment-Based Scheme to Defend Against Cooperative Black Hole Attacks in Optimized Link State Routing Protocol. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
40 | Elmar Gerhards-Padilla, Nils Aschenbruck, Peter Martini, Marko Jahnke, Jens Tölle |
Detecting Black Hole Attacks in Tactical MANETs using Topology Graphs. |
LCN |
2007 |
DBLP DOI BibTeX RDF |
|
40 | Mingxi Zhao, Lizhuang Ma, Zhihong Mao, Zhong Li |
Feature Sensitive Hole Filling with Crest Lines. |
ICNC (2) |
2006 |
DBLP DOI BibTeX RDF |
|
40 | Stefan Dobrev, Rastislav Kralovic, Nicola Santoro, Wei Shi 0001 |
Black Hole Search in Asynchronous Rings Using Tokens. |
CIAC |
2006 |
DBLP DOI BibTeX RDF |
|
40 | Stefan Funke |
Topological hole detection in wireless sensor networks and its applications. |
DIALM-POMC |
2005 |
DBLP DOI BibTeX RDF |
routing, graph theory, topology, embedding, virtual coordinates |
40 | Stefan Dobrev, Paola Flocchini, Giuseppe Prencipe, Nicola Santoro |
Multiple Agents RendezVous in a Ring in Spite of a Black Hole. |
OPODIS |
2003 |
DBLP DOI BibTeX RDF |
|
40 | Graham M. Seed, Douglas E. R. Clark, Raffaella Ocone, Xiaoyan Y. Yang |
Four Colouring the Vertices of the Triangulation of a Polygon Containing a Hole. |
ICCSA (3) |
2003 |
DBLP DOI BibTeX RDF |
|
40 | Josef Pauli, Arne Schmidt 0002, Gerald Sommer |
Servoing Mechanisms for Peg-In-Hole Assembly Operations. |
RobVis |
2001 |
DBLP DOI BibTeX RDF |
|
40 | Michele Conforti, Gérard Cornuéjols, Ajai Kapoor, Kristina Vuskovic |
Finding an Even Hole in a Graph. |
FOCS |
1997 |
DBLP DOI BibTeX RDF |
|
38 | Martin P. van Exter, Erwin Altewischer, J. P. (Han) Woerdman |
Coherent Polarization Transfer through Sub-wavelength Hole Arrays. |
NanoNet |
2009 |
DBLP DOI BibTeX RDF |
surface plasmon, hole array, polarization, entanglement |
38 | Stavros D. Nikolopoulos, Leonidas Palios |
Hole and antihole detection in graphs. |
SODA |
2004 |
DBLP BibTeX RDF |
antihole, co-connectivity, weakly chordal graph, hole |
37 | Yoram Adler, Eitan Farchi, Moshe Klausner, Dan Pelleg, Orna Raz, Moran Shochat, Shmuel Ur, Aviad Zlotnick |
Advanced code coverage analysis using substring holes. |
ISSTA |
2009 |
DBLP DOI BibTeX RDF |
software testing, coverage analysis |
37 | Maria Vasardani, Max J. Egenhofer |
Comparing Relations with a Multi-holed Region. |
COSIT |
2009 |
DBLP DOI BibTeX RDF |
|
37 | Chun-Yen Chen, Kuo-Young Cheng |
A Sharpness-Dependent Filter for Recovering Sharp Features in Repaired 3D Mesh Models. |
IEEE Trans. Vis. Comput. Graph. |
2008 |
DBLP DOI BibTeX RDF |
|
37 | Conor McBride |
Clowns to the left of me, jokers to the right (pearl): dissecting data structures. |
POPL |
2008 |
DBLP DOI BibTeX RDF |
polynomial, generic programming, iteration, division, stack, differentiation, traversal, datatype, tail recursion, zipper, dissection |
37 | Steve Mann 0001, Ryan E. Janzen, Mark A. Post |
Hydraulophone design considerations: absement, displacement, and velocity-sensitive music keyboard in which each key is a water jet. |
ACM Multimedia |
2006 |
DBLP DOI BibTeX RDF |
FUNtain, direct user interface, duringtouch, haptic surface, harmelodica, harmelotron (harmellotron), hydraulic-action, hydraulophone, pneumatophone, tracker-action, underwater musical instrument, water-based immersive multimedia, tangible user interface, fluid-user-interface |
37 | Yun-Tao Jia, Shi-Min Hu 0001, Ralph R. Martin |
Video completion using tracking and fragment merging. |
Vis. Comput. |
2005 |
DBLP DOI BibTeX RDF |
Video completion, Tracking, Texture synthesis, Graph cut, Mean shift |
35 | Jérôme Durand-Lose |
Abstract geometrical computation 3: black holes for classical and analog computing. |
Nat. Comput. |
2009 |
DBLP DOI BibTeX RDF |
Black hole model, Malament-Hogarth space-time, Hyper-computing, Zeno phenomenon, Analog computation, Arithmetic hierarchy, Abstract geometrical computation |
35 | Minh Thiep Ha, Priyadharshini Sakthivel, Hyunseung Choo |
Bypassing Routing Holes in WSNs with a Predictive Geographic Greedy Forwarding. |
APNOMS |
2009 |
DBLP DOI BibTeX RDF |
Routing hole problem, sensor networks |
35 | Theodore Lim, James M. Ritchie, Richard G. Dewar, Jonathan R. Corney, P. Wilkinson, Mustafa Calis, Marc P. Y. Desmulliez, J.-J. Fang |
Factors affecting user performance in haptic assembly. |
Virtual Real. |
2007 |
DBLP DOI BibTeX RDF |
Haptic assembly, Design for assembly, Peg-in-hole metrics, Human-computer Interaction, Virtual reality, Human factors |
35 | Lei Shu 0001, ZhangBing Zhou, Manfred Hauswirth, Danh Le Phuoc, Peng Yu, Lin Zhang 0012 |
Transmitting streaming data in wireless multimedia sensor networks with holes. |
MUM |
2007 |
DBLP DOI BibTeX RDF |
TPGF routing algorithm, hole-bypassing routing, multi-path transmission, multimedia sensor networks, streaming data |
35 | Qi Cheng 0001, Elizabeth Murray |
On Deciding Deep Holes of Reed-Solomon Codes. |
TAMC |
2007 |
DBLP DOI BibTeX RDF |
deep hole, NP-complete, Reed-Solomon codes, algebraic surface |
35 | Seyoun Park, Xiaohu Guo, Hayong Shin, Hong Qin 0001 |
Surface completion for shape and appearance. |
Vis. Comput. |
2006 |
DBLP DOI BibTeX RDF |
Active contour method, Poisson equation, Hole filling |
35 | Tai-Hoon Kim, Sun-myoung Hwang |
Intelligent Method for Building Security Countermeasures. |
KES (2) |
2006 |
DBLP DOI BibTeX RDF |
Security countermeasure, security hole, security engineering |
35 | Mark N. Ellingham, Herbert Fleischner, Martin Kochol, Emanuel Wenger |
Colorability of Planar Graphs with Isolated Nontriangular Faces. |
Graphs Comb. |
2004 |
DBLP DOI BibTeX RDF |
Eulerian triangulation, Hole graph, 3-Coloring |
35 | Jop F. Sibeyn, Michael Kaufmann 0001 |
Deterministic 1-k Routing on Meshes. |
STACS |
1994 |
DBLP DOI BibTeX RDF |
hot-potato worm-hole routing, meshes, packet routing, theory of parallel and distributed computation |
34 | Marko Jahnke, Jens Tölle, Alexander Finkenbrink, Alexander Wenzel, Elmar Gerhards-Padilla, Nils Aschenbruck, Peter Martini |
Methodologies and frameworks for testing ids in adhoc networks. |
Q2SWinet |
2007 |
DBLP DOI BibTeX RDF |
attacks and attack implementations, hardware testbed, reproducible node motion, semi-virtual testbed, smart MANET jamming, worm hole, black hole |
34 | E. L. Lohse |
Correspondences of 8-bit and Hollerith codes for computer environments - a USASI tutorial. |
Commun. ACM |
1968 |
DBLP DOI BibTeX RDF |
USA standard, card code, hole-patterns, hole-patterns assignment, punched card, punched card code, punched card systems |
30 | Yoram Adler, Eitan Farchi, Moshe Klausner, Dan Pelleg, Orna Raz, Moran Shochat, Shmuel Ur, Aviad Zlotnick |
Automated substring hole analysis. |
ICSE Companion |
2009 |
DBLP DOI BibTeX RDF |
|
30 | Matulya Bansal, Mark Broadie |
A simulation model to analyze the impact of hole size on putting in golf. |
WSC |
2008 |
DBLP DOI BibTeX RDF |
|
30 | Paola Flocchini, David Ilcinkas, Nicola Santoro |
Ping Pong in Dangerous Graphs: Optimal Black Hole Search with Pure Tokens. |
DISC |
2008 |
DBLP DOI BibTeX RDF |
dangerous graphs, distributed computing, mobile agents, autonomous robots, graph exploration |
30 | Piyush Agrawal, Ratan K. Ghosh, Sajal K. Das 0001 |
Cooperative black and gray hole attacks in mobile ad hoc networks. |
ICUIMC |
2008 |
DBLP DOI BibTeX RDF |
|
30 | Jingyan Xu, Chi Liu, Yuchuan Wang, Eric C. Frey, Benjamin M. W. Tsui |
Quantitative Rotating Multisegment Slant-Hole SPECT Mammography With Attenuation and Collimator-Detector Response Compensation. |
IEEE Trans. Medical Imaging |
2007 |
DBLP DOI BibTeX RDF |
|
30 | Ji Zheng, Xin Wang 0002, Xiangyang Xue, Chai-Keong Toh |
A Mobile Agent-Based P2P Autonomous Security Hole Discovery System. |
ICNC (3) |
2005 |
DBLP DOI BibTeX RDF |
|
30 | Nils Raabe, Oliver Webber, Winfried Theis, Claus Weihs |
Spiralling in BTA Deep-hole Drilling: Models of Varying Frequencies. |
GfKl |
2005 |
DBLP DOI BibTeX RDF |
|
30 | Takayuki Matsuno, Toshio Fukuda, Yasuhisa Hasegawa |
Insertion of Long Peg into Tandem Shallow Hole Using Search Trajectory Generation without Force Feedback. |
ICRA |
2004 |
DBLP DOI BibTeX RDF |
|
30 | Jérôme Durand-Lose |
Abstract Geometrical Computation for Black Hole Computation. |
MCU |
2004 |
DBLP DOI BibTeX RDF |
|
30 | Vito Trianni, Thomas Halva Labella, Marco Dorigo |
Evolution of Direct Communication for a Swarm-bot Performing Hole Avoidance. |
ANTS Workshop |
2004 |
DBLP DOI BibTeX RDF |
communication, evolutionary robotics, swarm robotics |
30 | Stefan Dobrev, Paola Flocchini, Giuseppe Prencipe, Nicola Santoro |
Searching for a black hole in arbitrary networks: optimal mobile agent protocols. |
PODC |
2002 |
DBLP DOI BibTeX RDF |
distributed computing, mobile agents, black holes |
30 | Oded Lachish, Eitan Marcus, Shmuel Ur, Avi Ziv |
Hole analysis for functional coverage data. |
DAC |
2002 |
DBLP DOI BibTeX RDF |
functional verification, coverage analysis |
30 | Giovanni Simone, Francesco Carlo Morabito |
RBFNN-Based Hole Identification System in Conducting Plates. |
IJCNN (5) |
2000 |
DBLP DOI BibTeX RDF |
|
29 | Ming-Yang Su, Kun-Lin Chiang, Wei-Cheng Liao |
Mitigation of Black-Hole Nodes in Mobile Ad Hoc Networks. |
ISPA |
2010 |
DBLP DOI BibTeX RDF |
MANETs (Mobile ad hoc networks), black hole attack, intrusion detection system (IDS) |
29 | Xiao-xing Gao, Chun-ze Zhao, Gui-Ran Chang, Zhen-hua Tan |
Design and Implementation of Drill Hole of PCB Detection System. |
HIS (2) |
2009 |
DBLP DOI BibTeX RDF |
PCB detection, drill Hole detect, digital image processing |
29 | Amitesh Kumar, Alan M. Shih, Yasushi Ito, Douglas H. Ross, Bharat K. Soni |
A Hole-filling Algorithm Using Non-uniform Rational B-splines. |
IMR |
2007 |
DBLP DOI BibTeX RDF |
Geometry Repair, Watertight, CSM, Edge Swapping, Delaunay Triangulation, CFD, Mesh Generation, NURBS, Hole Filling |
28 | Stuart Benjamin, Henrik Järleblad, Mirko Salewski, Luke Stagner, Matthew Hole, David Pfefferlé |
Distribution transforms for guiding center orbit coordinates in axisymmetric tokamak equilibria. |
Comput. Phys. Commun. |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Dean Muir, Kenneth Duru, Matthew Hole, Stuart R. Hudson |
Provably stable numerical method for the anisotropic diffusion equation in toroidally confined magnetic fields. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Dean Muir, Kenneth Duru, Matthew Hole, Stuart R. Hudson |
An efficient method for the anisotropic diffusion equation in magnetic fields. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Chirag Jain, Luv Gupta, Manav Ranawat, Varsha Hole |
Securing E-Voting using Hyperledger Fabric: A Permissioned Blockchain Approach. |
OCIT |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Yogesh Hole, Alaa Shather, Ali Hussein Alrubayi, Hawraa Ali Sabah, Hayder Al-Ghanimi, Haider Alchilibi |
Incorporation of Agents with Ontology to Develop a Healthcare Assessment Provision System. |
IC3I |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Snehal Hole, Abdul Razzaq T. Zaboun, Hayder Al-Ghanimi, Omad Aldeen Hussen, Haider Alchilibi, Sahar R. Abdul Kadeem |
Augmented Selection of Cluster Heads and Enlightening Network Lifetime in Underwater Wireless Sensor Networks Using Grey Wolf Optimization (GWO). |
IC3I |
2023 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 2899 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|