default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 58 matches
- 2011
- Afif bin Md Akib, Nordin Bin Saad, Vijanth Sagayan Asirvadam:
Ensemble Dual Algorithm Using RBF Recursive Learning for Partial Linear Network. ACIIDS (2) 2011: 252-261 - Karol Banczyk, Olgierd Kempa, Tadeusz Lasota, Bogdan Trawinski:
Empirical Comparison of Bagging Ensembles Created Using Weak Learners for a Regression Problem. ACIIDS (2) 2011: 312-322 - Namho Chung, Kun Chang Lee:
Effect of Connectivity and Context-Awareness on Users' Adoption of Ubiquitous Decision Support System. ACIIDS (2) 2011: 502-511 - Gyeongyong Heo, Seong Hoon Kim, Young Woon Woo, Imgeun Lee:
Another Variant of Robust Fuzzy PCA with Initial Membership Estimation. ACIIDS (2) 2011: 120-129 - Sheng-Kuei Hsu, Shi-Jen Lin:
A Block-Structured Model for Source Code Retrieval. ACIIDS (2) 2011: 161-170 - Tomasz Kajdanowicz, Michal Wozniak, Przemyslaw Kazienko:
Multiple Classifier Method for Structured Output Prediction Based on Error Correcting Output Codes. ACIIDS (2) 2011: 333-342 - Adam Kakol, Iwona Pozniak-Koszalka, Leszek Koszalka, Andrzej Kasprzak, Keith J. Burnham:
An Experimentation System for Testing Bee Behavior Based Algorithm to Solving a Transportation Problem. ACIIDS (2) 2011: 11-20 - Olgierd Kempa, Tadeusz Lasota, Zbigniew Telec, Bogdan Trawinski:
Investigation of Bagging Ensembles of Genetic Neural Networks and Fuzzy Systems for Real Estate Appraisal. ACIIDS (2) 2011: 323-332 - Jin Myoung Kim, Tae Ho Cho:
A* Based Cutting Plan Generation for Metal Grating Production. ACIIDS (2) 2011: 402-410 - Mihui Kim, Hyunseung Choo, Min Young Chung:
A Test Framework for Secure Distributed Spectrum Sensing in Cognitive Radio Networks. ACIIDS (2) 2011: 382-391 - Jinhyung Kim, Hyung-Jong Kim:
The Data Modeling Considered Correlation of Information Leakage Detection and Privacy Violation. ACIIDS (2) 2011: 392-401 - Cheonshik Kim, Dongkyoo Shin, Dongil Shin:
Data Hiding in a Halftone Image Using Hamming Code (15, 11). ACIIDS (2) 2011: 372-381 - Stanislawa Kluska-Nawarecka, Dorota Wilk-Kolodziejczyk, Krzysztof Regulski, Grzegorz Dobrowolski:
Rough Sets Applied to the RoughCast System for Steel Castings. ACIIDS (2) 2011: 52-61 - Marek Kopel, Aleksander Zgrzywa:
Search Result Clustering Using Semantic Web Data. ACIIDS (2) 2011: 292-301 - Jirí Kotzian, Jaromir Konecny, Ondrej Krejcar:
User Perspective Adaptation Enhancement Using Autonomous Mobile Devices. ACIIDS (2) 2011: 462-471 - Ondrej Krejcar, Jakub Jirka:
Proactive User Adaptive Application for Pleasant Wakeup. ACIIDS (2) 2011: 472-481 - Hyukmin Kwon, Taesu Kim, Song Jin Yu, Huy Kang Kim:
Self-similarity Based Lightweight Intrusion Detection Method for Cloud Computing. ACIIDS (2) 2011: 353-362 - Soonjae Kwon, Kun Chang Lee, Emy Elyanee Mustapha:
The Role of Cognitive Map on Influencing Decision Makers' Semantic and Syntactic Comprehension, and Inferential Problem Solving Performance. ACIIDS (2) 2011: 532-544 - Kun Chang Lee, Do Young Choi:
A Bayesian Network-Based Management of Individual Creativity: Emphasis on Sensitivity Analysis with TAN. ACIIDS (2) 2011: 512-521 - Kun Chang Lee, Min Hee Hahn:
General Bayesian Network Approach to Balancing Exploration and Exploitation to Maintain Individual Creativity in Organization. ACIIDS (2) 2011: 522-531 - Kun Chang Lee, Dae Sung Lee, Young Wook Seo, Nam Yong Jo:
Antecedents of Team Creativity and the Mediating Effect of Knowledge Sharing: Bayesian Network Approach to PLS Modeling as an Ancillary Role. ACIIDS (2) 2011: 545-555 - Dae Sung Lee, Young Wook Seo, Kun Chang Lee:
An Adjusted Simulated Annealing Approach to Particle Swarm Optimization: Empirical Performance in Decision Making. ACIIDS (2) 2011: 566-575 - Chunshien Li, Fengtse Chan:
Complex-Fuzzy Adaptive Image Restoration - An Artificial-Bee-Colony-Based Learning Approach. ACIIDS (2) 2011: 90-99 - Chunshien Li, Tai-Wei Chiang:
Complex Fuzzy Computing to Time Series Prediction A Multi-Swarm PSO Learning Approach. ACIIDS (2) 2011: 242-251 - Chunshien Li, Hsin Hui Cheng:
Intelligent Forecasting of S&P 500 Time Series - A Self-organizing Fuzzy Approach. ACIIDS (2) 2011: 411-420 - Chang Liu, Kun He, Jiliu Zhou, Chaobang Gao:
Discriminant Orthogonal Rank-One Tensor Projections for Face Recognition. ACIIDS (2) 2011: 203-211 - Rey-Long Liu, Shu-Yu Tung, Yun-Ling Lu:
Identifying Disease Diagnosis Factors by Proximity-Based Mining of Medical Texts. ACIIDS (2) 2011: 171-180 - Yong Beom Ma, Sung-Ho Jang, Jong Sik Lee:
Ontology-Based Resource Management for Cloud Computing. ACIIDS (2) 2011: 343-352 - Zdenek Machacek:
Analysis and Elimination of Dangerous Wave Propagation as Intelligent Adaptive Technique. ACIIDS (2) 2011: 482-491 - Juraj Machaj, Peter Brida:
Performance Comparison of Similarity Measurements for Database Correlation Localization Method. ACIIDS (2) 2011: 452-461
skipping 28 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-21 19:56 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint