Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 190 matches
- 2018
- Wen Yang, Xiaoning Liu, Jiabei Hu, Fei Zhu, Kang Li, Guohua Geng:
Three-dimensional Model Segmentation Based on Improved Random Walk Segmentation Algorithm. CSAE 2018: 5:1-5:5 - Xiang Wang, Yuntong Tian, Pei Du, Xiaobing Zhang, Weike Wang, Qiang Hao, Bing Xu, Zhun Zhang, Zongmin Zhao:
An Optimized Method of Hardware Implementation for LHash in the Embedded System. CSAE 2018: 181:1-181:5 - Zhiqiang Wang, Yao Tang, Jing Yao, Rong Qian, Zheng Zhang, Pingchuan Ma:
Large-scale Malware Automatic Detection Based On Multiclass Features and Machine Learning. CSAE 2018: 174:1-174:5 - Vladimir V. Akhiyarov, Andrey B. Borzov, Konstantin P. Likhoedenko, Yury V. Karakulin, Grigory M. Seregin, Victor B. Suchkov:
Mathematical Simulation of Electromagnetic Scattering Field from Perfectly Conducting Object with Dielectric Cover on the Base of Physical Theory of Diffraction. CSAE 2018: 67:1-67:5 - Fengqiu Cao, Yang Duan, Mengzhi Zhang, Zhihua Xu, Yuyue Zou, Yan Kang, Benqiang Yang:
A CT Image Analysis Method for Evaluating Hematoma Enlargement in Acute Hypertensive Cerebral Hemorrhage. CSAE 2018: 113:1-113:6 - Yehong Chen:
CT-LSTM: Detection & Estimation Duplexed System for Robust Object Tracking. CSAE 2018: 106:1-106:7 - Liang Chen, Dongyi Chen:
CaMap: Camera-based Map Manipulation on Mobile Devices. CSAE 2018: 44:1-44:5 - Zhenxin Chen, Yongmei Hu, Pingao Huang, Jianpi Huang, Hui Wang, Guanglin Li:
Design and Experimental Validation of a Synchronous Wireless Acquisition System of EMG and Muscle Impedance Signals. CSAE 2018: 48:1-48:5 - Dejun Chen, Rong Huang, Jiangyou Long:
Research on Urban Logistics Sharing Distribution Method Based on Improved Genetic Algorithm. CSAE 2018: 162:1-162:6 - Kunlun Chen, Yanru Liu, Qingxu Deng:
Indexing Moving Objects Using Query Oriented Parallel Grids. CSAE 2018: 24:1-24:5 - Xing Chen, Yinan Lu, Ran Fang:
3D Face Recognition Based on Empirical Mode Decomposition and Sparse Representation. CSAE 2018: 78:1-78:5 - Zengsi Chen, Kuntao Xiao, Jiantao Yang, Dan Long, Dexing Kong:
Automatic Segmentation of 3D Lung Airway without Leakage. CSAE 2018: 124:1-124:5 - Yulun Cheng, Lili Sun, Xiaoyun Liu:
User-Oriented Energy-Saving Offloading for Wireless Virtualization Aided Mobile Edge Computing. CSAE 2018: 51:1-51:5 - Yulun Cheng, Longxiang Yang, Hongbo Zhu:
Distributed Computation Offloading and Power Allocation for Wireless Virtualization Aided Mobile Edge Computing. CSAE 2018: 55:1-55:5 - Bin Cheng, Hong-Hong Zhang:
Information Extraction of Saline-alkali Soil in the West of Jilin Province Based on Fully Polarimetric SAR-a Case Study in Qian An County. CSAE 2018: 128:1-128:5 - Liangzhong Cui, Fuliang Guo, Yingjie Liang:
Research Overview of Educational Recommender Systems. CSAE 2018: 155:1-155:7 - Chunhui Deng, Huifang Deng, Fenfen Chen:
A New Approach to Face Detection Based on Binary Texture Extraction Algorithm. CSAE 2018: 97:1-97:6 - Hongtao Deng, Xun Zhu:
A Perceptron Model for Joint Extraction of Drug Entities and Drug-Drug Interactions. CSAE 2018: 139:1-139:5 - Pengfei Dong, Xiaogang Ruan, Jing Huang, Xiaoqing Zhu, Yao Xiao:
A RGB-D SLAM Algorithm Combining ORB Features and BOW. CSAE 2018: 118:1-118:6 - Luobing Dong, Fei Wang, Junyuan Shan:
Computation Offloading for Mobile-Edge Computing with Maximum Flow Minimum Cut. CSAE 2018: 57:1-57:5 - Yuqi Dong, Jianhong Zhai:
A Privacy Risk Assessment Model Based on TAPE Framework. CSAE 2018: 172:1-172:8 - Qinglan Fan, Xinxin Liu, Yunfeng Zhang, Fangxun Bao, Shilong Li:
Adaptive Mutation PSO Based SVM Model for Credit Scoring. CSAE 2018: 11:1-11:7 - Ming Fang, Jing-An Lei:
Field Corn Stalk Identification Method Based on Machine Learning and Spectral Characteristics. CSAE 2018: 99:1-99:5 - Xiaohua Feng, Marc Conrad:
Security Audit in Mobile Apps Security Design. CSAE 2018: 171:1-171:5 - Xiangchu Feng, Shuai Ma, Bingzhe Wei:
Single Image Dehazing Method Based on Cartoon-Texture Decomposition. CSAE 2018: 108:1-108:5 - Chu-Chu Feng, Guang-Xing Tan, Fang-Bin Duan:
A Stable Tracking Control of Mobile Multi-robot Using Direct Lyapunov Method Based on Global Coordinate Representation. CSAE 2018: 149:1-149:6 - Tian Fu, Zhen Wang, Tianming Wang:
Research on Application of a New Algorithm Based on Multi-source Data in Tourism Flow Forecasting. CSAE 2018: 81:1-81:5 - Yuan Gao, Xuedong Dong, Yuan Tian:
A New Signcryption Scheme without Certificate and Linear Pairing. CSAE 2018: 177:1-177:4 - Lei Gao, Wang Gao, Haitao Gu:
Virtual Simulation Technology of 3D Obstacle Avoidance Algorithm for AUV. CSAE 2018: 117:1-117:5 - Junjie Geng, Jinyao Yan, Yangbiao Ren, Yuan Zhang:
Design and Implementation of Network Monitoring and Scheduling Architecture Based on P4. CSAE 2018: 182:1-182:6
skipping 160 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-30 11:29 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint