Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 203 matches
- 2014
- Marco Aiello, Giuliano Andrea Pagani:
The Smart Grid's Data Generating Potentials. FedCSIS 2014: 9-16 - Bartosz Zielinski, Adam Roman, Agata Drózdz, Agata Kowalewska, Marzena Frolow:
A new approach to automatic continuous artery diameter measurement. FedCSIS 2014: 247-251 - Mateusz Adamczyk:
Parallel Feature Selection Algorithm based on Rough Sets and Particle Swarm Optimization. FedCSIS 2014: 43-50 - Eric Afful-Dadzie, Stephen Nabareseh, Zuzana Komínková Oplatková:
Fuzzy Vikor Approach: Evaluating Quality of Internet Health Information. FedCSIS 2014: 183-190 - Saba Akbari:
Energy Harvesting for Wireless Sensor Networks Review. FedCSIS 2014: 987-992 - Hakim Akeb:
A Look-Forward Heuristic for Packing Spheres into a Three-Dimensional Bin. FedCSIS 2014: 397-404 - Saleh Alghamdi, Natalia Beloff:
Towards a Comprehensive Model for E-Government Adoption and Utilisation Analysis: The Case of Saudi Arabia. FedCSIS 2014: 1217-1225 - Olatz Arbelaitz, Aizea Lojo, Javier Muguerza, Iñigo Perona:
Global versus modular link prediction approach for discapnet: website focused to visually impaired people. FedCSIS 2014: 51-58 - Abdullah Aref, Thomas T. Tran:
Using Fuzzy Logic and Q-Learning for Trust Modeling in Multi-agent Systems. FedCSIS 2014: 59-66 - Tatiana V. Atanasova:
Towards Semantic-based Process-oriented Control in Digital Home. FedCSIS 2014: 1133-1137 - Mesut Ateser, Ömer Özgür Tanriöver:
Investigation of the COBIT Framework Input/Output Relationships by Using Graph Metrics. FedCSIS 2014: 1269-1275 - Majed Ayyad:
Heuristic to Build RCC8 for Event Locations. FedCSIS 2014: 299-306 - Mohammad Azad, Mikhail Moshkov:
Minimizing Size of Decision Trees for Multi-label Decision Tables. FedCSIS 2014: 67-74 - Slawomir Bak, Stanislaw Deniziak:
Synthesis of Real Time Distributed Applications for Cloud Computing. FedCSIS 2014: 743-752 - Andrzej Bak, Piotr Gajowniczek, Marcin Pilarski, Marcin Borkowski:
Automated Discovery of Worldwide Content Servers Infrastructure - the SNIFFER Project. FedCSIS 2014: 921-924 - Jerzy Balicki:
Task Assignments in Logistics by Adaptive Multi-Criterion Evolutionary Algorithm with Elitist Selection. FedCSIS 2014: 1287-1291 - Maciej Bartoszuk:
Solving Systems of Polynomial Equations: a Novel End Condition and Root Computation Method. FedCSIS 2014: 543-552 - Ismail Bennis, Hacène Fouchal, Ouadoudi Zytoune, Driss Aboutajdine:
Carrier sense range effect on performances of multipath routing in Wireless Sensor Networks. FedCSIS 2014: 1073-1078 - Benoit Bernay, Samuel Deleplanque, Alain Quilliot:
Routing on Dynamic Networks: GRASP versus Genetic. FedCSIS 2014: 487-492 - Galina Besova, Dominik Steenken, Heike Wehrheim:
Grammar-Based Model Transformations. FedCSIS 2014: 1601-1610 - Halina Bielak, Kamil Powroznik:
An efficient algorithm for the density Turán problem of some unicyclic graphs. FedCSIS 2014: 479-486 - Wojciech Bieniecki, Sebastian Stolinski, Magdalena Stasiak-Bieniecka:
Computer Aided Assessment of Linear and Quadratic Function Graphs Using Least-squares Fitting. FedCSIS 2014: 651-658 - Magdalena Blazek, Maria Kazimierczak, Artur Janowski, Katarzyna Mokwa, Marek Przyborski, Jakub Szulwic:
An unorthodox view on the problem of tracking facial expressions. FedCSIS 2014: 85-91 - Ilona Bluemke, Michal Kurek, Malgorzata Purwin:
Tool for Automatic Testing of Web Services. FedCSIS 2014: 1553-1558 - András Bóta, Miklós Krész, András Pluhár:
The inverse infection problem. FedCSIS 2014: 75-83 - Marc Boullé:
Parsimonious Naive Bayes. FedCSIS 2014: 355-359 - Dariusz W. Brzezinski, Piotr Ostalczyk:
Accuracy Evaluation of Classical Integer Order Based and Direct Non-integer Order Numerical Algorithms of Non-integer Order Derivatives and Integrals Computations. FedCSIS 2014: 553-560 - Dumitru Dan Burdescu, Liana Stanescu, Marius Brezovan, Cosmin Stoica Spahiu:
Efficient Volumetric Segmentation Method. FedCSIS 2014: 659-668 - Beata Bylina, Jaroslaw Bylina:
Performance analysis of the WZ factorization in MATLAB. FedCSIS 2014: 561-568 - Beata Bylina, Jaroslaw Bylina, Przemyslaw Stpiczynski, Dominik Szalkowski:
Performance Analysis of Multicore and Multinodal Implementation of SpMV Operation. FedCSIS 2014: 569-576
skipping 173 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-24 20:11 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint