Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 46 matches
- 2010
- Sanaa Askool, Aimee Jacobs, Keiichi Nakata:
Socio-technical Factors Influencing Social Media Adoption in Business - A Semiotic Perspective. ICISO 2010: 141-148 - Deena M. Barakah, Ali Al Kinani:
Building Smart Saudi Hospitals using RFID Technologies. ICISO 2010: 32-36 - Adrian Benfell, Kecheng Liu:
A Semiotic Approach to Web Service Description. ICISO 2010: 68-76 - Wenliang Bian, Xuyun Nie:
Unattended Home Delivery System based on PKI Trust Model in Urban Areas. ICISO 2010: 3-8 - Albert J. J. van Breemen:
The Semiotic Framework - Peirce and Stamper. ICISO 2010: 87-94 - Mangtang Chan:
Design of a Modelling Language for Semiotics based Agent Systems. ICISO 2010: 95-102 - Dan Chang, Lijun Zhou:
A Study on Enterprise Application Integration based on Grid. ICISO 2010: 292-298 - Qiu-Shi Cong, Lin Lin, Zuo-Ming Huang:
MASOAERP: A Mobile Agent-based Service-oriented Integration Architecture for Batch Customization ERP Production. ICISO 2010: 308-313 - Niels R. Faber, René J. Jorna:
The Technical Opportunities and Semiotic Pitfalls of Multi-actor Systems - Support, Planning and Communication between Marketing, Dispatchers and Passengers within the Netherlands Railways. ICISO 2010: 173-181 - Xiuzhen Feng, Gaofeng Wu:
An Automated Negotiation System for Price Comparison based on Agent Technology. ICISO 2010: 275-281 - Joaquim Filipe:
Multi-agent Systems in Intelligent Pervasive Spaces. ICISO 2010: 9-16 - Tim French, Marc Conrad, Raymond Brown:
Template Free Biometric e-Banking Authentication - More Trustworthy or False Trail? ICISO 2010: 111-116 - Daniel Galarreta:
A Semiotic Approach of Contexts for Pervasive Systems. ICISO 2010: 37-44 - Henk W. M. Gazendam:
From Subject Databases to Flow of Responsibility - A Retrospective of Three Decades of Modeling. ICISO 2010: 3-4 - Nuno Pina Gonçalves, Sérgio Paulino, Tiago Silva:
Business Processes Underpinning Information Systems - A Higher Education Institution's Framework. ICISO 2010: 226-235 - Daniel Gross, Eric S. K. Yu:
Resolving Artifact Description Ambiguities During Software Design using Semiotic Agent Modelling. ICISO 2010: 77-86 - Hubert Grzybek, Stephen R. Gulliver, Zhuotao Huang:
Inclusion of Temporal Databases with Industry Foundation Classes - A Basis for Adaptable Intelligent Buildings. ICISO 2010: 24-31 - Xiujun Gu, Runtong Zhang, Zhongtian Li, Xu Han:
Research on the Classification Consultations and Self-adaptation of QoS in Cognitive Networks. ICISO 2010: 218-225 - Marcos Salenko Guimarães, Maria Cecília Calani Baranauskas, Eliane Martins:
Interaction Design and Redundancy Strategy in Critical Systems. ICISO 2010: 165-172 - Rui Hua, Runtong Zhang, Dandan Li:
Security Analysis of Authentication Schemes in m-Commerce based on Fuzzy Comprehensive Evaluation. ICISO 2010: 245-251 - Xianpeng Huangfu, Aimin Luo, Li Huang, Honghui Chen, Xueshan Luo:
Process Integration for Service Oriented Networked Applications. ICISO 2010: 236-241 - Huiwen Zhang, Bao-Yan Gu, Hai Huang:
An Empirical Evaluation of the Competitiveness of the Financial Services Industrial Cluster. ICISO 2010: 212-217 - Tiko Iyamu, Leshoto Mphahlele:
The Role of Principles in the Deployment of Enterprise Information Architecture. ICISO 2010: 299-307 - Guorui Jiang, Sheng Chen:
Argumentation-based One-to-many Negotiation Model. ICISO 2010: 268-274 - Ivan Launders, Simon Polovina, Richard Hill:
Semantics and Pragmatics in Enterprise Architecture Through Transaction Agent Modelling. ICISO 2010: 285-291 - Lin Liu, Junkang Feng:
The Notion of "Meaning System" and its use for "Information Systems". ICISO 2010: 52-59 - Honglu Liu, Xiaolan Guan, Zhenji Zhang:
Research on the Ecological Correlation Analysis between the Enterprises in the Logistics Park. ICISO 2010: 193-198 - Mario J. López, Hector R. Ponce:
Towards an Initial Semiotic View of the Interactive Graphic Organiser. ICISO 2010: 125-132 - Soi Luong, Samuel Chong:
Personalised Ambient Intelligence in Buildings Via Context-Aware Agents. ICISO 2010: 17-23 - Vânia Paula de Almeida Néris, Maria Cecília Calani Baranauskas:
User Interface Design Informed by Affordances and Norms Concepts. ICISO 2010: 133-140
skipping 16 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-25 02:49 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint