Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 64 matches
- 1999
- Akinori Abe:
Two-Sided Hypotheses Generation for Abductive Analogical Reasoning. ICTAI 1999: 145-152 - Clement Allen, Sara Stoecklin, Patrick O. Bobbie, Qian Chen, Ping Wu:
An Architecture for Designing Distributed Spoken Dialogue Interfaces. ICTAI 1999: 245-252 - Edoardo Ardizzone, Mohand-Said Hacid:
A Knowledge Representation and Reasoning Support for Modeling and Querying Video Data. ICTAI 1999: 167-174 - Henrik Bergström:
A Family of Delphi Components for Case-Based Reasoning. ICTAI 1999: 153-160 - P. Bruce Berra, Pericles A. Mitkas, Shengluan Zhong:
Fast and Efficient Searching of Multimedia Databases Using Holographic Memory. ICTAI 1999: 365-372 - Rüdiger W. Brause, Timm Sebastian Langsdorf, Hans-Michael Hepp:
Neural Data Mining for Credit Card Fraud Detection. ICTAI 1999: 103-106 - Ilene Burnstein, Floyd Saner, Yachai Limpiyakorn:
Using an Artificial Intelligence Approach to Build an Automated Program Understanding/Fault Localization Tool. ICTAI 1999: 69-76 - Shu-Ching Chen, Srinivas Sista, Mei-Ling Shyu, Rangasami L. Kashyap:
Augmented Transition Networks as Video Browsing Models for Multimedia Databases and Multimedia Information Systems. ICTAI 1999: 175-182 - Ang Juay Chin, Wee-Kit Ho, Andrew Lim:
A New GA Approach for the Vehicle Routing Problem. ICTAI 1999: 307-310 - Zhan Cui, Brian Odgers, Michael Schroeder:
An In-Service Agent Monitoring and Analysis System. ICTAI 1999: 237-244 - Michal Cutler, H. Deng, S. Maniccam, Weiyi Meng:
A New Study on Using HTML Structures to Improve Retrieval. ICTAI 1999: 406-409 - Romuald Debruyne:
A Strong Local Consistency for Constraint Satisfaction. ICTAI 1999: 202-209 - Eugene Eberbach, Shashi Phoha:
SAMON: Communication, Cooperation and Learning of Mobile Autonomous Robotic Agents. ICTAI 1999: 229-236 - Fazel Famili, Sylvain Létourneau:
Monitoring of Aircraft Operation Using Statistics and Machine Learning. ICTAI 1999: 279-286 - Richard Fox:
A Generic Task Strategy for Solving Routine Decision Making Problems. ICTAI 1999: 319- - Dimitris Fragoudis, Spiridon D. Likothanassis:
Learning to Identify Interesting Links in Intelligent Information Discovery. ICTAI 1999: 410- - Rong Gao, Y. Liu, S. Basseas, Lefteri H. Tsoukalas:
Neurofuzzy Approaches for Advanced Hearing Devices. ICTAI 1999: 327-331 - Erol Gelenbe, Zhiguang Xu, Esin Seref:
Cognitive Packet Networks. ICTAI 1999: 47-54 - Aditya Ghose:
A Formal Basis for Consistency, Evolution and Rationale Management in Requirements Engineering. ICTAI 1999: 77-84 - David Goldman, Nikolaos G. Bourbakis:
A Software Tool for Real-Time Low-Level Vision. ICTAI 1999: 131- - Carla P. Gomes, Bart Selman:
On the Fine Structure of Large Search Spaces. ICTAI 1999: 197-201 - Carla P. Gomes, Bart Selman:
Search Strategies for Hybrid Search Spaces. ICTAI 1999: 359-364 - Laurent Granvilliers, Frédéric Goualard, Frédéric Benhamou:
Box Consistency through Weak Box Consistency. ICTAI 1999: 373-380 - Éric Grégoire:
Overcoming the Christmas Tree Syndrome. ICTAI 1999: 425-430 - Babak Hamidzadeh, Ng Siu Kee:
A Dynamic Scheduling Benchmark: Design, Implementation and Performance Evaluation. ICTAI 1999: 311-318 - Ioannis Hatzilygeroudis, Jim Prentzas:
Neurules: Improving the Performance of Symbolic Rules. ICTAI 1999: 417-424 - Xin Hong, Kenneth Adamson, Weiru Liu:
Using Parallel Techniques to Improve the Computational Efficiency of Evidential Combination. ICTAI 1999: 55- - Vijay S. Iyengar:
HOT: Heuristics for Oblique Trees. ICTAI 1999: 91-98 - Xidong Jin, Robert G. Reynolds:
Using Knowledge-Based System with Hierarchical Architecture to Guide the Search of Evolutionary Computation. ICTAI 1999: 29-36 - Dimitrios Kalles, Athanassios Papagelis:
Controlled Flux Results in Stable Decision Trees. ICTAI 1999: 287-
skipping 34 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-28 06:15 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint