Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 108 matches
- 2009
- Jair Minoro Abe, Kazumi Nakamatsu, Fábio Romeu de Carvalho:
A Note on Monadic Curry System P1. KES (2) 2009: 388-394 - Hidenao Abe, Shusaku Tsumoto:
Detecting Temporal Patterns of Importance Indices about Technical Phrases. KES (2) 2009: 252-258 - Yoshinori Adachi, Masahiro Ozaki, Yuji Iwahori:
Study of Writer Recognition by Japanese Hiragana. KES (2) 2009: 689-696 - Ali Ahmadinia, Tughrul Arslan, Hernando Fernandez-Canque:
Optimization of Reconfigurable Multi-core SOCs for Multi-standard Applications. KES (2) 2009: 515-522 - Ebrahim Al-Hashel, Bala M. Balachandran, Dharmendra Sharma:
The Role of Ontology in Modelling Autonomous Agent-Based Systems. KES (2) 2009: 111-118 - Norio Baba, Kou Nin:
Effective Utilization of Neural Networks for Constructing an Intelligent Decision Support System for Dealing Stocks. KES (2) 2009: 761-766 - Sergey Babenyshev, Vladimir V. Rybakov:
Temporal Logic for Modeling Discovery and Logical Uncertainty. KES (2) 2009: 16-23 - Rohani Binti Abu Bakar, Junzo Watada:
Evidential Reasoning Based on DNA Computation. KES (2) 2009: 212-219 - Bala M. Balachandran, Ebrahim Al-Hashel, Masoud Mohammadian:
An Agent-Mediated Collaborative Negotiation in E-Commerce: A Case Study in Travel Industry. KES (2) 2009: 102-110 - Elena Baralis, Luca Cagliero, Tania Cerquitelli, Paolo Garza, Marco Marchetti:
Context-Aware User and Service Profiling by Means of Generalized Association Rules. KES (2) 2009: 50-57 - Sonia Bergamaschi, Francesco Guerra, Mirko Orsini, Claudio Sartori, Maurizio Vincini:
An ETL Tool Based on Semantic Analysis of Schemata and Instances. KES (2) 2009: 58-65 - Piotr Bródka, Katarzyna Musial, Przemyslaw Kazienko:
Efficiency of Node Position Calculation in Social Networks. KES (2) 2009: 455-463 - Yichuan Cai, Yi Chen:
Mining Influential Bloggers: From General to Domain Specific. KES (2) 2009: 447-454 - Duan-Yu Chen:
An Enhanced Layer Embedded Pedestrian Detector. KES (2) 2009: 439-446 - Shu-Yin Chiang, Jin-Long Wang:
Localization in Wireless Sensor Networks by Fuzzy Logic System. KES (2) 2009: 721-728 - Alfredo Cuzzocrea, Andrea Nucita:
I-SQE: A Query Engine for Answering Range Queries over Incomplete Spatial Databases. KES (2) 2009: 91-101 - Yi Ding, Yuji Iwahori, Tsuyoshi Nakamura, Robert J. Woodham, Lifeng He, Hidenori Itoh:
Self-calibration and Image Rendering Using RBF Neural Network. KES (2) 2009: 705-712 - Hernando Fernandez-Canque, Sorin Hintea, John Freer, Ali Ahmadinia:
Machine Vision Application to Automatic Intruder Detection Using CCTV. KES (2) 2009: 498-505 - Osamu Fujita, Koji Jinya:
Fine Grained Parallel Processing for Soft Computing. KES (2) 2009: 767-772 - Yoshikatsu Fujita, Yasufumi Saruwatari, Masakazu Takahashi, Kazuhiko Tsuda:
Cover All Query Diffusion Strategy over Unstructured Overlay Network. KES (2) 2009: 278-284 - Kyoko Fukuda:
Identifying Fewer Key Factors by Attribute Selection Methodologies to Understand the Hospital Admission Prediction Pattern with Ant Miner and C4.5. KES (2) 2009: 853-860 - Rafael Guirado, Clara Marcela Miranda, José Fernando Bienvenido:
Path Planning Knowledge Modeling for a Generic Autonomous Robot: A Case Study. KES (2) 2009: 74-81 - Kouji Harada, Yoshiteru Ishida:
A Network Approach for HIV-1 Drug Resistance Prevention. KES (2) 2009: 782-788 - Mikio Hasegawa, Taichi Takeda, Hiroshi Harada:
Design and Implementation of an Optimal Radio Access Network Selection Algorithm Using Mutually Connected Neural Networks. KES (2) 2009: 607-614 - Aoi Hashizume, Hiroshi Mineno, Tadanori Mizuno:
Multi-base Station Placement for Wireless Reprogramming in Sensor Networks. KES (2) 2009: 648-655 - Akira Hattori, Shigenori Ioroi, Haruo Hayami:
Web-Based System for Supporting Participation in International Conferences. KES (2) 2009: 631-638 - Akihiro Hayashi, Yasunobu Kino, Kazuhiko Tsuda:
Decision Making Process for Selecting Outsourcing Company Based on Knowledge Database. KES (2) 2009: 300-307 - Marc Holze, Norbert Ritter:
System Models for Goal-Driven Self-management in Autonomic Databases. KES (2) 2009: 82-90 - Toshihiko Horiike, Youhei Takahashi, Tetsuji Kuboyama, Hiroshi Sakamoto:
Extracting Research Communities by Improved Maximum Flow Algorithm. KES (2) 2009: 472-479 - Jun-Wei Hsieh, Sin-Yu Chen, Chao-Hong Chiang:
Abnormal Event Analysis Using Patching Matching and Concentric Features. KES (2) 2009: 411-420
skipping 78 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-27 09:43 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint