![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 347 matches
- 2012
- Haris Abdullah, Mikko Rinne, Seppo Törmä, Esko Nuutila:
Efficient matching of SPARQL subscriptions using rete. SAC 2012: 372-377 - Luca Abeni
, Tadeus Prastowo
:
Experiences with client/server interactions in a reservation-based system. SAC 2012: 1837-1839 - Murad Abusubaih, Mahmoud Rajabi, Mahmood Ajloni, Fadel Shahin:
Performance of MIMO 802.11n in heterogeneous deployments. SAC 2012: 600-604 - Rafael Accorsi, Thomas Stocker:
On the exploitation of process mining for security audits: the conformance checking case. SAC 2012: 1709-1716 - Reynald Affeldt
:
On construction of a library of formally verified low-level arithmetic functions. SAC 2012: 1326-1331 - Navid Ahmadi, Mehdi Jazayeri, Alexander Repenning
:
Performance evaluation of user-created open-web games. SAC 2012: 730-732 - Junho Ahn, Hojung Cha:
A sensor network-based multiple acoustic source localization algorithm. SAC 2012: 544-549 - Linus Åkesson, Görel Hedin, Sven Gestegård Robertz, Boris Magnusson:
Instance-aware assemblies of services in pervasive computing. SAC 2012: 1554-1556 - Azadeh Alebrahim, Isabelle Côté, Maritta Heisel, Christine Choppy, Denis Hatebur:
Designing architectures from problem descriptions by interactive model transformation. SAC 2012: 1256-1258 - Aretha Barbosa Alencar, Katy Börner, Fernando Vieira Paulovich
, Maria Cristina Ferreira de Oliveira
:
Time-aware visualization of document collections. SAC 2012: 997-1004 - João Claudio Américo, Walter Rudametkin
, Didier Donsez:
Managing the dynamism of the OSGi Service Platform in real-time Java applications. SAC 2012: 1115-1122 - Davide Ancona:
Regular corecursion in Prolog. SAC 2012: 1897-1902 - Davide Ancona, Viviana Mascardi, Ombretta Pavarino:
Ontology-based documentation extraction for semi-automatic migration of Java code. SAC 2012: 1137-1143 - Mohd M. Anwar, Philip W. L. Fong:
A visualization tool for evaluating access control policies in facebook-style social network systems. SAC 2012: 1443-1450 - Andrés Aristizábal, Filippo Bonchi
, Frank D. Valencia, Luis Fernando Pino:
Partition refinement for bisimilarity in CCP. SAC 2012: 88-93 - Rômulo Henrique Arpini, João Paulo A. Almeida
:
On the support for the assignment of active structure and behavior in enterprise modeling approaches. SAC 2012: 1686-1693 - Muhammad Atif, Mohammad Reza Mousavi
, Ammar Osaiweran:
Formal verification of Unreliable Failure Detectors in Partially Synchronous Systems. SAC 2012: 478-485 - Letricia P. S. Avalhais, Sérgio Francisco da Silva, José Fernando Rodrigues Jr., Agma J. M. Traina:
Image retrieval employing genetic dissimilarity weighting and feature space transformation functions. SAC 2012: 1012-1017 - Özalp Babaoglu
, Moreno Marzolla, Michele Tamburini:
Design and implementation of a P2P Cloud system. SAC 2012: 412-417 - Marco Balduzzi, Jonas Zaddach, Davide Balzarotti, Engin Kirda, Sergio Loureiro:
A security analysis of amazon's elastic compute cloud service. SAC 2012: 1427-1434 - Deepak Banthia, Atul Gupta
:
Investigating fault prediction capabilities of five prediction models for software quality. SAC 2012: 1259-1261 - Gioele Barabucci, Silvio Peroni
, Francesco Poggi
, Fabio Vitali
:
Embedding semantic annotations within texts: the FRETTA approach. SAC 2012: 658-663 - Elena Baralis, Luca Cagliero
, Saima Jabeen, Alessandro Fiori
:
Multi-document summarization exploiting frequent itemsets. SAC 2012: 782-786 - Julie Baro, Frédéric Boniol, Mikel Cordovilla, Eric Noulard, Claire Pagetti:
Off-line (Optimal) multiprocessor scheduling of dependent periodic tasks. SAC 2012: 1815-1820 - Steffen Bartsch, Martina Angela Sasse:
Guiding decisions on authorization policies: a participatory approach to decision support. SAC 2012: 1502-1507 - Márcio P. Basgalupp
, Rodrigo C. Barros
, Duncan D. Ruiz
:
Predicting software maintenance effort through evolutionary-based decision trees. SAC 2012: 1209-1214 - Anirban Basu, Jaideep Vaidya, Theo Dimitrakos
, Hiroaki Kikuchi:
Feasibility of a privacy preserving collaborative filtering scheme on the Google App Engine: a performance case study. SAC 2012: 447-452 - Radim Belohlávek, Vilém Vychodil:
Attribute implications in similarity-based databases: semantic entailment and nonredundant bases. SAC 2012: 840-846 - Badreddine Benreguia, Hamamache Kheddouci:
A consistency rule for graph isomorphism problem. SAC 2012: 906-911 - Giovanni Bernardi, Matthew Hennessy:
Modelling session types using contracts. SAC 2012: 1941-1946
skipping 317 more matches
loading more results
failed to load more results, please try again later
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-22 13:52 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint