![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 57 matches
- 2014
- Ali Abusnina, Daniel Kudenko, Rolf Roth:
Gaussian Process-Based Inferential Control System. SOCO-CISIS-ICEUTE 2014: 115-124 - Yonanda Adhitama, Wolfgang Rosenstiel:
Design Method for a Scalable Modular Structure Product Family. SOCO-CISIS-ICEUTE 2014: 289-299 - Maurizio Aiello, Maurizio Mongelli, Gianluca Papaleo:
Supervised Learning Approaches with Majority Voting for DNS Tunneling Detection. SOCO-CISIS-ICEUTE 2014: 463-472 - Tomasz Andrysiak, Lukasz Saganowski, Michal Choras, Rafal Kozik:
Network Traffic Prediction and Anomaly Detection Based on ARFIMA Model. SOCO-CISIS-ICEUTE 2014: 545-554 - Amira Sayed A. Aziz, Sanaa El-Ola Hanafi, Aboul Ella Hassanien:
Multi-agent Artificial Immune System for Network Intrusion Detection and Classification. SOCO-CISIS-ICEUTE 2014: 145-154 - Víctor Berrocal-Plaza, Miguel Ángel Vega Rodríguez
, Juan Manuel Sánchez-Pérez:
A Strength Pareto Approach and a Novel Formulation in the Reporting Cells Planning. SOCO-CISIS-ICEUTE 2014: 1-10 - Miren Nekane Bilbao
, Javier Del Ser, Sancho Salcedo-Sanz, Sergio Gil-Lopez, José Antonio Portilla-Figueras
:
A Bi-objective Harmony Search Approach for Deploying Cost-Effective Multi-hop Communications over Large-Area Wildfires. SOCO-CISIS-ICEUTE 2014: 93-103 - Beáta Bojda, Katalin Bubnó
, Benedek Nagy, Viktor Takács:
Visualization and Efficiency in Teaching Mathematics. SOCO-CISIS-ICEUTE 2014: 555-564 - Joaquín Borrego-Díaz
, Antonia M. Chávez-González, José Luis Pro-Martín, Virginia Matos-Arana:
Specifying and Verifying Meta-Security by Means of Semantic Web Methods. SOCO-CISIS-ICEUTE 2014: 355-365 - Zaki Brahmi
, Amine Lini, Mohamed Mohsen Gammoudi:
Mobile Agent Security Based on Artificial Immune System. SOCO-CISIS-ICEUTE 2014: 385-395 - Pavel Brandstetter
, Martin Kuchar
, Jiri Friedrich:
Application of RBF Neural Network in Sensorless Control of A.C. Drive with Induction Motor. SOCO-CISIS-ICEUTE 2014: 217-227 - Javier Carbó
, Juanita P. Pedraza, Mar Lopez, José Manuel Molina:
Privacy Protection in Trust Models for Agent Societies. SOCO-CISIS-ICEUTE 2014: 135-144 - Jesus Diaz
, David Arroyo, Francisco de Borja Rodríguez
:
Methodological Security Verification of a Registration Protocol. SOCO-CISIS-ICEUTE 2014: 453-462 - Can Ulas Dogruer
:
Online Identification of Odometer Parameters of a Mobile Robot. SOCO-CISIS-ICEUTE 2014: 195-206 - Rubén Escribano-García
, Rubén Lostado-Lorza, Roberto Fernández-Martínez
, Pedro Villanueva-Roldán, Bryan J. Mac Donald
:
Improvement in Manufacturing Welded Products through Multiple Response Surface Methodology and Data Mining Techniques. SOCO-CISIS-ICEUTE 2014: 301-310 - Julio Fernández-Ceniceros
, Javier Antoñanzas-Torres
, Rubén Urraca-Valle
, Enrique Sodupe-Ortega
, Andrés Sanz-García
:
Soft Computing Metamodels for the Failure Prediction of T-stub Bolted Connections. SOCO-CISIS-ICEUTE 2014: 41-51 - Borja Fernández-Gauna
, Juan Luis Osa
, Manuel Graña:
Effect of Initial Conditioning of Reinforcement Learning Agents on Feedback Control Tasks over Continuous State and Action Spaces. SOCO-CISIS-ICEUTE 2014: 125-133 - Roberto Fernández-Martínez
, Rubén Lostado-Lorza, Marcos Illera-Cueva, Rubén Escribano-García
, Bryan J. Mac Donald
:
Comparison Analysis of Regression Models Based on Experimental and FEM Simulation Datasets Used to Characterize Electrolytic Tinplate Materials. SOCO-CISIS-ICEUTE 2014: 279-288 - Margarida Figueiredo
, M. Lurdes Esteves, José Neves
, Henrique Vicente
:
Lab Classes in Chemistry Learning an Artificial Intelligence View. SOCO-CISIS-ICEUTE 2014: 565-575 - Pedro Luis Galdámez, María Angélica González Arrieta
, Miguel Ramón Ramón:
Neural Networks Using Hausdorff Distance, SURF and Fisher Algorithms for Ear Recognition. SOCO-CISIS-ICEUTE 2014: 239-249 - Iván García-Ferreira, Carlos Laorden
, Igor Santos, Pablo García Bringas
:
A Survey on Static Analysis and Model Checking. SOCO-CISIS-ICEUTE 2014: 443-452 - Adela Georgescu:
Vulnerabilities in a Two-Factor User Authentication in Multi-server Networks Protocol. SOCO-CISIS-ICEUTE 2014: 495-504 - Katarzyna Grzybowska
, Gábor Kovács:
Logistics Process Modelling in Supply Chain - Algorithm of Coordination in the Supply Chain - Contracting. SOCO-CISIS-ICEUTE 2014: 311-320 - Konrad Jackowski, Jan Platos
:
Application of AdaSS Ensemble Approach for Prediction of Power Plant Generator Tension. SOCO-CISIS-ICEUTE 2014: 207-216 - Ashish Jain
, Narendra S. Chaudhari:
Cryptanalytic Results on Knapsack Cryptosystem Using Binary Particle Swarm Optimization. SOCO-CISIS-ICEUTE 2014: 375-384 - Jan Janousek, Petr Gajdos, Michal Radecký, Václav Snásel:
Classification via Nearest Prototype Classifier Utilizing Artificial Bee Colony on CUDA. SOCO-CISIS-ICEUTE 2014: 21-30 - Tomás Jezowicz, Petr Gajdos, Eliska Ochodkova, Václav Snásel:
A New Iterative Approach for Finding Nearest Neighbors Using Space-Filling Curves for Fast Graphs Visualization. SOCO-CISIS-ICEUTE 2014: 11-20 - Victor V. Kashirin, Sergey V. Kovalchuk
, Alexander V. Boukhanovsky
:
Evolutionary Simulation of Complex Networks' Structures with Specific Functional Properties. SOCO-CISIS-ICEUTE 2014: 63-72 - Rafal Kozik
, Michal Choras, Rafal Renk, Witold Holubowicz
:
Modelling HTTP Requests with Regular Expressions for Detection of Cyber Attacks Targeted at Web Applications. SOCO-CISIS-ICEUTE 2014: 527-535 - Bartosz Krawczyk, Pawel Ksieniewicz
, Michal Wozniak
:
Hyperspectral Image Analysis Based on Quad Tree Decomposition. SOCO-CISIS-ICEUTE 2014: 105-113
skipping 27 more matches
loading more results
failed to load more results, please try again later
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-21 15:25 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint