Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 64 matches
- 2011
- Katia Abbaci, Fernando Lemos, Allel HadjAli, Daniela Grigori, Ludovic Liétard, Daniel Rocacher, Mokrane Bouzeghoub:
An Approach Based on Fuzzy Sets to Selecting and Ranking Business Processes. CEC 2011: 213-218 - Yudistira Asnar, Tong Li, Fabio Massacci, Federica Paci:
Computer Aided Threat Identification. CEC 2011: 145-152 - Lerina Aversano, Carmine Grasso, Maria Tortorella:
Evolving Enterprise Information System in Small and Medium Enterprise: An Opportunistic Approach and a Case Study. CEC 2011: 407-414 - Andra Bianca Balmus, Maria-Eugenia Iacob, Marten van Sinderen, Murk van Busschbach:
Reference System Architecture for Trade Promotion Management: Leveraging Business Intelligence Technologies and Decision Support Systems. CEC 2011: 179-184 - Stefanie Betz, Susan Hickl, Andreas Oberweis:
Risk-Aware Business Process Modeling and Simulation Using XML Nets. CEC 2011: 349-356 - Shantanu Biswas:
Optimal Combinatorial Auction for Initial Commitment Decision Problem in Virtual Organizations. CEC 2011: 89-95 - Benjamin Blau, Tobias Conte:
Co-Opetitive Contracting in Service Value Networks. CEC 2011: 173-178 - Hui-Shan Chen, Kuo-Yang Cheng, Zong-Shuo Jheng, Yi-Lun Pan, Chang-Hsing Wu, Hsi-En Yu:
Easy Virtual Cluster with Cloud Storage for HPC Numerical Simulation. CEC 2011: 197-200 - Grégory Claude, Marc Boyer, Gaël Durand, Florence Sèdes:
A Framework to Manage Knowledge from Defect Resolution Process. CEC 2011: 10-17 - Francisco Cruz, Pedro Gomes, Rui Oliveira, José Pereira:
Assessing NoSQL Databases for Telecom Applications. CEC 2011: 267-270 - Elizabeth J. Davidson, Emmanuelle Vaast, Ping Wang:
The Greening of IT: How Discourse Informs IT Sustainability Innovation. CEC 2011: 421-427 - Gilbert Fridgen, Christian Stepanek, Thomas Wolf:
An Idea for Modelling Exogenous Shocks on Supply Networks Using Petri Nets. CEC 2011: 415-417 - Katsuhide Fujita, Mark Klein, Takayuki Ito:
Issue-Grouping Approach for Multiple Interdependent Issues Negotiation with Exaggerator Agents. CEC 2011: 333-340 - Naoki Fukuta, Takayuki Ito:
Toward Combinatorial Auction-based Better Electric Power Allocation on Sustainable Electric Power Systems. CEC 2011: 392-399 - Khaled Gaaloul, Henderik Alex Proper, François Charoy:
Delegation Protocols in Human-Centric Workflows. CEC 2011: 219-224 - Fatih Gedikli, Faruk Bagdat, Mouzhi Ge, Dietmar Jannach:
RF-Rec: Fast and Accurate Computation of Recommendations Based on Rating Frequencies. CEC 2011: 50-57 - Roch H. Glitho:
Cloud-based Multimedia Conferencing: Business Model, Research Agenda, State-of-the-Art. CEC 2011: 226-230 - Ray Harishankar, S. Kevin Daley:
Actionable Business Architecture. CEC 2011: 318-324 - Harry H. M. Hendrickx, S. Kevin Daley, Mieke Mahakena, Mark von Rosing:
Defining the Business Architecture Profession. CEC 2011: 325-332 - Willem-Jan van den Heuvel:
Leveraging Business Process as a Service with Blueprinting. CEC 2011: 225 - Silviu Homoceanu, Michael Loster, Christoph Lofi, Wolf-Tilo Balke:
Will I Like It? Providing Product Overviews Based on Opinion Excerpts. CEC 2011: 26-33 - Vedran Hrgovcic, Robert Woitsch, Dimitris Karagiannis:
Hybrid Service Modeling in Enterprise Computing. CEC 2011: 207-212 - Sebastian Hudert, Stefan König, Torsten Eymann:
A Proposal for a Life Cycle Model for Electronic Service Markets. CEC 2011: 371-378 - Takayuki Ito, Yuya Takahashi, Eizo Hideshima, Takanori Ito:
Implementation of Web-based Consensus Support System for Campus Greening Project: Preliminary Results. CEC 2011: 357-364 - Tiko Iyamu:
Enterprise Architecture as Information Technology Strategy. CEC 2011: 82-88 - Claus Torp Jensen:
Integrating EA and BPM Synergistically: Methodologically Combining Planning and Delivery. CEC 2011: 279-285 - Henk Jonkers, Erik Proper, Marc M. Lankhorst, Dick A. C. Quartel, Maria-Eugenia Iacob:
ArchiMate(R) for Integrated Modelling Throughout the Architecture Development and Implementation Cycle. CEC 2011: 294-301 - Jason J. Jung:
A Bibliometric Analysis on Green Supply Chain Management: A Preliminary Result. CEC 2011: 418-420 - Jerzy Kaczorek, Bogdan Wiszniewski:
A Simple Model for Automated Negotiations over Collaboration Agreements in ebXML. CEC 2011: 167-172 - Marwane El Kharbili, Qin Ma, Pierre Kelsen, Elke Pulvermüller:
Enterprise Regulatory Compliance Modeling Using CoReL: An Illustrative Example. CEC 2011: 185-190
skipping 34 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-27 19:10 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint