![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 60 matches
- 2010
- Larbi Afifi, El Mostafa Magri, Abdelhaq El Jai:
Weak and exact domination in distributed systems. Int. J. Appl. Math. Comput. Sci. 20(3): 419-426 (2010) - Robert Baczyk, Andrzej J. Kasinski:
Visual simultaneous localisation and map-building supported by structured landmarks. Int. J. Appl. Math. Comput. Sci. 20(2): 281-293 (2010) - Bartosz Bandrowski, Anna Karczewska, Piotr Rozmej
:
Numerical solutions to integral equations equivalent to differential equations with fractional time. Int. J. Appl. Math. Comput. Sci. 20(2): 261-269 (2010) - Alexander Barkalov, Larysa Titarenko, Jacek Bieganowski:
Reduction in the number of LUT elements for control units with code sharing. Int. J. Appl. Math. Comput. Sci. 20(4): 751-761 (2010) - Dominik Belter
, Piotr Skrzypczynski
:
A biologically inspired approach to feasible gait learning for a hexapod robot. Int. J. Appl. Math. Comput. Sci. 20(1): 69-84 (2010) - Jacek Blazewicz
, Mikhail Y. Kovalyov
, Jedrzej Musial, Andrzej P. Urbanski, Adam Wojciechowski:
Internet shopping optimization problem. Int. J. Appl. Math. Comput. Sci. 20(2): 385-390 (2010) - Krzysztof Bucholc, Krzysztof Chmiel, Anna Grocholewska-Czurylo, Ewa Idzikowska, Izabela Janicka-Lipska
, Janusz Stoklosa
:
Scalable PP-1 block cipher. Int. J. Appl. Math. Comput. Sci. 20(2): 401-411 (2010) - Mikolaj Buslowicz:
Robust stability of positive continuous-time linear systems with delays. Int. J. Appl. Math. Comput. Sci. 20(4): 665-670 (2010) - Yun Fah Chang
, Jia Chii Lee, Omar Mohd. Rijal, Syed Abdul Rahman Syed Abu Bakar
:
Efficient online handwritten Chinese character recognition system using a two-dimensional functional relationship model. Int. J. Appl. Math. Comput. Sci. 20(4): 727-738 (2010) - Julio B. Clempner:
A hierarchical decomposition of decision process Petri nets for modeling complex systems. Int. J. Appl. Math. Comput. Sci. 20(2): 349-366 (2010) - Tijmen P. Collignon, Martin B. van Gijzen:
Two implementations of the preconditioned conjugate gradient method on heterogeneous computing grids. Int. J. Appl. Math. Comput. Sci. 20(1): 109-121 (2010) - Aldina Correia
, João Matias
, Pedro Mestre
, Carlos Serôdio
:
Derivative-free nonlinear optimization filter simplex. Int. J. Appl. Math. Comput. Sci. 20(4): 679-688 (2010) - Mehryar Emambakhsh
, Hossein Ebrahimnezhad
, Mohammad Hosein Sedaaghi:
Integrated region-based segmentation using color components and texture features with prior shape knowledge. Int. J. Appl. Math. Comput. Sci. 20(4): 711-726 (2010) - Krzysztof Fujarewicz
:
Planning identification experiments for cell signaling pathways: An NF?B case study. Int. J. Appl. Math. Comput. Sci. 20(4): 773-780 (2010) - Robert Gold:
Control flow graphs and code coverage. Int. J. Appl. Math. Comput. Sci. 20(4): 739-749 (2010) - Henryk Górecki:
Analytic solution of transcendental equations. Int. J. Appl. Math. Comput. Sci. 20(4): 671-677 (2010) - Sang-Eon Han:
Ultra regular covering space and its automorphism group. Int. J. Appl. Math. Comput. Sci. 20(4): 699-710 (2010) - Tadeusz Kaczorek
:
Similarity transformation of matrices to one common canonical form and its applications to 2D linear systems. Int. J. Appl. Math. Comput. Sci. 20(3): 507-512 (2010) - Tadeusz Kaczorek
, Krzysztof Rogowski
:
Positivity and stabilization of fractional 2D linear systems described by the Roesser model. Int. J. Appl. Math. Comput. Sci. 20(1): 85-92 (2010) - Alexander Khapalov:
Source localization and sensor placement in environmental monitoring. Int. J. Appl. Math. Comput. Sci. 20(3): 445-458 (2010) - Przemyslaw Klesk
:
Probabilities of discrepancy between minima of cross-validation, Vapnik bounds and true risks. Int. J. Appl. Math. Comput. Sci. 20(3): 525-544 (2010) - Janusz Kogut
, Henryk Ciurej:
A vehicle-track-soil dynamic interaction problem in sequential and parallel formulation. Int. J. Appl. Math. Comput. Sci. 20(2): 295-303 (2010) - Mahiéddine Kouche
, Bedr'Eddine Ainseba
:
A mathematical model of HIV-1 infection including the saturation effect of healthy cell proliferation. Int. J. Appl. Math. Comput. Sci. 20(3): 601-612 (2010) - Tomasz Kryjak
, Marek Gorgon:
Parallel implementation of local thresholding in Mitrion-C. Int. J. Appl. Math. Comput. Sci. 20(3): 571-580 (2010) - Piotr Kulczycki, Malgorzata Charytanowicz
:
A complete gradient clustering algorithm formed with kernel estimators. Int. J. Appl. Math. Comput. Sci. 20(1): 123-134 (2010) - Maciej Lawrynczuk
, Piotr Tatjewski
:
Nonlinear predictive control based on neural multi-models. Int. J. Appl. Math. Comput. Sci. 20(1): 7-21 (2010) - Vyacheslav Maksimov
:
On one algorithm for solving the problem of source function reconstruction. Int. J. Appl. Math. Comput. Sci. 20(2): 239-247 (2010) - Zoltán Ádám Mann:
Numbering action vertices in workflow graphs. Int. J. Appl. Math. Comput. Sci. 20(3): 591-600 (2010) - Michal Morawski
, Antoni M. Zajaczkowski:
Approach to the design of robust networked control systems. Int. J. Appl. Math. Comput. Sci. 20(4): 689-698 (2010) - Ireneusz Mrozek
:
Analysis of multibackground memory testing techniques. Int. J. Appl. Math. Comput. Sci. 20(1): 191-205 (2010)
skipping 30 more matches
loading more results
failed to load more results, please try again later
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-20 00:13 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint