Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 64 matches
- 2011
- Ali Amiri, Mahmood Fathy:
Video Shot Boundary Detection Using Generalized Eigenvalue Decomposition and Gaussian Transition Detection. Comput. Informatics 30(3): 595-619 (2011) - Ailixier Aikebaier, Tomoya Enokido, Makoto Takizawa:
Reliable and Efficient Way to Broadcast Messages in a Group by Trust-Based Broadcast (TBB) Scheme. Comput. Informatics 30(6): 1067-1081 (2011) - Hossein Ajorloo, Abolfazl Lakdashti:
IRFuM: Image Retrieval Via Fuzzy Modeling. Comput. Informatics 30(5): 913-941 (2011) - Abdelouhab Aloui, Megdouda Ourbih-Tari:
The Use of Refined Descriptive Sampling and Applications in Parallel Monte Carlo Simulation. Comput. Informatics 30(4): 681-700 (2011) - Hazleen Aris, Siti Salwah Salim:
Properties for Component Model: The definition Perspective. Comput. Informatics 30(5): 987-1010 (2011) - Stefan Babinec, Jiri Pospichal:
Modular Echo State Neural Networks in Time Series Prediction. Comput. Informatics 30(2): 321-334 (2011) - Ugo Barchetti, Antonio Capodieci, Anna Lisa Guido, Luca Mainetti:
Modelling Collaboration Processes Through Design Patterns. Comput. Informatics 30(1): 113-135 (2011) - Peter Bartalos, Mária Bieliková:
Automatic Dynamic Web Service Composition: A Survey and Problem Formalization. Comput. Informatics 30(4): 793-827 (2011) - Tobias Berka, Marián Vajtersic:
Parallel Retrieval of Dense Vectors in the Vector Space Model. Comput. Informatics 30(2): 247-265 (2011) - Stefan Boor:
Maximum Coverage Method for Feature Subset Selection for Neural Network Training. Comput. Informatics 30(5): 901-912 (2011) - Thomas Burkhart, Christoph Dorn, Dirk Werth, Peter Loos:
A Flexible Approach Towards Self-Adapting Process Recommendations. Comput. Informatics 30(1): 89-111 (2011) - Hangbae Chang, Hyuk-Jun Kwon, Jonggu Kang, Yang-Hoon Kim:
A Case Study on Intelligent Service Design in Ubiquitous Computing. Comput. Informatics 30(3): 513-529 (2011) - Subhagata Chattopadhyay, Dilip Kumar Pratihar, Sanjib Chandra De Sarkar:
A Comparative Study of Fuzzy C-Means Algorithm and Entropy-Based Fuzzy Clustering Algorithms. Comput. Informatics 30(4): 701-720 (2011) - Wojciech W. Czech, Witold Dzwinel, Slawomir Goryczka, Tomasz Arodz, Arkadiusz Z. Dudek:
Exploring Complex Networks with Graph Investigator Research Application. Comput. Informatics 30(2): 381-410 (2011) - Maria Cláudia Figueiredo Pereira Emer, Igor Fabiano Nazar, Silvia Regina Vergilio, Mário Jino:
Fault-Based Test of XML Schemas. Comput. Informatics 30(3): 531-557 (2011) - Ján Glasa, Ladislav Halada:
A Note on Mathematical Modelling of Elliptical Fire Propagation. Comput. Informatics 30(6): 1303-1319 (2011) - Guanghua Gu, Dong Cui:
Polar Angle Detection and Image Combination Based Leukocyte Segmentation for Overlapping Cell Images. Comput. Informatics 30(1): 189-199 (2011) - Ankur Gupta, Lalit Kumar Awasthi:
Peer-to-Peer Networks and Computation: Current Trends and Future Perspectives. Comput. Informatics 30(3): 559-594 (2011) - Shih-Hao Hung, Jeng-Peng Shieh, Chen-Pang Lee:
Virtualizing Smartphone Applications to the Cloud. Comput. Informatics 30(6): 1083-1097 (2011) - Makoto Ikeda, Leonard Barolli, Masahiro Hiyama, Elis Kulla, Makoto Takizawa:
Performance Evaluation of MANET Routing Protocols: Simulations and Experiments. Comput. Informatics 30(6): 1147-1165 (2011) - Andreas Janecek, Stefan Schulze Grotthoff, Wilfried N. Gansterer:
libNMF - A Library for Nonnegative Matrix Factorization. Comput. Informatics 30(2): 205-224 (2011) - Xiaomin Jia, Jiang Jiang, Yongwen Wang, Shubo Qi, Tianlei Zhao, Guitao Fu, Minxuan Zhang:
BP-NUCA: Cache Pressure-Aware Migration for High-Performance Caching in CMPs. Comput. Informatics 30(5): 1037-1060 (2011) - Mohammadreza Jooyandeh, S. Mehdi Hashemi:
Designing an Aspect-Oriented Persistence Layer Supporting Object-Oriented Query Using the .NET Framework 3.5. Comput. Informatics 30(3): 621-637 (2011) - Haeran Kang, Kyong-Ho Lee:
A Semantic Approach to Integrating XML Schemas Using Domain Ontologies. Comput. Informatics 30(4): 857-879 (2011) - Ahmed M. Khedr:
Nearest Neighbor Clustering over Partitioned Data. Comput. Informatics 30(5): 1011-1036 (2011) - Ji-Hoon Kim, Jin-Woo Song, Taek-Hun Kim, Sung-Bong Yang:
An Enhanced Double-layered P2P System for the Reliability in Dynamic Mobile Environments. Comput. Informatics 30(3): 467-489 (2011) - Joanna Kosinska, Jacek Kosinski, Krzysztof Zielinski:
Virtual Grid - New Paradigm of System Resources Dynamic Organization. Comput. Informatics 30(4): 749-760 (2011) - Michal Krzywucki, Stanislaw Polak:
Workflow Similarity Analysis. Comput. Informatics 30(4): 773-791 (2011) - Michal Laclavik, Stefan Dlugolinsky, Martin Seleng, Marcel Kvassay, Emil Gatial, Zoltán Balogh, Ladislav Hluchý:
Email Analysis and Information Extraction for Enterprise Benefit. Comput. Informatics 30(1): 57-87 (2011) - Malrey Lee, Nam-Deok Cho, Keun Kwang Lee, Kyoung Sook Ko:
Design and Implementation of an Intranet Security and Access Control System in Ubi-Com. Comput. Informatics 30(3): 419-428 (2011)
skipping 34 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-08 09:53 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint