Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 60 matches
- 2013
- Antonio J. Alencar, Carlos A. S. Franco, Eber A. Schmitz, Alexandre L. Correa:
A Statistical Approach for the Maximization of the Financial Benefits Yielded by a Large Set of MMFs and AEs. Comput. Informatics 32(6): 1147-1169 (2013) - Marek Bundzel, Tomás Kasanický, Richard Pincak:
Experimental Analysis of the Prediction Model Based on String Invariants. Comput. Informatics 32(6): 1131-1146 (2013) - Peter Butka, Jozef Pócs:
Generalization of One-Sided Concept Lattices. Comput. Informatics 32(2): 355-370 (2013) - Eun-Ae Cho, Chang-Joo Moon, Dae-Ha Park, Kangbin Yim:
Database Security System for Applying Sophisticated Access Control via Database Firewall Server. Comput. Informatics 32(6): 1192-1211 (2013) - Agnieszka Dabrowska-Boruch, Grzegorz Gancarczyk, Kazimierz Wiatr:
Implementation of a RANLUX Based Pseudo-Random Number Generator in FPGA Using VHDL and Impulse C. Comput. Informatics 32(6): 1272-1292 (2013) - Frantisek Darena, Jan Zizka:
Approaches to samples selection for machine learning based classification of textual data. Comput. Informatics 32(5): 949-967 (2013) - Xiaofeng Ding, Hai Jin, Hui Xu, Wei Song:
Probabilistic Skyline Queries over Uncertain Moving Objects. Comput. Informatics 32(5): 987-1012 (2013) - Zhijun Ding, Jiegi Liu, Junli Wang, Fang Wang:
An Executable Service Composition Code Automatic Creation Tool Based on Petri Net Model. Comput. Informatics 32(5): 968-986 (2013) - Roland Dobai, Marcel Baláz:
Compressed Skewed-Load Delay Test Generation Based on Evolution and Deterministic Initialization of Populations. Comput. Informatics 32(2): 251-272 (2013) - Piotr Dziubecki, Piotr Grabowski, Michal Krysinski, Tomasz Kuczynski, Krzysztof Kurowski, Tomasz Piontek, Dawid Szejnfeld:
New Science Gateways for Advanced Computing Simulations and Visualization Using Vine Toolkit in PL-Grid. Comput. Informatics 32(5): 1100-1115 (2013) - Sandra García-Rodríguez, David Quintana, Inés María Galván, Pedro Isasi:
Multiobjective Algorithms with Resampling for Portfolio Optimization. Comput. Informatics 32(4): 777-796 (2013) - Majid Ghayoori, Mostafa S. Haghjoo:
A Model to Overcome Integrity Challenges of an Untrusted DSMS Server. Comput. Informatics 32(3): 549-571 (2013) - Karam Gouda, Mosab Hassaan:
Efficiently Using Prime-Encoding for Mining Frequent Itemsets in Sparse Data. Comput. Informatics 32(5): 1079-1099 (2013) - Verena Christina Horak, Tobias Berka, Marián Vajtersic:
Parallel Classification with Two-Stage Bagging Classifiers. Comput. Informatics 32(4): 661-677 (2013) - Yongfeng Huang, Shanyu Tang, Wanxia Yang:
An Information- Theoretical Model for Streaming Media Based Stegosystems. Comput. Informatics 32(1): 47-62 (2013) - Mohammad Hussain:
Efficient Decimation of Polygonal Models Using Normal Field Deviation. Comput. Informatics 32(3): 527-547 (2013) - Bon-Woo Hwang, Seung-Jun Kwon, Sang-Woong Lee:
Facial Image Reconstruction from a Corrupted Image by Support Vector Data Description. Comput. Informatics 32(6): 1212-1228 (2013) - Lamiaa Fattouh Ibrahim, Hesham Abou El Fetouh Salman:
Applying Clustering Techniques in Hybrid Network in the Presence of 2D and 3D Obstacles. Comput. Informatics 32(6): 1170-1191 (2013) - Radu Iosif, Adam Rogalewicz:
Automata-Based Termination Proofs. Comput. Informatics 32(4): 739-775 (2013) - Santiago Iturriaga, Sergio Nesmachnow, Bernabé Dorronsoro, Pascal Bouvry:
Energy Efficient Scheduling in Heterogeneous Systems with a Parallel Multiobjective Local Search. Comput. Informatics 32(2): 273-294 (2013) - Jiuchuan Jiang, Yungui Zhang:
A Social Force Model for Adjusting Sensing Ranges in Multiple Sensing Agent Systems. Comput. Informatics 32(1): 89-112 (2013) - Zsolt Csaba Johanyák:
Fuzzy Modeling of Thermoplastic Composites' Melt Volume Rate. Comput. Informatics 32(4): 845-857 (2013) - Chouvalit Khancome, Veera Boonjing:
A New Linear-Time Dynamic Dictionary Matching Algorithm. Comput. Informatics 32(5): 897-923 (2013) - Jongwan Kim, Dukshin Oh, Keecheon Kim:
QMBRi: Inverse quantization of minimum bounding rectangles for spatial data compression. Comput. Informatics 32(4): 679-696 (2013) - Nathalie Cindy Kuicheu, Ning Wang, Gile Narcisse Fanzou Tchuissang, De Xu, Guojun Dai, François Siewe:
Managing Uncertain Mediated Schema and Semantic Mappings Automatically in Dataspace Support Platforms. Comput. Informatics 32(1): 175-202 (2013) - Vijay Kumar, Arun Sharma, Rajesh Kumar:
Applying Soft Computing Approaches to Predict Defect Density in Software Product Releases: An Empirical Study. Comput. Informatics 32(1): 203-224 (2013) - Junwei Lei, Hongchao Zhao, Jinyong Yu, Zuoe Fan, Heng Li, Kehua Li:
Research on Tracking and Synchronization of Uncertain Chaotic Systems. Comput. Informatics 32(6): 1293-1311 (2013) - Jin Li, Xiaofeng Chen:
Efficient Multi-User Keyword Search over Encrypted Data in Cloud Computing. Comput. Informatics 32(4): 723-738 (2013) - Xiaoqian Li, Huachun Zhou, Hongbin Luo, Hongke Zhang, Feng Qiu, Ilsun You:
HMS: A Hierarchical Mapping System for the Locator/ID Separation Network. Comput. Informatics 32(6): 1229-1255 (2013) - Jack Mario Mingo, Ricardo Aler, Darío Maravall, Javier de Lope Asiaín:
Investigations into Lamarckism, Baldwinism and Local Search in Grammatical Evolution Guided by Reinforcement. Comput. Informatics 32(3): 595-627 (2013)
skipping 30 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-29 03:10 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint