Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 82 matches
- 2014
- Omar Sultan Al-Kadi, Osama Al-Kadi, Rizik M. H. Al-Sayyed, Ja'far Alqatawna:
Road scene analysis for determination of road traffic density. Frontiers Comput. Sci. 8(4): 619-628 (2014) - Wenjie Cai, Seiichi Uchida, Hiroaki Sakoe:
Comparative performance analysis of stroke correspondence search methods for stroke-order free online multi-stroke character recognition. Frontiers Comput. Sci. 8(5): 773-784 (2014) - Xian-Fa Cai, Guihua Wen, Jia Wei, Zhiwen Yu:
Relative manifold based semi-supervised dimensionality reduction. Frontiers Comput. Sci. 8(6): 923-932 (2014) - Heng Chen, Hai Jin, Feng Zhao:
PSG: a two-layer graph model for document summarization. Frontiers Comput. Sci. 8(1): 119-130 (2014) - Lin Cheng, Qiaoyan Wen, Zhengping Jin, Hua Zhang:
Cryptanalysis and improvement of a certificateless encryption scheme in the standard model. Frontiers Comput. Sci. 8(1): 163-173 (2014) - Li Cui:
SWVFS: a saliency weighted visual feature similarity metric for image quality assessment. Frontiers Comput. Sci. 8(1): 145-155 (2014) - Le Dong, Wenling Wu, Shuang Wu, Jian Zou:
Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes. Frontiers Comput. Sci. 8(3): 513-525 (2014) - Yuyue Du, Yuhui Ning:
Property analysis of logic Petri nets by marking reachability graphs. Frontiers Comput. Sci. 8(4): 684-692 (2014) - Hebah ElGibreen, Mehmet Sabih Aksoy:
RULES-IT: incremental transfer learning with RULES family. Frontiers Comput. Sci. 8(4): 537-562 (2014) - Ruiji Fu, Bing Qin, Ting Liu:
Generating Chinese named entity data from parallel corpora. Frontiers Comput. Sci. 8(4): 629-641 (2014) - Yuan Guan, Shimin Cai, Mingsheng Shang:
Recommendation algorithm based on item quality and user rating preferences. Frontiers Comput. Sci. 8(2): 289-297 (2014) - Wenzhong Guo, Genggeng Liu, Guolong Chen, Shaojun Peng:
A hybrid multi-objective PSO algorithm with local search strategy for VLSI partitioning. Frontiers Comput. Sci. 8(2): 203-216 (2014) - Yaobin He, Haoyu Tan, Wuman Luo, Shengzhong Feng, Jianping Fan:
MR-DBSCAN: a scalable MapReduce-based DBSCAN algorithm for heavily skewed data. Frontiers Comput. Sci. 8(1): 83-99 (2014) - Cuiyun Hu, XinJun Mao, Mengjun Li, Zhi Zhu:
Organization-based agent-oriented programming: model, mechanisms, and language. Frontiers Comput. Sci. 8(1): 33-51 (2014) - Yingsheng Ji, Yingzhuo Zhang, Guangwen Yang:
Interpolation oriented parallel communication to optimize coupling in earth system modeling. Frontiers Comput. Sci. 8(4): 693-708 (2014) - Mingming Jiang, Yupu Hu, Hao Lei, Baocang Wang, Qiqi Lai:
Lattice-based certificateless encryption scheme. Frontiers Comput. Sci. 8(5): 828-836 (2014) - Ali Khazaee, Ataollah Ebrahimzadeh:
ECG beat classification using particle swarm optimization and support vector machine. Frontiers Comput. Sci. 8(2): 217-231 (2014) - Qiqi Lai, Yuan Chen, Yupu Hu, Baocang Wang, Mingming Jiang:
Construction of a key-dependent message secure symmetric encryption scheme in the ideal cipher model. Frontiers Comput. Sci. 8(3): 469-477 (2014) - Yuqing Lan, Hao Xu:
Research on technology of desktop virtualization based on SPICE protocol and its improvement solutions. Frontiers Comput. Sci. 8(6): 885-892 (2014) - Jong-Hyuk Lee, SungJin Choi, Joon-Min Gil, Taeweon Suh, Heon-Chang Yu:
A scheduling algorithm with dynamic properties in mobile grid. Frontiers Comput. Sci. 8(5): 847-857 (2014) - Xiaodong Li, Xiaotie Deng, Shanfeng Zhu, Feng Wang, Haoran Xie:
An intelligent market making strategy in algorithmic trading. Frontiers Comput. Sci. 8(4): 596-608 (2014) - Qiang Li, Yahong Han, Jianwu Dang:
Image decomposing for inpainting using compressed sensing in DCT domain. Frontiers Comput. Sci. 8(6): 905-915 (2014) - Chaoqun Li, Liangxiao Jiang, Hongwei Li:
Naive Bayes for value difference metric. Frontiers Comput. Sci. 8(2): 255-264 (2014) - Wei Li, Yuefei Sui:
A sound and complete R-calculi with respect to contraction and minimal change. Frontiers Comput. Sci. 8(2): 184-191 (2014) - Qin Li, Yongxin Zhao, Huibiao Zhu, Jifeng He:
A UTP semantic model for Orc language with execution status and fault handling. Frontiers Comput. Sci. 8(5): 709-725 (2014) - Xiangke Liao:
MilkyWay-2: back to the world Top 1. Frontiers Comput. Sci. 8(3): 343-344 (2014) - Xiangke Liao, Liquan Xiao, Canqun Yang, Yutong Lu:
MilkyWay-2 supercomputer: system and application. Frontiers Comput. Sci. 8(3): 345-356 (2014) - Bin Lin, Shanshan Li, Xiangke Liao, Jing Zhang, Xiaodong Liu:
Leach: an automatic learning cache for inline primary deduplication system. Frontiers Comput. Sci. 8(2): 175-183 (2014) - Wang Lin, Min Wu, Zhengfeng Yang, Zhenbing Zeng:
Proving total correctness and generating preconditions for loop programs via symbolic-numeric computation methods. Frontiers Comput. Sci. 8(2): 192-202 (2014) - Lu Liu, Tao Peng:
Clustering-based topical Web crawling using CFu-tree guided by link-context. Frontiers Comput. Sci. 8(4): 581-595 (2014)
skipping 52 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-29 17:55 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint