Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 60 matches
- 2017
- Vivek Agrawal:
A Comparative Study on Information Security Risk Analysis Methods. J. Comput. 12(1): 57-67 (2017) - Md. Mostofa Akbar, S. M. Farhad, Munima Jahan, Md. Humayun Kabir:
Distributed Client-Assisted Patching for Multicast Video-on-Demand Service in an Enterprise Network. J. Comput. 12(6): 511-520 (2017) - Ali Alkhalifah, Sulaiman Al Amro:
Understanding the Effect of Privacy Concerns on User Adoption of Identity Management Systems. J. Comput. 12(2): 174-182 (2017) - Madallah Alruwaili, Lalit Gupta:
Formulating Enhancement and Restoration Strategy to Improve the Quality of Dusty Images. J. Comput. 12(4): 291-300 (2017) - Ahmed B. Altamimi:
Buffer Management in Mobile Social Networks. J. Comput. 12(1): 20-27 (2017) - Taha Arian, Amir Kusedghi, Bijan Raahemi, Ahmad Akbari:
A Collaborative Load Balancer for Network Intrusion Detection in Cloud Environments. J. Comput. 12(1): 28-47 (2017) - Yildiz Aydin, Durmus Özdemir, Gulsah Tumuklu Ozyer:
Traffic Sign Recognition System for Imbalanced Dataset. J. Comput. 12(6): 543-549 (2017) - Luyi Bai, Yin Li, Jiemin Liu:
Fast Leaf-to-Root Holistic Twig Query on XML Spatiotemporal Data. J. Comput. 12(6): 534-542 (2017) - Luyi Bai, Zhulei Shao, Zhuo Lin, Shaohui Cheng:
Fixing Consistencies of Fuzzy Temporal XML Data. J. Comput. 12(6): 564-570 (2017) - Imran Sarwar Bajwa, Fatim Karim, M. Asif Naeem, Riaz ul Amin:
A Semi Supervised Approach for Catchphrase Classification in Legal Text Documents. J. Comput. 12(5): 451-461 (2017) - Bunil Kumar Balabantaray, Om Prakash Sahu, Nibedita Mishra, Bibhuti Bhusan Biswal:
A Quantitative Performance Analysis of Edge Detectors with Hybrid Edge Detector. J. Comput. 12(2): 165-173 (2017) - Nahla H. Barakat:
Cascade Generalization: One versus Many. J. Comput. 12(3): 238-249 (2017) - Tianping Bi, Xuemei Yang, Meili Ren:
The Design and Implementation of Smart Campus System. J. Comput. 12(6): 527-533 (2017) - Christian Brandstatter, Samer Schaat, Alexander Wendt, Martin Fittner:
How Agents Use Breadcrumbs to Find Their Way. J. Comput. 12(1): 89-96 (2017) - Erman Çakit, Waldemar Karwowski:
Potential Applications of Soft-Computing Techniques for Human Socio-Cultural Behavior Modeling. J. Comput. 12(4): 284-290 (2017) - Abidin Çaliskan, Ulus Çevik:
Three-Dimensional Modeling in Medical Image Processing by Using Fractal Geometry. J. Comput. 12(5): 479-485 (2017) - Daniel G. Cantón-Puerto, Francisco Moo-Mena, Víctor Uc-Cetina:
QoS-Based Web Services Selection Using a Hidden Markov Model. J. Comput. 12(1): 48-56 (2017) - Yue Chi, Ning He, Qi Zhang:
A Fast Image Restoration Method Based on an Improved Criminisi Algorithm. J. Comput. 12(6): 591-601 (2017) - Kitsiri Chochiang, Fouad Hanna, Marie-Laure Betbeder, Jean-Christophe Lapayre:
New Techniques in Thai-English Transliterated Words Searching, Applied to Our New Webservices Platform for Tourism (WICHAI). J. Comput. 12(5): 408-415 (2017) - Efthymios Chondrogiannis, Efstathios Karanastasis, Vassiliki Andronikou, Theodora A. Varvarigou:
Building a Repository for Inferring the Meaning of Abbreviations Used in Clinical Studies. J. Comput. 12(1) (2017) - Dietmar Dietrich, Matthias Jakubec, Samer Schaat, Klaus Doblhammer, Georg Fodor, Christian Brandstatter:
The Fourth Outrage of Man (Is the Turing-Test Still up to Date?). J. Comput. 12(2): 116-126 (2017) - Tingting Dong, Yoshiharu Ishikawa, Chuan Xiao, Jing Zhao:
k-Expected Nearest Neighbor Search over Gaussian Objects. J. Comput. 12(2): 105-115 (2017) - A. A. Abd El-Aziz:
An Overview on XML Security Technologies. J. Comput. 12(5): 462-469 (2017) - Umar Farooq, Hasan Mansoor, Antoine Nongaillard, Yacine Ouzrout, Muhammad Abdul Qadir:
Negation Handling in Sentiment Analysis at Sentence Level. J. Comput. 12(5): 470-478 (2017) - Monir Foqaha, Mohammed Awad:
Hybrid Approach to Optimize the Centers of Radial Basis Function Neural Network Using Particle Swarm Optimization. J. Comput. 12(5): 396-407 (2017) - Malgorzata Goldhoorn, Ronny Hartanto:
Enhancing Object Detection by Using Probabilistic Spatial-Semantic Knowledge. J. Comput. 12(1): 68-75 (2017) - Ivan Homoliak, Dominik Breitenbacher, Petr Hanácek:
Convergence Optimization of Backpropagation Artificial Neural Network Used for Dichotomous Classification of Intrusion Detection Dataset. J. Comput. 12(2): 143-155 (2017) - Muhammad Ilyas, Siffat Ullah Khan:
Software Integration Challenges for GSD Vendors: An Exploratory Study Using a Systematic Literature Review. J. Comput. 12(5): 416-422 (2017) - G. Jemilda, S. Baulkani, D. George Paul, J. Benjamin Rajan:
Tracking Moving Objects in Video. J. Comput. 12(3): 221-229 (2017) - Ci-Bin Jiang, Jung-Shian Li:
Exploring Global IP-Usage Patterns in Fast-Flux Service Networks. J. Comput. 12(4): 371-379 (2017)
skipping 30 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-30 10:31 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint