default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 106 matches
- 2005
- Swapan Bhattacharya, Anirban Banerjee, Shibdas Bandyopadhyay:
CORBA-Based Analysis of Multi Agent Behavior. J. Comput. Sci. Technol. 20(1): 118-124 (2005) - Yici Cai, Jin Shi, Zuying Luo, Xianlong Hong:
Modeling and Analysis of Mesh Tree Hybrid Power/Ground Networks with Multiple Voltage Supply in Time Domain. J. Comput. Sci. Technol. 20(2): 224-230 (2005) - Jin-yi Cai, Hong Zhu:
Progress in Computational Complexity Theory. J. Comput. Sci. Technol. 20(6): 735-750 (2005) - Yici Cai, Xin Zhao, Qiang Zhou, Xianlong Hong:
Shielding Area Optimization Under the Solution of Interconnect Crosstalk. J. Comput. Sci. Technol. 20(6): 901-906 (2005) - Joong Hyuk Chang, Won Suk Lee:
Effect of Count Estimation in Finding Frequent Itemsets over Online Transactional Data Streams. J. Comput. Sci. Technol. 20(1): 63-69 (2005) - Dun-Ren Che:
Accomplishing Deterministic XML Query Optimization. J. Comput. Sci. Technol. 20(3): 357-366 (2005) - Jian-Er Chen:
Parameterized Computation and Complexity: A New Approach Dealing with NP-Hardness. J. Comput. Sci. Technol. 20(1): 18-37 (2005) - Hong Chen, Ling Chen, Gencai Chen:
Effects of Local-Lag Mechanism on Task Performance in a Desktop CVE System. J. Comput. Sci. Technol. 20(3): 396-401 (2005) - Ying Chen, Karthik Ranganathan, Vasudev V. Pai, David J. Lilja, Kia Bazargan:
A Novel Memory Structure for Embedded Systems: Flexible Sequential and Random Access Memory. J. Comput. Sci. Technol. 20(5): 596-606 (2005) - Liang Chen, Hongyu Zhao:
Integrating mRNA Decay Information into Co-Regulation Study. J. Comput. Sci. Technol. 20(4): 434-438 (2005) - Andrew A. Chien, Xian-He Sun, Zhiwei Xu:
Viewpoints on Grid Standards. J. Comput. Sci. Technol. 20(1): 141-143 (2005) - Xu-bin Deng, Yangyong Zhu:
L-Tree Match: A New Data Extraction Model and Algorithm for Huge Text Stream with Noises. J. Comput. Sci. Technol. 20(6): 763-773 (2005) - Shengzhi Du, Zengqiang Chen, Zhuzhi Yuan:
Evolutionary Pseudo-Relaxation Learning Algorithm for Bidirectional Associative Memory. J. Comput. Sci. Technol. 20(4): 559-566 (2005) - Nadir Farah, Labiba Souici, Mokhtar Sellami:
Arabic Word Recognition by Classifiers and Context. J. Comput. Sci. Technol. 20(3): 402-410 (2005) - Su Feng:
Mechanizing Weakly Ground Termination Proving of Term Rewriting Systems by Structural and Cover-Set Inductions. J. Comput. Sci. Technol. 20(4): 496-513 (2005) - Xiaobing Feng, Li Chen, Yi-Ran Wang, Xiao-Mi An, Lin Ma, Chun-Lei Sang, Zhaoqing Zhang:
Integrating Parallelizing Compilation Technologies for SMP Clusters. J. Comput. Sci. Technol. 20(1): 125-133 (2005) - Jean Marc Gallière, Michel Renovell, Florence Azaïs, Yves Bertrand:
Delay Testing Viability of Gate Oxide Short Defects. J. Comput. Sci. Technol. 20(2): 195-200 (2005) - Hong Gao, Jianzhong Li:
Parallel Data Cube Storage Structure for Range Sum Queries and Dynamic Updates. J. Comput. Sci. Technol. 20(3): 345-356 (2005) - Wen Gao, Lionel M. Ni, Zhiwei Xu, Shing-Chi Cheung, Li Cui, Qiong Luo:
BLOSSOMS: Building Lightweight Optimized Sensor Systems on a Massive Scale. J. Comput. Sci. Technol. 20(1): 105-177 (2005) - Yinhe Han, Xiaowei Li, Huawei Li, Anshuman Chandra:
Test Resource Partitioning Based on Efficient Response Compaction for Test Time and Tester Channels Reduction. J. Comput. Sci. Technol. 20(2): 201-209 (2005) - Peter M. Haverty, Zhiping Weng, Ulla Hansen:
Transcriptional Regulatory Networks Activated by PI3K and ERK Transduced Growth Signals in Human Glioblastoma Cells. J. Comput. Sci. Technol. 20(4): 439-445 (2005) - Terumine Hayashi, Haruna Yoshioka, Tsuyoshi Shinogi, Hidehiko Kita, Haruhiko Takase:
On Test Data Compression Using Selective Don't-Care Identification. J. Comput. Sci. Technol. 20(2): 210-215 (2005) - Masayuki Hirayama, Osamu Mizuno, Tohru Kikuno:
Analysis of Software Test Item Generation - Comparison Between High Skilled and Low Skilled Engineers. J. Comput. Sci. Technol. 20(2): 250-257 (2005) - Ping Hou:
Some Representation Theorems for Recovering Contraction Relations. J. Comput. Sci. Technol. 20(4): 536-541 (2005) - Lei Hu, Jun-Wu Dong, Dingyi Pei:
Implementation of Cryptosystems Based on Tate Pairing. J. Comput. Sci. Technol. 20(2): 264-269 (2005) - Weiwu Hu, Fuxin Zhang, Zusong Li:
Microarchitecture of the Godson-2 Processor. J. Comput. Sci. Technol. 20(2): 243-249 (2005) - Junzhou Huang, Tieniu Tan, Li Ma, Yunhong Wang:
Phase Correlation Based Iris Image Registration Model. J. Comput. Sci. Technol. 20(3): 419-425 (2005) - Zille Huma, Muhammad Rehman, Nadeem Iftikhar:
An Ontology-Based Framework for Semi-Automatic Schema Integration. J. Comput. Sci. Technol. 20(6): 788-796 (2005) - I-Shyan Hwang, I-Feng Huang, Shin-Cheng Yu:
Dynamic Fuzzy Controlled RWA Algorithm for IP/GMPLS over WDM Networks. J. Comput. Sci. Technol. 20(5): 717-727 (2005) - Imad Jawhar, Jie Wu:
QoS Support in TDMA-Based Mobile Ad Hoc Networks. J. Comput. Sci. Technol. 20(6): 797-810 (2005)
skipping 76 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-28 02:04 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint