Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 48 matches
- 2017
- Sunitha Abburu, Nitant Dube:
Ontology Concept-Based Management and Semantic Retrieval of Satellite Data. J. Intell. Syst. 26(2): 197 (2017) - Sherief Abdallah:
Mining Dynamics: Using Data Mining Techniques to Analyze Multi-agent Learning. J. Intell. Syst. 26(4): 613-624 (2017) - Animesh Adhikari, Lakhmi C. Jain, Bhanu Prasad:
A State-of-the-Art Review of Knowledge Discovery in Multiple Databases. J. Intell. Syst. 26(1): 23-34 (2017) - Hemmak Allaoua, Bouderah Brahim:
New Properties for Solving the Single-Machine Scheduling Problem with Early/Tardy Jobs. J. Intell. Syst. 26(3): 531 (2017) - Murchana Baruah, Aradhana Misra, Kandarpa Kumar Sarma:
Split FTDNN-DFE Equalizer for Complex Non-linear Wireless Channels with NARMA Approximation. J. Intell. Syst. 26(1): 87-107 (2017) - Vladimír Bradác, Katerina Kostolanyova:
Intelligent Tutoring Systems. J. Intell. Syst. 26(4): 717-727 (2017) - Ananya Choudhury, Anjan Kumar Talukdar, Manas Kamal Bhuyan, Kandarpa Kumar Sarma:
Movement Epenthesis Detection for Continuous Sign Language Recognition. J. Intell. Syst. 26(3): 471 (2017) - Doreswamy, M. Umme Salma:
Reducing the Feature Space Using Constraint-Governed Association Rule Mining. J. Intell. Syst. 26(1): 139-152 (2017) - Mark Dougherty:
Something Old, Something New, Something Borrowed, Something Blue: Part 3 - An Elephant Never Forgets. J. Intell. Syst. 26(3): 433 (2017) - Chaimae El Hatri, Mohammed Tahifa, Jaouad Boumhidi:
Extreme Learning Machine-Based Traffic Incidents Detection with Domain Adaptation Transfer Learning. J. Intell. Syst. 26(4): 601-612 (2017) - Miguel Elvir, Avelino J. Gonzalez, Christopher Walls, Bryan Wilder:
Remembering a Conversation - A Conversational Memory Architecture for Embodied Conversational Agents. J. Intell. Syst. 26(1): 1-21 (2017) - Absalom E. Ezugwu, Nneoma A. Okoroafor, Seyed M. Buhari, Marc Eduard Frîncu, Sahalu B. Junaidu:
Grid Resource Allocation with Genetic Algorithm Using Population Based on Multisets. J. Intell. Syst. 26(1): 169-184 (2017) - Mohammed M. Fouad, Mostafa G. M. Mostafa, Abdulfattah S. Mashat, Tarek F. Gharib:
IMIDB: An Algorithm for Indexed Mining of Incremental Databases. J. Intell. Syst. 26(1): 69-85 (2017) - Piyabute Fuangkhon:
Parallel Multi-Class Contour Preserving Classification. J. Intell. Syst. 26(1): 109-121 (2017) - Piyabute Fuangkhon:
Multiclass Contour-Preserving Classification with Support Vector Machine (SVM). J. Intell. Syst. 26(2): 323 (2017) - Piyabute Fuangkhon:
Parallel Distance-Based Instance Selection Algorithm for Feed-Forward Neural Network. J. Intell. Syst. 26(2): 335 (2017) - Asheesh Kumar Gautam, Lokesh K. Sinha, Mahendra R. Bhutiyani:
An Innovative Approach for Detection of Armoured Vehicle in Airborne Thermal Imagery Using Morphological Processing and Texture Feature Extraction. J. Intell. Syst. 26(2): 359 (2017) - Ankur Goel, Akhilesh Swarup:
Adaptive Fuzzy High-Order Super-Twisting Sliding Mode Controller for Uncertain Robotic Manipulator. J. Intell. Syst. 26(4): 697-715 (2017) - Seema B. Hegde, B. Satish Babu, Pallapa Venkataram:
A Cognitive Theory-based Opportunistic Resource-Pooling Scheme for Ad hoc Networks. J. Intell. Syst. 26(1): 47-68 (2017) - Eman Ismail, Walaa K. Gad:
CBER: An Effective Classification Approach Based on Enrichment Representation for Short Text Documents. J. Intell. Syst. 26(2): 233 (2017) - Y. Jayababu, G. P. Saradhi Varma, A. Govardhan:
Mining Spatial Association Rules to Automatic Grouping of Spatial Data Objects Using Multiple Kernel-Based Probabilistic Clustering. J. Intell. Syst. 26(3): 561 (2017) - Vijay Kumar, Jitender Kumar Chhabra, Dinesh Kumar:
Grey Wolf Algorithm-Based Clustering Technique. J. Intell. Syst. 26(1): 153-168 (2017) - Vijay Kumar, Jitender Kumar Chhabra, Dinesh Kumar:
Performance Evaluation of Line Symmetry-Based Validity Indices on Clustering Algorithms. J. Intell. Syst. 26(3): 483 (2017) - Evaggelia Lema, Anastasios Karaganis, Elpiniki Papageorgiou:
A Fuzzy Logic Modeling of Measures Addressing Shipping CO2 Emissions. J. Intell. Syst. 26(3): 439 (2017) - Ming Leng, Lingyu Sun, Kaiqiang Guo:
Multi-Level Refinement Algorithm of Weighted Hypergraph Partitioning Problem. J. Intell. Syst. 26(3): 407 (2017) - Mi Liu, Shuping Yi, Peihan Wen, Haicao Song:
Disruption Management for Predictable New Job Arrivals in Cloud Manufacturing. J. Intell. Syst. 26(4): 683-695 (2017) - Xiaodi Liu, Jianjun Zhu, Shitao Zhang, Guodong Liu:
Multiple Attribute Group Decision-Making Methods Under Hesitant Fuzzy Linguistic Environment. J. Intell. Syst. 26(2): 387 (2017) - Shikha Mehta:
Memetic Algorithm with Constrained Local Search for Large-Scale Global Optimization. J. Intell. Syst. 26(2): 287 (2017) - Somer M. Nacy, Mauwafak A. Tawfik, Ihsan A. Baqer:
A Novel Approach to Control the Robotic Hand Grasping Process by Using an Artificial Neural Network Algorithm. J. Intell. Syst. 26(2): 215 (2017) - H. S. Nagendraswamy, B. M. Chethana Kumara:
LBPV for Recognition of Sign Language at Sentence Level: An Approach Based on Symbolic Representation. J. Intell. Syst. 26(2): 371 (2017)
skipping 18 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-20 16:23 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint