Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 143 matches
- 1983
- Yousri M. Abdel-Fattah:
Fairness and mutual profitability in collective behavior of automata. IEEE Trans. Syst. Man Cybern. 13(2): 236-241 (1983) - Moshe Abeles, François de Ribaupierre, Yves de Ribaupierre:
Detection of single unit responses which are loosely time-locked to a stimulus. IEEE Trans. Syst. Man Cybern. 13(5): 683-691 (1983) - Cecil O. Alford:
Sampling errors in closed-loop hybrid systems. IEEE Trans. Syst. Man Cybern. 13(4): 642-647 (1983) - Shun-ichi Amari:
Field theory of self-organizing neural nets. IEEE Trans. Syst. Man Cybern. 13(5): 741-748 (1983) - James A. Anderson:
Cognitive and psychological computation with neural models. IEEE Trans. Syst. Man Cybern. 13(5): 799-815 (1983) - Benjamin Arazi:
Automatic handwriting identification based on the external properties of the samples. IEEE Trans. Syst. Man Cybern. 13(4): 635-642 (1983) - Norio Baba:
The absolutely expedient nonlinear reinforcement schemes under the unknown multiteacher environment. IEEE Trans. Syst. Man Cybern. 13(1): 100-108 (1983) - Norio Baba:
On the learning behaviors of variable-structure stochastic automaton in the general n-teacher environment. IEEE Trans. Syst. Man Cybern. 13(2): 224-231 (1983) - Andrew G. Barto, Richard S. Sutton, Charles W. Anderson:
Neuronlike adaptive elements that can solve difficult learning control problems. IEEE Trans. Syst. Man Cybern. 13(5): 834-846 (1983) - James R. Bergen, Béla Julesz:
Rapid discrimination of visual patterns. IEEE Trans. Syst. Man Cybern. 13(5): 857-863 (1983) - Melvin A. Breuer, Anshul Kumar:
A methodology for custom VLSI layout. IEEE Trans. Syst. Man Cybern. 13(4): 470-476 (1983) - Rodney A. Brooks:
Solving the find-path problem by good representation of free space. IEEE Trans. Syst. Man Cybern. 13(2): 190-197 (1983) - Bill P. Buckles:
Information-theoretical characterization of fuzzy relational databases. IEEE Trans. Syst. Man Cybern. 13(1): 74-77 (1983) - Terry Caelli, Martin Hübner:
Coding images in the frequency domain: Filter design and energy processing characteristics of the human visual system. IEEE Trans. Syst. Man Cybern. 13(5): 1018-1021 (1983) - Bidyut B. Chaudhuri:
A note on fast algorithms for spatial domain techniques in image processing. IEEE Trans. Syst. Man Cybern. 13(6): 1166-1169 (1983) - B. B. Chaudhuri, C. A. Murthy, D. Dutta Majumder:
Bayes' error probability for noisy and imprecise measurement in pattern recognition. IEEE Trans. Syst. Man Cybern. 13(1): 89-94 (1983) - Chi-Hau Chen:
A final report of IEEE workshop on applied time series analysis. IEEE Trans. Syst. Man Cybern. 13(3): 431-432 (1983) - K. Chen, K. B. Joscelyn, M. E. Marks:
A phased plan for an electric passenger car demonstration: An analysis of planning needs. IEEE Trans. Syst. Man Cybern. 13(6): 1132-1135 (1983) - Michael A. Cohen, Stephen Grossberg:
Absolute stability of global pattern formation and parallel memory storage by competitive neural networks. IEEE Trans. Syst. Man Cybern. 13(5): 815-826 (1983) - Theodore E. Cohn:
Receiver operating characteristic analysis of photoreceptor sensitivity. IEEE Trans. Syst. Man Cybern. 13(5): 873-881 (1983) - Hewitt D. Crane, John S. Ostrem:
Automatic signature verification using a three-axis force-sensitive pen. IEEE Trans. Syst. Man Cybern. 13(3): 329-337 (1983) - John C. Curlander, Vasilis Z. Marmarelis:
Processing of visual information in the distal neurons of the vertebrate retina. IEEE Trans. Syst. Man Cybern. 13(5): 934-943 (1983) - John Daugman:
Six formal properties of two-dimensional anisotropie visual filters: Structural principles and frequency/orientation selectivity. IEEE Trans. Syst. Man Cybern. 13(5): 882-887 (1983) - Edward J. Davison:
Comments on "an input / output approach to the structural analysis of digraphs". IEEE Trans. Syst. Man Cybern. 13(3): 432-433 (1983) - Edward J. Davison, Ümit Özgüner:
Decentralized control of traffic networks. IEEE Trans. Syst. Man Cybern. 13(4): 476-487 (1983) - Sid Deutsch:
RCG cable analysis of a dendritic tree based on Rail's idealized model. IEEE Trans. Syst. Man Cybern. 13(5): 1007-1010 (1983) - Stuart Jay Deutsch, Charles J. Malmborg:
IMAP: An interactive computer package for the assessment of multiattribute value functions. IEEE Trans. Syst. Man Cybern. 13(3): 417-421 (1983) - Andrea J. van Doorn, Jan J. Koenderink:
The structure of the human motion detection system. IEEE Trans. Syst. Man Cybern. 13(5): 916-922 (1983) - Rolf Eckmiller:
Neural control of foveal pursuit versus saccadic eye movements in primates - Single-unit data and models. IEEE Trans. Syst. Man Cybern. 13(5): 980-989 (1983) - Douglas F. Elliott:
Varying null locations and the number of nulls in DFT windows. IEEE Trans. Syst. Man Cybern. 13(6): 1139-1143 (1983)
skipping 113 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-06 14:19 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint