default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 58 matches
- 2009
- Gail-Joon Ahn, Hongxin Hu, Jing Jin:
Security-Enhanced OSGi Service Environments. IEEE Trans. Syst. Man Cybern. Part C 39(5): 562-571 (2009) - Hisham Al-Mubaid, Hoa A. Nguyen:
Measuring Semantic Similarity Between Biomedical Concepts Within Multiple Ontologies. IEEE Trans. Syst. Man Cybern. Part C 39(4): 389-398 (2009) - Avital Bechar, Joachim Meyer, Yael Edan:
An Objective Function to Evaluate Performance of Human-Robot Collaboration in Target Recognition Tasks. IEEE Trans. Syst. Man Cybern. Part C 39(6): 611-620 (2009) - Radim Belohlávek, Vilém Vychodil:
Formal Concept Analysis With Background Knowledge: Attribute Priorities. IEEE Trans. Syst. Man Cybern. Part C 39(4): 399-409 (2009) - Suratna Budalakoti, Ashok N. Srivastava, Matthew Eric Otey:
Anomaly Detection and Diagnosis Algorithms for Discrete Symbol Sequences with Applications to Airline Safety. IEEE Trans. Syst. Man Cybern. Part C 39(1): 101-113 (2009) - Pei-Chann Chang, Chin-Yuan Fan, Chen-Hao Liu:
Integrating a Piecewise Linear Representation Method and a Neural Network Model for Stock Trading Points Prediction. IEEE Trans. Syst. Man Cybern. Part C 39(1): 80-92 (2009) - Chuan-Yu Chang, ChunHsi Li, Si-Yan Lin, MuDer Jeng:
Application of Two Hopfield Neural Networks for Automatic Four-Element LED Inspection. IEEE Trans. Syst. Man Cybern. Part C 39(3): 352-365 (2009) - Cheng-Hung Chen, Cheng-Jian Lin, Chin-Teng Lin:
Nonlinear System Control Using Adaptive Neural Fuzzy Networks Based on a Modified Differential Evolution. IEEE Trans. Syst. Man Cybern. Part C 39(4): 459-473 (2009) - Changhong Chen, Jimin Liang, Heng Zhao, Haihong Hu, Jie Tian:
Factorial HMM and Parallel HMM for Gait Recognition. IEEE Trans. Syst. Man Cybern. Part C 39(1): 114-123 (2009) - Wei-neng Chen, Jun Zhang:
An Ant Colony Optimization Approach to a Grid Workflow Scheduling Problem With Various QoS Requirements. IEEE Trans. Syst. Man Cybern. Part C 39(1): 29-43 (2009) - Xin Chen, Chengcui Zhang, Shu-Ching Chen, Stuart Harvey Rubin:
A Human-Centered Multiple Instance Learning Framework for Semantic Video Retrieval. IEEE Trans. Syst. Man Cybern. Part C 39(2): 228-233 (2009) - Seongah Chin, Kyoung-Yun Kim:
Emotional Intensity-based Facial Expression Cloning for Low Polygonal Applications. IEEE Trans. Syst. Man Cybern. Part C 39(3): 315-330 (2009) - Xuewu Dai, Zhiwei Gao, Tim Breikin, Hong Wang:
Disturbance Attenuation in Fault Detection of Gas Turbine Engines: A Discrete Robust Observer Design. IEEE Trans. Syst. Man Cybern. Part C 39(2): 234-239 (2009) - Elena I. Gaura, James Brusey, John Kemp, C. Douglas Thake:
Increasing Safety of Bomb Disposal Missions: A Body Sensor Network Approach. IEEE Trans. Syst. Man Cybern. Part C 39(6): 621-636 (2009) - Lorenza Giupponi, Ramón Agustí, Jordi Pérez-Romero, Oriol Sallent:
Fuzzy Neural Control for Economic-Driven Radio Resource Management in Beyond 3G Networks. IEEE Trans. Syst. Man Cybern. Part C 39(2): 170-189 (2009) - John B. Halstead:
Recruiter Selection Model and Implementation Within the United States Army. IEEE Trans. Syst. Man Cybern. Part C 39(1): 93-100 (2009) - Eduardo R. Hruschka, Ricardo José Gabrielli Barreto Campello, Alex Alves Freitas, André Carlos Ponce de Leon Ferreira de Carvalho:
A Survey of Evolutionary Algorithms for Clustering. IEEE Trans. Syst. Man Cybern. Part C 39(2): 133-155 (2009) - Xiaomin Hu, Jun Zhang, Henry Shu-Hung Chung, Ou Liu, Jing Xiao:
An Intelligent Testing System Embedded With an Ant-Colony-Optimization-Based Test Composition Method. IEEE Trans. Syst. Man Cybern. Part C 39(6): 659-669 (2009) - Toni Jarimo, Ahti Salo:
Multicriteria Partner Selection in Virtual Organizations With Transportation Costs and Other Network Interdependencies. IEEE Trans. Syst. Man Cybern. Part C 39(1): 124-129 (2009) - Yichuan Jiang:
Concurrent Collective Strategy Diffusion of Multiagents: The Spatial Model and Case Study. IEEE Trans. Syst. Man Cybern. Part C 39(4): 448-458 (2009) - Yaochu Jin, Bernhard Sendhoff:
Corrections to "Pareto-Based Multiobjective Machine Learning: An Overview and Case Studies" [May 08 397-415]. IEEE Trans. Syst. Man Cybern. Part C 39(3): 373 (2009) - Taghi M. Khoshgoftaar, Jason Van Hulse:
Empirical Case Studies in Attribute Noise Detection. IEEE Trans. Syst. Man Cybern. Part C 39(4): 379-388 (2009) - Hyun Hee Kim, Kyoung Nam Ha, Suk Lee, Kyung Chang Lee:
Resident Location-Recognition Algorithm Using a Bayesian Classifier in the PIR Sensor-Based Indoor Location-Aware System. IEEE Trans. Syst. Man Cybern. Part C 39(2): 240-245 (2009) - Il-Woong Kim, Kyong-Ho Lee:
A Model-Driven Approach for Describing Semantic Web Services: From UML to OWL-S. IEEE Trans. Syst. Man Cybern. Part C 39(6): 637-646 (2009) - Jong-Hwan Kim, Chi-Ho Lee, Kang-Hee Lee:
Evolutionary Generative Process for an Artificial Creature's Personality. IEEE Trans. Syst. Man Cybern. Part C 39(3): 331-342 (2009) - Konstantinos Konstantinidis, Georgios Ch. Sirakoulis, Ioannis Andreadis:
Design and Implementation of a Fuzzy-Modified Ant Colony Hardware Structure for Image Retrieval. IEEE Trans. Syst. Man Cybern. Part C 39(5): 520-533 (2009) - Gal Lavee, Ehud Rivlin, Michael Rudzsky:
Understanding Video Events: A Survey of Methods for Automatic Interpretation of Semantic Occurrences in Video. IEEE Trans. Syst. Man Cybern. Part C 39(5): 489-504 (2009) - Howard Li, Simon X. Yang, Mae L. Seto:
Neural-Network-Based Path Planning for a Multirobot System With Moving Obstacles. IEEE Trans. Syst. Man Cybern. Part C 39(4): 410-419 (2009) - ZhiWu Li, Sen Zhu, MengChu Zhou:
A Divide-and-Conquer Strategy to Deadlock Prevention in Flexible Manufacturing Systems. IEEE Trans. Syst. Man Cybern. Part C 39(2): 156-169 (2009) - Shu-Hsien Liao, Chih-Hao Wen:
Mining Demand Chain Knowledge for New Product Development and Marketing. IEEE Trans. Syst. Man Cybern. Part C 39(2): 223-227 (2009)
skipping 28 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-02 04:17 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint