Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 190 matches
- 2007
- Himanshu Agrawal, Melanie Grah, Mark A. Gregory:
Optimization of QoS Routing. ACIS-ICIS 2007: 598-603 - Iftekhar Ahmad, Joarder Kamruzzaman, Daryoush Habibi:
Rerouting Technique for Faster Restoration of Preempted Calls. ACIS-ICIS 2007: 676-681 - Kushan Ahmadian, Abbas Golestani, Morteza Analoui, Mohammad R. Jahed:
Evolving Ensemble of Classifiers In Low-Dimensional Spaces Using Multi-Objective Evolutionary Approach. ACIS-ICIS 2007: 217-222 - Rakib Ahmed, Gour C. Karmakar, Laurence S. Dooley:
Efficient Probabilistic Spatio-Temporal Video Object Segmentation. ACIS-ICIS 2007: 807-811 - Alauddin Ahmed, Atiqur Rahman, Mohammed Anwer, Nazmul Haque, Morshed U. Chowdhury:
A Comparison of Bipartite N-Qubit States to Classify Entangled States under Symmetric Consideration. ACIS-ICIS 2007: 291-295 - Alauddin Ahmed, Atiqur Rahman, Mohammed Anwer, Nazmul Haque, Morshed U. Chowdhury:
Two Logical Verification of Quantum NOT Gate. ACIS-ICIS 2007: 1124-1128 - Ashley M. Aitken:
Managing Unstructured and Semi-Structured Information in Organisations. ACIS-ICIS 2007: 712-717 - Oluwafemi O. Ajayi, Richard O. Sinnott, Anthony Stell:
Trust Realisation in Multi-domain Collaborative Environments. ACIS-ICIS 2007: 906-911 - A. B. M. Shawkat Ali, Tony Dobele:
A Novel Classifier Selection Approach for Adaptive Boosting Algorithms. ACIS-ICIS 2007: 532-536 - A. B. M. Shawkat Ali, Yang Xiang:
Spam Classification Using Adaptive Boosting Algorithm. ACIS-ICIS 2007: 972-976 - Maryam Amiripour, Hamid Abachi:
Average Routing Distance Analysis and Comparison of Master-Slave Super-Super-Hypercube 4-Cube Topology with different Message Passing Architectures. ACIS-ICIS 2007: 622-626 - Jan Carlo Barca, Grace W. Rumantir:
A Modified K-means Algorithm for Noise Reduction in Optical Motion Capture Data. ACIS-ICIS 2007: 118-122 - Luke Bellamy, Damien Hutchinson, Jason Wells:
User Perceptions and Acceptance of Benevolent Worms -- A Matter of Fear? ACIS-ICIS 2007: 29-36 - Helyane Bronoski Borges, Júlio C. Nievola:
Gene-finding as an Attribute Selection Task. ACIS-ICIS 2007: 537-542 - Tam Phuong Cao, Darrell M. Elton, John C. Devlin:
Real-time Linear Projection Speed Sign Detection System in Low Light Conditions. ACIS-ICIS 2007: 332-338 - John Casey, Ashley Chonka, Wanlei Zhou:
Adjacency Cache: Fast Web Cache Indexing and Lookup. ACIS-ICIS 2007: 616-621 - Adriano Cavalcanti, Bijan Shirinzadeh, Declan G. Murphy, Julian Smith:
Nanorobots for Laparoscopic Cancer Surgery. ACIS-ICIS 2007: 738-743 - Heung Seok Chae, Tae Yeon Kim, Woo-Sung Jung, Joon-Sang Lee:
Using Metrics for Estimating Maintainability of Web Applications: An Empirical Study. ACIS-ICIS 2007: 1053-1059 - Gang Chen, Ruimin Shen, Jiajun Wang, Zeyu Chen:
Collaborative Education Model and Its Application in E-learning. ACIS-ICIS 2007: 856-860 - Chen-Yang Cheng, Vittal Prabhu:
Performance Modeling of Business Processes Enabled by RFID and Web Services. ACIS-ICIS 2007: 718-723 - Manish Chhabra, Hongen Lu:
Towards Agent Based Web Service. ACIS-ICIS 2007: 93-99 - Dae Wan Cho, Hyeon Soo Kim, Seunguk Oh:
A new approach to detecting memory access errors in C programs. ACIS-ICIS 2007: 885-890 - Soon-Keow Chong, Jemal H. Abawajy, Robert A. Dew:
A Multilevel Trust Management Framework. ACIS-ICIS 2007: 776-781 - Jirawute Choungsirakulwit, Daricha Sutivong:
Portfolio Management of Option-Based Investment in Technology Research and Development. ACIS-ICIS 2007: 732-737 - Belal Chowdhury, Rajiv Khosla:
RFID-based Hospital Real-time Patient Management System. ACIS-ICIS 2007: 363-368 - Morshed U. Chowdhury, Rezwanur Rahman, Joydip Saha, S. M. Raiyan Kabir:
Fast Scene Change Detection Based Histogram. ACIS-ICIS 2007: 229-233 - Bei-tseng Chu, Gail-Joon Ahn, Steven Blanchard, James Deese, Richard Kelly, Huiming Yu, Ashika Young:
Collegiate Cyber Game Design Criteria and Participation. ACIS-ICIS 2007: 1036-1041 - Shangping Dai, Li Gao, Qiang Zhu, Changwu Zhu:
A Novel Genetic Algorithm Based on Image Databases for Mining Association Rules. ACIS-ICIS 2007: 977-980 - Wei Dai, Jonathan J. Liu:
Intelligent Adaptive Services for On-demand Systems Integration. ACIS-ICIS 2007: 669-675 - Gita Das, Sid Ray:
A Comparison of Relevance Feedback Strategies in CBIR. ACIS-ICIS 2007: 100-105
skipping 160 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-25 13:36 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint