Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 129 matches
- 2011
- Sebastian Wagner, Oliver Kopp, Frank Leymann:
Towards choreography-based process distribution in the cloud. CCIS 2011: 490-494 - Dongmei Ai, Xiaojun Ning, Bo Yang, Jianing Li:
Scientific processing method for course evaluation data in universities. CCIS 2011: 574-576 - Song Bi, Liqun Han, Yixin Zhong, Xiaojie Wang, Hairu Guo:
An improved non-parametric background model and two-level classifier for traffic information recognition. CCIS 2011: 495-499 - Mengsi Cao, Guannan Fang, Fuji Ren:
EEG-based emotion recognition in Chinese emotional words. CCIS 2011: 452-456 - Shaozhong Cao, Yang Li:
The shortest universal solutions for non-linear dynamic equation. CCIS 2011: 541-544 - Chaojie Cao, Zhiqiang Zhan:
Incident management process for the cloud computing environments. CCIS 2011: 225-229 - Sisi Chen:
Measuring the correlation between variables based on the probability density function estimation. CCIS 2011: 144-148 - Meng Chen, Haiquan Wang:
A multi-objective routing decision-making model for opportunistic network. CCIS 2011: 316-320 - Yi Chen, Rui Wang, Hongqian Chen:
A non-standard-substance pesticide residue qualitative analysis method based on SVM. CCIS 2011: 89-93 - Steve H. Chen, Yangsheng Xu, Peter Wang, Deyi Li, Dongbin Jin, Jianming Liu, Jian Wang, Fuji Ren, Jianning Zhang:
Keynote speech: The usage of cloud computing in China Regional Healthcare. CCIS 2011: i-v - Shu-Min Chuang, Kuo-En Chang, Yao-Ting Sung:
The cost effective structure for designing hybrid cloud based enterprise E-learning platform. CCIS 2011: 523-525 - Jifeng Cui, Chao Li, Chunxiao Xing, Yong Zhang:
The framework of a distributed file system for geospatial data management. CCIS 2011: 183-187 - Anqi Cui, Min Zhang, Yiqun Liu, Shaoping Ma:
Are the URLs really popular in microblog messages? CCIS 2011: 1-5 - Xuesong Dai, Yuan Ma:
An incremental algorithm for formation a concept lattice based on the intent waned value. CCIS 2011: 625-632 - Songqing Duan, Bin Wu, Bai Wang, Juan Yang:
Design and implementation of parallel statiatical algorithm based on Hadoop's MapReduce model. CCIS 2011: 134-138 - Xianggen Gan, Lihong Chen, Dongbao Yang, Guang Liu:
The research of rainfall prediction models based on Matlab neural network. CCIS 2011: 45-48 - Bo Gao, Ge Wu, Jiangdong Shan, Xiaojian Tian:
Simulation experimental analysis of PZT driver circuit. CCIS 2011: 564-568 - Li Gao, Yinghui Zhao:
Application on cloud computing in the future library. CCIS 2011: 175-177 - Xiaobing Geng, Shuxin Qin, Hongxing Chang, Yiping Yang:
A hybrid knowledge representation for the domain model of intelligent flight trainer. CCIS 2011: 29-33 - Wen Gong, Wansen Wang:
Application research of support vector machine in E-Learning for personality. CCIS 2011: 638-642 - Yundong Gu, Yajing An, Yanchao Chen, Jin Xu:
An integrated optimization model for the location of distribution centers with multiple practical constraints. CCIS 2011: 472-476 - Shuai Han, Jianchuan Xing:
Ensuring data storage security through a novel third party auditor scheme in cloud computing. CCIS 2011: 264-268 - Zhifeng He, Yong Zhang, Yinglei Teng, Yinghe Wang, Xiaojun Wang:
A channel hopping based MAC without hidden terminal problem for cognitive networks. CCIS 2011: 327-332 - Palivela Hemant, Nitin. P. Chawande, Avinash Sonule, Hemant Wani:
Development of servers in cloud computing to solve issues related to security and backup. CCIS 2011: 158-163 - Lianxing Hou, Lin Zuo, Pei Luo, Dong Liu:
Collision-safe wavelength assignment scheme for lightpath establishment in WSONs. CCIS 2011: 250-253 - Yuguang Huang, Lei Li:
Naive Bayes classification algorithm based on small sample set. CCIS 2011: 34-39 - Dina Sadat Jalali, Alireza Shahrbanoonezhad:
A new intrusion detection method based on FSM and cache memory in ad hoc networks. CCIS 2011: 413-417 - An Jiang, Jianjun Hao:
A study on the reliability allocation algorithm based on range. CCIS 2011: 555-558 - Jing Jin, Xin Li, Shanzhi Chen, Yan Wang:
Execution flow control: Simplified design of parallel applications. CCIS 2011: 274-279 - Cho Cho Khaing, Thinn Thu Naing:
The efficient data storage management system on cluster-based private cloud data center. CCIS 2011: 235-239
skipping 99 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-23 18:50 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint