Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 74 matches
- 2014
- Seiki Akama, Tetsuya Murai, Yasuo Kudo:
Da Costa logics and vagueness. GrC 2014: 1-6 - Mohammad Azad, Mikhail Ju. Moshkov:
Minimization of decision tree depth for multi-label decision tables. GrC 2014: 7-12 - Ali Baraka, George Panoutsos, Mahdi Mahfouf, Stephen Cater:
A Shannon entropy-based conflict measure for enhancing granular computing-based information processing. GrC 2014: 13-18 - Zhang Canlun, Sadaaki Miyamoto:
Text clustering using fuzzy neighborhood and evaluation of clusters. GrC 2014: 19-24 - Ray-Ming Chen:
Subjective characterization of fuzzy target sets based on a fuzzy universe. GrC 2014: 25-29 - Cheng-I Chen, Yeong-Chin Chen, Yuan-Chieh Chin, Hung-Lu Wang:
Design of neural network-based phasor measurement unit for monitoring of power system. GrC 2014: 45-48 - Chun-Hao Chen, Ching-Yu Hsieh:
A multi-objective genetic stock portfolio mining approach with investor's requests. GrC 2014: 30-34 - Lifang Chen, Xiao Lu, Zhidian Du:
RBF neural network modeling based on PCA clustering analysis. GrC 2014: 35-38 - Chao-Chun Chen, Yen-Ju Tsai, Chi-Yin Lin, Ting-Yu Hu, Rain Chen:
Service activity-based provision mechanism for cloud computing systems: A case study of cloud patent map system. GrC 2014: 39-44 - Patrick G. Clark, Jerzy W. Grzymala-Busse:
Mining incomplete data with lost values and attribute-concept values. GrC 2014: 49-54 - Feng Liu, Xiaoyu Liu, Yi Chen:
An efficient detection method for rare colored capsule based on RGB and HSV color space. GrC 2014: 175-178 - Kazunori Fujimoto:
Differentiating superlative-type eWOM messages to derive potency-magnitude relations based on inference space model. GrC 2014: 55-60 - Makoto Fukumoto:
User's manual operation for vectors in interactive differential evolution for optimizing fragrance composition. GrC 2014: 61-65 - Wei Guo:
A study on evaluation methods for personalized recommendation of traditional crafts. GrC 2014: 66-71 - Changyou Guo, Xuefeng Zheng:
Feature subset selection approach based on fuzzy rough set for high-dimensional data. GrC 2014: 72-75 - Takuya Hamakawa, Masahiro Inuiguchi:
On the utility of imprecise rules induced by MLEM2 in classification. GrC 2014: 76-81 - Yukihiro Hamasuna, Yasunori Endo:
On new sequential hard c-means and its kernelization. GrC 2014: 82-87 - Ryo Hanada, Daisuke Kitakoshi, Masato Suzuki:
Analysis of a system for dementia prevention based on the concept of Human-Agent Interaction. GrC 2014: 88-93 - Katsuhiro Honda, Shunnya Oshio, Akira Notsu:
Item membership fuzzification in fuzzy co-clustering based on multinomial mixture concept. GrC 2014: 94-99 - Hong Hu, Panyi Ouyang, Liang Pang, Zhongzhi Shi:
A hybrid approach of PTSVM and ELM inspired by samples' geometric distribution structure. GrC 2014: 100-105 - Ta-Wei Hung, Mu-En Wu, Chuan-Ju Wang, William W. Y. Hsu, Jan-Ming Ho:
On the design of trading schemes of equity funds based on random traders. GrC 2014: 106-111 - Shahid Hussain:
Greedy heuristics for minimization of number of terminal nodes in decision trees. GrC 2014: 112-115 - Andrzej Janusz, Marcin S. Szczuka:
Assessment of data granulations in context of feature extraction problem. GrC 2014: 116-120 - Yuchi Kanzawa:
On a maximizing model of spherical Bezdek-type possibilistic c-means and fuzzy multi-medoids clustering. GrC 2014: 121-126 - Mayuka F. Kawaguchi, Michiro Kondo:
A correspondence between implicational fragment logics and fuzzy logics. GrC 2014: 127-130 - Ching Lee Koo, Mohd Saberi Mohamad, Sigeru Omatu, Abdul Hakim Mohamed Salleh, Safaai Deris, Michifumi Yoshioka:
A gene knockout strategy for succinate production using a hybrid algorithm of bees algorithm and minimization of metabolic adjustment. GrC 2014: 131-136 - Yasuo Kudo, Tetsuya Murai:
Interrelationship mining from a viewpoint of rough sets on two universes. GrC 2014: 137-140 - Yoshifumi Kusunoki, Tetsuzo Tanino:
Boolean kernels and clustering with pairwise constraints. GrC 2014: 141-146 - Yeong-Chyi Lee, Qing-Fu Qi, Tzung-Pei Hong, Chun-Hao Chen:
A GA-based scheduling algorithm on parallel machines with heterogeneous mounted molds. GrC 2014: 147-150 - Yungho Leu, Chien-Pang Lee, Ai-Chen Chang:
A hybrid method for gene selection in microarray datasets. GrC 2014: 151-154
skipping 44 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-11 18:39 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint