Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 155 matches
- 2008
- Tjalve Aarflot, Cathal Gurrin, Dag Johansen:
A framework for transient objects in Digital Libraries. ICDIM 2008: 138-145 - Chima Adiele:
Modeling interactivity in a B2B Web-based Community. ICDIM 2008: 417-422 - Ejaz Ahmed, Nik Bessis, Yong Yue, Muhammad Sarfraz:
Matching multiple elements in grid databases: A practical approach. ICDIM 2008: 757-762 - Amani A. Al-Ajlan, Hend S. Al-Khalifa, AbdulMalik S. Al-Salman:
Towards the development of an automatic readability measurements for arabic language. ICDIM 2008: 506-511 - Ahmad S. Al-Mogren:
A power efficient technique for multi-channel dissemination networks. ICDIM 2008: 357-362 - Abdullah A. Al-Tameem:
Identification of influence factors in the information technology formation in United Arab Emirates. ICDIM 2008: 423-429 - Abdullah A. Al-Tameem:
An empirical study of e-Government formulation in Kingdom of Saudi Arabia & United Arab Emirates. ICDIM 2008: 819-826 - Efthymios Alepis, Maria Virvou, Katerina Kabassi:
Mobile education: Towards affective bi-modal interaction for adaptivity. ICDIM 2008: 51-56 - Md. Nawab Yousuf Ali, S. M. Abdullah Al-Mamun, Jugal Krishna Das, Abu Mohammad Nurannabi:
Morphological analysis of Bangla words for Universal Networking Language. ICDIM 2008: 532-537 - Ramez Alkhatib, Marc H. Scholl:
CXQU: A compact XML storage for efficient query and update processing. ICDIM 2008: 605-612 - Abdullah M. Alnajim, Malcolm Munro:
An evaluation of users' tips effectiveness for Phishing websites detection. ICDIM 2008: 63-68 - Mohammed Ibrahim Alodib, Behzad Bordbar, Basim Majeed:
A model driven approach to the design and implementing of fault tolerant Service oriented Architectures. ICDIM 2008: 464-469 - Qutaibah Althebyan, Brajendra Panda:
Performance analysis of an insider threat mitigation model. ICDIM 2008: 703-709 - Natsuha Araki, Yoichi Muraoka:
Follow-the-Trial-Fitter: Real-time dressing without undressing. ICDIM 2008: 33-38 - Mercedes Argüello Casteleiro, Jose Julio Des Diz, A. Thompson, Hilary Paniagua, Maria Jesus Fernandez Prieto, Rogelio Perez:
Enabling smooth integration between HL7 CDA and medical guidelines on the web with an initial focus on women's health in general practice. ICDIM 2008: 613-620 - Sandhya Armoogum, Nawaz Mohamudally:
Mobile agent based real time IP traceback. ICDIM 2008: 69-74 - Daniel Ortiz Arroyo:
Flexible Question Answering System for mobile devices. ICDIM 2008: 266-271 - Hasina Attaullah, Faiza Iqbal, Muhammad Younus Javed:
Intelligent vertical handover decision model to improve QoS. ICDIM 2008: 119-124 - Taiwo Ayodele, Shikun Zhou:
Email reply prediction: Unsupervised leaning approach. ICDIM 2008: 844-849 - Cyril Ehijie Azenabor, Charles A. Shoniregun:
Electronic government paradigm. ICDIM 2008: 405-410 - Jacques M. Bahi, Mirna Eskandar, Ahmed Mostefaoui:
A robust cooperation approach for mobile multimedia adhoc networks. ICDIM 2008: 489-494 - Amit Bahuguna:
Reference architecture for enterprise batch processing of unformation. ICDIM 2008: 8-17 - Nicolas Béchet, Mathieu Roche, Jacques Chauché:
How the ExpLSA approach impacts the document classification tasks. ICDIM 2008: 241-246 - Maria Biryukov, Yafang Wang:
Classification of personal names with application to DBLP. ICDIM 2008: 131-137 - Clive Blackwell:
The management of online credit card data using the Payment Card Industry Data Security Standard. ICDIM 2008: 838-843 - Ina Blümel, Jürgen Diet, Harald Krottmaier:
Integrating multimedia repositories into the PROBADO framework. ICDIM 2008: 178-183 - Falk Brauer, Marcus Schramm, Wojciech M. Barczynski, Alexander Löser, Hong Hai Do:
Robust recognition of complex entities in text exploiting enterprise data and NLP-techniques. ICDIM 2008: 551-558 - Santi Caballé, Fatos Xhafa, Ajith Abraham:
Towards an automatic real-time assessment of online discussions in Computer-Supported Collaborative Learning practices. ICDIM 2008: 470-475 - Francisco M. Carrero, José Carlos Cortizo, José María Gómez:
Testing concept indexing in crosslingual medical text classification. ICDIM 2008: 512-519 - Mehmet Celenk, Thomas Conley, John Willis, James Graham:
Anomaly detection and visualization using Fisher Discriminant clustering of network entropy. ICDIM 2008: 216-220
skipping 125 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-03 21:15 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint