Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 104 matches
- 2005
- Kian Abolfazlian, Ricardo A. P. Pellerano:
Knowledge management using the new generation of automation platforms for the professional services firms: the case of legal eBusiness of Pellerano & Herrera. IRI 2005: 7-12 - Samuel Ajila:
Reusing base product features to develop product line architecture. IRI 2005: 288-293 - Eduardo Santana de Almeida, Alexandre Alvaro, Daniel Lucrédio, Vinicius Cardoso Garcia, Silvio Romero de Lemos Meira:
A survey on software reuse processes. IRI 2005: 66-71 - Costin Barbu, Kun Zhang, Jing Peng, Bill P. Buckles:
Boosting in classifier fusion vs. fusing boosted classifiers. IRI 2005: 332-337 - Frank S. de Boer, Marcello M. Bonsangue, Luuk Groenewegen, Andries Stam, S. Stevens, Leendert W. N. van der Torre:
Change impact analysis of enterprise architectures. IRI 2005: 177-181 - Davide Brugali, Monica Reggiani:
Software stability in the robotics domain: issues and challenges. IRI 2005: 585-591 - H. Nicholas Carrasco, Mei-Ling Shyu:
Automated quality control of tropical cyclone winds through data mining. IRI 2005: 229-234 - Marion G. Ceruti, Stuart Harvey Rubin:
Infodynamics III: Information Integration and Tractability. IRI 2005: 25-31 - Suroop Mohan Chandran, James B. D. Joshi:
Towards administration of a hybrid role hierarchy. IRI 2005: 500-505 - Weide Chang:
Improving hidden Markov models with a similarity histogram for typing pattern biometrics. IRI 2005: 487-493 - Yi Chen, Haitham S. Hamza, Mohamed E. Fayad:
A framework for developing design models with analysis and design patterns. IRI 2005: 592-596 - Jui-Fa Chen, Wei-Chuan Lin, Hua-Sheng Bai, Chia-Che Yang, Hsiao-Chuan Chao:
Constructing an intelligent behavior avatar in a virtual world: a self-learning model based on reinforcement. IRI 2005: 421-426 - Michael Olsen Darter, V. Scott Gordon:
Vehicle steering control using modular neural networks. IRI 2005: 374-379 - Min-Yuh Day, Tzong-Han Tsai, Cheng-Lung Sung, Cheng-Wei Lee, Shih-Hung Wu, Chorng-Shyong Ong, Wen-Lian Hsu:
A knowledge-based approach to citation extraction. IRI 2005: 50-55 - Narayan C. Debnath, Haesun K. Lee, Mark Burgin, Eric Thiemann:
A testing and analysis tool for certain 3-variable functions. IRI 2005: 560-565 - Narayan C. Debnath, Ilhyun Lee, Haesun K. Lee, Sergiu M. Dascalu, John Ho, Mary Yip:
Design and implementation of a reusable software tool with application. IRI 2005: 579-584 - Nathan Denny, Michael M. Marefat:
Exploiting similarity metrics and case-bases for knowledge sharing between case-based reasoners. IRI 2005: 452-457 - Junta Doi, Wataru Sato, Tetsuo Miyake:
Topology conserved 3D reconstruction and shape processing for reuse of the geometric models. IRI 2005: 410-414 - Ian Douglas:
Capturing and managing decision making rationale. IRI 2005: 172-176 - Mohamed Fayad, Haitham S. Hamza, Huáscar A. Sánchez:
Towards scalable and adaptable software architectures. IRI 2005: 102-107 - Mohamed Fayad, Haritha Kilaru:
AnyInformationHiding: a stable design pattern. IRI 2005: 108-113 - Mohamed E. Fayad, Sujatha Telu:
The learning stable analysis pattern. IRI 2005: 597-602 - Masahiro Fujita, Shunsuke Sasaki, Ken Matsui:
Object-oriented analysis and design of hardware/software co-designs with dependence analysis for design reuse. IRI 2005: 318-325 - Feng Gao, Yingwu Chen, Guo-Ping Jiang, Yanqiong Liu:
Model and heuristic algorithm of R&D project scheduling problem with stochastic number of activity iterations. IRI 2005: 276-281 - Franca Garzotto:
A user-friendly enterprise framework for data intensive Web applications. IRI 2005: 415-420 - Éric Grégoire:
About the dynamics of iterated knowledge fusion by weakening. IRI 2005: 326-331 - Mingyang Gu, Xin Tong, Agnar Aamodt:
Comparing similarity calculation methods in conversational CBR. IRI 2005: 427-432 - Jiang Guo, Yuehong Liao, Raj Pamula:
Extending Eclipse to support object-oriented system verification. IRI 2005: 282-287 - Citlalih Gutierrez Estrada, Claude Baron, Laurent Geneste, Philippe Clermont, Daniel Esteve, Samuel Rochet:
How to interconnect product design and project management including experience feedback and reusability requirements. IRI 2005: 294-299 - Ashok K. Harikumar, Roger Y. Lee, Chia-Chu Chiang, Hae Sool Yang:
An event driven architecture for application integration using Web services. IRI 2005: 542-547
skipping 74 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-07 16:49 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint