Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 101 matches
- 2005
- Ahmed Abbasi, Hsinchun Chen:
Applying Authorship Analysis to Arabic Web Content. ISI 2005: 183-197 - Evrim Acar, Seyit Ahmet Çamtepe, Mukkai S. Krishnamoorthy, Bülent Yener:
Modeling and Multiway Analysis of Chatroom Tensors. ISI 2005: 256-268 - Boanerges Aleman-Meza, Phillip Burns, Matthew Eavenson, Devanand Palaniswami, Amit P. Sheth:
An Ontological Approach to the Document Access Problem of Insider Threat. ISI 2005: 486-491 - Boanerges Aleman-Meza, Christian Halaschek-Wiener, Satya Sanket Sahoo, Amit P. Sheth, Ismailcem Budak Arpinar:
Template Based Semantic Similarity for Security Applications. ISI 2005: 621-622 - Antonio Badia, Mehmed M. Kantardzic:
Link Analysis Tools for Intelligence and Counterterrorism. ISI 2005: 49-59 - Jeffrey Baumes, Mark K. Goldberg, Malik Magdon-Ismail:
Efficient Identification of Overlapping Communities. ISI 2005: 27-36 - Clive Best, Erik Van der Goot, Monica de Paola:
Thematic Indicators Derived from World News Reports. ISI 2005: 436-447 - Mihaela Bobeica, Jean-Paul Jéral, Teofilo Garcia, Clive Best:
A Study of "Root Causes of Conflict" Using Latent Semantic Analysis. ISI 2005: 595-596 - Roger B. Bradford:
Efficient Discovery of New Information in Large Text Databases. ISI 2005: 374-380 - Guoray Cai, Alan M. MacEachren, Isaac Brewer, Michael D. McNeese, Rajeev Sharma, Sven Fuhrmann:
Map-Mediated GeoCollaborative Crisis Management. ISI 2005: 429-435 - Ana Isabel Canhoto, James Backhouse:
Anti Money Laundering Reporting and Investigation - Sorting the Wheat from the Chaff. ISI 2005: 600-601 - Xianbin Cao, Hong Qiao, Fei-Yue Wang, Xinzheng Zhang:
Application of Cooperative Co-evolution in Pedestrian Detection Systems. ISI 2005: 664-665 - Yufeng Chen, Yabo Dong, Dongming Lu, Yunhe Pan:
The Multi-fractal Nature of Worm and Normal Traffic at Individual Source Level. ISI 2005: 505-510 - Rui Chen, Raj Sharman, H. Raghav Rao, Shambhu J. Upadhyaya:
Design Principles of Coordinated Multi-incident Emergency Response Systems. ISI 2005: 81-98 - Xinjian Chen, Jie Tian, Qi Su, Xin Yang, Fei-Yue Wang:
A Secured Mobile Phone Based on Embedded Fingerprint Recognition Systems. ISI 2005: 549-553 - Gregory J. Conti, Mustaque Ahamad, Robert Norback:
Filtering, Fusion and Dynamic Information Presentation: Towards a General Information Firewall. ISI 2005: 492-497 - Ram Dantu, João W. Cangussu:
An Architecture for Network Security Using Feedback Control. ISI 2005: 636-637 - Ram Dantu, João W. Cangussu, Janos Turi:
Sensitivity Analysis of an Attack Containment Model. ISI 2005: 127-138 - Ram Dantu, Prakash Kolan:
Risk Management Using Behavior Based Bayesian Networks. ISI 2005: 115-126 - David Davis, Allison Frendak-Blume, Jennifer Wheeler, Alexander E. R. Woodcock, Clarence Worrell III:
A Conceptual Model of Counterterrorist Operations. ISI 2005: 305-315 - Boyd Davis, Vivian Lord, Peyton Mason:
More Than a Summary: Stance-Shift Analysis. ISI 2005: 608-609 - Alan J. Demers, Johannes Gehrke, Mingsheng Hong, Mirek Riedewald:
Processing High-Speed Intelligence Feeds in Real-Time. ISI 2005: 617-618 - Laura Dugan, Gary LaFree, Alex R. Piquero:
Testing a Rational Choice Model of Airline Hijackings. ISI 2005: 340-361 - Yuval Elovici, Bracha Shapira, Mark Last, Omer Zaafrany, Menahem Friedman, Moti Schneider, Abraham Kandel:
Content-Based Detection of Terrorists Browsing the Web Using an Advanced Terror Detection System (ATDS). ISI 2005: 244-255 - John Galloway, Simeon J. Simoff:
Digging in the Details: A Case Study in Network Data Mining. ISI 2005: 14-26 - Olga Gelbart, Paul Ott, Bhagirath Narahari, Rahul Simha, Alok N. Choudhary, Joseph Zambreno:
CODESSEAL: Compiler/FPGA Approach to Secure Applications. ISI 2005: 530-535 - Nazli Goharian, Ling Ma, Chris Meyers:
Detecting Misuse of Information Retrieval Systems Using Data Mining Techniques. ISI 2005: 604-605 - Xiaoyan Gong, Haijun Gao:
A Framework for Global Monitoring and Security Assistance Based on IPv6 and Multimedia Data Mining Techniques. ISI 2005: 658-659 - Zeng-Guang Hou:
Principal Component Analysis (PCA) for Data Fusion and Navigation of Mobile Robots. ISI 2005: 610-611 - Xiaohua Hu, Illhoi Yoo, Peter Rumm, Michael E. Atwood:
Mining Candidate Viruses as Potential Bio-terrorism Weapons from Biomedical Literature. ISI 2005: 60-71
skipping 71 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-03 15:36 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint