Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 42 matches
- 2011
- Florin Abazi, Hans-Georg Fill, Wilfried Grossmann, Dimitris Karagiannis:
Formalising Knowledge-Intensive Nuclear Fuel Process Models Using Pattern Theory. KSEM 2011: 353-364 - Philippe Besnard, Éric Grégoire, Sébastien Ramon:
Enforcing Logically Weaker Knowledge in Classical Logic. KSEM 2011: 44-55 - Imen Boukhris, Salem Benferhat, Zied Elouedi:
Representing Belief Function Knowledge with Graphical Models. KSEM 2011: 233-245 - Xiaohong Chen, Jing Liu, Zuohua Ding:
On Constructing Software Environment Ontology for Time-Continuous Environment. KSEM 2011: 148-159 - Yanzhong Dang, Litao Yu, Guangfei Yang, Mingzheng Wang:
A New Domain Adaptation Method Based on Rules Discovered from Cross-Domain Features. KSEM 2011: 425-436 - Richard Dapoigny, Patrick Barlatier:
Using a Dependently-Typed Language for Expressing Ontologies. KSEM 2011: 257-268 - Yanjie Dong, Xuehua Wang:
A New Over-Sampling Approach: Random-SMOTE for Learning from Imbalanced Data Sets. KSEM 2011: 343-352 - James R. Edmondson, Aniruddha S. Gokhale:
Design of a Scalable Reasoning Engine for Distributed, Real-Time and Embedded Systems. KSEM 2011: 221-232 - Xiaodong Feng, Sen Wu, Yanchi Liu:
Imputing Missing Values for Mixed Numeric and Categorical Attributes Based on Incomplete Data Hierarchical Clustering. KSEM 2011: 414-424 - Chengjie Gu, Shunyi Zhang, Hanhua Lu:
Online Internet Intrusion Detection Based on Flow Statistical Characteristics. KSEM 2011: 160-170 - Chonghui Guo, Yanchang Zhang:
Time Series Similarity Measure Based on the Function of Degree of Disagreement. KSEM 2011: 103-111 - Wei He, Xiaoping Yang, Dupei Huang:
A Hybrid Approach for Measuring Semantic Similarity between Ontologies Based on WordNet. KSEM 2011: 68-78 - Van-Nam Huynh, Hongbin Yan, Mina Ryoke, Yoshiteru Nakamori:
Fuzzy Target-Based Multi-feature Evaluation of Traditional Craft Products. KSEM 2011: 331-342 - Muhammad Javed, Yalemisew M. Abgaz, Claus Pahl:
Towards Implicit Knowledge Discovery from Ontology Change Log Data. KSEM 2011: 136-147 - Peng Jiang, Qing Yang, Chunxia Zhang, Zhendong Niu, Hongping Fu:
A Probability Model for Related Entity Retrieval Using Relation Pattern. KSEM 2011: 318-330 - Mark Kröll, Yusuke Fukazawa, Jun Ota, Markus Strohmaier:
Automatically Constructing Concept Hierarchies of Health-Related Human Goals. KSEM 2011: 124-135 - Wei Li, Jian Hu, Ziyang Li, Lingli Tang, Chuanrong Li:
Image Stabilization Based on Harris Corners and Optical Flow. KSEM 2011: 387-394 - Ge Li, Zhi Jin, Yan Xu, Yangyang Lu:
An Engineerable Ontology Based Approach for Requirements Elicitation in Process Centered Problem Domain. KSEM 2011: 208-220 - Jianwu Li, Haizhou Wei, Ziye Yan:
Constructing the Shortest ECOC for Fast Multi-classification. KSEM 2011: 462-471 - Jing Liao, Yaxin Bi, Chris D. Nugent:
Weight Factor Algorithms for Activity Recognition in Lattice-Based Sensor Fusion. KSEM 2011: 365-376 - Qi Liu, Enhong Chen, Biao Xiang, Chris H. Q. Ding, Liang He:
Gaussian Process for Recommender Systems. KSEM 2011: 56-67 - Bartlomiej Malachowski:
Competence-Based Management of Knowledge Workers in Project-Oriented Organizations. KSEM 2011: 281-292 - Yang Mu, Wei Ding, Melissa Morabito, Dacheng Tao:
Empirical Discriminative Tensor Analysis for Crime Forecasting. KSEM 2011: 293-304 - Kedian Mu, Weiru Liu, Zhi Jin:
An Approach to Generating Proposals for Handling Inconsistent Software Requirements. KSEM 2011: 32-43 - Yoshiteru Nakamori:
A Perspective of Knowledge Science. KSEM 2011: 171-182 - Elham Paikari, Emadoddin Livani, Mohammad Moshirpour, Behrouz H. Far, Günther Ruhe:
Multi-Agent System for Semantic Web Service Composition. KSEM 2011: 305-317 - Lili Rong, Tian Qi, Mingzheng Wang, Rong Zhang:
Modes-Based-Analysis of Knowledge Transfer in the Organizations. KSEM 2011: 395-403 - Przemyslaw Rózewski:
Model of Intangible Production Network for Competence Development. KSEM 2011: 246-256 - Yuming Shen, Yuefei Sui, Ju Wang:
On the Translation from Quantified Modal Logic into the Counterpart Theory Revisited. KSEM 2011: 377-386 - Jian Sun, Qingtian Zeng, Faming Lu, Sen Feng, Jiufang An:
Proposal of Ontology for Resource Matchmaking Schema in Emergency Response Systems. KSEM 2011: 450-461
skipping 12 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-26 22:16 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint