Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 317 matches
- 2004
- Osman Abul, Reda Alhajj, Faruk Polat, Ken Barker:
Finding differentially expressed genes: pattern generation using Q-values. SAC 2004: 138-142 - Nabil R. Adam, Vandana Pursnani Janeja, Vijayalakshmi Atluri:
Neighborhood based detection of anomalies in high dimensional spatio-temporal sensor datasets. SAC 2004: 576-583 - Harry W. Agius, Marios C. Angelides:
Modelling and filtering of MPEG-7-compliant meta-data for digital video. SAC 2004: 1248-1252 - Giovanni Agosta, Gianluca Palermo, Cristina Silvano:
Multi-objective co-exploration of source code transformations and design space architectures for low-power embedded systems. SAC 2004: 891-896 - Jesús S. Aguilar-Ruiz, Paul R. Cohen:
Editorial message: special track on data streams. SAC 2004: 625 - Jesús S. Aguilar-Ruiz, Raquel Costa, Federico Divina:
Knowledge discovery from doctor-patient relationship. SAC 2004: 280-284 - Malik Agyemang, Ken Barker, Reda Alhajj:
Framework for mining web content outliers. SAC 2004: 590-594 - Yousef J. Al-Houmaily, Panos K. Chrysanthis:
1-2PC: the one-two phase atomic commit protocol. SAC 2004: 684-691 - Jehad Al-Sadi, A. M. Awwad:
Efficient fault-tolerant routing algorithm for OTIS-cube using unsafety vectors. SAC 2004: 1426-1430 - Enrique Alba, J. Francisco Chicano:
Solving the error correcting code problem with parallel hybrid heuristics. SAC 2004: 985-989 - Marco Alberti, Davide Daolio, Paolo Torroni, Marco Gavanelli, Evelina Lamma, Paola Mello:
Specification and verification of agent interaction protocols in a logic-based system. SAC 2004: 72-78 - Alexander Akimov, Pasi Fränti:
Symbol representation in map image compression. SAC 2004: 29-34 - Javier Álvez, Paqui Lucio, Fernando Orejas:
Constructive negation by bottom-up computation of literal answers. SAC 2004: 1468-1475 - Nahla Ben Amor, Salem Benferhat, Zied Elouedi:
Naive Bayes vs decision trees in intrusion detection systems. SAC 2004: 420-424 - Massimo Ancona, Walter Cazzola:
Implementing the essence of reflection: a reflective run-time environment. SAC 2004: 1503-1507 - Davide Ancona, Rajeev R. Raje, Mirko Viroli:
Editorial message: special track on object oriented programming language and systems. SAC 2004: 1265-1266 - Josephine Antoniou, Vasos Vassiliou, Andreas Pitsillides, George Hadjipollas, N. Jacovides:
A discrete event based simulation environment for enhanced UMTS 3rd generation networks. SAC 2004: 369-370 - Danilo Ardagna, Chiara Francalanci, Marco Trubian:
A cost-oriented approach for infrastructural design. SAC 2004: 1431-1437 - Kubilay Atasu, Luca Breveglieri, Marco Macchetti:
Efficient AES implementations for ARM based platforms. SAC 2004: 841-845 - Solomon Atnafu, Richard Chbeir, David Coquil, Lionel Brunie:
Integrating similarity-based queries in image DBMSs. SAC 2004: 735-739 - Lerina Aversano, Thierry Bodhuin, Gerardo Canfora, Raffaele Esposito, Maria Tortorella:
Evolution of business processes towards eBusiness using a critiquing approach. SAC 2004: 1351-1358 - Bruno Tenório Ávila, Rafael Dueire Lins:
A new algorithm for removing noisy borders from monochromatic documents. SAC 2004: 1219-1225 - María A. Aviñó, Edward L. Green, Oscar Moreno:
Applications of finite fields to dynamical systems and reverse engineering problems. SAC 2004: 191-196 - Irfan Awan, Muhammad Younas:
Analytical modelling of priority commit protocol for reliable Web applications. SAC 2004: 313-317 - Michael Backes, Günter Karjoth, Walid Bagga, Matthias Schunter:
Efficient comparison of enterprise privacy policies. SAC 2004: 375-382 - Gregório Baggio, Jacques Wainer, Clarence A. Ellis:
Applying scheduling techniques to minimize the number of late jobs in workflow systems. SAC 2004: 1396-1403 - Omaima Bamasak, Ning Zhang:
A secure method for signature delegation to mobile agents. SAC 2004: 813-818 - Elena Baralis, Silvia Chiusano, Paolo Garza:
On support thresholds in associative classification. SAC 2004: 553-558 - Roberto Barbuti, Stefano Cataudella:
Java bytecode verification on Java cards. SAC 2004: 431-438 - Jakob E. Bardram:
Applications of context-aware computing in hospital work: examples and design principles. SAC 2004: 1574-1579
skipping 287 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-25 06:16 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint