Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 25 matches
- 2016
- Xiaolan Chang, Yongle Zhao:
An Empirical Analysis Method of Incentives for Talent Innovation Behavior. TSA 2016: 132-136 - Zhifei Chen, Wanwangying Ma, Wei Lin, Lin Chen, Baowen Xu:
Tracking Down Dynamic Feature Code Changes against Python Software Evolution. TSA 2016: 54-63 - Haibo Cheng, Peng Zeng, Lingling Xue, Zhao Shi, Peng Wang, Haibin Yu:
Manufacturing Ontology Development Based on Industry 4.0 Demonstration Production Line. TSA 2016: 42-47 - William Cheng-Chung Chu, Chih-Hung Chang, Tse-Chuan Hsu, Yen-Hua Huang:
Applying Software Defined Methodologies to Software Computing. TSA 2016: 29-35 - Sidou Dong, Aihua Ren, Xin Wang:
The Architecture of OPAL for the Software Process Improvement in High Maturity Level. TSA 2016: 73-80 - Jiayu Gong, Jiawen Lu, Lizhi Cai:
An Induction to the Development of Software Quality Model Standards. TSA 2016: 117-122 - Jinjie Gou, Cheng Wang, Wei Luo, Jin Gou:
The Normalized-PSO and Its Application in Attribute Weighted Optimal Problem. TSA 2016: 48-53 - Deliang Gu, Kuisheng Chen, Xinbo Qian, Congchang Zhan:
Reliability Analysis of Drilling Mud Pump Pressure Cylinder Hydraulic System. TSA 2016: 102-107 - Xiaojun Ji, Lihua Song:
Mutual Exclusion Verification of Peterson's Solution in Isabelle/HOL. TSA 2016: 81-86 - Kai Xie, Chao Sun:
A Fast Regression Testing Method Using for EMS System Engineering Project. TSA 2016: 108-111 - Dong Li, Jing Xiong, Chunhui Yang:
Study of Performance Testing of Information System Based on Domestic CPU and OS. TSA 2016: 112-116 - Xianlong Lv, Xingong Cheng, YongXi Lv:
Distributed Cloud Storage and Parallel Topology Processing of Power Network. TSA 2016: 142-146 - Wanwangying Ma, Lin Chen, Yuming Zhou, Baowen Xu:
What Are the Dominant Projects in the GitHub Python Ecosystem? TSA 2016: 87-95 - Yikang Peng, Zhibin Huang, Feng Zhou:
Contrast and Analysis about the Characteristics of MPS and CDP in GPU Kepler Architecture. TSA 2016: 137-141 - Xinbo Qian, Congchang Zhan:
Laboratory Reliability Testing Design of Solenoid Operated Directional-Control Valves for Industrial Application. TSA 2016: 96-101 - Qi Tang, Wen Zhang, Xiaoyong Li, Bin Wang:
X-Prcaf : Xposed Based Protecting Cache File from Leaks in Android Social Applications. TSA 2016: 17-22 - Jingxuan Tu, Xiaoyuan Xie, Yuming Zhou, Baowen Xu, Lin Chen:
A Search Based Context-Aware Approach for Understanding and Localizing the Fault via Weighted Call Graph. TSA 2016: 64-72 - Hongyu Wang, Xingong Cheng, Xiju Zong:
Optimal PMU Placement for the System Observability Based on System Topology Model. TSA 2016: 147-151 - Feng-Jian Wang, Tenny Lu, Hwai-Jung Hsu:
Separation of Concerns in Analysis of Artifact Anomalies within Workflow Models. TSA 2016: 1-7 - Shiyu Wang, Kun Lu, Mingchu Li, Qilong Zhen, Xiaoyu Che:
Fighting Pollution Attack in Peer-to-Peer Streaming Systems: A Dynamic Reputation Management Approach. TSA 2016: 23-28 - Xuan Wang, Lu Zhang, Hongji Yang:
Design of a Creative Encryption Approach Based on Pataphysics. TSA 2016: 123-126 - Jianwen Xiang, Siwei Zhou, Luyao Ye, Shengwu Xiong, W. Eric Wong:
A Generalized Multiple-Valued Decision Diagram for Reliability Analysis of Fault-Tolerant Systems. TSA 2016: 36-41 - Yu Yang, Chao Li, Guozi Sun:
A Time-Space Attribute-Based Evidence Fixing Method in Digital Forensics. TSA 2016: 127-131 - Fei Zhao, Wenchang Shi, Bo Qin, Bin Liang:
A Copy-Move Forgery Detection Scheme with Improved Clone Region Estimation. TSA 2016: 8-16 - Third International Conference on Trustworthy Systems and their Applications, TSA 2016, Wuhan, China, September 18-22, 2016. IEEE 2016, ISBN 978-1-5090-3539-7 [contents]
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-24 07:20 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint