Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 112 matches
- 2005
- Moustafa S. Abou-Dina, F. M. Hassan:
Approximate determination of the transmission and reflection coefficients for water-wave flow over a topography. Appl. Math. Comput. 168(1): 283-304 (2005) - Abdellatif Agouzal, Karam Allali, Khalid Najib:
Non-conforming finite element discretisations of a class of non-Newtonian flows. Appl. Math. Comput. 168(2): 1004-1019 (2005) - Hasan Akin:
On the ergodic properties of certain additive cellular automata over Zm. Appl. Math. Comput. 168(1): 192-197 (2005) - Tofigh Allahviranloo:
Romberg integration for fuzzy functions. Appl. Math. Comput. 168(2): 866-876 (2005) - N. M. Apaolaz, Jesus R. Artalejo:
On the time to reach a certain orbit level in multi-server retrial queues. Appl. Math. Comput. 168(1): 686-703 (2005) - Aytac Arikoglu, Ibrahim Özkol:
Solution of boundary value problems for integro-differential equations by using differential transform method. Appl. Math. Comput. 168(2): 1145-1158 (2005) - Basem S. Attili:
The Adomian decomposition method for computing eigenelements of Sturm-Liouville two point boundary value problems. Appl. Math. Comput. 168(2): 1306-1316 (2005) - Amir Azaron, Cahit Perkgoz, Masatoshi Sakawa:
A genetic algorithm approach for the time-cost trade-off in PERT networks. Appl. Math. Comput. 168(2): 1317-1339 (2005) - Rafael Cortell Bataller:
A note on magnetohydrodynamic flow of a power-law fluid over a stretching sheet. Appl. Math. Comput. 168(1): 557-566 (2005) - Jafar Biazar:
Solution of systems of integral-differential equations by Adomian decomposition method. Appl. Math. Comput. 168(2): 1232-1238 (2005) - Silvia Bonettini, Emanuele Galligani, Valeria Ruggiero:
An inexact Newton method combined with Hestenes multipliers' scheme for the solution of Karush-Kuhn-Tucker systems. Appl. Math. Comput. 168(1): 651-676 (2005) - Li Cai, Jian-Hu Feng, Wen-Xian Xie:
A CWENO-type central-upwind scheme for ideal MHD equations. Appl. Math. Comput. 168(1): 600-612 (2005) - Ibrahim Çelik:
Approximate computation of eigenvalues with Chebyshev collocation method. Appl. Math. Comput. 168(1): 125-134 (2005) - Henry Ker-Chang Chang, Erl-Huei Lu, Pin-Chang Su:
Design of traceable security system. Appl. Math. Comput. 168(2): 933-944 (2005) - Yong Chen, Qi Wang:
A new general algebraic method with symbolic computation to construct new travelling wave solution for the (1 + 1)-dimensional dispersive long wave equation. Appl. Math. Comput. 168(2): 1189-1204 (2005) - Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow:
Forward-secure multisignature and blind signature schemes. Appl. Math. Comput. 168(2): 895-908 (2005) - Carmelo Clavero, Jose L. Gracia:
High order methods for elliptic and time dependent reaction-diffusion singularly perturbed problems. Appl. Math. Comput. 168(2): 1109-1127 (2005) - Mehdi Dehghan, Majid Jaberi Douraki, Marjan Jaberi Douraki:
Dynamics of a rational difference equation using both theoretical and computational approaches. Appl. Math. Comput. 168(2): 756-775 (2005) - Mehdi Dehghan, M. Masjed-Jamei, M. R. Eslahchi:
On numerical improvement of the second kind of Gauss-Chebyshev quadrature rules. Appl. Math. Comput. 168(1): 431-446 (2005) - Metin Demiralp:
Critical value calculations for the screening parameter of Hulthen potential. Appl. Math. Comput. 168(2): 1380-1399 (2005) - Fabio Dercole, Stefano Maggi:
Detection and continuation of a border collision bifurcation in a forest fire model. Appl. Math. Comput. 168(1): 623-635 (2005) - Qi Duan, Liqiu Wang, Edward H. Twizell:
A new weighted rational cubic interpolation and its approximation. Appl. Math. Comput. 168(2): 990-1003 (2005) - Sohrab Effati, Mojtaba Baymani:
A new nonlinear neural network for solving convex nonlinear programming problems. Appl. Math. Comput. 168(2): 1370-1379 (2005) - Sohrab Effati, A. R. Nazemi:
A new method for solving a system of the nonlinear equations. Appl. Math. Comput. 168(2): 877-894 (2005) - Mahmoud M. El-Borai, Khairia El-Said El-Nadi, Osama L. Mostafa, Hamdy M. Ahmed:
Numerical methods for some nonlinear stochastic differential equations. Appl. Math. Comput. 168(1): 65-75 (2005) - Mamdouh M. El-Kady, A. Abd El-Shafy:
Error estimation problem of nonlinear integral equations in the space Lp(p >= 1). Appl. Math. Comput. 168(2): 1251-1257 (2005) - A. Esen:
A numerical solution of the equal width wave equation by a lumped Galerkin method. Appl. Math. Comput. 168(1): 270-282 (2005) - M. R. Eslahchi, Mehdi Dehghan, M. Masjed-Jamei:
The first kind Chebyshev-Newton-Cotes quadrature rules (closed type) and its numerical improvement. Appl. Math. Comput. 168(1): 479-495 (2005) - Yuelin Gao, Honggang Xue, Peiping Shen:
A new rectangle branch-and-reduce approach for solving nonconvex quadratic programming problems. Appl. Math. Comput. 168(2): 1409-1418 (2005) - Vildan Gülkaç:
On the finite differences schemes for the numerical solution of two-dimensional moving boundary problem. Appl. Math. Comput. 168(1): 549-556 (2005)
skipping 82 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-15 14:48 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint