Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 619 matches
- 2010
- Alekh Agarwal, Peter L. Bartlett, Pradeep Ravikumar, Martin J. Wainwright:
Information-theoretic lower bounds on the oracle complexity of stochastic convex optimization. CoRR abs/1009.0571 (2010) - Erhan Bayraktar, Yu-Jui Huang:
On the Multi-Dimensional Controller and Stopper Games. CoRR abs/1009.0932 (2010) - Daoyi Dong, Ian R. Petersen:
Sliding Mode Control of Two-Level Quantum Systems. CoRR abs/1009.0558 (2010) - Esther Hänggi, Jürg Wullschleger:
Tight bounds for classical and quantum coin flipping. CoRR abs/1009.4741 (2010) - Daniel Heldt, Kolja Knauer, Torsten Ueckerdt:
Edge-intersection graphs of grid paths: the bend-number. CoRR abs/1009.2861 (2010) - Zhouchen Lin, Minming Chen, Yi Ma:
The Augmented Lagrange Multiplier Method for Exact Recovery of Corrupted Low-Rank Matrices. CoRR abs/1009.5055 (2010) - Filippo Radicchi, José J. Ramasco, Santo Fortunato:
Information filtering in complex weighted networks. CoRR abs/1009.2913 (2010) - Dimitrios Panagopoulos:
A secret sharing scheme using groups. CoRR abs/1009.0026 (2010) - Xin Liu, Xiaowei Yang, Yong Xia:
NetFence: Preventing Internet Denial of Service from Inside Out. CoRR abs/1009.0033 (2010) - David Eppstein, Maarten Löffler, Elena Mumford, Martin Nöllenburg:
Optimal 3D Angular Resolution for Low-Degree Graphs. CoRR abs/1009.0045 (2010) - Boyu Li, Ender Ayanoglu:
Golden Coded Multiple Beamforming. CoRR abs/1009.0050 (2010) - Keyvan Yahya, Jafar Biazar, Hossein Azari, Pouyan Rafiei Fard:
Variational Iteration Method for Image Restoration. CoRR abs/1009.0051 (2010) - Gokarna Sharma, Costas Busch:
A Competitive Analysis for Balanced Transactional Memory Workloads. CoRR abs/1009.0056 (2010) - Wei Yang, Lihua Li, Gang Wu, Haifeng Wang, Ying Wang:
Joint Uplink and Downlink Relay Selection in Cooperative Cellular Networks. CoRR abs/1009.0068 (2010) - Wei Yang, Lihua Li, Gang Wu, Haifeng Wang:
Joint Relay Selection and Link Adaptation for Distributed Beamforming in Regenerative Cooperative Networks. CoRR abs/1009.0072 (2010) - Emanuel Diamant:
Not only a lack of right definitions: Arguments for a shift in information-processing paradigm. CoRR abs/1009.0077 (2010) - Wei Yang, Lihua Li, Wanlu Sun:
Energy-Efficient Relay Selection and Optimal Relay Location in Cooperative Cellular Networks with Asymmetric Traffic. CoRR abs/1009.0078 (2010) - Erin W. Chambers, David Eppstein, Michael T. Goodrich, Maarten Löffler:
Drawing Graphs in the Plane with a Prescribed Outer Face and Polynomial Area. CoRR abs/1009.0088 (2010) - Arslan Shaukat, Ke Chen:
Emotional State Categorization from Speech: Machine vs. Human. CoRR abs/1009.0108 (2010) - Arslan Shaukat, Ke Chen:
Exploring Language-Independent Emotional Acoustic Features via Feature Selection. CoRR abs/1009.0117 (2010) - Telmo L. T. Menezes, Camille Roth, Jean-Philippe Cointet:
Precursors and Laggards: An Analysis of Semantic Temporal Relationships on a Blog Network. CoRR abs/1009.0119 (2010) - Philippe Chassaing, Jean Mairesse:
A non-ergodic PCA with a unique invariant measure. CoRR abs/1009.0143 (2010) - Jonathan Chappelon, Akihiro Matsuura:
On generalized Frame-Stewart numbers. CoRR abs/1009.0146 (2010) - Xiao-Shan Gao, Wei Li, Chun-Ming Yuan:
Intersection Theory for Generic Differential Polynomials and Differential Chow Form. CoRR abs/1009.0148 (2010) - Amnon H. Eden, Epameinondas Gasparis:
Three Controlled Experiments in Software Engineering with the Two-Tier Programming Toolkit: Final Report. CoRR abs/1009.0152 (2010) - Laurent Decreusefond, Philippe Martins, Than-Tung Vu:
An analytical model for evaluating outage and handover probability of cellular wireless networks. CoRR abs/1009.0193 (2010) - Rémy Belmonte, Martin Vatshelle:
On graph classes with logarithmic boolean-width. CoRR abs/1009.0216 (2010) - Wei Pan, Manuel Cebrián, Wen Dong, Taemie Kim, Alex Pentland:
Modeling Dynamical Influence in Human Interaction Patterns. CoRR abs/1009.0240 (2010) - Ketan Mulmuley:
Explicit Proofs and The Flip. CoRR abs/1009.0246 (2010) - Flavio Rizzolo, Iluju Kiringa, Rachel Pottinger, Kwok Wong:
The Conceptual Integration Modeling Framework: Abstracting from the Multidimensional Model. CoRR abs/1009.0255 (2010)
skipping 589 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-24 22:07 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint