Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 121 matches
- 2006
- Haojun Ai, Shuixian Chen, Ruimin Hu:
Introduction to AVS Audio. J. Comput. Sci. Technol. 21(3): 360-365 (2006) - Qing Ai, Yan-Song Li, Gui-Lu Long:
Influences of Gate Operation Errors in the Quantum Counting Algorithm. J. Comput. Sci. Technol. 21(6): 927-932 (2006) - Katerina Asdre, Stavros D. Nikolopoulos:
P-Tree Structures and Event Horizon: Efficient Event-Set Implementations. J. Comput. Sci. Technol. 21(1): 19-26 (2006) - Ehsan Atoofian, Zainalabedin Navabi:
A Test Approach for Look-Up Table Based FPGAs. J. Comput. Sci. Technol. 21(1): 141-146 (2006) - Swapan Bhattacharya, Ananya Kanjilal:
Code Based Analysis for Object-Oriented Systems. J. Comput. Sci. Technol. 21(6): 965-972 (2006) - Kai-Yuan Cai:
Software Reliability Experimentation and Control. J. Comput. Sci. Technol. 21(5): 697-707 (2006) - Yici Cai, Bin Liu, Yan Xiong, Qiang Zhou, Xianlong Hong:
Priority-Based Routing Resource Assignment Considering Crosstalk. J. Comput. Sci. Technol. 21(6): 913-921 (2006) - Jianwen Chen, Guoping Li, Yun He:
A Novel MBAFF Scheme of AVS. J. Comput. Sci. Technol. 21(3): 323-331 (2006) - Guoliang Chen, Guangzhong Sun, Yunquan Zhang, Zeyao Mo:
Study on Parallel Computing. J. Comput. Sci. Technol. 21(5): 665-673 (2006) - Xueqi Cheng, Songbo Tan, Lilian Tang:
Using DragPushing to Refine Concept Index for Text Categorization. J. Comput. Sci. Technol. 21(4): 592-596 (2006) - Zhihong Chong, Jeffrey Xu Yu, Zhengjie Zhang, Xuemin Lin, Wei Wang, Aoying Zhou:
Efficient Computation of k-Medians over Data Streams Under Memory Constraints. J. Comput. Sci. Technol. 21(2): 284-296 (2006) - Sankhayan Choudhury, Nabendu Chaki, Swapan Bhattacharya:
GDM: A New Graph Based Data Model Using Functional Abstractionx. J. Comput. Sci. Technol. 21(3): 430-438 (2006) - Jianwu Dang, Masato Akagi, Kiyoshi Honda:
Communication Between Speech Production and Perception Within the Brain-Observation and Simulation. J. Comput. Sci. Technol. 21(1): 95-105 (2006) - Jianwan Ding, Liping Chen, Fanli Zhou:
A Component-Based Debugging Approach for Detecting Structural Inconsistencies in Declarative Equation Based Models. J. Comput. Sci. Technol. 21(3): 450-458 (2006) - Runyao Duan, Zheng-Feng Ji, Yuan Feng, Mingsheng Ying:
Some Issues in Quantum Information Theory. J. Comput. Sci. Technol. 21(5): 776-789 (2006) - Xian-Yong Fang, Mingmin Zhang, Zhigeng Pan, Peng Wang:
A New Method of Manifold Mosaic for Large Displacement Images. J. Comput. Sci. Technol. 21(2): 218-223 (2006) - Dan Feng, Hai Jin:
Massive Storage Systems. J. Comput. Sci. Technol. 21(5): 648-664 (2006) - Dengguo Feng, Xiaoyun Wang:
Progress and Prospect of Some Fundamental Research on Information Security in China. J. Comput. Sci. Technol. 21(5): 740-755 (2006) - Ian T. Foster:
Globus Toolkit Version 4: Software for Service-Oriented Systems. J. Comput. Sci. Technol. 21(4): 513-520 (2006) - Yohan D. Fougerolle, Andrei V. Gribok, Sebti Foufou, Frédéric Truchetet, Mongi A. Abidi:
Radial Supershapes for Solid Modeling. J. Comput. Sci. Technol. 21(2): 238-243 (2006) - Qi Ge, Haitao Wang, Hong Zhu:
An Improved Algorithm for Finding the Closest Pair of Points. J. Comput. Sci. Technol. 21(1): 27-31 (2006) - Xin Geng, Zhi-Hua Zhou:
Image Region Selection and Ensemble for Face Recognition. J. Comput. Sci. Technol. 21(1): 116-125 (2006) - Guanqun Gu, Junzhou Luo:
Some Issues on Computer Networks: Architecture and Key Technologies. J. Comput. Sci. Technol. 21(5): 708-722 (2006) - Suqing Han, Jue Wang:
Second Attribute Algorithm Based on Tree Expression. J. Comput. Sci. Technol. 21(3): 383-392 (2006) - Ying He, Xianfeng Gu, Hong Qin:
Automatic Shape Control of Triangular B-Splines of Arbitrary Topology. J. Comput. Sci. Technol. 21(2): 232-237 (2006) - Weiwu Hu, Rui Hou, Jun-Hua Xiao, Long-Bin Zhang:
High Performance General-Purpose Microprocessors: Past and Future. J. Comput. Sci. Technol. 21(5): 631-640 (2006) - Yu Hu, Tong Jing, Zhe Feng, Xianlong Hong, Xiaodong Hu, Guiying Yan:
ACO-Steiner: Ant Colony Optimization Based Rectilinear Steiner Minimal Tree Algorithm. J. Comput. Sci. Technol. 21(1): 147-152 (2006) - Wei Hu, Kaihuai Qin, Huawei Wang, Ya-Feng Li:
Reflection and Refraction on Implicit Surfaces. J. Comput. Sci. Technol. 21(2): 166-172 (2006) - Zhanyi Hu, Yihong Wu, Fuchao Wu, Songde Ma:
The Number of Independent Kruppa Constraints from N Images. J. Comput. Sci. Technol. 21(2): 209-217 (2006) - Tie-Jun Huang, Yongliang Liu:
Basic Considerations on AVS DRM Architecture. J. Comput. Sci. Technol. 21(3): 366-369 (2006)
skipping 91 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-23 13:21 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint