Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 91 matches
- 2018
- Nurul Ain Binti Adnan, Shigeru Yamashita:
Logical Qubit Layout Problem for ICM Representation. J. Inf. Process. 26: 20-28 (2018) - Izumi Asakura, Hidehiko Masuhara, Takuya Matsumoto, Kiminori Matsuzaki:
Identification and Elimination of the Overhead of Accelerate with a Super-resolution Application. J. Inf. Process. 26: 48-53 (2018) - Tomoka Azakami, Chihiro Shibata, Ryuya Uda:
Evaluation of Ergonomically Designed CAPTCHAs using Deep Learning Technology. J. Inf. Process. 26: 625-636 (2018) - Fevzi Belli, Nevin Güler Dincer, Michael Linschulte, Tugkan Tuglular:
Model-based Selective Layer-centric Testing. J. Inf. Process. 26: 572-589 (2018) - Hiroyuki Chishiro:
Multiprocessor Semi-fixed-priority Scheduling. J. Inf. Process. 26: 202-211 (2018) - Chenhui Chu, Raj Dabre, Sadao Kurohashi:
A Comprehensive Empirical Comparison of Domain Adaptation Methods for Neural Machine Translation. J. Inf. Process. 26: 529-538 (2018) - Raj Dabre, Fabien Cromierès, Sadao Kurohashi:
Exploiting Multilingual Corpora Simply and Efficiently in Neural Machine Translation. J. Inf. Process. 26: 406-415 (2018) - Keita Doi, Ryota Shioya, Hideki Ando:
Performance Improvement Techniques in Tightly Coupled Multicore Architectures for Single-Thread Applications. J. Inf. Process. 26: 445-460 (2018) - Isao Echizen:
Editor's Message to Special Issue of Computer Security Technologies for a Super Smart Society. J. Inf. Process. 26: 637 (2018) - Yo Ehara, Issei Sato, Hidekazu Oiwa, Hiroshi Nakagawa:
Mining Words in the Minds of Second Language Learners for Learner-specific Word Difficulty. J. Inf. Process. 26: 267-275 (2018) - Yu Enokibori, Kenji Mase:
Data Augmentation to Build High Performance DNN for In-bed Posture Classification. J. Inf. Process. 26: 718-727 (2018) - Kenji Fujikawa, Ved P. Kafle, Pedro Martinez-Julia, Abu Hena Al Muktadir, Hiroaki Harai:
Automatic Construction of Name-Bound Virtual Networks for IoT and its Management. J. Inf. Process. 26: 601-611 (2018) - Akihiro Fujimoto, Yukari Masui, Takuya Yoshihiro:
Scheduling Beacon Transmission to Improve Delay for Receiver-initiated-MAC Based Wireless Sensor Networks. J. Inf. Process. 26: 140-147 (2018) - Hidemi Fukada:
Editor's Message to Special Issue of Information Systems. J. Inf. Process. 26: 375 (2018) - Keisuke Furumoto, Masakatu Morii:
Recognition Accuracy Improvement of Obfuscated QR Code by Using Reliability Information and GMD Decoding. J. Inf. Process. 26: 350-357 (2018) - Toshiyuki Hagiya, Toshiharu Horiuchi, Tomonori Yazaki, Tatsuya Kawahara:
Typing Tutor: Individualized Tutoring in Text Entry for Older Adults Based on Statistical Input Stumble Detection. J. Inf. Process. 26: 362-374 (2018) - Masato Hashimoto, Qiangfu Zhao:
A Privacy Preserving Protocol for Cloud-Based Implementation of Aware Agents. J. Inf. Process. 26: 486-496 (2018) - Mitsuhiro Hattori, Takato Hirano, Nori Matsuda, Fumio Omatsu, Rina Shimizu, Ye Wang:
Privacy-Utility Tradeoff for Applications Using Energy Disaggregation of Smart-Meter Data. J. Inf. Process. 26: 648-661 (2018) - Eiichi Hayakawa:
Editor's Message to Special Issue of Embedded Systems Engineering. J. Inf. Process. 26: 201 (2018) - Tatsunori Hirai, Hironori Doi, Shigeo Morishima:
Latent Topic Similarity for Music Retrieval and Its Application to a System that Supports DJ Performance. J. Inf. Process. 26: 276-284 (2018) - Tomoo Inoue:
Editor's Message to Special Issue of Advances in Collaboration Technologies. J. Inf. Process. 26: 169 (2018) - Tatsuya Ishihara, Kris M. Kitani, Chieko Asakawa, Michitaka Hirose:
Deep Learning and Geometry-based Image Localization Enhanced by Bluetooth Signals. J. Inf. Process. 26: 707-717 (2018) - Takashi Isozaki, Satoshi Hasegawa, Hajime Anada:
MAX-MIN Ant System with Memory Considering New Solution Importance. J. Inf. Process. 26: 439-444 (2018) - Mari Ito, Masatake Hirao, Hiroki Hamahara:
A Support System for Nursery Staff Shift Scheduling - A Case Study at a Nursery School. J. Inf. Process. 26: 294-300 (2018) - Taku Itoh, Yusuke Fukazawa, Dandan Zhu, Jun Ota:
Modeling Weather Context Dependent Food Choice Process. J. Inf. Process. 26: 386-395 (2018) - Chuzo Iwamoto, Tatsuaki Ibusuki:
Dosun-Fuwari is NP-complete. J. Inf. Process. 26: 358-361 (2018) - Kiyotaka Kaji, Takuya Yoshihiro:
Building Detour Paths to Avoid Local Congestion in MANETs. J. Inf. Process. 26: 116-123 (2018) - Shu Kaneko, Eiichiro Chishiro:
Query Conversion for Aggregate Operations in Distributed SPARQL Query Processing Using Summary Information. J. Inf. Process. 26: 747-754 (2018) - Takahiko Kato, Masaki Bandai:
Avoiding Excessive Rate Reduction in Rate Based Congestion Control for Named Data Networking. J. Inf. Process. 26: 29-37 (2018) - Yuhei Kawakoya, Makoto Iwamura, Jun Miyoshi:
Taint-assisted IAT Reconstruction against Position Obfuscation. J. Inf. Process. 26: 813-824 (2018)
skipping 61 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-12 12:52 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint