Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 37 matches
- 2010
- Dragic Bankovic:
Boolean Equations and Boolean Inequations? J. Multiple Valued Log. Soft Comput. 16(1-2): 189-196 (2010) - Janusz A. Brzozowski, Yuli Ye:
Gate Circuits with Feedback in Finite Multivalued Algebras of Transients. J. Multiple Valued Log. Soft Comput. 16(1-2): 155-176 (2010) - Jianghui Cai, Jifu Zhang, Xujun Zhao:
A Star Spectrum Outliers Mining System Based on PSO. J. Multiple Valued Log. Soft Comput. 16(6): 631-641 (2010) - Lavinia Corina Ciungu:
Towards a Probability Theory on Nuanced MV-Algebras. J. Multiple Valued Log. Soft Comput. 16(3-5): 221-246 (2010) - Miguel Couceiro, Jean-Luc Marichal:
Representations and Characterizations of Polynomial Functions on Chains. J. Multiple Valued Log. Soft Comput. 16(1-2): 65-86 (2010) - Zhihua Cui, Xingjuan Cai, Jianchao Zeng, Yufeng Yin:
PID-Controlled Particle Swarm Optimization. J. Multiple Valued Log. Soft Comput. 16(6): 585-609 (2010) - Zhihua Cui, Sanyou Zeng:
Editorial: New Trends on Swarm Intelligent Systems. J. Multiple Valued Log. Soft Comput. 16(6): 505-508 (2010) - Bijan Davvaz, Violeta Leoreanu Fotea:
Intuitionistic Fuzzy n-ary Hypergroups. J. Multiple Valued Log. Soft Comput. 16(1-2): 87-104 (2010) - Denisa Diaconescu:
Kripke-Style Semantics for Non-Commutative Monoidal t-Norm Logic. J. Multiple Valued Log. Soft Comput. 16(3-5): 247-263 (2010) - Dumitru Daniel Dragulici:
Polyadic BL-Algebras: A Representation Theorem. J. Multiple Valued Log. Soft Comput. 16(3-5): 265-302 (2010) - Anatolij Dvurecenskij, George Georgescu, Afrodita Iorgulescu, Sergiu Rudeanu:
Foreword: Multiple-Valued Logic and Its Algebras. J. Multiple Valued Log. Soft Comput. 16(3-5): 219-220 (2010) - Aldo V. Figallo, Inés Pascual, Alicia Ziliani:
A Duality for -0-Valued -Lukasiewicz-Moisil Algebras and Applications. J. Multiple Valued Log. Soft Comput. 16(3-5): 303-322 (2010) - Paul Flondor:
Level Sets. J. Multiple Valued Log. Soft Comput. 16(3-5): 323-330 (2010) - Richard A. Formato:
Central Force Optimization and NEOs - First Cousins? J. Multiple Valued Log. Soft Comput. 16(6): 547-565 (2010) - Violeta Leoreanu Fotea, Ivo G. Rosenberg:
Join Spaces Determined by Lattices. J. Multiple Valued Log. Soft Comput. 16(1-2): 7-16 (2010) - Jeong Soon Han, Hee Sik Kim, Joseph Neggers:
Strong and Ordinary d-Algebras. J. Multiple Valued Log. Soft Comput. 16(3-5): 331-339 (2010) - Shan He:
Training Artificial Neural Networks Using Lévy Group Search Optimizer. J. Multiple Valued Log. Soft Comput. 16(6): 527-545 (2010) - Hong-Zhong Huang, Yanfeng Li, Yu Liu:
Posbist Reliability Theory of k-out-of-n: G System. J. Multiple Valued Log. Soft Comput. 16(1-2): 45-63 (2010) - Afrodita Iorgulescu:
On BCK Algebras - Part III: Classes of Examples of Proper MVAlgebras, BLAlgebras and Divisible Bounded Residuated Lattices, with or without Condition (WNM). J. Multiple Valued Log. Soft Comput. 16(3-5): 341-386 (2010) - Adnan Khashman:
Blood Cell Type Identification Using Different Emotional Neural Network Models. J. Multiple Valued Log. Soft Comput. 16(1-2): 17-35 (2010) - Gérard Kientega, Ivo G. Rosenberg:
Metric Properties of Tolerances. J. Multiple Valued Log. Soft Comput. 16(1-2): 209-218 (2010) - Jan Kühr:
Boolean and Central Elements and Cantor-Bernstein Theorem in Bounded Pseudo-BCK-Algebras? J. Multiple Valued Log. Soft Comput. 16(3-5): 387-404 (2010) - Ioana Leustean:
Tensor Products of Probability MV-algebras. J. Multiple Valued Log. Soft Comput. 16(3-5): 405-419 (2010) - Jiawei Li, Graham Kendall:
Collective Behavior and Kin Selection in Evolutionary IPD. J. Multiple Valued Log. Soft Comput. 16(6): 509-525 (2010) - Xiang Li, Hau-San Wong:
Credibilistic Satisfiability and Credibilistic Entailment. J. Multiple Valued Log. Soft Comput. 16(1-2): 105-134 (2010) - Silvana Marinkovic:
Reproductive General Solutions of Equations on Stone Algebras. J. Multiple Valued Log. Soft Comput. 16(1-2): 1-6 (2010) - Silvana Marinkovic, Dragic Bankovic:
General Solutions of Equations in Multiple-Valued Logic? J. Multiple Valued Log. Soft Comput. 16(3-5): 421-426 (2010) - Takaaki Mizuki, Hitoshi Tsubata, Takao Nishizeki:
Minimizing AND-EXOR Expressions for Two-Variable Multiple-Valued Input Binary Output Functions. J. Multiple Valued Log. Soft Comput. 16(1-2): 197-208 (2010) - Claudia Muresan:
Further Functorial Properties of the Reticulation. J. Multiple Valued Log. Soft Comput. 16(1-2): 177-187 (2010) - Claudia Muresan:
Characterization of the Reticulation of a Residuated Lattice. J. Multiple Valued Log. Soft Comput. 16(3-5): 427-447 (2010)
skipping 7 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-01 09:46 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint