default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Exact matches
Likely matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 210,193 matches
- 2025
- Huaijin Liang, Zengjing Chen:
Proof of a conjecture about Parrondo's paradox for two-armed slot machines. Adv. Appl. Math. 163: 102793 (2025) - Zhipeng Cheng, Lu Liu, Minghui Liwang, Ning Chen, Xuwei Fan:
Learning-based joint recommendation, caching, and transmission optimization for cooperative edge video caching in Internet of Vehicles. Ad Hoc Networks 166: 103667 (2025) - Li Li, Hongbin Chen:
Age of information optimal UAV swarm-assisted sweep coverage in wireless sensor networks. Ad Hoc Networks 166: 103675 (2025) - Baogang Li, Jiale Chen, Xinlong Yu, Zhi Yang, Jingxi Zhang:
Cross-domain gesture recognition via WiFi signals with deep learning. Ad Hoc Networks 166: 103654 (2025) - Shudong Wang, Zhi Lu, Haiyuan Gui, Xiao He, Shengzhe Zhao, Zixuan Fan, Yanxiang Zhang, Shanchen Pang:
DDQN-based online computation offloading and application caching for dynamic edge computing service management. Ad Hoc Networks 166: 103681 (2025) - Wenchao Yang, Yuxing Mao, Xueshuo Chen, Chunxu Chen, Bozheng Lei, Qing He:
A method for simultaneously implementing trajectory planning and DAG task scheduling in multi-UAV assisted edge computing. Ad Hoc Networks 166: 103668 (2025) - Jie Zhang, Lei Zhang, Degan Zhang, Ting Zhang, Shuo Wang, Cheng-hui Zou:
New routing method based on sticky bacteria algorithm and link stability for VANET. Ad Hoc Networks 166: 103682 (2025) - Chen Li, Yoshihiro Yamanishi:
AI-driven transcriptome profile-guided hit molecule generation. Artif. Intell. 338: 104239 (2025) - Mengxin Chen:
Pattern dynamics of a Lotka-Volterra model with taxis mechanism. Appl. Math. Comput. 484: 129017 (2025) - Kangming Chen, Ellen Hidemi Fukuda, Hiroyuki Sato:
Nonlinear conjugate gradient method for vector optimization on Riemannian manifolds with retraction and vector transport. Appl. Math. Comput. 486: 129001 (2025) - Xiaofeng Chen, Dongyuan Lin, Hua Li, Zhi Cheng:
Minimum error entropy high-order extend Kalman filter with fiducial points. Appl. Math. Comput. 487: 129113 (2025) - Jianjun Chen, Yuxuan Wang, Weiyi Wang, Zhijun Tan:
A FFT-based DDSIIM solver for elliptic interface problems with discontinuous coefficients on arbitrary domains and its error analysis. Appl. Math. Comput. 487: 129086 (2025) - Xuanrui Cheng, Ming Gao, Wuxiang Huai, Yichun Niu, Li Sheng:
Fixed-time active fault-tolerant control for dynamical systems with intermittent faults and unknown disturbances. Appl. Math. Comput. 486: 129054 (2025) - Lili Deng, Rugen Wang, Ying Liao, Ronghua Xu, Cheng Wang:
The reputation-based reward mechanism promotes the evolution of fairness. Appl. Math. Comput. 486: 129042 (2025) - Yubing Jiang, Hu Chen, Chaobao Huang, Jian Wang:
A fully discrete GL-ADI scheme for 2D time-fractional reaction-subdiffusion equation. Appl. Math. Comput. 488: 129147 (2025) - Hao Li, Liting Chen, Mei Lu:
Two-disjoint-cycle-cover pancyclicity of split-star networks. Appl. Math. Comput. 487: 129085 (2025) - Xu Mei, Jun Cheng, Wentao Huang:
Attack-compensated asynchronous output feedback control for stochastic switching systems with sojourn probability. Appl. Math. Comput. 485: 129024 (2025) - Yu Sun, Cheng Hu, Juan Yu:
Pinning passivity and bipartite synchronization of fractional signed networks without gauge transformation. Appl. Math. Comput. 486: 129067 (2025) - Hong-Zhang Wang, Xing-Chen Shang-Guan, Du Xiong, Y.-H. An, L. Jin:
A matrix-separation-based integral inequality for aperiodic sampled-data synchronization of delayed neural networks considering communication delay. Appl. Math. Comput. 486: 129032 (2025) - Tao You, Linjiang Yang, Jian Wang, Peng Zhang, Jinchao Chen, Ying Zhang:
The guidance of neutral human populations maintains cooperation in the prisoner's dilemma game. Appl. Math. Comput. 486: 129071 (2025) - Zhipeng Zhang, Xiaotong Jiang, Chengyi Xia:
Zero-determinant strategy of finite games with implementation errors and its application into group decision-making. Appl. Math. Comput. 486: 129055 (2025) - Lili Zhang, Chenglong Liu, Liwei An:
Barrier-function based adaptive trajectory tracking control for high-order nonlinear systems with collision avoidance. Appl. Math. Comput. 484: 129004 (2025) - Su-Su Chen:
Multi-geometric discrete spectral problem with several pairs of zeros for Sasa-Satsuma equation. Appl. Math. Lett. 160: 109307 (2025) - Panyu Chen, Álvaro Mateos González, Laurent Mertz:
An elementary approach based on variational inequalities for modeling a friction-based locomotion problem. Appl. Math. Lett. 160: 109305 (2025) - Aiyong Chen, Xiaokai He:
Orbital stability of solitary wave solutions of a Hamiltonian PDE arising in magma dynamics. Appl. Math. Lett. 160: 109326 (2025) - Mingjuan Chen, Nan Liu, Yaqing Wang:
Well-posedness of the Cauchy problem for the fourth-order nonlinear Schrödinger equation. Appl. Math. Lett. 160: 109340 (2025) - Zekun Wang, Hongjia Chen, Zhongming Teng, Xiang Wang:
On perturbations for spectrum and singular value decompositions followed by deflation techniques. Appl. Math. Lett. 160: 109332 (2025) - Chen Yang, Chun-Lei Tang:
Mass concentration near the boundary for attractive Bose-Einstein condensates in bounded domains. Appl. Math. Lett. 160: 109338 (2025) - Jianqi Chen:
Unknown input filtering under full accessibility attacks. Autom. 171: 111966 (2025) - Liangming Chen, Chenyang Liang, Yibei Li, Jie Mei, Lihua Xie:
Performance optimization for continuous network localization. Autom. 171: 111903 (2025)
skipping 210,163 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-10 00:02 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint