Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 195 matches
- 2004
- Dimitris Achlioptas, Haixia Jia, Cristopher Moore:
Hiding Satisfying Assignments: Two Are Better than One. AAAI 2004: 131-136 - Jafar Adibi, Hans Chalupsky, Eric Melz, André Valente:
The KOJAK Group Finder: Connecting the Dots via Integrated Knowledge-Based and Statistical Reasoning. AAAI 2004: 800-807 - Alexandre Albore, Piergiorgio Bertoli:
Generating Safe Assumption-Based Plans for Partially Observable, Nondeterministic Domains. AAAI 2004: 495-500 - R. Amit, Maja J. Mataric:
A Correspondence Metric for Imitation. AAAI 2004: 944-945 - Gustave Anderson, Andrew Burnheimer, Vincent A. Cicirello, David J. Dorsey, Saturnino Garcia, Moshe Kam, Joseph Kopena, Kris Malfettone, Andrew Mroczkowski, Gaurav Naik, Maxim Peysakhov, William C. Regli, Joshua Shaffer, Evan Sultanik, Kenneth Tsang, Leonardo F. Urbano, Kyle Usbeck, Jacob Warren:
Intelligent Systems Demonstration: The Secure Wireless Agent Testbed (SWAT). AAAI 2004: 1004-1005 - Rafal A. Angryk, Costin Barbu:
Fuzzy Induction in Dynamic User Profiling for Information Filtering. AAAI 2004: 946-947 - Carlos Ansótegui, Alvaro del Val, Iván Dotú, Cèsar Fernández, Felip Manyà:
Modeling Choices in Quasigroup Completion: SAT vs. CSP. AAAI 2004: 137-142 - Chris Bailey-Kellogg, Naren Ramakrishnan:
Spatial Aggregation for Qualitative Assessment of Scientific Computations. AAAI 2004: 585-591 - Bikramjit Banerjee, Jing Peng:
Performance Bounded Reinforcement Learning in Strategic Interactions. AAAI 2004: 2-7 - K. Suzanne Barber, Jaesuk Ahn, Karen Fullam, Thomas J. Graser, Nishit Gujral, David C. Han, Dung N. Lam, Ryan McKay, Jisun Park, Marcelo M. Vanzin:
Multi-Agent System Development: Design, Runtime, and Analysis. AAAI 2004: 1006-1007 - Laura Barbulescu, L. Darrell Whitley, Adele E. Howe:
Leap Before You Look: An Effective Strategy in an Oversubscribed Scheduling Problem. AAAI 2004: 143-148 - Sugato Basu:
Semi-Supervised Clustering with Limited Background Knowledge. AAAI 2004: 979-980 - Russell Bent, Pascal Van Hentenryck:
Regrets Only! Online Stochastic Optimization under Time Constraints. AAAI 2004: 501-506 - Christian Bessiere, Emmanuel Hebrard, Brahim Hnich, Toby Walsh:
The Complexity of Global Constraints. AAAI 2004: 112-117 - Mikhail Bilenko:
Learnable Similarity Functions and their Applications to Clustering and Record Linkage. AAAI 2004: 981-982 - Arnold Binas, John K. Slaney:
Semantically Guiding a First-Order Theorem Prover with a Soft Model. AAAI 2004: 948-949 - Stefano Bistarelli, Simon N. Foley, Barry O'Sullivan:
Detecting and Eliminating the Cascade Vulnerability Problem from Multilevel Security Networks Using Soft Constraints. AAAI 2004: 808-813 - Andrew J. Blumberg, Abhi Shelat:
Searching for Stable Mechanisms: Automated Design for Imperfect Players. AAAI 2004: 8-13 - Craig Boutilier, Tuomas Sandholm, Rob Shields:
Eliciting Bid Taker Non-price Preferences in (Combinatorial) Auctions. AAAI 2004: 204-211 - James Bowen, Chavalit Likitvivatanavong:
Domain Transmutation in Constraint Satisfaction Problems. AAAI 2004: 149-154 - Darius Braziunas, Craig Boutilier:
Stochastic Local Search for POMDP Controllers. AAAI 2004: 690-696 - Menkes van den Briel, Romeo Sanchez Nigenda, Minh Binh Do, Subbarao Kambhampati:
Effective Approaches for Partial Satisfaction (Over-Subscription) Planning. AAAI 2004: 562-569 - Brett Browning, Ling Xu, Manuela M. Veloso:
Skill Acquisition and Use for a Dynamically-Balancing Soccer Robot. AAAI 2004: 599-604 - Hung Hai Bui, Dinh Q. Phung, Svetha Venkatesh:
Learning Hierarchical Hidden Markov Models with General State Hierarchy. AAAI 2004: 324-329 - Gangshu Cai:
Flexible Decision-Making in Sequential Auctions. AAAI 2004: 983-984 - Jason Campbell, Rahul Sukthankar, Illah R. Nourbakhsh:
Visual Odometry Using Commodity Optical Flow. AAAI 2004: 1008-1009 - Tom Carchrae, J. Christopher Beck:
Low-Knowledge Algorithm Control. AAAI 2004: 49-54 - Giuseppe Carenini, Rita Sharma:
Exploring More Realistic Evaluation Measures for Collaborative Filtering. AAAI 2004: 749-754 - William Cheetham:
Tenth Anniversary of the Plastics Color Formulation Tool. AAAI 2004: 770-776 - Hubie Chen:
Collapsibility and Consistency in Quantified Constraint Satisfaction. AAAI 2004: 155-160
skipping 165 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-27 16:55 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint