Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 85 matches
- 2010
- Vitoantonio Bevilacqua, Fabrizio Cucci, Vito Santarcangelo, Giuseppina Iannelli, Angelo Paradiso, Stefania Tommasi:
A New Ontological Probabilistic Approach to the Breast Cancer Problem in Semantic Medicine. ICIC (2) 2010: 59-68 - Vitoantonio Bevilacqua, Alessandro Piazzolla, Paolo Stofella:
Atlas-Based Segmentation of Organs at Risk in Radiotherapy in Head MRIs by Means of a Novel Active Contour Framework. ICIC (2) 2010: 350-359 - Marco Calabrese, Vincenzo Di Lecce, Domenico Soldo:
On Designing Task-Oriented Intelligent Interfaces: An E-Mail Based Design Framework. ICIC (2) 2010: 229-239 - Lai-Cheng Cao:
Enhancing Efficiency of Intrusion Prediction Based on Intelligent Immune Method. ICIC (2) 2010: 599-606 - Van-Toan Cao, Yu-Yung Park, Jae-Hyeok Shin, Jong-Hwa Lee, Hyo-Moon Cho:
A Simple Method for Correcting Lens Distortion in Low-Cost Camera Using Geometric Invariability. ICIC (2) 2010: 325-333 - Wei Chen, Xiaoshuan Zhang, Dong Tian, Zetian Fu:
An Identity-Based Authentication Protocol for Clustered ZigBee Network. ICIC (2) 2010: 503-510 - Hamideh Sadat Cheraghchi, Abolfazl Toroghi Haghighat, Neda Javadzadeh:
Toward a Human Society Inspired Routing Protocol for Wireless Sensor Network. ICIC (2) 2010: 519-526 - Silvana G. Dellepiane, Elena Angiati, Irene Minetti:
Multi-seed Segmentation of Tomographic Volumes Based on Fuzzy Connectedness. ICIC (2) 2010: 360-367 - Chesner Désir, Caroline Petitjean, Laurent Heutte, Luc Thiberville:
Using a Priori Knowledge to Classify in Vivo Images of the Lung. ICIC (2) 2010: 207-212 - Salvatore Distefano, Vincenzo D. Cunsolo, Antonio Puliafito:
A Taxonomic Specification of Cloud@Home. ICIC (2) 2010: 527-534 - Dong Dong, Zhaohao Sun, Feng Gao:
PCOPM: A Probabilistic CBR Framework for Obesity Prescription Management. ICIC (2) 2010: 91-99 - Zhaoxia Dong, Tiejun Zhao:
A Deterministic Method to Predict Phrase Boundaries of a Syntactic Tree. ICIC (2) 2010: 649-656 - Ji-Xiang Du, Chuan-Min Zhai:
Plant Species Recognition Based on Radial Basis Probabilistic Neural Networks Ensemble Classifier. ICIC (2) 2010: 677-681 - Dahua Gao, Danhua Liu, Youqian Feng, Qinli An, Fuping Yu:
A Robust Image Transmission Scheme for Wireless Channels Based on Compressive Sensing. ICIC (2) 2010: 334-341 - Xing-Xing Gao, Xian-Bin Wen, Li-Li Liu:
MP-Based Images Sparse Decomposition by Simulated Annealing. ICIC (2) 2010: 287-293 - Tao Gao, Xiaolin Wang, Zheng-guang Liu, Shihong Yue:
Target Extraction from the Military Infrared Image with Complex Texture Background. ICIC (2) 2010: 115-122 - Arash Ghanbari, Esmaeil Hadavandi, Salman Abbasian-Naghneh:
An Intelligent ACO-SA Approach for Short Term Electricity Load Prediction. ICIC (2) 2010: 623-633 - Linh Tran Ho, Jong-Myon Kim:
Direction Integrated Genetic Algorithm for Motion Estimation in H.264/AVC. ICIC (2) 2010: 279-286 - Chau-Pham Thi Hong, Hyung-Seo Kang, Insoo Koo:
An Efficient Radio Resource Management Scheme for Cognitive Radio Networks. ICIC (2) 2010: 376-383 - Qiuwei Hu, Shutao Li, Kexue He, Hui Lin:
A Robust Fusion Method for Vehicle Detection in Road Traffic Surveillance. ICIC (2) 2010: 180-187 - Lei Huang, Yanxiang He:
CorrRank: Update Summarization Based on Topic Correlation Analysis. ICIC (2) 2010: 641-648 - Yinghu Huang, Guoyin Wang, Yuanxiang Tang:
Bottleneck Attack Strategies on Complex Communication Networks. ICIC (2) 2010: 418-425 - Lin Jia, Sang-Ho Shin, Kee-Young Yoo:
A Reversible Data Hiding Scheme Using Even-Odd Embedding Method. ICIC (2) 2010: 213-220 - Junfeng Jiang, Xiao-Ping (Steven) Zhang:
A New Hierarchical Key Frame Tree-Based Video Representation Method Using Independent Component Analysis. ICIC (2) 2010: 132-139 - Samaneh Kazemifar, Reza Boostani:
Use of Time-Frequency Transforms and Kernel PCA to Classify Epileptic Patients from Control Subjects. ICIC (2) 2010: 465-472 - Jong Hyun Kim, Tae Ho Cho:
Efficient Key Dissemination Method Using Fuzzy Logic Based Dynamic En-route Filtering. ICIC (2) 2010: 511-518 - Sungbok Kim, Hyun Bin Kim:
High Resolution Mobile Robot Obstacle Detection Using Low Directivity Ultrasonic Sensor Ring. ICIC (2) 2010: 426-433 - Eunyoung Kim, Minkyung Kim, Younghwan Lim, Changwoo Seo:
A GMM-Based Robust Incremental Adaptation with a Forgetting Factor for Speaker Verification. ICIC (2) 2010: 188-195 - Jian-Long Kuo, Chun-Jae Chang:
A Composite P&O MPPT Control with Intelligent Orthogonal Particle Swarm Optimization for Steepest Gradient River Current Power Generation System. ICIC (2) 2010: 564-571 - Sun Ho Lee, Tae Ho Cho:
Fuzzy Based Key Re-distribution Period Determination Method in Wireless Sensor Networks. ICIC (2) 2010: 495-502
skipping 55 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-09 15:19 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint