Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 118 matches
- 2015
- Hanen Abbes, Kais Loukil, Hafedh Abid, Mohamed Abid, Ahmad Toumi:
Implementation of a Maximum Power Point Tracking fuzzy controller on FPGA circuit for a photovoltaic system. ISDA 2015: 386-391 - Imen Abdennadher, Nesrine Khabou, Ismael Bouassida Rodriguez, Mohamed Jmaiel:
Designing energy efficient Smart Buildings in ubiquitous environments. ISDA 2015: 122-127 - Mehdi Ben Abderrahmen, Bilel Gargouri, Mohamed Jmaiel:
Requirement-based lexical web service generation. ISDA 2015: 517-522 - Mahmoud Ahmadi, Ali Wali, Ahlem Walha, Adel M. Alimi:
A new Motion Estimation technique for Video Coding. ISDA 2015: 110-115 - Said Alabdallaoui, Abdelghafour Berraissoul, Noureddine Idboufker:
Performance evaluation of RED approach for traffic lights management. ISDA 2015: 358-362 - Ramzi Ben Ali, Ridha Ejbali, Mourad Zaied:
GPU-based segmentation of dental X-ray images using active contours without edges. ISDA 2015: 505-510 - Zehra Aysun Altikardes, Hasan Erdal, Ahmet Fevzi Baba, Ali Serdar Fak, Hayriye Korkmaz:
Performance evaluation of classification algorithms by excluding the most relevant attributes for dipper/non-dipper pattern estimation in Type-2 DM patients. ISDA 2015: 665-672 - Jihen Amara, Tarek M. Hamdani, Adel M. Alimi:
A new Hybrid Discrete Bat Algorithm for Traveling Salesman Problem using ordered crossover and 3-Opt operators for Bat's local search. ISDA 2015: 154-159 - Saber Amri, Hela Ltifi, Mounir Ben Ayed:
Towards an intelligent evaluation method of medical data visualizations. ISDA 2015: 673-678 - Nitesh Arora, Rajoo Pandey:
Noise adaptive FCM algorithm for segmentation of MRI brain images using local and non-local spatial information. ISDA 2015: 610-617 - Kassid Asmaa, Najib Elkamoun:
Towards a secure access control model for E-learning platform based on multi agent systems. ISDA 2015: 307-312 - Siwar Ben Ayed, Hanêne Trichili, Adel M. Alimi:
Data fusion architectures: A survey and comparison. ISDA 2015: 277-282 - Bouchaib Aylaj, Mostafa Belkasmi, Hamid Zouaki, Ahlam Berkani:
Degeneration simulated annealing algorithm for combinatorial optimization problems. ISDA 2015: 557-562 - Ali Azougaghe, Zaid Kartit, Mustapha Hedabou, Mostafa Belkasmi, Mohamed El Marraki:
An efficient algorithm for data security in Cloud storage. ISDA 2015: 421-427 - Jalal Eddine Bahbouhi, Najem Moussa:
Agent-based system simulation of electronic commerce: Effect of cut-link on prisoner's dilemma with Small World topology. ISDA 2015: 493-498 - Emna Baklouti, Mohamed Jallouli, Nader Ben Amor:
Fuzzy Logic mobile robot velocity Control for autonomous navigation. ISDA 2015: 69-73 - Breno Alves Beirigo, André Gustavo dos Santos:
A parallel heuristic for the travel planning problem. ISDA 2015: 283-288 - Burcu Bektas, Hayriye Korkmaz:
RFID and XBee based automated verification of put-away operation for Warehouse Management Systems. ISDA 2015: 635-641 - Said Benkirane, Mostafa Saadi, Moulay Lahcen Hasnaoui, Abderrahim Beni Hssane:
A new comparative study of ad hoc routing protocol AODV and DSR in VANET environment using simulation tools. ISDA 2015: 458-461 - Ahlam Berkani, Ahmed Azouaoui, Mostafa Belkasmi, Bouchaib Aylaj:
Compact Genetic Algorithms with larger tournament size for soft-decision decoding. ISDA 2015: 623-628 - Noura Bouhlel, Amel Ksibi, Anis Ben Ammar, Chokri Ben Amar:
Semantic-aware framework for Mobile Image Search. ISDA 2015: 479-484 - Mounir Boukadidi:
Make or buy decision making for telcos towards an "Intelligent Transaction Cost Economics (TCE) Support System". ISDA 2015: 7-13 - Kabil Boukhari, Mohamed Nazih Omri:
SAID: A new stemmer algorithm to indexing unstructured Document. ISDA 2015: 59-63 - Khaoula Boukhayma, Abdellah ElManouar:
Evaluating decision support systems. ISDA 2015: 404-408 - Youssef Boulid, Abdelghani Souhar, Mohamed El Youssfi El Kettani:
Arabic handwritten text line extraction using connected component analysis from a multi agent perspective. ISDA 2015: 80-87 - Oumaima Boussarsar, Imen Boukhris, Zied Elouedi:
Inference in junction trees using the belief function theory. ISDA 2015: 219-224 - Hajer Brahmi, Boudour Ammar, Farouk Chérif, Adel M. Alimi:
Exponential synchronization of high-order recurrent neural networks with mixed delays. ISDA 2015: 335-340 - Silvia Cateni, Valentina Colla:
Improving the stability of Sequential Forward variables selection. ISDA 2015: 374-379 - Faten Chaabane, Maha Charfeddine, Chokri Ben Amar:
Clustering impact on group-based traitor tracing schemes. ISDA 2015: 440-445 - Imen Chaabouni, Med Salim Bouhlel:
Toward an optimal medical image compression based on ISOM. ISDA 2015: 428-433
skipping 88 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-24 21:00 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint