Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 56 matches
- 2009
- Che Zainab Abdullah, Hashim Ahmad, Rugayah Hashim:
Attitudes Toward ICT of Electronic Distance Education (ePJJ) Students at the Institute of Education Development, University Technology Mara. UNISCON 2009: 222-228 - Henning Agt, Gregor Bauhoff, Mario Cartsburg, Daniel Kumpe, Ralf-Detlef Kutsche, Nikola Milanovic:
Metamodeling Foundation for Software and Data Integration. UNISCON 2009: 328-339 - Bahar Akbal-Delibas, Pruet Boonma, Junichi Suzuki:
Extensible and Precise Modeling for Wireless Sensor Networks. UNISCON 2009: 551-562 - Sabah S. Al-Fedaghi:
Conceptualizing Software Life Cycle. UNISCON 2009: 438-457 - Hazleen Aris:
Exploring the Potential of Component-Oriented Software Development Application. UNISCON 2009: 355-366 - Salah Awami, Paula M. C. Swatman, Jean-Pierre Calabretto:
Implementing Medication Management Software Effectively Within a Hospital Environment: Gaining Benefits from Metaphorical Design. UNISCON 2009: 346-354 - Xiaoyan Bai, David C. White, David Sundaram:
Visual Intelligence Density. UNISCON 2009: 280-291 - Simi (Kamini) Bajaj, Shyamala Balram:
Incorporating Software Testing as a Discipline in Curriculum of Computing Courses. UNISCON 2009: 404-410 - Belal Chowdhury, Clare D'Souza:
Challenges and Opportunities Relating to RFID Implementation in the Healthcare System. UNISCON 2009: 420-431 - Elena Ciancimino, Salvatore Cannella:
Modelling the Bullwhip Effect Dampening Practices in a Limited Capacity Production Network. UNISCON 2009: 475-486 - Vadim Ermolayev, Natalya Keberle, Eyck Jentzsch, Richard Sohnius, Wolf-Ekkehard Matzke:
Modeling Actions in Dynamic Engineering Design Processes. UNISCON 2009: 127-141 - Mathias Funk, Anne Rozinat, Ana Karla Alves de Medeiros, Piet van der Putten, Henk Corporaal, Wil M. P. van der Aalst:
Improving Product Usage Monitoring and Analysis with Semantic Concepts. UNISCON 2009: 190-201 - Jeewani Anupama Ginige, Athula Ginige:
An Algorithm for Propagating-Impact Analysis of Process Evolutions. UNISCON 2009: 153-164 - Sharon Griffith, Ioakim Marmaridis:
Preservation of Client Credentials Within Online Multi-user Virtual Environments Used as Learning Spaces. UNISCON 2009: 252-261 - Tetsuo Hasegawa, Yoshiaki Fukazawa:
Model Checking by Generating Observers from an Interface Specification Between Components. UNISCON 2009: 526-538 - Igor T. Hawryszkiewycz:
Modeling Complex Adaptive Systems. UNISCON 2009: 458-468 - Oles Hodych, Kostiantyn Hushchyn, Yuri Shcherbyna, Iouri Nikolski, Volodymyr Pasichnyk:
SOM-Based Dynamic Image Segmentation for Sign Language Training Simulator. UNISCON 2009: 29-40 - Hajar Mat Jani, Sai Peck Lee:
Using GA and KMP Algorithm to Implement an Approach to Learning Through Intelligent Framework Documentation. UNISCON 2009: 202-213 - Ruzelan Khalid, Wolfgang Kreutzer, Tim Bell:
Combining Simulation and Animation of Queueing Scenarios in a Flash-Based Discrete Event Simulator. UNISCON 2009: 240-251 - Khaled M. Khan, Calvin Tan:
SecCom: A Prototype for Integrating Security-Aware Components. UNISCON 2009: 393-403 - R. J. Kuo, Tung-Lai Hu, Zhen-Yao Chen:
Sales Forecasting Using an Evolutionary Algorithm Based Radial Basis Function Neural Network. UNISCON 2009: 65-74 - Dung Xuan Thi Le, Eric Pardede:
On Using Semantic Transformation Algorithms for XML Safe Update. UNISCON 2009: 367-378 - Maria R. Lee, Yi-Chen Lan:
A Comparative Analysis of Knowledge Management in SMEs. UNISCON 2009: 487-495 - Hui Ma, Klaus-Dieter Schewe, Bernhard Thalheim:
Modelling and Maintenance of Very Large Database Schemata Using Meta-structures. UNISCON 2009: 17-28 - Ioakim Marmaridis, Sharon Griffith:
Metaverse Services: Extensible Learning with Mediated Teleporting into 3D Environments. UNISCON 2009: 229-239 - Ioakim Marmaridis, Xufeng (Danny) Liang, Athula Ginige:
Facilitating Inter-organisational Collaboration via Flexible Sharing of Rapidly Developed Web Applications. UNISCON 2009: 53-64 - María Ángeles Moraga, Coral Calero:
Visuco: A Tool for Visualizing Software Components Usability. UNISCON 2009: 298-303 - Christine Müller:
Communities of Practice and Semantic Web Stimulating Collaboration by Document Markup. UNISCON 2009: 432-437 - Ekta Nankani, Simeon J. Simoff, Sara Denize, Louise Young:
Supporting Strategic Decision Making in an Enterprise University Through Detecting Patterns of Academic Collaboration. UNISCON 2009: 496-507 - Rao R. Nemani, Ramesh Konda:
A Framework for Data Quality in Data Warehousing. UNISCON 2009: 292-297
skipping 26 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-29 17:59 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint