Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 51 matches
- 2009
- Bechir Alaya, Claude Duvallet, Bruno Sadeg:
(m, k)-frame: A Method to Control the Quality of Service in Distributed Multimedia Systems. SEDE 2009: 238-243 - Danielle Azar, Haidar M. Harmanani, Rita Korkmaz:
A Hybrid Heuristic Approach To Optimize Rule-Based Software Quality Estimation Models. SEDE 2009: 91-98 - Ahmed A. Bahjat, Hamoud Aljamaan, Mohammad R. Alshayeb:
SQL-Guard Design Pattern. SEDE 2009: 144-148 - David T. Brown, Roger V. Hoang, Matthew R. Sgambati, Frederick C. Harris Jr.:
An Application for Tree Detection Using Satellite Imagery and Vegetation Data. SEDE 2009: 61-66 - Suvamoy Changder, Narayan C. Debnath:
New Techniques and Algorithms for Text Steganography through Hindi Text. SEDE 2009: 200-204 - Carleton Coffrin, Laurent D. Michel, Alexander A. Shvartsman, Elaine L. Sonderegger, Pascal Van Hentenryck:
Optimizing Network Deployment of Formally-Specified Distributed Systems. SEDE 2009: 230-237 - Brahma Dathan:
Checking for Liskov Substitution Principle Compliance in Java Programs. SEDE 2009: 211-216 - Narayan C. Debnath, Laura Felice, María Carmen Leonardi, María Virginia Mauco, German Montejano, Daniel Riesco:
A Strategy to Derive RSL Specification from Feature Models. SEDE 2009: 168-173 - Narayan C. Debnath, Afsaneh Rahbar, Mehran Mohsenzadeh:
Combination of a MANET Data Communication Protocol with a Service Discovery Protocol for Mobile Ad Hoc Networks in a Framework. SEDE 2009: 194-199 - Zekai Demirezen, Yu Sun, Jeff Gray, Frédéric Jouault:
Supporting Tool Reuse with Model Transformation. SEDE 2009: 119-125 - Mohammed E. El-Telbany, Samah Rafat, Sultan H. Aljahdali:
Natural-Inspired Data Clustering: A Hybridization between Ant Clustering and Particle Swarm Optimization. SEDE 2009: 19-25 - Moez Essaidi, Aomar Osmani:
Data Warehouse Development Using MDA and 2TUP. SEDE 2009: 138-143 - Ghassan Filimban, Sultan Aljahdali:
Adoption of Technology Acceptance Model (TAM) to Electronic Commerce: A Statistical Meta-Analysis Approach. SEDE 2009: 185-193 - Hacène Fouchal, Antoine Rollet, Abbas Tarhini:
Robustness Testing on Composed Timed Systems. SEDE 2009: 161-167 - Alejandro Garcés, Ricardo Quirós, Miguel Chover, Hebert Pérez-Rosés, Ianisse Quinzán, Pilar Espinosa:
Denotational Semantics for Social Communication among Agents. SEDE 2009: 42-46 - Pranshu Gupta, David A. Gustafson:
Test Suites Effectiveness from Sequence Diagrams and Function Call Trees. SEDE 2009: 132-137 - Mohamed Oussama Hassan, Laurent Deruelle, Henri Basson:
Towards a Change Propagation Process in Software Architecture. SEDE 2009: 85-90 - Daniel D. Hein, Hossein Saiedian:
Security Requirements Engineering: The Mobile Phones Context. SEDE 2009: 205-210 - Anthony Hock-koon, Mourad Oussalah:
Composite Service MetaModel. SEDE 2009: 126-131 - Ching-Tang Hsieh, Chih-Yu Chang, Min-Nan Hsiao:
A Lip Segmentation Using New Threshold Method Towards An Automatic Speech Recognition System. SEDE 2009: 271-274 - Ching-Tang Hsieh, Chang-Chu Chen, Min-Nan Hsiao:
Face Recognition Based Presentation Checking System. SEDE 2009: 285-288 - Ching-Tang Hsieh, Yu-Cheng Lee, Min-Nan Hsiao:
Facial Image Aging Synthesis Based on the Log-Gabor Wavelet. SEDE 2009: 281-284 - Ching-Tang Hsieh, Meng-Shian Shih, Min-Nan Hsiao:
PSO accelerated 3D face angle searching system for face recognition. SEDE 2009: 295- - Ching-Tang Hsieh, Yeh-Kuang Wu, Kuo-Ming Hung, Chih-Yu Chang:
A Machine Learning Approach for Watermarking in Dithered Halftone Images. SEDE 2009: 266-270 - Donna L. Hudson, Maurice E. Cohen:
The Electronic Medical Record: A Temporal Multimedia Database. SEDE 2009: 7-12 - Pooyan Jamshidi, Fereidoon Shams Aliee, Sedigheh Khoshnevis, R. Teimourzadegan, Ali Nikravesh:
Rearchitecting Meta-modeling Foundation: A Formal Approach. SEDE 2009: 99-104 - Norhaslinda Kamaruddin, Abdul Wahab:
Speech Emotion Profiiling for Inter and Intra-Cultural Assessment. SEDE 2009: 275-280 - Elhillali Kerkouche, Allaoua Chaoui, El-Bay Bourennane, Ouassila Labbani:
Modeling and Verification of Dynamic Behavior in UML Models: A Graph Transformation Approach. SEDE 2009: 111-118 - Hrishikesh Kulkarni, Sergiu M. Dascalu, Frederick C. Harris Jr.:
Software Development Aspects of a Mobile Food Ordering System. SEDE 2009: 67-72 - Tingda Lu, William Perrizo, Yan Wang, Gregory H. Wettstein, Amal Shehan Perera:
Experimental Study on Item-based P-Tree Collaborative Filtering Algorithm for Netflix. SEDE 2009: 149-154
skipping 21 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-28 22:10 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint