Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 103 matches
- 2019
- Lixingjian An, Changwei Ren, Zhaoquan Gu, Yuexuan Wang, Yunjun Gao:
Rebalancing the Car-Sharing System: A Reinforcement Learning Method. DSC 2019: 62-69 - Yue Cai, Xu Wu, Xiaqing Xie, Jin Xu:
A Topic Mining Method for Multi-source Network Public Opinion Based on Improved Hierarchical Clustering. DSC 2019: 439-444 - Chen Chang, Jianjun Cao, Guojun Lv, Nianfeng Weng:
An Unsupervised Approach of Truth Discovery from Multi-sourced Text Data. DSC 2019: 257-263 - Qiang Chen, Yunyuan Gao, Yun Peng, Jianhai Zhang, Ke Sun:
Accurate Object Recognition for Unmanned Aerial Vehicle Electric Power Inspection using an Improved YOLOv2 Algorithm. DSC 2019: 610-617 - Shuang Chen, Weidong Qiu, Peng Tang, Guorui Duan, Min Yan, Zheng Huang:
Research on Abnormal Behavior of Electronic Invoice Based on Artificial Neural Network. DSC 2019: 306-311 - Yang Chen, Guangjie Zhang, Dongliang Hu, Qingguang Tao:
Multiscale Emulation Technology Based on the Integration of Virtualization, Physical and Simulation Networks. DSC 2019: 396-402 - Meixiang Dai, Guojun Dai, Yifan Wu, Yixing Xia, Fangyao Shen, Hua Zhang:
An Improved Feature Fusion for Speaker Recognition. DSC 2019: 183-187 - Yepeng Deng, Chunkai Zhang, Xuan Wang:
A Multi-objective Examples Generation Approach to Fool the Deep Neural Networks in the Black-Box Scenario. DSC 2019: 92-99 - Jiayu Ding, Xiaohuan Cao, Linmei Hu, Chuan Shi:
Meta-Path based Text Feature Enrichment Using Knowledge Graph. DSC 2019: 649-655 - Jian Dong, Bin Chen, Chuan Ai, Fang Zhang:
A Spatio-Temporal Flow Model of Dockless Shared Bikes. DSC 2019: 312-317 - Jing Du, Fujiang Ao, Yaxin Zhao, Yinglong Liu:
A Detection Method Based on K-Cores Algorithm for Abnormal Processes in the Server. DSC 2019: 544-548 - Yanan Du, Yueming Lu:
A Weakness Relevance Evaluation Method Based on PageRank. DSC 2019: 422-427 - Jiajie Du, Li Pan, Huijuan Li, Lihong Yao:
Understanding Acdamic Impact Development by Predicting the G-index In Collaboration Networks. DSC 2019: 662-667 - Junbin Fang, Aiping Li, Qianyue Jiang, Shudong Li, Weihong Han:
A Structure-Based De-Anonymization Attack on Graph Data Using Weighted Neighbor Match. DSC 2019: 480-486 - Ziyi Gong, Geping Wang, Qiong Wu:
Grey Island: Immersive tangible interaction through augmented reality. DSC 2019: 656-661 - Zhihui Guo, Jin Peng, Jun Fu, Yexia Cheng, Cancan Chen:
Botnet Detection Method Based on Artificial Intelligence. DSC 2019: 487-494 - Xiaoding Guo, Hongli Zhang, Lin Ye, Shang Li:
RnnTd: An Approach Based on LSTM and Tensor Decomposition for Classification of Crimes in Legal Cases. DSC 2019: 16-22 - Miaomiao Hong, Bin Wu, Bai Wang, Pengpeng Zhou:
STNS-CSG: Syntax Tree Networks with Self-Attention for Complex SQL Generation. DSC 2019: 388-395 - Weixiong Hu, Zhaoquan Gu, Yushun Xie, Le Wang, Keke Tang:
Chinese Text Classification Based on Neural Networks and Word2vec. DSC 2019: 284-291 - Leijun Huang, Hailin Feng, Ying Le:
Finding Water Quality Trend Patterns Using Time Series Clustering: A Case Study. DSC 2019: 330-337 - Xixi Huang, Jian Guan, Bin Zhang, Shuhan Qi, Xuan Wang, Qing Liao:
Differentially Private Convolutional Neural Networks with Adaptive Gradient Descent. DSC 2019: 642-648 - Jiamin Huang, Yueming Lu, Kun Guo:
A Hybrid Packet Classification Algorithm Based on Hash Table and Geometric Space Partition. DSC 2019: 587-592 - Xiaoyi Huang, Jun Zheng, Kejun Zhang, Dong Liu, Jie Chen, Lei Bi:
A Standardized Aerosol Repository System for Knowledge Services and Crowdsourcing. DSC 2019: 235-241 - Yaoxuan Ji, Li Pan, Peng Wu:
Influence Maximization on Large-Scale Networks with a Group-Based Method via Network Embedding. DSC 2019: 176-182 - Chan Jiang Jiang, Shaoyong Li, Guangcheng Huo, Lei Luo:
Research on the Relationship between APP Size and Installation Time in Intelligent Mobile Devices. DSC 2019: 270-277 - Lai Kang, Jie Jiang, Yingmei Wei, Yuxiang Xie:
Efficient Randomized Hierarchy Construction for Interactive Visualization of Large Scale Point Clouds. DSC 2019: 593-597 - Jin Li, Minhuan Huang, Shuaibing Lu, Hu Li, Jin-Fu Chen:
Research on Evaluation Index System for Software Vulnerability Analysis Methods. DSC 2019: 522-527 - Jingjing Li, Yang Liu, Hongri Liu, Bailing Wang, Wei Wang, Lianhai Wang:
Analysis of the Influence of Individual Web Behavior Pattern on Group Behavior Simulation. DSC 2019: 428-431 - Daihui Li, Shangyou Zeng, Zhou Yue, Bing Pan, Yang Lei:
Design of High Performance Convolutional Neural Network for Lightweight Platform. DSC 2019: 1-8 - Xujian Li, Kai Xu:
Research on Data Caching Method of Gradient Consistent Hash. DSC 2019: 9-15
skipping 73 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-03-28 22:23 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint