Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 56 matches
- 2016
- Lu Cao, Yikui Zhai:
An over-sampling method based on probability density estimation for imbalanced datasets classification. ICIIP 2016: 44 - Xiangzhi Cheng, Dongzhi He, Mingdong Fang:
A hybrid collaborative filtering recommendation algorithm. ICIIP 2016: 5 - Jiaqi Cui, Jun Xu, Chengcheng Guo, Yongqing Ling:
CSMA/CA through put analysis in hybrid CSMA/CA and TDMA networks. ICIIP 2016: 40 - Xianglong Cui, Bing Xu, Xin Wang, Fei Sun, Xinyuan Shi, Yanjiang Qiao:
Using quality by design and quality risk management principles to aid the development of a high shear wet granulation process. ICIIP 2016: 8 - Ning Dong, Mingxin Liu, Zhen Chen:
Simulation research on PID_MRAC control of 6-DOF platform servo system. ICIIP 2016: 26 - Naiqiang Fan, Yingmin Wang, Yarong lv:
Research on phase compensating factor of chirp scaling algorithm in multiple-receiver synthetic aperture sonar. ICIIP 2016: 20 - Qian Feng, Han Cao, Haiyan Meng:
Intelligent model system for tourism flow prediction: a study of Xi'an Museum. ICIIP 2016: 3 - Yan Gao, Chunhui Yang:
Software defect prediction based on manifold learning in subspace selection. ICIIP 2016: 17 - Yan Gao, Chunhui Yang, Lixin Liang:
Pseudo-samples generation in Gaussian mixture distribution for software defect prediction. ICIIP 2016: 16 - Yunsheng Ge, Jie Kong, Kun Tang, Chuanxian Jiang:
The adaption of the Cuckoo search algorithm applied in the LEACH-C protocol. ICIIP 2016: 7 - Libo He, Shaowen Yao, Wei Zhou:
An extended fine-grained conflict detection method for shared-state scheduling in large scale cluster. ICIIP 2016: 29 - Jijun He, Jinjin Zheng, Jijun He, Yutang Guo, Yuan Shen:
A robust image segmentation method using hierarchical color clustering. ICIIP 2016: 1 - Xun Huang, Jinlin Zhan, Yuan Zhang:
Technology research of ultra-tightly integration about INS aided tracking loop based on EKF. ICIIP 2016: 32 - De-Thu Huynh, Tran Quang Nhat, Dong Doan Van:
Energy optimization in wireless body area network based on ZigBee. ICIIP 2016: 2 - Shenjia Ji, Hongyan Yu, Yinan Guo, Zongrun Zhang:
Research on sales forecasting based on ARIMA and BP neural network combined model. ICIIP 2016: 41 - Jun-jie Jia, Guo-lei Yan, Li-cheng Xing:
Personalized sensitive attribute anonymity based on P - sensitive k anonymity. ICIIP 2016: 54 - Yujiao Li, Qingping Huang, Song Liu, Peng Liu:
Load pattern analysis of key accounts based on two-step clustering. ICIIP 2016: 55 - Zheng-xin Li, Ke-wu Li, Hu-sheng Wu:
Similarity measure for multivariate time series based on dynamic time warping. ICIIP 2016: 15 - Guangli Li, Guancheng Wang, Qiang Wang, Fan Fei, Shuai Lü, Degui Guo:
ANN: a heuristic search algorithm based on artificial neural networks. ICIIP 2016: 51 - Zheng Li, Yuli Xia, Ruiqi Ye, Junsuo Zhao:
Compressive sensing for space image compressing. ICIIP 2016: 23 - Aihua Li, Zhangyan Zhao, Mengke Wen:
Multiple attribute decision making with completely unknown weights based on cumulative prospect theory and grey system theory. ICIIP 2016: 6 - Ryan Wen Liu, Weihuang Wu, Maohan Liang, Tian Xu, Jingxian Liu:
Robust two-step image restoration with adaptive regularization parameter. ICIIP 2016: 47 - R. Netshikweta, Yskandar Hamam, Shengzhi Du:
Comparative study of load balancing routing algorithms in hybrid networks. ICIIP 2016: 27 - Tobie Erhard Olivier, Shengzhi Du, Barend Jacobus van Wyk, Yskandar Hamam:
Independent components for EEG signal classification. ICIIP 2016: 33 - Manop Phankokkruad, Phichaya Jaturawat:
Effect of variation factors on the processing time of the face recognition algorithms in video sequence. ICIIP 2016: 50 - Yuan Shen, Dongcai Liu:
Research on improved information fusion of accelerometers based on MEMD technology. ICIIP 2016: 37 - Hongchun Sun:
Analysis of planar mobile distribution and interference evaluation in wireless ad-hoc networks. ICIIP 2016: 22 - Ting Sun, Zhenyu An, Yi Li, Xingchuan Liu:
Feature data factorization and its application. ICIIP 2016: 45 - Zhi-Qiang Sun, Liang Chen, Qiaoling Chen:
A VEIS computer virus propagation model based on partly immunization. ICIIP 2016: 34 - Yan Tong, Jian Zhang, Tao Qin:
Security problems analysis and solving policy design for mobile agents running platform. ICIIP 2016: 24
skipping 26 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-25 08:32 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint