Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 91 matches
- 2018
- Aakash Ahmad, Claus Pahl, Ahmed B. Altamimi, Abdulrahman Alreshidi:
Mining Patterns from Change Logs to Support Reuse-Driven Evolution of Software Architectures. J. Comput. Sci. Technol. 33(6): 1278-1306 (2018) - Jesús Alonso, Robert Joan-Arinyo:
Back-to-Front Ordering of Triangles in Digital Terrain Models over Regular Grids. J. Comput. Sci. Technol. 33(6): 1192-1203 (2018) - Hanen Ameur, Salma Jamoussi, Abdelmajid Ben Hamadou:
A New Method for Sentiment Analysis Using Contextual Auto-Encoders. J. Comput. Sci. Technol. 33(6): 1307-1319 (2018) - Mehdi Azaouzi, Lotfi Ben Romdhane:
An Efficient Two-Phase Model for Computing Influential Nodes in Social Networks Using Social Actions. J. Comput. Sci. Technol. 33(2): 286-304 (2018) - Nour El Houda Bahloul, Saadi Boudjit, Marwen Abdennebi, Djallel Eddine Boubiche:
A Flocking-Based on Demand Routing Protocol for Unmanned Aerial Vehicles. J. Comput. Sci. Technol. 33(2): 263-276 (2018) - Guochen Cai, Kyungmi Lee, Ickjai Lee:
Mining Semantic Trajectory Patterns from Geo-Tagged Data. J. Comput. Sci. Technol. 33(4): 849-862 (2018) - Yueyue Chen, Pin Lv, Deke Guo, Tongqing Zhou, Ming Xu:
A Survey on Task and Participant Matching in Mobile Crowd Sensing. J. Comput. Sci. Technol. 33(4): 768-791 (2018) - Wen-Guang Chen, Xueming Si:
Preface. J. Comput. Sci. Technol. 33(3): 531-532 (2018) - Pengpeng Chen, Hailong Sun, Yili Fang, Jinpeng Huai:
Collusion-Proof Result Inference in Crowdsourcing. J. Comput. Sci. Technol. 33(2): 351-365 (2018) - Xiaodong Dong, Sheng Chen, Laiping Zhao, Xiaobo Zhou, Heng Qi, Keqiu Li:
More Requests, Less Cost: Uncertain Inter-Datacenter Traffic Transmission with Multi-Tier Pricing. J. Comput. Sci. Technol. 33(6): 1152-1163 (2018) - Guoguang Du, Congli Yin, Mingquan Zhou, Zhongke Wu, Yachun Fan, Fuqing Duan, Pengbo Zhou:
Isometric 3D Shape Partial Matching Using GD-DNA. J. Comput. Sci. Technol. 33(6): 1178-1191 (2018) - Chen Feng, Chundian Li, Rui Li:
Indexing Techniques of Distributed Ordered Tables: A Survey and Analysis. J. Comput. Sci. Technol. 33(1): 169-189 (2018) - José Alberto Fernández-Zepeda, Daniel Brubeck-Salcedo, Daniel Fajardo-Delgado, Héctor Zatarain-Aceves:
A Two-Player Coalition Cooperative Scheme for the Bodyguard Allocation Problem. J. Comput. Sci. Technol. 33(4): 823-837 (2018) - João Fabrício Filho, Luis Gustavo Araujo Rodriguez, Anderson Faustino da Silva:
Yet Another Intelligent Code-Generating System: A Flexible and Low-Cost Solution. J. Comput. Sci. Technol. 33(5): 940-965 (2018) - Shouwan Gao, Pengpeng Chen, Xu Yang, Qiang Niu:
Multi-Sensor Estimation for Unreliable Wireless Networks with Contention-Based Protocols. J. Comput. Sci. Technol. 33(5): 1072-1085 (2018) - Zhimin Gao, Lei Xu, Lin Chen, Xi Zhao, Yang Lu, Weidong Shi:
CoC: A Unified Distributed Ledger Based Supply Chain Management System. J. Comput. Sci. Technol. 33(2): 237-248 (2018) - Saisai Gong, Wei Hu, Weiyi Ge, Yuzhong Qu:
Modeling Topic-Based Human Expertise for Crowd Entity Resolution. J. Comput. Sci. Technol. 33(6): 1204-1218 (2018) - Lei Guo, Yufei Wen, Xinhua Wang:
Exploiting Pre-Trained Network Embeddings for Recommendations in Social Networks. J. Comput. Sci. Technol. 33(4): 682-696 (2018) - Seilendria A. Hadiwardoyo, Subhadeep Patra, Carlos T. Calafate, Juan-Carlos Cano, Pietro Manzoni:
An Intelligent Transportation System Application for Smartphones Based on Vehicle Position Advertising and Route Sharing in Vehicular Ad-Hoc Networks. J. Comput. Sci. Technol. 33(2): 249-262 (2018) - Tieke He, Hao Lian, Zemin Qin, Zhenyu Chen, Bin Luo:
PTM: A Topic Model for the Inferring of the Penalty. J. Comput. Sci. Technol. 33(4): 756-767 (2018) - Shi-Min Hu, Cewu Lu, Ariel Shamir:
Preface. J. Comput. Sci. Technol. 33(3): 429-430 (2018) - Mohamed Maher Ben Ismail, Ouiem Bchir:
Erratum to: Automatic Fall Detection Using Membership Based Histogram Descriptors. J. Comput. Sci. Technol. 33(1): 237 (2018) - Shan Jiang, Ning Xu, Xueyan Wang, Qiang Zhou:
An Efficient Technique to Reverse Engineer Minterm Protection Based Camouflaged Circuit. J. Comput. Sci. Technol. 33(5): 998-1006 (2018) - Sunghun Jo, Yuna Jeong, Sungkil Lee:
GPU-Driven Scalable Parser for OBJ Models. J. Comput. Sci. Technol. 33(2): 417-428 (2018) - Fei-Fei Kou, Junping Du, Cong-Xian Yang, Yan-Song Shi, Wan-Qiu Cui, MeiYu Liang, Yue Geng:
Hashtag Recommendation Based on Multi-Features of Microblogs. J. Comput. Sci. Technol. 33(4): 711-726 (2018) - Qiqi Lai, Bo Yang, Yong Yu, Zhe Xia, Yanwei Zhou, Yuan Chen:
Updatable Identity-Based Hash Proof System Based on Lattices and Its Application to Leakage-Resilient Public-Key Encryption Schemes. J. Comput. Sci. Technol. 33(6): 1243-1260 (2018) - Yang Li, Zhiping Cai, Hong Xu:
LLMP: Exploiting LLDP for Latency Measurement in Software-Defined Data Center Networks. J. Comput. Sci. Technol. 33(2): 277-285 (2018) - Huai-Yu Li, Wei-Ming Dong, Bao-Gang Hu:
Facial Image Attributes Transformation via Conditional Recycle Generative Adversarial Networks. J. Comput. Sci. Technol. 33(3): 511-521 (2018) - Kang Li, Fazhi He, Haiping Yu:
Robust Visual Tracking Based on Convolutional Features with Illumination and Occlusion Handing. J. Comput. Sci. Technol. 33(1): 223-236 (2018) - Yang Li, Wen-Zhuo Song, Bo Yang:
Stochastic Variational Inference-Based Parallel and Online Supervised Topic Model for Large-Scale Text Processing. J. Comput. Sci. Technol. 33(5): 1007-1022 (2018)
skipping 61 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-24 18:04 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint