Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
Likely matches
- International Conference on Information and Knowledge Management (CIKM)
- International Conference on Database and Expert Systems Applications (DEXA)
also: International Workshop on Theory and Applications of Knowledge Management (TAKMA @ DEXA) - International Conference on Theory and Practice of Public Key Cryptography (PKC)
- Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security
also: Data Mining and Knowledge Discovery: Theory, Tools, and Technology - Japan Conference on Discrete and Computational Geometry, Graphs, and Games (JCDCG3)
also: Kyoto Conference on Computational Geometry and Graph Theory (KyotoCGGT)
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 24,020 matches
- 2024
- Khee Meng Koh, Fengming Dong, Eng Guan Tay:
Introduction to Graph Theory - With Solutions to Selected Problems. WorldScientific 2024, ISBN 9789811284816, pp. 1-308 - Tanmoy Hazra, Kushal Anjaria, Aditi Bajpai, Akshara Kumari:
Applications of Game Theory in Deep Learning. Springer Briefs in Computer Science, Springer 2024, ISBN 978-3-031-54652-5, pp. 1-84 - Joakim Kävrestad, Marcus Birath, Nathan L. Clarke:
Fundamentals of Digital Forensics - A Guide to Theory, Research and Applications, Third Edition. Texts in Computer Science, Springer 2024, ISBN 978-3-031-53648-9, pp. 3-267 - Anjan Bandyopadhyay, Vagisha Mishra, Sujata Swain, Kalyan Chatterjee, Sweta Dey, Saurav Mallik, Amal Al-Rasheed, Mohamed Abbas, Ben Othman Soufiene:
EdgeMatch: A Smart Approach for Scheduling IoT-Edge Tasks With Multiple Criteria Using Game Theory. IEEE Access 12: 7609-7623 (2024) - Kevin Igwe, Kevin Durrheim:
Analyzing Social Exchange Motives With Theory-Driven Data and Machine Learning. IEEE Access 12: 2135-2149 (2024) - Garima Jain, Arun Kumar, Shahid Ahmad Bhat:
Recent Developments of Game Theory and Reinforcement Learning Approaches: A Systematic Review. IEEE Access 12: 9999-10011 (2024) - Elnaz Zafarani-Moattar, Mohammad Reza Kangavari, Amir Masoud Rahmani:
Neural Network Meaningful Learning Theory and its Application for Deep Text Clustering. IEEE Access 12: 42411-42422 (2024) - Rojanee Khummongkol, Masao Yokota:
Towards robotic deep spatiotemporal language understanding based on mental-image-directed semantic theory. Artif. Life Robotics 29(1): 70-80 (2024) - J. K. Singh, Shaily, Harshna Balhara, Kazuharu Bamba, J. Jena:
Cosmic analysis of a model in higher-order gravity theory. Astron. Comput. 46: 100790 (2024) - Abdul Basir, Muhammad Adil Khan, Hidayat Ullah, Yahya Almalki, Saowaluck Chasreechai, Thanin Sitthiwirattham:
Derivation of Bounds for Majorization Differences by a Novel Method and Its Applications in Information Theory. Axioms 12(9): 885 (2024) - Ahsan Ali, Hongwei Wang, Mingchuan Gong, Khalid Mehmood:
Conservation of resources theory perspective of social media ostracism influence on lurking intentions. Behav. Inf. Technol. 43(1): 212-229 (2024) - Monzure-Khoda Kazi, M. M. Faruque Hasan:
Optimal and secure peer-to-peer carbon emission trading: A game theory informed framework on blockchain. Comput. Chem. Eng. 180: 108478 (2024) - Ming Li, Kang Xu, Sheng Huang:
Evaluation of green and sustainable building project based on extension matter-element theory in smart city application. Comput. Intell. 40(1) (2024) - K. Ashwini:
User Name-Based Compression and Encryption of Images Using Chaotic Compressive Sensing Theory. Comput. J. 67(1): 304-322 (2024) - Mohammad Hossein Ghasemian Koochaksaraei, Abolfazl Toroghi Haghighat, Mohammad Hossein Rezvani:
An efficient cloud resource exchange model based on the double auction and evolutionary game theory. Clust. Comput. 27(2): 2291-2307 (2024) - Bhagwan Singh, Komal Jangid, Santwana Mukhopadhyay:
Implementation of Legendre wavelet method for the size dependent bending analysis of nano beam resonator under nonlocal strain gradient theory. Comput. Math. Appl. 153: 94-107 (2024) - Bianica Pires, Joshua Goldstein, Emily Molfino, Kathryn Ziemer, Mark G. Orr, José Jiménez:
Knowledge sharing in a dynamic, multi-level organization: an agent-based modeling approach. Comput. Math. Organ. Theory 30(1): 75-100 (2024) - François Mauger, Cristel Chandre, Mette B. Gaarde, Kenneth Lopata, Kenneth J. Schafer:
Hamiltonian formulation and symplectic split-operator schemes for time-dependent density-functional-theory equations of electron dynamics in molecules. Commun. Nonlinear Sci. Numer. Simul. 129: 107685 (2024) - Gholam Hossein Abdi, Amir Hossein Refahi Sheikhani, Sohrab Kordrostami, Armin Ghane, Shahram Babaie:
A novel selfish node detection based on reputation and game theory in Internet of Things. Computing 106(1): 81-107 (2024) - Hesham ElSawy, Ainur Zhaikhan, Mustafa A. Kishk, Mohamed-Slim Alouini:
A Tutorial-Cum-Survey on Percolation Theory With Applications in Large-Scale Wireless Networks. IEEE Commun. Surv. Tutorials 26(1): 428-460 (2024) - Athanasios Dedes, Janusz Rosiek, M. Ryczkowski, Kristaq Suxho, Lampros Trifyllis:
SmeftFR v3 - Feynman rules generator for the Standard Model Effective Field Theory. Comput. Phys. Commun. 294: 108943 (2024) - Deyan I. Mihaylov, S. X. Hu, Valentin V. Karasiev:
Dragon: A multi-GPU orbital-free density functional theory molecular dynamics simulation package for modeling of warm dense matter. Comput. Phys. Commun. 294: 108931 (2024) - Kuanchin Chen, Chih-Fong Tsai, Ya-Han Hu, Chen-Wei Hu:
The effect of review visibility and diagnosticity on review helpfulness - An accessibility-diagnosticity theory perspective. Decis. Support Syst. 178: 114145 (2024) - Ünal Çakiroglu, Adem Özkan, Isak Çevik, Damla Kutlu, Sefa Kahyar:
What motivate learners to continue a professional development program through Massive Open Online Courses (MOOCs)?: A lens of self-determination theory. Educ. Inf. Technol. 29(6): 7027-7051 (2024) - Sa'ar Karp Gershon, Ella Anghel, Giora Alexandron:
An evaluation of assessment stability in a massive open online course using item response theory. Educ. Inf. Technol. 29(3): 2625-2643 (2024) - Kai Guo, Yuanke Li, Yongyan Li, Samuel Kai Wah Chu:
Understanding EFL students' chatbot-assisted argumentative writing: An activity theory perspective. Educ. Inf. Technol. 29(1): 1-20 (2024) - Deepti Prit Kaur, Archana Mantri:
Augmented reality based interactive table-top environment for real-time visualization of control theory concepts: An empirical study. Educ. Inf. Technol. 29(5): 5309-5330 (2024) - Baiyi Wang, Zipeng Zhang, Patrick Siarry, Xinhua Liu, Grzegorz Królczyk, Dezheng Hua, Frantisek Brumercik, Zhixiong Li:
A nonlinear African vulture optimization algorithm combining Henon chaotic mapping theory and reverse learning competition strategy. Expert Syst. Appl. 236: 121413 (2024) - Adedamola Adesokan, Rowan Kinney, Eirini-Eleni Tsiropoulou:
CROWDMATCH: Optimizing Crowdsourcing Matching through the Integration of Matching Theory and Coalition Games. Future Internet 16(2): 58 (2024) - Tooraj Karimi, Mohammad Ahmadian:
Grey clustering and grey ranking of bank branches based on grey efficiency. Grey Syst. Theory Appl. 14(1): 1-20 (2024)
skipping 23,990 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-25 11:39 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint