Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 8,102 matches
- 2024
- Ismail Taha Ahmed, Baraa Tareq Hammad, Norziana Jamil:
A Comparative Performance Analysis of Malware Detection Algorithms Based on Various Texture Features and Classifiers. IEEE Access 12: 11500-11519 (2024) - Swati Gupta, Bal Kishan, Preeti Gulia:
Comparative Analysis of Predictive Algorithms for Performance Measurement. IEEE Access 12: 33949-33958 (2024) - Basel Halak, Thomas Gibson, Millicent Henley, Cristin-Bianca Botea, Benjamin Heath, Sayedur Khan:
Evaluation of Performance, Energy, and Computation Costs of Quantum-Attack Resilient Encryption Algorithms for Embedded Devices. IEEE Access 12: 8791-8805 (2024) - Pradyumna Mallick, Renu Sharma, Priya Ranjan Satpathy, Thanikanti Sudhakar Babu, Nnamdi I. Nwulu:
A Harmony Search Switching Matrix Algorithm for Enhanced Performance of Solar PV Arrays During Non-Uniform Irradiance Scenarios. IEEE Access 12: 40387-40411 (2024) - Mehmet Yilmaz, Erkut Yalçin, Saif Kifah, Fatih Demir, Abdulkadir Sengür, Rozerin Demir, Raja Majid Mehmood:
Improving the Classification Performance of Asphalt Cracks After Earthquake With a New Feature Selection Algorithm. IEEE Access 12: 6604-6614 (2024) - Cedomir Stefanovic, Marko Beko, Dejan Vukobratovic:
On the performance of the free-access tree algorithm with MPR, SIC, and single-slot memory. Ad Hoc Networks 156: 103408 (2024) - Fu-Shiung Hsieh:
A Self-Adaptive Meta-Heuristic Algorithm Based on Success Rate and Differential Evolution for Improving the Performance of Ridesharing Systems with a Discount Guarantee. Algorithms 17(1): 9 (2024) - Shweta More, Moad Idrissi, Haitham H. Mahmoud, A. Taufiq Asyhari:
Enhanced Intrusion Detection Systems Performance with UNSW-NB15 Data Analysis. Algorithms 17(2): 64 (2024) - Xin Tian, Yuan Meng:
PDEC: A Framework for Improving Knowledge Graph Reasoning Performance through Predicate Decomposition. Algorithms 17(3): 129 (2024) - Mostafa Rahmanshahi, Jafar Jafari-Asl, Manoochehr Fathi-Moghadam, Sima Ohadi, Seyedali Mirjalili:
Metaheuristic learning algorithms for accurate prediction of hydraulic performance of porous embankment weirs. Appl. Soft Comput. 151: 111150 (2024) - Lixuan Zhang, Clinton Amos:
Dignity and use of algorithm in performance evaluation. Behav. Inf. Technol. 43(2): 401-418 (2024) - Aykut Durak, Vahide Bulut:
Classification and prediction-based machine learning algorithms to predict students' low and high programming performance. Comput. Appl. Eng. Educ. 32(1) (2024) - Hyung-Joo Moon, Chan-Byoung Chae, Kai-Kit Wong, Mohamed-Slim Alouini:
Pointing-and-Acquisition for Optical Wireless in 6G: From Algorithms to Performance Evaluation. IEEE Commun. Mag. 62(3): 32-38 (2024) - Massimiliano Kaucic, Filippo Piccotto, Gabriele Sbaiz:
A constrained swarm optimization algorithm for large-scale long-run investments using Sharpe ratio-based performance measures. Comput. Manag. Sci. 21(1): 6 (2024) - Fateme Fathi, Mina Baghani, Majid Bayat:
Light-PerIChain: Using lightweight scalable blockchain based on node performance and improved consensus algorithm in IoT systems. Comput. Commun. 213: 246-259 (2024) - Complexity:
Retracted: Using a Solution Construction Algorithm for Cyclic Shift Network Coding under Multicast Network to the Transformation of Musical Performance Styles. Complex. 2024: 9840327:1-9840327:1 (2024) - Hayati Tutar, Ali Günes, Metin Zontul, Zafer Aslan:
A Hybrid Approach to Improve the Video Anomaly Detection Performance of Pixel- and Frame-Based Techniques Using Machine Learning Algorithms. Comput. 12(2): 19 (2024) - Junlong Zheng, Chaiyan Jettanasen, Pathomthat Chiradeja:
Performance and Application Analysis of a New Optimization Algorithm. Comput. 12(1): 1 (2024) - Hiromu Yano, Tadashi Dohi, Hiroyuki Okamura:
Performance Comparison of Software Reliability Estimation Algorithms. Computer 57(4): 26-36 (2024) - Hossein Alipour, Mario Andrés Muñoz, Kate Smith-Miles:
On the impact of initialisation strategies on Maximum Flow algorithm performance. Comput. Oper. Res. 163: 106492 (2024) - Yi-Bo Huang, De-Huai Chen, Bo-Run Hua, Qiu-Yu Zhang:
A high-performance speech BioHashing retrieval algorithm based on audio segmentation. Comput. Speech Lang. 83: 101551 (2024) - Jianhong Ye, Yi Yu, Qiangming Cai, Tao Yu, Badong Chen:
P-Norm Based Subband Adaptive Filtering Algorithm: Performance Analysis and Improvements. Circuits Syst. Signal Process. 43(2): 1208-1239 (2024) - Vinícius Lima de Miranda, Ewerton Pacheco de Souza, Deborah Bambil, Ali Khalighifar, A. Townsend Peterson, Francisco Assis de Oliveira Nascimento, Rodrigo Gurgel-Gonçalves, Fernando Abad-Franch:
Cellphone picture-based, genus-level automated identification of Chagas disease vectors: Effects of picture orientation on the performance of five machine-learning algorithms. Ecol. Informatics 79: 102430 (2024) - Abdullahi Adan Omar, Kannan Pauliah Nadar, Chettiyar Vani Vivekanand, E. Anna Devi, A. Jasmine Xavier, T. M. Inbamalar, L. Magthelin Therase, J. Vanitha, C. Andrews Sonia, J. Binisha Rose:
Performance evaluation of pair selection algorithms in device-to-device communication using relay-assisted techniques. EURASIP J. Wirel. Commun. Netw. 2024(1): 15 (2024) - Seyyed Amirhossein Saadat, Mohammad Mehdi Fateh, Javad Keighobadi:
Grey wolf optimization algorithm-based robust neural learning control of passive torque simulators with predetermined performance. Turkish J. Electr. Eng. Comput. Sci. 32(1): 126-143 (2024) - Dan Wang, Linsen Yang, Lei Ni:
Performance and harmonic detection algorithm of phase locked Loop for parallel APF. Energy Inform. 7(1): 25 (2024) - Babak Nasseh Chaffi, Mohsen Rahmani:
A novel two-phase hybrid selection mechanism feeder to improve performance of many-objective optimization algorithms. Evol. Intell. 17(2): 889-920 (2024) - Qiang Wei, Ming-xing Liu, Zheng Liang, Yu-ting Zhao:
A performance simulation and verification method of packet scheduling algorithms for data stream based on QoS. Evol. Intell. 17(1): 73-78 (2024) - Lingling Hu:
Performance comparison of multiple scoring algorithms: A study of automatic scoring of English text. Intell. Decis. Technol. 18(1): 397-406 (2024) - Amrita Yadav:
Performance evaluation of routing in flying ad-hoc networks using nature-inspired algorithms. Intell. Decis. Technol. 18(1): 9-22 (2024)
skipping 8,072 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-24 06:41 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint