Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 17 matches
- 2023
- Aidmar Wainakh, Ephraim Zimmer, Sandeep Subedi, Jens Keim, Tim Grube, Shankar Karuppayah, Alejandro Sánchez Guinea, Max Mühlhäuser:
Federated Learning Attacks Revisited: A Critical Discussion of Gaps, Assumptions, and Evaluation Setups. Sensors 23(1): 31 (2023) - 2022
- Carolynne Lord, Oliver Bates, Adrian Friday:
Critical Incident Technique and Gig-Economy Work (Deliveroo): Working with and Challenging Assumptions around Algorithms. CHI Extended Abstracts 2022: 258:1-258:6 - 2021
- Job Timmermans, Vincent Blok:
A critical hermeneutic reflection on the paradigm-level assumptions underlying responsible innovation. Synth. 198(19-S): 4635-4666 (2021) - (Withdrawn) Federated Learning Attacks Revisited: A Critical Discussion of Gaps, Assumptions, and Evaluation Setups. CoRR abs/2111.03363 (2021)
- 2020
- Alireza Sotoudeh-Anvari:
A critical review on theoretical drawbacks and mathematical incorrect assumptions in fuzzy OR methods: Review from 2010 to 2020. Appl. Soft Comput. 93: 106354 (2020) - Joseph P. Kristbaum, Frank W. Ciarallo:
Strategic Decision Facilitation: Supporting Critical Assumptions of the Human in Empirical Modeling of Pairwise Value Comparisons. Syst. 8(3): 30 (2020) - 2017
- Mona Rahimi, Wandi Xiong, Jane Cleland-Huang, Robyn R. Lutz:
Diagnosing assumption problems in safety-critical products. ASE 2017: 473-484 - 2014
- Cristian Antonelli, Antonio Mecozzi, Mark Shtaif, Peter J. Winzer:
Criticality of assumptions in the study of performance degradation caused by mode-dependent loss in SDM systems. ECOC 2014: 1-3 - 2013
- Johanes Eka Priyatma:
A Critical Review of the Ontological Assumptions of Actor-Network Theory for Representing e-Government Initiatives. InnovaInt. J. Actor Netw. Theory Technol. Innov. 5(3): 12-24 (2013) - 2010
- Andrew D. Fernandes, Gregory B. Gloor:
Mutual information is critically dependent on prior assumptions: would the correct estimate of mutual information please identify itself? Bioinform. 26(9): 1135-1139 (2010) - Andrew D. Fernandes, Gregory B. Gloor:
Mutual information is critically dependent on prior assumptions: would the correct estimate of mutual information please identify itself? Bioinform. 26(19): 2500 (2010) - 2009
- Jose A. García, Rosa Rodríguez-Sánchez, Joaquín Fernández-Valdivia:
A critical examination of the assumptions used in dynamic allocation. J. Vis. Commun. Image Represent. 20(5): 351-363 (2009) - Vilhelm Verendel:
Quantified security is a weak hypothesis: a critical survey of results and assumptions. NSPW 2009: 37-50 - 2008
- Sophie Ahrens, Thomas Hess, Tanja Pfister, Behrend Freese:
Critical Assumptions in Superdistribution Based Business Models - Empirical Evidence from the User Perspective. HICSS 2008: 302 - 2007
- Maria Karyda, Stefanos Gritzalis, Jong Hyuk Park:
A Critical Approach to Privacy Research in Ubiquitous Environments - Issues and Underlying Assumptions. EUC Workshops 2007: 12-21 - 2000
- Giorgio Marchetti:
Observation levels and units of time: A critical analysis of the main assumption of the theory of the artificial. AI Soc. 14(3-4): 331-347 (2000) - 1998
- Georg Rock, Werner Stephan, Andreas Wolpers:
Assumption-Commitment Specifications and Safety-Critical Systems. FBT 1998: 125-135
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-26 14:43 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint