Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
Likely matches
- International Conference on Information and Knowledge Management (CIKM)
- ACM SIGSOFT Conference on the Foundations of Software Engineering (FSE)
- International Conference on Database and Expert Systems Applications (DEXA)
also: International Workshop on E-Learning Systems: Research and Tools, from Theory to Practice (ELSys @ DEXA) - International Conference on Theory and Practice of Digital Libraries (TPDL)
- Electronic Journal of Graph Theory and Applications
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 1,298 matches
- 2024
- Joakim Kävrestad, Marcus Birath, Nathan L. Clarke:
Fundamentals of Digital Forensics - A Guide to Theory, Research and Applications, Third Edition. Texts in Computer Science, Springer 2024, ISBN 978-3-031-53648-9, pp. 3-267 - Yang Li, Silu Bao, Yi Yang:
Research on College Students' Behavior in Calligraphy Courses Within a Virtual Learning Environment Based on SVVR: A Convergent Model Approach of Coolness Theory, VAM and TAM. IEEE Access 12: 28538-28553 (2024) - Juntao Zhang, Xueying Zhang, Jincan Zhang:
Research on the on-Exchange Implementation of Data Trading Based on Evolutionary Game Theory. IEEE Access 12: 20894-20906 (2024) - Xuebin Qin, Dan Yang, Siyu Pan, Qinhe Yuan:
Research on emotion recognition of bimodal bioelectrical features based on D-S evidence theory. Biomed. Signal Process. Control. 87(Part A): 105538 (2024) - Complexity:
Retracted: Collaborative Intelligent Environment Perception and Mission Control of Scientific Researchers in Semantic Knowledge Framework Based on Complex Theory. Complex. 2024: 9891353:1-9891353:1 (2024) - Elkhan Richard Sadik-Zada, Andrea Gatto, Luigi Aldieri, Giovanna Bimonte, Luigi Senatore, Concetto Paolo Vinci:
Game Theory Applications to Socio-Environmental Studies, Development Economics, and Sustainability Research. Games 15(1): 5 (2024) - Adam Booker, Victoria Chiu, Nathan Groff, Vernon J. Richardson:
AIS research opportunities utilizing Machine Learning: From a Meta-Theory of accounting literature. Int. J. Account. Inf. Syst. 52: 100661 (2024) - Giovana Sordi Schiavi, Ariel Behr, Carla Bonato Marcolin:
Institutional theory in accounting information systems research: Shedding light on digital transformation and institutional change. Int. J. Account. Inf. Syst. 52: 100662 (2024) - Erik Stolterman, Jordan Beck:
The Disciplinary Identity of HCI Research: An Investigation Using Configurational Theory. Int. J. Hum. Comput. Interact. 40(3): 859-869 (2024) - Wenfei Zhao, Kenan Teng, Jian Chen, Yan Wang:
Research on operational effectiveness of air and missile defence in maritime stronghold based on queuing theory. Int. J. Inf. Commun. Technol. 24(2): 200-212 (2024) - Retraction Note: Algorithm research on the influence of financing structure and cash holding on enterprise innovation based on system GMM model function theory. J. Comb. Optim. 47(3): 16 (2024)
- Moritz Büchi:
Digital well-being theory and research. New Media Soc. 26(1): 172-189 (2024) - Rongyu Xia, Zhizhong Zhao, Risheng Wang, Maolin Xu, Shujun Ye, Meng Xu:
Research on the Deformation Law of Foundation Excavation and Support Based on Fluid-Solid Coupling Theory. Sensors 24(2): 426 (2024) - Tiexiang Liu, Deqiang He, Zhenzhen Jin, Sheng Shan, Yanjun Chen, Qilin Chen:
Research on flow scheduling of train communication based on time-sensitive network. Simul. Model. Pract. Theory 130: 102859 (2024) - Hongxiang Zhang, Miao Guo, Liuyang Hu, Gongyuan Lu:
A multi-agent simulation based train platforming research for facilitating passenger transfer in a high-speed railway station. Simul. Model. Pract. Theory 130: 102856 (2024) - Wilk Oliveira, Juho Hamari:
Global Trends in Flow Theory Research within Gameful Environments: A Scoping Review, Bibliometric Analysis and Agenda for Future Studies. HICSS 2024: 1318-1327 - Xiaotong Liu, Haoyu Wang, Kaijie Zhang, Kaile Lin, Qiufeng Shi, Fanhui Zeng:
Credit Default of P2P Online Loans Based on Logistic Regression Model Under Factor Space Theory Risk Prediction Research. Intelligent Information Processing (1) 2024: 410-424 - Ryan E. Dougherty:
Experiences Using Research Processes in an Undergraduate Theory of Computing Course. SIGCSE (1) 2024: 310-316 - Thomas Übellacker:
AcademiaOS: Automating Grounded Theory Development in Qualitative Research with Large Language Models. CoRR abs/2403.08844 (2024) - 2023
- Mohammed Ali:
Information Systems Research - Foundations, Design and Theory. Springer 2023, ISBN 978-3-031-25469-7, pp. 1-256 - Shiqi Zong, Chaoqun Jiao, Zhibin Zhao, Jiangong Zhang, Zheyuan Gan:
Research on Electromagnetic Scattering Characteristics of Transmission Tower With Different Tower Types in Short Wave Band Based on the Characteristic Mode Theory. IEEE Access 11: 77429-77440 (2023) - Marek McGann:
Connecting with the subject of our science: Course-of-experience research supports valid theory building in cognitive science. Adapt. Behav. 31(2): 137-141 (2023) - Richard Ennals:
Peter R. A. Oeij, Diana Rus and Frank D. Pot (Editors): Workplace Innovation: Theory, Research and Practice. AI Soc. 38(6): 2723-2724 (2023) - Dong Yu, Shurui Wang, Fanghao Song, Yan Liu, Shiyi Zhang, Yirui Wang, Xiaojiao Xie, Zihan Zhang:
Research on user experience of the video game difficulty based on flow theory and fNIRS. Behav. Inf. Technol. 42(6): 789-805 (2023) - Mikko T. Siponen, Mikko Rönkkö, Fufan Liu, Steffi Haag, Gabriella Laatikainen:
Protection Motivation Theory in Information Security Behavior Research: Reconsidering the Fundamentals. Commun. Assoc. Inf. Syst. 53: 47 (2023) - Yingmiao Qian, Xian-an Yu, Xueli Chen, Malin Song:
Research on stability of major engineering technology innovation consortia based on evolutionary game theory. Comput. Ind. Eng. 186: 109734 (2023) - Asmeret Bier Naugle, Adam Russell, Kiran Lakkaraju, Laura Painton Swiler, Stephen J. Verzi, Vicente J. Romero:
The Ground Truth program: simulations as test beds for social science research methods. Comput. Math. Organ. Theory 29(1): 1-19 (2023) - Wu Yaojie, Fang Tianhui:
Research on Chinese Stock Market during COVID-19 - Based on Random Matrix Theory. Complex. 2023: 5404229:1-5404229:16 (2023) - Allen C. Johnston, Paul Michael Di Gangi, France Bélanger, Robert E. Crossler, Mikko T. Siponen, Merrill Warkentin, Tripti Singh:
Seeking rhetorical validity in fear appeal research: An application of rhetorical theory. Comput. Secur. 125: 103020 (2023) - Steven Bryant:
Assessing GPT-4's role as a co-collaborator in scientific research: a case study analyzing Einstein's special theory of relativity. Discov. Artif. Intell. 3(1) (2023)
skipping 1,268 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-08 13:58 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint