default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Exact matches
Likely matches
- Andrey L. Priorov
aka: Andrey Priorov, Andrew Priorov
P. G. Demidov Yaroslavl State University, Yaroslavl, Russia - A. N. Prior
aka: Arthur N. Prior - Alberto Priori
- César Augusto Prior
- Donald A. Priore
Venue search results
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 13,507 matches
- 2024
- M. M. Kogan, A. V. Stepanov:
Design of Generalized H∞-Suboptimal Controllers Based on Experimental and A Priori Data. Autom. Remote. Control. 85(1): 1-14 (2024) - M. M. Kogan, A. V. Stepanov:
Design of Generalized H∞-Suboptimal Controllers Based on Experimental and a Priori Data. Autom. Remote. Control. 85(1): 1-13 (2024) - Reda M. S. Abdelaal, Anas A. Makki, Ebtissam M. Al-Madi, Amani M. Qhadi:
Prioritizing Strategic Objectives and Projects in Higher Education Institutions: A New Hybrid Fuzzy MEREC-G-TOPSIS Approach. IEEE Access 12: 89735-89753 (2024) - Abdulmohsen Algarni, Zulfiqar Ahmad, Mohammed Ala'Anzy:
An Edge Computing-Based and Threat Behavior-Aware Smart Prioritization Framework for Cybersecurity Intrusion Detection and Prevention of IEDs in Smart Grids With Integration of Modified LGBM and One Class-SVM Models. IEEE Access 12: 104948-104963 (2024) - Attanayake Mudiyanselage Sakura Rancy Harshani Attanayake, R. M. Chandima Ratnayake, Tore Markeset:
Functional Failure Criticality Assessment and Control of Power Distribution Systems: Failure Prioritization Using AHP. IEEE Access 12: 72968-72982 (2024) - Akash Chikhalikar, Ankit A. Ravankar, Jose Victorio Salazar Luces, Yasuhisa Hirata:
Semantic-Based Multi-Object Search Optimization in Service Robots Using Probabilistic and Contextual Priors. IEEE Access 12: 113151-113164 (2024) - Alexander Grundler, Martin Dazer:
Reliability Demonstration Test Planning for Systems Using Prior Knowledge. IEEE Access 12: 3339-3355 (2024) - Md. Iqbal Hossain, Mohammad Zunaed, Md. Kawsar Ahmed, S. M. Jawwad Hossain, Anwarul Hasan, Taufiq Hasan:
ThoraX-PriorNet: A Novel Attention-Based Architecture Using Anatomical Prior Probability Maps for Thoracic Disease Classification. IEEE Access 12: 3256-3273 (2024) - Jisoo Jang, Subong Jung, Myung Kil Ahn, Donghwa Kim, Jaepil Youn, Dongkyoo Shin:
Research on Quantitative Prioritization Techniques for Selecting Optimal Security Measures. IEEE Access 12: 103848-103859 (2024) - Sudheer Mangalampalli, Syed Shakeel Hashmi, Amit Gupta, Ganesh Reddy Karri, K. Varada Rajkumar, Tulika Chakrabarti, Prasun Chakrabarti, Martin Margala:
Multi Objective Prioritized Workflow Scheduling Using Deep Reinforcement Based Learning in Cloud Computing. IEEE Access 12: 5373-5392 (2024) - Sudheer Mangalampalli, Ganesh Reddy Karri, Sachi Nandan Mohanty, Shahid Ali, Muhammad Ijaz Khan, Sherzod Sh. Abdullaev, Salman A. AlQahtani:
Multi-Objective Prioritized Task Scheduler Using Improved Asynchronous Advantage Actor Critic (a3c) Algorithm in Multi Cloud Environment. IEEE Access 12: 11354-11377 (2024) - Mohammed S. Mundottukandi, Yusmadi Yah Bt Jusoh, Noraini Che Pa, Rozi Nor Haizan Binti Nor, Umar Ali Bukar:
Prioritizing Factors in Social Media Crisis Communication for Resilience Enhancement Using Analytical Hierarchy Process. IEEE Access 12: 54798-54815 (2024) - Nour Neifar, Achraf Ben-Hamadou, Afef Mdhaffar, Mohamed Jmaiel, Bernd Freisleben:
Leveraging Statistical Shape Priors in GAN-Based ECG Synthesis. IEEE Access 12: 36002-36015 (2024) - Marie C. Pognon, Alejandro Quintero, Samuel Pierre:
Adaptive Priority Scheduling of Internet of Things Data for Disaster Management in Smart Cities. IEEE Access 12: 83285-83298 (2024) - Ahmad Sahban Rafsanjani, Norshaliza Binti Kamaruddin, Mehran Behjati, Saad Aslam, Aaliya Sarfaraz, Angela Amphawan:
Enhancing Malicious URL Detection: A Novel Framework Leveraging Priority Coefficient and Feature Evaluation. IEEE Access 12: 85001-85026 (2024) - Bharti Rana, Yashwant Singh, Pradeep Kumar Singh, Wei-Chiang Hong:
A Priority Based Energy-Efficient Metaheuristic Routing Approach for Smart Healthcare System (SHS). IEEE Access 12: 85694-85708 (2024) - Ubaid Ur Rehman, Faten Labassi, Turki Alsuraiheed, Tahir Mahmood, Meraj Ali Khan:
Selection of Energy Trading Platform for Peer-to-Peer (P2P) Energy Trading by Using a Multi-Attribute Decision-Making Approach Based on Bipolar Fuzzy Aczel-Alsina Prioritized Aggregation Operators. IEEE Access 12: 80847-80858 (2024) - Nday Kabulo Sinai, Hoh Peter In:
Q-RTOP: Quantum-Secure Random Transaction Ordering Protocol for Mitigating Maximal Extractable Value Attacks in Blockchains With a Priority Gas-Fee Policy. IEEE Access 12: 10036-10046 (2024) - Syeda S. Tanveer, Zeeshan A. Rana:
Prioritizing Software Requirements by Combining the Usage Monitoring and User Feedback Data. IEEE Access 12: 82825-82841 (2024) - Muhammad Zohaib, Ahmed Alsanad, Areej Abdullah Alhogail:
Prioritizing DevOps Implementation Guidelines for Sustainable Software Projects. IEEE Access 12: 71109-71130 (2024) - Muhammad Ilyas Khattak, Yuan Hui, Ayaz Ahmad, Ajmal Khan, Inamullah:
RPRA: Reputation-based prioritization and resource allocation leveraging predictive analytics and vehicular fog computing. Ad Hoc Networks 155: 103401 (2024) - Yunus Ozen, Göksu Zekiye Özen:
A new priority aware routing protocol for efficient emergency data transmissions in MANETs. Ad Hoc Networks 163: 103592 (2024) - Xialei Zhang, Yaoyang Wang, Tianjun Ma, Lifeng Guo, Zhiguo Hu:
A Lightweight_PAEKS-based energy scheduling model considering priority in MicroGrid. Ad Hoc Networks 162: 103531 (2024) - Riantini Virtriana, Tania Septi Anggraini, Kalingga Titon Nur Ihsan, Mia Nur Alifah, Dyah Ayu Retnowati, Pitri Rohayani, Agung Budi Harto, Akhmad Riqqi:
Developing a spatial-based predictive model for conservation area management prioritization using ecosystem service and site suitability index in Java Island. Int. J. Appl. Earth Obs. Geoinformation 126: 103606 (2024) - Zeyu Wang, Feng Zhang, Chuyi Wu, Junshi Xia:
Rapid mapping of volcanic eruption building damage: A model based on prior knowledge and few-shot fine-tuning. Int. J. Appl. Earth Obs. Geoinformation 126: 103622 (2024) - Chang Zhou, Jingfeng Huang, Yuanjun Xiao, Meiqi Du, Shengcheng Li:
A novel approach: Coupling prior knowledge and deep learning methods for large-scale plastic greenhouse extraction using Sentinel-1/2 data. Int. J. Appl. Earth Obs. Geoinformation 132: 104073 (2024) - Matthias Rath, Alexandru Paul Condurache:
Boosting deep neural networks with geometrical prior knowledge: a survey. Artif. Intell. Rev. 57(4): 95 (2024) - Jacobo Baldonedo, José R. Fernández, Ramón Quintanilla:
Fully discrete approximations and an a priori error analysis of a two-temperature thermo-elastic model with microtemperatures. Int. J. Appl. Math. Comput. Sci. 34(1) (2024) - Henry Ataburo, Getrude Effah Ampong, Dominic Essuman:
Developing operational resilience to navigate transportation disruptions: the role and boundaries of efficiency priority. Ann. Oper. Res. 340(2): 723-755 (2024) - Jan Górecki, David Bartl, Jaroslav Ramík:
Robustness of priority deriving methods for pairwise comparison matrices against rank reversal: a probabilistic approach. Ann. Oper. Res. 333(1): 249-273 (2024)
skipping 13,477 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-15 19:58 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint