default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Likely matches
- Hai Jin 0001
Huazhong University of Science and Technology, School of Computer Science and Technology, Services Computing Technology and System Lab, Cluster and Grid Computing Lab, Wuhan, China - Jing Wang — disambiguation page
- Licheng Jiao
Xidian University, Key Laboratory of Intelligent Perception and Image Understanding, Xi'an, China - Jing Zhang — disambiguation page
- Jing Li — disambiguation page
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 3,009,793 matches
- 2025
- Jing Xu:
Connecting the dots: Exploring backdoor attacks on graph neural networks. Delft University of Technology, Netherlands, 2025 - Jean-François Burnol:
Summing the "exactly one 42" and similar subsums of the harmonic series. Adv. Appl. Math. 162: 102791 (2025) - Shi-Mei Ma, Hao Qi, Jean Yeh, Yeong-Nan Yeh:
On the joint distributions of succession and Eulerian statistics. Adv. Appl. Math. 162: 102772 (2025) - Baogang Li, Jiale Chen, Xinlong Yu, Zhi Yang, Jingxi Zhang:
Cross-domain gesture recognition via WiFi signals with deep learning. Ad Hoc Networks 166: 103654 (2025) - Ji Wang, Miao Zhang, Quanjun Yin, Lujia Yin, Yong Peng:
Multi-agent reinforcement learning for task offloading with hybrid decision space in multi-access edge computing. Ad Hoc Networks 166: 103671 (2025) - Jose S. Cánovas, Manuel Muñoz-Márquez:
On the dynamics of a linear-hyperbolic population model with Allee effect and almost sure extinction. Appl. Math. Comput. 486: 129005 (2025) - Qian Cui, Jinde Cao, Lulu Li, Yang Liu:
Exponential stability of switched systems with state-dependent delayed impulses via B-equivalent method. Appl. Math. Comput. 486: 129031 (2025) - Azhar Iqbal, Shahbaz Ahmad, Junseok Kim:
Two-Level method for blind image deblurring problems. Appl. Math. Comput. 485: 129008 (2025) - Taijiang Jiang, Qiang Sun, Chao Zhang:
A note on the 1-factorization of non-uniform complete hypergraph. Appl. Math. Comput. 485: 129007 (2025) - Jiajun Li, Ying Jiang:
Stable generalized finite element for two-dimensional and three-dimensional non-homogeneous interface problems. Appl. Math. Comput. 486: 129056 (2025) - Dan Li, Minghui Yan, Jixiang Meng:
Minimizing the least Laplacian eigenvalue of signed complete graphs. Appl. Math. Comput. 484: 129002 (2025) - Yikang Lu, Hui Dai, Huaiyu Tan, Xiaofang Duan, Lei Shi, Junpyo Park:
Enhancement of persistence in the rock-paper-scissors dynamics through higher-order interactions. Appl. Math. Comput. 487: 129083 (2025) - Xu Mei, Jun Cheng, Wentao Huang:
Attack-compensated asynchronous output feedback control for stochastic switching systems with sojourn probability. Appl. Math. Comput. 485: 129024 (2025) - Helena Molina-Abril, María José Morón-Fernández, Marc Benito-Marimón, Fernando Díaz-del-Río, Pedro Real:
Topological scale framework for hypergraphs. Appl. Math. Comput. 485: 128989 (2025) - Francisco J. Muñoz, Luca Meacci, Juan Carlos Nuño, Mario Primicerio:
Exploring the limits of the law of mass action in the mean field description of epidemics on Erdös-Rényi networks. Appl. Math. Comput. 485: 129019 (2025) - Saulo Orizaga, Gilberto González-Parra, Logan Forman, Jesus Villegas-Villanueva:
Solving Allen-Cahn equations with periodic and nonperiodic boundary conditions using mimetic finite-difference operators. Appl. Math. Comput. 484: 128993 (2025) - Yi Shen, Jiemei Zhao, Liqi Yu:
Reachable set estimation of delayed second-order memristive neural networks. Appl. Math. Comput. 484: 128994 (2025) - Yu Sun, Cheng Hu, Juan Yu:
Pinning passivity and bipartite synchronization of fractional signed networks without gauge transformation. Appl. Math. Comput. 486: 129067 (2025) - R. Suvetha, Juan J. Nieto, P. Prakash:
Non-fragile output-feedback control for delayed memristive bidirectional associative memory neural networks against actuator failure. Appl. Math. Comput. 485: 129021 (2025) - Yassine Tissaoui, James F. Kelly, Simone Marras:
Efficient spectral element method for the Euler equations on unbounded domains. Appl. Math. Comput. 487: 129080 (2025) - Hong-Zhang Wang, Xing-Chen Shang-Guan, Du Xiong, Y.-H. An, L. Jin:
A matrix-separation-based integral inequality for aperiodic sampled-data synchronization of delayed neural networks considering communication delay. Appl. Math. Comput. 486: 129032 (2025) - Tao You, Linjiang Yang, Jian Wang, Peng Zhang, Jinchao Chen, Ying Zhang:
The guidance of neutral human populations maintains cooperation in the prisoner's dilemma game. Appl. Math. Comput. 486: 129071 (2025) - Junchang Zhai, Huanqing Wang, Yuping Qin, Hongxia Cui:
Estimation-based event-triggered fixed-time fuzzy tracking control for high-order nonlinear systems. Appl. Math. Comput. 486: 129057 (2025) - Zhipeng Zhang, Xiaotong Jiang, Chengyi Xia:
Zero-determinant strategy of finite games with implementation errors and its application into group decision-making. Appl. Math. Comput. 486: 129055 (2025) - Jinsen Zhang, Xiaobing Nie:
Multiple exponential stability for short memory fractional impulsive Cohen-Grossberg neural networks with time delays. Appl. Math. Comput. 486: 129066 (2025) - Juan Pablo Acosta:
Groups definable in Presburger arithmetic. Ann. Pure Appl. Log. 176(1): 103507 (2025) - Jorge I. Guier:
Elimination of quantifiers for a theory of real closed rings. Ann. Pure Appl. Log. 176(1): 103494 (2025) - Mauro Di Nasso, Renling Jin:
Foundations of iterated star maps and their use in combinatorics. Ann. Pure Appl. Log. 176(1): 103511 (2025) - Amirhossein Akbar Tabatabai, Raheleh Jalali:
Universal proof theory: Semi-analytic rules and Craig interpolation. Ann. Pure Appl. Log. 176(1): 103509 (2025) - Xinyu Fu, Heping Jiang:
Turing-Hopf bifurcation in a diffusive predator-prey model with schooling behavior and Smith growth. Appl. Math. Lett. 159: 109257 (2025)
skipping 3,009,763 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-17 22:36 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint