
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 3,261 matches
- 2021
- A. M. Elelimy Abounemra
, Wenhua Chen
, Fei Huang, Mohammad A. Maktoomi
, Weiwei Zhang
, Mohamed Helaoui
, Fadhel M. Ghannouchi
:
Systematic Design Methodology of Broadband Doherty Amplifier Using Unified Matching/Combining Networks With an Application to GaN MMIC Design. IEEE Access 9: 5791-5805 (2021) - Jianan Zhang
, Liang Chu
, Chong Guo, Zicheng Fu, Di Zhao:
A Novel Energy Management Strategy Design Methodology of a PHEV Based on Data-Driven Approach and Online Signal Analysis. IEEE Access 9: 6018-6032 (2021) - Meriem Merai, Mohamed Wissem Naouar, Ilhem Slama-Belkhodja, Eric Monmasson:
A systematic design methodology for DC-link voltage control of single phase grid-tied PV systems. Math. Comput. Simul. 183: 158-170 (2021) - Armin Tajalli:
Power-Speed Trade-Offs in Design of Scaled FET Circuits Using C/IDS Methodology. IEEE Trans. Circuits Syst. I Regul. Pap. 68(2): 631-640 (2021) - Shamim Keshani, Nasser Masoumi, Safieddin Safavi-Naeini:
Reliable, Intelligent, and Design-Independent Digital Frequency Extraction Methodology for High Bit-Count DIFM Receivers. IEEE Trans. Instrum. Meas. 70: 1-12 (2021) - Lucile Sautot
, Sandro Bimonte
, Ludovic Journaux:
A Semi-Automatic Design Methodology for (Big) Data Warehouse Transforming Facts into Dimensions. IEEE Trans. Knowl. Data Eng. 33(1): 28-42 (2021) - E. K. Malakhovskaya, Y. P. Ekhlakov, P. V. Senchenko, A. A. Sidorov:
Methodology for design of templates of text communication messages for software marketing. CoRR abs/2101.01126 (2021) - 2020
- Arthur Gaudron:
Méthodologie du modèle ouvert pour la conception d'un système d'aide à la décision stratégique : le cas de la logistique urbaine. (Open model methodology for the design of a decision support system : the case of city logistics). Paris Sciences et Lettres University, France, 2020 - Daniyal Ahmed
, Li Wang
:
Optimal Area-Product Model (OAPM) Based Non-Iterative Analytical Design Methodology for Litz-Wired High-Frequency Gapped- Transformer (LHFGT) in LLC Converters. IEEE Access 8: 18134-18148 (2020) - Chenge Bian
, Dewei Zhang
, Hailin Deng
, Dalong Lv
, Yi Zhang
:
A New Design Methodology for Wideband Analog Predistorter With the Characteristics of Frequency-Dependent Gain and Phase Conversions. IEEE Access 8: 68391-68399 (2020) - Dalu Cao, Guangchen Bai:
DNN-Based Surrogate Modeling-Based Feasible Performance Reliability Design Methodology for Aircraft Engine. IEEE Access 8: 229201-229218 (2020) - Andrea Celentano
, Fabio Pareschi
, Victor R. Gonzalez-Diaz
, Riccardo Rovatti
, Gianluca Setti
:
A Methodology for Practical Design and Optimization of Class-E DC-DC Resonant Converters. IEEE Access 8: 205568-205589 (2020) - Suné von Solms
, Lynn Ann Futcher
:
Adaption of a Secure Software Development Methodology for Secure Engineering Design. IEEE Access 8: 125630-125637 (2020) - Haiyong Sun
, Hang Lei
:
A Design and Verification Methodology for a TrustZone Trusted Execution Environment. IEEE Access 8: 33870-33883 (2020) - Enrique Ruiz Zúñiga
, Matías Urenda Moris, Anna Syberfeldt
, Masood Fathi
, Juan Carlos Rubio-Romero:
A Simulation-Based Optimization Methodology for Facility Layout Design in Manufacturing. IEEE Access 8: 163818-163828 (2020) - Jing-chen Cong, Chun-Hsien Chen, Pai Zheng
:
Design entropy theory: A new design methodology for smart PSS development. Adv. Eng. Informatics 45: 101124 (2020) - Rui Li, Wim J. C. Verhagen
, Richard Curran:
Stakeholder-oriented systematic design methodology for prognostic and health management system: Stakeholder expectation definition. Adv. Eng. Informatics 43: 101041 (2020) - Christoph Benzmüller, Xavier Parent, Leendert W. N. van der Torre:
Designing normative theories for ethical and legal reasoning: LogiKEy framework, methodology, and tool support. Artif. Intell. 287: 103348 (2020) - Javier Cuenca, Felix Larrinaga, Edward Curry:
MODDALS methodology for designing layered ontology structures. Appl. Ontology 15(2): 185-217 (2020) - Nejlaoui Mohamed
, Najlawi Bilel, Ali Sulaiman Alsagri:
A multi-objective methodology for multi-criteria engineering design. Appl. Soft Comput. 91: 106204 (2020) - Javier León
, Francisco Javier Martín-Campo
, M. Teresa Ortuño
, Begoña Vitoriano
, Luis Miguel Carrasco
, Luis Narvarte
:
A methodology for designing electrification programs for remote areas. Central Eur. J. Oper. Res. 28(4): 1265-1290 (2020) - Daijin Li
, Fengjie Li, Kan Qin, Chuang Huang
, Kai Luo:
Design Methodology of Conical Section Shape for Supercavitating Vehicles considering Auto-Oscillation Characteristics. Complex. 2020: 9583769:1-9583769:14 (2020) - Akbar Doostaregan, Adib Abrishamifar
:
Evaluating a Methodology for Designing CNFET-Based Ternary Circuits. Circuits Syst. Signal Process. 39(10): 5039-5058 (2020) - Vincent Jaillot, Manon Istasse, Sylvie Servigne, Gilles Gesquière, Michel Rautenberg, Isabelle Lefort:
Describing, comparing and analysing digital urban heritage tools: A methodology designed with a multidisciplinary approach. Digit. Appl. Archaeol. Cult. Heritage 17: 00135 (2020) - Lilia Sfaxi, Mohamed Mehdi Ben Aissa:
DECIDE: An Agile event-and-data driven design methodology for decisional Big Data projects. Data Knowl. Eng. 130: 101862 (2020) - Jiun-In Guo
, Chia-Chi Tsai, Jian-Lin Zeng, Shao-Wei Peng, En-Chih Chang:
Hybrid Fixed-Point/Binary Deep Neural Network Design Methodology for Low-Power Object Detection. IEEE J. Emerg. Sel. Topics Circuits Syst. 10(3): 388-400 (2020) - Jinqun Ge
, Tian Xia, Guoan Wang:
Design and Optimization Methodology of Coplanar Waveguide Test Structures for Dielectric Characterization of Thin Films. J. Electron. Test. 36(2): 183-188 (2020) - Giacomo Tanganelli, Luca Cassano, Antonio Miele, Carlo Vallati:
A methodology for the design and deployment of distributed cyber-physical systems for smart environments. Future Gener. Comput. Syst. 109: 420-430 (2020) - Jing Zeng, Laurence T. Yang, Man Lin, Huansheng Ning
, Jianhua Ma:
A survey: Cyber-physical-social systems and their system-level design methodology. Future Gener. Comput. Syst. 105: 1028-1042 (2020) - Verónica Pinos-Vélez, Karina Quinde-Herrera
, Victoria Abril-Ulloa
, Blasco Moscoso, Galo Carrión
, José Urgilés
:
Designing the Pre-Class and Class to Implement the Flipped Learning Model in a Research Methodology Course. Rev. Iberoam. de Tecnol. del Aprendiz. 15(1): 43-49 (2020)
skipping 3,231 more matches
loading more results
failed to load more results, please try again later

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
retrieved on 2021-01-27 03:05 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint