
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 39 matches
- 2020
- Manuel Sánchez García, Rafael de Lacour Jiménez, Ana María García Linares:
Games studies in architectural education: An experimental graphic approach implemented in Granada University Architecture School. CoSECivi 2020: 1-12 - Dmitry Elkin, Valeriy Vyatkin:
Distributed Approach to Traffic Management Automation Implemented According to IEC 61499. DoCEIS 2020: 159-167 - Victor DeCaria, Sigal Gottlieb, Zachary J. Grant, William J. Layton:
A general linear method approach to the design and optimization of efficient, accurate, and easily implemented time-stepping methods in CFD. CoRR abs/2010.06360 (2020) - 2019
- Marcus Lindner, Nils Fitinghoff, Johan Eriksson, Per Lindgren:
Verification of Safety Functions Implemented in Rust - a Symbolic Execution based approach. INDIN 2019: 432-439 - 2018
- Ali Abbasi
, Frank O. Annor, Nick van de Giesen:
The effects of small water surfaces on turbulent flow in the atmospheric boundary layer: URANS approach implemented in OpenFOAM. Environ. Model. Softw. 101: 268-288 (2018) - Kailash Hambarde, Gökhan Silahtaroglu, Santosh Khamitkar, Parag Bhalchandra, Shaikh Husen, Govind Kulkarni, Pritam Tamsekar, Pranita Samale:
Data Analytics Implemented over E-commerce Data to Evaluate Performance of Supervised Learning Approaches in Relation to Customer Behavior. SocProS (1) 2018: 285-293 - 2017
- Emir Pecanin, Edis Mekic, Petar C. Spalevic, Khaled M. Mohamed Himar Swhli:
Trifocal constructive approach in developing coders, simulated, and hardware implemented, for the introduction of coding theory. Comput. Appl. Eng. Educ. 25(6): 867-880 (2017) - Noèlia Pueyo Bellafont, Francesc Viñes, Wolfgang Hieringer, Francesc Illas:
Predicting core level binding energies shifts: Suitability of the projector augmented wave approach as implemented in VASP. J. Comput. Chem. 38(8): 518-522 (2017) - Shu-Hsien Liao
, Yin-Ju Chen:
A rough set-based association rule approach implemented on a brand trust evaluation model. J. Exp. Theor. Artif. Intell. 29(5): 911-927 (2017) - 2016
- Manuel Schimmack, Paolo Mercorelli
:
Scaling-based least squares methods with implemented Kalman filter approach for nano-parameters identification. Int. J. Model. Identif. Control. 25(2): 85-92 (2016) - K. Sakthisudhan, N. Saravana Kumar:
Certain Study on Improvement of Bandwidth in 3GHz Microstrip Patch Antenna Designs and Implemented on Monostatic Radar Approach for Breast Cancer Diagnosis in Microwave Imaging System. J. Circuits Syst. Comput. 25(2): 1650006:1-1650006:32 (2016) - 2015
- Robert Salat
, Michal Awtoniuk
:
Black box modeling of PIDs implemented in PLCs without structural information: a support vector regression approach. Neural Comput. Appl. 26(3): 723-734 (2015) - José Ricardo Cárdenas-Valdez, Emigdio Z.-Flores
, José-Cruz Nuñez Pérez, Leonardo Trujillo
:
Local Search Approach to Genetic Programming for RF-PAs Modeling Implemented in FPGA. NEO 2015: 67-88 - Adriana-Cristina Enache, Valentin Sgarciu:
A feature selection approach implemented with the Binary Bat Algorithm applied for intrusion detection. TSP 2015: 11-15 - 2014
- Shu-Hsien Liao
, Yin-Ju Chen:
A rough set-based association rule approach implemented on exploring beverages product spectrum. Appl. Intell. 40(3): 464-478 (2014) - Zahra Parvaneh, Feixiong Liao, Theo A. Arentze, Harry J. P. Timmermans:
A Micro-simulation Model of Updating Expected Travel Time in Provision of Travel Information: A Bayesian Belief Approach Implemented in a Multi-state Supernetwork. ANT/SEIT 2014: 796-801 - Camille Fayollas, Jean-Charles Fabre, Philippe A. Palanque, Martin Cronel, David Navarre, Yannick Deleris:
A Software-Implemented Fault-Tolerance Approach for Control and Display Systems in Avionics. PRDC 2014: 21-30 - 2012
- Heba Al-Hiary, Basim Alhadidi, Malik Braik:
An Implemented Approach for Potentially Breast Cancer Detection Using Extracted Features and Artificial Neural Networks. Comput. Informatics 31(1): 225-244 (2012) - Rudolf Ramler, Theodorich Kopetzky, Wolfgang Platz:
Value-Based Coverage Measurement in Requirements-Based Testing: Lessons Learned from an Approach Implemented in the TOSCA Testsuite. EUROMICRO-SEAA 2012: 363-366 - 2011
- Masoud Yaghini, Mohsen Momeni, Mohammadreza Sarmadi:
DIMMA-Implemented Metaheuristics for Finding Shortest Hamiltonian Path Between Iranian Cities Using Sequential DOE Approach for Parameters Tuning. Int. J. Appl. Metaheuristic Comput. 2(2): 74-92 (2011) - 2010
- Zhongyan Shao, Weichun Guo, Feijie Zhong, Mingzhen Zhan:
The Analysis of Organizational Change Mode and Approaches Implemented Based on the Authority and Rights System. ICEE 2010: 4716-4719 - 2009
- Shu-Hsien Liao
, Jen-Lung Chen, Tze-Yuan Hsu:
Ontology-based data mining approach implemented for sport marketing. Expert Syst. Appl. 36(8): 11045-11056 (2009) - Shu-Hsien Liao
, Hsu-hui Ho, Feng-chich Yang:
Ontology-based data mining approach implemented on exploring product and brand spectrum. Expert Syst. Appl. 36(9): 11730-11744 (2009) - Gemma Ferdinand Kaunang, Günther Zauner:
Four Modelling Approaches for ARGESIM Benchmark C3 'Generalized Class-E Amplifier' implemented in Dymola. Simul. Notes Eur. 19(1): 43-46 (2009) - Mihai Iordache, Lucia Dumitriu, Lucian Mandache:
Two time-scale approach implemented on hybrid equations. ECCTD 2009: 579-583 - 2008
- Carsten Ullrich:
Pedagogically Founded Courseware Generation for Web-Based Learning, An HTN-Planning-Based Approach Implemented in PAIGOS. Lecture Notes in Computer Science 5260, Springer 2008, ISBN 978-3-540-88213-8 - Goutam Kumar Saha:
Software-Implemented Fault Detection Approaches. Ubiquity 2008(May): 1:1 (2008) - 2006
- C. Santhi, Raghavan Srinivasan, Jeffrey G. Arnold, J. R. Williams:
A modeling approach to evaluate the impacts of water quality management plans implemented in a watershed in Texas. Environ. Model. Softw. 21(8): 1141-1157 (2006) - Jin Tan Yang, Huai-Chien Horng:
Digital Rights Management Implemented by RDF Graph Approach. Int. J. Distance Educ. Technol. 4(4): 36-55 (2006) - Dimiter R. Avresky, Sean J. Geoghegan, Y. Varoglu:
Evaluation of Software-Implemented Fault-Tolerance (SIFT) Approach in Gracefully Degradable Multi-Computer Systems. IEEE Trans. Reliab. 55(3): 451-457 (2006)
skipping 9 more matches
loading more results
failed to load more results, please try again later

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
retrieved on 2021-04-13 19:35 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint