
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 1,021 matches
- 2021
- Christopher Ifeanyi Eke, Azah Anir Norman, Liyana Shuib:
Context-Based Feature Technique for Sarcasm Identification in Benchmark Datasets Using Deep Learning and BERT Model. IEEE Access 9: 48501-48518 (2021) - Md. Rezwanul Haque, S. M. Taslim Uddin Raju
, Md. Asaf-Uddowla Golap
, M. M. A. Hashem
:
A Novel Technique for Non-Invasive Measurement of Human Blood Component Levels From Fingertip Video Using DNN Based Models. IEEE Access 9: 19025-19042 (2021) - Nachaat Mohamed
, Bahari Belaton
:
SBI Model for the Detection of Advanced Persistent Threat Based on Strange Behavior of Using Credential Dumping Technique. IEEE Access 9: 42919-42932 (2021) - Elizabeth Serrano-Ramírez, José René Valdez-Lazalde, Héctor Manuel de los Santos-Posadas, Roman Anselmo Mora-Gutiérrez, Gregorio Ángeles-Pérez:
A forest management optimization model based on functional zoning: A comparative analysis of six heuristic techniques. Ecol. Informatics 61: 101234 (2021) - Lamia Berkani:
Recommendation of items using a social-based collaborative filtering approach and classification techniques. Int. J. Data Min. Model. Manag. 13(1/2): 137-159 (2021) - Shan Hua:
Application of Image Filtering Technique Based on Bounded Mean Oscillation Model in Studying on Rice Grain Morphology. Int. J. Pattern Recognit. Artif. Intell. 35(1): 2154003:1-2154003:15 (2021) - Hesam Omranpour
, Saeed Shiry
:
A mobile robot mapping model inspired from the place cells functionality of hippocampus based on dimension reduction technique. J. Exp. Theor. Artif. Intell. 33(1): 27-46 (2021) - Bhargavi K., B. Sathish Babu, Jeremy Pitt:
Performance Modeling of Load Balancing Techniques in Cloud: Some of the Recent Competitive Swarm Artificial Intelligence-based. J. Intell. Syst. 30(1): 40-58 (2021) - Patrick Niyishaka
, Chakravarthy Bhagvati:
Image splicing detection technique based on Illumination-Reflectance model and LBP. Multim. Tools Appl. 80(2): 2161-2175 (2021) - Humberto Rodríguez-Avila, Joeri De Koster, Wolfgang De Meuter:
Advanced Join Patterns for the Actor Model based on CEP Techniques. Art Sci. Eng. Program. 5(2): 10 (2021) - Yushan Liu, Luyi Li, Sihan Zhao, Shufang Song:
A global surrogate model technique based on principal component analysis and Kriging for uncertainty propagation of dynamic systems. Reliab. Eng. Syst. Saf. 207: 107365 (2021) - Rodrigue Sohoin, Abdelkhalak El Hami, Fabrice Guérin, Hassen Riahi, Djelali Attaf:
A novel approach based on meta-modeling technique and time transformation function for reliability analysis of upgraded automotive components. Reliab. Eng. Syst. Saf. 207: 107357 (2021) - Mohammed Nagah Amr
, Hussein M. ElAttar
, Mohamed H. Abd El Azeem, Hesham El Badawy
:
An Enhanced Indoor Positioning Technique Based on a Novel Received Signal Strength Indicator Distance Prediction and Correction Model. Sensors 21(3): 719 (2021) - Wenchao Wu
, Yongguang Hu
, Yongzong Lu
:
Parametric Surface Modelling for Tea Leaf Point Cloud Based on Non-Uniform Rational Basis Spline Technique. Sensors 21(4): 1304 (2021) - S. Vidya, E. Srie Vidhya Janani:
Wind speed multistep forecasting model using a hybrid decomposition technique and a selfish herd optimizer-based deep neural network. Soft Comput. 25(8): 6237-6270 (2021) - Alessandro Berti
, Wil M. P. van der Aalst
:
A Novel Token-Based Replay Technique to Speed Up Conformance Checking and Process Enhancement. Trans. Petri Nets Other Model. Concurr. 15: 1-26 (2021) - 2020
- Honglei Li:
Model-Based Design Optimization and Simulation Techniques for Dynamic, Data-Driven Application Systems. University of Maryland, College Park, MD, USA, 2020 - Marwan Ali Albahar, Abdulaziz Ali Albahr, Muhammad Hatim Binsawad:
An Efficient Person Re-Identification Model Based on New Regularization Technique. IEEE Access 8: 171049-171057 (2020) - Frederick Appoh
, Akilu Yunusa-Kaltungo
, Jyoti K. Sinha
:
Hybrid Dynamic Probability-Based Modeling Technique for Rolling Stock Failure Analysis. IEEE Access 8: 182376-182390 (2020) - Sangwook Han
:
Three-Phase-Measurement-Based Load Modeling Technique Using Unbalanced Fault Data. IEEE Access 8: 83655-83662 (2020) - Phu-Nguyen Le, Hee-Jun Kang
:
Robot Manipulator Calibration Using a Model Based Identification Technique and a Neural Network With the Teaching Learning-Based Optimization. IEEE Access 8: 105447-105454 (2020) - Chan Park, Sungkyung Park, Chester Sungchung Park:
Roofline-Model-Based Design Space Exploration for Dataflow Techniques of CNN Accelerators. IEEE Access 8: 172509-172523 (2020) - Sha-Jun Zhou, Hong-Bing Zeng, Hui-Qin Xiao
:
Load Frequency Stability Analysis of Time-Delayed Multi-Area Power Systems With EV Aggregators Based on Bessel-Legendre Inequality and Model Reconstruction Technique. IEEE Access 8: 99948-99955 (2020) - Mohamed A. El-Khoreby, S. A. R. Abu-Bakar, Musa Mohd Mokji, Syaril Nizam Omar:
Vehicle Detection and Counting Using Adaptive Background Model Based on Approximate Median Filter and Triangulation Threshold Techniques. Autom. Control. Comput. Sci. 54(4): 346-357 (2020) - Márton Petö, Fabian Duvigneau, Sascha Eisenträger:
Enhanced numerical integration scheme based on image-compression techniques: application to fictitious domain methods. Adv. Model. Simul. Eng. Sci. 7(1): 21 (2020) - Márton Petö, Fabian Duvigneau, Sascha Eisenträger:
Correction to: Enhanced numerical integration scheme based on image-compression techniques: application to fictitious domain methods. Adv. Model. Simul. Eng. Sci. 7(1): 34 (2020) - Du Dinh-Cong
, Trung Nguyen-Thoi
, Duc T. Nguyen:
A FE model updating technique based on SAP2000-OAPI and enhanced SOS algorithm for damage assessment of full-scale structures. Appl. Soft Comput. 89: 106100 (2020) - Luca Mencarelli, Alexandre Pagot, Pascal Duchêne:
Surrogate-based modeling techniques with application to catalytic reforming and isomerization processes. Comput. Chem. Eng. 135: 106772 (2020) - Vicente Torres-Garcia
, Daniel Guillen
, Jimena Olveres, Boris Escalante-Ramírez, Juan R. Rodriguez-Rodriguez:
Modelling of high impedance faults in distribution systems and validation based on multiresolution techniques. Comput. Electr. Eng. 83: 106576 (2020) - Sourav Kumar Mukhopadhyay, Sridhar Krishnan:
A singular spectrum analysis-based model-free electrocardiogram denoising technique. Comput. Methods Programs Biomed. 188: 105304 (2020)
skipping 991 more matches
loading more results
failed to load more results, please try again later

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
retrieved on 2021-04-16 17:36 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint