
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 125 matches
- 2021
- Jin Nakabe
, Teruhiro Mizumoto
, Hirohiko Suwa
, Keiichi Yasumoto
:
Optimal Cooking Procedure Presentation System for Multiple Recipes and Investigating Its Effect. Algorithms 14(2): 67 (2021) - Sourabh Katoch, Sumit Singh Chauhan, Vijay Kumar
:
A review on genetic algorithm: past, present, and future. Multim. Tools Appl. 80(5): 8091-8126 (2021) - John A. Stratton:
Enhancing Faculty-Student Interaction in an Undergraduate Algorithms Course Through Group Oral Presentations. CEP 2021: 25-28 - 2020
- Lorraine Remer, Robert C. Levy
, Shana Mattoo, Didier Tanré, Pawan Gupta, Yingxi Shi, Virginia Sawyer, Leigh A. Munchak, Yaping Zhou
, Mijin Kim, Charles Ichoku, Falguni Patadia, Rong-Rong Li, Santiago Gassó
, Richard Kleidman, Brent N. Holben:
The Dark Target Algorithm for Observing the Global Aerosol System: Past, Present, and Future. Remote. Sens. 12(18): 2900 (2020) - Po-Ming Law, Sana Malik, Fan Du, Moumita Sinha:
The Impact of Presentation Style on Human-In-The-Loop Detection of Algorithmic Bias. Graphics Interface 2020: 299-307 - Bettina Eick, Tobias Moede:
A nilpotent quotient algorithm for finitely presented associative $\mathbb {Z}$-algebras and its application to integral group rings. 75 Years of Mathematics of Computation 2020 - Po-Ming Law, Sana Malik, Fan Du, Moumita Sinha:
The Impact of Presentation Style on Human-In-The-Loop Detection of Algorithmic Bias. CoRR abs/2004.12388 (2020) - Mehak Gupta, Vishal Singh, Akshay Agarwal, Mayank Vatsa, Richa Singh:
Generalized Iris Presentation Attack Detection Algorithm under Cross-Database Settings. CoRR abs/2010.13244 (2020) - Manan Pareek, Girish Mishra, Varun Kohli:
Deep Learning based analysis of Key Scheduling Algorithm of PRESENT cipher. IACR Cryptol. ePrint Arch. 2020: 981 (2020) - 2019
- Sasmoko Buddhtha, Christina Natasha, Edy Irwansyah
, Widodo Budiharto:
Building an Artificial Neural Network with Backpropagation Algorithm to Determine Teacher Engagement Based on the Indonesian Teacher Engagement Index and Presenting the Data in a Web-Based GIS. Int. J. Comput. Intell. Syst. 12(2): 1575-1584 (2019) - Jascha Kolberg, Marta Gomez-Barrero, Christoph Busch:
Multi-algorithm Benchmark for Fingerprint Presentation Attack Detection with Laser Speckle Contrast Imaging. BIOSIG 2019: 119-128 - Abdullah Varici, Gurol Saglam, Seckin Ipek, Abdullah Yildiz, Sezer Gören, Aydin Aysu, Deniz Iskender, T. Baris Aktemur, H. Fatih Ugurdag:
Fast and Efficient Implementation of Lightweight Crypto Algorithm PRESENT on FPGA through Processor Instruction Set Extension. EWDTS 2019: 1-5 - Akshay Agarwal, Akarsha Sehwag, Mayank Vatsa, Richa Singh:
Deceiving the Protector: Fooling Face Presentation Attack Detection Algorithms. ICB 2019: 1-6 - Jianhong Xiang, Junhao Wei, Hao Guo:
An Improved Blind Adaptive Beamforming CAB Algorithm Based on Fireworks Algorithm is Presented. ICDSP 2019: 69-74 - João Roberto Bertini Junior, Mei Abe Funcia, Antonio Alberto S. Santos, Denis J. Schiozer:
A comparison of machine learning algorithms as surrogate model for net present value prediction from wells arrangement data. IJCNN 2019: 1-8 - 2018
- Mateusz Banach, Leszek Konieczny, Zdzislaw Wisniowski, Irena Roterman:
Fragment Aβ(18-41) presented within the CDR3 loop region of a shark immunoglobulin new antigen receptor single-variable domain antibody analyzed based on the fuzzy oil drop model. Bio Algorithms Med Syst. 14(3) (2018) - Saeed Fazayeli, Alireza Eydi, Isa Nakhai Kamalabadi:
Location-routing problem in multimodal transportation network with time windows and fuzzy demands: Presenting a two-part genetic algorithm. Comput. Ind. Eng. 119: 233-246 (2018) - Kanchan Lata Kashyap, Manish Kumar Bajpai
, Pritee Khanna
:
An efficient algorithm for mass detection and shape analysis of different masses present in digital mammograms. Multim. Tools Appl. 77(8): 9249-9269 (2018) - Xin Gao, Shengqi Lv, Hao Zhang, Xingpeng Li, Weijia Ji, Yang He, Xiaobing Li:
A kind of RFID Security Protocol Based on the Algorithm of Present. ICSAI 2018: 50-55 - Philipp Agethen, Felix Gaisbauer, Martin Manns, Max Link, Enrico Rukzio:
Towards realistic walk path simulation of single subjects: presenting a probabilistic motion planning algorithm. MIG 2018: 17:1-17:10 - António Ravara:
A Simple Functional Presentation and an Inductive Correctness Proof of the Horn Algorithm. HCVS 2018: 34-48 - Héctor Echavarría-Heras, Cecilia Leal Ramírez, Juan Ramón Castro-Rodríguez, Enrique Villa-Diharce, Oscar Castillo
:
A Takagi-Sugeno-Kang Fuzzy Model Formalization of Eelgrass Leaf Biomass Allometry with Application to the Estimation of Average Biomass of Leaves in Shoots: Comparing the Reproducibility Strength of the Present Fuzzy and Related Crisp Proxies. Fuzzy Logic Augmentation of Neural and Optimization Algorithms 2018: 329-362 - 2017
- Michael Otto, Philipp Agethen, Florian Geiselhart, Michael Rietzler, Felix Gaisbauer, Enrico Rukzio:
Presenting a Holistic Framework for Scalable, Marker-less Motion Capturing: Skeletal Tracking Performance Analysis, Sensor Fusion Algorithms and Usage in Automotive Industry. J. Virtual Real. Broadcast. 13(3) (2017) - Amir Abbas Baradaran, Keivan Navi:
CAST-WSN: The Presentation of New Clustering Algorithm Based on Steiner Tree and C-Means Algorithm Improvement in Wireless Sensor Networks. Wirel. Pers. Commun. 97(1): 1323-1344 (2017) - Asghar Dabiri Aghdam
, Nader Jafarnia Dabanloo
, Gholamreza Attarodi, Mohammad Sattari, Nazanin Hemmati:
Design and Presenting of a Novel Algorithm Using Anfis for New Generation of Cardiac Pacemakers. CinC 2017 - Beau Johnston
, Eric McCreath:
Parallel Huffman Decoding: Presenting a Fast and Scalable Algorithm for Increasingly Multicore Devices. ISPA/IUCC 2017: 949-958 - William P. Maia, Edward D. Moreno:
Current Consumption Analysis of AES and PRESENT Encryption Algorithms in FPGA Using the Welch Method. SSCC 2017: 300-311 - 2016
- Pekka Kolmonen
, Larisa Sogacheva
, Timo H. Virtanen
, Gerrit de Leeuw, Markku Kulmala:
The ADV/ASV AATSR aerosol retrieval algorithm: current status and presentation of a full-mission AOD dataset. Int. J. Digit. Earth 9(6): 545-561 (2016) - Giorgio Ausiello, Rossella Petreschi:
Presentation of the book: The Power of Algorithms Inspiration and Examples in Everyday Life. Bull. EATCS 118 (2016) - Andrea Facchinetti
:
Continuous Glucose Monitoring Sensors: Past, Present and Future Algorithmic Challenges. Sensors 16(12): 2093 (2016)
skipping 95 more matches
loading more results
failed to load more results, please try again later

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
retrieved on 2021-04-11 14:51 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint