Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 30 matches
- 2010
- Yuheng Cao, Aaron Luntala Nsakanda, Inder Jit Singh Mann:
A Typology Framework of Loyalty Reward Programs. CETS 2010: 159-170 - Chen Chen, Zheng Qin, Jiankuan Xing:
Prediction Task Assignment of Multi-UAV Approach Based on Consensus. CETS 2010: 192-199 - Sudesh Chhikara:
Identification of Variables and Factors Impacting Consumer Behavior in On-line Shopping in India: An Empirical Study. CETS 2010: 292-304 - Hsing-Hui Chu, Ta-Jung Lu, Jong-Wen Wann:
Evaluation of the Acceptance of Audience Response System by Corporations Using the Technology Acceptance Model. CETS 2010: 281-291 - Chuansheng Dong:
The Aggregation-Diffusion Model of Conduction of Technology Value in the Large-Scale Sports Events. CETS 2010: 258-268 - Pouyan Esmaeilzadeh, Murali Sambasivan, Naresh Kumar:
The Challenges and Issues Regarding E-Health and Health Information Technology Trends in the Healthcare Sector. CETS 2010: 23-37 - Yoshiaki Fukami, Masao Isshiki, Hideaki Takeda, Ikki Ohmukai, Jiro Kokuryo:
Specification Patent Management for Web Application Platform Ecosystem. CETS 2010: 269-280 - Chen Gang:
Risk Evaluation of Business Continuity Management by Using Green Technology. CETS 2010: 86-92 - Xiaoling Hao:
IT Operational Risk Measurement Model Based on Internal Loss Data of Banks. CETS 2010: 180-191 - Juchi Hou, Ying Liang, Jianli Wei:
Technology Route and System Design of Green IT. CETS 2010: 238-244 - Yuanhua Hu, Lili Xue:
The Knowledge Transfer Factors under Different Perspectives. CETS 2010: 171-179 - Guojun Ji:
Energy Levels and Co-evolution of Product Innovation in Supply Chain Clusters. CETS 2010: 140-158 - Steve Kruba, Jim Meyer:
The Tail of BPM. CETS 2010: 245-257 - Ban Li, Zheng Shenghua, Yi He:
Research on the Hotel Image Based on the Detail Service. CETS 2010: 226-233 - Yancang Li, Shujing Zhou, Juanjuan Suo:
Study on Amortization Time and Rationality in Real Estate Investment. CETS 2010: 75-85 - Yancang Li, Lina Zhao, Shujing Zhou:
ACO-Based Projection Pursuit: A Novel Clustering Algorithm. CETS 2010: 105-113 - Ximin Liu, Shoufeng Lu, Shiqiang Dai:
A Macroscopic Timing Optimization Model for Signalized Intersections Based on an Extended Internal State Node Model. CETS 2010: 200-214 - Shivanand M. Handigund, Bhat Shweta:
Automated Methodologies for the Design of Flow Diagrams for Development and Maintenance Activities. CETS 2010: 93-104 - Jianhua Ma, Jie Yuan:
Ant Colony Algorithm for Multiple-Depot Vehicle Routing Problem with Shortest Finish Time. CETS 2010: 114-123 - Zhenhua Tan, Guangming Yang, Zhiliang Zhu, Wei Cheng, Guiran Chang:
K-BRiR: An Efficient and Self-organized Routing Mechanism for Structured Peer-to-Peer Service Networks. CETS 2010: 61-74 - Bo Tian, Lin Nan, Qin Zheng, Lei Yang:
Customer Credit Scoring Method Based on the SVDD Classification Model with Imbalanced Dataset. CETS 2010: 46-60 - Lidong Wang, Jiao Peng, Heng Liu:
Chaos Caused by a Transitive Map in Information. CETS 2010: 124-129 - Bing Wu, Lin-du Zhao:
Knowledge Model of Emergency Decision-Making Based on Knowledge Supply and Demand. CETS 2010: 305-317 - Kefan Xie, Gang Chen, Wu Qian, Zhao Shi:
Research on Group Decision-Making Mechanism of Internet Emergency Management. CETS 2010: 1-22 - Zhixiang Yin, Hua Chen:
Impact of Network Information on the Management of Library E-Resources. CETS 2010: 234-237 - Qisheng Zhao, Fajie Wei, Shenghan Zhou:
The Consistency and Ranking Method Based on Comparison Linguistic Variable. CETS 2010: 318-326 - Shi Zheng, Wen Zheng, Xia Jin:
Comparative Study of Methods for Monitoring and Controlling a Regional Economic System. CETS 2010: 130-139 - Yinghong Zhong, Hongwei Liu:
A Research Methodology for Green IT Systems Based on WSR and Design Science: The Case of a Chinese Company. CETS 2010: 215-225 - Shumin Zhou, Bin Tang, Wen Li:
The Study of Address Tree Coding Based on the Maximum Matching Algorithm in Courier Business. CETS 2010: 38-45 - Marzia Zaman, Yawei Liang, Sohail M. Siddiqui, Tim Wang, Vincent Liu, Ceecee Lu:
E-business Technology and Strategy - International Conference, CETS 2010, Ottawa, Canada, September 29-30, 2010. Proceedings. Communications in Computer and Information Science 113, Springer 2010, ISBN 978-3-642-16396-8 [contents]
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-07 16:49 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint