Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 33 matches
- 2017
- Shin-ya Kobayashi, Andrzej Piegat, Jerzy Pejas, Imed El Fray, Janusz Kacprzyk:
Hard and Soft Computing for Artificial Intelligence, Multimedia and Security, Selected, Revised Papers from the International Conference on Advanced Computer Systems, ACS 2016, Miȩdzyzdroje, Poland, 19-21 October 2016. Advances in Intelligent Systems and Computing 534, 2017, ISBN 978-3-319-48428-0 [contents] - 2016
- Wlodzimierz Bielecki, Marek Palkowski:
Loop Nest Tiling for Image Processing and Communication Applications. ACS 2016: 305-314 - Wlodzimierz Bielecki, Piotr Skotnicki:
Tile Merging Technique to Generate Valid Tiled Code by Means of the Transitive Closure of a Dependence Graph. ACS 2016: 315-327 - Janusz Bobulski:
Parallel Facial Recognition System Based on 2DHMM. ACS 2016: 258-265 - Nikolay Borgest, Maksim Korovin:
Ontological Approach Towards Semantic Data Filtering in the Interface Design Applied to the Interface Design and Dialogue Creation for the "Robot-Aircraft Designer" Informational System. ACS 2016: 93-101 - Robert Burduk, Paulina Heda:
Homogeneous Ensemble Selection - Experimental Studies. ACS 2016: 58-67 - Aleksandr Cariow, Galina Cariowa:
An Algorithm for the Vandermonde Matrix-Vector Multiplication with Reduced Multiplicative Complexity. ACS 2016: 185-194 - Leszek J. Chmielewski, Arkadiusz Orlowski, Maciej Janowicz:
A Study on Directionality in the Ulam Square with the Use of the Hough Transform. ACS 2016: 81-90 - Anna Derezinska, Marian Szczykulski:
Performance Evaluation of Impact of State Machine Transformation and Run-Time Library on a C# Application. ACS 2016: 328-340 - Luiza Fabisiak:
The Method of Evaluating the Usability of the Website Based on Logs and User Preferences. ACS 2016: 341-354 - Pawel Forczmanski:
Human Face Detection in Thermal Images Using an Ensemble of Cascading Classifiers. ACS 2016: 205-215 - Anna Grocholewska-Czurylo:
S-boxes Cryptographic Properties from a Statistical Angle. ACS 2016: 133-145 - Tomasz Hyla, Jerzy Pejas:
Non-standard Certification Models for Pairing Based Cryptography. ACS 2016: 167-181 - Tomasz Klasa, Imed El Fray:
Data Scheme Conversion Proposal for Information Security Monitoring Systems. ACS 2016: 156-166 - Agnieszka Konys:
Ontology-Based Approaches to Big Data Analytics. ACS 2016: 355-365 - Alexander V. Koval, Larisa S. Globa, Rina Novogrudska:
The Approach to Web Services Composition. ACS 2016: 293-304 - Mariusz Kubanek, Filip Depta, Dorota Smorawa:
System of Acoustic Assistance in Spatial Orientation for the Blind. ACS 2016: 266-277 - Marek Landowski:
Comparison of RDM Complex Interval Arithmetic and Rectangular Complex Arithmetic. ACS 2016: 49-57 - Andriy Luntovskyy:
Performance and Energy Efficiency in Distributed Computing. ACS 2016: 281-292 - Radoslaw Mantiuk:
Accuracy of High-End and Self-build Eye-Tracking Systems. ACS 2016: 216-227 - Dorota Oszutowska-Mazurek, Przemyslaw Mazurek:
Sensitivity of Area-Perimeter Relation for Image Analysis and Image Segmentation Purposes. ACS 2016: 238-248 - Jakub Peksinski, Grzegorz Mikolajczak, Janusz Pawel Kowalski:
The Use of the Objective Digital Image Quality Assessment Criterion Indication to Create Panoramic Photographs. ACS 2016: 195-204 - Andrzej Piegat, Marek Landowski:
On Fuzzy RDM-Arithmetic. ACS 2016: 3-16 - Marcin Pietras:
Hidden Markov Models with Affix Based Observation in the Field of Syntactic Analysis. ACS 2016: 17-26 - Olga Pilipczuk, Galina Cariowa:
Opinion Acquisition: An Experiment on Numeric, Linguistic and Color Coded Rating Scale Comparison. ACS 2016: 27-36 - Edward Pólrolniczak, Michal Kramarczyk:
Vocal Tract Resonance Analysis Using LTAS in the Context of the Singer's Level of Advancement. ACS 2016: 249-257 - Izabela Rejer:
Wavelet Transform in Detection of the Subject Specific Frequencies for SSVEP-Based BCI. ACS 2016: 146-155 - Izabela Rejer, Lukasz Cieszynski:
Subject-Specific Methodology in the Frequency Scanning Phase of SSVEP-Based BCI. ACS 2016: 123-132 - Walery Rogoza:
Deterministic Method for the Prediction of Time Series. ACS 2016: 68-80 - Walery Rogoza, Michal Zablocki:
A Weather Forecasting System Using Intelligent BDI Multiagent-Based Group Method of Data Handling. ACS 2016: 37-48
skipping 3 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-08-07 02:06 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint