Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 237 matches
- 2013
- Wil M. P. van der Aalst:
A General Divide and Conquer Approach for Process Mining. FedCSIS 2013: 1-10 - Weronika T. Adrian, Antoni Ligeza, Grzegorz J. Nalepa:
Inconsistency Handling in Collaborative Knowledge Management. FedCSIS 2013: 1221-1226 - Vangel V. Ajanovski:
Integrated Model of a Social Navigation System with Self-adaptive Feedback Control Mechanism. FedCSIS 2013: 1063-1070 - Hakim Akeb, Adel Bouchakhchoukha, Mhand Hifi:
A Beam Search Based Algorithm for the Capacitated Vehicle Routing Problem with Time Windows. FedCSIS 2013: 329-336 - Ghadah Aldabbagh, Jaime Ramírez Castillo, Habib M. Fardoun:
Towards improved student placement and preparation methods on Information Technologies post-secondary education. FedCSIS 2013: 689-693 - Ossama S. Alshabrawy, Mohamed Elsayed Ghoneim, A. A. Salama, Aboul Ella Hassanien:
Underdetermined Blind Separation of an Unknown Number of Sources Based on Fourier Transform and Matrix Factorization. FedCSIS 2013: 19-25 - Sergey Anfinogenov:
Design of Digital Watermarking System Robust to the Number of Removal Attacks. FedCSIS 2013: 523-527 - Ahmed M. Anter, Ahmad Taher Azar, Aboul Ella Hassanien, Mohamed Abu ElSoud, Nashwa El-Bendary:
Automatic computer aided segmentation for liver and hepatic lesions using hybrid segmentations techniques. FedCSIS 2013: 193-198 - Uwe Arnold, Jan Oberländer, Björn Schwarzbach:
Advancements in Cloud Computing for Logistics. FedCSIS 2013: 1055-1062 - Thomas Arts, Alex Gerdes, Magnus Kronqvist:
Requirements on automatically generated random test cases. FedCSIS 2013: 1335-1342 - Ahmed H. Asad, Ahmad Taher Azar, Mohamed Mostafa M. Fouad, Aboul Ella Hassanien:
An Improved Ant Colony System for Retinal Blood Vessel Segmentation. FedCSIS 2013: 199-205 - José Andrés Asensio, Nicolás Padilla, Luis Iribarne:
Information Retrieval Using an Ontological Web-Trading Model. FedCSIS 2013: 243-249 - Ali Ismail Awad, Hossam M. Zawbaa, Hamdi A. Mahmoud, Eman Hany Hassan Abdel Nabi, Rabie Hassan Fayed, Aboul Ella Hassanien:
A Robust Cattle Identification Scheme Using Muzzle Print Images. FedCSIS 2013: 529-534 - Amira Sayed A. Aziz, Ahmad Taher Azar, Mostafa A. Salama, Aboul Ella Hassanien, Sanaa El-Ola Hanafy:
Genetic Algorithms with Different Feature Selection Techniques for Anomaly Detectors Generation. FedCSIS 2013: 769-774 - Mateusz Baran, Krzysztof Kluza, Grzegorz J. Nalepa, Antoni Ligeza:
A Hierarchical Approach for Configuring Business Processes. FedCSIS 2013: 915-921 - Katarzyna Barczewska, Aleksandra Drozd:
Comparison of methods for hand gesture recognition based on Dynamic Time Warping algorithm. FedCSIS 2013: 207-210 - Cezary Bartoszuk, Grzegorz Timoszuk, Robert Dabrowski, Krzysztof Stencel:
Magnify - a new tool for software visualization. FedCSIS 2013: 1473-1476 - Tommy Baumann, Bernd Pfitzinger, Thomas Jestädt:
Simulation driven design of the German toll system - profiling simulation performance. FedCSIS 2013: 923-926 - Lev Belava:
Concept of Platform for Hybrid Composition, Grounding and Execution of Web Services. FedCSIS 2013: 1071-1077 - Samujjwal Bhandari, Susan Darling Urban:
Conjunction, Sequence, and Interval Relations in Event Stream Processing. FedCSIS 2013: 1477-1482 - Andrzej Bialas:
How to Develop a Biometric System with Claimed Assurance. FedCSIS 2013: 775-780 - Halina Bielak, Michal Panczyk:
A quasi self-stabilizing algorithm for detecting fundamental cycles in a graph with DFS spanning tree given. FedCSIS 2013: 293-297 - Szymon Bobek, Krzysztof Porzycki, Grzegorz J. Nalepa:
Learning sensors usage patterns in mobile context-aware systems. FedCSIS 2013: 993-998 - Stanislav Böhm, Marek Behalek, Ondrej Meca, Martin Surkovský:
Visual Programming of MPI Applications: Debugging and Performance Analysis. FedCSIS 2013: 1483-1490 - Aleksandra Boniewicz, Piotr Wisniewski, Krzysztof Stencel:
On Redundant Data for Faster Recursive Querying Via ORM Systems. FedCSIS 2013: 1439-1446 - Christopher D. Buckingham, Abu Ahmed, Ann Adams:
Designing multiple user perspectives and functionality for clinical decision support systems. FedCSIS 2013: 211-218 - Beata Bylina, Jaroslaw Bylina:
Mixed precision iterative refinement techniques for the WZ factorization. FedCSIS 2013: 425-431 - Antonio Sarasa Cabezuelo, José Luis Sierra:
Grammar-Driven Development of JSON Processing Applications. FedCSIS 2013: 1545-1552 - Santiago García Carbajal, Belarmino Adenso-Díaz, Sebastián Lozano:
Bicriteria Fuzzy Optimization Location-Allocation Approach. FedCSIS 2013: 315-319 - Jan Chircop, Christopher D. Buckingham:
The Multiple Pheromone Ant Clustering Algorithm and its application to real world domains. FedCSIS 2013: 27-34
skipping 207 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-04 10:44 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint