default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 68 matches
- 2019
- Jinrong Bai, Qibin Shi:
Malware Detection Method based on Dynamic Variable Length API Sequence. ISCID (2) 2019: 285-288 - Chunlei Chai, Rui Zhao, Jinlei Shi, Jiawei Zhou, Zhen Yang:
The effect of road environment and type of vehicles on road rage in China. ISCID (2) 2019: 200-203 - Chunlei Chai, Jiawei Zhou, Rui Zhao, Zhen Yang:
Road rage influencing factors research based on the digital news text analysis. ISCID (2) 2019: 217-220 - Xue Chen, Zhibin Wu:
An optimization method to improve the worst consistency level of hesitant fuzzy linguistic preference relations. ISCID (2) 2019: 11-14 - Xuezhi Chi:
The Information Retrieval Model for Computer Crime Evidence Based on Domain Ontology. ISCID (2) 2019: 45-49 - Yuhong Chi, Yuxuan Yao, Laihong Hu, Jinying Wu:
Study of Via Optimization Problem Based on Estimation of Distribution Algorithm. ISCID (2) 2019: 84-88 - Jiashu Dai, Nan Yan:
A Kernelized Correlation Filter Tracker with Random Sampling Haar-Like Feature. ISCID (2) 2019: 176-179 - Guohua Deng, Chang Xu:
A Risk Assessment Method for Enterprise Cloud Accounting. ISCID (2) 2019: 172-175 - Tianmin Guan, Dezhu Zhao, Zhao Mei:
Design and Implementation of a Knowledge-Based Expert System Shell. ISCID (2) 2019: 204-207 - Yun He, Junmin Li:
The observability of T-S Fuzzy Boolean Control Networks. ISCID (2) 2019: 3-6 - Wen Hu, Meichao Song:
Research on Rice Evaluation Method Based on Multi-feature Fusion of Cross-media. ISCID (2) 2019: 54-59 - Zhipeng Huang, Dongfang Wang, Qia Xiong, Jinchen Lan, Gelan Zhu, Feixiang Qin:
Risk Assessment of Grid Cascading Failure Accident Chain Considering Typhoon Impact. ISCID (2) 2019: 255-258 - Ziquan Jiao, Xingming Fan, Xin Zhang:
Research on Battery State Tracking and Remaining Life Prediction Method Based on Improved Particle Filtering and Reformed Self-Adaptive Fusion Algorithms. ISCID (2) 2019: 99-102 - Ziquan Jiao, Xingming Fan, Yuxin Zheng, Xin Zhang:
Remaining Useful Life Prediction of Li-Ion Battery Combining Model-Based Method with Data-Driven Algorithms. ISCID (2) 2019: 103-106 - Chunxia Jin, Qiuchan Bai:
Short Text Clustering Algorithm Based on Frequent Closed Word Sets. ISCID (2) 2019: 267-270 - Chunxia Jin, Su Zhang:
Micro-blog Short Text Clustering Algorithm Based on Bootstrapping. ISCID (2) 2019: 264-266 - Jin Jin, Guoquan Zhang, Ying Pan:
Application of Rapid Modeling of Information Communication. ISCID (2) 2019: 68-70 - Jin Jin, Guoquan Zhang, Jianfu Zhou:
Algorithm of Mobile Communication Transmission Efficiency in Big Data. ISCID (2) 2019: 64-67 - Xiangxia Li, Fang Liu:
Random Walks with GMM Statistical Inference Algorithm for Segmentation of Ground Glass Opacity Pulmonary Nodules. ISCID (2) 2019: 225-228 - Lin Li, Yuxun Huang:
Research on the Smart Home-care services System of Chengdu Community based on "Internet+". ISCID (2) 2019: 185-188 - Wenju Li, Zihao Shen, Peigang Li:
Crack Detection of Track Plate Based on YOLO. ISCID (2) 2019: 15-18 - Hui Li, Jie Tang, Li Lin:
Design of digital Control High-voltage DC Power Supply. ISCID (2) 2019: 19-22 - Dong Li, Li Yan, Ying Liu, Qilin Yin, Shuangshuang Guo, Haijie Zheng:
Data quality improvement method based on data correlation for power Internet of Things. ISCID (2) 2019: 259-263 - Xiao Liang, Lixin Ma, Ningyu An, Dongxiao Jiang, Chenggang Li, Xiaona Chen, Lijiao Zhao:
Ontology Based Security Risk Model for Power Terminal Equipment. ISCID (2) 2019: 212-216 - Shuo Liu:
Application of Blockchain in IoT Data Trust and Information Available Technology. ISCID (2) 2019: 250-254 - Lifu Liu, Jiuwen Cao, Xuegang Huang:
High speed collision localization based on surface vibration processing. ISCID (2) 2019: 35-38 - Chunling Liu, Junwei Cheng, Ran Zhang:
An orthogonal mixed chaotic spread spectrum algorithm for satellite communication. ISCID (2) 2019: 235-240 - Fang Liu, Xiangxia Li, Lin Wang:
Exploring Cluster Stocks based on deep learning for Stock Prediction. ISCID (2) 2019: 107-110 - Songjiang Lou, Yanghui Ma, Wujie Zhou:
Manifold Smoothed Class-specific Discriminant Collaborative Representation for Face Recognition. ISCID (2) 2019: 180-184 - Bo Luan, Yunxu Sun, Cheng Tong, Yuanxian Liu, Hongshun Liu:
R-FCN Based Laryngeal Lesion Detection. ISCID (2) 2019: 128-131
skipping 38 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-01 00:44 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint