Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 2,016 matches
- 2016
- Stefan Wagner:
A model and sensitivity analysis of the quality economics of defect-detection techniques. CoRR abs/1612.03785 (2016) - Stefan Wagner:
A literature survey of the quality economics of defect-detection techniques. CoRR abs/1612.04590 (2016) - Stefan Wagner, Helmut Fischer:
A Software Reliability Model Based on a Geometric Sequence of Failure Rates. CoRR abs/1612.03799 (2016) - Ji Liu, Shaoshuai Mou, A. Stephen Morse, Brian D. O. Anderson, Changbin Yu:
Request-Based Gossiping without Deadlocks. CoRR abs/1612.08463 (2016) - Ondrej Klíma, Libor Polák:
Syntactic Structures of Regular Languages. CoRR abs/1612.06247 (2016) - Francesco Conti, Robert Schilling, Pasquale Davide Schiavone, Antonio Pullini, Davide Rossi, Frank Kagan Gürkaynak, Michael Muehlberghuber, Michael Gautschi, Igor Loi, Germain Haugou, Stefan Mangard, Luca Benini:
An IoT Endpoint System-on-Chip for Secure and Energy-Efficient Near-Sensor Analytics. CoRR abs/1612.05974 (2016) - Andrew McGregor, Sofya Vorotnikova:
A Note on Logarithmic Space Stream Algorithms for Matchings in Low Arboricity Graphs. CoRR abs/1612.02531 (2016) - Daniël Reichman, Leslie M. Collins, Jordan M. Malof:
On Choosing Training and Testing Data for Supervised Algorithms in Ground Penetrating Radar Data for Buried Threat Detection. CoRR abs/1612.03477 (2016) - Zheng Xu, Soham De, Mário A. T. Figueiredo, Christoph Studer, Tom Goldstein:
An Empirical Study of ADMM for Nonconvex Problems. CoRR abs/1612.03349 (2016) - Zheng Xu, Furong Huang, Louiqa Raschid, Tom Goldstein:
Non-negative Factorization of the Occurrence Tensor from Financial Contracts. CoRR abs/1612.03350 (2016) - Dang Nguyen, Wei Luo, Dinh Q. Phung, Svetha Venkatesh:
Control Matching via Discharge Code Sequences. CoRR abs/1612.01812 (2016) - Matthias Keil, Peter Thiemann:
Transaction-based Sandboxing for JavaScript. CoRR abs/1612.00669 (2016) - Martin Becker, Florian Lemmerich, Philipp Singer, Markus Strohmaier, Andreas Hotho:
MixedTrails: Bayesian Hypotheses Comparison on Heterogeneous Sequential Data. CoRR abs/1612.07612 (2016) - Mohit Garg, Jaikumar Radhakrishnan:
Set membership with non-adaptive bit probes. CoRR abs/1612.09388 (2016) - Markus Wagner, Alexander Rind, Niklas Thür, Wolfgang Aigner:
A Knowledge-Assisted Visual Malware Analysis System: Design, Validation, and Reflection of KAMAS. CoRR abs/1612.06232 (2016) - Scott Aaronson, Lijie Chen:
Complexity-Theoretic Foundations of Quantum Supremacy Experiments. CoRR abs/1612.05903 (2016) - Omid Abari, Hariharan Rahul, Dina Katabi:
Over-the-air Function Computation in Sensor Networks. CoRR abs/1612.02307 (2016) - Houssam Abbas, Alëna Rodionova, Ezio Bartocci, Scott A. Smolka, Radu Grosu:
Regular Expressions for Irregular Rhythms. CoRR abs/1612.07770 (2016) - Masoud Abbaszadeh:
Is Lipschitz Continuity Preserved under Sampled-Data Discretization? CoRR abs/1612.08469 (2016) - Wim Abbeloos, Toon Goedemé:
Point Pair Feature based Object Detection for Random Bin Picking. CoRR abs/1612.01288 (2016) - Wim Abbeloos, Toon Goedemé:
Fusion of Range and Thermal Images for Person Detection. CoRR abs/1612.02183 (2016) - Wim Abbeloos, Toon Goedemé:
Exploring the potential of combining time of flight and thermal infrared cameras for person detection. CoRR abs/1612.02223 (2016) - Kareem E. Abdelfatah, Junshu Bao, Gabriel Terejanu:
Analytical Stacked Gaussian Process Model. CoRR abs/1612.02897 (2016) - Ahmed Abdelhadi, Haya Shajaiah:
Optimal Resource Allocation for Cellular Networks with MATLAB Instructions. CoRR abs/1612.07862 (2016) - Asim Abdulkhaleq, Stefan Wagner:
A controlled experiment for the empirical evaluation of safety analysis techniques for safety-critical software. CoRR abs/1612.00330 (2016) - Asim Abdulkhaleq, Stefan Wagner:
A Systematic and Semi-Automatic Safety-Based Test Case Generation Approach Based on Systems-Theoretic Process Analysis. CoRR abs/1612.03103 (2016) - Asim Abdulkhaleq, Stefan Wagner, Nancy Leveson:
A comprehensive safety engineering approach for software-intensive systems based on STPA. CoRR abs/1612.03109 (2016) - Ittai Abraham, Dahlia Malkhi, Kartik Nayak, Ling Ren, Alexander Spiegelman:
Solidus: An Incentive-compatible Cryptocurrency Based on Permissionless Byzantine Consensus. CoRR abs/1612.02916 (2016) - Felipe S. Abrahão:
Relativizing an incompressible number and an incompressible function through subrecursive extensions of Turing machines. CoRR abs/1612.05221 (2016) - Felipe S. Abrahão:
The "paradox" of computability and a recursive relative version of the Busy Beaver function. CoRR abs/1612.07400 (2016)
skipping 1,986 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-04 10:11 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint