default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 452 matches
- 2012
- Ziawasch Abedjan, Johannes Lorey, Felix Naumann:
Reconciling ontologies and the web of data. CIKM 2012: 1532-1536 - Daniar Achakeev, Bernhard Seeger, Peter Widmayer:
Sort-based query-adaptive loading of R-trees. CIKM 2012: 2080-2084 - Deepak Agarwal, Bee-Chung Chen, Xuanhui Wang:
Multi-faceted ranking of news articles using post-read actions. CIKM 2012: 694-703 - Arvind Agarwal, Hema Raghavan, Karthik Subbian, Prem Melville, Richard D. Lawrence, David Gondek, James Fan:
Learning to rank for robust question answering. CIKM 2012: 833-842 - Rakesh Agrawal, Douglas W. Oard, Nitendra Rajput:
First international workshop on information and knowledge management for developing region. CIKM 2012: 2774-2775 - Amr Ahmed, Mohamed Aly, Abhimanyu Das, Alexander J. Smola, Tasos Anastasakos:
Web-scale multi-task feature selection for behavioral targeting. CIKM 2012: 1737-1741 - Leman Akoglu, Hanghang Tong, Jilles Vreeken, Christos Faloutsos:
Fast and reliable anomaly detection in categorical data. CIKM 2012: 415-424 - Ismail Sengör Altingövde, Roi Blanco, Berkant Barla Cambazoglu, Rifat Ozcan, Erdem Sarigil, Özgür Ulusoy:
Characterizing web search queries that match very few or no results. CIKM 2012: 2000-2004 - Gianni Amati, Giuseppe Amodeo, Carlo Gaibisso:
Survival analysis for freshness in microblogging search. CIKM 2012: 2483-2486 - Hadi Amiri, Tat-Seng Chua:
Mining sentiment terminology through time. CIKM 2012: 2060-2064 - Yuan An, Xiaohua Hu, Il-Yeol Song:
Learning to discover complex mappings from web forms to ontologies. CIKM 2012: 1253-1262 - Ioannis Antonellis, Anish Das Sarma, Shaddin Dughmi:
Dynamic covering for recommendation systems. CIKM 2012: 26-34 - Andrés Aranda-Andújar, Francesca Bugiotti, Jesús Camacho-Rodríguez, Dario Colazzo, François Goasdoué, Zoi Kaoudi, Ioana Manolescu:
AMADA: web data repositories in the amazon cloud. CIKM 2012: 2749-2751 - Jaime Arguello, Robert Capra:
The effect of aggregated search coherence on search behavior. CIKM 2012: 1293-1302 - Anastasios Arvanitis, Antonios Deligiannakis, Yannis Vassiliou:
Efficient influence-based processing of market research queries. CIKM 2012: 1193-1202 - Nima Asadi, Jimmy Lin:
Fast candidate generation for two-phase document ranking: postings list intersection with bloom filters. CIKM 2012: 2419-2422 - Azin Ashkan, Charles L. A. Clarke:
Modeling browsing behavior for click analysis in sponsored search. CIKM 2012: 2015-2019 - Rawia Awadallah, Maya Ramanath, Gerhard Weikum:
PolariCQ: polarity classification of political quotations. CIKM 2012: 1945-1949 - Javad Azimi, Ruofei Zhang, Yang Zhou, Vidhya Navalpakkam, Jianchang Mao, Xiaoli Z. Fern:
Visual appearance of display ads and its effect on click through rate. CIKM 2012: 495-504 - Rohit Babbar, Ioannis Partalas, Éric Gaussier, Cécile Amblard:
On empirical tradeoffs in large scale hierarchical classification. CIKM 2012: 2299-2302 - Duck-Ho Bae, Seo Jeong, Sang-Wook Kim, Minsoo Lee:
Outlier detection using centrality and center-proximity. CIKM 2012: 2251-2254 - Kyoungman Bae, Youngjoong Ko:
An effective category classification method based on a language model for question category recommendation on a cQA service. CIKM 2012: 2255-2258 - Ricardo Baeza-Yates, Mounia Lalmas:
User engagement: the network effect matters! CIKM 2012: 1-2 - Bahman Bahmani, Ashish Goel, Rajendra Shinde:
Efficient distributed locality sensitive hashing. CIKM 2012: 2174-2178 - Raju Balakrishnan, Rushi P. Bhatt:
Real-time bid optimization for group-buying ads. CIKM 2012: 1707-1711 - Krisztian Balog, Robert Neumayer:
Hierarchical target type identification for entity-oriented queries. CIKM 2012: 2391-2394 - Patrick Bamba, Julien Subercaze, Christophe Gravier, Nabil Benmira, Jimi Fontaine:
The twitaholic next door.: scalable friend recommender system using a concept-sensitive hash function. CIKM 2012: 2275-2278 - Hichem Bannour, Céline Hudelot:
Hierarchical image annotation using semantic hierarchies. CIKM 2012: 2431-2434 - Zhuowei Bao, Benny Kimelfeld, Yunyao Li, Sriram Raghavan, Huahai Yang:
Gumshoe quality toolkit: administering programmable search. CIKM 2012: 2716-2718 - Zhifeng Bao, Henning Köhler, Liwei Wang, Xiaofang Zhou, Shazia Wasim Sadiq:
Efficient provenance storage for relational queries. CIKM 2012: 1352-1361
skipping 422 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-20 05:37 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint