Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 191 matches
- 2004
- Hyunchul Ahn, Kyoung-Jae Kim, Ingoo Han:
Hybrid Genetic Algorithms and Case-Based Reasoning Systems. CIS 2004: 922-927 - Pierluigi Amodio, Ivonne Sgura:
High Order Finite Difference Schemes for the Solution of Elliptic PDEs. CIS 2004: 1-6 - Frederiko Stenio de Araújo, Karla Darlene Nempomuceno Ramos, Benjamín René Callejas Bedregal, Ivan Saraiva Silva:
Papílio Cryptography Algorithm. CIS 2004: 928-933 - Misook Bae, Buhyun Hwang:
Transaction Processing in Partially Replicated Databases. CIS 2004: 940-946 - Yongeun Bae, Chunkyun Youn, Ilyong Chung:
Application of the Hamiltonian Circuit Latin Square to the Parallel Routing Algorithm on 2-Circulant Networks. CIS 2004: 219-224 - Ran Baik, Sung Wook Baik:
A Design and Analysis of Circulant Preconditioners. CIS 2004: 245-251 - Sung Wook Baik, Jerzy W. Bala, Dae Woong Rhee:
An Agent Based Privacy Preserving Mining for Distributed Databases. CIS 2004: 910-915 - Zhenchuan Chai, Zhenfu Cao:
Factoring-Based Proxy Signature Schemes with Forward-Security. CIS 2004: 1034-1040 - Jiu Jun Chen, Ji Gao, Jun Hu, Bei Shui Liao:
Dynamic Mining for Web Navigation Patterns Based on Markov Model. CIS 2004: 806-811 - Lin Chen, Xiaoqin Huang, Jinyuan You:
Fair Tracing Without Trustees for Multiple Banks. CIS 2004: 1061-1066 - Bao-Xing Chen, Wenjun Xiao:
Optimal Designs of Directed Double-Loop Networks. CIS 2004: 19-24 - Zhide Chen, Hong Zhu:
General Public Key m-Out-of-n Oblivious Transfer. CIS 2004: 888-894 - Sehyeong Cho:
Dual-Source Backoff for Enhancing Language Models. CIS 2004: 407-412 - Jonghyun Park, Wan Hyun Cho, Soon-Young Park:
Deterministic Annealing EM and Its Application in Natural Image Segmentation. CIS 2004: 639-644 - Jonghwa Choi, Dongkyoo Shin, Won Heo, Dongil Shin:
Performance Evaluation of Numerical Integration Methods in the Physics Engine. CIS 2004: 238-244 - Byung-Jae Choi, Paul P. Wang, Seog-Hwan Yoo:
On the Implementation of a Biologizing Intelligent System. CIS 2004: 582-588 - Chunhong Cao, Wenhui Li:
The Geometric Constraint Solving Based on Mutative Scale Chaos Genetic Algorithm. CIS 2004: 324-329 - Xiaoling Dai, John C. Grundy:
Three Integration Methods for a Component-Based NetPay Vendor System. CIS 2004: 782-787 - Weizhong Dai, Teng Zhu:
A Nonlinear Finite Difference Scheme for Solving the Nonlinear Parabolic Two-Step Model. CIS 2004: 304-309 - Zhong-Shan Deng, Jing Liu:
Monte Carlo Simulation of the Effects of Large Blood Vessels During Hyperthermia. CIS 2004: 437-442 - Kyu B. Doh, Kyeongwha Kim, Jungho Ohn, Ting-C. Poon:
Information Security Based on Fourier Plane Random Phase Coding and Optical Scanning. CIS 2004: 819-824 - Liju Dong, Ge Yu:
An Efficient Iterative Optimization Algorithm for Image Thresholding. CIS 2004: 1079-1085 - Ye Du, Huiqiang Wang, Yonggang Pang:
HMMs for Anomaly Intrusion Detection. CIS 2004: 692-697 - Ahmed Ejaz, Kenneth Revett:
Utilizing Staging Tables in Data Integration to Load Data into Materialized Views. CIS 2004: 685-691 - Murat Ermis, Ozgur Koray Sahingoz, Füsun Ülengin:
An Agent Based Supply Chain System with Neural Network Controlled Processes. CIS 2004: 837-846 - Dongqing Feng, Lingjiao Dong, Minrui Fei, Tiejun Chen:
Genetic Algorithm Based Neuro-fuzzy Network Adaptive PID Control and Its Applications. CIS 2004: 330-335 - Yuxi Fu, Xiaoju Dong:
Formalizing the Environment View of Process Equivalence. CIS 2004: 336-345 - Cheng Fu, Zhengwei Qi, Jinyuan You:
A BioAmbients Based Framework for Chain-Structured Biomolecules Modelling. CIS 2004: 455-459 - Jing Gao, Jun Zhang:
Text Retrieval Using Sparsified Concept Decomposition Matrix. CIS 2004: 523-529 - George A. Gravvanis, Konstantinos M. Giannoutakis:
Solving Non-linear Finite Difference Systems by Normalized Approximate Inverses. CIS 2004: 111-117
skipping 161 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-25 03:41 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint