Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 239 matches
- 2010
- Tarek Abudawood, Peter A. Flach:
The Advantages of Seed Examples in First-Order Multi-class Subgroup Discovery. ECAI 2010: 1113-1114 - Ibrahim Adeyanju, Nirmalie Wiratunga, Juan A. Recio-García, Robert Lothian:
Learning to Author Text with textual CBR. ECAI 2010: 777-782 - Xavier Aimé, Frédéric Fürst, Pascale Kuntz, Francky Trichet:
Improving the efficiency of ontology engineering by introducing prototypicality. ECAI 2010: 1081-1082 - Sandip Aine, P. P. Chakrabarti, Rajeev Kumar:
Contract Search: Heuristic Search under Node Expansion Constraints. ECAI 2010: 733-738 - Stéphane Airiau, Sandip Sen:
On the stability of an Optimal Coalition Structure. ECAI 2010: 203-208 - Alexandre Albore, Héctor Palacios, Hector Geffner:
Compiling Uncertainty Away in Non-Deterministic Conformant Planning. ECAI 2010: 465-470 - Meshrif Alruily, Aladdin Ayesh, Hussein Zedan:
Automatically Constructing Dictionaries for Extracting Meaningful Crime Information from Arabic Text. ECAI 2010: 1139-1140 - Isabelle Alvarez, Sophie Martin, Salma Mesmoudi:
Describing the Result of a Classifier to the End-User: Geometric-based Sensitivity. ECAI 2010: 835-840 - Carlos Ansótegui, Ramón Béjar, Cèsar Fernández, Francesc Guitart, Carles Mateu:
Solving Pseudo-Boolean Modularity Constraints. ECAI 2010: 867-872 - Ludovic Arnold, Hélène Paugam-Moisy, Michèle Sebag:
Unsupervised Layer-Wise Model Selection in Deep Neural Networks. ECAI 2010: 915-920 - Mina Aslani, Volker Haarslev:
Parallel TBox Classification in Description Logics - First Experimental Results. ECAI 2010: 485-490 - Franz Baader, Hongkai Liu, Anees ul Mehdi:
Verifying Properties of Infinite Sequences of Description Logic Actions. ECAI 2010: 53-58 - Yukino Baba, Fuyuki Ishikawa, Shinichi Honiden:
Extraction of Places Related to Flickr Tags. ECAI 2010: 523-528 - Thanasis Balafoutis, Kostas Stergiou:
Adaptive Branching for Constraint Satisfaction Problems. ECAI 2010: 855-860 - Alexandra Balahur, Ester Boldrini, Andrés Montoyo, Patricio Martínez-Barco:
Opinion Question Answering: Towards a Unified Approach. ECAI 2010: 511-516 - Matteo Baldoni, Cristina Baroglio, Elisa Marengo:
Behavior-Oriented Commitment-based Protocols. ECAI 2010: 137-142 - Mark Bartlett, Iain Bate, James Cussens:
Instruction Cache Prediction Using Bayesian Networks. ECAI 2010: 1099-1100 - Andreas Bauer, Patrik Haslum:
LTL Goal Specifications Revisited. ECAI 2010: 881-886 - Dorothea Baumeister, Jörg Rothe:
Taking the Final Step to a Full Dichotomy of the Possible Winner Problem in Pure Scoring Rules. ECAI 2010: 1019-1020 - Rolf Baxter, David M. Lane, Yvan R. Petillot:
Recognising Agent Behaviour During Variable Length Activities. ECAI 2010: 803-808 - Eric Beaudry, Froduald Kabanza, François Michaud:
Planning with Concurrency under Resources and Time Uncertainty. ECAI 2010: 217-222 - Salem Benferhat, Karim Tabia:
Min-based causal possibilistic networks: Handling interventions and analyzing the possibilistic counterpart of Jeffrey's rule of conditioning. ECAI 2010: 943-948 - Jordan Berg, Amy Greenwald, Victor Naroditskiy, Eric Sodomka:
A Knapsack-Based Approach to Bidding in Ad Auctions. ECAI 2010: 1013-1014 - Reinaldo A. C. Bianchi, Ramón López de Mántaras:
Case-Based Multiagent Reinforcement Learning: Cases as Heuristics for Selection of Actions. ECAI 2010: 355-360 - Stefano Bistarelli, Francesco Santini:
A Common Computational Framework for Semiring-based Argumentation Systems. ECAI 2010: 131-136 - Guido Boella, Dov M. Gabbay, Valerio Genovese, Leendert W. N. van der Torre:
Higher-Order Coalition Logic. ECAI 2010: 555-560 - Blai Bonet, Malte Helmert:
Strengthening Landmark Heuristics via Hitting Sets. ECAI 2010: 329-334 - Richard Booth, Yann Chevaleyre, Jérôme Lang, Jérôme Mengin, Chattrakul Sombattheera:
Learning conditionally lexicographic preference relations. ECAI 2010: 269-274 - Richard Booth, Thomas Andreas Meyer, Ivan José Varzinczak, Renata Wassermann:
Horn Belief Change: A Contraction Core. ECAI 2010: 1065-1066 - Rafael H. Bordini, Jomi Fred Hübner:
Semantics for the Jason Variant of AgentSpeak (Plan Failure and some Internal Actions). ECAI 2010: 635-640
skipping 209 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-23 22:47 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint