Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 69 matches
- 2015
- Addi Ait-Mlouk, Tarik Agouti, Fatima Gharnati, Badi Derbali:
A choice of relevant association rules based on multi-criteria analysis approach. ICTA 2015: 1-6 - Mohammed Aitdaoud, Fatima Zahra Guerss, Imane Lmati, Abdelouahed Namir, Mohammed Talbi, Habib Benlahmar, Naceur Achtaich, Khadija Douzi:
Standardized modeling learners ontology «SLMonto» to support interactive learning environment. ICTA 2015: 1-6 - Fawaz S. Al-Anzi, Dia AbuZeina:
Stemming impact on Arabic text categorization performance: A survey. ICTA 2015: 1-7 - Marco Alfonse, A. Ali, A. Samir Elons, Nagwa L. Badr, Magdy Aboul-Ela:
Arabic sign language benchmark database for different heterogeneous sensors. ICTA 2015: 1-9 - Nadia Aouiti, Mohamed Jemni, Sameer Semreen:
Arab gloss annotation system for Arabic Sign Language. ICTA 2015: 1-6 - Hanane Aznaoui, Said Raghay, Layla Aziz, Addi Ait-Mlouk:
A comparative study of routing protocols in WSN. ICTA 2015: 1-6 - Hamid Barkouk, El Mokhtar En-Naimi:
Performance analysis of the Vehicular Ad hoc Networks (VANET) routing protocols AODV, DSDV and OLSR. ICTA 2015: 1-6 - Fatema Zahra Benchara, Mohamed Youssfi, Omar Bouattane, Hassan Ouajji:
A mobile agent team works model for HPC big data analysis: Fuzzy logic application. ICTA 2015: 1-6 - Mohamed Boudchiche, Azzeddine Mazroui:
Evaluation of the ambiguity caused by the absence of diacritical marks in Arabic texts: Statistical study. ICTA 2015: 1-6 - Amel Bousrih, Zaki Brahmi:
Optimizing cost and response time for data intensive services' composition based on ABC algorithm. ICTA 2015: 1-6 - Yosra Bouzid, Mohamed Ali Khenissi, Mohamed Jemni:
Designing a game generator as an educational technology for the deaf learners. ICTA 2015: 1-6 - Raouf Chebka, Fathi Essalmi:
A crosswords game for deaf. ICTA 2015: 1-6 - Safae Cherdal, Salma Mouline:
A petri net model for a composed biological system. ICTA 2015: 1-6 - Rostom Mennour, Mohamed Batouche:
Drug discovery for breast cancer based on big data analytics techniques. ICTA 2015: 1-6 - Abdessamad Elboushaki, Rachida Hannane, Karim Afdel, Lahcen Koutti:
Efficient object matching using partial dominant orientation descriptor. ICTA 2015: 1-3 - Nihad Elghouch, Yassine Zaoui Seghroucheni, El Mokhtar En-Naimi, Badr Eddine El Mohajir, Mohammed Al Achhab:
An application to index the didactic resources in an adaptive learning system (ALS). ICTA 2015: 1-3 - Jamal Elhachimi, Zouhair Guennoun:
Spectrum allocation algorithms in a cognitive radio system. ICTA 2015: 1-5 - Islam Elkabani, Lama Hamandi, Rached N. Zantout, Simar Mansi:
Toward better web accessibility. ICTA 2015: 1-6 - Islam Elkabani, Rached N. Zantout:
A framework for helping the visually impaired learn and practice math. ICTA 2015: 1-5 - Sameh Ghallabi, Fathi Essalmi, Mohamed Jemni, Kinshuk:
Optimal composition of e-leaming personalization parameters. ICTA 2015: 1-4 - Wafa Ghemmaz, Fouzia Benchikha:
Instance matching based on discriminative property values. ICTA 2015: 1-6 - Dhaou Ghoul, Amr Helmy Ibrahim, Claude Audebert:
Rules-based grammatical and semantic disambiguation of the token "hattā" in Arabic. ICTA 2015: 1-6 - Riadh Ghribi, Lilia Cheniti-Belcadhi:
Towards feedback personalization in mobile assessment based on semantic web. ICTA 2015: 1-6 - Belhassen Guettat, Ramzi Farhat:
An approach to assist learners to identify their learning objectives in personal learning environment (PLE). ICTA 2015: 1-6 - Fahima Hajjej, Yousra Bendaly Hlaoui, Leila Jemni Ben Ayed:
Reverse engineering to create a generic workflow E-Assessment system. ICTA 2015: 1-6 - Monia Hamdi, Saber Mhiri:
Dynamic mesh router placement for connectivity maximization in wireless mesh networks. ICTA 2015: 1-6 - Rachida Hannane, Abdessamad Elboushaki, Karim Afdel:
An automatic video surveillance indexing based on facial feature descriptors. ICTA 2015: 1-6 - Abdelhay Haqiq, Bouchaib Bounabat:
Towards an approach for behavioral specification of reactive multi-agent system. ICTA 2015: 1-6 - Mohamed Hassan, Amr El Zawawi:
Wireless power transfer (Wireless lighting). ICTA 2015: 1-4 - Heyam Al Hayek, Phillip D. Youngblood:
Science communication in 3D virtual worlds: The science circle alliance in second life. ICTA 2015: 1-5
skipping 39 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-08 06:14 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint