default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 92 matches
- 2008
- Mercedes Amor, Lidia Fuentes, Juan A. Valenzuela:
Separating Learning as an Aspect in Malaca Agents. KES-AMSTA 2008: 505-515 - Nilar Aye, Fumio Hattori, Kazuhiro Kuwabara:
Bridging Semantic Gap in Distant Communication: Ontology-Based Approach. KES-AMSTA 2008: 252-260 - Grzegorz Bocewicz, Robert Wójcik, Zbigniew Antoni Banaszak:
Agvs Distributed Control Subject to Imprecise Operation Times. KES-AMSTA 2008: 421-430 - Mariusz Boryczka:
Ant Colony Programming with the Candidate List. KES-AMSTA 2008: 302-311 - Grazyna Brzykcy:
Data Integration in a System with Agents' Models. KES-AMSTA 2008: 162-171 - Ngot Phu Bui, Young-Tack Park, TaeChoong Chung:
A Scalable Framework for Distributed Ontologies. KES-AMSTA 2008: 242-251 - Longbing Cao, Dan Luo, Yanshan Xiao, Zhigang Zheng:
Agent Collaboration for Multiple Trading Strategy Integration. KES-AMSTA 2008: 361-370 - Chih-Chun Chen, Sylvia B. Nagl, Christopher D. Clack:
A Method for Validating and Discovering Associations between Multi-level Emergent Behaviours in Agent-Based Simulations. KES-AMSTA 2008: 1-10 - Pei-Lin Chen, Jen Yen:
A Color Set Web-Based Agent System for 2-Dimension Emotion Image Space. KES-AMSTA 2008: 113-121 - Jae Hyung Cho, Hyun Soo Kim, Hyung Rim Choi, Jae Un Jung:
Agent System for Online Ticket Resale. KES-AMSTA 2008: 614-623 - Sunghoon Cho, Moo-hun Lee, Bong-hoi Kim, Eui-In Choi:
A Recommendation Using Item Quality. KES-AMSTA 2008: 878-88 - Ireneusz Czarnowski, Piotr Jedrzejowicz, Izabela Wierzbowska:
An A-Team Approach to Learning Classifiers from Distributed Data Sources. KES-AMSTA 2008: 536-546 - M. Ali Akber Dewan, M. Julius Hossain, Oksam Chae:
Moving Object Detection and Classification Using Neural Network. KES-AMSTA 2008: 152-161 - Sylvia B. Encheva, Sharil Tumin:
On Drawing Conclusions in Presence of Inconsistent Data. KES-AMSTA 2008: 32-41 - Yingfang Fu, Jingsha He, Liangyu Luan, Guorui Li, Rong Wang:
A Key Management Scheme Combined with Intrusion Detection for Mobile Ad Hoc Networks. KES-AMSTA 2008: 584-593 - Taro Fukumoto, Syuusuke Kuribara, Hajime Sawamura:
An Integrated Argumentation Environment for Arguing Agents. KES-AMSTA 2008: 351-360 - Anne Håkansson, Ronald L. Hartung:
An Approach to Event-Driven Algorithm for Intelligent Agents in Multi-agent Systems. KES-AMSTA 2008: 411-420 - Ronald L. Hartung, Anne Håkansson:
Using Meta-agents to Reason with Multiple Ontologies. KES-AMSTA 2008: 261-270 - Hisashi Hayashi, Seiji Tokura, Fumio Ozaki, Miwako Doi:
Background Sensing Control for Planning Agents Working in the Real World. KES-AMSTA 2008: 11-20 - Aaron Hector, Frans Henskens, Michael Hannaford:
A Software Engineering Process for BDI Agents. KES-AMSTA 2008: 132-141 - Khin Haymar Saw Hla, YoungSik Choi, Jong Sou Park:
The Multi Agent System Solutions for Wireless Sensor Network Applications. KES-AMSTA 2008: 454-463 - Faten Ben Hmida, Wided Lejouad Chaari, Moncef Tagina:
Performance Evaluation of Multiagent Systems: Communication Criterion. KES-AMSTA 2008: 773-782 - YouSik Hong, Cheonshik Kim, Geuk Lee:
Study of Optimal Traffic Information Using Agents Techniques. KES-AMSTA 2008: 868-877 - Chung-Yuan Huang, Chia-Ying Cheng, Chuen-Tsai Sun:
Resource and Remembering Influences on Acquaintance Networks. KES-AMSTA 2008: 281-291 - Chung-Yuan Huang, Chia-Ying Cheng, Chuen-Tsai Sun:
Resource Limitations, Transmission Costs and Critical Thresholds in Scale-Free Networks. KES-AMSTA 2008: 485-494 - Chenn-Jung Huang, Yi-Ju Yang, Dian-Xiu Yang, You-Jia Chen, Hsiang-Yu Wei:
Realization of an Intelligent Frog Call Identification Agent. KES-AMSTA 2008: 93-102 - Kazunori Iwata, Nobuhiro Ito, Youhei Kaneda, Naohiro Ishii:
Complexity of Road Networks as Agents' Environments. KES-AMSTA 2008: 474-484 - Jason J. Jung, Kono Kim, Hojin Lee, Seongrae Park:
Are You Satisfied with Your Recommendation Service?: Discovering Social Networks for Personalized Mobile Services. KES-AMSTA 2008: 567-573 - JaeYoun Jung, Hyeon-Cheol Zin, Chonggun Kim:
A Study of Meta-Search Agent Based on Tags and Ontological Approach for Improving Web Searches. KES-AMSTA 2008: 192-202 - Eunyoung Kang, Hee Yong Youn, Ung-Mo Kim:
Mining Based Decision Support Multi-agent System for Personalized e-Healthcare Service. KES-AMSTA 2008: 733-742
skipping 62 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-24 08:01 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint