Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 372 matches
- 2014
- Lei Zhang, Kuanquan Wang, Wangmeng Zuo, Changqing Gai:
G-Heart: A GPU-based System for Electrophysiological Simulation and Multi-modality Cardiac Visualization. J. Comput. 9(2): 360-367 (2014) - Ming Jiang, Taotao Zha, Xingqi Wang, Jingfan Tang, Chunming Wu:
A New Method For Text Location in News Video Based on Ant Colony Algorithm. J. Comput. 9(5): 1090-1095 (2014) - M'hamed B. Abidine, Belkacem Fergani:
A New Multi-Class WSVM Classification to Imbalanced Human Activity Dataset. J. Comput. 9(7): 1560-1565 (2014) - Shegufta Bakht Ahsan, Syeda Persia Aziz, M. Sohel Rahman:
Longest Common Subsequence Problem for Run-Length-Encoded Strings. J. Comput. 9(8): 1769-1775 (2014) - Hamada R. H. Al-Absi, Samir Brahim Belhaouari, Suziah Sulaiman:
A Computer Aided Diagnosis System for Lung Cancer based on Statistical and Machine Learning Techniques. J. Comput. 9(2): 425-431 (2014) - Abdel Ilah Alshbatat, Peter Vial, Prashan Premaratne, Le Chung Tran:
EEG-based Brain-computer Interface for Automating Home Appliances. J. Comput. 9(9): 2159-2166 (2014) - Teuku Yuliar Arif, Riri Fitri Sari:
Throughput Estimates for A-MPDU and Block ACK Schemes Using HT-PHY Layer. J. Comput. 9(3): 678-687 (2014) - Syed Mahfuzul Aziz, Mohammad S. Alam, Vijayan K. Asari, Manoranjan Paul, Mustafizur Rahman, Shuqun Zhang, Mohammad Ataul Karim:
Guest Editorial. J. Comput. 9(8): 1739-1742 (2014) - Shuoben Bi, Yin Shi, Lianghu Lu, Xiaowen Zeng:
Research on Natural Scene and Meteorological Environment in Virtual Rebuilding of the Prehistoric Settlement Sites. J. Comput. 9(10): 2435-2442 (2014) - Mike Brugge, Mohammed A. S. Khalid:
A Parameterizable NoC Router for FPGAs. J. Comput. 9(3): 519-528 (2014) - Shanyue Bu, Yue Zhang, Kun Yu:
A New Scheme for Range Queries over Encrypted Data. J. Comput. 9(11): 2656-2660 (2014) - Lai-Cheng Cao, Sheng Dong, Wei Han:
Enhancing Efficiency of Intrusion Detection Based on Intelligent Immune Method in MANET. J. Comput. 9(7): 1577-1581 (2014) - Salvatore Cavalieri, Ferdinando Chiacchio, Alberto Di Savia Puglisi:
Integrating KNX and OPC UA Information Model. J. Comput. 9(7): 1536-1541 (2014) - Ming Cen, Yuan Wei, Chunyang Wang, Yongfu Li:
Short-term Prediction Method of Resources Occupancy for LBS Guidance System. J. Comput. 9(11): 2545-2551 (2014) - Song Chai, Yubai Li, Jian Wang, Chang Wu:
A List Simulated Annealing Algorithm for Task Scheduling on Network-on-Chip. J. Comput. 9(1): 176-182 (2014) - Tianwei Che, Jianfeng Ma, Na Li, Chao Wang:
Access Control Capability Assessment Method Based on Security Entropy. J. Comput. 9(12): 2804-2808 (2014) - Fuei Pien Chee, Haider F. Abdul Amir:
Radiation Hardness Test of BJTs under Designated Application. J. Comput. 9(9): 2186-2190 (2014) - Yu-Li Chen:
A Study on Student Self-efficacy and Technology Acceptance Model within an Online Task-based Learning Environment. J. Comput. 9(1): 34-43 (2014) - Xiuqing Chen, Tianjie Cao, Mingxiang Zhu, Wenzhuo Liu, Yu Guo:
Traceability Attack Algorithm on EOHLCAP RFID Authentication Protocol. J. Comput. 9(4): 938-946 (2014) - Bing Chen, Hongzheng Fang, Haodong Ma, Huanzhen Fan, Li Ai:
Output Power Prediction Method of GEO Satellite Solar Array Based-on the Modified Equivalent Circuit Model. J. Comput. 9(10): 2481-2487 (2014) - Ke-Jia Chen, Jingyu Han, Yun Li:
HALLP: A Hybrid Active Learning Approach to Link Prediction Task. J. Comput. 9(3): 551-556 (2014) - Jinyan Chen, Gang Li:
Human Gait Identification Based on Difference Image. J. Comput. 9(11): 2744-2751 (2014) - Guanlin Chen, Shengquan Li, Xiaoyang Shen, Yujia Zhang, Gang Chen:
A Public Opinion Analysis System for Urban Management Information. J. Comput. 9(9): 2022-2028 (2014) - Chin-ling Chen, Cheng-yi Pan:
Dual Threshold Scheduling for VoIP Traffic on Downlink of WiMAX Networks. J. Comput. 9(11): 2712-2719 (2014) - Jiao Chen, Tianhong Pan, Yanqin Han:
Development of Multi-model for Cogeneration System Using Statistical Analysis. J. Comput. 9(11): 2580-2586 (2014) - Ning Chen, Xiao Qu, Weibing Weng, Xing Xu:
Design of Wind-solar Complementary Power System Based on Progressive Fuzzy Control. J. Comput. 9(6): 1378-1384 (2014) - Jinguang Chen, Ni Wang, Lili Ma, Tiantian Zhao:
Probability Hypothesis Density Filter Based on Gaussian-Hermite Numerical Integration. J. Comput. 9(5): 1096-1102 (2014) - Jie Chen, Jun Wang, Zhi-hu Tan, Changsheng Xie:
Recursive Updates in Copy-on-write File Systems - Modeling and Analysis. J. Comput. 9(10): 2342-2351 (2014) - Yifei Chen, Huaping Xu:
Comparisons of Speckle Noise Filtering Methods on Interferometric Synthetic Aperture Radar Images. J. Comput. 9(4): 908-915 (2014) - Li-fu Chen, Hongguang Xiao, Hai-Liang Wang, Yueguan Lin:
Research Development of High Precision Real-time Airborne InSAR System. J. Comput. 9(1): 189-195 (2014)
skipping 342 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-13 10:44 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint