


Остановите войну!
for scientists:
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 104 matches
- 2021
- Tomoko Kaneko, Nobukazu Yoshioka:
CC-Case-Safety and Security Engineering Methodology. Int. J. Syst. Softw. Secur. Prot. 12(1): 1-20 (2021) - Maheen Fatima, Haider Abbas
, Tahreem Yaqoob, Narmeen Shafqat, Zarmeen Ahmad, Raja Zeeshan, Muhammad Zia, Tauseef Rana, Shynar Mussiraliyeva:
A survey on common criteria (CC) evaluating schemes for security assessment of IT products. PeerJ Comput. Sci. 7: e701 (2021) - 2020
- Tianming Ni, Yue Shu, Hao Chang, Lin Lu, Guangzhen Dai, Shidong Zhu, Chengming Qu, Zhengfeng Huang:
CC-RTSV: Cross-Cellular Based Redundant TSV Design for 3D ICs. J. Circuits Syst. Comput. 29(11): 2050144:1-2050144:19 (2020) - Yingting Chen, Taro Kanno, Kazuo Furuta:
An Empirical Study of Underlying Cognitive Factors in Complex Problem-Solving Collaboration. IEEE ICCI*CC 2020: 210-214 - Bin Du, Yue Liu, Geliang Tian:
Improving Motor Imagery EEG Classification by CNN with Data Augmentation. IEEE ICCI*CC 2020: 111-118 - Thanh Hung Duong, Fengxiang Qiao, Jyh-haw Yeh, Yunpeng Zhang:
Prediction of Fatality Crashes with Multilayer Perceptron of Crash Record Information System Datasets. IEEE ICCI*CC 2020: 225-229 - Yifei Hu, Xiaonan Jing, Youlim Ko, Julia Taylor Rayz:
Misspelling Correction with Pre-trained Contextual Language Model. IEEE ICCI*CC 2020: 144-149 - Qingyuan Hu, Yi Zhang, Kanishka Misra, Julia Taylor Rayz:
Exploring Lexical Irregularities in Hypothesis-Only Models of Natural Language Inference. IEEE ICCI*CC 2020: 125-130 - Nariyoshi Chida, Yuhei Kawakoya, Dai Ikarashi, Kenji Takahashi, Koushik Sen:
Is stateful packrat parsing really linear in practice? a counter-example, an improved grammar, and its parsing algorithms. CC 2020: 155-166 - Jiangbo Ai, Yang Yang, Xing Xu, Jie Zhou, Heng Tao Shen:
CC-LSTM: Cross and Conditional Long-Short Time Memory for Video Captioning. ICPR Workshops (6) 2020: 353-365 - 2019
- Wei Ding, Tao Wu, Chengwang Liao, Jing Wang, Yong Jiang:
A High Resolution ADC Model Combined Pipeline and Sigma -Delta Oversampling Architecture. ICCI*CC 2019: 350-355 - Yuqing Gao, Wing W. Y. Ng, Ting Wang, Sam Kwong
:
Dual Denoising Autoencoder Feature Learning for Cancer Diagnosis. ICCI*CC 2019: 366-371 - Sutasinee Thovuttikul, Yoshimasa Ohmoto, Toyoaki Nishida:
Using First-and Third-person POV to Bridge Cultural Misunderstandings in Cognitive Learning System of Different Cultural Communication in Simulated Crowd. ICCI*CC 2019: 180-189 - Yingxu Wang, Tony Cai, Omar A. Zatarain:
Objects Detection and Recognition in Videos for Sequence Learning. ICCI*CC 2019: 211-216 - Ting Wang
, Wing W. Y. Ng, Wendi Li, Sam Kwong
, Jingde Li:
Broad Autoencoder Features Learning for Pattern Classification Problems. ICCI*CC 2019: 130-135 - Yingxu Wang, Konstantinos N. Plataniotis, Sam Kwong
, Henry Leung, Svetlana N. Yanushkevich
, Fakhri Karray, Ming Hou
, Newton Howard, Rodolfo A. Fiorini, Paolo Soda
, Edward W. Tunstel, Jianmin Wang, Shushma Patel
:
On Autonomous Systems: From Reflexive, Imperative and Adaptive Intelligence to Autonomous and Cognitive Intelligence. ICCI*CC 2019: 7-12 - Yingxu Wang, Omar A. Zatarain, Tony Tsai, Daniel Graves:
Sequence Learning for Images Recognition in Videos with Differential Neural Networks. ICCI*CC 2019: 117-122 - Takafumi Kubota, Yusuke Suzuki, Kenji Kono:
To unify or not to unify: a case study on unified builds (in WebKit). CC 2019: 42-52 - Takao Tsukutani, Noboru Yabuki, Kazuharu Hashitsume:
A plus type CC-based current-mode universal biquadratic circuit. ISPACS 2019: 1-2 - 2018
- Hiroaki Koma, Akira Yoshizawa, Taku Harada, Hirotoshi Iwasaki:
Evaluating the Influence of Ambient State of a Car on the Cognitive Distracted State of the Driver. ICCI*CC 2018: 387-392 - Nobuhiro Mizuno, Akira Yoshizawa, Akihiro Hayashi, Takeshi Kawashima:
Estimation of Drivers ' Awareness of Pedestrians. ICCI*CC 2018: 381-386 - Sou Nobukawa, Haruhiko Nishimura
, Teruya Yamanishi:
Emergent Patterns and Spontaneous Activity in Spiking Neural Networks with Dual Complex Network Structure. ICCI*CC 2018: 159-165 - Yudeng Qiao, Jun Peng, Wen Ye, Qingling Li, Yonglong Yang, Xiaoyuan Sun, Dedong Tang:
Application of Improved Intelligent PID Algorithm in High Precision Thermostatic Control in Trace Water Analyzer. ICCI*CC 2018: 440-447 - Geliang Tian, Yue Liu:
Study on Classification of Left-Right Hands Motor Imagery EEG Signals Based on CNN. ICCI*CC 2018: 324-329 - Yingxu Wang, Henry Leung, Marina L. Gavrilova
, Omar A. Zatarain, Daniel Graves, Jianhua Lu, Newton Howard, Sam Kwong
, Phillip C.-Y. Sheu
, Shushma Patel
:
A Survey and Formal Analyses on Sequence Learning Methodologies and Deep Neural Networks. ICCI*CC 2018: 6-15 - Tzung-Han Jeng, Yi-Ming Chen, Chien-Chih Chen, Chuan-Chiang Huang, Kuo-Sen Chou:
CC-Tracker: Interaction Profiling Bipartite Graph Mining for Malicious Network Activity Detection. DSC 2018: 1-8 - Yingxu Wang, Sam Kwong, Jerome Feldman, Newton Howard, Phillip C.-Y. Sheu, Bernard Widrow:
17th IEEE International Conference on Cognitive Informatics & Cognitive Computing, ICCI*CC 2018, Berkeley, CA, USA, July 16-18, 2018. IEEE Computer Society 2018, ISBN 978-1-5386-3360-1 [contents] - 2017
- Jie Liu, Ting Jin, Kejia Pan, Yi Yang, Yan Wu, Xin Wang:
An improved KNN text classification algorithm based on Simhash. IEEE ICCI*CC 2017: 92-95 - Niken Prasasti Martono, Takehiko Yamaguchi, Hayato Ohwada:
Early diagnosis of mild cognitive impairment: A case study in approaches to inductive-logic programming. IEEE ICCI*CC 2017: 262-267 - Nobuhiro Mizuno, Akira Yoshizawa, Akihiro Hayashi, Takahiro Ishikawa:
Detecting driver's visual attention area by using vehicle-mounted device. IEEE ICCI*CC 2017: 346-352
skipping 74 more matches
loading more results
failed to load more results, please try again later

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
retrieved on 2022-06-25 03:49 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint