default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 148 matches
- 2013
- Ali Maroosi, Ravie Chandren Muniyandi:
A Hybrid Membrane Computing and Honey Bee Mating Algorithm as an Intelligent Algorithm for Channel Assignment Problem. BIC-TA 2013: 1021-1028 - Angelo Ciccazzo, Gianni Di Pillo, Vittorio Latorre:
Support Vector Machines for Real Consumer Circuits. BIC-TA 2013: 1199-1207 - Zhisheng Bi, Jiahai Wang, Jian Yin:
A Soft Subspace Clustering Algorithm Based on Multi-Objective Optimization and Reliability Measure. BIC-TA 2013: 239-247 - Huynh Thi Thanh Binh, Son Hong Ngo, Dat Ngoc Nguyen:
Genetic Algorithm for Solving Survivable Network Design with Simultaneous Unicast and Anycast Flows. BIC-TA 2013: 1237-1247 - Rui Cao:
Exact Solutions for the Compound KdV-Burgers Equation Using the Improved (G′/G)-Expansion Method. BIC-TA 2013: 189-194 - Nana Cao, Bin Lu:
Reflections on the Enterprise to Change Management Concept: In Perspective of Concept Innovation. BIC-TA 2013: 543-550 - Xiaomei Chang:
The Evaluation Model of Construction Industry Financial Risk Based on SVM. BIC-TA 2013: 37-44 - Qiong Chen:
Influence of Potential Parameters on the Melting Temperature of MgSiO3 Perovskite. BIC-TA 2013: 1139-1146 - Wei Chen, Hai-shun Deng:
Data Acquisition and Signal Processing for Endless Rope Continuous Tractor Monitoring. BIC-TA 2013: 661-667 - Hui Chen, Jiao Hu:
Image Feature Extraction Based on Support Vector Machine and Multi-DSP Combined Structure. BIC-TA 2013: 1123-1130 - Xiaokui Chen, Xinqing Lin:
Research and Implementation of CAPTCHA Based on Ajax. BIC-TA 2013: 471-476 - Ying Chen, Jin Tang, Bin Luo:
Image Representation and Recognition Based on Directed Complex Network Model. BIC-TA 2013: 985-993 - Guangzhou Chen, Jiaquan Wang, Chuanjun Li:
Investment Risk Evaluation of High-Tech Projects Based on Random Forests Model. BIC-TA 2013: 733-741 - Cai-Ping Chen, Shou-Jiang Zhao, Qiao-Jing Liu:
Hypothesis Testing for Squared Radial Ornstein-Uhleneck Model: Moderate Deviations Method. BIC-TA 2013: 171-178 - Shan Cheng, Min-You Chen, Gang Hu:
An Approach for Diversity and Convergence Improvement of Multi-Objective Particle Swarm Optimization. BIC-TA 2013: 495-503 - Zhen Cheng, Yufang Huang, Jianhua Xiao:
Algorithmic Tile Self-Assembly for Solving the Maximal Matching Problem. BIC-TA 2013: 845-854 - Zhuanlian Ding, Jin Tang, Xingyi Zhang, Bin Luo:
A Local Elitism Based Membrane Evolutionary Algorithm for Point Pattern Matching. BIC-TA 2013: 873-882 - Yafei Dong, Yanchai Wang, Jingjing Ma, Li Jia:
The Application of DNA Nanoparticle Conjugates on the Graph's Connectivity Problem. BIC-TA 2013: 257-265 - Chun Du, Jixiang Sun, Shilin Zhou, Jingjing Zhao:
An Outlier Detection Method for Robust Manifold Learning. BIC-TA 2013: 353-360 - Xinpeng Du, Xiang Xu, Lizhi Cheng:
DOA Estimation for Nonuniform Linear Arrays Using Root-MUSIC with Sparse Recovery Method. BIC-TA 2013: 385-392 - Ban-xiang Duan, Dong-hai Zeng:
Relaxed Two-Stage Multisplitting Algorithm for Linear Complementarity Problem. BIC-TA 2013: 551-558 - Xianwen Fang, Mimi Wang, Shenbing Wu:
A Method for Security Evaluation in Cloud Computing Based on Petri Behavioral Profiles. BIC-TA 2013: 587-593 - YueChun Feng, Hairong Wang:
Based on the M-GIS System Structure of the Intelligent Mobile Phone Positioning and Tracking System. BIC-TA 2013: 1249-1256 - Jing Gao:
Algorithm for Generating Decision Tree Based on Adjoint Positive Region. BIC-TA 2013: 415-424 - Gao-Xiang Gong, Zheng Yuan, Xiao Feng:
The Homomorphic Encryption Scheme of Security Obfuscation. BIC-TA 2013: 595-603 - Rongrong Gu, Kelei Sun, Wei Hao, Ping Ren:
Design of Gas Monitoring System Based On Embedded ZigBee Module. BIC-TA 2013: 777-783 - Juan Guo, Xianwen Fang, Dawei Zheng, Xiuyun Zhang:
Research on Credibility of Web Service Composition Based on Stochastic Petri Net. BIC-TA 2013: 965-973 - Aili Han, Zhen Li, Feilin Han:
An Improved Search Strategy for 8-Digits Puzzle. BIC-TA 2013: 815-823 - Wei Hao, Rongrong Gu, Kelei Sun, Ping Ren:
Efficiency of Parallel Computing Based on .Net 4.5. BIC-TA 2013: 131-138 - Jiangfeng Hao, Hailian Wang, Rulong Xie:
Boundedness for Multilinear Commutators of Calderón-Zygmund Operator on Herz-Hardy Spaces. BIC-TA 2013: 291-298
skipping 118 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-01-17 20:42 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint