


default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 480 matches
- 2015
- Michael Adjeisah
, Yi Yang, Lian Li:
Joint Filtering: Enhancing gesture and mouse movement in Microsoft Kinect application. FSKD 2015: 2528-2532 - Xiangdong An
, Nick Cercone:
A statistical model for predicting power demand peaks in power systems. FSKD 2015: 1022-1026 - Bahareh Ashenagar, Negar Foroutan Eghlidi, Ardavan Afshar, Ali Hamzeh
:
Team formation in social networks based on local distance metric. FSKD 2015: 946-952 - Julija Asmuss, Gunars Lauks:
Network traffic classification for anomaly detection fuzzy clustering based approach. FSKD 2015: 313-318 - Svetlana V. Asmuss
, Pavels Orlovs:
Upper and lower approximations of general aggregation operators based on fuzzy rough sets. FSKD 2015: 259-263 - Leqiang Bai, Yutao Wang:
Two-hop neighbor table tree routing algorithm for ZigBee networks. FSKD 2015: 2220-2224 - Riad Belkhatir:
A contribution to the automation and to the evaluation of open-system software architectures. FSKD 2015: 2225-2230 - Chen Bin, Guan YanYong:
Hesitant fuzzy soft sets and their applications in decision-making. FSKD 2015: 540-546 - Martin Bobák
, Ladislav Hluchý
, Viet D. Tran
:
Methodology for intercloud multicriteria optimization. FSKD 2015: 1786-1791 - Christian Bodenstein, Michael Tremer, Jonathan Overhoff, Rolf P. Würtz:
A smartphone-controlled autonomous robot. FSKD 2015: 2314-2321 - S. Ben Brahim, T. H. Vuong, Jacques David, Ridha Bouallegue
, Maria Pietrzak-David:
Feasibility study of wireless communication for the Double Fed Induction Machine. FSKD 2015: 2117-2121 - Miguel Angel Ramirez Canelón, Eliézer Colina Morles, Mariela Cerrada-Lozada:
Invertible singleton fuzzy models: application to petroleum production control systems. FSKD 2015: 547-552 - Shan Cao:
Approximation of fuzzy neural networks based on Choquet integral. FSKD 2015: 35-38 - Shan Cao:
Approximation of regular fuzzy neural networks based on Sugeno integral. FSKD 2015: 39-43 - Shan Cao:
Regularity of fuzzy measures on complete and separable metric spaces. FSKD 2015: 168-172 - Kairui Cao, Xiao Zhi Gao, Xing Wang, Hak-Keung Lam
, Jing Ma:
Stability analysis of T-S fuzzy PD, PI, and PID control systems. FSKD 2015: 351-355 - Donglin Cao, Yanping Lv, Dazhen Lin:
Minimum Information Quantity Partition based fast semantic feature subset selection. FSKD 2015: 692-699 - Zhong-Lin Chai:
Solving fuzzy relation equations with max-continuous t-norm composition graphically. FSKD 2015: 184-189 - Gaik-Yee Chan, Fang-Fang Chua, Chien-Sing Lee:
Fuzzy association rules vs fuzzy associative patterns in defending against web service attacks. FSKD 2015: 524-529 - Wen-Jer Chang, Feng-Ling Hsu:
Mamdani and Takagi-Sugeno fuzzy controller design for ship fin stabilizing systems. FSKD 2015: 345-350 - Yongjing Chao, Yingmei Wei, Xiaolei Du, Fang Yuan:
Alarm thresholds of threaten regions based on triangle mesh voxelization. FSKD 2015: 2475-2479 - Rui-Yang Chen:
Fog computing-based intelligent inference performance evaluation system integrated internet of thing in food cold chain. FSKD 2015: 879-886 - Deqiang Chen:
Anomaly detection boundary based on the moving averages of Markov chain model. FSKD 2015: 1532-1536 - Yen-Wei Chen, Dingye Chen, Xian-Hua Han, Xinyin Huang:
Generic and specific impression estimation of clothing fabric images based on machine learning. FSKD 2015: 1753-1757 - Lin Chen, Guilin Cai, Yang Nan:
PMM-SA: A performance monitor model for the large-scale system area network. FSKD 2015: 2174-2179 - Guoming Chen, Qiang Chen, Dong Zhang:
Metric learning for image steganalysis. FSKD 2015: 898-902 - Yen-Wei Chen, Akira Furukawa, Ayako Taniguchi, Tomoko Tateyama, Shuzo Kanasaki:
Automated assessment of small bowel motility function based on simple linear iterative clustering (SLIC). FSKD 2015: 1737-1740 - Ruey-Maw Chen, Shih-Che Huang:
Particle swarm optimization for scheduling problems by curve controlling based global communication topology. FSKD 2015: 1716-1720 - Jiawei Chen, Hongyan Liu, Jun He:
Predicting the influence of group buying on the restaurant's popularity by online reviews. FSKD 2015: 1068-1072 - Ken Chen, Zhe Liu, Meng Li, Kyoungho Choi:
Local random Mean-hash classifier based adaptive visual tracking. FSKD 2015: 2642-2647
skipping 450 more matches
loading more results
failed to load more results, please try again later

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-03-05 12:59 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint