default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 42 matches
- 2012
- Adel Boukhadra, Karima Benachtba, Amar Balla:
Automatic Composition of Semantic Web Services-based Alignment of OWL-S. ICWIT 2012: 336-341 - Abdelkader Adla, Bakhta Nachet:
Multi-Agents Model for Web-based Collaborative Decision Support Systems. ICWIT 2012: 294-299 - Soraya Setti Ahmed, Sidi Mohamed Benslimane:
Reverse Engineering Process for Extracting Views from Domain Ontology. ICWIT 2012: 288-293 - Khalida Bensidi Ahmed, Adil Toumouh:
Effective Ontology Learning : Concepts' Hierarchy Building using Plain Text Wikipedia. ICWIT 2012: 170-178 - Aicha Boubekeur, Abdellah Chouarfia:
Discovery of Similar Blocks from Very Large-scale Ontologies. ICWIT 2012: 324-329 - Aissam Belghiat, Mustapha Bourahla:
From UML Class Diagrams to OWL Ontologies: A Graph Transformation Based Approach. ICWIT 2012: 330-335 - Idir Amine Amarouche, Djamal Benslimane:
Context Driven Mediation Service in Data-as-a-Service Composition. ICWIT 2012: 4-11 - Boussis Amel, Fahima Nader:
Urbanization of Information Systems with a Service Oriented Architecture According to the PRAXEME Approach - Application to the Information System of the National Social Insurance Fund (CNAS). ICWIT 2012: 102-111 - Mohamed Amine Chéragui:
Theoretical Overview of Machine translation. ICWIT 2012: 160-169 - Fatiha Barigou, Naouel Barigou, Baghdad Atmani:
Spam Detection System Combining Cellular Automata and Naïve Bayes Classifier. ICWIT 2012: 250-260 - Khadhir Bekki, Hafida Belbachir:
A Flexible Integration of Security Concern in Rule Based Business Process Modeling. ICWIT 2012: 222-231 - Sidahmed Benabderrahmane, Hayet Mekami:
Ontology-based Gene Set Enrichment Analysis Using an Efficient Semantic Similarity Measure and Functional Clustering. ICWIT 2012: 151-159 - Djamel Amar Bensaber, Mimoun Malki:
Model Driven Approach for Specifying WSMO Ontology. ICWIT 2012: 203-213 - Mohamed Amine Bentaallah, Mimoun Malki:
The Use of WordNets for Multilingual Text Categorization: A Comparative Study. ICWIT 2012: 121-128 - Lamia Berkani, Omar Nouali, Azeddine Chikh:
A Recommendation-based Approach for Communities of Practice of E-learning. ICWIT 2012: 270-275 - Karim Bouamrane, Hadj Ali Beghdadi, Naima Belayachi:
Towards a Numerical Model for the Representation of an Urban Transportation System. ICWIT 2012: 93-101 - Djelloul Bouchiha, Mimoun Malki:
Semantic Annotation of Web Services. ICWIT 2012: 60-69 - Hafida Bouziane, Belhadri Messabih, Abdallah Chouarfia:
Meta-Learning for Escherichia Coli Bacteria Patterns Classification. ICWIT 2012: 139-150 - Mohammed Chaoui, Mohamed Tayeb Laskri:
New Web Tool to Create Educational and Adaptive Courses in an E-Learning Platform Based Fusion of Web Resources. ICWIT 2012: 306-311 - Salim Chehida, Mustapha Kamel Rahmouni:
Security Requirements Analysis of Web Applications Using UML. ICWIT 2012: 232-239 - Mounira Chkiwa, Anis Jedidi:
Semantic Multimedia Search: The Case of SMIL Documents. ICWIT 2012: 70-82 - Khamsa Chouchane, Okba Kazar, Ahmed Aloui:
Agent-based Approach for Mobile Learning Using Jade-LEAP. ICWIT 2012: 300-305 - Khalissa Derbal, Kamel Boukhalfa, Zaia Alimazighi:
A Muti-Representation and Generalisation Based Webmapping Approach Using Multi-Agent System Predicates. ICWIT 2012: 83-92 - Lynda Djakhdjakha, Mounir Hemam, Zizette Boufaïda:
Foundations on Multi-Viewpoints Ontology Alignment. ICWIT 2012: 214-221 - Ala Djeddai, Hassina Seridi, Tarek Khadir:
An Approximation Approach for Semantic Queries of Naïve Users by a New Query Language. ICWIT 2012: 50-59 - Asma Hachemi, Mohamed Ahmed-Nacer:
Relations Extraction on Patterns Lacking of Resulting Context. ICWIT 2012: 282-287 - Hayet Djellali, Mohamed Tayeb Laskri:
Using Vector Quantization for Universal Background Model in Automatic Speaker Verification. ICWIT 2012: 112-120 - Fouad Henni, Baghdad Atmani:
Dynamic Web Service Composition. Use of Case Based Reasoning and AI Planning. ICWIT 2012: 22-29 - Amina Kemmar, Yahia Lebbah, Mohammed Ouali, Samir Loudni:
Complete and Incomplete Approaches for Graph Mining. ICWIT 2012: 312-317 - Ali Khebizi, Hassina Seridi-Bouchelaghem, Imed Chemakhi, Hychem Bekakria:
Service Substitution Analysis in Protocols Evolution Context. ICWIT 2012: 12-21
skipping 12 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-26 00:27 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint