default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 76 matches
- 2012
- Thuneibat S. A., Ababneh M. S.:
Sigma-Delta Modulator Simulation and Analysis Using MatLab. Comput. Inf. Sci. 5(5): 76-80 (2012) - Hawrra Hassan Abass, Firas Mahdi Muhsin Al-Salbi:
Rotation and Scaling Image Using PCA. Comput. Inf. Sci. 5(1): 97-106 (2012) - Abbass S. Abbass, Aliaa A. A. Youssif, Atef Z. Ghalwash:
Hybrid-Based Compressed Domain Video Fingerprinting Technique. Comput. Inf. Sci. 5(5): 25-34 (2012) - Azizol Abdullah, Rohaya Latip, Wan Mohd Azraei Wan Mustapha:
Evaluation of an Economy-Based File Replication Strategy for Malaysian Research and Education Network (MYREN) Data Grid Model. Comput. Inf. Sci. 5(1): 62-76 (2012) - Rusli Abdullah, Amir Mohamed Talib:
Towards a Personal Knowledge Model (PKM) in Collaborative Environment of School Teachers' Community. Comput. Inf. Sci. 5(6): 50-57 (2012) - A. K. Akinwole, O. J. Emuoyibofarhe:
Performance Comparison of Mobile Ad Hoc Network Routing Protocol and Transmission Control Protocol. Comput. Inf. Sci. 5(4): 102-109 (2012) - Hend S. Al-Khalifa:
WCAG 2.0 Semi-automatic Accessibility Evaluation System: Design and Implementation. Comput. Inf. Sci. 5(6): 73-87 (2012) - Eisa Alanazi, Malek Mouhoub, Bandar Mohammed:
A Preference-Aware Interactive System for Online Shopping. Comput. Inf. Sci. 5(6): 33-42 (2012) - Abdallah Alashqur:
Using a Lattice Intension Structure to Facilitate User-Guided Association Rule Mining. Comput. Inf. Sci. 5(2): 11-21 (2012) - Sami M. Alhomod, Mohd Mudasir Shafi:
Privacy Policy in E Government Websites: A Case Study of Saudi Arabia. Comput. Inf. Sci. 5(2): 88-93 (2012) - Youyun Ao:
An Empirical Analysis of Fitness Assignment and Diversity-Preserving in Evolutionary Multi-Objective Optimization. Comput. Inf. Sci. 5(2): 111-128 (2012) - Nabil Arman:
A Materialized View for the Same Generation Query in Deductive Databases. Comput. Inf. Sci. 5(6): 1-5 (2012) - Raymond Aschheim, Smain Femmam, M. Faouzi Zerarka:
New "Graphiton" Model: a Computational Discrete Space, Self-Encoded as a Trivalent Graph. Comput. Inf. Sci. 5(1): 2-12 (2012) - Belkacem Athamena, Zina Houhamdi:
Structured Acceptance Test Suite Generation Process for Multi-Agent System. Comput. Inf. Sci. 5(1): 55-61 (2012) - Youssef Bassil, Mohammad Alwani:
Context-sensitive Spelling Correction Using Google Web 1T 5-Gram Information. Comput. Inf. Sci. 5(3): 37-48 (2012) - Pradip Kumar Biswas, Alberto Moreira Baptista:
Growth of ICT Capital and Deceleration of Labour Productivity in the EU Countries: The Missing Links. Comput. Inf. Sci. 5(5): 55-68 (2012) - Maged Bouchahma, Wanglin Yan:
Automatic Measurement of Shoreline Change on Djerba Island of Tunisia. Comput. Inf. Sci. 5(5): 17-24 (2012) - Majed Bouchahma, Wanglin Yan, Mohammed Ouessar:
Island Coastline Change Detection Based on Image Processing and Remote Sensing. Comput. Inf. Sci. 5(3): 27-36 (2012) - Jeff Butterfield, Thad Crews:
Casting a Wider Net: A Longitudinal Study Exploring Gender Differences, Influences and Attitudes Impacting Academic Major Selection in Computing. Comput. Inf. Sci. 5(2): 2-10 (2012) - Gary Cantrell, David A. Dampier, Yoginder S. Dandass, Nan Niu, A. Chris Bogen:
Research toward a Partially-Automated, and Crime Specific Digital Triage Process Model. Comput. Inf. Sci. 5(2): 29-38 (2012) - Arindam Chaudhuri:
Forecasting Financial Time Series Using Multiple Regression, Multi Layer Perception, Radial Basis Function and Adaptive Neuro Fuzzy Inference System Models: A Comparative Analysis. Comput. Inf. Sci. 5(6): 13-24 (2012) - Kaige Chen, Xiaojun Han, Tenghao Huang:
Target Detection Algorithm Based on the Movement of Codebook Model. Comput. Inf. Sci. 5(2): 49-54 (2012) - Justice G. Djokoto:
The Use of Farm Information Systems among Grasscutter Farmers in Ga-South Municipality and Awutu-Senya District in Ghana. Comput. Inf. Sci. 5(2): 55-68 (2012) - Marwa M. A. Elfattah, Aliaa A. A. Youssif, Ebada Sarhan Ahmed:
Handset Malwares Threats Feature Extraction Based on Behavior Analysis. Comput. Inf. Sci. 5(2): 79-87 (2012) - Moses Ekpenyong, Emem Obong Udoh:
Morpho-Syntactic Analysis Framework for Tone Language Text-to-Speech Systems. Comput. Inf. Sci. 5(4): 83-101 (2012) - Mohamed A. El-Zawawy, Nagwan Moustafa Daoud:
New Error-recovery Techniques for Faulty-Calls of Functions. Comput. Inf. Sci. 5(3): 67-75 (2012) - Mohamed A. El-Zawawy, Hamada A. Nayel:
Type Systems Based Data Race Detector. Comput. Inf. Sci. 5(4): 53-60 (2012) - Mina Elmaallam, Abdelaziz Kriouile:
A Model of Maturity for IS Risk Management Case Study. Comput. Inf. Sci. 5(3): 97-109 (2012) - Jingchun Feng, Fujie Zhang, Dandan Zhu, Fei Zhang:
Function Point Estimation and Demonstration on Website Projects. Comput. Inf. Sci. 5(3): 122-135 (2012) - Manuel Alberto M. Ferreira, Marina Andrade, José António Filipe:
The Age or Excess of the M|G|inf Queue Busy Cycle Mean Value. Comput. Inf. Sci. 5(5): 93-97 (2012)
skipping 46 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-30 09:57 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint