


default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 25 matches
- 2014
- Vitaliy Pavlenko, Sergei Pavlenko, Viktor O. Speranskyy:
Noise Immunity Research for nonlinear dynamical Systems identification based on Volterra Model in frequency Domain. Int. J. Comput. 13(1): 34-41 (2014) - Igor Kononenko, Anna Kharazii:
The Methods of Selection of the Project Management Methodology. Int. J. Comput. 13(4): 240-247 (2014) - Viktor Artemenko
:
Agent-based Modeling of the E-Learning Users' Behavior. Int. J. Comput. 13(1): 61-69 (2014) - Hanna Balakhontseva, Jürgen Sieck:
Web-Server Application for Fast and robust Recognition of Exhibits in the Museum. Int. J. Comput. 13(3): 176-182 (2014) - Sergey D. Bushuyev, Magomed Zh. Ozdoyev:
Management of Projects for Organization Development on the Basis of Entrepreneurship. Int. J. Comput. 13(4): 221-226 (2014) - Daniel Caspari, Mircea Strutu, Lucas Riedhammer, Uwe Grossmann:
Sensor based Algorithms for dead Reckoning: a Comparison of two Approaches for Smartphones. Int. J. Comput. 13(1): 50-60 (2014) - Anatoliy J. Gaida, Tigran G. Grigorian, Yuriy N. Kharitonov, Volodymyr K. Koshkin:
The Project Management of water supply complexes Reconstruction on the Basis of Decision Support Systems. Int. J. Comput. 13(4): 257-263 (2014) - Ontje Helmich, Michael A. Herzog, Christian Neumann:
Seamless and Secure Integration of Socialmedia, E-portfolio and Alumn Services into University Information Architecture. Int. J. Comput. 13(2): 106-115 (2014) - Bassam A. Hussein, Kristin H. J. Hafseld:
Impact of Conformity, Commitment and Management Style on an Information System Project. Int. J. Comput. 13(4): 227-239 (2014) - Keisuke Kato, Vitaly Klyuev:
Password Protection: End User Security Behavior. Int. J. Comput. 13(1): 8-16 (2014) - Aleksandra Kawala-Janik, Jerzy Baranowski, Michal Podpora, Pawel Piatek, Mariusz Pelc:
Use of a Cost-Effective Neuroheadset Emotiv EPOC for Pattern Recognition Purposes. Int. J. Comput. 13(1): 25-33 (2014) - Yuriy P. Kondratenko, Volodymyr V. Korobko, Oleksiy V. Korobko, Oleksiy Moskovko:
Design of the fuzzy control System for the waste heat Utilization plants Driven by the thermoacoustic Engine. Int. J. Comput. 13(2): 88-96 (2014) - Alexey Lagunov, Darina Lagunova, Irina Berdennikova:
Cognitive System of the Hepatorenal Syndrome Screening in Persons with Alcohol Abuse. Int. J. Comput. 13(2): 132-140 (2014) - S. P. Malarvizhi, B. Sathiyabhama:
Enhanced Reconfigurable Weighted Association Rule Mining for Frequent Patterns of Web Logs. Int. J. Comput. 13(2): 97-105 (2014) - Agata Manolova, Krasimir Tonchev:
Study of two 3D Face Representation Algorithms using Range Image and Curvature-based Representations. Int. J. Comput. 13(1): 42-49 (2014) - Bakhta Meroufel, Ghalem Belalem:
Abstraction Checkpointing Levels: Problems and solutions. Int. J. Comput. 13(3): 158-169 (2014) - Christof Pieloth, Thomas R. Knösche, Burkhard Maess, Mirco Fuchs
:
Online Distributed Source localization from EEG/MEG Data. Int. J. Comput. 13(1): 17-24 (2014) - Omar S. Sonbul
, Alexander N. Kalashnikov:
Determining the Operating Distance of Air ultrasound Range finders: calculations and Experiments. Int. J. Comput. 13(2): 125-131 (2014) - Sergey A. Subbotin:
The Instance Selection method for Neuro-fuzzy Model synthesis. Int. J. Comput. 13(3): 170-175 (2014) - Marian Turek, Adam Sojda:
A fuzzy Pay-off method for Real option Valuation in determination of Mining Enterprise Value. Int. J. Comput. 13(4): 264-270 (2014) - Wolfgang Tysiak:
A Deeper Insight in some effects in Project Risk Management. Int. J. Comput. 13(4): 214-220 (2014) - Bohdan Y. Volochiy, Leonid Ozirkovskyi
, Oleksandr Shkiliuk, Andriy Mashchak:
Technique of Construction Models of Behavior Algorithms of Radio Electronic Complex System using the Scheme of Paths method. Int. J. Comput. 13(3): 183-190 (2014) - Carsten Wolff, Burkhard Igel, Uwe Lauschner:
A Structured Process for Transferring Academic Research into Innovation Projects - Pimes Case Study. Int. J. Comput. 13(4): 248-256 (2014) - Di Zhao:
Fast Solver for interior Point method of SVM Training by Parallel GMRES and HSS. Int. J. Comput. 13(2): 116-124 (2014) - Anbu Megelin star, Perumal Subburaj:
Wavelet shrinkage adaptive Histogram equalization for Medical Images. Int. J. Comput. 13(3): 191-196 (2014)
loading more results
failed to load more results, please try again later

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-03-05 21:58 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint