![](https://dblp.dagstuhl.de/img/logo.ua.320x120.png)
![](https://dblp.dagstuhl.de/img/dropdown.dark.16x16.png)
![](https://dblp.dagstuhl.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
![search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Likely matches
- Jing Wang — disambiguation page
- Hai Jin 0001
Huazhong University of Science and Technology, School of Computer Science and Technology, Services Computing Technology and System Lab, Cluster and Grid Computing Lab, Wuhan, China - Jing Zhang — disambiguation page
- Jing Li — disambiguation page
- Licheng Jiao
Xidian University, Key Laboratory of Intelligent Perception and Image Understanding, Xi'an, China
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 2,935,412 matches
- 2025
- Shayea Aldossari:
Solving second order homogeneous differential equations in terms of Heun's general function. J. Symb. Comput. 126: 102347 (2025) - Alberto Alzati, Daniele Di Tullio, Manoj Gyawali, Alfonso Tortora:
A post-quantum key exchange protocol from the intersection of conics. J. Symb. Comput. 126: 102343 (2025) - Barbara Betti, Marta Panizzut, Simon Telen:
Solving equations using Khovanskii bases. J. Symb. Comput. 126: 102340 (2025) - Shaoshi Chen, Lixin Du, Manuel Kauers, Rong-Hua Wang:
Reduction-based creative telescoping for P-recursive sequences via integral bases. J. Symb. Comput. 126: 102341 (2025) - Julia Q. D. Du:
The deviation on cranks of partitions. J. Symb. Comput. 126: 102346 (2025) - Amir Hashemi, Mahshid Mirhashemi, Werner M. Seiler:
Machine learning parameter systems, Noether normalisations and quasi-stable positions. J. Symb. Comput. 126: 102345 (2025) - Mark van Hoeij:
Submodule approach to creative telescoping. J. Symb. Comput. 126: 102342 (2025) - George Spahn, Doron Zeilberger:
Enumerating seating arrangements that obey social distancing. J. Symb. Comput. 126: 102344 (2025) - Bertrand Teguia Tabuguia:
Arithmetic of D-algebraic functions. J. Symb. Comput. 126: 102348 (2025) - Qihao Cheng, Da Yan, Tianhao Wu, Lyuheng Yuan, Ji Cheng, Zhongyi Huang, Yang Zhou:
Efficient Enumeration of Large Maximal k-Plexes. EDBT 2025: 53-65 - Jonathan Fürst, Catherine Kosten, Farhad Nooralahzadeh, Yi Zhang, Kurt Stockinger:
Evaluating the Data Model Robustness of Text-to-SQL Systems Based on Real User Queries. EDBT 2025: 158-170 - Nikolai Merkel, Daniel Stoll, Ruben Mayer, Hans-Arno Jacobsen:
An Experimental Comparison of Partitioning Strategies for Distributed Graph Neural Network Training. EDBT 2025: 171-184 - Gyanendra Shrestha, Chutian Jiang, Sai Akula, Vivek Yannam, Anna Pyayt, Michael N. Gubanov:
Tabular Embeddings for Tables with Bi-Dimensional Hierarchical Metadata and Nesting. EDBT 2025: 92-105 - 2024
- Jean-Yves Gauthier:
Commande des convertisseurs électriques pour l'actionnement et l'acheminement de l'énergie. INSA de Lyon, France, 2024 - Jacob Benesty, Gongping Huang, Jingdong Chen, Ningning Pan:
Microphone Arrays. Springer 2024, ISBN 978-3-031-36973-5, pp. 1-223 - Jinyin Chen, Ximin Zhang, Haibin Zheng:
Attacks, Defenses and Testing for Deep Learning. Springer 2024, ISBN 978-981-97-0424-8, pp. 5-399 - Julio B. Clempner, Alexander S. Poznyak
:
Optimization and Games for Controllable Markov Chains - Numerical Methods with Application to Finance and Engineering. Springer 2024, ISBN 978-3-031-43574-4, pp. 1-327 - Jonah Gamba:
Deep Learning Models - A Practical Approach for Hands-On Professionals. Springer 2024, ISBN 978-981-99-9671-1, pp. 1-201 - James Hutson, Jason Lively, Bryan Robertson, Peter Cotroneo, Martin Lang:
Creative Convergence - The AI Renaissance in Art and Design. Springer 2024, ISBN 978-3-031-45126-3, pp. 1-237 - Volker Johanning:
Organization and Management of IT - The New Role of IT and the CIO in Digital Transformation. Springer 2024, ISBN 978-3-658-39571-1, pp. 1-194 - Xiangyu Kong, Jiayu Luo, Xiaowei Feng:
Process Monitoring and Fault Diagnosis Based on Multivariable Statistical Analysis. Springer 2024, ISBN 978-981-99-8774-0, pp. 1-300 - Jayshri S. Kulkarni, Arpan Desai, Heng-Tung Hsu, Brian A. Garner, Yang Li, Chow-Yen-Desmond Sim, Vigneswaran Dhasarathan:
Transparent and Flexible MIMO Antenna Technologies for 5G Applications - Transforming 5G with Transparent & Flexible MIMO Antennas. Springer 2024, ISBN 978-3-031-42485-4, pp. 1-204 - Dongsheng Li, Jianxun Lian, Le Zhang, Kan Ren, Tun Lu, Tao Wu, Xing Xie:
Recommender Systems - Frontiers and Practices. Springer 2024, ISBN 978-981-99-8963-8, pp. 1-280 - Jingjing Li, Lei Zhu, Zhekai Du:
Unsupervised Domain Adaptation - Recent Advances and Future Perspectives. Springer 2024, ISBN 978-981-97-1024-9, pp. 1-223 - Susan J. Lincke:
Information Security Planning - A Practical Approach, Second Edition. Springer 2024, ISBN 978-3-031-43117-3, pp. 3-445 - Axaykumar J. Mehta, Akash Modi:
Robust Sliding Mode Protocols for Formation of Quadcopter Swarm. Springer 2024, ISBN 978-981-99-9725-1, pp. 1-147 - Weina Niu, Xiaosong Zhang, Ran Yan, Jiacheng Gong:
Android Malware Detection and Adversarial Methods. Springer 2024, ISBN 978-981-97-1458-2, pp. 3-190 - Christof Paar, Jan Pelzl, Tim Güneysu:
Understanding Cryptography - From Established Symmetric and Asymmetric Ciphers to Post-Quantum Algorithms, Second Edition. Springer 2024, ISBN 978-3-662-69006-2, pp. 1-543 - Denis Panjuta, Jafar Jabbarzadeh:
Learning C# Through Small Projects. Springer 2024, ISBN 978-3-031-51913-0, pp. 1-391 - Stefanie Rinderle-Ma, Jürgen Mangler, Daniel Ritter:
Fundamentals of Information Systems Interoperability - Data, Services, and Processes. Springer 2024, ISBN 978-3-031-48321-9, pp. 1-265
skipping 2,935,382 more matches
loading more results
failed to load more results, please try again later
![](https://dblp.dagstuhl.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-15 17:53 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint