default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 235 matches
- 2010
- Raihan Al-Ekram, Richard C. Holt:
Optimal Tradeoff. FCS 2010: 153-159 - Omar AlHeyasat, Vladimier Luzhetski, Abdelwadood Mosleh:
Integer and Complex Fibonacci Data Models. FCS 2010: 219- - Bhupinder Singh Anand:
Does Resolving PvNP Require a Paradigm Shift? Part I: A Perspective. FCS 2010: 59-65 - Bhupinder Singh Anand:
Does Resolving PvNP Require a Paradigm Shift? Part II: The Main Problem and a Suggested Solution. FCS 2010: 66-71 - Bhupinder Singh Anand:
Does Resolving PvNP Require a Paradigm Shift? Part III: Consequences of a Sound, Algorithmic Interpretation of PA. FCS 2010: 72-80 - Kenichi Arai, Nobuaki Kondo, Hiroyuki Okazaki:
Formalization of Probability and Random Sampling on a Finite and Discrete Sample Space Using the Mizar Proof Checker. FCS 2010: 81-86 - Leemon C. Baird III, Dino Schweitzer:
Complexity of the Game of Sprouts. FCS 2010: 177-182 - Charles Balch:
Understanding Quantum Networking: Where Are We and What Can We Expect?. FCS 2010: 115-118 - Farahzad Behi, Matthew Del Buono:
Vectorizing Compilers and Manual Code Optimization for Application Domains. FCS 2010: 160-164 - V. Leela Teja Chegondi:
Meeting the Needs of Today's Traffic in Networks by Differentiated Delivery. FCS 2010: 35-40 - Yangjun Chen:
Recursive Graph Deduction and Reachability Queries. FCS 2010: 125-131 - Emanuele Covino, Giovanni Pani:
Template Metaprogramming, Partial Evaluation and Computational Complexity Classes. FCS 2010: 165-176 - Zoltán Ésik, Andreas Maletti:
Simulation vs. Equivalence. FCS 2010: 119-124 - Xiaolei Gao:
The Z Specification Refinement of Based on Tableau. FCS 2010: 87-90 - Farrokh Ghanatir, Hadi Abouhosseini, Amir Masoud Rahmani, Abolfazl Nazari:
Multiprocessor Independent Tasks Scheduling Using Modified Improved Harmony Search Algorithm. FCS 2010: 48-54 - Bogdan Ghit, Matei Gruber, Octavian Voicu, Florin Pop:
Antis: Another Tool for Identical or Similar Code Detection. FCS 2010: 41-47 - Weipeng Guo, Pei Li Zhou, Yongli Li:
The Extended Model of Rough Sets Theory Based on Panweighted Field and Panweighted Networks in the Meaning of Recursive. FCS 2010: 199-204 - Sabine Hummert, Stefan Schuster, Christian Hummert:
Batman - The Dark Knight: A Game Theoretical Approach. FCS 2010: 29-34 - Jaime Cerdá Jacobo, David De Roure:
A Graph-based Economical Dispatch Model. FCS 2010: 132-138 - Aleksandr Katkow, Agnieszka Ulfik:
Nature Inspired Arithmetic in Speed Independent Circuit. FCS 2010: 9-15 - Edayathu V. Krishnamurthy:
Swarming - A Classical Analog of Hardy's Quantum Gravity Computational Paradigm. FCS 2010: 103-108 - Masao Kumamoto, Eiji Miyano:
Optimal Distortion Embedding of Complete Binary Trees into Lines. FCS 2010: 16-21 - Ka Ming Kwong, Nga Kwok Liu, Pak Wai Chan:
LIDAR and Chaotic Oscillatory-based Neural Network for Wind Shear Forecasting. FCS 2010: 22-28 - Hans-Werner Lang:
A Characterization of the Chomsky Hierarchy by String Turing Machines. FCS 2010: 109-114 - Li Liu, Denghui Zhai:
Study on Typical Load Pattern in Power System and Bad Data Processing. FCS 2010: 96-102 - Dongsheng Liu, Mei Zhong, Shumin Shi, Yanbo Zhao:
An AST Plagiarism Detection Model for Procedural Programming Languages. FCS 2010: 187-191 - Bogdan Munteanu, Richard Borie:
Variations of the Vision-Based Pursuit-Evasion Problem on a Grid. FCS 2010: 139-144 - Thomas O'Neil, Scott Kerlin:
A Simple O(2sqrt(x)) Algorithm for Partition and Subset Sum. FCS 2010: 55-58 - Thomas Abraham Joseph Velankanni, Sherley Mary Lourdusawmy:
Ontology for Accounting. FCS 2010: 212-218 - Tai-Lung Wu, Justie Su-tzu Juan:
Optimal Edge Ranking of Ladder Graphs. FCS 2010: 145-152
skipping 205 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-16 19:02 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint