default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 77 matches
- 2005
- Emmanuel Adam, René Mandiau:
A Hierarchical and by Role Multi-agent Organization: Application to the Information Retrieval. ISSADS 2005: 291-300 - Hilton José Silva de Azevedo, Edson Emílio Scalabrin:
Complexity in Collaborative Online Socio-Interationist Environments: A Good Reason for Distributed Systems. ISSADS 2005: 226-234 - Héctor Benítez-Pérez, A. García-Zavala, Fabián García Nocetti:
A Proposal for On-Line Reconfiguration Based upon a Modification of Planning Scheduler and Fuzzy Logic Control Law Response. ISSADS 2005: 141-152 - Alain Bui, Devan Sohier:
On Time Analysis of Random Walk Based Token Circulation Algorithms. ISSADS 2005: 63-71 - Clairton Buligon, Sérgio Luis Cechin, Ingrid Jansch-Pôrto:
Implementing Rollback-Recovery Coordinated Checkpoints. ISSADS 2005: 246-257 - Francisco Camargo-Santacruz, Juan Frausto Solís, Fernando Ramos-Quintana:
Modeling Multiple Interactions Using Coloured Petri Nets: A Case Study. ISSADS 2005: 182-193 - Roberto Gómez Cárdenas, Erika Mata Sanchez:
Security Challenges of Distributed e-Learning Systems. ISSADS 2005: 538-544 - Enrique Cauich, Roberto Gómez Cárdenas, Ryosuke Watanabe:
Data Hiding in Identification and Offset IP Fields. ISSADS 2005: 118-125 - Yen-Ting Chen, Ping-Yu Hsu:
An Efficient and Grain Preservation Mapping Algorithm: From ER Diagram to Multidimensional Model. ISSADS 2005: 331-346 - WoongChul Choi, Kwangsue Chung, Seung Hyong Rhee, Jin-Woong Cho:
WFCTA(Weighted Fair Channel Time Allocation) and Its Analysis for HR-WPAN. ISSADS 2005: 358-367 - WoongChul Choi, JinWoo Han, Byung Joon Park, Jiman Hong:
BCTMA(Bi-directional Cut-Through Medium Access) Protocol for 802.11-Based Multi-hop Wireless Networks. ISSADS 2005: 377-387 - WoongChul Choi, YongSuk Lee, Byung Joon Park, Kuk-Hyun Cho:
On Performance Improvement for 802.11-based Multi-hop Ad Hoc Wireless Networks. ISSADS 2005: 407-416 - Carlos A. Coello Coello:
An Introduction to Evolutionary Algorithms and Their Applications. ISSADS 2005: 425-442 - Hendrik Decker, Luis Irún-Briz, Francisco Castro-Company, Félix García-Neiva, Francesc D. Muñoz-Escoí:
Extending Wide-Area Replication Support with Mobility and Improved Recovery. ISSADS 2005: 10-20 - Hind Fadil, Jean-Luc Koning:
A Formal Approach to Model Multiagent Interactions Using the B Formal Method. ISSADS 2005: 516-528 - Eduardo B. Fernández, Saeed Rajput, Michael VanHilst, María M. Larrondo-Petrie:
Some Security Issues of Wireless Systems. ISSADS 2005: 388-396 - Hacène Fouchal, Sébastien Gruson, Ludovic Pierre, Cyril Rabat, Antoine Rollet:
Integrated Tool for Testing Timed Systems. ISSADS 2005: 153-166 - Christian P. García-Martinez, J. Antonio García-Macías:
Analysis of Context Transfer in Seamless IP Mobility. ISSADS 2005: 417-424 - Alexander F. Gelbukh, Namo Kang, Sangyong Han:
Combining Sources of Evidence for Recognition of Relevant Passages in Texts. ISSADS 2005: 283-290 - Fernando Godínez, Dieter Hutter, Raúl Monroy:
On the Role of Information Compaction to Intrusion Detection. ISSADS 2005: 83-97 - Miguel González-Mendoza, Neil Hernández-Gress, André Titli:
Quadratic Optimization Fine Tuning for the Learning Phase of SVM. ISSADS 2005: 347-357 - Horacio González-Vélez:
On the Abstraction of Message-Passing Communications Using Algorithmic Skeletons. ISSADS 2005: 43-50 - Victor-Polo de Gyves, Adolfo Guzmán-Arenas, Serguei Levachkine:
Extending Databases to Precision-Controlled Retrieval of Qualitative Information. ISSADS 2005: 21-32 - Emir Hammami, Thierry Villemur, Khalil Drira:
An Online Component Deployment System for Dynamic Collaborative Sessions. ISSADS 2005: 215-225 - Fabiano M. Hasegawa, Bráulio Coelho Ávila, Marcos Augusto Hochuli Shmeil:
A New Approach for Offer Evaluation in Multi-agent System Negotiation Based in Evidential Paraconsistent Logic. ISSADS 2005: 483-494 - Colombe Hérault, Sergiy Nemchenko, Sylvain Lecomte:
A Component-Based Transactional Service, Including Advanced Transactional Models. ISSADS 2005: 545-556 - Josué A. Hernández-García, Héctor M. Pérez Meana, Mariko Nakano-Miyatake:
Video Motion Detection Using the Algorithm of Discrimination and the Hamming Distance. ISSADS 2005: 321-330 - Xiaoqin Huang, Lin Chen, Linpeng Huang, Minglu Li:
An Identity-Based Model for Grid Security Infrastructure. ISSADS 2005: 258-266 - Ali R. Hurson, Yu Jiao:
Database System Architecture - A Walk Through Time: From Centralized Platform to Mobile Computing - Keynote Address. ISSADS 2005: 1-9 - Rodolfo Ibarra-Orozco, Neil Hernández-Gress, Juan Frausto Solís, Jaime Mora-Vargas:
Increasing the Training Speed of SVM, the Zoutendijk Algorithm Case. ISSADS 2005: 312-320
skipping 47 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-29 12:51 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint