Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 22 matches
- 2016
- Firdous Ahmad, Ghulam Mohiuddin Bhat, Hossein Khademolhosseini, Saeid Azimi, Shaahin Angizi, Keivan Navi:
Towards single layer quantum-dot cellular automata adders based on explicit interaction of cells. J. Comput. Sci. 16: 8-15 (2016) - Sandra Gómez Canaval, José-Ramón Sánchez-Couso, Meritxell Vinyals:
Solving optimization problems by using networks of evolutionary processors with quantitative filtering. J. Comput. Sci. 16: 65-71 (2016) - Eric M. Clark, Jake Ryland Williams, Chris A. Jones, Richard A. Galbraith, Christopher M. Danforth, Peter Sheridan Dodds:
Sifting robotic from organic text: A natural language approach for detecting automation on Twitter. J. Comput. Sci. 16: 1-7 (2016) - Salomón Cordero-Sánchez, Fernando Rojas-González, Graciela Román-Alonso, Miguel A. Castro-García, Miguel Aguilar Cornejo, J. Matadamas-Hernandez:
Pore networks subjected to variable connectivity and geometrical restrictions: A simulation employing a multicore system. J. Comput. Sci. 16: 177-189 (2016) - Raj Das, Paul W. Cleary:
Three-dimensional modelling of coupled flow dynamics, heat transfer and residual stress generation in arc welding processes using the mesh-free SPH method. J. Comput. Sci. 16: 200-216 (2016) - Steven Lawrence Fernandes, G. Josemin Bala:
ODROID XU4 based implementation of decision level fusion approach for matching computer generated sketches. J. Comput. Sci. 16: 217-224 (2016) - Adam P. Harrison, Dileepan Joseph:
Numeric tensor framework: Exploiting and extending Einstein notation. J. Comput. Sci. 16: 128-139 (2016) - Kelvin N. S. Heeroo, Oomesh Gukhool, Dristesh Hoorpah:
A Ludo Cellular Automata model for microscopic traffic flow. J. Comput. Sci. 16: 114-127 (2016) - Tomasz Korecki, Dariusz Palka, Jaroslaw Was:
Adaptation of Social Force Model for simulation of downhill skiing. J. Comput. Sci. 16: 29-42 (2016) - Sorina Costache Litescu, Vaisagh Viswanathan, Heiko Aydt, Alois C. Knoll:
The effect of information uncertainty in road transportation systems. J. Comput. Sci. 16: 170-176 (2016) - Jie Liu, Baomin Xu, Xiang Xu, Tinglin Xin:
A link prediction algorithm based on label propagation. J. Comput. Sci. 16: 43-50 (2016) - Frank Löffler, Zhou-Jian Cao, Steven R. Brandt, Zhihui Du:
A new parallelization scheme for adaptive mesh refinement. J. Comput. Sci. 16: 79-88 (2016) - Francisco Javier Martínez López, José Antonio Torres Arriaza, Sergio Martínez Puertas, María Mercedes Peralta López:
Multilevel neuronal architecture to resolve classification problems with large training sets: Parallelization of the training process. J. Comput. Sci. 16: 59-64 (2016) - Peng Luo, Yongli Li, Chong Wu, Kun Chen:
Detecting the missing links in social networks based on utility analysis. J. Comput. Sci. 16: 51-58 (2016) - Natalia B. Melnikova, David Jordan, Valeria V. Krzhizhanovskaya:
Corrigendum to "Experience of using FEM for real-time flood early warning systems: Monitoring and modelling Boston levee instability". J. Comput. Sci. 16: 225-226 (2016) - Pietro Prestininzi, Valentina Lombardi, Michele La Rocca:
Curved boundaries in multi-layer Shallow Water Lattice Boltzmann Methods: bounce back versus immersed boundary. J. Comput. Sci. 16: 16-28 (2016) - Pablo Racca, Roberto Casarin, Flaminio Squazzoni, Pierpaolo Dondio:
Resilience of an online financial community to market uncertainty shocks during the recent financial crisis. J. Comput. Sci. 16: 190-199 (2016) - C. G. Raji, S. S. Vinod Chandra:
Graft survival prediction in liver transplantation using artificial neural network models. J. Comput. Sci. 16: 72-78 (2016) - Rommel G. Regis:
Multi-objective constrained black-box optimization using radial basis function surrogates. J. Comput. Sci. 16: 140-155 (2016) - Philip W. Sharp, William I. Newman:
GPU-enabled N-body simulations of the Solar System using a VOVS Adams integrator. J. Comput. Sci. 16: 89-97 (2016) - Mateusz Sitko, Maciej Pietrzyk, Lukasz Madej:
Time and length scale issues in numerical modelling of dynamic recrystallization based on the multi space cellular automata method. J. Comput. Sci. 16: 98-113 (2016) - Gregory J. Streletz, Geoffrey Gebbie, Oliver Kreylos, Bernd Hamann, Louise H. Kellogg, Howard J. Spero:
Interpolating sparse scattered data using flow information. J. Comput. Sci. 16: 156-169 (2016)
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-26 08:52 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint