Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 498 matches
- 2008
- Tarek Abbes, Adel Bouhoula, Michaël Rusinowitch:
An inference system for detecting firewall filtering rules anomalies. SAC 2008: 2122-2128 - Sa'ed Abed, Otmane Aït Mohamed, Ghiath Al Sammane:
Reachability analysis using multiway decision graphs in the HOL theorem prover. SAC 2008: 333-338 - Rui Abreu, Alberto González, Peter Zoeteweij, Arjan J. C. van Gemund:
Automatic software fault localization using generic program invariants. SAC 2008: 712-717 - Raman Adaikkalavan, Sharma Chakravarthy:
Events must be complete in event processing! SAC 2008: 1038-1039 - Asmaa Adnane, Rafael T. de Sousa Jr., Christophe Bidan, Ludovic Mé:
Autonomic trust reasoning enables misbehavior detection in OLSR. SAC 2008: 2006-2013 - Cristiano M. Agulhari, Rosanna M. R. Silveira, Ivanil S. Bonatti:
Compressing electrocardiogram signals using parameterized wavelets. SAC 2008: 1348-1352 - Sheikh Iqbal Ahamed, Munirul M. Haque, Nilothpal Talukder:
Service sharing with trust in pervasive environment: now it's time to break the jinx. SAC 2008: 1622-1628 - Sheikh Iqbal Ahamed, Praveen Madiraju:
Special track on Middleware Engineering (ME): editorial message. SAC 2008: 479-480 - Sheikh Iqbal Ahamed, Farzana Rahman, Md. Endadul Hoque:
Secured tag identification using EDSA (enhanced distributed scalable architecture). SAC 2008: 1902-1907 - Kelson Rômulo Teixeira Aires, André M. Santana, Adelardo A. D. Medeiros:
Optical flow using color information: preliminary results. SAC 2008: 1607-1611 - Fahim Akhter, Lami Kaya:
Building secure e-business systems: technology and culture in the UAE. SAC 2008: 1474-1475 - Fahim Akhter, Lami Kaya, Ibrahim Kamel:
Special track on e-business applications: editorial message. SAC 2008: 1450-1451 - Abdulmalik Al-Gahmi, Jonathan E. Cook:
Towards a service-based middleware layer for runtime environments. SAC 2008: 507-511 - Mohammed Al-Mansari, Stefan Hanenberg, Rainer Unland:
On to formal semantics for path expression pointcuts. SAC 2008: 271-275 - Elvira Albert, Puri Arenas, Samir Genaim, Germán Puebla, Damiano Zanardini:
Removing useless variables in cost analysis of Java bytecode. SAC 2008: 368-375 - Jurandy Almeida, Anderson Rocha, Ricardo da Silva Torres, Siome Goldenstein:
Making colors worth more than a thousand words. SAC 2008: 1180-1186 - Virgílio A. F. Almeida, Jean-Marc Seigneur:
Fourth special track on Trust, Recommendations, Evidence and other Collaboration Know-how (TRECK'08): editorial message. SAC 2008: 1989 - Ernst Althaus, Stefan Canzar, Mark R. Emmett, Andreas Karrenbauer, Alan G. Marshall, Anke Meyer-Bäse, Huimin Zhang:
Computing H/D-exchange speeds of single residues from data of peptic fragments. SAC 2008: 1273-1277 - Carina Frota Alves, George Valença, Tayanna Sotero, Jeane Mendes:
Requirements engineering process improvement: a knowledge transfer experience. SAC 2008: 619-623 - Francesco Amato, Mario Cannataro, Carlo Cosentino, Francesco Montefusco, Giuseppe Tradigo, Pierangelo Veltri, Aldo Garozzo, Nicola Lombardo, Sergio Greco, Claudia Manfredi:
A web-based system for the collection and analysis of spectra signals for early detection of voice alterations. SAC 2008: 1405-1409 - Christoforos Anagnostopoulos, Niall M. Adams, David J. Hand:
Deciding what to observe next: adaptive variable selection for regression in multivariate data streams. SAC 2008: 961-965 - Davide Ancona, Alex Buckley:
Special track on Object-Oriented Languages and Systems: editorial message. SAC 2008: 158-159 - Björn Andersson:
The utilization bound of uniprocessor preemptive slack-monotonic scheduling is 50%. SAC 2008: 281-283 - César Andrés, Rafael G. Aranda, Manuel Núñez:
Using formal methods to develop a complex information system: a practical/theoretical experience. SAC 2008: 848-849 - June Andronick, Quang Huy Nguyen:
Certifying an embedded remote method invocation protocol. SAC 2008: 352-359 - Panagiotis Antonellis, Christos Makris, Nikos Tsirakis:
XEdge: clustering homogeneous and heterogeneous XML documents using edge summaries. SAC 2008: 1081-1088 - Grigoris Antoniou, Nikos Dimaresis, Guido Governatori:
A system for modal and deontic defeasible reasoning. SAC 2008: 2261-2265 - Anna Antony, Srilaxmi Basetty, Shielly Hartanto, Mathew J. Palakal:
Computational approach to biological validation of protein-protein interactions discovered using literature mining. SAC 2008: 1302-1306 - André L. L. de Aquino, Carlos Mauricio S. Figueiredo, Eduardo Freire Nakamura, Alejandro César Frery, Antonio Alfredo Ferreira Loureiro, Antônio Otávio Fernandes:
Sensor stream reduction for clustered wireless sensor networks. SAC 2008: 2052-2056 - Fabiana F. Araújo, Ângela M. A. Pinheiro, Kaio M. Farias, Bernadette Farias Lóscio, Diana M. Oliveira:
FlagelLink: a decision support system for distributed flagellar data using data warehouse. SAC 2008: 1268-1272
skipping 468 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-06 14:05 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint