default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 64 matches
- 2005
- Mustafa A. Abusalah, John Tait, Michael P. Oakes:
Literature Review of Cross Language Information Retrieval. WEC (2) 2005: 175-177 - Olivier Adam, Maciej Lopatka, Christophe Laplanche, Jean-François Motsch:
Sperm Whale Signal Analysis: Comparison Using the AutoRegressive Model and the Daubechies 15 Wavelets Transform. WEC (2) 2005: 188-195 - Ahmed Al-Ani:
Ant Colony Optimization for Feature Subset Selection. WEC (2) 2005: 35-38 - Mothd Belal Al-Daoud:
A New Algorithm for Cluster Initialization. WEC (2) 2005: 74-76 - Muhammad Almas Anjum, Muhammad Younus Javed, Abdul Basit:
Face Recognition Using Double Dimension Reduction. WEC (2) 2005: 43-46 - Taheri Asghar, Mohammad Reza Tarihi, Hassan Baghgar Bostan Abad, Hassan Bababeyk:
Fuzzy Hidden Markov Models for Speech Recognition on Based FEM Algorithm. WEC (2) 2005: 59-61 - Neeta Awasthy, Jai Prakash Saini, Digvijay Singh Chauhan:
Mfcc APplied Independent Component Analysis (MAPICA): A New Approach to Parametric Representation of Speech. WEC (2) 2005: 178-181 - Fadl Mutaher Ba-Alwi, Kamal Kant Bharadwaj:
Discovery of Production Rules with Fuzzy Hierarchy. WEC (2) 2005: 77-80 - Pablo Barrera, José María Cañas, Vicente Matellán:
Visual Object Tracking in 3D with Color Based Particle Filter. WEC (2) 2005: 200-203 - Abdul Basit, Muhammad Younus Javed, Muhammad Almas Anjum:
Efficient Iris Recognition Method for Human Identification. WEC (2) 2005: 24-26 - Ardhendu Behera, Denis Lalanne, Rolf Ingold:
Color and Layout-Based Identification of Documents Captured from Handheld Devices. WEC (2) 2005: 51-54 - Carlo Bellettini, Alessandro Marchetto, Andrea Trentini:
Validation of Reverse Engineered Web Application Models. WEC (2) 2005: 125-128 - Carlo Bellettini, Alessandro Marchetto, Andrea Trentini:
Multi-Dimensional Concerns Mining for Web Applications via Concept-Analysis. WEC (2) 2005: 129-132 - Mohammed Benbrahim, Adil Daoudi, Khalid Benjelloun, Aomar Ibenbrahim:
Discrimination of Seismic Signals Using Artificial Neural Networks. WEC (2) 2005: 4-7 - Vasudha Bhatnagar, Ahmed Sultan Al-Hegami, Naveen Kumar:
A Hybrid Approach for Quantification of Novelty in Rule Discovery. WEC (2) 2005: 39-42 - Federico Cabitza, Bernardo Dal Seno:
DJess - A Knowledge-Sharing Middleware to Deploy Distributed Inference Systems. WEC (2) 2005: 66-69 - Terrence Chen, Thomas S. Huang:
Region Based Hidden Markov Random Field Model for Brain MR Image Segmentation. WEC (2) 2005: 233-236 - Adil Daoudi, Mohammed Benbrahim, Khalid Benjelloun:
An Intelligent System to Classify Leaks in Water Distribution Pipes. WEC (2) 2005: 1-3 - A. P. Dhande, V. T. Ingole:
Design Of 3-Valued R-S & D Flip - Flops Based on Simple Ternary Gates. WEC (2) 2005: 62-65 - A. K. Abd El-Aleem, Waiel F. Abd El-Wahed, Nabil A. Ismail, Fawzy A. Torkey:
Efficiency Evaluation of E-Commerce Websites. WEC (2) 2005: 20-23 - Hazem M. El-Bakry, Qiangfu Zhao:
Sub-Image Detection Using Fast Neural Processors and Image Decomposition. WEC (2) 2005: 85-88 - Hazem M. El-Bakry, Qiangfu Zhao:
Fast Pattern Detection Using Neural Networks Realized in Frequency Domain. WEC (2) 2005: 89-92 - Alberto Faro, Daniela Giordano, Francesco Maiorana:
Discovering Complex Regularities by Adaptive Self Organizing Classification. WEC (2) 2005: 27-30 - Alberto Faro, Daniela Giordano, Manuela Pennisi, Giacomo Scarciofalo, Concetto Spampinato, Francesco Tramontana:
A Fuzzy System to Analyze SIVD Diseases Using the Transcranial Magnetic Stimulation. WEC (2) 2005: 31-34 - Leon Fu, Xiangyang Xue:
A New Spectral-Based Approach to Query-by-Humming for MP3 Songs Database. WEC (2) 2005: 117-120 - Irina Georgescu:
Similarity of Fuzzy Choice Functions. WEC (2) 2005: 93-96 - Vincent Girondel, Laurent Bonnaud, Alice Caplier, Michèle Rombaut:
Belief Theory-Based Classifiers Comparison for Static Human Body Postures Recognition in Video. WEC (2) 2005: 237-240 - Wen-Xiang Gu, Zeng-yu Cai, Xin-mei Zhang, Gui-dong Jiang:
Creating or Destroying Objects Plan in the Graphplan Framework. WEC (2) 2005: 16-19 - Moez Ben Hadj Hamida, Yahya Slimani:
A Patricia-Tree Approach for Frequent Closed Itemsets. WEC (2) 2005: 253-256 - Sébastien Harasse, Laurent Bonnaud, Michel Desvignes:
People Counting in Transport Vehicles. WEC (2) 2005: 221-224
skipping 34 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-12-20 01:05 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint