The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Spurious with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1958-1989 (15) 1990-1992 (19) 1993-1995 (23) 1996-1997 (33) 1998-1999 (48) 2000 (28) 2001 (34) 2002 (49) 2003 (57) 2004 (67) 2005 (82) 2006 (81) 2007 (114) 2008 (115) 2009 (66) 2010 (26) 2011 (30) 2012 (19) 2013 (26) 2014 (19) 2015 (20) 2016 (23) 2017 (23) 2018 (35) 2019 (38) 2020 (48) 2021 (62) 2022 (109) 2023 (114) 2024 (29)
Publication types (Num. hits)
article(662) incollection(6) inproceedings(780) phdthesis(4)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 646 occurrences of 515 keywords

Results
Found 1452 publication records. Showing 1452 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
15Ying Jie Zhu, Lillykutty Jacob On making TCP robust against spurious retransmissions. Search on Bibsonomy Comput. Commun. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
15Jun Otsuki, Hao San, Haruo Kobayashi 0001, Takanori Komuro, Yoshihisa Yamada, Aiyan Liu Reducing Spurious Output of Balanced Modulators by Dynamic Matching of I, Q Quadrature Paths. Search on Bibsonomy IEICE Trans. Electron. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
15Ramesh K. Pokharel, Kouji Wada, Osamu Hashimoto, Takeshi Takahashi Realization of Attenuation Poles, Spurious Resonance Suppression and Size Reduction by Microstrip SIR Loaded with Dielectric Rods. Search on Bibsonomy IEICE Trans. Electron. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
15David R. Bickel Probabilities of spurious connections in gene networks: application to expression time series. Search on Bibsonomy Bioinform. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
15Pasi Sarolahti, Markku Kojo Forward RTO-Recovery (F-RTO): An Algorithm for Detecting Spurious Retransmission Timeouts with TCP and the Stream Control Transmission Protocol (SCTP). Search on Bibsonomy RFC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
15Michael A. Greminger, Bradley J. Nelson A Deformable Object Tracking Algorithm Robust to Occlusions and Spurious Edges. Search on Bibsonomy ICRA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
15Fei Xin, Abbas Jamalipour TCP throughput performance and fairness in wireless networks under spurious timeouts. Search on Bibsonomy ICC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
15Vivek Tyagi, Christian Wellekens On desensitizing the Mel-Cepstrum to spurious spectral components for Robust Speech Recognition. Search on Bibsonomy ICASSP (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
15Shaojian Fu, Mohammed Atiquzzaman DualRTT: detecting spurious timeouts in wireless mobile environments. Search on Bibsonomy IPCCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
15Kun Tan, Qian Zhang 0001, Wenwu Zhu 0001 STODER: a robust and efficient algorithm for handling spurious retransmit timeouts in TCP. Search on Bibsonomy GLOBECOM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
15Sidi Mohamed Sedjelmaci Jebelean-Weber's algorithm without spurious factors. Search on Bibsonomy ICECS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
15Guido Nolte, Andreas Ziehe, Frank C. Meinecke, Klaus-Robert Müller Analyzing Coupled Brain Sources: Distinguishing True from Spurious Interaction. Search on Bibsonomy NIPS The full citation details ... 2005 DBLP  BibTeX  RDF
15Dinh-Tuan Pham, Frédéric Vrins, Michel Verleysen Spurious entropy minima for multimodal source separation. Search on Bibsonomy ISSPA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
15Yu-Chul Kim, Dong-Ho Cho Considering spurious timeout in proxy for improving TCP performance in wireless networks. Search on Bibsonomy Comput. Networks The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
15Ethan Blanton, Mark Allman Using TCP Duplicate Selective Acknowledgement (DSACKs) and Stream Control Transmission Protocol (SCTP) Duplicate Transmission Sequence Numbers (TSNs) to Detect Spurious Retransmissions. Search on Bibsonomy RFC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
15Nobo Komagata A solution to the spurious ambiguity problem for practical Combinatory Categorial Grammar parsers. Search on Bibsonomy Comput. Speech Lang. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
15Anthony V. Robins, Simon McCallum A robust method for distinguishing between learned and spurious attractors. Search on Bibsonomy Neural Networks The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
15Yu-Chul Kim, Dong-Ho Cho Considering spurious timeout in proxy for improving TCP performance in wireless networks. Search on Bibsonomy IEEE Commun. Lett. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
15Jörg Schüler, Rico Radeke, Ralf Lehnert On TCP Spurious Retransmission Timeout Probabilities for Independent Round Trip Times. Search on Bibsonomy MMB The full citation details ... 2004 DBLP  BibTeX  RDF
15Thierry E. Klein, Kin K. Leung, Richard Parkinson, Louis G. Samuel Avoiding spurious TCP timeouts in wireless networks by delay injection. Search on Bibsonomy GLOBECOM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
15Gerhard Friedrich Elimination of Spurious Explanations. Search on Bibsonomy ECAI The full citation details ... 2004 DBLP  BibTeX  RDF
15N. M. Chang, Kenneth R. Koedinger, Marsha C. Lovett The Impact of Spurious Correlations on Students' Problem-Solving. Search on Bibsonomy ICLS The full citation details ... 2004 DBLP  BibTeX  RDF
15Siu Chung Wong, Chi K. Michael Tse, K. C. Tam Spurious modulation on current-mode controlled DC/DC converters: an explanation for intermittent chaotic operation. Search on Bibsonomy ISCAS (5) The full citation details ... 2004 DBLP  BibTeX  RDF
15H. Bevan Thompson, Christopher C. Tisdell The nonexistence of spurious solutions to discrete, two-point boundary value problems. Search on Bibsonomy Appl. Math. Lett. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
15Langford B. White, Feng Rice, Angus Massie Spurious free dynamic range for a digitizing array. Search on Bibsonomy IEEE Trans. Signal Process. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
15Miguel A. Atencia Ruiz, Gonzalo Joya Caparrós, Francisco Sandoval Hernández Spurious Minima and Basins of Attraction in Higher-Order Hopfield Networks. Search on Bibsonomy IWANN (1) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
15Feng Rice, Langford B. White, Angus Massie Improving the spurious performance of a digitised array receiver. Search on Bibsonomy ICASSP (5) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
15Pasi Sarolahti Congestion control on spurious TCP retransmission timeouts. Search on Bibsonomy GLOBECOM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
15YuChul Kim, DongHo Cho Considering spurious timeout in proxy for improving TCP performance in wireless networks. Search on Bibsonomy GLOBECOM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
15Mohammad Taherzadeh-Sani, Reza Lotfi, Omid Shoaei An analytical approach to the estimation of the spurious-free dynamic range in pipeline A/D converters. Search on Bibsonomy ICECS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
15Andrei V. Gurtov, Reiner Ludwig Responding to Spurious Timeouts in TCP. Search on Bibsonomy INFOCOM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
15Shaojian Fu, Mohammed Atiquzzaman Modelling TCP Reno with spurious timeouts in wireless mobile environments. Search on Bibsonomy ICCCN The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
15Artur Wróblewski, Christian V. Schimpfle, Otto Schumacher, Josef A. Nossek Minimizing Spurious Switching Activities with Transistor Sizing. Search on Bibsonomy VLSI Design The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
15Ulrich Möller, Marc Ligges, Petra Georgiewa, Carolin Grünling, Werner A. Kaiser, Herbert Witte, Bernhard Blanz How to Avoid Spurious Cluster Validation? A Methodological Investigation on Simulated and fMRI Data. Search on Bibsonomy NeuroImage The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
15Stephen F. Siegel, George S. Avrunin Improving the Precision of INCA by Eliminating Solutions with Spurious Cycles. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF INCA, integer programming, cycles, finite-state verification
15Jorge A. Horas, Edgar A. Bea Distinguishing Spurious and Nominal Attractors Applying Unlearning to an Asymmetric Neural Network. Search on Bibsonomy Int. J. Neural Syst. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
15Artur Wróblewski, Florian Auernhammer, Josef A. Nossek Minimizing Spurious Switching Activities in CMOS Circuits. Search on Bibsonomy PATMOS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
15Malgorzata Steinder, Adarshpal S. Sethi Increasing robustness of fault localization through analysis of lost, spurious, and positive symptoms. Search on Bibsonomy INFOCOM The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
15Tilmann Trebst, Tomas Binnewies, Jürgen Helmcke, Fritz Riehle Suppression of spurious phase shifts in an optical frequency standard. Search on Bibsonomy IEEE Trans. Instrum. Meas. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
15Luís C. Freire, Jean-François Mangin Motion Correction Algorithms May Create Spurious Brain Activations in the Absence of Subject Motion. Search on Bibsonomy NeuroImage The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
15Bob Johnson Introduction to commentaries on "Spurious Coin: A History of Science, Management, and Technical Writing" by Bernadette Longo. Search on Bibsonomy ACM J. Comput. Documentation The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
15David Gaskill, Mary Been, Margaret Hundleby, Pete Praetorius A virtual conversation on Bernadette Longo's Spurious Coin: A History of Science, Management, and Technical Writing. Search on Bibsonomy ACM J. Comput. Documentation The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
15Michelle Trim Counterfeit capital: searching for a silver linig in Bernadette Longo's Spurious Coin. Search on Bibsonomy ACM J. Comput. Documentation The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
15Myung-Jun Choe High-Speed, Low-Spurious CMOS Analog -to -Digital Converter Search on Bibsonomy 2001   RDF
15Reiner Ludwig, Randy H. Katz The Eifel algorithm: making TCP robust against spurious retransmissions. Search on Bibsonomy Comput. Commun. Rev. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
15Anna Bartkowiak, Adam Szustalewicz Outliers - finding and classifying which genuine and which spurious. Search on Bibsonomy Comput. Stat. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
15Daniele Boffi, Franco Brezzi, Lucia Gastaldi On the problem of spurious eigenvalues in the approximation of linear elliptic problems in mixed form. Search on Bibsonomy Math. Comput. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
15Stephen F. Siegel, George S. Avrunin Improving the precision of INCA by preventing spurious cycles. Search on Bibsonomy ISSTA The full citation details ... 2000 DBLP  DOI  BibTeX  RDF INCA, integer programming, cycles, finite-state verification
15Artur Wróblewski, Christian V. Schimpfle, Josef A. Nossek Automated transistor sizing algorithm for minimizing spurious switching activities in CMOS circuits. Search on Bibsonomy ISCAS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
15Avanindra Madisetti, Alan Y. Kwentus, Alan N. Willson Jr. A 100-MHz, 16-b, direct digital frequency synthesizer with a 100-dBc spurious-free dynamic range. Search on Bibsonomy IEEE J. Solid State Circuits The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
15Gabor Pauler Development of a Neuro-Fuzzy approach for treating multimodal distributions and spurious clusters. Search on Bibsonomy Eur. J. Oper. Res. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
15Norman Ramsey Eliminating Spurious Error Messages Using Exceptions, Polymorphism, and Higher-Order Functions. Search on Bibsonomy Comput. J. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
15Keesook J. Han, Ahmed H. Tewfik Minimization of the Spurious Shot Boundaries Using Principal Components Decomposition and Progressive Nonlinear Filter. Search on Bibsonomy ICIP (4) The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
15Russell E. Radke, Aria Eshraghi, Terri S. Fiez A spurious-free delta-sigma DAC using rotated data weighted averaging. Search on Bibsonomy CICC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
15Seungjin Choi, Ruey-Wen Liu, Andrzej Cichocki A Spurious Equilibria-free Learning Algorithm for the Blind Separation of Non-zoer Skewness Signals. Search on Bibsonomy Neural Process. Lett. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
15Wen Ding, Nick Campbell 0001 Determining polarity of speech signals based on gradient of spurious glottal waveforms. Search on Bibsonomy ICASSP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
15Nong Sang, Sheng Zhong, Tianxu Zhang Robust point pattern relaxation matching with missing or spurious points and random errors. Search on Bibsonomy Visual Information Processing The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
15Satoshi Morinaga, Shuji Yoshizawa Control of Spurious Memories by Using Self-Coupling Weights. Search on Bibsonomy ICONIP The full citation details ... 1998 DBLP  BibTeX  RDF
15Shin Ishii Eliminating Spurious Memories in a Network of Chaotic Elements. Search on Bibsonomy J. Intell. Fuzzy Syst. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
15Sung-Ung Kwak, Bang-Sup Song, Kantilal Bacrania A 15-b, 5-Msample/s low-spurious CMOS ADC. Search on Bibsonomy IEEE J. Solid State Circuits The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
15Graeme Hirst Context as a Spurious Concept Search on Bibsonomy CoRR The full citation details ... 1997 DBLP  BibTeX  RDF
15Gopalasamy Athithan, Chandan Dasgupta On the problem of spurious patterns in neural associative memory models. Search on Bibsonomy IEEE Trans. Neural Networks The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
15Seungjin Choi, Ruey-Wen Liu A learning algorithm for the blind separation of non-zero skewness source signals with no spurious equilibria. Search on Bibsonomy ESANN The full citation details ... 1997 DBLP  BibTeX  RDF
15Devang Naik Using talker location to detect spurious utterances in desktop command and control. Search on Bibsonomy ICASSP The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
15Chuan-Yu Wang, Kaushik Roy 0001 Estimation of Maximum Power for Sequential Circuits Considering Spurious Transitions. Search on Bibsonomy ICCD The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
15Sung-Ung Kwak Low-Spurious Analog-to-Digital Conversion Using Multi-Stage Code-Error Calibration Search on Bibsonomy 1997   RDF
15Manuel García-Carpintero Sánchez-Miguel Two spurious varieties of compositionality. Search on Bibsonomy Minds Mach. The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
15A. A. Ezhov, Victor L. Vvedensky Object Generation with Neural Networks (When Spurious Memories are Useful). Search on Bibsonomy Neural Networks The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
15Andrea Trucco, Cinthya Ottonello, Vittorio Murino Spurious effects reduction by the reconstruction of acoustic images from bispectrum. Search on Bibsonomy ICIP (3) The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
15Germano C. Vasconcelos, Michael C. Fairhurst, David L. Bisset Efficient Detection of Spurious Inputs for Improving the Robustness of MLP Networks in Practical Applications. Search on Bibsonomy Neural Comput. Appl. The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
15Germano C. Vasconcelos, Michael C. Fairhurst, David L. Bisset Investigating feedforward neural networks with respect to the rejection of spurious patterns. Search on Bibsonomy Pattern Recognit. Lett. The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
15Romano Fantacci, Mauro Forti, A. Liberatore, Stefano Manetti, Mauro Marini Suppression of Spurious Responses for a Class of Neural Networks with Application to Telecommunications Problems. Search on Bibsonomy ISCAS The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
15Germano Crispim Vasconcelos An investigation of feedforward neural networks with respect to the detection of spurious patterns. Search on Bibsonomy 1995   RDF
15Douglas Mercer A 16-b D/A converter with increased spurious free dynamic range. Search on Bibsonomy IEEE J. Solid State Circuits The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
15S. A. Biriukov Spurious states detection and basin describing in feedforward neural networks. Search on Bibsonomy ICPR (2) The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
15Roger M. Records, Jai J. Choi Spurious Symptom Reduction in Fault Monitoring Using a Neural Network and Knowledge Base Hybrid System. Search on Bibsonomy AAAI The full citation details ... 1994 DBLP  BibTeX  RDF
15Richard B. Pember Numerical Methods for Hyperbolic Conservation Laws With Stiff Relaxation I. Spurious Solutions. Search on Bibsonomy SIAM J. Appl. Math. The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
15Eduardo R. Caianiello, Michele Ceccarelli, Maria Marinaro Can Spurious States Be Useful? Search on Bibsonomy Complex Syst. The full citation details ... 1992 DBLP  BibTeX  RDF
15J. Gavan Improved computation method for radio systems single-tone spurious prohibited frequencies list. Search on Bibsonomy IEEE Trans. Commun. The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
15Yves Crama, Pierre Hansen, Brigitte Jaumard Detection of spurious states of neural networks. Search on Bibsonomy IEEE Trans. Neural Networks The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
15Jehoshua Bruck, Vwani P. Roychowdhury On the number of spurious memories in the Hopfield model. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
15Giuseppe De Franco A mathematical model for the evaluation of spurious response interference in a superheterodyne receiver. Search on Bibsonomy Eur. Trans. Telecommun. The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
15J. David Schaffer, Larry J. Eshelman, Daniel Offutt Spurious Correlations and Premature Convergence in Genetic Algorithms. Search on Bibsonomy FOGA The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
15Eduardo D. Sontag, Héctor J. Sussmann Backpropagation Can Give Rise to Spurious Local Minima Even for Networks without Hidden Layers. Search on Bibsonomy Complex Syst. The full citation details ... 1989 DBLP  BibTeX  RDF
15Jacob Gavan Computation of single-tone spurious effects in radio communication systems. Search on Bibsonomy Proc. IEEE The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
15Mara Chibnik Algorithmic elimination of spurious nondeterminism from Mealy machines. Search on Bibsonomy SIGACT News The full citation details ... 1986 DBLP  DOI  BibTeX  RDF
15Wolf-Jürgen Beyn, Jens Lorenz Spurious solutions for discrete superlinear boundary value problems. Search on Bibsonomy Computing The full citation details ... 1982 DBLP  DOI  BibTeX  RDF
15Robert T. Watson, William A. Luther Frequency Tolerances and Spurious Emission Limitations. Search on Bibsonomy IEEE Trans. Commun. The full citation details ... 1981 DBLP  DOI  BibTeX  RDF
15J. Fikart Spurious Tones in Upconverters Caused by IF Signal Multiplication. Search on Bibsonomy IEEE Trans. Commun. The full citation details ... 1979 DBLP  DOI  BibTeX  RDF
8Tachio Terauchi Dependent types from counterexamples. Search on Bibsonomy POPL The full citation details ... 2010 DBLP  DOI  BibTeX  RDF interpolation, type inference, dependent types, counterexamples, intersection types
8Thao Dang 0001, Oded Maler, Romain Testylier Accurate hybridization of nonlinear systems. Search on Bibsonomy HSCC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF reachability computation, numerical analysis, non-linear systems
8Riccardo Poli Genetic programming theory. Search on Bibsonomy GECCO (Companion) The full citation details ... 2010 DBLP  DOI  BibTeX  RDF halting probability, program search spaces, genetic programming, theory
8Hagit Attiya, Eshcar Hillel Brief announcement: single-version permissive STM. Search on Bibsonomy PODC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF transactional memory, permissiveness
8Mangala Gowri Nanda, Monika Gupta 0002, Saurabh Sinha, Satish Chandra 0001, David Schmidt, Pradeep Balachandran Making defect-finding tools work for you. Search on Bibsonomy ICSE (2) The full citation details ... 2010 DBLP  DOI  BibTeX  RDF defect differencing, defect merging, defect prioritization, defect views, static analysis portal
8Maria Paula da Costa Couto Review of input determination techniques for neural network models based on mutual information and genetic algorithms. Search on Bibsonomy Neural Comput. Appl. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Input determination techniques, Genetic algorithms, Artificial neural networks, Mutual information
8Carlotta Domeniconi, Muna Al-Razgan Weighted cluster ensembles: Methods and analysis. Search on Bibsonomy ACM Trans. Knowl. Discov. Data The full citation details ... 2009 DBLP  DOI  BibTeX  RDF accuracy and diversity measures, data mining, subspace clustering, Cluster ensembles, text data, consensus functions
8Kenichi Fujibayashi, David Yu Zhang, Erik Winfree, Satoshi Murata Error suppression mechanisms for DNA tile self-assembly and their simulation. Search on Bibsonomy Nat. Comput. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Algorithmic self-assembly, Assembly errors, Branch migration, Protecting molecules, DNA self-assembly
8Alpa Jain, Panagiotis G. Ipeirotis A quality-aware optimizer for information extraction. Search on Bibsonomy ACM Trans. Database Syst. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Information Extraction, ROC curves
8Md. Abdul Hamid, Mohammad Abdullah-Al-Wadud, Choong Seon Hong, Oksam Chae, Sungwon Lee A robust security scheme for wireless mesh enterprise networks. Search on Bibsonomy Ann. des Télécommunications The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Wireless mesh enterprise networks, Malicious client detection, Key distribution, Communications security
8Stelios Krinidis, Vassilios Chatzis A Skeleton Family Generator via Physics-Based Deformable Models. Search on Bibsonomy IEEE Trans. Image Process. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
Displaying result #801 - #900 of 1452 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license