default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 101 matches
- 2008
- Mahmoud Abu-Arr'a, Hussein Owaied:
An Architecture of Technology and Knowledge-based System for Automating the Products Design Processes. IKE 2008: 159-164 - Shafiq Ahmad, Asef Nazari, Mali Abdollahian, Panlop Zeephongsekul:
Fitting Burr XII Distribution to Continuous Positive Data Using Hybrid Search Method. IKE 2008: 546-552 - Elham Ahmadi:
Knowledge Management in a Sustainable Tourism Planning. IKE 2008: 441-444 - Atefeh Ahmadi, Hossein Golpasha:
Knowledge Management in a Sustainable Green Infrastructure. IKE 2008: 436-440 - Mehri Ahmadi, Naser Moharamnejad:
Time to paradigm shift: towards Environmentally Sustainable Transportation in Greater Tehran A. IKE 2008: 445-451 - Babak Akhgar, Fazilatur Rahman, Lukasz Jopek, Jawed I. A. Siddiqi, Sally Atkinson, Alberto Salvodeli, Doris Prato, Secondo Montrucchio, Federico Guella, Brian James, Mike Pinkerton, András Vilmos:
Leveraging StoLPaN host environment for Portable Diagnostic Health-Care Platform. IKE 2008: 411-416 - Babak Akhgar, Fazilatur Rahman, Lukasz Jopek, Jawed I. A. Siddiqi, Sally Atkinson, Alberto Salvodeli, Doris Prato, Secondo Montrucchio, Federico Guella, András Vilmos:
Establishing Mobile NFC Payment Systems and Future Prospect. IKE 2008: 404-410 - Moh'd Al-Zoubi, Hussam Al-Shorman, Yousef Jbara:
An Experimental Comparison of Five Association Rule Algorithms Using Synthetic and Real-World Datasets. IKE 2008: 61-66 - Rashid Ali, Mirza Mohd. Sufyan Beg:
User Feedback Based Metasearching Using Rough Set Theory. IKE 2008: 489-495 - Gregory Allard, Ali Orooji:
A Web-Based System for Programming Team Practice Management. IKE 2008: 83-89 - Mahmood Bahar, Parisa Hajiseyedjavadi, Azita Bahrami:
The Effects of Ultraviolet Radiation of Germicidal Lamp versus Arc Welding on Skin in Mice. IKE 2008: 399-403 - Kiavash Bahreini, Seyed Mohammad Hossein Mayboudi:
SQL or Algernon Queries. IKE 2008: 41-47 - Daniel Baller, Joshua Lospinoso, Anthony Johnson:
An Empirical Method for the Evaluation of Dynamic Network Simulation Methods. IKE 2008: 358-364 - S. Nazreen Begum, R. S. D. Wahida Banu:
The Knowledge-Management P 2/3 Model in KM for Hegher Education. IKE 2008: 577-582 - José Manuel Cardenas, Mauro Spínola:
Examining Organizational Memories For Ontology And Strategy Formulation. IKE 2008: 327-330 - Jesús Cardeñosa Lera, Carolina Gallardo:
A Knowledge-Based Method for Grammatical Knowledge Extraction Process. IKE 2008: 553-559 - Hilary Cheng, Yi-Chuan Lu, Calvin Sheu:
Using Agent-Based Method to Construct FKMS. IKE 2008: 230-236 - Arash Dailami, Azadeh Sahraeian:
Genetic Algorithms and Sustainable Architecture. IKE 2008: 475-480 - Kyumars Sheykh Esmaili, Mehdi Hosseini, Asreen Rostami, Hassan Abolhassani:
Evaluation of Test Collection Construction Methods: A Case Study. IKE 2008: 16-22 - Leona Fass:
Exploiting Collective Intelligence. IKE 2008: 133-139 - Billy D. Gaston, K. M. George:
Constructing Pseudo-Intersections to Map Unreliable Domain Specific Data Items Found in Disjoint Sets. IKE 2008: 272-278 - Thomas M. Gatton, Malrey Lee, Alton Hacigums, Yupeng Zhang:
A prototype automated knowledge acquisition system. IKE 2008: 170-175 - Jivika Govil, Jivesh Govil, Navkeerat Kaur, Harkeerat Kaur:
Management Information Systems - A Tool for Efficient Analysis. IKE 2008: 55-60 - Jivika Govil, Jivesh Govil, Navkeerat Kaur, Harkeerat Kaur:
An Overview of Data Grid and Grid Computing: The Next Generation Distributed Computing. IKE 2008: 217-222 - Jivika Govil, Jivesh Govil, Harkeerat Kaur, Navkeerat Kaur:
Data Authentication, Authorization and Access Control: Challenges, Mechanisms, and Policies. IKE 2008: 237-242 - Bhojaraju Gunjal, Hao Shi:
A Study of Knowledge Organisation System in Digital Libraries: An IRS Perspective. IKE 2008: 176-182 - Sundus Hamoodi, Asim El-Sheikh:
Culture Reflection in Arabic Websites. IKE 2008: 297-301 - Jiqing Han, Rongchun Gao:
Text-independent Speaker Identification Based on MAP Channel Compensation and Pitch-dependent Features. IKE 2008: 302-308 - Yashodhara V. Haribhakta, Parag A. Kulkarni:
Smart Text Categorization. IKE 2008: 567-570 - Ray R. Hashemi, Azita Bahrami, James LaPlant, Kenneth Thurber:
Discovery of Intent through the Analysis of Visited Sites. IKE 2008: 417-422
skipping 71 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-08-14 03:04 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint