Movatterモバイル変換


[0]ホーム

URL:


Schloss Dagstuhl - Leibniz Center for Informatics
Joint Declaration:The freedom of science is at the heart of liberal, democratic societies. Without this freedom, it is impossible for scientific efforts to be geared toward gaining knowledge and facts. It is therefore extremely worrying that the scientific freedom is coming under increasing pressure in various regions of the world.(read more)
We've just launched a new service: our brand newdblp SPARQL query service. Read more about it inour latest blog post or try out some of the SPARQL queries linked on the dblp web pages below.
search dblp
search dblp

default search action

Authors:
  • no matches
  • waiting...
Venues:
  • no matches
  • waiting...
Publications:
  • no matches
  • waiting...
clear
ask others

ask others

31st SAC 2016: Pisa, Italy

SPARQL queries 

run query for this table of contents

or build your own?

Refine list

note

refinements active!

zoomed in on?? of?? records

    view refined list in

    export refined list as

    showing all?? records

    Volume I:Artificial intelligence and agents, distributed systems, and information systems:Computational biology and bioinformatics track

    Volume I:Artificial intelligence and agents, distributed systems, and information systems:Poster papers

    Volume I:Artificial intelligence and agents, distributed systems, and information systems:Computational intelligence and video & image analysis track

    Volume I:Artificial intelligence and agents, distributed systems, and information systems:Poster papers

    Volume I:Artificial intelligence and agents, distributed systems, and information systems:Evolutionary computation track

    Volume I:Artificial intelligence and agents, distributed systems, and information systems:Poster papers

    Volume I:Artificial intelligence and agents, distributed systems, and information systems:Student research competition paper

    Volume I:Artificial intelligence and agents, distributed systems, and information systems:Healthcare track

    Volume I:Artificial intelligence and agents, distributed systems, and information systems:Poster papers

    Volume I:Artificial intelligence and agents, distributed systems, and information systems:Student research competition paper

    Volume I:Artificial intelligence and agents, distributed systems, and information systems:Smart human computer interaction track

    Volume I:Artificial intelligence and agents, distributed systems, and information systems:Poster papers

    Volume I:Artificial intelligence and agents, distributed systems, and information systems:Student research competition paper

    Volume I:Artificial intelligence and agents, distributed systems, and information systems:Intelligent and interactive learning environments track

    Volume I:Artificial intelligence and agents, distributed systems, and information systems:Intelligent robotics and multi-agent systems track

    Volume I:Artificial intelligence and agents, distributed systems, and information systems:Poster papers

    Volume I:Artificial intelligence and agents, distributed systems, and information systems:Neuro computing and deep learning and continuous-time computing track

    Volume I:Artificial intelligence and agents, distributed systems, and information systems:Poster papers

    Volume I:Artificial intelligence and agents, distributed systems, and information systems:Student research competition paper

    Volume I:Artificial intelligence and agents, distributed systems, and information systems:The semantic web and applications track

    Volume I:Artificial intelligence and agents, distributed systems, and information systems:Poster papers

    Volume I:Artificial intelligence and agents, distributed systems, and information systems:Student research competition paper

    Volume I:Artificial intelligence and agents, distributed systems, and information systems:Cloud computing track

    Volume I:Artificial intelligence and agents, distributed systems, and information systems:Poster papers

    Volume I:Artificial intelligence and agents, distributed systems, and information systems:Student research competition paper

    Volume I:Artificial intelligence and agents, distributed systems, and information systems:Dependable and adaptive distributed systems track

    Volume I:Artificial intelligence and agents, distributed systems, and information systems:Poster papers

    Volume I:Artificial intelligence and agents, distributed systems, and information systems:Mobile computing and applications track

    Volume I:Artificial intelligence and agents, distributed systems, and information systems:Poster papers

    Volume I:Artificial intelligence and agents, distributed systems, and information systems:Student research competition paper

    Volume I:Artificial intelligence and agents, distributed systems, and information systems:Networking track

    Volume I:Artificial intelligence and agents, distributed systems, and information systems:Poster papers

    Volume I:Artificial intelligence and agents, distributed systems, and information systems:Wireless communications and networking track

    Volume I:Artificial intelligence and agents, distributed systems, and information systems:Poster papers

    Volume I:Artificial intelligence and agents, distributed systems, and information systems:Student research competition paper

    Volume I:Artificial intelligence and agents, distributed systems, and information systems:Web technologies track

    Volume I:Artificial intelligence and agents, distributed systems, and information systems:Poster papers

    Volume I:Artificial intelligence and agents, distributed systems, and information systems:Data mining track

    Volume I:Artificial intelligence and agents, distributed systems, and information systems:Poster papers

    Volume I:Artificial intelligence and agents, distributed systems, and information systems:Student research competition paper

    Volume I:Artificial intelligence and agents, distributed systems, and information systems:Data streams track

    Volume I:Artificial intelligence and agents, distributed systems, and information systems:Poster papers

    Volume I:Artificial intelligence and agents, distributed systems, and information systems:Student research competition paper

    Volume I:Artificial intelligence and agents, distributed systems, and information systems:Database theory, technology and applications track

    Volume I:Artificial intelligence and agents, distributed systems, and information systems:Poster papers

    Volume I:Artificial intelligence and agents, distributed systems, and information systems:Student research competition paper

    Volume I:Artificial intelligence and agents, distributed systems, and information systems:Information access and retrieval track

    Volume I:Artificial intelligence and agents, distributed systems, and information systems:Poster papers

    Volume I:Artificial intelligence and agents, distributed systems, and information systems:Social network and media analysis track

    Volume I:Artificial intelligence and agents, distributed systems, and information systems:Poster papers

    Volume I:Artificial intelligence and agents, distributed systems, and information systems:Student research competition paper

    Volume II:Software design and development, and system software and security:Enterprise application development and design track

    Volume II:Software design and development, and system software and security:Poster papers

    Volume II:Software design and development, and system software and security:Multicore software engineering, performance, applications and tools track

    Volume II:Software design and development, and system software and security:Poster papers

    Volume II:Software design and development, and system software and security:Requirement engineering track

    Volume II:Software design and development, and system software and security:Poster papers

    Volume II:Software design and development, and system software and security:Software architecture:theory, technology and applications track

    Volume II:Software design and development, and system software and security:Poster papers

    Volume II:Software design and development, and system software and security:Student research competition paper

    Volume II:Software design and development, and system software and security:Software engineering track

    Volume II:Software design and development, and system software and security:Poster papers

    Volume II:Software design and development, and system software and security:Student research competition paper

    Volume II:Software design and development, and system software and security:Service-oriented architecture and programming track

    Volume II:Software design and development, and system software and security:Software verification and testing track

    Volume II:Software design and development, and system software and security:Student research competition paper

    Volume II:Software design and development, and system software and security:Embedded systems track

    Volume II:Software design and development, and system software and security:Poster papers

    Volume II:Software design and development, and system software and security:Object oriented programming languages and systems track

    Volume II:Software design and development, and system software and security:Poster papers

    Volume II:Software design and development, and system software and security:Operating systems track

    Volume II:Software design and development, and system software and security:Poster papers

    Volume II:Software design and development, and system software and security:Practical aspects of high-level parallel programming track

    Volume II:Software design and development, and system software and security:Poster papers

    Volume II:Software design and development, and system software and security:Programming languages track

    Volume II:Software design and development, and system software and security:Poster papers

    Volume II:Software design and development, and system software and security:Reliable software technologies and communication middleware track

    Volume II:Software design and development, and system software and security:Poster papers

    Volume II:Software design and development, and system software and security:Computer security track

    Volume II:Software design and development, and system software and security:Student research competition paper

    Volume II:Software design and development, and system software and security:Smart grid and smart technologies track

    Volume II:Software design and development, and system software and security:Poster papers

    Volume II:Software design and development, and system software and security:Software platforms track

    Volume II:Software design and development, and system software and security:Poster papers

    Volume II:Software design and development, and system software and security:Trust, reputation, evidence and other collaboration know-how track

    manage site settings

    To protect your privacy, all features that rely on external API calls from your browser areturned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more informationsee our F.A.Q.

    Unpaywalled article links

    Add open access links fromunpaywall.org to the list of external document links (if available).

    load links from unpaywall.org

    Privacy notice: By enabling the option above, your browser will contact the API ofunpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking theUnpaywall privacy policy.

    Archived links via Wayback Machine

    For web page which are no longer available, try to retrieve content from theweb.archive.org of the Internet Archive (if available).

    load content from archive.org

    Privacy notice: By enabling the option above, your browser will contact the API ofarchive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking theInternet Archive privacy policy.

    Reference lists

    Add a list of references fromcrossref.org,opencitations.net, andsemanticscholar.org to record detail pages.

    load references from crossref.org and opencitations.net

    Privacy notice: By enabling the option above, your browser will contact the APIs ofcrossref.org,opencitations.net, andsemanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking theCrossref privacy policy and theOpenCitations privacy policy, as well as theAI2 Privacy Policy covering Semantic Scholar.

    Citation data

    Add a list of citing articles fromopencitations.net andsemanticscholar.org to record detail pages.

    load citations from opencitations.net

    Privacy notice: By enabling the option above, your browser will contact the API ofopencitations.net andsemanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking theOpenCitations privacy policy as well as theAI2 Privacy Policy covering Semantic Scholar.

    OpenAlex data

    Load additional information about publications fromopenalex.org.

    load data from openalex.org

    Privacy notice: By enabling the option above, your browser will contact the API ofopenalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given byOpenAlex.

    w3c valid html last updated on 2025-05-17 00:11 CEST by thedblp team

    cc zero all metadata released asopen data underCC0 1.0 license

    see also:Terms of Use |Privacy Policy |Imprint

    dblp was originally created in 1993 at:

    University of Trier  

    since 2018, dblp has been operated and maintained by:

    Schloss Dagstuhl - Leibniz Center for Informatics  

    the dblp computer science bibliography is funded and supported by:

    BMBF  RLP  SL  Leibniz  DFG  NFDI  

    [8]ページ先頭

    ©2009-2025 Movatter.jp