Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 25 matches
- 2004
- Ali Ahmadinia, Christophe Bobda, Jürgen Teich:
A Dynamic Scheduling and Placement Algorithm for Reconfigurable Hardware. ARCS 2004: 125-139 - Jens-Peter Akelbein, Ute Schröfel:
Adaptive Workload Balancing for Storage Management Applications in Multi Node Environments. ARCS 2004: 322-337 - Péter Arató, Zoltán Ádám Mann, András Orbán:
Component-Based Hardware-Software Co-design. ARCS 2004: 169-183 - Markus Augel, Rudi Knorr:
Bluetooth Scatternet Formation - State of the Art and a New Approach. ARCS 2004: 260-272 - Jens Braunes, Steffen Köhler, Rainer G. Spallek:
RECAST: An Evaluation Framework for Coarse-Grain Reconfigurable Architectures. ARCS 2004: 156-166 - Rainer Buchty, Nevin Heintze, Dino Oliva:
Cryptonite - A Programmable Crypto Processor Architecture for High-Bandwidth Applications. ARCS 2004: 184-198 - Lynn Choi, Yong Shin:
Enforcement of Architectural Safety Guards to Deter Malicious Code Attacks through Buffer Overflow Vulnerabilities. ARCS 2004: 47-60 - Tae-Sun Chung, Stein Park, Myung-Jin Jung, Bumsoo Kim:
STAFF: State Transition Applied Fast Flash Translation Layer. ARCS 2004: 199-212 - Shlomi Dolev, Yinnon A. Haviv:
Self-Stabilizing Microprocessor - Analyzing and Overcoming Soft-Errors (Extended Abstract). ARCS 2004: 31-46 - Matthias Enzmann, Elli Giessler, Michael Haisch, Brian Hunter, Mohammad Ilyas, Markus Schneider:
A Note on Certificate Path Verification in Next Generation Mobile Communications. ARCS 2004: 273-287 - Jan Haase, Frank Eschmann, Bernd Klauer, Klaus Waldschmidt:
The SDVM: A Self Distributing Virtual Machine for Computer Clusters. ARCS 2004: 9-19 - Anthony LaMarca, Maya Rodrig:
Oasis: An Architecture for Simplified Data Management and Disconnected Operation. ARCS 2004: 92-106 - Xuezheng Liu, Ming Chen, Guangwen Yang:
Latent Semantic Indexing in Peer-to-Peer Networks. ARCS 2004: 63-77 - Andreas Maier:
Keynote: Autonomic Computing Initiative. ARCS 2004: 3 - Erik Norden:
Keynote: Multithreading for Low-Cost, Low-Power Applications. ARCS 2004: 4-5 - Markus Ramsauer:
Simultaneously Exploiting Dynamic Voltage Scaling, Execution Time Variations, and Multiple Methods in Energy-Aware Hard Real-Time Scheduling. ARCS 2004: 213-227 - Patrick Sauter, Gabriel Vögler, Günther Specht, Thomas Flor:
Extending the MVC Design Pattern towards a Task-Oriented Development Approach for Pervasive Computing Applications. ARCS 2004: 309-321 - Stefan Schulz, Michael Schulz, Andreas Tanner:
Frame of Interest Approach on Quality of Prediction for Agent-Based Network Monitoring. ARCS 2004: 246-259 - Christian Seitz, Michael Berger:
Towards a General Approach to Mobile Profile Based Distributed Grouping. ARCS 2004: 107-121 - Frank Siegemund, Christian Floerkemeier, Harald Vogt:
The Value of Handhelds in Smart Environments. ARCS 2004: 291-308 - Koen Vanthournout, Geert Deconinck, Ronnie Belmans:
A Taxonomy for Resource Discovery. ARCS 2004: 78-91 - Andreas Weissel, Matthias Faerber, Frank Bellosa:
Application Characterization for Wireless Network Power Management. ARCS 2004: 231-245 - Christian Wiegand, Christian Siemers, Harald Richter:
Definition of a Configurable Architecture for Implementation of Global Cellular Automaton. ARCS 2004: 140-155 - Kai Yu, Volker Tresp:
Heterogenous Data Fusion via a Probabilistic Latent-Variable Model. ARCS 2004: 20-30 - Christian Müller-Schloer, Theo Ungerer, Bernhard Bauer:
Organic and Pervasive Computing - ARCS 2004, International Conference on Architecture of Computing Systems, Augsburg, Germany, March 23-26, 2004, Proceedings. Lecture Notes in Computer Science 2981, Springer 2004, ISBN 3-540-21238-8 [contents]
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-27 21:58 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint