Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 57 matches
- 2016
- Jiuxin Cao, Xiangying Zhu, Fang Dong, Bo Liu, Zhuo Ma, Huiyu Min:
Time Series Based Bandwidth Allocation Strategy in Cloud Datacenter. CBD 2016: 228-233 - Huangke Chen, Jiayang Meng, Jianghan Zhu, Jianjiang Wang:
ABS: Agent-Based Scheduling for Data-Intensive Workflow in Software-as-a-Service Environments. CBD 2016: 19-24 - Chong Chen, Jun Shen, Gaofeng Zhang, Rui Zhao, Jingfeng Liu, Qingguo Zhou:
A Groundwater Management Tool for Solving the Pumping Yields Minimization Problem: A Case Study in the Heihe River Basin. CBD 2016: 289-295 - Yufeng Chen, Zebin Wu, Zhihui Wei, Yonglong Li:
PN-FINDR: A Parallelized N-FINDR Algorithm with Spark. CBD 2016: 127-132 - Zixue Cheng, Junbo Wang, Neil Y. Yen, Yilang Wu:
Allocation of Resources after Disaster Based on Big Data from SNS and Spatial Scan. CBD 2016: 334 - Fei Du, Yezheng Liu, Xiao Liu, Jianshan Sun, Yuan-Chun Jiang:
User Role Analysis in Online Social Networks Based on Dirichlet Process Mixture Models. CBD 2016: 172-177 - Zhihua Feng, Huazhe Tan, Haihua Shen:
Relationship Privacy Protection for Mobile Social Network. CBD 2016: 215-220 - Yu Hong, XiaoLing Xia, Jiajin Le, Xiangdong Zhou:
Learning Bayesian Network Structure from Large-Scale Datasets. CBD 2016: 258-264 - Ruimin Hu:
Key Technology for Big Visual Data Analysis in Security Space and Its Applications. CBD 2016: 333 - Jianfeng Hu, Yuquan Liu, Yi Zhang, Wenxiong Mo, Yuchun Pan, Yong Wang:
KVBTree: A Key/Value Based Storage Structure for Large-Scale Electric Power Data. CBD 2016: 133-137 - Qun Jin, Bo Wu, Shoji Nishimura, Atsushi Ogihara:
Ubi-Liven: A Human-Centric Safe and Secure Framework of Ubiquitous Living Environments for the Elderly. CBD 2016: 304-309 - Xue Li, Qiang Li:
DTM: A New Data Transmission Method in Mobile Cloud Computing. CBD 2016: 252-257 - Shu Li, Jia Liu, Song Wang, Duanchao Li, Taigui Huang, Wanchun Dou:
A Novel Node Selection Method for Real-Time Collaborative Computation in Cloud. CBD 2016: 98-103 - Jiandong Li, Atsushi Sato, Runhe Huang, Dongming Chen:
A Rule-Based Knowledge Discovery Engine Embedded Semantic Graph Knowledge Repository for Retail Business. CBD 2016: 81-86 - Yanchao Li, Yongli Wang, Xiaohui Jiang, Zhenjiang Dong:
Teaching-to-Learn and Learning-to-Teach for Few Labeled Classification. CBD 2016: 271-276 - Mengjuan Liu, Wei Wang, Fan Zhou, Hao Xue, Zhiguang Qin, Xucheng Luo:
ActiveRec: A Novel Context-Sensitive Ranking Method for Active Movie Recommendation. CBD 2016: 92-97 - Xun Lu, Zhengyou Xia:
A Study of Age Distribution Inference in Sina Weibo. CBD 2016: 63-67 - Yanxia Lv, Cuirong Wang, Cong Wang, Bingyu Liu:
Uncertain Data Stream Classification with Concept Drift. CBD 2016: 265-271 - Jianhua Ma:
X-I: A Group of Cyber-Enabled Smart Buddies for an Individual. CBD 2016: 328-331 - Chengying Mao, Rongru Lin:
QoS Trust Rate Prediction for Web Services Using PSO-Based Neural Network. CBD 2016: 68-74 - Yuting Miao, Nuo Yu, Hejiao Huang, Hongwei Du, Xiaohua Jia:
Minimizing Energy Cost of Base Stations with Consideration of Switching on/off Cost. CBD 2016: 310-315 - Zhenyu Ni, Ming Yang, Zhen Ling, Jianan Wu, Junzhou Luo:
Real-Time Detection of Malicious Behavior in Android Apps. CBD 2016: 221-227 - Linbo Qiao, Bofeng Zhang, Lei Zhuang, Jinshu Su:
An Efficient Algorithm for Tensor Principal Component Analysis via Proximal Linearized Alternating Direction Method of Multipliers. CBD 2016: 283-288 - Pan Qin, Lei Duan, Tianqing Zhang, Pu Wang:
A Parallel Algorithm for Mining Density-Aware Distinguishing Sequential Patterns with Spark. CBD 2016: 144-149 - Edwin Hsing-Mean Sha, Jun Chen, Xianzhang Chen, Weiwen Jiang, Qingfeng Zhuge:
The Design and Implementation of a High-Performance Hybrid Memory File System. CBD 2016: 316-321 - Xiaodong Sheng, Qiang Li:
Template-Based Genetic Algorithm for QoS-Aware Task Scheduling in Cloud Computing. CBD 2016: 25-30 - Xin Song, Huiyuan He, Shaokai Niu, Jing Gao:
A Data Streams Analysis Strategy Based on Hoeffding Tree with Concept Drift on Hadoop System. CBD 2016: 45-48 - Geng Sun, Tingru Cui, Ghassan Beydoun, Jun Shen, Shiping Chen:
Profiling and Supporting Adaptive Micro Learning on Open Education Resources. CBD 2016: 158-163 - Chao Tan, Genlin Ji:
SSLPE: A Semi-Supervised Local Preserving Embedding Algorithm. CBD 2016: 277-282 - Nyamsuren Vaanchig, Wei Chen, Zhiguang Qin:
Ciphertext-Policy Attribute-Based Access Control with Effective User Revocation for Cloud Data Sharing System. CBD 2016: 186-193
skipping 27 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-28 20:15 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint