Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 72 matches
- 2015
- Norman Ahmed, Bharat K. Bhargava:
Towards Dynamic QoS Monitoring in Service Oriented Architectures. CLOSER 2015: 163-171 - Farzaneh Akhbar, Tolga Ovatman:
Quality of Service Trade-offs between Central Data Centers and Nano Data Centers. CLOSER 2015: 113-118 - Marwah M. Alansari, André Almeida, Nelly Bencomo, Behzad Bordbar:
CloudMPL: A Domain Specific Language for Describing Management Policies for an Autonomic Cloud Infrastructure. CLOSER 2015: 451-462 - Jonas Anseeuw, Gregory van Seghbroeck, Bruno Volckaert, Filip De Turck:
BPMN Extensions for Decentralized Execution and Monitoring of Business Processes. CLOSER 2015: 304-309 - Sakil Barbhuiya, Zafeirios C. Papazachos, Peter Kilpatrick, Dimitrios S. Nikolopoulos:
A Lightweight Tool for Anomaly Detection in Cloud Data Centres. CLOSER 2015: 343-351 - Bruno M. Barros, Leonardo H. Iwaya, Marcos A. Simplício Jr., Tereza Cristina M. B. Carvalho, András Méhes, Mats Näslund:
Classifying Security Threats in Cloud Networking. CLOSER 2015: 214-220 - Uwe Breitenbücher, Tobias Binz, Oliver Kopp, Frank Leymann, Johannes Wettinger:
A Modelling Concept to Integrate Declarative and Imperative Cloud Application Provisioning Technologies. CLOSER 2015: 487-496 - Marco Cavallo, Giuseppe Di Modica, Carmelo Polito, Orazio Tomarchio:
Context-aware MapReduce for Geo-distributed Big Data. CLOSER 2015: 414-421 - Victor Chang:
Cloud Computing and Big Data Can Improve the Quality of Our Life. CLOSER 2015: IS-5 - Primoz Cigoj, Borka Jerman Blazic, Tomaz Klobucar:
An Approach in the Design of Common Authentication Solution for a Multi-Platform Cloud Environment. CLOSER 2015: 365-372 - Flavio Corradini, Francesco De Angelis, Fabrizio Ippoliti, Fausto Marcantoni:
A Survey of Trust Management Models for Cloud Computing. CLOSER 2015: 155-162 - Flavio Corradini, Francesco De Angelis, Andrea Polini, Samuele Sabbatini:
Cloud Readiness Assessment of Legacy Application. CLOSER 2015: 119-126 - Daniela S. Cruzes, Martin Gilje Jaatun:
Cloud Provider Transparency - A View from Cloud Customers. CLOSER 2015: 30-39 - Dipankar Deb, Nabendu Chaki, Aditya K. Ghose:
Business Process Generation by Leveraging Complete Search over a Space of Activities and Process Goals. CLOSER 2015: 233-240 - Faîçal Felhi, Marwa Ayadi, Jalel Akaichi:
A Smart Decisional Cognitive System based on Self-adaptability of Web Services to the Context. CLOSER 2015: 310-316 - Holger Gantikow, Sebastian Klingberg, Christoph Reich:
Container-based Virtualization for HPC. CLOSER 2015: 543-550 - Radhika Garg, Burkhard Stiller:
Factors Affecting Cloud Adoption and Their Interrelations. CLOSER 2015: 87-94 - Hamza Ghandorh, Hanan Lutfiyya:
Automated Mapping of Business Process Execution Language to Diagnostics Models. CLOSER 2015: 251-259 - Shivam Gupta, Subhas C. Misra:
Implementation of Cloud ERP - Moderating Effect of Compliance on the Organizational Factors. CLOSER 2015: 194-198 - Marjan Gusev, Magdalena Kostoska, Sasko Ristov, Aleksandar Donevski:
P-TOSCA Portability of SOA Applications. CLOSER 2015: 71-78 - Makhlouf Hadji:
A Mathematical Programming Approach to Multi-cloud Storage. CLOSER 2015: 17-29 - Ronny Hans, David Steffen, Ulrich Lampe, Björn Richerzhagen, Ralf Steinmetz:
Setting Priorities - A Heuristic Approach for Cloud Data Center Selection. CLOSER 2015: 221-228 - Khawar Hasham, Kamran Munir, Richard McClatchey:
Using Cloud-Aware Provenance to Reproduce Scientific Workflow Execution on Cloud. CLOSER 2015: 49-59 - Lara Lorna Jiménez, Miguel Gómez Simón, Olov Schelén, Johan Kristiansson, Kåre Synnes, Christer Åhlund:
CoMA: Resource Monitoring of Docker Containers. CLOSER 2015: 145-154 - Aymen Jlassi, Patrick Martineau, Vincent T'kindt:
Offline Scheduling of Map and Reduce Tasks on Hadoop Systems. CLOSER 2015: 178-185 - Nima Kaviani, E. Michael Maximilien, Ignacio Silva-Lepe, Isabelle Rouvellou:
Automatic Abstraction of Flow of Control in a System of Distributed Software Components. CLOSER 2015: 381-388 - Bastian Kemmler, Dieter Kranzlmüller:
Redefining the Cloud based on Beneficial Service Characteristics - A New Cloud Taxonomy Leads to Economically Reasonable Semi-cloudification. CLOSER 2015: 135-144 - Cornel Klein:
Software- and Systems Architecture for Smart Vehicles. CLOSER 2015: IS-13 - Jonathan P. Knoblauch, Rebecca Bulander, Thomas Greiner:
Development of an Anything Relationship Management Prototype for the Smart Factory. CLOSER 2015: 127-134 - Jakub Krzywda, William Tärneberg, Per-Olov Östberg, Maria Kihl, Erik Elmroth:
Telco Clouds - Modelling and Simulation. CLOSER 2015: 597-609
skipping 42 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-31 10:18 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint