![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 28 matches
- 2013
- Martín Abadi, Andrew Birrell, Ilya Mironov, Ted Wobber, Yinglian Xie:
Global Authentication in an Untrustworthy World. HotOS 2013 - Peter Bailis, Alan D. Fekete, Ali Ghodsi, Joseph M. Hellerstein, Ion Stoica:
HAT, Not CAP: Towards Highly Available Transactions. HotOS 2013 - Sapan Bhatia, Andy C. Bavier, Larry L. Peterson:
Wanted: Systems Abstractions for SDN. HotOS 2013 - Aleksander Budzynowski, Gernot Heiser:
The von Neumann Architecture Is Due for Retirement. HotOS 2013 - Edouard Bugnion, Vitaly Chipounov, George Candea:
Lightweight Snapshots and System-level Backtracking. HotOS 2013 - Michael Chan, Heiner Litz, David R. Cheriton:
Rethinking Network Stack Design with Memory Snapshots. HotOS 2013 - James Cipar, Qirong Ho, Jin Kyu Kim, Seunghak Lee, Gregory R. Ganger, Garth Gibson, Kimberly Keeton, Eric P. Xing:
Solving the Straggler Problem with Bounded Staleness. HotOS 2013 - Loris D'Antoni, Alan M. Dunn, Suman Jana, Tadayoshi Kohno, Benjamin Livshits, David Molnar, Alexander Moshchuk, Eyal Ofek, Franziska Roesner, T. Scott Saponas, Margus Veanes, Helen J. Wang:
Operating System Support for Augmented Reality Applications. HotOS 2013 - Bin Fan, Dong Zhou, Hyeontaek Lim, Michael Kaminsky, David G. Andersen:
When Cycles Are Cheap, Some Tables Can Be Huge. HotOS 2013 - Zhenyu Guo, Sean McDirmid, Mao Yang, Li Zhuang, Pu Zhang, Yingwei Luo, Tom Bergan, Madan Musuvathi, Zheng Zhang, Lidong Zhou:
Failure Recovery: When the Cure Is Worse Than the Disease. HotOS 2013 - Amit Gupta, Ehab Ababneh, Richard Han, Eric Keller:
Towards Elastic Operating Systems. HotOS 2013 - Seungyeop Han, Matthai Philipose:
The Case for Onloading Continuous High-Datarate Perception to the Phone. HotOS 2013 - Sangjin Han, Sylvia Ratnasamy:
Large-Scale Computation Not at the Cost of Expressiveness. HotOS 2013 - William Jannen, Chia-che Tsai, Donald E. Porter:
Virtualize Storage, Not Disks. HotOS 2013 - Aman Kansal, Bhuvan Urgaonkar, Sriram Govindan:
Using Dark Fiber to Displace Diesel Generators. HotOS 2013 - Jeffrey C. Mogul, Jayaram Mudigonda, Jose Renato Santos, Yoshio Turner:
The NIC Is the Hypervisor: Bare-Metal Guests in IaaS Clouds. HotOS 2013 - Kay Ousterhout, Aurojit Panda, Josh Rosen, Shivaram Venkataraman, Reynold Xin, Sylvia Ratnasamy, Scott Shenker, Ion Stoica:
The Case for Tiny Tasks in Compute Clusters. HotOS 2013 - Simon Peter, Thomas E. Anderson:
Arrakis: A Case for the End of the Empire. HotOS 2013 - Ariel Rabkin, Matvey Arye, Siddhartha Sen, Vivek S. Pai, Michael J. Freedman:
Making Every Bit Count in Wide-Area Analytics. HotOS 2013 - Shriram Rajagopalan, Dan Williams, Hani Jamjoom, Andrew Warfield:
Escape Capsule: Explicit State Is Robust and Scalable. HotOS 2013 - Pravin Shinde, Antoine Kaufmann, Timothy Roscoe, Stefan Kaestle:
We Need to Talk About NICs. HotOS 2013 - Ryan Stutsman, John K. Ousterhout:
Toward Common Patterns for Distributed, Concurrent, Fault-Tolerant Code. HotOS 2013 - Animesh Trivedi, Patrick Stuedi, Bernard Metzler, Roman A. Pletka, Blake G. Fitch, Thomas R. Gross:
Unified High-Performance I/O: One Stack to Rule Them All. HotOS 2013 - Jonas Wagner, Volodymyr Kuznetsov, George Candea:
-OVERIFY: Optimizing Programs for Fast Verification. HotOS 2013 - Edward Z. Yang, Deian Stefan, John C. Mitchell, David Mazières, Petr Marchenko, Brad Karp:
Toward Principled Browser Security. HotOS 2013 - Cristian Zamfir, Baris Kasikci, Johannes Kinder, Edouard Bugnion, George Candea:
Automated Debugging for Arbitrarily Long Executions. HotOS 2013 - Pengyu Zhang, Deepak Ganesan, Boyan Lu:
QuarkOS: Pushing the Operating Limits of Micro-Powered Sensors. HotOS 2013 - Petros Maniatis:
14th Workshop on Hot Topics in Operating Systems, HotOS XIV, Santa Ana Pueblo, New Mexico, USA, May 13-15, 2013. USENIX Association 2013 [contents]
loading more results
failed to load more results, please try again later
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-23 11:25 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint