Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 66 matches
- 2003
- Ehab S. Al-Shaer, Hazem H. Hamed:
Firewall Policy Advisor for Anomaly Discovery and Rule Editing. Integrated Network Management 2003: 17-30 - Alain Azagury, Germán S. Goldszmidt, Yair Koren, Benny Rochwerger, Arie Tal:
Khnum - A Scalable Rapid Application Deployment System for Dynamic Hosting Infrastructures. Integrated Network Management 2003: 307-320 - Kyrre M. Begnum, Mark Burgess:
A Scaled, Immunological Approach to Anomaly Countermeasures: Combining pH with Cfengine. Integrated Network Management 2003: 31-42 - David Breitgand, Danny Dolev, Danny Raz, Gleb Shaviner:
Facilitating Efficient and Reliable Monitoring through HAMSA. Integrated Network Management 2003: 263-276 - Marcus Brunner, Charlotte Hullo:
GMPLS Fault Management and Its Impact on Service Resilience Differentiation. Integrated Network Management 2003: 665-678 - Mark Burgess, Geoffrey Canright:
Scalability of Peer Configuration Management in Partially Reliable and Ad Hoc Networks. Integrated Network Management 2003: 293-305 - João B. D. Cabrera, Lundy M. Lewis, Xinzhou Qin, Carlos Gutiérrez, Wenke Lee, Raman K. Mehra:
Proactive Intrusion Detection and SNMP-based Security Management: New Experiments and Validation. Integrated Network Management 2003: 93-96 - Taesang Choi, Hyungseok Chung, Changhoon Kim, Taesoo Jeong:
Design and Implementation of an Information Model for Integrated Configuration and Performance Management of MPLS-TE/VPN/QoS. Integrated Network Management 2003: 143-146 - Alexander Clemm, Anil Bansal:
Auto-Discovery at the Network and Service Management Layer. Integrated Network Management 2003: 365-378 - Munir Cochinwala, Namon Jackson, Hyong Sop Shim, Eric Sigman:
Adaptive Resource Management of a Virtual Call Center Using a Peer-to-Peer Approach. Integrated Network Management 2003: 425-437 - Alessandro Corrente, Marco De Bernardi, Roberto Rinaldi:
Policy Provisioning Performance Evaluation using COPS-PR in a Policy Based Network. Integrated Network Management 2003: 201-213 - Tiago Cruz, Paulo Simões:
Enabling PreOS Desktop Management. Integrated Network Management 2003: 321-334 - Markus Debusmann, Alexander Keller:
SLA-driven Management of Distributed Systems Using the Common Information Model. Integrated Network Management 2003: 563-576 - Yixin Diao, Frank Eskesen, Steve Froehlich, Joseph L. Hellerstein, Alexander Keller, Lisa Spainhower, Maheswaran Surendra:
Generic On-Line Discovery of Quantitative Models for Service Level Management. Integrated Network Management 2003: 157-170 - Xiaojiang Du, Mark A. Shayman, Ronald A. Skoog:
Using Neural Networks to Identify Control and Management Plane Poison Messages. Integrated Network Management 2003: 621-634 - Mohamed El-Darieby, Dorina C. Petriu, Jerry Rolia:
Hierarchical End-to-End Service Recovery. Integrated Network Management 2003: 649-661 - Jeffrey J. Evans, Seongbok Baik, Cynthia S. Hood, William Gropp:
Toward Understanding Soft Faults in High Performance Cluster Networks. Integrated Network Management 2003: 117-120 - Paris Flegkas, Panos Trimintzios, George Pavlou, Antonio Liotta:
Design and Implementation of a Policy-based Resource Management Architecture. Integrated Network Management 2003: 215-229 - Gráinne Foley, Fergus O'Reilly:
Software Distribution for Wireless Devices: A Rconfigurable Approach. Integrated Network Management 2003: 469-472 - Luciano Paschoal Gaspary, Edgar Meneghetti, Liane Margarida Rockenbach Tarouco:
An SNMP Agent for Stateful Intrusion Inspection. Integrated Network Management 2003: 3-16 - Dan Gunter, Brian Tierney:
NetLogger: A Toolkit for Distributed System Performance Tuning and Debugging. Integrated Network Management 2003: 97-100 - Cynthia S. Hood, Satish Devarapalli, Nirav Gadhia, Sanjay Hegde, Vikram Mallikarjuna, Shashank Shankar, Srikanth B. Yoginath:
Using the Access Grid as a Testbed for Network Management Research. Integrated Network Management 2003: 147-150 - Srinivasan Jagannathan, Jörn Altmann, Lee Rhodes:
A Revenue-based Model for Making Resource Investment Decisions in IP Networks. Integrated Network Management 2003: 185-197 - Ajita John, Binay Sugla, Hari Krishnan, Edwin Park, Arni Raghu, Roshan Sequiera, Ajay Wanchoo:
An Architecture for Provisioning IP Services in an Operations Support System. Integrated Network Management 2003: 455-458 - Seema Kaushal, Hanan Lutfiyya:
Automating Placement of Instrumentation in Applications. Integrated Network Management 2003: 151-154 - Hilmi Günes Kayacik, Nur Zincir-Heywood:
A Case Study of Three Open Source Security Management Tools. Integrated Network Management 2003: 101-104 - Andrzej Kochut, Gautam Kar:
Managing Virtual Storage Systems: An Approach Using Dependency Analysis. Integrated Network Management 2003: 593-604 - Gerd Lanfermann, Bettina Schnor, Edward Seidel:
Grid Object Description: Characterizing Grids. Integrated Network Management 2003: 519-532 - Emmanuel Lavinal, Thierry Desprats, Yves Raynaud:
A Conceptual Framework for Building CIM-based Ontologies. Integrated Network Management 2003: 135-138 - Byungjoon Lee, Taesang Choi, Taesoo Jeong:
X-CLI: CLI-based Management Architecture using XML. Integrated Network Management 2003: 477-480
skipping 36 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-24 21:44 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint