Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 74 matches
- 2016
- Wei Yu, Hansong Xu, Amirshahram Hematian, David W. Griffith, Nada Golmie:
Towards energy efficiency in ultra dense networks. IPCCC 2016: 1-8 - Raed Al-Aaridhi, Kalman Graffi:
Sets, lists and trees: Distributed data structures on distributed hash tables. IPCCC 2016: 1-8 - Ali Aldarraji, Liang Hong, Sachin Shetty:
Polarized beamforming for enhanced countermeasure of wireless jamming attacks. IPCCC 2016: 1-2 - Shouq Alsubaihi, Jean-Luc Gaudiot:
PETS: Performance, energy and thermal aware scheduler for job mapping with resource allocation in heterogeneous systems. IPCCC 2016: 1-2 - Manu Awasthi, Krishna T. Malladi:
KOVA : A tool for kernel visualization and analysis. IPCCC 2016: 1-3 - Ender Ayanoglu:
Fifth generation (5G) cellular wireless: Vision, goals, and challenges. IPCCC 2016: 1-3 - Janki Bhimani, Ningfang Mi, Miriam Leeser:
Performance prediction techniques for scalable large data processing in distributed MPI systems. IPCCC 2016: 1-2 - Janki Bhimani, Jingpei Yang, Zhengyu Yang, Ningfang Mi, Qiumin Xu, Manu Awasthi, Rajinikanth Pandurangan, Vijay Balakrishnan:
Understanding performance of I/O intensive containerized applications for NVMe SSDs. IPCCC 2016: 1-8 - Haoran Cai, Qiang Cao, Feng Sheng, Manyi Zhang, Chuanyi Qi, Jie Yao, Changsheng Xie:
Montgolfier: Latency-aware power management system for heterogeneous servers. IPCCC 2016: 1-8 - Emrah Çem, Kamil Saraç:
Estimating clustering coefficients via metropolis-hastings random walk and wedge sampling on large OSN graphs. IPCCC 2016: 1-2 - Mohak Chadha, Abhishek Srivastava, Santonu Sarkar:
Unified power and energy measurement API for HPC co-processors. IPCCC 2016: 1-8 - Jue Chen, Jinbang Chen, Junchen Ling, Wei Zhang:
Failure recovery using vlan-tag in SDN: High speed with low memory requirement. IPCCC 2016: 1-9 - Xiaoheng Deng, Weijian Zhong, Ju Ren, Detian Zeng, Honggang Zhang:
An imbalanced data classification method based on automatic clustering under-sampling. IPCCC 2016: 1-8 - Vero Estrada-Galiñanes, Jehan-François Pâris, Pascal Felber:
Simple data entanglement layouts with high reliability. IPCCC 2016: 1-8 - Olabisi E. Falowo:
Optimal multicriteria RAT-selection decisions for multiple handoff calls in heterogeneous wireless networks. IPCCC 2016: 1-5 - Weimiao Feng, Jianguo Sun, Liguo Zhang, Cuiling Cao, Qing Yang:
A support vector machine based naive Bayes algorithm for spam filtering. IPCCC 2016: 1-8 - Zhen Feng, Mingwei Xu, Yuan Yang, Yu Wang, Qing Li, Weichao Wang:
Optimizing content delivery in ICN networks by the supply chain model. IPCCC 2016: 1-8 - Denise Ferebee, Vivek Shandilya, Chase Q. Wu, Janet Ricks, David Agular, Karyn Cole, Byron Ray, Aukii Franklin, Candice Titon, Zongmin Wang:
A secure framework for mHealth data analytics with visualization. IPCCC 2016: 1-4 - Henry Griffith, Rajiv Ranganathan, Subir Biswas:
Towards a first-reflection ultrasonic sensor array for compensatory movement identification in stroke sufferers. IPCCC 2016: 1-2 - James Hadley, Utz Roedig, Yehia Elkhatib:
Using context switches for VM scaling. IPCCC 2016: 1-2 - Yi He, Qi Li:
Detecting and defending against inter-app permission leaks in android apps. IPCCC 2016: 1-7 - Md. Amjad Hossain, Javed I. Khan:
Distributed dynamic MCU for video conferencing in peer-to-peer network. IPCCC 2016: 1-8 - Aiqin Hou, Chase Q. Wu, Dingyi Fang, Yongqiang Wang, Meng Wang, Tao Wang, Xiaoyang Zhang:
Bandwidth scheduling with multiple variable node-disjoint paths in high-performance networks. IPCCC 2016: 1-4 - Song Huang, Zhiang Deng, Song Fu:
Quantifying entity criticality for fault impact analysis and dependability enhancement in software-defined networks. IPCCC 2016: 1-8 - Zuqin Ji, Jun Shen, Xiao Zhou, Delin Ding, Yujian Zhang:
The analysis of service extensibility in extensible network service model. IPCCC 2016: 1-8 - Jing Ke, Tomasz Bednarz, Arcot Sowmya:
Optimized GPU implementation for dynamic programming in image data processing. IPCCC 2016: 1-7 - Mahmoud Khasawneh, Anjali Agarwal:
A secure routing algorithm based on nodes behavior during spectrum sensing in cognitive radio networks. IPCCC 2016: 1-8 - Ines Khoufi, Pascale Minet, Mohammed-Amine Koulali, Abdellatif Kobbane:
Path planning of mobile sinks in charge of data gathering: A coalitional game theory approach. IPCCC 2016: 1-8 - Ines Khoufi, Pascale Minet, Erwan Livolant, Badr Rmili:
Building an IEEE 802.15.4e TSCH network. IPCCC 2016: 1-2 - Sanja Lazarova-Molnar, Hamid Reza Shaker, Nader Mohamed:
Reliability of cyber physical systems with focus on building management systems. IPCCC 2016: 1-6
skipping 44 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-19 15:02 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint