![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 43 matches
- 2015
- Parosh Aziz Abdulla, Mohamed Faouzi Atig, Ahmet Kara, Othmane Rezine:
Verification of Buffered Dynamic Register Automata. NETYS 2015: 15-31 - Parosh Aziz Abdulla, Mohamed Faouzi Atig, Magnus Lång
, Tuan Phong Ngo:
Precise and Sound Automatic Fence Insertion Procedure under PSO. NETYS 2015: 32-47 - C. Aiswarya
:
Model Checking Dynamic Distributed Systems. NETYS 2015: 48-61 - Paulo Sérgio Almeida
, Ali Shoker
, Carlos Baquero
:
Efficient State-Based CRDTs by Delta-Mutation. NETYS 2015: 62-76 - Karine Altisen, Stéphane Devismes
, Anaïs Durand
:
Concurrency in Snap-Stabilizing Local Resource Allocation. NETYS 2015: 77-93 - Antonio Fernández Anta, Chryssis Georgiou
, Elli Zavou:
Packet Scheduling over a Wireless Channel: AQT-Based Constrained Jamming. NETYS 2015: 230-245 - Imane Daha Belghiti, Ismail Berrada, Mohamed El-Kamili
:
Improving Cognitive Radio Wireless Network Performances Using Clustering Schemes and Coalitional Games. NETYS 2015: 170-182 - Yahya Benkaouz, Mohammed Erradi, Bernd Freisleben
:
Distributed Privacy-Preserving Data Aggregation via Anonymization. NETYS 2015: 94-108 - Martin Biely, Peter Robinson, Ulrich Schmid, Manfred Schwarz, Kyrill Winkler
:
Gracefully Degrading Consensus and k-Set Agreement in Directed Dynamic Networks. NETYS 2015: 109-124 - Olivier Bournez, Johanne Cohen, Mikaël Rabie:
Homonym Population Protocols. NETYS 2015: 125-139 - Bertil Chapuis, Benoît Garbinato:
Knowledgeable Chunking. NETYS 2015: 456-460 - Anis Charfi, Haolin Zhi:
Aspect-Based Realization of Non-functional Concerns in Business Processes. NETYS 2015: 140-154 - Tong Che:
Verifying Concurrent Data Structures Using Data-Expansion. NETYS 2015: 155-169 - Stéphane Devismes
, Anissa Lamani, Franck Petit, Sébastien Tixeuil:
Optimal Torus Exploration by Oblivious Robots. NETYS 2015: 183-199 - Michael Diamond, Prasad Jayanti, Jake Leichtling:
Enhancing Readers-Writers Exclusion with Upgrade/Downgrade Primitives. NETYS 2015: 461-467 - Dacfey Dzung, Rachid Guerraoui, David Kozhaya, Yvonne-Anne Pignolet:
Source Routing in Time-Varing Lossy Networks. NETYS 2015: 200-215 - Mohammed Raiss El-Fenni
, Mohamed El-Kamili
, Sidi Ahmed Ezzahidi, Ismail Berrada, El-Houssine Bouyakhf:
Towards an Optimal Pricing for Mobile Virtual Network Operators. NETYS 2015: 507-512 - Hajar Elhammouti, Loubna Echabbi, Rachid El Azouzi:
A Fully Distributed Learning Algorithm for Power Allocation in Heterogeneous Networks. NETYS 2015: 216-229 - Widad Ettazi, Hatim Hafiddi, Mahmoud Nassar
:
A User Centered Design Approach for Transactional Service Adaptation in Context Aware Environment. NETYS 2015: 479-484 - Sonia Gaied Fantar, Habib Youssef:
Peer-to-Peer Full-Text Keyword Search of the Web. NETYS 2015: 263-277 - Hassan Faouzi
, Hicham Mouncif
, Mohamed Lamsaadi:
Performance Evaluation for Ad hoc Routing Protocols in Realistic Physical Layer. NETYS 2015: 496-500 - Roy Friedman, Michel Raynal, François Taïani
:
Fisheye Consistency: Keeping Data in Synch in a Georeplicated World. NETYS 2015: 246-262 - Btihal El Ghali, Abderrahim El Qadi, Mohamed Ouadou, Driss Aboutajdine:
Context-Based Query Expansion Method for Short Queries Using Latent Semantic Analyses. NETYS 2015: 468-473 - Vincent Gramoli, Rachid Guerraoui, Anne-Marie Kermarrec:
Profiling Transactional Applications. NETYS 2015: 278-292 - Vincent Gramoli, Guillaume Jourjon, Olivier Mehani:
Disaster-Tolerant Storage with SDN. NETYS 2015: 293-307 - Andreas Haas, Thomas Hütter
, Christoph M. Kirsch, Michael Lippautz, Mario Preishuber, Ana Sokolova
:
Scal: A Benchmarking Suite for Concurrent Data Structures. NETYS 2015: 1-14 - Jad Hamza:
On the Complexity of Linearizability. NETYS 2015: 308-321 - Outman El Hichami
, Mohamed Naoum
, Mohammed Al Achhab, Ismail Berrada, Badr Eddine El Mohajir:
Towards a Formal Semantics and Analysis of BPMN Gateways. NETYS 2015: 474-478 - Lukás Holík
, Roland Meyer:
Antichains for the Verification of Recursive Programs. NETYS 2015: 322-336 - Tao Jin, Triet D. Vo-Huu, Erik-Oliver Blass, Guevara Noubir:
BaPu: Efficient and Practical Bunching of Access Point Uplinks. NETYS 2015: 337-353
skipping 13 more matches
loading more results
failed to load more results, please try again later
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-25 04:16 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint