Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 36 matches
- 2009
- Muhammad Atif, Peter E. Strazdins:
Optimizing Live Migration of Virtual Machines in SMP Clusters for HPC Applications. NPC 2009: 51-58 - Mingze Bai, Yusheng Dou, Hong Tang, Shixin Sun:
Performance of LAMMPS Code on Intel Quad-Core Xeon. NPC 2009: 156-160 - Jie Cai, Alistair P. Rendell, Peter E. Strazdins:
Non-threaded and Threaded Approaches to MultiRail Communication with uDAPL. NPC 2009: 233-239 - Bin Chen, Nong Xiao, Zhiping Cai, Ji Wang:
DPM: A Demand-driven Virtual Disk Prefetch Mechanism for Mobile Personal Computing Environments. NPC 2009: 59-66 - Bin Cheng, Xingang Wang, Weiqin Tong:
Formal Modeling of Parallel System Based on TCPN. NPC 2009: 246-250 - Eoin Creedon, Michael Manzke:
Impact of Fragmentation Strategy on Ethernet Performance. NPC 2009: 30-37 - Tao Cui, Hai Jin, Xiaofei Liao, Haikun Liu:
A Virtual Machine Replay System Based on Para-virtualized Xen. NPC 2009: 44-50 - Hamza Drid, Samer Lahoud, Bernard Cousin, Miklós Molnár:
A Topology Aggregation Model for Survivability in Multi-Domain Optical Networks Using p-Cycles. NPC 2009: 211-218 - Norbert Egi, Adam Greenhalgh, Mark Handley, Gianluca Iannaccone, Maziar Manesh, Laurent Mathy, Sylvia Ratnasamy:
Improved Forwarding Architecture and Resource Management for Multi-Core Software Routers. NPC 2009: 117-124 - Xiang Fan, Yang Xiang:
Modeling the Propagation Process of Topology-Aware Worms: An Innovative Logic Matrix Formulation. NPC 2009: 182-189 - Guangsheng Feng, Huiqiang Wang, Bingyang Li, Zengyou He:
Dynamic Self-configuration of User QoS for Next Generation Network. NPC 2009: 80-85 - Ying Guo, Zhongwen Guo, Feng Hong, Lu Hong:
Sleep Scheduling and Gradient Query in Sensor Networks for Target Monitoring. NPC 2009: 101-108 - Manal Helal, Lenore R. Mullin, John Potter, Vitali Sintchenko:
Search Space Reduction Technique for Distributed Multiple Sequence Alignment. NPC 2009: 219-226 - Wangxi Jia, Xuping Tu, Hai Jin, Xiaofei Liao:
VirtualNet: Mapping Distributed Communication on a Single Node. NPC 2009: 38-43 - Ke Li, Wanlei Zhou, Ping Li:
Reliable Downloading Algorithms for BitTorrent-like Systems. NPC 2009: 167-173 - Hammurabi das Chagas Mendes, Weigang Li, Azzedine Boukerche, Alba Cristina Magalhaes Alves de Melo:
Bag-of-Tasks Self-Scheduling over Range-Queriable Search Overlays. NPC 2009: 109-116 - Soohong Min, JoAnne Holliday:
Super-Peer Availability Prediction Strategy in Unstructured P2P Network. NPC 2009: 23-29 - George Parissis, George Xylomenos, Dimitris Gritzalis:
BLAST: Off-the-Shelf Hardware for Building an Efficient Hash-Based Cluster Storage System. NPC 2009: 148-155 - Debprakash Patnaik, Sean P. Ponce, Yong Cao, Naren Ramakrishnan:
Accelerator-Oriented Algorithm Transformation for Temporal Data Mining. NPC 2009: 93-100 - Meikang Qiu, Meiqin Liu, Fei Hu, Shaobo Liu, Lingfeng Wang:
Energy Aware Loop Scheduling for High Performance Multi-Module Memory. NPC 2009: 16-22 - M. M. Hafizur Rahman, Xiaohong Jiang, Md. Shahin-Al Masud, Susumu Horiguchi:
Network Performance of Pruned Hierarchical Torus Network. NPC 2009: 9-15 - Sebastian Roschke, Feng Cheng, Thanh-Dien Tran, Christoph Meinel:
A Theoretical Model of Lock-Keeper Data Exchange and its Practical Verification. NPC 2009: 190-196 - Norrozila Sulaiman, Che Yahaya Yaakub:
An Investigation on a Real Time System over WiFi in Educational Environment. NPC 2009: 161-166 - Guang Suo, Xuejun Yang:
System Level Speedup Oriented Cache Partitioning for Multi-programmed Systems. NPC 2009: 204-210 - Hong Tang, Ying Wang, Haitao Wang, Yu Wu:
A Network Emergent Computing Model Based on Cellular Automaton. NPC 2009: 240-245 - Steffen Viken Valvåg, Dag Johansen:
Cogset: A Unified Engine for Reliable Storage and Parallel Processing. NPC 2009: 174-181 - Zeljko Vrba, Pål Halvorsen, Carsten Griwodz, Paul B. Beskow, Dag Johansen:
The Nornir Run-time System for Parallel Programs Using Kahn Process Networks. NPC 2009: 1-8 - Xu Wang, Ge Gan, Dongrui Fan, Shuxu Guo:
GFFC: The Global Feedback Based Flow Control in the NoC Design for Many-core Processor. NPC 2009: 227-232 - Rui Wang, Depei Qian, Danfeng Zhu, Qinglin Zhu, Zhongzhi Luan:
Optimizing Transmission in Multi-Flow Streaming Overlay Networks. NPC 2009: 67-72 - Qingsong Wei, Zhixiang Li, Rajesh Vellore Arumugam, Kyawt Kyawt Khaing:
Design and Performance Evaluation of a Versatile Object-Based File System. NPC 2009: 133-139
skipping 6 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-27 02:20 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint