Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 67 matches
- 2015
- Saeid Abolfazli, Zohreh Sanaei, Ali Tabassi, Steven Rosen, Abdullah Gani, Samee Ullah Khan:
Cloud Adoption in Malaysia: Trends, Opportunities, and Challenges. IEEE Cloud Comput. 2(1): 60-68 (2015) - Stefan Berger, Kenneth A. Goldman, Dimitrios E. Pendarakis, David Safford, Enriquillo Valdez, Mimi Zohar:
Scalable Attestation: A Step toward Secure and Trusted Clouds. IEEE Cloud Comput. 2(5): 10-18 (2015) - David Bernstein:
Is Amazon Becoming the New Cool Software Company for Developers? IEEE Cloud Comput. 2(1): 69-71 (2015) - Elisa Bertino, Surya Nepal, Rajiv Ranjan:
Building Sensor-Based Big Data Cyberinfrastructures. IEEE Cloud Comput. 2(5): 64-69 (2015) - K. Selçuk Candan, Christian S. Jensen, Manish Parashar, Kyung Dong Ryu, Heonyoung Yeom:
Cloud Engineering [Guest editors' introduction]. IEEE Cloud Comput. 2(5): 6-8 (2015) - Henry Chang:
Privacy Regulatory Model for the Cloud: A Case Study. IEEE Cloud Comput. 2(3): 67-72 (2015) - Kyle Chard, Simon Caton, Omer F. Rana, Kris Bubendorfer:
Social Clouds: A Retrospective. IEEE Cloud Comput. 2(6): 30-40 (2015) - Xuexiu Chen, Chi Chen, Yuan Tao, Jiankun Hu:
A Cloud Security Assessment System Based on Classifying and Grading. IEEE Cloud Comput. 2(2): 58-67 (2015) - Wenyi Chen, Anup Mohan, Yung-Hsiang Lu, Thomas J. Hacker, Wei Tsang Ooi, Edward J. Delp:
Analysis of Large-Scale Distributed Cameras Using the Cloud. IEEE Cloud Comput. 2(5): 54-62 (2015) - Kim-Kwang Raymond Choo, Rick Sarre:
Balancing Privacy with Legitimate Surveillance and Lawful Data Access. IEEE Cloud Comput. 2(4): 8-13 (2015) - Roger Clarke:
Does SaaS Backup Pass the Fitness-for-Purpose Test? IEEE Cloud Comput. 2(6): 58-63 (2015) - Quang Do, Ben Martini, Kim-Kwang Raymond Choo:
A Cloud-Focused Mobile Forensics Methodology. IEEE Cloud Comput. 2(4): 60-65 (2015) - Ivan Farris, Roberto Girau, Leonardo Militano, Michele Nitti, Luigi Atzori, Antonio Iera, Giacomo Morabito:
Social Virtual Objects in the Edge Cloud. IEEE Cloud Comput. 2(6): 20-28 (2015) - Lee Garber:
In Brief. IEEE Cloud Comput. 2(1): 4-6 (2015) - Melvin Greer:
FITARA and FedRAMP: Accelerating Federal Cloud Adoption. IEEE Cloud Comput. 2(5): 48-52 (2015) - Mateusz Guzek, Alicja Gniewek, Pascal Bouvry, Jedrzej Musial, Jacek Blazewicz:
Cloud Brokering: Current Practices and Upcoming Challenges. IEEE Cloud Comput. 2(2): 40-47 (2015) - Nick S. Holliman, Paul Watson:
Scalable Real-Time Visualization Using the Cloud. IEEE Cloud Comput. 2(6): 90-96 (2015) - Dina Hussein, Son N. Han, Gyu Myoung Lee, Noël Crespi:
Social Cloud-Based Cognitive Reasoning for Task-Oriented Recommendation. IEEE Cloud Comput. 2(6): 10-19 (2015) - Michaela Iorga, Anil Karmel:
Managing Risk in a Cloud Ecosystem. IEEE Cloud Comput. 2(6): 51-57 (2015) - Kevin L. Jackson:
IEEE GovCloud: Making A Difference for Global Governments. IEEE Cloud Comput. 2(4): 54-59 (2015) - Nina Viktoria Juliadotter, Kim-Kwang Raymond Choo:
Cloud Attack and Risk Assessment Taxonomy. IEEE Cloud Comput. 2(1): 14-20 (2015) - Attila Kertész:
Interoperable Data Management Using Personal and Infrastructure Clouds. IEEE Cloud Comput. 2(1): 22-28 (2015) - Atta ur Rehman Khan, Mazliza Othman, Feng Xia, Abdul Nasir Khan:
Context-Aware Mobile Cloud Computing and Its Challenges. IEEE Cloud Comput. 2(3): 42-49 (2015) - Colette Langos, Mark Giancaspro:
Does Cloud Storage Lend Itself to Cyberbullying? IEEE Cloud Comput. 2(5): 70-74 (2015) - He Li, Mianxiong Dong, Kaoru Ota:
Radio Access Network Virtualization for the Social Internet of Things. IEEE Cloud Comput. 2(6): 42-50 (2015) - David S. Linthicum:
The Evolution of Cloud Service Governance. IEEE Cloud Comput. 2(6): 86-89 (2015) - Jesus Luna, Neeraj Suri, Michaela Iorga, Anil Karmel:
Leveraging the Potential of Cloud Security Service-Level Agreements through Standards. IEEE Cloud Comput. 2(3): 32-40 (2015) - Constantinos Macropoulos, Keith M. Martin:
Balancing Privacy and Surveillance in the Cloud. IEEE Cloud Comput. 2(4): 14-21 (2015) - Sanjay Madria, Amartya Sen:
Offline Risk Assessment of Cloud Service Providers. IEEE Cloud Comput. 2(3): 50-57 (2015) - Beniamino Di Martino, Giuseppina Cretella, Antonio Esposito:
Advances in Applications Portability and Services Interoperability among Multiple Clouds. IEEE Cloud Comput. 2(2): 22-28 (2015)
skipping 37 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-23 21:46 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint