Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 72 matches
- 2009
- Tokunbo O. S. Adeshiyan, C. Richard Attanasio, Erin Farr, Richard E. Harper, Dan Pelleg, C. Schulz, Lisa Spainhower, Paula Ta-Shma, Lorrie A. Tomek:
Using virtualization for high availability and disaster recovery. IBM J. Res. Dev. 53(4): 8 (2009) - Jonathan Appavoo, Volkmar Uhlig, Amos Waterland, Bryan S. Rosenburg, Dilma Da Silva, José E. Moreira:
Kittyhawk: Enabling cooperation and competition in a global, shared computational system. IBM J. Res. Dev. 53(4): 9 (2009) - Christine Axnix, J. R. Birtles, M. Groetzner, F. Hardt, Klaus Kuehl, Vanda M. Lourenço, C. Mayer, Jürgen Probst, Horst Sinram, M. Stock, Brian D. Valentine:
Capacity on Demand advancements on the IBM System z10. IBM J. Res. Dev. 53(1): 15 (2009) - Stefan Berger, Ramón Cáceres, Kenneth A. Goldman, Dimitrios E. Pendarakis, Ronald Perez, Josyula R. Rao, Eran Rom, Reiner Sailer, Wayne Schildhauer, Deepa Srinivasan, Sivan Tal, Enriquillo Valdez:
Security for the cloud infrastructure: Trusted virtual data center implementation. IBM J. Res. Dev. 53(4): 6 (2009) - Elisa Bertino, Carolyn Brodie, Seraphin B. Calo, Lorrie Faith Cranor, Clare-Marie Karat, John Karat, Ninghui Li, Dan Lin, Jorge Lobo, Qun Ni, Prathima Rao, Xiping Wang:
Analysis of privacy and security policies. IBM J. Res. Dev. 53(2): 3 (2009) - Anuradha Bhamidipaty, Nanjangud C. Narendra, Shailabh Nagar, Virendra K. Varshneya, Mitesh Vasa, C. Deshwal:
Indra: An integrated quantitative system for compliance management for IT service delivery. IBM J. Res. Dev. 53(6): 6 (2009) - Manish Bhide, Sumit Negi, L. Venkata Subramaniam, Himanshu Gupta:
Customer-focused service management for contact centers. IBM J. Res. Dev. 53(6): 9 (2009) - Marina Biberstein, Shiri Dori-Hacohen, Yuval Harel, Andre Heilper, Bilha Mendelson, Uzi Shvadron, Eran Treister, Javier Turek, Moon S. Chang:
Cell Broadband Engine processor performance optimization: Tracing tools implementation and use. IBM J. Res. Dev. 53(5): 7 (2009) - Andreas Bieswanger, M. Andres, J. J. Van Heuklon, Thomas B. Mathias, Harm Osterndorf, Scott Piper, M. R. Vanderwiel:
Power and thermal monitoring for the IBM System z10. IBM J. Res. Dev. 53(1): 14 (2009) - J. Black, R. Gottschalk, T. Lococo, D. Moore:
Architectures and technologies for the globally integrated enterprise. IBM J. Res. Dev. 53(6): 1 (2009) - Gerd Breiter, Michael Behrendt:
Life cycle and characteristics of services in the world of cloud computing. IBM J. Res. Dev. 53(4): 3 (2009) - Thomas Brunschwiler, Brian Smith, E. Ruetsche, Bruno Michel:
Toward zero-emission data centers through direct reuse of thermal energy. IBM J. Res. Dev. 53(3): 11 (2009) - Simon M. Bunn, L. Reynolds:
The energy-efficiency benefits of pump-scheduling optimization for potable water supplies. IBM J. Res. Dev. 53(3): 5 (2009) - Rong N. Chang, W. Falk, H. Hall, Petra Kopp, Stefan Pappe, M. Schultz, A. Szypka, N. C. Wadia:
Gaining insight into the health of SOA infrastructures. IBM J. Res. Dev. 53(6): 5 (2009) - D. A. Chapin, A. C. Nelson, Ben S. Gerber:
A technology perspective on worldwide privacy regulations. IBM J. Res. Dev. 53(2): 1 (2009) - Edward W. Chencinski, M. A. Check, Casimer M. DeCusatis, H. Deng, M. Grassi, Thomas A. Gregg, Markus M. Helms, A. D. Koenig, L. Mohr, Kulwant M. Pandey, Thomas Schlipf, Torsten Schober, H. Ulrich, Craig R. Walters:
IBM System z10 I/O subsystem. IBM J. Res. Dev. 53(1): 6 (2009) - Vijil Chenthamarakshan, Kuntal Dey, Jianying Hu, Aleksandra Mojsilovic, W. Riddle, Vikas Sindhwani:
Leveraging social networks for corporate staffing and expert recommendation. IBM J. Res. Dev. 53(6): 11 (2009) - William J. Clarke, Luiz C. Alves, T. J. Dell, H. Elfering, Jeffrey P. Kubala, C. Lin, Michael J. Mueller, K. Werner:
IBM System z10 design for RAS. IBM J. Res. Dev. 53(1): 11 (2009) - David Cohen, Fabrizio Petrini, Michael D. Day, Muli Ben-Yehuda, Steven W. Hunter, Uri Cummings:
Applying Amdahl's Other Law to the data center. IBM J. Res. Dev. 53(5): 5 (2009) - Catherine H. Crawford, D. J. Burdick, J. N. Dale, E. F. Ford, R. A. Mikosh, A. Nobles, V. To:
Software architecture and system validation of an open, unified model for accelerated multicore computing. IBM J. Res. Dev. 53(5): 6 (2009) - Barbara Eckman, Paul C. West, Carol Barford, George Raber:
Intuitive simulation, querying, and visualization for river basin policy and management. IBM J. Res. Dev. 53(3): 7 (2009) - Don Grice, H. Brandt, C. Wright, Patrick McCarthy, A. Emerich, T. Schimke, Charles Archer, J. Carey, P. Sanders, J. A. Fritzjunker, S. Lewis, P. Germann:
Breaking the petaflops barrier. IBM J. Res. Dev. 53(5): 1 (2009) - Michael Gschwind:
Integrated execution: A programming model for accelerators. IBM J. Res. Dev. 53(5): 4 (2009) - Hendrik F. Hamann, Theodore G. van Kessel, Madhu Iyengar, Jen-Yao Chung, W. Hirt, Michael A. Schappert, A. Claassen, J. M. Cook, Wanli Min, Y. Amemiya, Vanessa López, James A. Lacey, M. O'Boyle:
Uncovering energy-efficiency opportunities in data centers. IBM J. Res. Dev. 53(3): 10 (2009) - Howard M. Haynie, Jeffrey M. Turner, Jeffrey C. Hanscom, Michael Cadigan, Nihad Hadzic, Daniele Di Genova, John Aylward, Sean W. Salisbury, Philip A. Sciuto, Thomas D. Needham, Clinton E. Bubb, R. Brett Tremaine:
IBM System z10 Open Systems Adapter Ethernet data router. IBM J. Res. Dev. 53(1): 8 (2009) - S. D. Hennessy, G. D. Lauer, Nev Zunic, Ben S. Gerber, A. C. Nelson:
Data-centric security: Integrating data privacy and data security. IBM J. Res. Dev. 53(2): 2 (2009) - Kathryn M. Jackson, M. A. Wisniewski, D. Schmidt, U. Hild, Stephen Heisi, Phil C. Yeh, Wolfgang Gellerich:
IBM System z10 performance improvements with software and hardware synergy. IBM J. Res. Dev. 53(1): 16 (2009) - Hani Jamjoom, Huiming Qu, Melissa J. Buco, Milton Hernandez, Debanjan Saha, Mahmoud Naghshineh:
Crowdsourcing and service delivery. IBM J. Res. Dev. 53(6): 12 (2009) - Xing Jin, Ruth Willenborg, Yang Zhao, Changhua Sun, Le He, Zhijia Chen, Ying Chen, Qingbo Wang:
Reinventing virtual appliances. IBM J. Res. Dev. 53(4): 7 (2009) - John Karat, Clare-Marie Karat, Elisa Bertino, Ninghui Li, Qun Ni, Carolyn Brodie, Jorge Lobo, Seraphin B. Calo, Lorrie Faith Cranor, Ponnurangam Kumaraguru, Robert W. Reeder:
Policy framework for security and privacy management. IBM J. Res. Dev. 53(2): 4 (2009)
skipping 42 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-30 14:36 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint