Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 64 matches
- 2002
- Jacobo Barro, Juan Touriño, Ramon Doallo, Víctor M. Gulías:
Performance Modeling and Evaluation of MPI-I/O on a Cluster. J. Inf. Sci. Eng. 18(5): 825-836 (2002) - Vicente Blanco Pérez, Patricia González, José Carlos Cabaleiro, Dora Blanco Heras, Tomás F. Pena, Juan J. Pombo, Francisco F. Rivera:
Performance of Parallel Iterative Solvers: a Library, a Prediction Model, and a Visualization Tool. J. Inf. Sci. Eng. 18(5): 763-785 (2002) - Ye-In Chang, Shih-Ying Chiu:
A Hybrid Approach to Query Sets Broadcasting Scheduling for Multiple Channels in Mobile Information Systems. J. Inf. Sci. Eng. 18(5): 641-666 (2002) - Chin-Chen Chang, Shu-Kai Yang, Ding-Zhou Duan, Ming-Fen Lin:
A Fuzzy-based Approach to Mesh Simplification. J. Inf. Sci. Eng. 18(3): 459-466 (2002) - Chi-Ming Chen, Ming-Hung Hsu, Tien-Yo Wang:
A Fast Winner-Take-All Neural Networks With the Dynamic Ratio. J. Inf. Sci. Eng. 18(2): 211-222 (2002) - Chang-Sheng Chen, Shian-Shyong Tseng, Chien-Liang Liu:
A Distributed Intrusion Detection Model for the Domain Name System. J. Inf. Sci. Eng. 18(6): 999-1009 (2002) - Benny Wang-Leung Cheung, Cho-Li Wang, Francis Chi-Moon Lau:
Migrating-Home Protocol for Software Distributed Shared Memory. J. Inf. Sci. Eng. 18(6): 929-957 (2002) - Hsin-Ta Chiao, Scott Hsu-Jing Kao, Yue-Shan Chang, Shen-Tzay Huang, Shyan-Ming Yuan:
Experience in Building a Real-Time Extension Library for Java. J. Inf. Sci. Eng. 18(6): 905-927 (2002) - Jih-Ching Chiu, Michael Jin-Yi Wang, Chung-Ping Chung:
Design of Instruction Address Queue for High Degree X86 Superscalar Architecture. J. Inf. Sci. Eng. 18(3): 393-409 (2002) - IlYoung Chung, Le Gruenwald, Chong-Sun Hwang, Soon Young Jung:
Adaptive Transaction Management Protocols for Mobile Client Caching DBMSs. J. Inf. Sci. Eng. 18(3): 445-457 (2002) - Sung Woo Chung, Jeong-Heon Shin, Hyong-Shik Kim, Chu Shik Jhon:
A Second-Level Cache With the Distance-Aware Replacement Policy for NUMA Systems. J. Inf. Sci. Eng. 18(5): 803-813 (2002) - Lawrence Y. Deng, Timothy K. Shih, Teh-Sheng Huang, Yi-Chun Liao, Ying-Hong Wang, Hui-Huang Hsu:
A Distributed Mobile Agent Framework for Maintaining Persistent Distance Education. J. Inf. Sci. Eng. 18(4): 489-506 (2002) - Chun-I Fan, Chin-Laung Lei:
A User Efficient Fair Blind Signature Scheme for Untraceable Electronic Cash. J. Inf. Sci. Eng. 18(1): 47-58 (2002) - Georgios I. Goumas, Maria Athanasaki, Nectarios Koziris:
Code Generation Methods for Tiling Transformations . J. Inf. Sci. Eng. 18(5): 667-691 (2002) - Wei-Hua He, Tzong-Chen Wu, Chih-Yin Lin:
Remarks on Using RSA With Low Exponent in a Public Network. J. Inf. Sci. Eng. 18(2): 341-344 (2002) - Hsien-Sheng Hsiao, Yeh-Hao Chin, Wei-Pang Yang:
Reaching Strong Consensus in a General Network. J. Inf. Sci. Eng. 18(4): 601-625 (2002) - Yuan-Pao Hsu, Kao-Shing Hwang, Jinn-Shyan Wang:
An Associative Architecture of CMAC for Mobile Robot Motion Control. J. Inf. Sci. Eng. 18(2): 145-161 (2002) - Min-Shiang Hwang, Cheng-Chi Lee, Ting Yi Chang:
Broadcasting Cryptosystem in Computer Networks Using Geometric Properties of Lines. J. Inf. Sci. Eng. 18(3): 373-379 (2002) - Gene Eu Jan, Frank Yeong-Sung Lin, Ming-Bo Lin, Deron Liang:
Concentrations, Load Balancing, Multicasting and Partial Permutation Routing on Hypercube Parallel Computers. J. Inf. Sci. Eng. 18(5): 693-712 (2002) - Jun-Cheol Jeon, Hyun-Sung Kim, Hyoung-Mok Lee, Kee-Young Yoo:
Bit-serial AB2 Multiplier Using Modified Inner Product. J. Inf. Sci. Eng. 18(4): 507-518 (2002) - Ming-Hui Jin, Jorng-Tzong Horng:
Evaluating the Performance of a Distributed Database of Repetitive Elements in Complete Genomes. J. Inf. Sci. Eng. 18(4): 533-539 (2002) - Hao-Ren Ke, Yu-Pao Tsai, Zen-Chung Shih:
Hierarchical Feature-Based Volume Morphing. J. Inf. Sci. Eng. 18(1): 85-106 (2002) - Jia-Ling Koh, Arbee L. P. Chen:
An Approach to Querying Multiple Object Databases. J. Inf. Sci. Eng. 18(2): 281-310 (2002) - Ki-Sik Kong, Joon-Min Gil, Youn-Hee Han, Ui-Sung Song, Chong-Sun Hwang:
A Forwarding Pointer-Based Cache Scheme for Reducing Location Management Cost in PCS Networks. J. Inf. Sci. Eng. 18(6): 1011-1025 (2002) - Wei-Chi Ku, Sheng-De Wang:
An Anonymous Endorsement System. J. Inf. Sci. Eng. 18(1): 107-114 (2002) - Hahn-Ming Lee, Jyh-Ming Chen, Chun-Lin Liu:
Inconsistency Resolution and Rule Insertion for Fuzzy Rule-Based Systems. J. Inf. Sci. Eng. 18(2): 187-210 (2002) - Sung-Min Lee, Tai-Yun Kim:
Two-Pass Hybrid Key Distribution Protocol Based on ECC. J. Inf. Sci. Eng. 18(1): 125-139 (2002) - Chin-Laung Lei, Wen-Shenq Juang, Pei-Ling Yu:
Provably Secure Blind Threshold Signatures Based on Discrete Logarithm. J. Inf. Sci. Eng. 18(1): 23-39 (2002) - Jung-Shian Li:
An Evaluation of Deficit Round Robin Fair Queuing Applied in Router Congestion Control. J. Inf. Sci. Eng. 18(2): 333-339 (2002) - Keqin Li:
Fast and Scalable Parallel Algorithms for Matrix Chain Product and Matrix Powers on Reconfigurable Pipelined Optical Buses. J. Inf. Sci. Eng. 18(5): 713-727 (2002)
skipping 34 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-01 06:32 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint