Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 55 matches
- 2008
- Adnan Agbaria, Roy Friedman:
Model-based performance evaluation of distributed checkpointing protocols. Perform. Evaluation 65(5): 345-365 (2008) - Attahiru Sule Alfa, Qi-Ming He:
Algorithmic analysis of the discrete time GI. Perform. Evaluation 65(9): 623-640 (2008) - François Baccelli, David R. McDonald:
A stochastic model for the throughput of non-persistent TCP flows. Perform. Evaluation 65(6-7): 512-530 (2008) - Baris Balcioglu, David L. Jagerman, Tayfur Altiok:
Merging and splitting autocorrelated arrival processes and impact on queueing performance. Perform. Evaluation 65(9): 653-669 (2008) - Mario Barbera, Alfio Lombardo, Giovanni Schembra, Andrea Trecarichi:
Improving fairness in a WRED-based DiffServ network: A fluid-flow approach. Perform. Evaluation 65(10): 759-783 (2008) - Michel Benaïm, Jean-Yves Le Boudec:
A class of mean field interaction models for computer and communication systems. Perform. Evaluation 65(11-12): 823-838 (2008) - Nizar Bouabdallah, Guy Pujolle, Harry G. Perros:
Multipoint-to-point lightpaths in all-optical networks: Dimensioning and cost analysis. Perform. Evaluation 65(3-4): 262-285 (2008) - Anne Bouillard, Bruno Gaujal, Sebastien Lagrange, Eric Thierry:
Optimal routing for end-to-end guarantees using Network Calculus. Perform. Evaluation 65(11-12): 883-906 (2008) - Alexandre Brandwajn, Hongyun Wang:
A conditional probability approach to M/G/1-like queues. Perform. Evaluation 65(5): 366-381 (2008) - Werner Bux:
Editorial. Perform. Evaluation 65(1): 1 (2008) - Tijani Chahed, Eitan Altman, Salah-Eddine Elayoubi:
Joint uplink and downlink admission control to both streaming and elastic flows in CDMA/HSDPA systems. Perform. Evaluation 65(11-12): 869-882 (2008) - Sing-Kong Cheung, Bara Kim, Jeongsim Kim:
Slowdown in the M/M/1 discriminatory processor-sharing queue. Perform. Evaluation 65(8): 586-605 (2008) - Jin-Hee Cho, Ing-Ray Chen, Ding-Chau Wang:
Performance optimization of region-based group key management in mobile ad hoc networks. Perform. Evaluation 65(5): 319-344 (2008) - Gautam Choudhury, Kandarpa Deka:
An M/G/1 retrial queueing system with two phases of service subject to the server breakdown and repair. Perform. Evaluation 65(10): 714-724 (2008) - Jean-Michel Fourneau, Brigitte Plateau, William J. Stewart:
An algebraic condition for product form in stochastic automata networks without synchronizations. Perform. Evaluation 65(11-12): 854-868 (2008) - Michele Garetto, Donald F. Towsley:
An efficient technique to analyze the impact of bursty TCP traffic in wide-area networks. Perform. Evaluation 65(2): 181-202 (2008) - Giada Giorgi, Claudio Narduzzi:
Rate-interval curves - A tool for the analysis and monitoring of network traffic. Perform. Evaluation 65(6-7): 441-462 (2008) - Marco Gribaudo, Miklós Telek:
Stationary analysis of fluid level dependent bounded fluid models. Perform. Evaluation 65(3-4): 241-261 (2008) - Bruce E. Hajek:
Substitute valuations: Generation and structure. Perform. Evaluation 65(11-12): 789-803 (2008) - Ahmad Al Hanbali, Philippe Nain, Eitan Altman:
Performance of ad hoc networks with two-hop relay routing and limited packet lifetime (extended version). Perform. Evaluation 65(6-7): 463-483 (2008) - Yu-Tong He, Douglas G. Down:
Limited choice and locality considerations for load balancing. Perform. Evaluation 65(9): 670-687 (2008) - Nam K. Kim, Mohan L. Chaudhry:
The use of the distributional Little's law in the computational analysis of discrete-time GI/G/1 and GI/D/c queues. Perform. Evaluation 65(1): 3-9 (2008) - Samson Lasaulce, Alberto Suárez, Raul de Lacerda, Mérouane Debbah:
Using cross-system diversity in heterogeneous networks: Throughput optimization. Perform. Evaluation 65(11-12): 907-921 (2008) - Aggelos Lazaris, Polychronis Koutsakis, Michael Paterakis:
A new model for video traffic originating from multiplexed MPEG-4 videoconference streams. Perform. Evaluation 65(1): 51-70 (2008) - Donghwan Lee, Jin-Ghoo Choi, Changhee Joo, Saewoong Bahk:
Hierarchical Markov chain analysis of an adaptive bandwidth reservation algorithm in wireless communication systems. Perform. Evaluation 65(8): 573-585 (2008) - Ho Woo Lee, Won Joo Seo:
The performance of the M/G/1 queue under the dyadic I-policy and its cost optimization. Perform. Evaluation 65(10): 742-758 (2008) - Luciano Lenzini, Daniele Miorandi, Vaidyanathan Ramaswami:
Innovative performance evaluation methodologies and tools: Selected papers from ValueTools 2006. Perform. Evaluation 65(6-7): 397-399 (2008) - Luciano Lenzini, Enzo Mingozzi, Giovanni Stea:
A methodology for computing end-to-end delay bounds in FIFO-multiplexing tandems. Perform. Evaluation 65(11-12): 922-943 (2008) - Quan-Lin Li, Liming Liu, Weixin Shang:
Heavy-tailed asymptotics for a fluid model driven by an M/G/1 queue. Perform. Evaluation 65(3-4): 227-240 (2008) - Zhengqiang Liang, Weisong Shi:
Analysis of ratings on trust inference in open environments. Perform. Evaluation 65(2): 99-128 (2008)
skipping 25 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-28 08:29 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint