Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 76 matches
- 2009
- Lihua Ai, Siwei Luo:
Replica Replacement Strategy Evaluation Based on Grid Locality. CloudCom 2009: 565-570 - Mufajjul Ali:
Green Cloud on the Horizon. CloudCom 2009: 451-459 - Abdulrahman Azab, Hein Meling:
Decentralized Service Allocation in a Broker Overlay Based Grid. CloudCom 2009: 200-211 - Kyrre M. Begnum, Nii Apleh Lartey, Lu Xing:
Cloud-Oriented Virtual Machine Management with MLN. CloudCom 2009: 266-277 - Rajkumar Buyya, Suraj Pandey, Christian Vecchiola:
Cloudbus Toolkit for Market-Oriented Cloud Computing. CloudCom 2009: 24-44 - Buqing Cao, Bing Li, Qi-Ming Xia:
A Service-Oriented Qos-Assured and Multi-Agent Cloud Computing Architecture. CloudCom 2009: 644-649 - Erdal Cayirci, Chunming Rong, Wim Huiskamp, Cor Verkoelen:
Snow Leopard Cloud: A Multi-national Education Training and Experimentation Cloud and Its Security Challenges. CloudCom 2009: 57-68 - Danwei Chen, Xiuli Huang, Xunyi Ren:
Access Control of Cloud Service Based on UCON. CloudCom 2009: 559-564 - Sadie Creese, Paul Hopkins, Siani Pearson, Yun Shen:
Data Protection-Aware Design for Cloud Services. CloudCom 2009: 119-130 - Zeng Dadan, Wang Xieqin, Ningkang Jiang:
Distributed Scheduling Extension on Hadoop. CloudCom 2009: 687-693 - Yuanshun Dai, Yanping Xiang, Gewei Zhang:
Self-healing and Hybrid Diagnosis in Cloud Computing. CloudCom 2009: 45-56 - Bo Dong, Qinghua Zheng, Mu Qiao, Jian Shu, Jie Yang:
BlueSky Cloud Framework: An E-Learning Framework Embracing Cloud Computing. CloudCom 2009: 577-582 - Zhe Fang, Minglu Li, Chuliang Weng, Yuan Luo:
Dynamic Malicious Code Detection Based on Binary Translator. CloudCom 2009: 80-89 - Geoffrey C. Fox, Xiaohong Qiu, Scott Beason, Jong Youl Choi, Jaliya Ekanayake, Thilina Gunarathne, Mina Rho, Haixu Tang, Neil Devadasan, Gilbert Liu:
Biomedical Case Studies in Data Intensive Computing. CloudCom 2009: 2-18 - Nicolas G. Grounds, John K. Antonio, Jeffrey T. Muehring:
Cost-Minimizing Scheduling of Workflows on a Cloud of Memory Managed Multicore Machines. CloudCom 2009: 435-450 - Leitao Guo, Hongwei Sun, Zhiguo Luo:
A Data Distribution Aware Task Scheduling Strategy for MapReduce System. CloudCom 2009: 694-699 - Jinyu Han, Min Hu, Hongwei Sun:
Search Engine Prototype System Based on Cloud Computing. CloudCom 2009: 332-337 - Laiquan Han, Jinkuan Wang, Cuirong Wang:
A Novel Multipath Load Balancing Algorithm in Fat-Tree Data Center. CloudCom 2009: 405-412 - Yangfan He, Lu Li, Keqing He, Xiuhong Chen:
A Contextual Information Acquisition Approach Based on Semantics and Mashup Technology. CloudCom 2009: 510-518 - Luokai Hu, Shi Ying, Xiangyang Jia, Kai Zhao:
Towards an Approach of Semantic Access Control for Cloud Computing. CloudCom 2009: 145-156 - Xin Huang, Yin He, Yifan Hou, Lisi Li, Lan Sun, Sina Zhang, Yang Jiang, Tingting Zhang:
Privacy of Value-Added Context-Aware Service Cloud. CloudCom 2009: 547-552 - Mohammad Farhan Husain, Pankil Doshi, Latifur Khan, Bhavani Thuraisingham:
Storage and Retrieval of Large RDF Graph Using Hadoop and MapReduce. CloudCom 2009: 680-686 - Shadi Ibrahim, Hai Jin, Lu Lu, Li Qi, Song Wu, Xuanhua Shi:
Evaluating MapReduce on Virtual Machines: The Hadoop Case. CloudCom 2009: 519-528 - Waheed Iqbal, Matthew N. Dailey, David Carrera:
SLA-Driven Adaptive Resource Management for Web Applications on a Heterogeneous Compute Cloud. CloudCom 2009: 243-253 - Xiangyang Jia, Shi Ying, Luokai Hu, Chunlin Chen:
Scheduling Active Services in Clustered JBI Environment. CloudCom 2009: 413-422 - Shaocan Jiang, Luming Fang, Xiaoying Huang:
An Idea of Special Cloud Computing in Forest Pests' Control. CloudCom 2009: 615-620 - Hyun Jung La, Soo Dong Kim:
A Systematic Process for Developing High Quality SaaS Cloud Services. CloudCom 2009: 278-289 - Hongwei Li, Yuanshun Dai, Ling Tian, Haomiao Yang:
Identity-Based Authentication for Cloud Computing. CloudCom 2009: 157-166 - Yang Li, Zheng Li, Nenghai Yu, Ke Ma:
APFA: Asynchronous Parallel Finite Automaton for Deep Packet Inspection in Cloud Computing. CloudCom 2009: 529-540 - Wenjuan Li, Lingdi Ping:
Trust Model to Enhance Security and Interoperability of Cloud Environment. CloudCom 2009: 69-79
skipping 46 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-05 18:40 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint