Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 58 matches
- 2015
- Sridhar Adepu, Aditya Mathur, Jagadeesh Gunda, Sasa Z. Djokic:
An Agent-Based Framework for Simulating and Analysing Attacks on Cyber Physical Systems. ICA3PP (3) 2015: 785-798 - Masayuki Arai, Shingo Inuyama, Kazuhiko Iwasaki:
Note on Fast Bridge Fault Test Generation Based on Critical Area. ICA3PP (3) 2015: 729-740 - Nianyuan Bao, Jie Tang, Xiaoyu Zhang, Gangshan Wu:
A New Data Replication Scheme for PVFS2. ICA3PP (3) 2015: 475-491 - Md. Zakirul Alam Bhuiyan, Guojun Wang, Jie Wu, Tian Wang, Xiangyong Liu:
Resource-Efficient Vibration Data Collection in Cyber-Physical Systems. ICA3PP (3) 2015: 134-147 - Jian Cao, Qiang Fu, Qiang Li, Dong Guo:
Leveraging Behavior Diversity to Detect Spammers in Online Social Networks. ICA3PP (3) 2015: 323-336 - Lianyu Cao, Penghui Juan, Yinghua Zhang:
Real-Time Deconvolution with GPU and Spark for Big Imaging Data Analysis. ICA3PP (3) 2015: 240-250 - Jen-Chieh Chang, Ting-Hsuan Chien, Rong-Guey Chang:
A Cyber Physical System with GPU for CNC Applications. ICA3PP (3) 2015: 203-212 - Jue Chen, Jinbang Chen, Fei Xu, Min Yin, Wei Zhang:
When Software Defined Networks Meet Fault Tolerance: A Survey. ICA3PP (3) 2015: 351-368 - Houwu Chen, Jiwu Shu:
Sky: Opinion Dynamics Based Consensus for P2P Network with Trust Relationships. ICA3PP (3) 2015: 517-531 - Lei Cui, Zhiyu Hao, Lun Li, Haiqiang Fei, Zhenquan Ding, Bo Li, Peng Liu:
Lightweight Virtual Machine Checkpoint and Rollback for Long-running Applications. ICA3PP (3) 2015: 577-596 - Chuangen Gao, Hua Wang, Fangjin Zhu, Linbo Zhai, Shanwen Yi:
A Particle Swarm Optimization Algorithm for Controller Placement Problem in Software Defined Network. ICA3PP (3) 2015: 44-54 - Xiaojun Guo, Guang Cheng, Wubin Pan, Truong Dinhtu, Yixin Liang:
A Novel Search Engine-Based Method for Discovering Command and Control Server. ICA3PP (3) 2015: 311-322 - Hongbo Han, Zhenxiang Chen, Qiben Yan, Lizhi Peng, Lei Zhang:
A Real-time Android Malware Detection System Based on Network Traffic Analysis. ICA3PP (3) 2015: 504-516 - Shiming He, Weini Zeng, Kun Xie:
Privacy Preserving for Network Coding in Smart Grid. ICA3PP (3) 2015: 640-654 - Yung-Li Hu, Yuo-Yu Cho, Wei-Bing Su, David S. L. Wei, Yennun Huang, Jiann-Liang Chen, Ing-Yi Chen, Sy-Yen Kuo:
A Programming Framework for Implementing Fault-Tolerant Mechanism in IoT Applications. ICA3PP (3) 2015: 771-784 - Wenbin Hu, Liping Yan, Huan Wang, Bo Du:
On Exploring a Virtual Agent Negotiation Inspired Approach for Route Guidance in Urban Traffic Networks. ICA3PP (3) 2015: 3-16 - Zhenchun Huang, Guoqing Li:
Exploiting Scalable Parallelism for Remote Sensing Analysis Models by Data Transformation Graph. ICA3PP (3) 2015: 119-133 - Sheng Huo, Dafang Zhang, Yanbiao Li:
Fast and Scalable Regular Expressions Matching with Multi-Stride Index NFA. ICA3PP (3) 2015: 597-610 - Xinpu Ji, Yuxiang Ma, Rui Ma, Peng Li, Jingwei Ma, Gang Wang, Xiaoguang Liu, Zhongwei Li:
A Proactive Fault Tolerance Scheme for Large Scale Storage Systems. ICA3PP (3) 2015: 337-350 - Wenbin Jiang, Zhiwei Lu, Hai Jin, Ye Chi:
A New Approach for Vehicle Recognition and Tracking in Multi-camera Traffic System. ICA3PP (3) 2015: 148-161 - Qiang Lan, Namit Gaur, Johannes Langguth, Xing Cai:
Towards Detailed Tissue-Scale 3D Simulations of Electrical Activity and Calcium Handling in the Human Cardiac Ventricle. ICA3PP (3) 2015: 79-92 - Chunjiang Li, Yushan Dong, Kuan Li:
Stencil Computations on HPC-oriented ARMv8 64-Bit Multi-Core Processor. ICA3PP (3) 2015: 30-43 - Teng Li, Jianfeng Ma, Cong Sun:
CRVad: Confidential Reasoning and Verification Towards Secure Routing in Ad Hoc Networks. ICA3PP (3) 2015: 449-462 - Qian Li, Weiguo Wu, Zeyu Sun, Lei Wang, Jianhang Huang:
Economy-Oriented Deadline Scheduling Policy for Render System Using IaaS Cloud. ICA3PP (3) 2015: 68-78 - Chun-hua Li, Ronglei Wei, Zebang Wu, Ke Zhou, Cheng Lei, Hao Jin:
Adopting Multi-mode Access Control for Secure Data Sharing in Cloud. ICA3PP (3) 2015: 532-546 - Chao Li, Yida Wang, Changhai Zhao, Haihua Yan, Jianlei Zhang:
Parallel Kirchhoff Pre-Stack Depth Migration on Large High Performance Clusters. ICA3PP (3) 2015: 251-266 - Lei Li, Yonghua Xiong, Shufan Guo, Keyuan Jiang, Yongbing Tang:
A Streaming Execution Method for Multi-services in Mobile Cloud Computing. ICA3PP (3) 2015: 55-67 - Weihao Liang, Hong An, Feng Li, Yichao Cheng:
Optimization of Binomial Option Pricing on Intel MIC Heterogeneous System. ICA3PP (3) 2015: 17-29 - Xin Liao, Guoyong Chen, Qi Li, Jun Liu:
Improved WOW Adaptive Image Steganography Method. ICA3PP (3) 2015: 695-702 - Chi Lin, Kun Liu, Bo Xu, Jing Deng, Chang-Wu Yu, Guowei Wu:
VCLT: An Accurate Trajectory Tracking Attack Based on Crowdsourcing in VANETs. ICA3PP (3) 2015: 297-310
skipping 28 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-04 20:55 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint