Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 56 matches
- 2011
- Bo Yang, Xiaofei Xu, Feng Tan, Dong Ho Park:
An utility-based job scheduling algorithm for Cloud computing considering reliability factor. CDC 2011: 95-102 - Hani AbuSharkh, Benjamin C. M. Fung:
Service-oriented architecture for sharing private spatial-temporal data. CDC 2011: 40-47 - Rajkumar Buyya, Saurabh Kumar Garg, Rodrigo N. Calheiros:
SLA-oriented resource provisioning for cloud computing: Challenges, architecture, and solutions. CDC 2011: 1-10 - Xi Chen, Haopeng Chen, Qing Zheng, Wenting Wang, Guodong Liu:
Characterizing web application performance for maximizing service providers' profits in clouds. CDC 2011: 191-198 - Li Deng, Hai Jin, Song Wu, Xuanhua Shi, Jiangfu Zhou:
Fast saving and restoring virtual machines with page compression. CDC 2011: 150-157 - Hanbing Deng, Xia Zhang, Jiren Liu:
Knowledge reasoning in health cloud. CDC 2011: 48-54 - Sheng Di, Cho-Li Wang, Luwei Cheng, Ling Chen:
Social-optimized win-win resource allocation for Self-organizing Cloud. CDC 2011: 251-258 - Wenjing Fang, Beihong Jin, Biao Zhang, Yuwei Yang, Ziyuan Qin:
Design and evaluation of a Pub/Sub service in the cloud. CDC 2011: 32-39 - Li Hao, Deyi Li, Runsheng Li, Jun Hu, Dongjie Zhao:
Visualizing revisions and building semantic network in Wikipedia. CDC 2011: 83-86 - Robin Hecht, Stefan Jablonski:
NoSQL evaluation: A use case oriented survey. CDC 2011: 336-341 - Yung-Ching Hsu, Pangfeng Liu, Jan-Jan Wu:
Job sequence scheduling for cloud computing. CDC 2011: 212-219 - Rui Hu, Yong Li, Yan Zhang:
Adaptive resource management in PaaS platform using Feedback Control LRU algorithm. CDC 2011: 11-18 - Waheed Iqbal, Matthew N. Dailey, David Carrera:
Black-box approach to capacity identification for multi-tier applications hosted on virtualized platforms. CDC 2011: 111-117 - William Jenkins, Sergiy Vilkomir, Puneet Sharma, George Pirocanac:
Framework for testing cloud platforms and infrastructures. CDC 2011: 134-140 - Chia Hung Kao, Shin Tze Liu:
A prototype system for object management in private cloud. CDC 2011: 348-353 - Rasib Hassan Khan, Miika Komu, Tuomas Aura:
Applicability analysis of grid security mechanisms on cloud networking. CDC 2011: 65-70 - Huixi Li, Hao Li:
A research of resource provider-oriented pricing mechanism based on game theory in Cloud Bank model. CDC 2011: 126-130 - Jiong Li, Guangchun Luo, Ling Tian:
Component-oriented executable meta-model for SaaS applications. CDC 2011: 288-291 - Ling Li, Lin Xu, Jing Li, Changchun Zhang:
Study on the third-party audit in cloud storage service. CDC 2011: 220-227 - John Liang, Aalap Desai, Jin Heo, Xuwen Yu, Joanna Guan, Rajit Kambo:
Understand and replay cloud platform SDK with vimShark. CDC 2011: 243-250 - Yi Liang, Zhuo Hao, Nenghai Yu, Bin Liu:
RandTest: Towards more secure and reliable dataflow processing in cloud computing. CDC 2011: 180-184 - Bin Lin, Shanshan Li, Xiangke Liao, Qingbo Wu, Shazhou Yang:
eStor: Energy efficient and resilient data center storage. CDC 2011: 366-371 - Weining Liu, Bo Liu, Dihua Sun:
A conceptual framework for dynamic manufacturing resource service composition and optimization in service-oriented networked manufacturing. CDC 2011: 118-125 - Bo Liu, Erci Xu, Jin Wang, Ziling Wei, Liyang Xu, Baokang Zhao, Jinshu Su:
Thwarting audio steganography attacks in cloud storage systems. CDC 2011: 259-265 - Shengmei Luo, Zhaoji Lin, Xiaohua Chen, Zhuolin Yang, Jianyong Chen:
Virtualization security for cloud computing service. CDC 2011: 174-179 - Ricky K. K. Ma, King Tin Lam, Cho-Li Wang:
eXCloud: Transparent runtime support for scaling mobile applications in cloud. CDC 2011: 103-110 - Wei Mi, Xiaofeng Qiu, Chunhong Zhang:
The analysis of security threats in structured P2P load balancing schemes. CDC 2011: 296-301 - Julia Myint, Thinn Thu Naing:
A data placement algorithm with binary weighted tree on PC cluster-based cloud storage system. CDC 2011: 315-320 - Junjie Ni, Yuanqiang Huang, Zhongzhi Luan, Juncheng Zhang, Depei Qian:
Virtual machine mapping policy based on load balancing in private cloud environment. CDC 2011: 292-295 - Zhenhao Pan, Qing He, Wei Jiang, Yu Chen, Yaozu Dong:
NestCloud: Towards practical nested virtualization. CDC 2011: 321-329
skipping 26 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-27 01:47 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint