default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 96 matches
- 2010
- Qiong-Fang Bian, Ting-Ting Hang, Hui Liu, Mu-yun Fang:
Research on the Diameter and Average Diameter of Undirected Double-loop Networks. GCC 2010: 461-466 - Jing Cai, Zhibin Zhang, Peng Zhang, Xinbo Song:
Rethinking the Building Block: A Profiling Methodology for UDP Flows. GCC 2010: 332-337 - Jiuxin Cao, Biao Zhang, Bo Mao, Bo Liu:
Constraint Rules-based Recovery for Business Transaction. GCC 2010: 282-289 - Ying Chen, Wenzhong Guo, Guolong Chen:
A Dynamic-alliance-based Adaptive Task Allocation Algorithm in Wireless Sensor Networks. GCC 2010: 356-360 - Huacai Chen, Hai Jin, Kan Hu:
Affinity-aware Proportional Share Scheduling for Virtual Machine System. GCC 2010: 75-80 - Xiaohua Chen, Qiang Xu:
Military Information Grid-based Integrated Photo-electric Detector Technology. GCC 2010: 416-419 - Yaodong Cheng, Lu Wang, Qiulan Huang, Jingyan Shi:
A Large Scale Data Management System for BESGrid. GCC 2010: 521-525 - Thiago Damasceno Cordeiro, Douglas Brito Damalio, Nadilma Cintra Valenca Nunes Pereira, Patricia Takako Endo, André Vitor de Almeida Palhares, Glauco Estácio Gonçalves, Djamel Fawzi Hadj Sadok, Judith Kelner, Bob Melander, Victor Souza, Jan-Erik Mångs:
Open Source Cloud Computing Platforms. GCC 2010: 366-371 - Bin Dai, Ying Peng, Bin Gong:
Parallel Option Pricing with BSDE Method on GPU. GCC 2010: 191-195 - Haipeng Deng, Kai Chen, Bo Liu, Yunchao He, Kan Zhou, Yindong Yang, Alei Liang, Haibing Guan:
Efficient Online Trace Building Using Code Replication. GCC 2010: 70-74 - Lingli Deng, Qing Yu, Jin Peng, Ziyao Xu:
Replication-aware and Snowcrash-resistant VM Deployment for P2P Applications. GCC 2010: 252-257 - Wenjun Fan, Xudong Chen, Xuefeng Li:
Parallelization of RSA Algorithm Based on Compute Unified Device Architecture. GCC 2010: 174-178 - Jun Fang, Shoubao Yang, Wenyu Zhou, Hu Song:
Evaluating I/O Scheduler in Virtual Machines for Mapreduce Application. GCC 2010: 64-69 - Fangfang Wang, Tao Jun, Shao Birui:
An Energy-Balanced Multicast Routing Algorithm in Wireless Sensor Networks. GCC 2010: 361-365 - Caidong Gu, Kan Lu, Jian-Ping Wu, Ying-li Fu, Jingxiang Li, Changshui Xiao, Maoxin Si, Zhaobin Liu:
The Investigation of Cloud-Computing-based Image Mining Mechanism in Mobile Communication WEB on Android. GCC 2010: 408-411 - Xiao-Bing Guo, Zhiwei Xu, Min Liu:
New Internet Service Pattern Based on Asset Agent. GCC 2010: 314-319 - Wu Hai-Jia, Liu Peng, Chen Wei-Wei:
The Optimization Theory of File Partition in Network Storage Environment. GCC 2010: 30-33 - Xiangbin Han, Huadong Ma:
A Cloud Service for Automatic Marking of Virtual Experiment Based on Rules Engine. GCC 2010: 394-399 - Irfan Ul Haq, Erich Schikuta, Ivona Brandic, Adrian Paschke, Harold Boley:
SLA Validation of Service Value Chains. GCC 2010: 308-313 - Weijie He, Guoqing Li, Jing Zhang, Wenyang Yu, Jibo Xie:
Study on WPS Implement Framework with Shark Workflow. GCC 2010: 511-516 - Haiyan Hu, Yi Liu, Depei Qian:
I/O Feature-based File Prefetching for Multi-Applications. GCC 2010: 213-217 - Cheng Hu, Yun Wang:
A Novel Intelligent Traffic Light Control Scheme. GCC 2010: 372-376 - Caihua Hu, Ruisheng Zhang, Tongming Wei, Ruipeng Wei, Shuping Li, Yao Cheng:
Implementing the Compiler of UDLC. GCC 2010: 383-387 - Ruwei Huang, Si Yu, Wei Zhuang, Xiaolin Gui:
Design of Privacy-Preserving Cloud Storage Framework. GCC 2010: 128-132 - Changyun Jia, Longye Tang:
Reliability Verification of Software Based on Cloud Service. GCC 2010: 489-494 - Haihua Jiang, Hai Lv, Nan Wang, Rihua Di:
A Performance Monitoring Solution for Distributed Application System Based on JMX. GCC 2010: 124-127 - Xiaoyan Jiang, Yong Zhang, Shijun Liu:
A Well-designed SaaS Application Platform Based on Model-driven Approach. GCC 2010: 276-281 - Lei Fang, Shen-jun Yao, Ting Liu, Ren-yi Liu:
A Cloud Computing Application in Land Resources Information Management. GCC 2010: 388-393 - Lei Sun, Zishan Dai, Jindi Guo:
Research on Key Management Infrastructure in Cloud Computing Environment. GCC 2010: 404-407 - Qiang Li, Zhigang Huo, Ninghui Sun:
Building a Personal High Performance Computer with Heterogeneous Processors. GCC 2010: 223-228
skipping 66 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-23 20:45 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint