default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 140 matches
- 2009
- Junaid Arshad, Paul Townend, Jie Xu:
Quantification of Security for Compute Intensive Workloads in Clouds. ICPADS 2009: 479-486 - Vlastimil Babka, Lukás Marek, Petr Tuma:
When Misses Differ: Investigating Impact of Cache Misses on Observed Performance. ICPADS 2009: 112-119 - Pavan Balaji, Harish Naik, Narayan Desai:
Understanding Network Saturation Behavior on Large-Scale Blue Gene/P Systems. ICPADS 2009: 586-593 - Jiri Barnat, Lubos Brim, Milan Ceska, Tomas Lamr:
CUDA Accelerated LTL Model Checking. ICPADS 2009: 34-41 - Olivier Beaumont, Lionel Eyraud-Dubois, Hejer Rejeb, Christopher Thraves:
Allocation of Clients to Multiple Servers on Large Scale Heterogeneous Platforms. ICPADS 2009: 142-149 - David Bermingham, Zhen Liu, Xiaojun Wang, Bin Liu:
Field-Based Branch Prediction for Packet Processing Engines. ICPADS 2009: 276-283 - Md. Zakirul Alam Bhuiyan, Guojun Wang, Jie Wu:
Polygon-Based Tracking Framework in Surveillance Wireless Sensor Networks. ICPADS 2009: 174-181 - Julien Bourgeois, Jean-Baptiste Ernst-Desmulier, François Spies:
Evaluation of a Performance Prediction Tool for Peer-to-Peer Distributed Computing Applications. ICPADS 2009: 814-820 - Zhen Cao, Yuan Dong, Shengyuan Wang:
Domain-specific Pattern Matching Based Automatic Parallelization: Demonstrated by 2-D Prestack Migration. ICPADS 2009: 973-980 - Fei Cao, Zhiyong Liu:
Snooping and Ordering Ring - An Efficient Cache Coherence Protocol for Ring Connected CMP. ICPADS 2009: 126-133 - Donggang Cao, Zan Xiao, Weizhong Shao:
A Service-oriented Programming Platform for Internet-Based Virtual Computing Environment. ICPADS 2009: 700-705 - Denis Caromel:
Keynote. ICPADS 2009 - Mo-Che Chan, Jehn-Ruey Jiang, Chao-Wei Hung, Wei Tsang Ooi:
Group-Based Peer-to-Peer 3D Streaming Authentication. ICPADS 2009: 685-691 - Dan Chen, Congcong Bian:
Towards Hybrid Grid Infrastructure for Large Simulations. ICPADS 2009: 716-721 - Po-Hui Chen, Chung-Ta King, Yuan-Ying Chang, Shau-Yin Tseng:
Multiprocessor System-on-Chip Profiling Architecture: Design and Implementation. ICPADS 2009: 519-526 - Xuan Chen, Shun Long:
Adaptive Multi-versioning for OpenMP Parallelization via Machine Learning. ICPADS 2009: 907-912 - Wei Chen, Li Shen, Hongyi Lu, Zhiying Wang, Nong Xiao:
A Light-weight Code Cache Design for Dynamic Binary Translation. ICPADS 2009: 120-125 - Cai Chen, Sen Su, Kai Shuang, Fangchun Yang:
Cowtra: A COntribution Willingness-Based Two-phase Bandwidth Resource Allocation Algorithm in P2P Network. ICPADS 2009: 848-853 - De-Yu Chen, Jan-Jan Wu, Pangfeng Liu:
Data-bandwidth-aware Job Scheduling in Grid and Cluster Environments. ICPADS 2009: 414-421 - Ping-I Chou, Pangfeng Liu:
A Study of Group Size Effects on a Hybrid P2P System. ICPADS 2009: 432-439 - Xiang Cui, Yifeng Chen, Hong Mei:
Improving Performance of Matrix Multiplication and FFT on GPU. ICPADS 2009: 42-48 - Wenchao Cui, Dian-fu Ma, Tianyu Wo, Qin Li:
Enhancing Reliability for Virtual Machines via Continual Migration. ICPADS 2009: 937-942 - Peng Di, Jingling Xue, Changjun Hu, Jingjing Zhou:
A Cache-Efficient Parallel Gauss-Seidel Solver with Alternating Tiling. ICPADS 2009: 244-251 - Dezun Dong, Mo Li, Yunhao Liu, Xiangke Liao:
WormCircle: Connectivity-Based Wormhole Detection in Wireless Ad Hoc and Sensor Networks. ICPADS 2009: 72-79 - Markus Esch, Wei Tsang Ooi, Ingo Scholtes:
Evaluation of the HyperVerse Avatar Management Scheme Based on the Analysis of Second Life Traces. ICPADS 2009: 692-699 - Jianxi Fan, Shukui Zhang, Xiaohua Jia, Guangquan Zhang:
A Fault-Free Unicast Algorithm in Twisted Cubes with the Restricted Faulty Node Set. ICPADS 2009: 316-323 - Shih-Cheng Fang, Chung-Ta King, Chiu-Ping Chang, Wen-Nan Wang:
A Supply-and-Demand Model for On-Demand Streaming in Networked Virtual Environments. ICPADS 2009: 679-684 - Yunxia Feng, Xingfa Shen, Zhigang Gao, Guojun Dai:
Queuing Based Traffic Model for Wireless Mesh Networks. ICPADS 2009: 648-654 - Yongquan Fu, Yijie Wang:
iRank: Supporting Proximity Ranking for Peer-to-Peer Applications. ICPADS 2009: 836-841 - Yongquan Fu, Yijie Wang:
HyperSpring: Accurate and Stable Latency Estimation in the Hyperbolic Space. ICPADS 2009: 864-869
skipping 110 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-29 04:53 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint