default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 62 matches
- 2024
- Zhenzhen He, Jiong Yu, Tiquan Gu:
A novel query execution time prediction approach based on operator iterate-aware of the execution plan on the graph database. J. King Saud Univ. Comput. Inf. Sci. 36(7): 102125 (2024) - Yiqing Yang, Guoyin Zhang, Yanxia Wu, Zhixiang Zhao, Yan Fu:
Split-bucket partition (SBP): a novel execution model for top-K and selection algorithms on GPUs. J. Supercomput. 80(11): 15122-15160 (2024) - Jayesh Jayashankar, Anna L. Packy, Arya Teymourlouei, Alexandra A. Shaver, Garrett E. Katz, James A. Reggia, James Purtilo, Rodolphe J. Gentili:
Assessment of a Novel Virtual Environment for Examining Cognitive-Motor Processes During Execution of Action Sequences in a Human-Robot Teaming Context. HCI (11) 2024: 147-166 - 2023
- Daniel Weber, Fabian Thomas, Lukas Gerlach, Ruiyi Zhang, Michael Schwarz:
Indirect Meltdown: Building Novel Side-Channel Attacks from Transient-Execution Attacks. ESORICS (3) 2023: 22-42 - Daniel Weber, Fabian Thomas, Lukas Gerlach, Ruiyi Zhang, Michael Schwarz:
Indirect Meltdown: Building Novel Side-Channel Attacks from Transient-Execution Attacks. CoRR abs/2310.04183 (2023) - 2022
- Mohammad Rahmani Fadiheh:
Unique Program Execution Checking: A Novel Approach for Formal Security Analysis of Hardware. Kaiserslautern University of Technology, Germany, 2022 - Alexandra A. Shaver, Neehar Peri, Remy Mezebish, George Matthew, Alyza Berson, Christopher Gaskins, Gregory P. Davis, Garrett E. Katz, Immanuel Babu Henry Samuel, Matthew J. Reinhard, Michelle E. Costanzo, James A. Reggia, James Purtilo, Rodolphe J. Gentili:
Assessment of a Novel Virtual Environment for Examining Human Cognitive-Motor Performance During Execution of Action Sequences. HCI (9) 2022: 361-380 - Tim Geppert, Jan Anderegg, Leoncio Frei, Simon Moeller, Stefan Deml, David Sturzenegger, Nico Ebert:
Overcoming Cloud Concerns with Trusted Execution Environments? Exploring the Organizational Perception of a Novel Security Technology in Regulated Swiss Companies. HICSS 2022: 1-8 - Davide Profeta, Nicola Masi, Domenico Messina, Davide Dalle Carbonare, Susanna Bonura, Vito Morreale:
A Novel Micro-service Based Platform for Composition, Deployment and Execution of BDA Applications. CoRR abs/2202.02845 (2022) - 2021
- Mitra Mahdiani, Alejandro Masrur:
A novel view on bounding execution demand under mixed-criticality EDF. Real Time Syst. 57(1-2): 55-94 (2021) - Peter Gsellmann, Martin Melik-Merkumians, Alois Zoitl, Georg Schitter:
A Novel Approach for Integrating IEC 61131-3 Engineering and Execution Into IEC 61499. IEEE Trans. Ind. Informatics 17(8): 5411-5418 (2021) - Daniel Borrajo, Manuela Veloso:
Computing Opportunities to Augment Plans for Novel Replanning during Execution. ICAPS 2021: 51-55 - Pejman Ghasemzadeh, Michael Hempel, Hamid Sharif:
A Novel High-Accuracy Low-Execution Time Machine Learning- Driven Approach to Automatic Modulation Classification. CCNC 2021: 1-6 - Jiaqi Hong, Xuhua Ding:
A Novel Dynamic Analysis Infrastructure to Instrument Untrusted Execution Flow Across User-Kernel Spaces. SP 2021: 1902-1918 - Sriram Gopalakrishnan, Utkarsh Soni, Tung Thai, Panagiotis Lymperopoulos, Matthias Scheutz, Subbarao Kambhampati:
Integrating Planning, Execution and Monitoring in the presence of Open World Novelties: Case Study of an Open World Monopoly Solver. CoRR abs/2107.04303 (2021) - 2020
- Yong Wang, June Li, Siyu Zhao, Fajiang Yu:
Hybridchain: A Novel Architecture for Confidentiality-Preserving and Performant Permissioned Blockchain Using Trusted Execution Environment. IEEE Access 8: 190652-190662 (2020) - Shi-Min Hu, Dun Liang, Guo-Ye Yang, Guo-Wei Yang, Wen-Yang Zhou:
Jittor: a novel deep learning framework with meta-operators and unified graph execution. Sci. China Inf. Sci. 63(12) (2020) - Salem A. Almazok, Bülent Bilgehan:
A novel dynamic source routing (DSR) protocol based on minimum execution time scheduling and moth flame optimization (MET-MFO). EURASIP J. Wirel. Commun. Netw. 2020(1): 219 (2020) - Zheng Chu, Jiong Yu, Askar Hamdulla:
A novel deep learning method for query task execution time prediction in graph database. Future Gener. Comput. Syst. 112: 534-548 (2020) - Gaurang S. Patkar, G. S. G. N. Anjaneyulu, P. V. S. S. R. Chandra Mouli:
Execution of UML-based oil palm fruit harvester algorithm: novel approach. Int. J. Comput. Aided Eng. Technol. 12(1): 113-129 (2020) - Lakshmi Padmaja Maddali, Meena Singh Dilip Thakur, R. Vigneswaran, M. A. Rajan, Srujana Kanchanapalli, Batsayan Das:
VeriBlock: A Novel Blockchain Framework based on Verifiable Computing and Trusted Execution Environment. COMSNETS 2020: 1-6 - Chengwei Ai, Weiyu Dong, Zicong Gao:
A Novel Concolic Execution Approach on Embedded Device. ICCSP 2020: 47-52 - Peng Jiang, Changwan Hong, Gagan Agrawal:
A novel data transformation and execution strategy for accelerating sparse matrix multiplication on GPUs. PPoPP 2020: 376-388 - 2019
- Li-Nan Zhu, Peng-Hang Li, Xiao-Long Zhou:
IHDETBO: A Novel Optimization Method of Multi-Batch Subtasks Parallel-Hybrid Execution Cloud Service Composition for Cloud Manufacturing. Complex. 2019: 7438710:1-7438710:21 (2019) - Omiros Iatrellis, Achilles Kameas, Panos Fitsilis:
A novel integrated approach to the execution of personalized and self-evolving learning pathways. Educ. Inf. Technol. 24(1): 781-803 (2019) - Davide Profeta, Nicola Masi, Domenico Messina, Davide Dalle Carbonare, Susanna Bonura, Vito Morreale:
A Novel Micro-Service Based Platform for Composition, Deployment and Execution of BDA Applications. SEAA 2019: 182-185 - Donghyun Kang, Jintaek Kang, Hyungdal Kwon, Hyunsik Park, Soonhoi Ha:
A Novel Convolutional Neural Network Accelerator That Enables Fully-Pipelined Execution of Layers. ICCD 2019: 698-701 - 2018
- Kishore K. Chidella, Abu Asaduzzaman:
A novel Wireless Network-on-Chip architecture with distributed directories for faster execution and minimal energy. Comput. Electr. Eng. 65: 18-31 (2018) - Ang Li, Weifeng Liu, Linnan Wang, Kevin J. Barker, Shuaiwen Leon Song:
Warp-Consolidation: A Novel Execution Model for GPUs. ICS 2018: 53-64 - 2017
- Qinglin Zhao, Fangxin Xu, Jie Yang, Yujun Zhang:
CSMA/CQ: A Novel SDN-Based Design to Enable Concurrent Execution of Channel Contention and Data Transmission in IEEE 802.11 Networks. IEEE Access 5: 2534-2549 (2017)
skipping 32 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-20 21:25 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint