![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 30 matches
- 2015
- Bikash Agrawal, Tomasz Wiktorski, Chunming Rong
:
Analyzing and Predicting Failure in Hadoop Clusters Using Distributed Hidden Markov Model. CloudCom-Asia 2015: 232-246 - Yunpeng Cao, Haifeng Wang:
The Key Technologies of Real-Time Processing Large Scale Microblog Data Stream. CloudCom-Asia 2015: 295-306 - Chaowen Chang, Shuai Wang, Yutong Wang, PeiSheng Han:
Research of Terminal Transparent Encryption Storage Mechanism for Multi-cloud Disks. CloudCom-Asia 2015: 367-385 - Huangning Chen, Wenzhong Guo:
Real-Time Task Scheduling Algorithm for Cloud Computing Based on Particle Swarm Optimization. CloudCom-Asia 2015: 141-152 - Yong Chen, Hai Jin, Dechao Xu, Ran Zheng, Haocheng Liu, Jingxiang Zeng:
CUDAGA: A Portable Parallel Programming Model for GPU Cluster. CloudCom-Asia 2015: 203-216 - Jiangyong Chen, Xianghan Zheng, Chunming Rong
:
Survey on Software-Defined Networking. CloudCom-Asia 2015: 115-124 - Frédéric Dumont, Jean-Marc Menaud:
Synthesizing Realistic CloudWorkload Traces for Studying Dynamic Resource System Management. CloudCom-Asia 2015: 29-41 - Weiyi Ge, Wei Hu, ChengLong He, Shiqiang Zong:
Emerging Pragmatic Patterns in Large-Scale RDF Data. CloudCom-Asia 2015: 247-260 - Weiyi Ge, ChengLong He, Shiqiang Zong, Wenke Yin:
Structural Properties of Linked RDF Documents. CloudCom-Asia 2015: 283-294 - Chunxiang Gu, Yonghui Zheng, Fei Kang, Dan Xin:
Keyword Search Over Encrypted Data in Cloud Computing from Lattices in the Standard Model. CloudCom-Asia 2015: 335-343 - Marcus Hilbrich
, Ralph Müller-Pfefferkorn
:
Cross-Correlation as Tool to Determine the Similarity of Series of Measurements for Big-Data Analysis Tasks. CloudCom-Asia 2015: 263-282 - Dan Huang, Jiangling Yin, Jun Wang
, Xuhong Zhang, Junyao Zhang, Jian Zhou
:
UNIO: A Unified I/O System Framework for Hybrid Scientific Workflow. CloudCom-Asia 2015: 99-114 - Xin Jin
, Rencan Nie, Dongming Zhou, Jiefu Yu:
Color Image Fusion Researching Based on S-PCNN and Laplacian Pyramid. CloudCom-Asia 2015: 179-188 - Ming-Yi Liao, Zhi-Kai Mo, Mon-Yen Luo, Chu-Sing Yang, Jiann-Liang Chen:
Novel Intrusion Detection System for Cloud Computing: A Case Study. CloudCom-Asia 2015: 386-398 - Xiuyan Lin, Zhanghui Liu, Wenzhong Guo:
Energy-Efficient VM Placement Algorithms for Cloud Data Center. CloudCom-Asia 2015: 42-54 - Yanping Liu, Xingtu Lan, Xing Chen, Xin Feng, Xianghan Zheng, Wenzhong Guo:
An Architecture-Based Autonomous Engine for Services Configuration and Deployment in Hybrid Clouds. CloudCom-Asia 2015: 86-98 - Jian Liu, Gang Zhao, Yunpeng Zheng:
Rationalizing the Parameters of K-Nearest Neighbor Classification Algorithm. CloudCom-Asia 2015: 189-202 - Jianliang Ma, Tianzhou Chen, Minghui Wu
:
Making GPU Warp Scheduler and Memory Scheduler Synchronization-Aware. CloudCom-Asia 2015: 153-164 - Youzhong Ma, Xiaofeng Meng, Shaoya Wang, Weisong Hu, Xu Han, Yu Zhang:
An Efficient Index Method for Multi-Dimensional Query in Cloud Environment. CloudCom-Asia 2015: 307-318 - Md. S. Q. Zulkar Nine, Md. Abul Kalam Azad, Saad Abdullah, Nova Ahmed
:
Dynamic Load Sharing to Maximize Resource Utilization Within Cloud Federation. CloudCom-Asia 2015: 125-137 - Fuhui Wu, Qingbo Wu, Yusong Tan, Wei Wang, Xiaoli Sun:
Schedule Compaction and Deadline Constrained DAG Scheduling for IaaS Cloud. CloudCom-Asia 2015: 16-28 - Jianjun Wu, Fengjuan Zhang:
Privacy-Preserving Regression Modeling and Attack Analysis in Sensor Network. CloudCom-Asia 2015: 354-366 - Tao Xie, Haibao Chen:
AutoCSD: Automatic Cloud System Deployment in Data Centers. CloudCom-Asia 2015: 72-85 - Jiaqi Ye, Chengwei Xiao, Rui Máximo Esteves, Chunming Rong
:
Time Series Similarity Evaluation Based on Spearman's Correlation Coefficients and Distance Measures. CloudCom-Asia 2015: 319-331 - Jinson Zhang, Mao Lin Huang
:
A New Analytics Model for Large Scale Multidimensional Data Visualization. CloudCom-Asia 2015: 55-71 - Yunpeng Zheng, Gang Zhao, Jian Liu:
A Novel Grid Based K-Means Cluster Method for Traffic Zone Division. CloudCom-Asia 2015: 165-178 - Enguang Zhou, Jiangxiao Zhang, Zhoujun Li, Chang Xu
:
Integrity Verification of Replicated File with Proxy in Cloud Computing. CloudCom-Asia 2015: 344-353 - Zhenyun Zhuang, Haricharan Ramachandra, Badri Sridharan:
Guarding Fast Data Delivery in Cloud: An Effective Approach to Isolating Performance Bottleneck During Slow Data Delivery. CloudCom-Asia 2015: 3-15 - Chuang Zuo, Qun Liao, Tao Gu, Tao Li, Yulu Yang:
Node Capability Modeling for Reduce Phase's Scheduling in MapReduce Environment. CloudCom-Asia 2015: 217-231 - Weizhong Qiang, Xianghan Zheng, Ching-Hsien Hsu:
Cloud Computing and Big Data - Second International Conference, CloudCom-Asia 2015, Huangshan, China, June 17-19, 2015, Revised Selected Papers. Lecture Notes in Computer Science 9106, Springer 2015, ISBN 978-3-319-28429-3 [contents]
loading more results
failed to load more results, please try again later
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-04 00:03 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint