Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 35 matches
- 2002
- Juan L. Aragón, José González, Antonio González, James E. Smith:
Dual path instruction processing. ICS 2002: 220-229 - Ravi Bhargava, Lizy Kurian John:
Latency and energy aware value prediction for high-frequency processors. ICS 2002: 45-56 - Taisuke Boku, Masayuki Umemura, Junichiro Makino, Toshiyuki Fukushige, Hajime Susa, Akira Ukawa:
Heterogeneous multi-computer system: a new platform for multi-paradigm scientific simulation. ICS 2002: 26-34 - Det Buaklee, Gregory F. Tracy, Mary K. Vernon, Stephen J. Wright:
Near-optimal adaptive control of a large grid application. ICS 2002: 315-326 - Lori Carter, Brad Calder:
Using predicate path information in hardware to determine true dependences. ICS 2002: 230-240 - Josep M. Codina, Josep Llosa, Antonio González:
A comparative study of modulo scheduling techniques. ICS 2002: 97-106 - Jeffrey T. Draper, Jacqueline Chame, Mary W. Hall, Craig S. Steele, Tim Barrett, Jeff LaCoss, John J. Granacki, Jaewook Shin, Chun Chen, Chang Woo Kang, Ihn Kim Gokhan:
The architecture of the DIVA processing-in-memory chip. ICS 2002: 14-25 - Renato Ferreira, Gagan Agrawal, Joel H. Saltz:
Compiler supported high-level abstractions for sparse disk-resident datasets. ICS 2002: 241-251 - Enric Gibert, F. Jesús Sánchez, Antonio González:
An interleaved cache clustered VLIW processor. ICS 2002: 210-219 - Richard L. Graham, Sung-Eun Choi, David J. Daniel, Nehal N. Desai, Ronald G. Minnich, Craig Edward Rasmussen, L. Dean Risinger, Mitchel W. Sukalski:
A network-failure-tolerant message-passing system for terascale clusters. ICS 2002: 77-83 - Erik A. Hendriks:
BProc: the Beowulf distributed process space. ICS 2002: 129-136 - Guohua Jin, John M. Mellor-Crummey:
Experiences tuning SMG98: a semicoarsening multigrid benchmark based on the hypre library. ICS 2002: 305-314 - Daehyun Kim, Mainak Chaudhuri, Mark A. Heinrich:
Leveraging cache coherence in active memory systems. ICS 2002: 2-13 - Gayathri Krishnamurthy, Elana D. Granston, Eric Stotzer:
Affinity-based cluster assignment for unrolled loops. ICS 2002: 107-116 - David J. Kuck:
Clustered approaches to HPC via commodity HW + highly evolved SW. ICS 2002: 209-209 - Gurhan Kucuk, Dmitry Ponomarev, Kanad Ghose:
Low-complexity reorder buffer architecture. ICS 2002: 57-66 - Orion Sky Lawlor, Laxmikant V. Kalé:
A voxel-based parallel collision detection algorithm. ICS 2002: 285-293 - Jonghyun Lee, Xiaosong Ma, Marianne Winslett, Shengke Yu:
Active buffering plus compressed migration: an integrated solution to parallel simulations' data transport needs. ICS 2002: 156-166 - Chi-Keung Luk, Robert Muth, Harish Patil, Richard Weiss, P. Geoffrey Lowney, Robert S. Cohn:
Profile-guided post-link stride prefetching. ICS 2002: 167-178 - Qin Lv, Pei Cao, Edith Cohen, Kai Li, Scott Shenker:
Search and replication in unstructured peer-to-peer networks. ICS 2002: 84-95 - Akihiko Miyoshi, Charles Lefurgy, Eric Van Hensbergen, Ramakrishnan Rajamony, Raj Rajkumar:
Critical power slope: understanding the runtime effects of frequency scaling. ICS 2002: 35-44 - James Oly, Daniel A. Reed:
Markov model prediction of I/O requests for scientific applications. ICS 2002: 147-155 - Jih-Kwon Peir, Shih-Chang Lai, Shih-Lien Lu, Jared Stark, Konrad Lai:
Bloom filtering cache misses for accurate data speculation and prefetching. ICS 2002: 189-198 - Juan Piernas, Toni Cortes, José M. García:
DualFS: a new journaling file system without meta-data duplication. ICS 2002: 137-146 - Venkata K. Pingali, Sally A. McKee, Wilson C. Hsieh, John B. Carter:
Computation regrouping: restructuring programs for temporal data cache locality. ICS 2002: 252-261 - Silvius Vasile Rus, Lawrence Rauchwerger, Jay P. Hoeflinger:
Hybrid analysis: static & dynamic memory reference analysis. ICS 2002: 274-284 - Tetsuya Sato:
Can the earth simulator change the way humans think? ICS 2002: 1 - Alfred Z. Spector:
Challenges and opportunities in autonomic computing. ICS 2002: 96-96 - Stevan A. Vlaovic, Edward S. Davidson:
Boosting trace cache performance with nonhead miss speculation. ICS 2002: 179-188 - Jie Wu:
A deterministic fault-tolerant and deadlock-free routing protocol in 2-D meshes based on odd-even turn model. ICS 2002: 67-76
skipping 5 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-24 01:14 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint