![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 26 matches
- 2015
- Ezugwu E. Absalom
, Seyed M. Buhari
, Sahalu B. Junaidu:
Resource management system for scientific virtual laboratory applications. Int. J. Grid Util. Comput. 6(1): 8-20 (2015) - Balamurugan Balusamy
, P. Venkata Krishna
:
Collective advancements on access control scheme for multi-authority cloud storage system. Int. J. Grid Util. Comput. 6(3/4): 133-142 (2015) - Qingmei Cao, Zhili Zhou:
The design of tractor CAN bus intelligent node based on dual-core processor. Int. J. Grid Util. Comput. 6(3/4): 179-183 (2015) - Jess Farber, Trina S. Myers
, Jarrod Trevathan
, Ian Atkinson
, Trevor Andersen:
Riskr: a web 2.0 platform to monitor and share disaster information. Int. J. Grid Util. Comput. 6(2): 98-112 (2015) - Shu Guo, Haixia Xu:
A secure delegation scheme of large polynomial computation in multi-party cloud. Int. J. Grid Util. Comput. 6(1): 1-7 (2015) - Chengyu Hu, Bo Yang, Pengtao Liu:
Multi-keyword ranked searchable public-key encryption. Int. J. Grid Util. Comput. 6(3/4): 221-231 (2015) - Long-Jun Huang, Qing-Hua Liu, Jie Tang, Ping Li:
Scratch line detection and restoration based on Sobel operator. Int. J. Grid Util. Comput. 6(2): 67-73 (2015) - Saeed Javanmardi
, Mohammad Shojafar
, Shahdad Shariatmadari, Sima S. Ahrabi
:
FR trust: a fuzzy reputation-based model for trust management in semantic P2P grids. Int. J. Grid Util. Comput. 6(1): 57-66 (2015) - Achal Kaushik
, Deo Prakash Vidyarthi:
A model for resource management in computational grid for real-time jobs using game theory. Int. J. Grid Util. Comput. 6(3/4): 232-248 (2015) - Xiaoqing Li, Jicheng Liu, Xuejun Li, Hui Li:
A reputation-based secure scheme in vehicular ad hoc networks. Int. J. Grid Util. Comput. 6(2): 83-90 (2015) - Zhen Liu, Xiaoyuan Yang, Feng Pan, Yuechuan Wei:
CCA-secure publicly verifiable public key encryption scheme without pairings. Int. J. Grid Util. Comput. 6(2): 74-82 (2015) - Kun Ma
, Weijuan Zhang:
Introducing browser-based high-frequency cloud monitoring system using WebSocket proxy. Int. J. Grid Util. Comput. 6(1): 21-29 (2015) - P. Mahesha
, D. S. Vinod
:
Support vector machine-based stuttering dysfluency classification using GMM supervectors. Int. J. Grid Util. Comput. 6(3/4): 143-149 (2015) - Mohan Manoharan
, Saraswathi Selvarajan:
An efficient methodology to improve service negotiation in cloud environment. Int. J. Grid Util. Comput. 6(3/4): 150-158 (2015) - Riad Mokadem, Abdelkader Hameurlain:
Data replication strategies with performance objective in data grid systems: a survey. Int. J. Grid Util. Comput. 6(1): 30-46 (2015) - Trisiladevi C. Nagavi
, Nagappa U. Bhajantri:
Fast query by humming system based on complex multiscale music entropy and CMMEB Kd tree. Int. J. Grid Util. Comput. 6(3/4): 159-169 (2015) - Soumya Priyadarsini Panda
, Ajit Kumar Nayak
, Srikanta Patnaik
:
Text-to-speech synthesis with an Indian language perspective. Int. J. Grid Util. Comput. 6(3/4): 170-178 (2015) - Xilong Qu, Xiao Peng:
An energy-efficient virtual machine scheduler based on CPU share-reclaiming policy. Int. J. Grid Util. Comput. 6(2): 113-120 (2015) - A. J. Dinusha Rathnayaka, Vidyasagar M. Potdar, Tharam S. Dillon, Samitha Kuruppu:
Formation of virtual community groups to manage prosumers in smart grids. Int. J. Grid Util. Comput. 6(1): 47-56 (2015) - Saeed Senobary, Mahmoud Naghibzadeh
:
Semi-partitioned scheduling for fixed-priority real-time tasks based on intelligent rate monotonic algorithm. Int. J. Grid Util. Comput. 6(3/4): 184-191 (2015) - Ilir Shinko, Yoann Foquet, Dritan Nace:
Elastic routing for survivable networks. Int. J. Grid Util. Comput. 6(2): 121-129 (2015) - Xiaohui Wang:
The architecture design of the wearable health monitoring system based on internet of things technology. Int. J. Grid Util. Comput. 6(3/4): 207-212 (2015) - Wenhong Wei, Qingxia Li, Ming Tao:
BSN-mesh and its basic parallel algorithms. Int. J. Grid Util. Comput. 6(3/4): 213-220 (2015) - Wei Wu, Wencai Du, GuoLong Ruan:
Network congestion control methods and theory. Int. J. Grid Util. Comput. 6(3/4): 200-206 (2015) - Shi-hai Zhu:
Hardware implementation based on FPGA of semaphore management in μC/OS-II real-time operating system. Int. J. Grid Util. Comput. 6(3/4): 192-199 (2015) - Shuaishuai Zhu, Xiaoyuan Yang:
Protecting data in cloud environment with attribute-based encryption. Int. J. Grid Util. Comput. 6(2): 91-97 (2015)
loading more results
failed to load more results, please try again later
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-03 14:51 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint