default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 48 matches
- 2007
- Xiaojing Ma, Zhitang Li, Yao Li, Jiping Zhang:
A Scalable Multicast Key Management to Expel a Malicious Receiver in MARKS. IEEE NAS 2007: 265-266 - Guang Yang, Jingli Zhou, Chao Liu:
Implementation and performance evaluation of an iSCSI-Based Storage Virtualization. IEEE NAS 2007: 273-274 - Bin Cai, Changsheng Xie, Guangxi Zhu:
Performance Evaluation of A Load Self-Balancing Method for Heterogeneous Metadata Server Cluster Using Trace-Driven and Synthetic Workload Simulation. IEEE NAS 2007: 225-232 - Qiang Cao, Tian-jie Guo, Changsheng Xie:
Dynamics Process of Long-running Allocation/Collection in Linear Storage Space. IEEE NAS 2007: 209-216 - Jincai Chen, Gongye Zhou:
GSM-R: A Hybrid Scheduling Approach to Dynamic Load Balancing in Hierarchical Cluster of Servers. IEEE NAS 2007: 161-167 - Yuanguo Cheng, Xiongwei Ren:
Mining Moving Patterns Based on Frequent Patterns Growth in Sensor Networks. IEEE NAS 2007: 133-138 - Jianqun Cui, Yanxiang He, Libing Wu:
More Efficient Mechanism of Topology-Aware Overlay Construction in Application-Layer Multicast. IEEE NAS 2007: 31-36 - Lijun Dong, Shengsheng Yu, Kai Ouyang:
The Dynamic Endpoint-Based Access Control Model on VPN. IEEE NAS 2007: 44-54 - Jywe-Fei Fang, Chien-Hung Huang, Ko-Lin Lin, Chen-Hsiang Liao, Shr-Cheng Feng:
The bi-panconnectivity of the hypercube. IEEE NAS 2007: 15-20 - Xiongzi Ge, Dan Feng, Lei Tian:
An Active Region-based Storage Mechanism in Large Wireless Sensor Networks. IEEE NAS 2007: 139-145 - Mohammad Mehdi Hassani, Reza Berangi, Hamid Tavakolaie:
An analytical model for evaluating utilization of TCP TAHOE using markovian model. IEEE NAS 2007: 257-258 - Shuibing He, Dan Feng:
An Object-based Storage Controller Based on Switch Fabric. IEEE NAS 2007: 275-276 - Chittaranjan Hota, Janne Lindqvist, Kristiina Karvonen, Antti Ylä-Jääski, C. K. J. Mohan:
Safeguarding Against Sybil Attacks via Social Networks and Multipath Routing. IEEE NAS 2007: 122-132 - Jiafu Hu, Yongliang Dong:
Sliding Window Based Security Event Correlation. IEEE NAS 2007: 259-260 - Wei Hu, Diqing Hu, Changsheng Xie, Fan Chen:
A New Data Format and a New Error Control Scheme for Optical-Storage Systems. IEEE NAS 2007: 193-198 - Rong Ji, Xianjun Zeng, Liang Chen, Junfeng Zhang:
The Implementation and Design of a Low-Power Clock Distribution Microarchitecture. IEEE NAS 2007: 21-30 - Guo-Song Jiang, Changsheng Xie, Bo Wang:
Research and Implementation of RAID Algorithm base on RAID Controller. IEEE NAS 2007: 251-252 - Guang Jin, Jiangang Yang, Wei Wei, Yabo Dong:
Mitigating Denial of Capability with An Notification Mechanism. IEEE NAS 2007: 101-108 - Jun Li, Shunyi Zhang, Zailong Zhang, Pan Wang:
A Novel Network Management Architecture for Self-organizing Network. IEEE NAS 2007: 146-154 - Chengcheng Li, Peng Li, Tijjani Mohammed:
An Optimal MPLS-TE Solution to Route Selection and Redistribution on Congested Networks. IEEE NAS 2007: 69-76 - Zhitang Li, Jie Lei, Li Wang, Dong Li:
Assessing Attack Threat by the Probability of Following Attacks. IEEE NAS 2007: 91-100 - Huaiyang Li, Changsheng Xie, Yan Liu:
A New Method of Pefetching I/O Requests. IEEE NAS 2007: 217-224 - Haishan Li, Ming Zhang, Wei Zheng, Dongxiao Li:
An Adaptive Arbitration Algorithm for SoC Bus. IEEE NAS 2007: 245-246 - Lin Lin, Xueming Li, Yong Cheng:
HKM: A Hybrid Key Management Scheme for Secure Mobile Multicast. IEEE NAS 2007: 109-114 - Hui Liu, Wenfeng Feng, Yongfeng Huang, Xing Li:
A Peer-To-Peer Traffic Identification Method Using Machine Learning. IEEE NAS 2007: 155-160 - Lanyue Lu, Peter J. Varman, Jun Wang:
DiskGroup: Energy Efficient Disk Layout for RAID1 Systems. IEEE NAS 2007: 233-242 - Pengyong Ma, Shuming Chen:
M2SI: An Improved Coherency Protocol in CMP. IEEE NAS 2007: 243-244 - Lei Miao, Yong Qi, Di Hou, Chang-li Wu, Yue-hua Dai:
Dynamic Power Management and Dynamic Voltage Scaling in Real-time CMP Systems. IEEE NAS 2007: 249-250 - Kai Ouyang, Xiaowen Chu, Lijun Dong, Hengqing Wang, Ting Cai:
MLCC: A Multi Layered Correlative Control Mechanism for the VPN Topology. IEEE NAS 2007: 37-43 - Ramani Routray, Sandeep Gopisetty, Pallavi Galgali, Amit Modi, Shripad Nadgowda:
iSAN: Storage Area Network Management Modeling Simulation. IEEE NAS 2007: 199-208
skipping 18 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-24 00:31 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint