default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 285 matches
- 2015
- Hao Zheng, Zhen Zhang, Chris J. Myers, Emmanuel Rodriguez, Yingying Zhang:
Compositional Model Checking of Concurrent Systems. IEEE Trans. Computers 64(6): 1607-1621 (2015) - Jongmin Lee, Soontae Kim:
Filter Data Cache: An Energy-Efficient Small L0 Data Cache Architecture Driven byMiss Cost Reduction. IEEE Trans. Computers 64(7): 1927-1939 (2015) - Yang Wang, Paul Lu, Kenneth B. Kent:
WaFS: A Workflow-Aware File System for Effective Storage Utilization in the Cloud. IEEE Trans. Computers 64(9): 2716-2729 (2015) - Ebrahim A. Hasan Abdulrahman, Arash Reyhani-Masoleh:
New Regular Radix-8 Scheme for Elliptic Curve Scalar Multiplication without Pre-Computation. IEEE Trans. Computers 64(2): 438-451 (2015) - Jeongseob Ahn, Seongwook Jin, Jaehyuk Huh:
Fast Two-Level Address Translation for Virtualized Systems. IEEE Trans. Computers 64(12): 3461-3474 (2015) - Mustafa Ilhan Akbas, Melike Erol-Kantarci, Damla Turgut:
Localization for Wireless Sensor and Actor Networks with Meandering Mobility. IEEE Trans. Computers 64(4): 1015-1028 (2015) - Abdulla Al-Qawasmeh, Sudeep Pasricha, Anthony A. Maciejewski, Howard Jay Siegel:
Power and Thermal-Aware Workload Allocation in Heterogeneous Data Centers. IEEE Trans. Computers 64(2): 477-491 (2015) - Shadi G. Alawneh, Roelof Dragt, Dennis K. Peters, Claude Daley, Stephen Bruneau:
Hyper-Real-Time Ice Simulation and Modeling Using GPGPU. IEEE Trans. Computers 64(12): 3475-3487 (2015) - Bijan Alizadeh, Payman Behnam, Somayeh Sadeghi Kohan:
A Scalable Formal Debugging Approach with Auto-Correction Capability Based on Static Slicing and Dynamic Ranking for RTL Datapath Designs. IEEE Trans. Computers 64(6): 1564-1578 (2015) - Lluc Alvarez, Lluís Vilanova, Marc González, Xavier Martorell, Nacho Navarro, Eduard Ayguadé:
Hardware-Software Coherence Protocol for the Coexistence of Caches and Local Memories. IEEE Trans. Computers 64(1): 152-165 (2015) - Francisco J. Andujar-Munoz, Juan A. Villar-Ortiz, José L. Sánchez, Francisco José Alfaro, José Duato:
N-Dimensional Twin Torus Topology. IEEE Trans. Computers 64(10): 2847-2861 (2015) - David A. Bader:
State of the Journal. IEEE Trans. Computers 64(6): 1506-1508 (2015) - Seungcheol Baek, Hyung Gyu Lee, Chrysostomos Nicopoulos, Junghee Lee, Jongman Kim:
Size-Aware Cache Management for Compressed Cache Architectures. IEEE Trans. Computers 64(8): 2337-2352 (2015) - Roberto Baldoni, Silvia Bonomi, Marco Platania, Leonardo Querzoni:
Efficient Notification Ordering for Geo-Distributed Pub/Sub Systems. IEEE Trans. Computers 64(10): 2796-2808 (2015) - Tania Banerjee-Mishra, Sartaj Sahni:
Pubsub: An Efficient Publish/Subscribe System. IEEE Trans. Computers 64(4): 1119-1132 (2015) - Tania Banerjee, Sartaj Sahni, Gunasekaran S. Seetharaman:
PC-TRIO: A Power Efficient TCAM Architecture for Packet Classifiers. IEEE Trans. Computers 64(4): 1104-1118 (2015) - Shouvik Bardhan, Daniel A. Menascé:
Predicting the Effect of Memory Contention in Multi-Core Computers Using Analytic Performance Models. IEEE Trans. Computers 64(8): 2279-2292 (2015) - Ali Galip Bayrak, Francesco Regazzoni, David Novo, Philip Brisk, François-Xavier Standaert, Paolo Ienne:
Automatic Application of Power Analysis Countermeasures. IEEE Trans. Computers 64(2): 329-341 (2015) - Spiridon F. Beldianu, Sotirios G. Ziavras:
Performance-Energy Optimizations for Shared Vector Accelerators in Multicores. IEEE Trans. Computers 64(3): 805-817 (2015) - Anna Bernasconi, Valentina Ciriani, Gabriella Trucco, Tiziano Villa:
Using Flexibility in P-Circuits by Boolean Relations. IEEE Trans. Computers 64(12): 3605-3618 (2015) - Alan A. Bertossi, Daniele Diodati, Cristina M. Pinotti:
Storage Placement in Path Networks. IEEE Trans. Computers 64(4): 1201-1207 (2015) - Md. Zakirul Alam Bhuiyan, Guojun Wang, Jiannong Cao, Jie Wu:
Deploying Wireless Sensor Networks with Fault-Tolerance for Structural Health Monitoring. IEEE Trans. Computers 64(2): 382-395 (2015) - Md. Zakirul Alam Bhuiyan, Guojun Wang, Athanasios V. Vasilakos:
Local Area Prediction-Based Mobile Target Tracking in Wireless Sensor Networks. IEEE Trans. Computers 64(7): 1968-1982 (2015) - Enrico Bini:
The Quadratic Utilization Upper Bound for Arbitrary Deadline Real-Time Tasks. IEEE Trans. Computers 64(2): 593-599 (2015) - Andrew D. Brown, Stephen B. Furber, Jeffrey S. Reeve, Jim D. Garside, Kier J. Dugan, Luis A. Plana, Steve Temple:
SpiNNaker - Programming Model. IEEE Trans. Computers 64(6): 1769-1782 (2015) - Alan Burns, Marina Gutiérrez, Mario Aldea Rivas, Michael González Harbour:
A Deadline-Floor Inheritance Protocol for EDF Scheduled Embedded Real-Time Systems with Resource Sharing. IEEE Trans. Computers 64(5): 1241-1253 (2015) - Giovanni Causapruno, Marco Vacca, Mariagrazia Graziano, Maurizio Zamboni:
Interleaving in Systolic-Arrays: A Throughput Breakthrough. IEEE Trans. Computers 64(7): 1940-1953 (2015) - Yunpeng Chai, Zhihui Du, Xiao Qin, David A. Bader:
WEC: Improving Durability of SSD Cache Drives by Caching Write-Efficient Data. IEEE Trans. Computers 64(11): 3304-3316 (2015) - Debrup Chakraborty, Cuauhtemoc Mancillas-López, Palash Sarkar:
STES: A Stream Cipher Based Low Cost Scheme for Securing Stored Data. IEEE Trans. Computers 64(9): 2691-2707 (2015) - Cheng-Shang Chang, Jay Cheng, Tien-Ke Huang, Xuan-Chao Huang, Duan-Shin Lee, Chao-Yi Chen:
Bit-Stuffing Algorithms for Crosstalk Avoidance in High-Speed Switching. IEEE Trans. Computers 64(12): 3404-3416 (2015)
skipping 255 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-12-21 11:45 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint