default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 56 matches
- 2015
- Congyang Chen, Jianxun Liu, Yiping Wen, Jinjun Chen, Dong Zhou:
A Hybrid Genetic Algorithm for Privacy and Cost Aware Scheduling of Data Intensive Workflow in Cloud. ICA3PP (1) 2015: 578-591 - Zhenguo Chen, Liqin Tian, Chuang Lin:
A Method for Detection of Anomaly Node in IOT. ICA3PP (1) 2015: 777-784 - Wenjie Chen, Jin Yu, Weihua Zhang, Linhua Jiang, Guanhua Zhang, Zhilei Chai:
Parallel Implementation of Dense Optical Flow Computation on Many-Core Processor. ICA3PP (1) 2015: 119-132 - Yingzhuang Chen, Qifei Zhang, Chaofan Tu, Yuchang Zhang, Fan Bai, Yinchao Xue, Sheng Zhang:
MN-ALG: A Data Delivery Algorithm for Large Scale Wireless Electronic Shelf Label System. ICA3PP (1) 2015: 744-754 - Casimer M. DeCusatis, Ioannis Papapanagiotou:
A Service Industry Perspective on Software Defined Radio Access Networks. ICA3PP (1) 2015: 357-369 - Ying Fu, Haopeng Chen, Feiya Song:
STWM: A Solution to Self-adaptive Task-Worker Matching in Software Crowdsourcing. ICA3PP (1) 2015: 383-398 - Chonglin Gu, Shuai Shi, Pengzhou Shi, Hejiao Huang, Xiaohua Jia:
Towards VM Power Metering: A Decision Tree Method and Evaluations. ICA3PP (1) 2015: 508-523 - Shiming He, Kun Xie, Dafang Zhang:
Completion Time-Aware Flow Scheduling in Heterogenous Networks. ICA3PP (1) 2015: 492-507 - Houling Ji, Victor C. S. Lee, Chi-Yin Chow, Kai Liu, Guoqing Wu:
Coding-Based Cooperative Caching in Data Broadcast Environments. ICA3PP (1) 2015: 273-287 - Yanbing Jiang, Chentao Wu, Jie Li, Minyi Guo:
EH-Code: An Extended MDS Code to Improve Single Write Performance of Disk Arrays for Correcting Triple Disk Failures. ICA3PP (1) 2015: 34-49 - Yunyun Jiang, Tian Xiao, Jidong Zhai, Ying Zhao, Wenguang Chen:
A Power-Conserving Online Scheduling Scheme for Video Streaming Services. ICA3PP (1) 2015: 133-154 - Shuo Li, Jian He, Xiaoyong Zhang, Jun Peng:
An Energy Efficient Multi-hop Charging Scheme with Mobile Charger for Wireless Rechargeable Sensor Network. ICA3PP (1) 2015: 648-660 - Xianfeng Li, Wen Wen, Xigui Wang:
Usage History-Directed Power Management for Smartphones. ICA3PP (1) 2015: 288-302 - Guo Li, Dafang Zhang, Kun Xie, Tanlong Huang, Yanbiao Li:
A GPU Based Fast Community Detection Implementation for Social Network. ICA3PP (1) 2015: 688-701 - Changming Liu, Cai Fu, Deliang Xu, Lin Sun, Lansheng Han:
An Energy-Balanced WSN Algorithm Based on Active Hibernation and Data Recovery. ICA3PP (1) 2015: 730-743 - Chang Liu, Juan Luo, Qiu Pan:
A Distributed Location-Based Service Discovery Protocol for Vehicular Ad-Hoc Networks. ICA3PP (1) 2015: 50-63 - Yu Liu, Juan Luo, Qian Yang, Jinyu Hu:
Feedback Mechanism Based Dynamic Fingerprint Indoor Localization Algorithm in Wireless Sensor Networks. ICA3PP (1) 2015: 674-687 - Weirong Liu, Gaorong Qin, Fu Jiang, Kaiyang Liu, Zhengfa Zhu:
Distributed Compressive Sensing Based Data Gathering in Energy Harvesting Sensor Network. ICA3PP (1) 2015: 661-673 - Jiaqi Liu, Guojun Wang, Deng Li, Hui Liu:
ESR: An Efficient, Scalable and Robust Overlay for Autonomic Communications. ICA3PP (1) 2015: 415-429 - Wenjuan Lu, Zizhong Quan, Quan Liu, Duzhong Zhang, Wenjun Xu:
QoE Based Spectrum Allocation Optimization Using Bees Algorithm in Cognitive Radio Networks. ICA3PP (1) 2015: 327-338 - Ruhui Ma, Jian Li, Liwei Lin, Haibing Guan:
DaSS: Dynamic Time Slice Scheduler for Virtual Machine Monitor. ICA3PP (1) 2015: 77-90 - Zuoting Ning, Dafang Zhang, Kun Xie:
A Group XOR-ing Coding Strategy Based on Wireless Network Overhearing. ICA3PP (1) 2015: 716-729 - Cheng Pei, Xuanhua Shi, Hai Jin:
Improving the Memory Efficiency of In-Memory MapReduce Based HPC Systems. ICA3PP (1) 2015: 170-184 - Sancheng Peng, Jian Li, Aimin Yang:
Entropy-Based Social Influence Evaluation in Mobile Social Networks. ICA3PP (1) 2015: 637-647 - Cheng Qian, Libo Huang, Peng Xie, Nong Xiao, Zhiying Wang:
A Study on Non-volatile 3D Stacked Memory for Big Data Applications. ICA3PP (1) 2015: 103-118 - Hong Qiao, Dafang Zhang, Kun Xie, Ji Zhang, Shiming He:
A Distributed Joint Cooperative Routing and Channel Assignment in Multi-radio Wireless Mesh Network. ICA3PP (1) 2015: 552-566 - Huigui Rong, Liang Gong, Zheng Qin, Yupeng Hu, Chunhua Hu:
A Personalized Recommendation Approach Based on Content Similarity Calculation in Large-Scale Data. ICA3PP (1) 2015: 460-477 - Edwin Hsing-Mean Sha, Weiwen Jiang, Qingfeng Zhuge, Xianzhang Chen, Lei Yang:
Prevent Deadlock and Remove Blocking for Self-Timed Systems. ICA3PP (1) 2015: 155-169 - Xuefeng Sha, Kai Lin, Wenjian Wang, Jiming Luo:
NRLoc: Neighbor Relative RSS-Based Indoor Localization System. ICA3PP (1) 2015: 609-621 - Feiya Song, Haopeng Chen, Ying Fu:
An Approach to Rapid Worker Discovery in Software Crowdsourcing. ICA3PP (1) 2015: 370-382
skipping 26 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-01-05 09:52 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint