Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 807 matches
- 2015
- Jayanta Basak, Madhumita Bharde:
Dynamic Provisioning of Storage Workloads. LISA 2015: 13-24 - Patrick T. Cable II, Nabil Schear:
Spyglass: Demand-Provisioned Linux Containers for Private Network Access. LISA 2015: 37-48 - Yuuki Takano, Ryosuke Miura, Shingo Yasuda, Kunio Akashi, Tomoya Inoue:
SF-TAP: Scalable and Flexible Traffic Analysis Platform Running on Commodity Hardware. LISA 2015: 25-36 - Jidong Xiao, Lei Lu, Hai Huang, Haining Wang:
Hyperprobe: Towards Virtual Machine Extrospection. LISA 2015: 1-12 - 29th Large Installation System Administration Conference, LISA 2015, Washington, D.C., USA, November 8-13, 2015. USENIX Association 2015 [contents]
- 2014
- Sara Alspaugh, Bei Di Chen, Jessica Lin, Archana Ganapathi, Marti A. Hearst, Randy H. Katz:
Analyzing Log Analysis: An Empirical Study of User Log Mining. LISA 2014: 53-68 - Paul Anderson, Herry Herry:
Formalising Configuration Languages: Why is this Important in Practice? LISA 2014: 145-146 - Patrick T. Cable II:
Demand-Provisioned Linux Containers for Private Network Access. LISA 2014: 139-140 - Ming Chen, Dean Hildebrand, Geoff Kuenning, Soujanya Shankaranarayana, Vasily Tarasov, Arun O. Vasudevan, Erez Zadok, Ksenia Zakirova:
Linux NFSv4.1 Performance Under a Microscope. LISA 2014: 137-138 - Lei Cui, Jianxin Li, Tianyu Wo, Bo Li, Renyu Yang, Yinglie Cao, Jinpeng Huai:
HotRestore: A Fast Restore System for Virtual Machine Cluster. LISA 2014: 1-16 - Luca Deri, Maurizio Martinelli, Alfredo Cardigliano:
Realtime High-Speed Network Traffic Monitoring Using ntopng. LISA 2014: 70-80 - Dinei Florêncio, Cormac Herley, Paul C. van Oorschot:
An Administrator's Guide to Internet Password Research. LISA 2014: 35-52 - Nicole Forsgren, E. Branson Matheson III:
An Investigation of Cultural and Organizational Impacts on EKR Use and EKR Use Outcomes Among System Administrators at NASA. LISA 2014: 135-136 - Karthik Kambatla, Yanpei Chen:
The Truth About MapReduce Performance on SSDs. LISA 2014: 109-118 - Paul Z. Kolano:
Time-Synchronized Visualization of Arbitrary Data Streams for Real-Time Monitoring and Historical Analysis. LISA 2014: 143-144 - Hal Martin, Wayne G. Lutters:
Virtual Interfaces for Exploration of Heterogeneous & Cloud Computing Architectures. LISA 2014: 141-142 - Zahid Nawaz:
Pedagogical Framework and Network Laboratory Management Tool for Practical Network Administration Education. LISA 2014: 133-134 - Rukma Talwadker, Kaladhar Voruganti:
ParaSwift: File I/O Trace Modeling for the Future. LISA 2014: 119-132 - Ian Unruh, Alexandru G. Bardas, Rui Zhuang, Xinming Ou, Scott A. DeLoach:
Compiling Abstract Specifications into Concrete Systems - Bringing Order to the Cloud. LISA 2014: 17-34 - Lei Xue, Xiapu Luo, Edmond W. W. Chan, Xian Zhan:
Towards Detecting Target Link Flooding Attack. LISA 2014: 81-96 - Eyal Zohar, Yuval Cassuto:
Automatic and Dynamic Configuration of Data Compression for Web Servers. LISA 2014: 97-108 - Nicole Forsgren Velasquez:
28th Large Installation System Administration Conference, LISA '14, Seattle, WA, USA, November 9-14, 2014. USENIX Association 2014 [contents] - 2013
- Lei Cui, Bo Li, Yangyang Zhang, Jianxin Li:
HotSnap: A Hot Distributed Snapshot System For Virtual Machine Cluster. LISA 2013: 59-74 - Scott Devoid, Narayan Desai, Lorin Hochstein:
Poncho: Enabling Smart Administration of Full Private Clouds. LISA 2013: 17-26 - Cristiano Giuffrida, Calin Iorgulescu, Anton Kuijsten, Andrew S. Tanenbaum:
Back to the Future: Fault-tolerant Live Update with Time-traveling State Transfer. LISA 2013: 89-104 - Mark Howison, Aaron Shen, Andrew Loomis:
Building Software Environments for Research Computing Clusters. LISA 2013: 1-6 - Michael P. Kasick, Priya Narasimhan, Kevin Harms:
Making Problem Diagnosis Work for Large-Scale, Production Storage Systems. LISA 2013: 27-44 - Thomas Knauth, Christof Fetzer:
dsync: Efficient Block-wise Synchronization of Multi-Gigabyte Binary Data. LISA 2013: 45-58 - Georgios Larkou, Constantinos Costa, Panayiotis Andreou, Andreas Konstantinidis, Demetrios Zeinalipour-Yazti:
Managing Smartphone Testbeds with SmartLab. LISA 2013: 115-132 - Jim Zhanwen Li, Siyuan He, Liming Zhu, Xiwei Xu, Min Fu, Len Bass, Anna Liu, An Binh Tran:
Challenges to Error Diagnosis in Hadoop Ecosystems. LISA 2013: 145-154
skipping 777 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-25 03:00 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint