Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 31 matches
- 2008
- Mikhail Afanasyev, David G. Andersen, Alex C. Snoeren:
Efficiency Through Eavesdropping: Link-layer Packet Caching. NSDI 2008: 105-118 - Mahesh Balakrishnan, Tudor Marian, Ken Birman, Hakim Weatherspoon, Einar Vollset:
Maelstrom: Transparent Error Correction for Lambda Networks. NSDI 2008: 263-278 - Andrea Bittau, Petr Marchenko, Mark Handley, Brad Karp:
Wedge: Splitting Applications into Reduced-Privilege Compartments. NSDI 2008: 309-322 - Justin Cappos, John H. Hartman:
San Fermín: Aggregating Large Data Sets Using a Binomial Swap Forest. NSDI 2008: 147-160 - Gong Chen, Wenbo He, Jie Liu, Suman Nath, Leonidas Rigas, Lin Xiao, Feng Zhao:
Energy-Aware Server Provisioning and Load Dispatching for Connection-Intensive Internet Services. NSDI 2008: 337-350 - Byung-Gon Chun, Sylvia Ratnasamy, Eddie Kohler:
NetComplex: A Complexity Metric for Networked System Designs. NSDI 2008: 393-406 - Brendan Cully, Geoffrey Lefebvre, Dutch T. Meyer, Mike Feeley, Norman C. Hutchinson, Andrew Warfield:
Remus: High Availability via Asynchronous Virtual Machine Replication. (Best Paper). NSDI 2008: 161 - Saumitra M. Das, Yunnan Wu, Ranveer Chandra, Y. Charlie Hu:
Context-based Routing: Technique, Applications, and Experience. NSDI 2008: 379-392 - Colin Dixon, Thomas E. Anderson, Arvind Krishnamurthy:
Phalanx: Withstanding Multimillion-Node Botnets. NSDI 2008: 45-58 - Diwaker Gupta, Kashi Venkatesh Vishwanath, Amin Vahdat:
DieCast: Testing Distributed Systems with an Accurate Scale Model. NSDI 2008: 407-422 - Chi Ho, Robbert van Renesse, Mark Bickford, Danny Dolev:
Nysiad: Practical Protocol Transformation to Tolerate Byzantine Failures. NSDI 2008: 175-188 - John P. John, Ethan Katz-Bassett, Arvind Krishnamurthy, Thomas E. Anderson, Arun Venkataramani:
Consensus Routing: The Internet as a Distributed System. (Best Paper). NSDI 2008: 351-364 - Srikanth Kandula, Kate Ching-Ju Lin, Tural Badirkhanli, Dina Katabi:
FatVAP: Aggregating AP Backhaul Capacity to Maximize Throughput. NSDI 2008: 89-104 - Ethan Katz-Bassett, Harsha V. Madhyastha, John P. John, Arvind Krishnamurthy, David Wetherall, Thomas E. Anderson:
Studying Black Holes in the Internet with Hubble. NSDI 2008: 247-262 - Xuezheng Liu, Zhenyu Guo, Xi Wang, Feibo Chen, Xiaochen Lian, Jian Tang, Ming Wu, M. Frans Kaashoek, Zheng Zhang:
D3S: Debugging Deployed Distributed Systems. NSDI 2008: 423-437 - Xin Liu, Ang Li, Xiaowei Yang, David Wetherall:
Passport: Secure and Adoptable Source Authentication. NSDI 2008: 365-376 - Ratul Mahajan, Ming Zhang, Lindsey Poole, Vivek S. Pai:
Uncovering Performance Differences Among Backbone ISPs with Netdiff . NSDI 2008: 205-218 - Alan Mislove, Ansley Post, Peter Druschel, P. Krishna Gummadi:
Ostra: Leveraging Trust to Thwart Unwanted Communication. NSDI 2008: 15-30 - Rohan Murty, Jitendra Padhye, Ranveer Chandra, Alec Wolman, Brian Zill:
Designing High Performance Enterprise Wi-Fi Networks. NSDI 2008: 73-88 - Sergiu Nedevschi, Lucian Popa, Gianluca Iannaccone, Sylvia Ratnasamy, David Wetherall:
Reducing Network Energy Consumption via Sleeping and Rate-Adaptation. NSDI 2008: 323-336 - Michael Piatek, Tomas Isdal, Arvind Krishnamurthy, Thomas E. Anderson:
One Hop Reputations for Peer to Peer File Sharing Workloads. NSDI 2008: 1-14 - Charles Reis, Steven D. Gribble, Tadayoshi Kohno, Nicholas C. Weaver:
Detecting In-Flight Page Changes with Web Tripwires. NSDI 2008: 31-44 - Vyas Sekar, Michael K. Reiter, Walter Willinger, Hui Zhang, Ramana Rao Kompella, David G. Andersen:
cSamp: A System for Network-Wide Flow Monitoring. NSDI 2008: 233-246 - Atul Singh, Tathagata Das, Petros Maniatis, Peter Druschel, Timothy Roscoe:
BFT Protocols Under Fire. NSDI 2008: 189-204 - Emil Sit, Robert Tappan Morris, M. Frans Kaashoek:
UsenetDHT: A Low-Overhead Design for Usenet. NSDI 2008: 133-146 - Sonesh Surana, Rabin K. Patra, Sergiu Nedevschi, Manuel Ramos, Lakshminarayanan Subramanian, Yahel Ben-David, Eric A. Brewer:
Beyond Pilots: Keeping Rural Wireless Networks Alive. NSDI 2008: 119-132 - Mythili Vutukuru, Kyle Jamieson, Hari Balakrishnan:
Harnessing Exposed Terminals in Wireless Networks. NSDI 2008: 59-72 - Zhenyu Wu, Mengjun Xie, Haining Wang:
Swift: A Fast Dynamic Packet Filter. NSDI 2008: 279-292 - Nickolai Zeldovich, Silas Boyd-Wickizer, David Mazières:
Securing Distributed Systems with Information Flow Control. NSDI 2008: 293-308 - Ying Zhang, Zhuoqing Morley Mao, Ming Zhang:
Effective Diagnosis of Routing Disruptions from End Systems. NSDI 2008: 219-232
skipping 1 more match
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-08-21 08:15 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint