Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 136 matches
- 2008
- Subrata Acharya, Rabi N. Mahapatra:
A Dynamic Slack Management Technique for Real-Time Distributed Embedded Systems. IEEE Trans. Computers 57(2): 215-230 (2008) - Habib M. Ammari, Sajal K. Das:
Integrated Coverage and Connectivity in Wireless Sensor Networks: A Two-Dimensional Percolation Problem. IEEE Trans. Computers 57(10): 1423-1434 (2008) - Bijan Ansari, M. Anwar Hasan:
High-Performance Architecture of Elliptic Curve Scalar Multiplication. IEEE Trans. Computers 57(11): 1443-1453 (2008) - Elisardo Antelo, Julio Villalba, Emilio L. Zapata:
A Low-Latency Pipelined 2D and 3D CORDIC Processors. IEEE Trans. Computers 57(3): 404-417 (2008) - Ortal Arazi, Hairong Qi:
On Calculating Multiplicative Inverses Modulo $2{m}$. IEEE Trans. Computers 57(10): 1435-1438 (2008) - Giuseppe Ascia, Vincenzo Catania, Maurizio Palesi, Davide Patti:
Implementation and Analysis of a New Selection Strategy for Adaptive Routing in Networks-on-Chip. IEEE Trans. Computers 57(6): 809-820 (2008) - Patricia Balbastre, Ismael Ripoll, Alfons Crespo:
Minimum Deadline Calculation for Periodic Real-Time Tasks in Dynamic Priority Systems. IEEE Trans. Computers 57(1): 96-109 (2008) - Deniz Balkan, Joseph J. Sharkey, Dmitry V. Ponomarev, Kanad Ghose:
Predicting and Exploiting Transient Values for Reducing Register File Pressure and Energy Consumption. IEEE Trans. Computers 57(1): 82-95 (2008) - Sandro Bartolini, Irina Branovic, Roberto Giorgi, Enrico Martinelli:
Effects of Instruction-Set Extensions on an Embedded Processor: A Case Study on Elliptic Curve Cryptography over GF(2m). IEEE Trans. Computers 57(5): 672-685 (2008) - Kelli Baumgartner, Silvia Ferrari:
A Geometric Transversal Approach to Analyzing Track Coverage in Sensor Networks. IEEE Trans. Computers 57(8): 1113-1128 (2008) - Marta Beltrán, Antonio Guzmán, José Luis Bosque:
A New CPU Availability Prediction Model for Time-Shared Systems. IEEE Trans. Computers 57(7): 865-875 (2008) - Alfredo Benso, Alberto Bosio, Stefano Di Carlo, Giorgio Di Natale, Paolo Prinetto:
March Test Generation Revealed. IEEE Trans. Computers 57(12): 1704-1713 (2008) - Jean-Luc Beuchat, Nicolas Brisebarre, Jérémie Detrey, Eiji Okamoto, Masaaki Shirase, Tsuyoshi Takagi:
Algorithms and Arithmetic Operators for Computing the etaT Pairing in Characteristic Three. IEEE Trans. Computers 57(11): 1454-1468 (2008) - Jean-Luc Beuchat, Jean-Michel Muller:
Automatic Generation of Modular Multipliers for FPGA Applications. IEEE Trans. Computers 57(12): 1600-1613 (2008) - Shaoqiang Bi, Warren J. Gross:
The Mixed-Radix Chinese Remainder Theorem and Its Applications to Residue Comparison. IEEE Trans. Computers 57(12): 1624-1632 (2008) - Simon Bliudze, Joseph Sifakis:
The Algebra of Connectors - Structuring Interaction in BIP. IEEE Trans. Computers 57(10): 1315-1330 (2008) - Sylvie Boldo, Guillaume Melquiond:
Emulation of a FMA and Correctly Rounded Sums: Proved Algorithms Using Rounding to Odd. IEEE Trans. Computers 57(4): 462-471 (2008) - Nicolas Brisebarre, Jean-Michel Muller:
Correctly Rounded Multiplication by Arbitrary Precision Constants. IEEE Trans. Computers 57(2): 165-174 (2008) - Costas Busch, Malik Magdon-Ismail, Jing Xi:
Optimal Oblivious Path Selection on the Mesh. IEEE Trans. Computers 57(5): 660-671 (2008) - Giuliano Casale, Richard R. Muntz, Giuseppe Serazzi:
Geometric Bounds: A Noniterative Analysis Technique for Closed Queueing Networks. IEEE Trans. Computers 57(6): 780-794 (2008) - Yeim-Kuan Chang, Cheng-Chien Su:
Comments on "A TCAM-Based Parallel Architecture for High-Speed Packet Forwarding". IEEE Trans. Computers 57(4): 574-576 (2008) - Hao Che, Zhijun Wang, Kai Zheng, Bin Liu:
DRES: Dynamic Range Encoding Scheme for TCAM Coprocessors. IEEE Trans. Computers 57(7): 902-915 (2008) - Zeshan Chishti, T. N. Vijaykumar:
Optimal Power/Performance Pipeline Depth for SMT in Scaled Technologies. IEEE Trans. Computers 57(1): 69-81 (2008) - Jeonghwan Choi, Youngjae Kim, Anand Sivasubramaniam, Jelena Srebric, Qian Wang, Joonwon Lee:
A CFD-Based Tool for Studying Temperature in Rack-Mounted Servers. IEEE Trans. Computers 57(8): 1129-1142 (2008) - Sung Woo Chung, Kevin Skadron:
On-Demand Solution to Minimize I-Cache Leakage Energy with Maintaining Performance. IEEE Trans. Computers 57(1): 7-24 (2008) - John N. Coleman, Christopher I. Softley, Jiri Kadlec, Rudolf Matousek, Milan Tichý, Zdenek Pohl, Antonin Hermanek, Nico F. Benschop:
The European Logarithmic Microprocesor. IEEE Trans. Computers 57(4): 532-546 (2008) - Érika F. Cota, Fernanda Gusmão de Lima Kastensmidt, Maico Cassel, Marcos Hervé, Pedro Almeida, Paulo Meirelles, Alexandre M. Amory, Marcelo Lubaszewski:
A High-Fault-Coverage Approach for the Test of Data, Control and Handshake Interconnects in Mesh Networks-on-Chip. IEEE Trans. Computers 57(9): 1202-1215 (2008) - Robert I. Davis, A. Zabos, Alan Burns:
Efficient Exact Schedulability Tests for Fixed Priority Real-Time Systems. IEEE Trans. Computers 57(9): 1261-1276 (2008) - Vanesa Daza, Javier Herranz, Germán Sáez:
On the Computational Security of a Distributed Key Distribution Scheme. IEEE Trans. Computers 57(8): 1087-1097 (2008) - Vassil S. Dimitrov, Kimmo U. Järvinen, Michael J. Jacobson Jr., W. F. Chan, Zhun Huang:
Provably Sublinear Point Multiplication on Koblitz Curves and Its Hardware Implementation. IEEE Trans. Computers 57(11): 1469-1481 (2008)
skipping 106 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-03-28 13:08 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint