![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Computer Communications, Volume 136
Volume 136, February 2019
- Min Zhu, Shengyu Zhang, Guixin Li, Jiao Zhang:
Cost-effective fiber fault monitoring using MLMW-OOCs in high-capacity PONs considering user geographical distribution. 1-9 - Xu Wang
, Xuan Zha, Wei Ni
, Ren Ping Liu
, Y. Jay Guo, Xinxin Niu, Kangfeng Zheng:
Survey on blockchain for Internet of Things. 10-29 - Peng Feng
, Yuebin Bai, Jun Huang, Weitao Wang, Yuhao Gu, Shuai Liu:
CogMOR-MAC: A cognitive multi-channel opportunistic reservation MAC for multi-UAVs ad hoc networks. 30-42 - José Luis García-Dorado
, Javier Aracil:
Flow-concurrence and bandwidth ratio on the Internet. 43-52 - Huafeng Wu, Jiangfeng Xian
, Xiaojun Mei
, Yuanyuan Zhang
, Jun Wang
, Junkuo Cao, Prasant Mohapatra:
Efficient target detection in maritime search and rescue wireless sensor network using data fusion. 53-62 - Zhao Li, Jiamin Ding, Xiaoqin Dai, Kang G. Shin, Jia Liu
:
Exploiting interactions among signals to decode interfering transmissions with fewer receiving antennas. 63-75 - Mohammad Hadi Alaeiyan
, Saeed Parsa
, Mauro Conti
:
Analysis and classification of context-based malware behavior. 76-90
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.