default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 26 matches
- 2009
- Hady S. AbdelSalam, Stephan Olariu:
A 3d-localization and terrain modeling technique for wireless sensor networks. FOWANC@MobiHoc 2009: 37-46 - Hady S. AbdelSalam, Stephan Olariu:
Passive localization using rotating anchor pairs in wireless sensor networks. FOWANC@MobiHoc 2009: 67-76 - Hadi Alasti, Asis Nasipuri:
Spatio-temporal monitoring using contours in large-scale wireless sensor networks. FOWANC@MobiHoc 2009: 77-86 - Stephan J. Eidenbenz, Gunes Ercal-Ozkaya, Adam Meyerson, Allon G. Percus:
On a locally minimum cost forwarding game. FOWANC@MobiHoc 2009: 29-36 - Shirish Karande, Zheng Wang, Hamid R. Sadjadpour, Jose Joaquin Garcia-Luna-Aceves:
On the multicast throughput capacity of network coding in wireless ad-hoc networks. FOWANC@MobiHoc 2009: 21-28 - Silvija Kokalj-Filipovic, Predrag Spasojevic, Roy D. Yates:
Can a packet walk straight through a field of randomly dying location-unaware wireless nodes? FOWANC@MobiHoc 2009: 57-66 - Paolo Santi, Ritesh Maheshwari, Giovanni Resta, Samir Das, Douglas M. Blough:
Wireless link scheduling under a graded SINR interference model. FOWANC@MobiHoc 2009: 3-12 - Incheol Shin, Yilin Shen, Ying Xuan, My Tra Thai, Taieb Znati:
Reactive jamming attacks in multi-radio wireless sensor networks: an efficient mitigating measure by identifying trigger nodes. FOWANC@MobiHoc 2009: 87-96 - Jie Wu:
On self-organization in MANETs. FOWANC@MobiHoc 2009: 1-2 - XiaoHua Xu, Shaojie Tang:
A constant approximation algorithm for link scheduling in arbitrary networks under physical interference model. FOWANC@MobiHoc 2009: 13-20 - XiaoHua Xu, ShiGuang Wang, XuFei Mao, Shaojie Tang, Xiang-Yang Li:
An improved approximation algorithm for data aggregation in multi-hop wireless sensor networks. FOWANC@MobiHoc 2009: 47-56 - Ivan Stojmenovic, Ding-Zhu Du, Yu Wang, Yingshu Li:
Proceedings of the 2nd ACM international workshop on Foundations of wireless ad hoc and sensor networking and computing, FOWANC '09, New Orleans, Louisiana, USA, May 18, 2009. ACM 2009, ISBN 978-1-60558-523-9 [contents] - 2008
- Naif Abdo Alsharabi, Renfa Li, Maan Younis Abdullah, Fanzi Zeng:
Equitable distribution energy consumption of wsns. FOWANC 2008: 45-52 - Daniel Berend, Michael Segal, Hanan Shpungin:
Power efficient resilience and lifetime in wireless ad-hoc networks. FOWANC 2008: 17-24 - Jinfeng Dou, Zhongwen Guo, Jiabao Cao, Guangxu Zhang, Guangyue Li:
Probability and suboptimal distance based lifetime prolong algorithms for wireless sensor networks. FOWANC 2008: 61-68 - Olga Goussevskaia, Roger Wattenhofer:
Complexity of scheduling with analog network coding. FOWANC 2008: 77-84 - Zhongwen Guo, Jinfeng Dou, Wei Han, Guangxu Zhang, Zhengang Ha:
ATA: adaptive transmission algorithms for prolonging lifetime in underwater sensor networks. FOWANC 2008: 69-76 - Sangsu Jung, Dujeong Lee, Sangyoon Yoon, Jaehwi Shin, Youngwoo Lee, Jeonghoon Mo:
A geographic routing protocol utilizing link lifetime and power control for mobile ad hoc networks. FOWANC 2008: 25-32 - Deying Li, Hongwei Du, Wenping Chen:
Power conservation for strongly connected topology control in wireless sensor network. FOWANC 2008: 9-16 - Xu Li, Nicola Santoro, Ivan Stojmenovic:
Localized distance-sensitive service discovery in wireless sensor networks. FOWANC 2008: 85-92 - Gaotao Shi, Minghong Liao, Maode Ma, Yantai Shu:
Exploiting sink movement for energy-efficient load-balancing in wireless sensor networks. FOWANC 2008: 39-44 - Bo Sun, Suixiang Gao, Rui Chi, Fei Huang:
Algorithms for balancing energy consumption in wireless sensor networks. FOWANC 2008: 53-60 - Lu Yan, Stephen Hailes:
Cooperative packet relaying model for wireless ad hoc networks. FOWANC 2008: 93-100 - Ning Zhang, Incheol Shin, Feng Zou, Weili Wu, My T. Thai:
Trade-off scheme for fault tolerant connected dominating sets on size and diameter. FOWANC 2008: 1-8 - Rong Zheng:
On routing in lossy wireless networks with realistic channel models. FOWANC 2008: 33-38 - Xiang-Yang Li, Yu Wang:
Proceedings of the 1st ACM International Workshop on Foundations of Wireless Ad Hoc and Sensor Networking and Computing, FOWANC 2008, Hong Kong, SAR, China, May 26, 2008. ACM 2008, ISBN 978-1-60558-149-1 [contents]
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-05 16:02 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint