Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 943 matches
- 2009
- Mojtaba Aajami, Hossein Saidi, Masoud Reza Hashemi:
HRSQM: Heterogeneous Receivers Supporting QoS Multicast. ICN 2009: 347-353 - Hanal Abuzanat, Benoit Trouillet, Armand Toguyéni:
Fair Queuing Model for EDCA to Optimize QoS in Ad-Hoc Wireless Network. ICN 2009: 306-311 - Fereidoun Ahourai, Mahmoud Tabandeh, Mehran Jahed, B. Afsari:
A Fair Routing Algorithm for Wireless Mesh Networks Based on Game Theory. ICN 2009: 144-149 - Oumaya Baala, You Zheng, Alexandre Caminada:
The Impact of AP Placement in WLAN-Based Indoor Positioning System. ICN 2009: 12-17 - Miroslav Balík, Lubomir Cvrk, Martin Sykora:
Secure H.323 Data Transmission between Private Networks. ICN 2009: 248-252 - Tarek Bchini, Nabil Tabbane, Sami Tabbane, Emmanuel Chaput, André-Luc Beylot:
QoS in IEEE 802.16e for VoIP and Video with Mechanism of Soft Handover . ICN 2009: 88-93 - Zdenek Becvar, Pavel Mach, Robert Bestak:
Impact of Handover on VoIP Speech Quality in WiMAX Networks. ICN 2009: 281-286 - Abdoulaye Berthe, Aubin Lecointre, Daniela Dragomirescu, Robert Plana:
Simulation Platform for Wireless Sensor Networks Based on Impulse Radio Ultra Wide Band. ICN 2009: 61-66 - Robert Bestak:
Parameter Setting of Protocol MAC-hs in HSDPA. ICN 2009: 292-296 - Frank Bohdanowicz, Harald Dickel, Christoph Steigner:
Metric-Based Topology Investigation. ICN 2009: 176-184 - Kwangjong Cho, Wonhyuk Lee, Dongkyun Kim:
Self-Configurable Diagnosis Algorithm on an Isolation Network. ICN 2009: 391-396 - Well Y. Chou, Richard B. Chen, Chiuyuan Chen:
All-to-All Personalized Exchange Algorithms in Generalized Shuffle-Exchange Networks. ICN 2009: 185-190 - Lukasz Chrost, Agnieszka Brachman, Andrzej Chydzinski:
A Program Suite for Distributed Simulation of Networks in Multi-core Environments. ICN 2009: 6-11 - Subhendu Das, Nirode Mohanty, Avtar Singh:
Capacity Theorem for Finite Duration Symbols. ICN 2009: 35-39 - Chérif Diallo, Ashish Gupta, Monique Becker, Michel Marot:
Energy Aware Database Updating Protocols for Autoconfigurable Sensor Networks. ICN 2009: 138-143 - Robert Eigner, Christoph Mair:
Using Context Ontologies for Addressing and Routing in Mobile Ad Hoc Networks. ICN 2009: 415-420 - Gianni Fenu, Simone Surcis:
A Cloud Computing Based Real Time Financial System. ICN 2009: 374-379 - Lothar Fritsch, Arne-Kristian Groven, Lars Strand:
A Holistic Approach to Open-Source VoIP Security: Preliminary Results from the EUX2010sec Project. ICN 2009: 275-280 - Holger Fröning, Heiner Litz, Ulrich Brüning:
Efficient Virtualization of High-Performance Network Interfaces. ICN 2009: 434-439 - Cherif Ghazel, Leïla Azouz Saïdane:
Achieving a QoS Target in NGN Networks via an Efficient Admission Control Strategy. ICN 2009: 318-323 - Ehsan Gholami, Amir Masoud Rahmani, Ahmad Habibizad Navin:
Using Monte Carlo Simulation in Grid Computing Systems for Reliability Estimation. ICN 2009: 380-384 - Aristotelis Giannakos, Gregory Karagiorgos, Ioannis Stavrakakis:
A Message-Optimal Sink Mobility Model for Wireless Sensor Networks. ICN 2009: 287-291 - Mina Guirguis, Joshua Tharp, Azer Bestavros, Ibrahim Matta:
Assessment of Vulnerability of Content Adaptation Mechanisms to RoQ Attacks. ICN 2009: 445-450 - Huaqun Guo, H. S. Cheng, Yongdong Wu, J. J. Ang, F. Tao, A. K. Venkatasubramanian, C. H. Kwek, L. H. Liow:
An Automotive Security System for Anti-theft. ICN 2009: 421-426 - Mohammad Hammoudeh, Robert M. Newman, Sarah Mount:
An Approach to Data Extraction and Visualisation for Wireless Sensor Networks. ICN 2009: 156-161 - Oliver Hanka, Christoph Spleiß, Gerald Kunzmann, Jörg Eberspächer:
A Novel DHT-Based Network Architecture for the Next Generation Internet. ICN 2009: 332-341 - Toshiaki Hidekuma, Go Hasegawa, Masahiro Sasabe, Hirotaka Nakano:
Degree-Based Power Control Method for Increasing Spatial Reuse in TDMA-Based Wireless Mesh Networks. ICN 2009: 121-126 - Chen-Shie Ho, Kuo-Cheng Chiang:
FSA - A Flooding Based Survivable RWA Mechanism for Dynamic Traffic. ICN 2009: 409-414 - Sungbum Hong, Qutaibah M. Malluhi, Tom Jacob:
Efficient Channel Allocation Scheme with Triangle Communication. ICN 2009: 297-305 - Jin-Ok Hwang, Young-Il Choi, Joo-Sang Youn, YoungJun Lee, Sung-Gi Min:
Group Key Agreement Scheme for Single Link Failure in Ad-Hoc Network. ICN 2009: 133-137
skipping 913 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-02 04:34 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint