![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 97 matches
- 2009
- Shikhar Bhushan, Ha Manh Tran
, Jürgen Schönwälder
:
NCClient: A Python Library for NETCONF Client Applications. IPOM 2009: 143-154 - Jae Yoon Chung, Byungchul Park, Young J. Won, John Strassner, James W. Hong:
Traffic Classification Based on Flow Similarity. IPOM 2009: 65-77 - Iván Díaz
, Cristian Popi, Olivier Festor
, Juan Touriño
, Ramon Doallo:
Ontological Configuration Management for Wireless Mesh Routers. IPOM 2009: 116-129 - Haesung Hwang, Shingo Ata, Masayuki Murata
:
A Feasibility Evaluation on Name-Based Routing. IPOM 2009: 130-142 - Iyad A. Katib
, Deep Medhi:
A Network Optimization Model for Multi-layer IP/MPLS over OTN/DWDM Networks. IPOM 2009: 180-185 - Atsushi Kobayashi, Keisuke Ishibashi:
VoIP Measurement Architecture Using Data Mediation. IPOM 2009: 15-26 - Per Kreuger, Henrik Abrahamsson:
Scheduling IPTV Content Pre-distribution. IPOM 2009: 1-14 - Wajdi Louati, Ines Houidi, Djamal Zeghlache
:
Autonomic Virtual Routers for the Future Internet. IPOM 2009: 104-115 - José Everardo Bessa Maia, Raimir Holanda Filho
:
One-Against-All Methodology for Features Selection and Classification of Internet Applications. IPOM 2009: 27-38 - José Everardo Bessa Maia, Arnoldo N. da Silva, Jorge Luiz de Castro e Silva, Paulo Roberto Freire Cunha
:
A Methodology of Traffic Engineering to IP Backbone. IPOM 2009: 173-179 - Alexandre Matos, Fernando Matos, Paulo Simões
, Edmundo Monteiro
:
An IPSec Mediation Approach for Safe Establishment of Inter-domain VPNs. IPOM 2009: 155-160 - Giovane Cesar Moreira Moura, Tiago Fioreze, Pieter-Tjerk de Boer, Aiko Pras:
Optical Switching Impact on TCP Throughput Limited by TCP Buffers. IPOM 2009: 161-166 - Francesco Palmieri
, Silvio Pardi:
Managing Network-Aware Grid Services on Metropolitan Scale: The SCoPE Experience. IPOM 2009: 78-90 - Francisco Rodríguez, Mickaël Hoerdt, Laurent Mathy:
Extending Routers Utilisability and Life Cycle through Automated Configuration Management. IPOM 2009: 91-103 - Lei Shi, Alan Davy
:
Security Considerations for Intrinsic Monitoring within IPv6 Networks. IPOM 2009: 167-172 - Anna Sperotto
, Ramin Sadre, Frank E. van Vliet, Aiko Pras:
A Labeled Data Set for Flow-Based Intrusion Detection. IPOM 2009: 39-50 - Wouter Tavernier, Dimitri Papadimitriou, Bart Puype, Didier Colle, Mario Pickavet, Piet Demeester:
Fast Failure Detection in Multipoint Networks. IPOM 2009: 51-64 - Giorgio Nunzi, Caterina M. Scoglio, Xing Li:
IP Operations and Management, 9th IEEE International Workshop, IPOM 2009, Venice, Italy, October 29-30, 2009. Proceedings. Lecture Notes in Computer Science 5843, Springer 2009, ISBN 978-3-642-04967-5 [contents] - 2008
- Osamu Akashi, Atsushi Terauchi:
Diagnosis of IP-Service Anomalies Based on BGP-Update Temporal Analysis. IPOM 2008: 28-40 - Alfred Bashllari, Dritan Nace:
A Study on Two New Protection Strategies. IPOM 2008: 66-77 - Yu Guo, Ning Wang, Kin-Hon Ho, Michael P. Howarth, George Pavlou:
Achieving Fast BGP Reroute with Traffic Engineering Using Multiple Routing Planes. IPOM 2008: 41-52 - Noriaki Kamiyama, Tatsuya Mori
, Ryoichi Kawahara, Shigeaki Harada:
Optimum Identification of Worm-Infected Hosts. IPOM 2008: 103-116 - Atsushi Kobayashi, Yutaka Hirokawa, Haruhiko Nishida:
IP Multicast Traffic Measurement Method with IPFIX/PSAMP. IPOM 2008: 78-90 - Xin Liu, Peidong Zhu, Yuxing Peng:
SEM: A Security Evaluation Model for Inter-domain Routing System in the Internet. IPOM 2008: 142-153 - Igor Margasinski, Michal Pióro
:
Low-Latency Parallel Transport in Anonymous Peer-to-Peer Overlays. IPOM 2008: 127-141 - JeongKi Park, Young-Tak Kim:
An Enhanced SNTP (ESNTP) Clock Synchronization for High-Precision Network QoS Measurements. IPOM 2008: 91-102 - Peter Romirer-Maierhofer, Fabio Ricciato:
Towards Anomaly Detection in One-Way Delay Measurements for 3G Mobile Networks: A Preliminary Study. IPOM 2008: 1-14 - Anna Sperotto
, Ramin Sadre, Aiko Pras:
Anomaly Characterization in Flow-Based Traffic Time Series. IPOM 2008: 15-27 - Badis Tebbani, Kamel Haddadou, Guy Pujolle:
Session-Based QoS Management Architecture for Wireless Local Area Networks. IPOM 2008: 117-126 - Mingui Zhang, Bin Liu, Beichuan Zhang:
Load-Balanced IP Fast Failure Recovery. IPOM 2008: 53-65
skipping 67 more matches
loading more results
failed to load more results, please try again later
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-30 19:59 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint