default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 259 matches
- 2005
- Nahid Afroz, Subir Bandyopadhyay, Rabiul Islam, Bhabani P. Sinha:
On the Implementation of Links in Multi-mesh Networks Using WDM Optical Networks. IWDC 2005: 183-188 - Amol Bakshi, Viktor K. Prasanna:
Programming Paradigms for Networked Sensing: A Distributed Systems' Perspective. IWDC 2005: 451-462 - Roberto Baldoni, Adnan Noor Mian, Sirio Scipioni, Sara Tucci Piergiovanni:
Churn Resilience of Peer-to-Peer Group Membership: A Performance Analysis. IWDC 2005: 226-237 - Ranjana Bhadoria, Shukti Das, Manoj Misra, Anil Kumar Sarje:
Performance Comparison of Majority Voting with ROWA Replication Method over PlanetLab. IWDC 2005: 147-152 - Parama Bhaumik, Somprakash Bandyopadhyay:
Mobile Agent Based Message Communication in Large Ad Hoc Networks Through Co-operative Routing Using Inter-agent Negotiation at Rendezvous Points. IWDC 2005: 554-559 - Walter Brooks, Michael J. Aftosmis, Bryan Biegel, Rupak Biswas, Robert Ciotti, Kenneth Freeman, Christopher E. Henze, Thomas H. Hinke, Haoqiang Jin, William Thigpen:
Impact of the Columbia Supercomputer on NASA Science and Engineering Applications. IWDC 2005: 293-305 - Teddy Candale, Ikpeme Erete, Sandip Sen:
Using Inertia and Referrals to Facilitate Satisficing Distributions. IWDC 2005: 572-577 - Chongying Cao, Jing Yang, Guoqing Zhang:
Semantic Overlay Based Services Routing Between MPLS Domains. IWDC 2005: 416-427 - Dibyendu Chakrabarti, Subhamoy Maitra, Bimal K. Roy:
Clique Size in Sensor Networks with Key Pre-distribution Based on Transversal Design. IWDC 2005: 329-337 - Narottam Chand, Ramesh C. Joshi, Manoj Misra:
Efficient Mobility Management for Cache Invalidation in Wireless Mobile Environment. IWDC 2005: 536-541 - Sanjay Chatterjee, Siuli Roy, Somprakash Bandyopadhyay, Tetsuro Ueda, Hisato Iwai, Sadao Obana:
A Power Aware Routing Strategy for Ad Hoc Networks with Directional Antenna Optimizing Control Traffic and Power Consumption. IWDC 2005: 275-280 - Young-Soo Choi, Hee-Dong Park, Sung-Hyup Lee, You Ze Cho:
eHSTCP: Enhanced Congestion Control Algorithm of TCP over High-Speed Networks. IWDC 2005: 439-450 - Reuven Cohen, Pierre Fraigniaud, David Ilcinkas, Amos Korman, David Peleg:
Labeling Schemes for Tree Representation. IWDC 2005: 13-24 - Rajib K. Das:
Fault Tolerant Routing in Star Graphs Using Fault Vector. IWDC 2005: 475-486 - Ashok Kumar Das, Abhijit Das, Surjyakanta Mohapatra, Srihari Vavilapalli:
Key Forwarding: A Location-Adaptive Key-Establishment Scheme for Wireless Sensor Networks. IWDC 2005: 404-409 - Gautam K. Das, Sandip Das, Subhas C. Nandy, Bhabani P. Sinha:
Placing a Given Number of Base Stations to Cover a Convex Region. IWDC 2005: 57-62 - Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati:
Cryptanalysis and Improvement of a Multisignature Scheme. IWDC 2005: 398-403 - Sanjay Kumar Dhurandher, G. V. Singh:
Power Aware Cluster Efficient Routing in Wireless Ad Hoc Networks. IWDC 2005: 281-286 - Kai Engelhardt, Yoram Moses:
Single-Bit Messages Are Insufficient in the Presence of Duplication. IWDC 2005: 25-31 - Kai Engelhardt, Yoram Moses:
Safe Composition of Distributed Programs Communicating over Order-Preserving Imperfect Channels. IWDC 2005: 32-44 - Pankaj Ghanshani, Tarun Bansal:
Oasis: A Hierarchical EMST Based P2P Network. IWDC 2005: 201-212 - R. K. Ghosh, Saurabh Aggarwala, Hemant Mishra, Ashish Sharma, Hrushikesha Mohanty:
Tracking of Mobile Terminals Using Subscriber Mobility Pattern with Time-Bound Self Purging Indicators and Regional Route Maps. IWDC 2005: 512-523 - Rahul Ghosh, Aritra Das, Palaniandavar Venkateswaran, Salil Kumar Sanyal, Rabindranath Nandi:
An Efficient Social Network-Mobility Model for MANETs. IWDC 2005: 349-354 - N. P. Gopalan, K. Nagarajan:
Self-refined Fault Tolerance in HPC Using Dynamic Dependent Process Groups. IWDC 2005: 153-158 - Héctor J. Fraire H., Graciela Mora Guadalupe Castilla V., Arturo Hernández R., Claudia Gómez Santillán, Graciela Mora O., Arquimedes Godoy V.:
A Model for the Distribution Design of Distributed Databases and an Approach to Solve Large Instances. IWDC 2005: 506-511 - M. Julius Hossain, Oksam Chae:
Optimizing Lifetime and Routing Cost in Wireless Networks. IWDC 2005: 93-98 - Chun Huang, Mainak Chatterjee, Wei Cui, Ratan K. Guha:
Multipath Source Routing in Sensor Networks Based on Route Ranking. IWDC 2005: 99-104 - Xinli Huang, Yin Li, Fanyuan Ma:
GToS: Examining the Role of Overlay Topology on System Performance Improvement. IWDC 2005: 213-225 - Soyoung Hwang, Yunju Baek:
Reliable Time Synchronization Protocol in Sensor Networks Considering Topology Changes. IWDC 2005: 105-110 - Arunita Jaekel, Ying Chen:
Distributed Dynamic Lightpath Allocation in Survivable WDM Networks. IWDC 2005: 189-194
skipping 229 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-14 01:51 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint