default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 1,083 matches
- 2022
- Slim Abbes, Slim Rekhis:
Reinforcement Learning-based Virtual Sensors Provision in Internet of Vehicles (IoV). NCA 2022: 217-224 - Samira Afzal, Zahra Najafabadi Samani, Narges Mehran, Christian Timmerer, Radu Prodan:
MPEC2: Multilayer and Pipeline Video Encoding on the Computing Continuum. NCA 2022: 181-190 - Aymeric Agon-Rambosson, Jonathan Lejeune, Julien Sopena, Pierre Sens:
Alternating MPR: a balanced broadcast algorithm for MANETs. NCA 2022: 19-26 - Yotam Ashkenazi, Shlomi Dolev:
Distributed Coordination Based on Quantum Entanglement (Work in Progress). NCA 2022: 303-305 - André Bento, João Soares, António Ferreira, João Durães, José Ferreira, Rita Carreira, Filipe Araújo, Raul Barbosa:
Bi-objective optimization of availability and cost for cloud services. NCA 2022: 45-53 - Ibtissem Brahmi, Monia Hamdi, Ines Rahmany, Faouzi Zarai:
Deep Reinforcement Learning for Downlink Resource Allocation in Vehicular Small Cell Networks. NCA 2022: 107-114 - Souvik Deb, Shankar Kumar Ghosh, Sasthi C. Ghosh:
MAB based Network Selection mechanism for URLLC users in RIS assisted network. NCA 2022: 173-179 - Fadoua Debbabi, Raouia Taktak, Rihab Jmal, Lamia Chaari Fourati, Rui L. Aguiar:
Inter-slice B5G Bandwidth Resource Allocation. NCA 2022: 157-163 - Shlomi Dolev, Alexander Fok, Michael Segal:
Swarming with (Visual) Secret (Shared) Mission. NCA 2022: 269-276 - Shlomi Dolev, Yaniv Kleinman:
Multiplicative Partially Homomorphic CRT Secret Sharing : (Preliminary Version). NCA 2022: 201-207 - Rafael Figueiredo, Samih Eisa, Miguel L. Pardal:
SureRepute: Reputation System for Crowdsourced Location Witnesses. NCA 2022: 261-268 - Ricardo Grade, Samih Eisa, Miguel L. Pardal:
Bluetooth Peer-to-Peer Location Certification with a Gamified Mobile Application. NCA 2022: 55-62 - Imene Ben Hafaiedh:
Formal models for the verification, performance evaluation, and comparison of IoT communication protocols. NCA 2022: 131-138 - Muhong Huang, Runchao Han, Zhiqiang Du, Yanfang Fu, Liangxin Liu:
Reputation-based state machine replication. NCA 2022: 225-234 - Towhidul Islam, Asif Ahmed, Raihan Tanvir, Rezwana Reaz:
Enforcing delay-aware fog-cloud based IoT firewall (Work In Progress). NCA 2022: 307-309 - Priyanka Kamboj, Sujata Pal:
Energy-Aware Routing in SDN Enabled Data Center Network. NCA 2022: 123-130 - Maya Kapoor, Siddharth Krishnan, Thomas Moyer:
Deep Packet Inspection at Scale: Search Optimization Through Locality-Sensitive Hashing. NCA 2022: 97-105 - Kadir Korkmaz, Joachim Bruneau-Queyreix, Stéphane Delbruel, Sonia Ben Mokhtar, Laurent Réveillère:
In-depth analysis of the IDA-Gossip protocol. NCA 2022: 139-147 - Kadir Korkmaz, Joachim Bruneau-Queyreix, Sonia Ben Mokhtar, Laurent Réveillère:
ALDER: Unlocking blockchain performance by multiplexing consensus protocols. NCA 2022: 9-18 - Mehrzad Lavassani, Johan Åkerberg, Mats Björkman:
Data-driven Method for In-band Network Telemetry Monitoring of Aggregated Traffic. NCA 2022: 89-95 - Giovanni Merlino, Rafael Asorey-Cacheda, Luca D'Agati, Francesco Longo, Antonio-Javier García-Sánchez, Joan García-Haro, Antonio Puliafito:
Infrastructure-centric, NetworkServer-agnostic LoRaWAN Roaming. NCA 2022: 149-156 - Ziran Min, Shashank Shekhar, Charif Mahmoudi, Valerio Formicola, Swapna S. Gokhale, Aniruddha Gokhale:
Software-defined Dynamic 5G Network Slice Management for Industrial Internet of Things. NCA 2022: 251-259 - Anshuman Misra, Ajay D. Kshemkalyani:
Byzantine Fault-Tolerant Causal Broadcast on Incomplete Graphs. NCA 2022: 63-71 - Anshuman Misra, Ajay D. Kshemkalyani:
Detecting Causality in the Presence of Byzantine Processes: There is No Holy Grail. NCA 2022: 73-80 - Anshuman Misra, Ajay D. Kshemkalyani:
Causal Ordering Properties of Byzantine Reliable Broadcast Primitives. NCA 2022: 115-122 - Hajer Nabli, Ines Regaig, Raoudha Ben Djemaa, Layth Sliman:
Never Alone: a Quality of Context-aware Monitoring System for Aging in Place Smart Home. NCA 2022: 209-215 - Michel Neves, André Riker, Jéferson Campos Nobre, Antônio J. G. Abelém, Bruno Lopes Dalmazo:
Modularized and Contract-Based Prediction Models in Programmable Networks. NCA 2022: 285-289 - Erick Petersen, Jorge López, Natalia Kushik, Claude Poletti, Djamal Zeghlache:
On using Cellular Automata for Modeling the Evolution of Dynamic-Link Network Parameters. NCA 2022: 297-301 - Lorenzo Rossi, Luca Ferretti:
WebDHT: browser-compatible distributed hash table for decentralized Web applications. NCA 2022: 277-284 - Sridevi S, Jacob Augustine, Shankar K. Ghosh:
An analytic hierarchy process (AHP) based UAV selection mechanism for beyond 5G networks. NCA 2022: 27-34
skipping 1,053 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-12 02:57 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint