


default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 65 matches
- 2005
- Navid Aghdaie, Yuval Tamir:
Efficient client-transparent fault tolerance for video conferencing. Communications and Computer Networks 2005: 202-207 - Thomas Bachran, Harald H.-J. Bongartz, Alexander Tiderko:
A framework for multicast and quality based forwarding in manets. Communications and Computer Networks 2005: 120-125 - Stevan M. Berber, Yi-Chun Liu:
Iterative convolutional decoders based on neural networks applications. Communications and Computer Networks 2005: 363-368 - Tønnes Brekne, André Årnes:
Circumventing IP-address pseudonymization. Communications and Computer Networks 2005: 43-48 - David T. Chen, Nat Natarajan, Yishen Sun:
On the simulation, modeling, and performance analysis of an 802.16E mobile broadband wireless access system. Communications and Computer Networks 2005: 278-283 - Gautam Das, Maria Fazio, Massimo Villari, Antonio Puliafito:
CCID: Core construction for information dissemination in ad hoc scenario. Communications and Computer Networks 2005: 114-119 - Andreas Ehliar, Dake Liu:
Flexible route lookup using range search. Communications and Computer Networks 2005: 345-350 - Jacob Engel, Taskin Koçak:
Performance evaluation of 3D-interconnect architectures for network line cards. Communications and Computer Networks 2005: 351-356 - Benjamin Falchuk, Abdelhakim Hafid, Narayanan Natarajan:
Architecture for information dissemination in wireless emergency management. Communications and Computer Networks 2005: 100-107 - András Faragó:
New analytical results on ad hoc network connectivity. Communications and Computer Networks 2005: 126-131 - Takahiro Fujiwara:
A unified networking scheme for sensor networks in a heterogeneous data collection system. Communications and Computer Networks 2005: 7-11 - Juan Carlos García, María del Carmen Bañuls, Pablo Galdámez, Rubén Quintero:
Trading-off consumption of routing and precision of membership in ad hoc networks. Communications and Computer Networks 2005: 108-113 - Yuan Guo, Janise McNair:
An adaptive sleep protocol for environment monitoring using wireless sensor networks. Communications and Computer Networks 2005: 1-6 - Yoonjeong Ha, Woojin Park, Sunshin An:
IP RAN management architecture and mechanism in 3G networks. Communications and Computer Networks 2005: 182-187 - Mitsuo Hayasaka, Manodha Gamage, Tetsuya Miki:
Burst packet loss recovery using variable fec matrix for real-time applications over the internet. Communications and Computer Networks 2005: 196-201 - Ibrahim Hökelek, M. Ümit Uyar, Mariusz A. Fecko:
Random-walk based analysis of virtual backbone in manets. Communications and Computer Networks 2005: 132-137 - Hui Huang, Junrong Ou, Dongmei Zhang:
Efficient multimedia transmission in mobile network by using PR-SCTP. Communications and Computer Networks 2005: 213-217 - Ho-Lung Hung, Shu-Hong Lee, Jyh-Horng Wen:
An improved taguchi-genetic algorithm assisted multiuser detector for MC-CDMA systems. Communications and Computer Networks 2005: 313-318 - Yoshihiro Ito, Shuji Tasaka, Ryusuke Ito:
Continuous time assessment and mapping of user-level QOS in audio-video transmission over IP networks. Communications and Computer Networks 2005: 230-237 - Sethuraman Janardhanan, Ambuj Mahanti, Debashis Saha:
A heuristic search based optimal wavelength assignment algorithm to minimize the number of sonet ADMS in WDM rings. Communications and Computer Networks 2005: 152-157 - Manijeh Keshtgary, Amir Hossein Jahangir, Anura P. Jayasumana:
Network survivability performance evaluation using fault trees. Communications and Computer Networks 2005: 158-163 - M. K. Khan, Rolando A. Carrasco, Ian J. Wassell:
LDPC-BIBD coded SISO system with SRK equalisation over the broadband fixed wireless access channel. Communications and Computer Networks 2005: 296-301 - Jung Gon Kim, Ting Wang:
Time-slot re-allocation for inter-frequency and inter-rat handover iN 1.28 MCPS TDD for UMTS. Communications and Computer Networks 2005: 176-181 - Naoto Kimura, Vasu Jolly, Shahram Latifi:
Data dissemination with resource management in wireless sensor networks. Communications and Computer Networks 2005: 12-17 - Henri Koskinen:
Generalization of critical transmission range for connectivity to wireless multihop network models including interference. Communications and Computer Networks 2005: 88-93 - Ulas C. Kozat, Mariusz A. Fecko, Sunil Samtani:
Optimal allocation of pooled servers for situation awareness applications. Communications and Computer Networks 2005: 18-23 - Michael S. H. Kuroda, David C. C. Bover:
A comparison of random elliptic curves and finite fields suitable for cryptography. Communications and Computer Networks 2005: 49-55 - Uichin Lee, Joon-Sang Park, M. Y. Sanadidi, Mario Gerla:
Flowbased dynamic load balancing for passive network monitoring. Communications and Computer Networks 2005: 357-362 - Shanshan Li, Xiangke Liao, Yusong Tan, Jin-Yuan Liu:
Integrating network QoS with end system performance in kernel pipeline WEB server. Communications and Computer Networks 2005: 238-243 - Marcin Matuszewski, Raimo Kantola:
Aligning mobile P2P content sharing services with a customer process. Communications and Computer Networks 2005: 329-336
loading more results
failed to load more results, please try again later

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
[+][–] Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
[+][–] Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-07-06 05:42 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint
