Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 78 matches
- 2008
- Bengt Ahlgren, Matteo D'Ambrosio, Marco Marchisio, Ian Marsh, Christian Dannewitz, Börje Ohlman, Kostas Pentikousis, Ove Strandberg, René Rembarz, Vinicio Vercellone:
Design considerations for a network of information. CoNEXT 2008: 66 - Nabeel Ahmed, Usman Ismail, Srinivasan Keshav, Konstantina Papagiannaki:
Online estimation of RF interference. CoNEXT 2008: 4 - Safwan Al-Omari, Weisong Shi:
Toward low cost and highly reliable sensor networks deployment. CoNEXT 2008: 44 - Pedro Amaral, Luís Bernardo, Paulo Pinto:
Inter-domain routing using topology information. CoNEXT 2008: 36 - Christina Aperjis, Michael J. Freedman, Ramesh Johari:
Peer-assisted content distribution with prices. CoNEXT 2008: 17 - Andrés Arcia, David Ros, Nicolas Montavont:
Auto-protection of 802.11 networks from TCP ACK division. CoNEXT 2008: 48 - Paramvir Bahl, Ranveer Chandra, Patrick P. C. Lee, Vishal Misra, Jitendra Padhye, Dan Rubenstein, Yan Yu:
Opportunistic use of client repeaters to improve performance of WLANs. CoNEXT 2008: 29 - Nicholas Ball, Peter R. Pietzuch:
Distributed content delivery using load-aware network coordinates. CoNEXT 2008: 77 - Michela Becchi, Patrick Crowley:
Extending finite automata to efficiently match Perl-compatible regular expressions. CoNEXT 2008: 25 - Sapan Bhatia, Murtaza Motiwala, Wolfgang Mühlbauer, Yogesh Mundada, Vytautas Valancius, Andy C. Bavier, Nick Feamster, Larry L. Peterson, Jennifer Rexford:
Trellis: a platform for building flexible, fast virtual networks on commodity hardware. CoNEXT 2008: 72 - Greg Bigwood, Tristan Henderson:
Social DTN routing. CoNEXT 2008: 35 - Alessio Botta, Roberto Canonico, Giovanni Di Stasi, Antonio Pescapè, Giorgio Ventre:
Providing UMTS connectivity to PlanetLab nodes. CoNEXT 2008: 74 - François Cantin, Bamba Gueye, Dali Kaafar, Guy Leduc:
Overlay routing using coordinate systems. CoNEXT 2008: 42 - Alberto Castro, Martín Germán, Xavier Masip-Bruin, Marcelo Yannuzzi, Roque Gagliano, Eduardo Grampín:
Advantages of a PCE-based control plane for LISP. CoNEXT 2008: 46 - Kenjiro Cho, Kensuke Fukuda, Hiroshi Esaki, Akira Kato:
Observing slow crustal movement in residential user traffic. CoNEXT 2008: 12 - Daniele Croce, Taoufik En-Najjary, Guillaume Urvoy-Keller, Ernst W. Biersack:
Capacity estimation of ADSL links. CoNEXT 2008: 13 - Ítalo Cunha, Renata Teixeira, Nick Feamster, Christophe Diot:
Distinguishing persistent failures from transient losses. CoNEXT 2008: 50 - John Day, Ibrahim Matta, Karim Mattar:
Networking is IPC: a guiding principle to a better internet. CoNEXT 2008: 67 - Norbert Egi, Adam Greenhalgh, Mark Handley, Mickaël Hoerdt, Felipe Huici, Laurent Mathy:
Towards high performance virtual routers on commodity hardware. CoNEXT 2008: 20 - Ahmed Elmokashfi, Amund Kvalbein, Constantine Dovrolis:
On the scalability of BGP: the roles of topology growth and update rate-limiting. CoNEXT 2008: 8 - Christian Esteve Rothenberg, Fábio Luciano Verdi, Maurício F. Magalhães:
Towards a new generation of information-oriented internetworking architectures. CoNEXT 2008: 65 - Jing Fu, Jennifer Rexford:
Efficient IP-address lookup with a shared forwarding table for multiple virtual routers. CoNEXT 2008: 21 - Sho Fujita, Tadashi Yasumoto, Hiroshi Esaki:
On seamless connectivity over multi-radio and multi-channel wireless mesh networks. CoNEXT 2008: 58 - Thomas Gamer:
Distributed detection of large-scale attacks in the internet. CoNEXT 2008: 38 - Luca Genovali, Laura Ricci:
Voronoi models for distributed virtual environments. CoNEXT 2008: 43 - Markus Goldstein, Matthias Reif, Armin Stahl, Thomas M. Breuel:
High performance traffic shaping for DDoS mitigation. CoNEXT 2008: 41 - Tao Han, Liang Ma, Yuanan Liu:
Waiting-line auction for WiFi pricing. CoNEXT 2008: 56 - Jiayue He, Rui Zhang-Shen, Ying Li, Cheng-Yen Lee, Jennifer Rexford, Mung Chiang:
DaVinci: dynamically adaptive virtual networks for a customized internet. CoNEXT 2008: 15 - Tobias Heer, Stefan Götz, Oscar García Morchon, Klaus Wehrle:
ALPHA: an adaptive and lightweight protocol for hop-by-hop authentication. CoNEXT 2008: 23 - Yuichiro Hei, Akihiro Nakao, Toru Hasegawa, Tomohiko Ogishi, Shu Yamamoto:
AS alliance: cooperatively improving resilience of intra-alliance communication. CoNEXT 2008: 76
skipping 48 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-24 13:41 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint