Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 27 matches
- 2009
- Pankaj K. Agarwal, Esther Ezra, Shashidhara K. Ganjugunte:
Efficient Sensor Placement for Surveillance Problems. DCOSS 2009: 301-314 - Paul Alcock, Utz Roedig, Mike Hazas:
Combining Positioning and Communication Using UWB Transceivers. DCOSS 2009: 329-342 - Amotz Bar-Noy, Theodore Brown, Matthew P. Johnson, Ou Liu:
Cheap or Flexible Sensor Coverage. DCOSS 2009: 245-258 - Manohar Bathula, Mehrdad Ramezanali, Ishu Pradhan, Nilesh Patel, Joe Gotschall, Nigamanth Sridhar:
A Sensor Network System for Measuring Traffic in Short-Term Construction Work Zones. DCOSS 2009: 216-230 - Jacob Beal, Jonathan Bachrach, Daniel Vickery, Mark M. Tobenkin:
Fast Self-stabilization for Gradients. DCOSS 2009: 15-27 - Marcus Chang, Andreas Terzis, Philippe Bonnet:
Mote-Based Online Anomaly Detection Using Echo State Networks. DCOSS 2009: 72-86 - Wei Dong, Chun Chen, Xue Liu, Jiajun Bu, Yunhao Liu:
Performance of Bulk Data Dissemination in Wireless Sensor Networks. DCOSS 2009: 356-369 - Sharanya Eswaran, Matthew P. Johnson, Archan Misra, Thomas La Porta:
Adaptive In-Network Processing for Bandwidth and Energy Constrained Mission-Oriented Multi-hop Wireless Networks. DCOSS 2009: 87-102 - Jonathan Gallagher, Randolph L. Moses, Emre Ertin:
Distributed Computation of Likelihood Maps for Target Tracking. DCOSS 2009: 287-300 - Eric Guenterberg, Hassan Ghasemzadeh, Vitali Loseu, Roozbeh Jafari:
Distributed Continuous Action Recognition Using a Hidden Markov Model in Body Sensor Networks. DCOSS 2009: 145-158 - Kévin Huguenin, Anne-Marie Kermarrec, Eric Fleury:
Route in Mobile WSN and Get Self-deployment for Free. DCOSS 2009: 201-215 - Kamrul Islam, Selim G. Akl, Henk Meijer:
Distributed Generation of a Family of Connected Dominating Sets in Wireless Sensor Networks. DCOSS 2009: 343-355 - Zhong-Yi Jin, Rajesh Gupta:
LazySync: A New Synchronization Scheme for Distributed Simulation of Sensor Networks. DCOSS 2009: 103-116 - Iyad A. Kanj, Ge Xia, Fenghui Zhang:
Local Construction of Spanners in the 3-D Space. DCOSS 2009: 315-328 - Mohammad A. Kanso, Michael G. Rabbat:
Compressed RF Tomography for Wireless Sensor Networks: Centralized and Decentralized Approaches. DCOSS 2009: 173-186 - Mohammad Maifi Hasan Khan, Tarek F. Abdelzaher, Jiawei Han, Hossein Ahmadi:
Finding Symbolic Bug Patterns in Sensor Networks. DCOSS 2009: 131-144 - Weijia Li, Youtao Zhang, Bruce R. Childers:
MCP: An Energy-Efficient Code Distribution Protocol for Multi-Application WSNs. DCOSS 2009: 259-272 - Chun Lung Lin, Jia-Shung Wang:
Optimal Rate Allocation of Compressed Data Streams in Multihop Sensor Networks. DCOSS 2009: 58-71 - Hui Ling, Taieb Znati:
Similarity Based Optimization for Multiple Query Processing in Wireless Sensor Networks. DCOSS 2009: 117-130 - Suhinthan Maheswararajah, Siddeswara Mayura Guru, Yanfeng Shu, Saman K. Halgamuge:
Energy Adaptive Sensor Scheduling for Noisy Sensor Measurements. DCOSS 2009: 187-200 - Dominic Meier, Yvonne-Anne Pignolet, Stefan Schmid, Roger Wattenhofer:
Speed Dating Despite Jammers. DCOSS 2009: 1-14 - Dong Kun Noh, Lili Wang, Yong Yang, Hieu Khac Le, Tarek F. Abdelzaher:
Minimum Variance Energy Allocation for a Solar-Powered Sensor System. DCOSS 2009: 44-57 - Hosam Rowaihy, Matthew P. Johnson, Diego Pizzocaro, Amotz Bar-Noy, Lance M. Kaplan, Thomas La Porta, Alun D. Preece:
Detection and Localization Sensor Assignment with Exact and Fuzzy Locations. DCOSS 2009: 28-43 - Agnelo R. Silva, Mehmet Can Vuran:
Empirical Evaluation of Wireless Underground-to-Underground Communication in Wireless Underground Sensor Networks. DCOSS 2009: 231-244 - Gautam Thatte, Viktor Rozgic, Ming Li, Sabyasachi Ghosh, Urbashi Mitra, Shrikanth S. Narayanan, Murali Annavaram, Donna Spruijt-Metz:
Optimal Allocation of Time-Resources for Multihypothesis Activity-Level Detection. DCOSS 2009: 273-286 - Anthony D. Wood, John A. Stankovic:
Online Coding for Reliable Data Transfer in Lossy Wireless Sensor Networks. DCOSS 2009: 159-172 - Bhaskar Krishnamachari, Subhash Suri, Wendi Rabiner Heinzelman, Urbashi Mitra:
Distributed Computing in Sensor Systems, 5th IEEE International Conference, DCOSS 2009, Marina del Rey, CA, USA, June 8-10, 2009. Proceedings. Lecture Notes in Computer Science 5516, Springer 2009, ISBN 978-3-642-02084-1 [contents]
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-27 20:20 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint