Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 145 matches
- 2012
- Xin Wang, Zhaoquan Li:
Utility maximization over ergodic capacity regions of fading OFDMA broadcast channels. ICCC 2012: 573-577 - Navid Abedini, Mayank Manjrekar, Srinivas Shakkottai, Libin Jiang:
Harnessing multiple wireless interfaces for guaranteed QoS in proximate P2P networks. ICCC 2012: 18-23 - Alexandru Arion, Hoyoung Jeung, Karl Aberer:
Limits of data stream compression under the L∞ norm. ICCC 2012: 367-371 - Yanan Bao, Xiaolei Wang, Sheng Zhou, Zhisheng Niu:
Energy-efficient multicast with deadlines in wireless networks via lazy rate scheduling. ICCC 2012: 393-398 - Hamidreza Boostanimehr, Vijay K. Bhargava:
Outage analysis and relay allocation for multi-stream OFDMA decode-and-forward Rayleigh fading networks. ICCC 2012: 630-635 - Dongxu Cao, Sheng Zhou, Zhisheng Niu:
β-PSR: A Partial Spectrum Reuse scheme for two-tier heterogeneous cellular networks. ICCC 2012: 459-463 - Batu K. Chalise, Yimin D. Zhang, Moeness G. Amin:
Simultaneous transfer of energy and information for MIMO-OFDM relay system. ICCC 2012: 481-486 - Zheng Chang, Olli Alanen, Eng Hwee Ong, Jarkko Kneckt:
Enhanced channel scanning schemes for next generation WLAN system. ICCC 2012: 676-681 - Yifan Chen:
Chernoff information azimuth spectrum in distributed sensor networks. ICCC 2012: 757-762 - Yifan Chen:
Modeling Chernoff information loss in cooperative sensor networks. ICCC 2012: 763-768 - Jie Chen, Paul Gillard, Cheng Li:
Performance evaluation of three Network-on-Chip (NoC) architectures (Invited). ICCC 2012: 91-96 - Zhi Chen, Teng Joon Lim, Mehul Motani:
Energy minimization in two-way relay networks with digital network coding. ICCC 2012: 7-11 - Yen-Ming Chen, Yeong-Luh Ueng, Hau-Jung Shiau, Dung-Rung Hsieh, Jen-Yuan Hsu, Pangan Ting:
Noncoherent coded space-time modulation for a large number of transmit antennas. ICCC 2012: 345-350 - Jiming Chen, Peng Wang, Jie Zhang:
Adaptive soft frequency reuse scheme for inbuilding dense femtocell networks. ICCC 2012: 530-534 - Lei Chen, Di Yuan, Hui Song, Jie Zhang:
Mathematical modeling for optimal deployment of in-building Distributed Antenna Systems. ICCC 2012: 786-791 - Dezhang Chen, Jingjing Yang, Jida Wu, Hao Tang, Ming Huang:
Spectrum occupancy analysis based on radio monitoring network. ICCC 2012: 739-744 - Jing Chen, Bing Zhou, Xiaoshe Dong:
Analysis of Buffer Map Cheating Attacks in mobile P2P live streaming system based on game Theory. ICCC 2012: 728-732 - Weiwei Chong, Wei Kang:
Joint decode-compress-forward for the broadcast diamond channel. ICCC 2012: 191-196 - Wen-Ching Chung, Chung-Ju Chang, Yi-Chung Liao:
A channel assignment and power setting scheme by fuzzy logics for OFDMA-based macro-femto systems. ICCC 2012: 704-708 - Yue-hua Dai, Xiaoguang Wang, Yi Shi, Jianbao Ren, Yong Qi:
Isolate secure executing environment for a safe cloud. ICCC 2012: 79-84 - Matthew Debont, Kamran Jamshaid, Basem Shihada, Pin-Han Ho:
Event localization in underwater wireless sensor networks using Monitoring Courses. ICCC 2012: 769-774 - Ankur Deshwal, Soma Kohli, K. P. Chethan:
Information as a service based architectural solution for WSN. ICCC 2012: 68-73 - Wenxiang Dong, Wenyi Zhang, Xiaohui Chen, Guo Wei:
A new load equation for 802.11 MAC performance evaluation under non-saturated conditions. ICCC 2012: 428-432 - Qiu Du, Gang Wu, Qiaoling Yu, Shaoqian Li:
ICI mitigation by Doppler frequency shift estimation and pre-compensation in LTE-R systems. ICCC 2012: 469-474 - Amr Elrasad, Mohammad Galal Khafagy, Basem Shihada:
Sleep-time sizing and scheduling in green passive optical networks. ICCC 2012: 260-265 - Jalal Etesami, Werner Henkel:
LDPC code construction for wireless physical-layer key reconciliation. ICCC 2012: 208-213 - Kai Fan, Libin Zhao, Xuemin (Sherman) Shen, Hui Li, Yintang Yang:
Smart-blocking file storage method in cloud computing. ICCC 2012: 57-62 - Alaeddine El Fawal, Jean-Yves Le Boudec, Adel Aziz:
Empirical performance evaluation of data dissemination mechanisms for spot applications. ICCC 2012: 715-721 - Mingjie Feng, Da Chen, Zhiqiang Wang, Tao Jiang, Daiming Qu:
An improved spectrum management scheme for OFDMA femtocell networks. ICCC 2012: 132-136 - Junwei Feng, Mugen Peng, Jian Li, Xiang Zhang, Yihai Xing, Wei Hu:
Optimal resource allocation for time sharing relaying system. ICCC 2012: 492-496
skipping 115 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-30 05:28 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint