Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 34 matches
- 2010
- Hrishikesh B. Acharya, Aditya Joshi, Mohamed G. Gouda:
Firewall modules and modular firewalls. ICNP 2010: 174-182 - Zied Ben-Houidi, Mickael Meulle:
A new VPN routing approach for large scale networks. ICNP 2010: 124-133 - Jung Il Choi, Mayank Jain, Maria A. Kazandjieva, Philip Alexander Levis:
Granting silence to avoid wireless collisions. ICNP 2010: 82-91 - Luca Cittadini, Giuseppe Di Battista, Thomas Erlebach, Maurizio Patrignani, Massimo Rimondini:
Assigning AS relationships to satisfy the Gao-Rexford conditions. ICNP 2010: 113-123 - Sonia Fahmy, Toru Hasegawa:
Message from the technical program committee chairs. ICNP 2010: 1-2 - Yuan Feng, Baochun Li, Bo Li:
Peer-assisted VoD prefetching in double auction markets. ICNP 2010: 275-284 - Wei Gao, Guohong Cao:
On exploiting transient contact patterns for data forwarding in Delay Tolerant Networks. ICNP 2010: 193-202 - Alexander J. T. Gurney, Timothy G. Griffin:
Neighbor-specific BGP: An algebraic exploration. ICNP 2010: 103-112 - Chuan Han, Yaling Yang, Yongxiang Peng:
Optimal cache-based route repair for real-time traffic. ICNP 2010: 213-222 - Teruo Higashino, Kenji Suzuki:
Message from the General Co-Chairs. ICNP 2010: 1-2 - Yating Hsu, David Lee:
Authentication and authorization protocol security property analysis with trace inclusion transformation and online minimization. ICNP 2010: 164-173 - Zhuo Huang, David Lin, Jih-Kwon Peir, Shigang Chen, S. M. Iftekharul Alam:
Fast routing table lookup based on deterministic multi-hashing. ICNP 2010: 31-40 - Jun Huang, Guoliang Xing, Gang Zhou, Ruogu Zhou:
Beyond co-existence: Exploiting WiFi white space for Zigbee performance assurance. ICNP 2010: 305-314 - Nan Jiang, Jin Cao, Yu Jin, Li Erran Li, Zhi-Li Zhang:
Identifying suspicious activities through DNS failure graph analysis. ICNP 2010: 144-153 - Fernando A. Kuipers, Anteneh Beshir, Ariel Orda, Piet Van Mieghem:
Impairment-aware path selection and regenerator placement in translucent optical networks. ICNP 2010: 11-20 - Raju Kumar, Srikar Tati, Felipe de Mello, Srikanth V. Krishnamurthy, Thomas La Porta:
Network Coding aware Rate Selection in multi-rate IEEE 802.11. ICNP 2010: 92-102 - Yiyang Li, Jianxia Ning, Zhengyuan Xu, Srikanth V. Krishnamurthy, Gang Chen:
UVOC-MAC: A MAC protocol for outdoor ultraviolet networks. ICNP 2010: 72-81 - Peilong Li, Honghai Zhang, Baohua Zhao, Sampath Rangarajan:
Scalable video multicast with joint layer resource allocation in broadband wireless networks. ICNP 2010: 295-304 - Kebin Liu, Mo Li, Yunhao Liu, Xiang-Yang Li, Minglu Li, Huadong Ma:
Exploring the hidden connectivity in urban vehicular networks. ICNP 2010: 243-252 - Shucheng Liu, Guoliang Xing, Hongwei Zhang, Jianping Wang, Jun Huang, Mo Sha, Liusheng Huang:
Passive interference measurement in Wireless Sensor Networks. ICNP 2010: 52-61 - Youngtae Noh, Paul Wang, Uichin Lee, Dustin Torres, Mario Gerla:
DOTS: A propagation Delay-aware Opportunistic MAC protocol for underwater sensor networks. ICNP 2010: 183-192 - Matthew J. Probst, Jun Cheol Park, Ravin Abraham, Sneha Kumar Kasera:
SocialSwarm: Exploiting distance in social networks for collaborative flash file distribution. ICNP 2010: 263-274 - Feng Qian, Zhaoguang Wang, Alexandre Gerber, Zhuoqing Morley Mao, Subhabrata Sen, Oliver Spatscheck:
TOP: Tail Optimization Protocol For Cellular Radio Resource Allocation. ICNP 2010: 285-294 - Tongqing Qiu, Lusheng Ji, Dan Pei, Jia Wang, Jun (Jim) Xu:
TowerDefense: Deployment strategies for battling against IP prefix hijacking. ICNP 2010: 134-143 - Md. Yusuf Sarwar Uddin, Brighten Godfrey, Tarek F. Abdelzaher:
RELICS: In-network realization of incentives to combat selfishness in DTNs. ICNP 2010: 203-212 - Xiaoping Wang, Yunhao Liu, Zheng Yang, Junliang Liu, Jun Luo:
ETOC: Obtaining robustness in component-based localization. ICNP 2010: 62-71 - Lei Yang, Jinsong Han, Yong Qi, Yunhao Liu:
Identification-free batch authentication for RFID tags. ICNP 2010: 154-163 - Zhenyu Yang, Ming Li, Wenjing Lou:
CodePlay: Live multimedia streaming in VANETs using symbol-level network coding. ICNP 2010: 223-232 - Dejun Yang, Guoliang Xue, Xi Fang, Satyajayant Misra, Jin Zhang:
Routing in max-min fair networks: A game theoretic approach. ICNP 2010: 1-10 - Joon Yoo, Brian Sung Chul Choi, Mario Gerla:
An opportunistic relay protocol for vehicular road-side access with fading channels. ICNP 2010: 233-242
skipping 4 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-24 12:37 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint