![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 26 matches
- 2012
- Björn Bittins, Jürgen Sieck:
Multimodal and collaborative localisation service for diverse environments. IDAACS-SWS 2012: 28-33 - Gerd vom Bögel, Frédéric Meyer, Martin Kemmerling:
Batteryless sensors in building automation by use of wireless Energy Harvesting. IDAACS-SWS 2012: 72-77 - Kai-Oliver Detken, Alexander Oberle, Nicolai Kuntze, Evren Eren:
Simulation environment for mobile Virtualized Security Appliances. IDAACS-SWS 2012: 113-118 - Jan Essbach:
An approach to a decentral mobile payment system using NFC and the German eID-Card. IDAACS-SWS 2012: 67-71 - Andreas Fink, Johannes Lange, Helmut Beikirch:
Radio-based indoor localization using the eZ430-Chronos platform. IDAACS-SWS 2012: 19-22 - Tobias Gädeke, Tobias Schwalb, Johannes Schmid, Wilhelm Stork, Klaus D. Müller-Glaser:
Hybrid person localization in ad-hoc networks using model-based control and visualization. IDAACS-SWS 2012: 13-18 - Pavlo Ilin, Svetlana Antoshchuk
, Volodymyr Brovkov:
Media fac¸ade: Technical tools for interactive content control. IDAACS-SWS 2012: 48-51 - Su Jun, Nataliya Yatskiv, Anatoly Sachenko
, Vasyl Yatskiv
:
Improved method of ant colonies to search independent data transmission routes in WSN. IDAACS-SWS 2012: 52-57 - Cyrine Lahsini, Ramesh Pyndiah, Sonia Zaibi, Animar Bouallegue:
New video coding scheme for the uplink transmission. IDAACS-SWS 2012: 127-131 - Julian Lategahn, Marcel Müller, Christof Röhrig
:
Global localization of automated guided vehicles in wireless networks. IDAACS-SWS 2012: 7-12 - Pheeha Machaka
, Antoine B. Bagula
, Nico de Wet:
A highly scalable monitoring tool for Wi-Fi networks. IDAACS-SWS 2012: 102-107 - Elke Mackensen, Matthias Lai, Thomas M. Wendt
:
Performance analysis of an Bluetooth Low Energy sensor system. IDAACS-SWS 2012: 62-66 - Alex Moschevikin
, Roman Voronov
, Alexandr Galov, Alexei Soloviev
:
Using pressure sensors for floor identification in wireless sensors networks. IDAACS-SWS 2012: 2-6 - Marcel Müller, Julian Lategahn, Christof Röhrig
:
Pedestrian localization using IEEE 802.15.4a TDoA Wireless Sensor Network. IDAACS-SWS 2012: 23-27 - Vladimir A. Oleshchuk:
Trust-enhanced data integrity model. IDAACS-SWS 2012: 109-112 - Matthias Prellwitz
, Eileen Kühn
, Jürgen Sieck:
Mobile transfer of wireless technologies. IDAACS-SWS 2012: 43-46 - Sabine Sachweh, Martin Peters, Robin Bork, Jorg Lissa, Christopher Brink, Carsten Wolff
:
SeaBridge Duo: WLAN bridge increasing offshore mobility. IDAACS-SWS 2012: 58-61 - Lothar Schüssele, Tobias Felhauer, Andreas H. Christ
, Tobias Klausmann, Christian Weber:
Application of wireless technology for IP-based aircraft in-flight entertainment. IDAACS-SWS 2012: 39-42 - Axel Sikora, Philipp Digeser, Martin Klemm, Marco Tubolino, Rico Werner:
Model based development of a TinyOS-based Wireless M-Bus implementation. IDAACS-SWS 2012: 91-94 - Oldrich Slavata, Jan Holub
, Pavel Hubner:
Impact of jitter and jitter buffer on the final quality of the transferred voice. IDAACS-SWS 2012: 120-123 - Pavel Soucek, Jan Holub
:
Evaluation of ITU-T P.863 POLQA in Chinese environment. IDAACS-SWS 2012: 124-126 - Mircea-Ionel Strutu, Dan Popescu:
A mobile wireless sensor network simulation framework for outdoor environmental monitoring applications. IDAACS-SWS 2012: 96-101 - Razia Sultana, Andreas H. Christ
, Patrick Meyrueis:
Architecture of device independent communication applied in Language Learning Game. IDAACS-SWS 2012: 35-38 - Joerg F. Wollert:
The performance of UWB-communication in an industrial environment. IDAACS-SWS 2012: 85-90 - Michael Zillgith, Simon Fey, Pascal Benoit, Stefan Feuerhahn, Robert Kohrs:
Wireless IP networks in Smart Grid applications. IDAACS-SWS 2012: 79-84 - 1st International IEEE Symposium on Wireless Systems, IDAACS-SWS 2012, Offenburg, Germany, September 20-21, 2012. IEEE 2012, ISBN 978-1-4673-4678-8 [contents]
loading more results
failed to load more results, please try again later
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-19 15:38 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint