default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 194 matches
- 2009
- Wassim Abbessi, Hédi Nabli:
Comparison of computation methods for the steady-state markov modulated fluid queues. ISCC 2009: 1-6 - Walid Abdallah, Mohamed Hamdi, Noureddine Boudriga:
A public key algorithm for optical communication based on lattice cryptography. ISCC 2009: 200-205 - Yu Adachi, Yoshihiro Oyama:
Malware analysis system using process-level virtualization. ISCC 2009: 550-556 - Wael Adi, Noureddine Ouertani, Abdulrahman Hanoun, Bassel Soudan:
Deploying FPGA self-configurable cell structure for micro crypto-functions. ISCC 2009: 348-354 - César S. Aguiar, Daniel I. Cruz, Marcos Antonio Cavenaghi, Roberta Spolon Ulson, Renata Spolon Lobato:
A tool to simplify the management of homogeneous and heterogeneous grids. ISCC 2009: 295-298 - Mohamed F. Ahmed, Reda A. Ammar, Sanguthevar Rajasekaran:
Novel micro-threading techniques on the Cell Broadband Engine. ISCC 2009: 570-575 - Ibrahim Al-Kassem, Sanaa Sharafeddine, Zaher Dawy:
BlueHRT: Hybrid Ring Tree Scatternet Formation in Bluetooth Networks. ISCC 2009: 165-169 - Bader Al-Manthari, Nidal Nasser, Najah A. Abu Ali, Hossam S. Hassanein:
Congestion prevention in broadband wireless access systems: An economic approach. ISCC 2009: 606-611 - Michele Albano, Stefano Chessa:
Distributed Erasure Coding in Data Centric Storage for wireless sensor networks. ISCC 2009: 22-27 - Suliman Albasheir, Sofiène Tahar, Claude Gauthier, Jean Roussel Personna:
Radio Access Network traffic generation for Mobile Switching Center. ISCC 2009: 705-710 - Attahiru Sule Alfa, Haitham Abu-Ghazaleh:
Discrete-time analysis of packet data discarding in high speed multimedia networks. ISCC 2009: 443-448 - Alfonso Ariza-Quintana, Alicia Triviño-Cabrera, Eduardo Casilari-Pérez, Juan-Carlos Cano, Carlos Miguel Tavares Calafate, Pietro Manzoni:
Assessing the impact of Link Layer Feedback mechanisms on MANET routing protocols. ISCC 2009: 770-775 - Majed Alhaisoni, Antonio Liotta, Mohammed Ghanbari:
Performance analysis and evaluation of P2PTV streaming behavior. ISCC 2009: 89-94 - Husnain Mansoor Ali, Anthony Busson, Véronique Vèque:
Network layer link management using signal strength for ad-hoc networks. ISCC 2009: 141-146 - Ali El Kamel, Habib Youssef:
An efficient hybrid recovery mechanism for MPLS-based networks. ISCC 2009: 474-480 - Wael Hosny Fouad Aly, Mohamed Faten Zhani, Halima Elbiaze:
Adaptive Offset for OBS networks using Feedback Control Techniques. ISCC 2009: 195-199 - Mansoor Alicherry, Angelos D. Keromytis:
DoubleCheck: Multi-path verification against man-in-the-middle attacks. ISCC 2009: 557-563 - Khalid Almahorg, Otman Basir:
Performance evaluation of MANETs virtual backbone formation algorithms. ISCC 2009: 787-792 - Anas F. Alrawi, Bayan S. Sharif, Charalampos Tsimenidis, Konstantinos Ntagkounakis:
Influence of code orthogonality on downlink throughput comparison between MC-CDMA and OFDMA in multi-cellular environments. ISCC 2009: 249-254 - Ola Amayri, Nizar Bouguila:
Online spam filtering using support vector machines. ISCC 2009: 337-340 - Habib M. Ammari, Sajal K. Das:
Joint k-coverage, duty-cycling, and geographic forwarding in wireless sensor networks. ISCC 2009: 487-492 - Giuseppe Anastasi, Marco Conti, Ilaria Giannetti, Andrea Passarella:
Design and evaluation of a BitTorrent proxy for energy saving. ISCC 2009: 116-121 - Iuri Bueno Drumond de Andrade, Geraldo Robson Mateus, Fabíola Guerra Nakamura:
A GRASP heuristic to Density Control: Solving multi-period coverage and Routing Problems in Wireless Sensor Networks. ISCC 2009: 493-499 - Abduladhim Ashtaiwi, Hossam S. Hassanein:
Enhancements to IEEE 802.11 DCF collision avoidance based on MIMO Adaptive Spatial Channels Sharing. ISCC 2009: 564-569 - Thomas A. Babbitt, Christopher Morrell, Boleslaw K. Szymanski:
Self-Selecting Reliable Path Routing in diverse Wireless Sensor Network environments. ISCC 2009: 1-7 - Andrea Baldini, Lorenzo De Carli, Fulvio Risso:
Increasing performances of TCP data transfers through multiple parallel connections. ISCC 2009: 630-636 - Shibdas Bandyopadhyay, Sartaj Sahni:
Sorting on a Cell Broadband Engine SPU. ISCC 2009: 218-223 - Marc Barisch, Alfredo Matos:
Integrating user Identity Management systems with the Host Identity Protocol. ISCC 2009: 830-836 - Rami Baroody, Nizar Al-Holou, Utayba Mohammad:
Scalability in a Dynamic Discovery Service-based Jini for the Next Generation vehicle network. ISCC 2009: 30-35 - Selma Batti, Mourad Zghal, Noureddine Boudriga, Trevor Hall:
An all-optical synchronizer for switching node using single-sideband modulator and fiber Bragg gratings. ISCC 2009: 736-741
skipping 164 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-19 17:41 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint