Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 181 matches
- 2014
- Amine Adouane, Kinda Khawam, Johanne Cohen, Dana Marinca, Samir Tohmé:
Replicator dynamics for distributed Inter-Cell Interference Coordination. ISCC 2014: 1-7 - João Afonso, André Cardote, Susana Sargento:
Vehicular testbed management. ISCC 2014: 1-7 - Rui L. Aguiar, Sartaj Sahni:
Message from the general co-chairs. ISCC 2014: 1 - Iffat Ahmed, Leonardo Badia, Andreas Petlund, Carsten Griwodz, Pål Halvorsen:
Analysis of SR ARQ delays using data-bundling over Markov channels. ISCC 2014: 1-6 - Manal Al-Bzoor, Reda A. Ammar, Jun-Hong Cui, Sanguthevar Rajasekaran:
Coordinated multi-surface gateway redeployment for enhanced performance in underwater sensor networks. ISCC 2014: 1-6 - Yasser Al-Roqi, Stylianos Papanastasiou, Evtim Peytchev:
Ferry-assisted greedy perimeter stateless routing protocol for mobile ad hoc networks (FA-GPSR). ISCC 2014: 1-6 - Bandar Alghamdi, Marwane Ayaida, Hacène Fouchal, Hichem Baala:
A slot assignment for Wireless Body Area Networks. ISCC 2014: 1-8 - Ayman Alharbi, Hesham Alhumyani, Sherif Tolba, Reda A. Ammar, Jun-Hong Cui:
Underwater Sensing and Processing Networks (USPN). ISCC 2014: 1-7 - Manal Alharbi, Priya Periaswamy, Sanguthevar Rajasekaran:
Disjunctive rules mining from uncertain databases. ISCC 2014: 1-6 - Konstantinos Antonis, Christos Bouras, Fabrizio D'Elia, Annalisa Di Vincenzo, Georgios Diles, Vasileios Kokkinos, Andreas Koskeris:
Comparative analysis of broadband penetration and digital public services in South East Europe. ISCC 2014: 1-6 - Guilherme B. Araújo, Matheus M. Queiroz, Fátima de L. P. Duarte-Figueiredo, Anna Izabel J. Tostes Ribeiro, Antonio A. F. Loureiro:
CARTIM: A proposal toward identification and minimization of vehicular traffic congestion for VANET. ISCC 2014: 1-6 - José Assunção, Adão Silva, Rui Dinis, Atílio Gameiro:
IB-DFE-based receivers for MC-CDMA systems with interference alignment. ISCC 2014: 1-6 - François Avril, Thibault Bernard, Alain Bui:
Efficient communication scheduling in clustered WSN. ISCC 2014: 1-6 - Mohamed Chaker Bali, Chiheb Rebai:
Optimum receiver of coded M-FSK modulation for power line communications. ISCC 2014: 1-6 - Haythem Balti, Adel Said Elmaghraby:
Emotion analysis from speech using temporal contextual trajectories. ISCC 2014: 1-7 - Keith Barber, Khaled Harfoush:
Synchronizing Small Data in a big world. ISCC 2014: 1-6 - Vladimir P. Barcelos, Thiago C. Amarante, Carlos Daniel Drury, Luiz H. A. Correia:
Vehicle monitoring system using IEEE 802.11p device and Android application. ISCC 2014: 1-7 - Riccardo Bassoli, Vahid Nazari Talooki, Hugo Marques, Jonathan Rodriguez, Seiamak Vahid, Rahim Tafazolli:
LT codes for video streaming in burst erasure channels: An energy analysis. ISCC 2014: 1-4 - Bruno Lopes Alcantara Batista, Gustavo Augusto Lima de Campos, Marcial Porto Fernandez:
Flow-based conflict detection in OpenFlow networks using first-order logic. ISCC 2014: 1-6 - Navid Bayat, Hanan Lutfiyya:
MC-SkyNet: Mobile-cloud dynamic partitioning for mobile cloud applications. ISCC 2014: 1-7 - Nicola Bicocchi, Damiano Fontana, Franco Zambonelli:
A self-aware, reconfigurable architecture for context awareness. ISCC 2014: 1-7 - Davi da Silva Böger, Luciano Barreto, Joni da Silva Fraga, Pascal Urien, Hassane Aissaoui, André Santos, Guy Pujolle:
User-centric Identity Management based on secure elements. ISCC 2014: 1-6 - Frank Bohdanowicz, Christian Henke:
Loop detection and automated route aggregation in distance vector routing. ISCC 2014: 1-6 - Fábio Borges, Denise Demirel, Leon Bock, Johannes Buchmann, Max Mühlhäuser:
A privacy-enhancing protocol that provides in-network data aggregation and verifiable smart meter billing. ISCC 2014: 1-6 - Ibtissem Boulanouar, Stéphane Lohier, Abderrezak Rachedi, Gilles Roussel:
PMT2: A Predictive Mobile Target Tracking Algorithm in Wireless Multimedia Sensor Networks. ISCC 2014: 1-7 - Johannes Brendel, Steffen Riess, Simon Schroeter, Georg Fischer:
Noise floor dependent data fusion for reliable REM generation with a spectrum sensing grid. ISCC 2014: 1-6 - Dario Bruneo, Thomas Fritz, Sharon Keidar-Barner, Philipp Leitner, Francesco Longo, Clarissa Cassales Marquezan, Andreas Metzger, Klaus Pohl, Antonio Puliafito, Danny Raz, Andreas Roth, Eliot E. Salant, Itai Segall, Massimo Villari, Yaron Wolfsthal, Chris Woods:
CloudWave: Where adaptive cloud management meets DevOps. ISCC 2014: 1-6 - Carlos M. S. Cabral, Christian Esteve Rothenberg, Maurício Ferreira Magalhães:
High fidelity content-centric experiments with Mini-CCNx. ISCC 2014: 1-6 - Claudia Canali, Riccardo Lancellotti:
An adaptive technique to model virtual machine behavior for scalable cloud monitoring. ISCC 2014: 1-7 - Giuseppe Cardone, Andrea Cirri, Antonio Corradi, Luca Foschini, Rebecca Montanari:
Activity recognition for Smart City scenarios: Google Play Services vs. MoST facilities. ISCC 2014: 1-6
skipping 151 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-24 20:15 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint