Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 26 matches
- 2007
- Matthias Baldauf, Schahram Dustdar, Florian Rosenberg:
A survey on context-aware systems. Int. J. Ad Hoc Ubiquitous Comput. 2(4): 263-277 (2007) - Narottam Chand, Ramesh C. Joshi, Manoj Misra:
Supporting cooperative caching in mobile ad hoc networks using clusters. Int. J. Ad Hoc Ubiquitous Comput. 2(1/2): 58-72 (2007) - Narottam Chand, Ramesh Chandra Joshi, Manoj Misra:
Energy efficient cache invalidation in a disconnected wireless mobile environment. Int. J. Ad Hoc Ubiquitous Comput. 2(1/2): 83-91 (2007) - Yuh-Shyan Chen, Tsung-Hung Lin:
A time-slot leasing-based QoS routing protocol over Bluetooth WPANs. Int. J. Ad Hoc Ubiquitous Comput. 2(1/2): 92-108 (2007) - Yun-Feng Chen, Tao Li, Dong-Ni Gao, Xiaoqin Hu, Xiao-Ping Zhang, Jin Liu:
A secure mobile communication approach based on information hiding. Int. J. Ad Hoc Ubiquitous Comput. 2(3): 134-139 (2007) - Werner Creixell, Kaoru Sezaki:
Routing protocol for ad hoc mobile networks using mobility prediction. Int. J. Ad Hoc Ubiquitous Comput. 2(3): 149-156 (2007) - Yong Cui, Ke Xu, Jianping Wu, Linjian Song:
CBroadcast: an Application Layer Multicast mechanism based on combination of central control and self-organisation. Int. J. Ad Hoc Ubiquitous Comput. 2(4): 232-238 (2007) - Yao Hua Ho, Ai Hua Ho, Kien A. Hua:
Connectionless protocol: a localised approach to wireless ad hoc networks. Int. J. Ad Hoc Ubiquitous Comput. 2(1/2): 21-35 (2007) - Tsung-Chuan Huang, Chin-Yi Yao:
A slot allocation strategy for clustered ad hoc networks. Int. J. Ad Hoc Ubiquitous Comput. 2(1/2): 3-11 (2007) - Hong-Jong Jeong, Uhjin Joung, Dongkyun Kim:
Overlay multicasting for small group application in MANETs. Int. J. Ad Hoc Ubiquitous Comput. 2(4): 215-224 (2007) - Xue Jun Li, Peter Han Joo Chong:
Simulation study of some PRMA-based protocols with channel reservation for data traffic. Int. J. Ad Hoc Ubiquitous Comput. 2(3): 167-174 (2007) - Feng Lin, Changyi Zheng, Xin Wang, Xiangyang Xue:
ACVoD: a peer-to-peer based video-on-demand scheme in broadband residential access networks. Int. J. Ad Hoc Ubiquitous Comput. 2(4): 225-231 (2007) - Lawan A. Mohammed, Biju Issac:
Detailed DoS attacks in wireless networks and countermeasures. Int. J. Ad Hoc Ubiquitous Comput. 2(3): 157-166 (2007) - Reza Purtoosi, Hassan Taheri, Abbas Mohammadi, Foroohar Foroozan:
A distributed stabilised clustering algorithm for large-scale wireless ad hoc networks. Int. J. Ad Hoc Ubiquitous Comput. 2(3): 186-196 (2007) - Ioanna Roussaki, Maria Strimpakou, Miltiades E. Anagnostou:
Designing next generation middleware for context-aware ubiquitous and pervasive computing. Int. J. Ad Hoc Ubiquitous Comput. 2(3): 197-206 (2007) - G. Sivaradje, Perumal Dananjayan:
A spectrally overlaid flexible bandwidth utilisation scheme for cellular CDMA systems. Int. J. Ad Hoc Ubiquitous Comput. 2(1/2): 109-118 (2007) - Yang Sun, Guangbin Fan, Shigang Chen:
Spiral-based data dissemination in sensor networks. Int. J. Ad Hoc Ubiquitous Comput. 2(1/2): 46-57 (2007) - Shamik Sural, Mukesh Kumar, Navin Kumar Sharma, Rajarshi Roy:
A power-aware master and bridge scheduling scheme for bluetooth scatternets. Int. J. Ad Hoc Ubiquitous Comput. 2(1/2): 119-132 (2007) - Mohammed Tarique, Kemal E. Tepe:
New hierarchical approach to reactive routing protocols for wireless ad hoc networks with cross-layer design. Int. J. Ad Hoc Ubiquitous Comput. 2(1/2): 12-20 (2007) - Di Tian, Zhijun Lei, Nicolas D. Georganas:
Configuring node status in a two-phase tightly integrated mode for wireless sensor networks. Int. J. Ad Hoc Ubiquitous Comput. 2(3): 175-185 (2007) - Chai-Keong Toh, Guillermo Guichal, Dongkyun Kim, Victor O. K. Li:
Service Location Protocols for mobile wireless ad hoc networks. Int. J. Ad Hoc Ubiquitous Comput. 2(4): 250-262 (2007) - Akira Uchiyama, Kumiko Maeda, Takaaki Umedu, Hirozumi Yamaguchi, Teruo Higashino:
Performance evaluation of mobile wireless communication and services with modelling of real environment. Int. J. Ad Hoc Ubiquitous Comput. 2(4): 239-249 (2007) - Yingyue Xu, Hairong Qi:
Dynamic mobile agent migration in Wireless Sensor Networks. Int. J. Ad Hoc Ubiquitous Comput. 2(1/2): 73-82 (2007) - Daiqin Yang, Wenjian Shao, Dongxu Shen, Victor O. K. Li:
Hybrid Busy tone and Carrier sense-based MAC protocol in multi-hop ad hoc networks. Int. J. Ad Hoc Ubiquitous Comput. 2(4): 208-214 (2007) - Qing Ye, Liang Cheng:
A lightweight approach to mobile multicasting in Wireless Sensor Networks. Int. J. Ad Hoc Ubiquitous Comput. 2(1/2): 36-45 (2007) - Jingyao Zhang, Pingyi Fan:
On network coding in wireless ad-hoc networks. Int. J. Ad Hoc Ubiquitous Comput. 2(3): 140-148 (2007)
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-31 02:19 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint